Summary

  • This article explores jailbreak detection, a mechanism implemented by developers to prevent runtime manipulation, one of the key benefits of jailbreaking.
  • The blog covers types of jailbreak, detection methods, and the process and tools required to review and modify the binary of an iOS application using the Ghidra software.
  • To practice this, we will apply these concepts to the No Escape iOS application from MobileHackingLab, one of the more complex laboratories available.
  • This is a hands-on blog, so knowledge of jailbreak, some reverse engineering concepts, and the Ghidra software will be helpful.
  • Nevertheless, we will walk through the process from start to finish.
  • Some of the key takeaways are types of jailbreaks and how some common methods detect them.
  • We will also look at how to patch an application’s binary using Ghidra and other relevant tools.
  • Overall, this is a continuation of the previous blog on Environment Setup - MobileHackingLab.

By YoKo Kho

Original Article