是否可以对我的iPhone应用程序进行逆向工程? [英] Is it possible to reverse-engineer my iPhone application?

查看:88
本文介绍了是否可以对我的iPhone应用程序进行逆向工程?的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我创建了一个iPhone应用程序,我想将已编译的.app文件发送到我的客户端,这样他就可以在他的设备上安装和测试这个iPhone应用程序。

I have created an iPhone application, and I want to send the compiled .app file to my client, so he can install and test this iPhone application on his device.

他是否可以查看此.app文件的内容,例如此应用程序中使用的资源文件(图像,声音文件等)?他可以从编译产品中反向设计用于构建此应用程序的源代码吗?

Is it possible that he can view the contents of this .app file, like the resource files used in this application (images, sound files, etc.)? Could he reverse engineer the source code used to build this application from the compiled product?

推荐答案

在OSX上应用程序包只是一个名为 .app 的目录有关应用程序的特殊元数据文件,以及应用程序可执行文件及其资源。右键单击并选择显示包内容将显示 Application.app 目录的全部内容。

On OSX an Application Bundle is just a directory named .app with some special meta-data files about the application, and the application executables and its resources. Right clicking and picking Show Package Contents will show the entire contents of the Application.app directory.

任何未使用某些应用程序特定加密的文件资源,图像,声音,属性等都将是明显可访问的。

Any file resources, images, sounds, properties filed, etc. that are not using some application specific encryption will be plainly accesible.

也就是说,应用程序代码,如果是原生的Objective-C应用程序,将被编译并且不容易进行逆向工程,则必须进行反编译,如果删除调试信息,则需要专门的黑客来查看程序集输出并修改它。

That said, the application code, if a native Objective-C application, will be compiled and not easily reverse engineered, it would have to be decompiled, and if stripped of debugging information would take a dedicated hacker to grok the assembly output and modify it.

这篇关于是否可以对我的iPhone应用程序进行逆向工程?的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆