使用已安装的xCon进行越狱检测 [英] Jailbreak detection with installed xCon

查看:164
本文介绍了使用已安装的xCon进行越狱检测的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我对在iOS上检测越狱有疑问.我用了几件事来检测它,但它们工作正常,但是当我安装xCon时,我的应用程序再也无法检测到越狱了.我使用了以下技术:

I have question about detecting Jailbreak on iOS. I used a couple things to detect it and they are working fine but when I’m installing xCon my app is not detecting Jailbreak any more. I've used the following techniques:

  • 检查cydia是否存在
  • 检查cydia应用方案
  • 检查是否在沙盒外书写
  • 检查符号链接是否存在
  • 检查fork()函数
  • 检查模型功能 如何保护我的应用程序免受xCon调整?有什么我可以做的吗?
  • checking if cydia exists
  • checking for cydia app scheme
  • checking for writing outside sandbox
  • checking for existence of symbolic links
  • checking fork() function
  • checking dyld functions How can I protect my app from xCon tweaks? Is there anything that I can do?

推荐答案

我能做些什么吗?

Is there anything what I can do?

不是真的.

在越狱环境中,您的应用程序的任何部分都可以即时重写.因此,您实施的任何检测都可以跳过.

In a jailbroken environment, any part of your app can be rewritten on the fly. So any detection you implement can just be jumped over.

您当然可以尝试,通过使您的应用更加晦涩难懂,采用混淆处理,直接使用syscall而不是依赖主机库等来使他们更难发现和规避此类检查,但是只要系统能够执行您的支票,那么拥有足够时间和意志力的人就可以对其进行跟踪,对它们的工作进行反向工程并对其进行绝育.

You can certainly try to make it harder for them to find and circumvent such check by making your app more obscure, employing obfuscation, using syscalls directly rather than relying on host libraries, etc, etc, but as long as the system can execute your checks, someone with enough time and willpower can track them down, reverse engineer how they work, and neuter them.

这篇关于使用已安装的xCon进行越狱检测的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆