User Tools

Site Tools

Translations of this page:

howto:iosfrida

This is an old revision of the document!


IOS Tweaking with Frida & Objection

I had planned to look at the IOS app for some time. More recently, DJI decided to implement certificate pinning to try to stop us from seeing what data they are exchanging. My first thought “How rude!”.

To get under the hood, Hostile reminded me (again) that I should really look at Frida. Never done it before, but that is no excuse. I started looking, and I also found https://github.com/dpnishant/appmon and https://github.com/sensepost/objection

My first efforts were to get the basic frida functionality working since these apps depended on it. But this was a major fail. Frida on Python 2.x was not working for me all that well. And on 3.x, it failed to install due to some weird certificate errors that are OSX related.

After struggling, I downloaded the egg file and did the install manually. That worked. While researching, I concluded that Objection looked like a good fit for what I wanted, so I installed that also.

Below is the step by step of what I have done so far to get to this point.

1. Install required tools

1.0. Install Base Tools & Dependencies

We need several tools and dependencies in order to start. Many of these may be already installed on your mac if you've been involved in previous development work. However, its a good idea to check and install if necessary. Lets start with Xcode.

1.0.1 Install Xcode

Go to App store, search and Install Xcode, this is a multi GB (around 5) install, so give it time.

Once complete, In terminal run the following commands

sudo xcode-select -s /Applications/Xcode.app/Contents/Developer

1.0.2 Install Brew

/usr/bin/ruby -e "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install)"

1.0.3 Install Python 3

brew install python3

1.0.4 Install wget

brew install wget

1.0.5 Install NPM

brew install npm

1.1. Install Frida

Frida does not install cleanly on OSX using pip3. There is some weird ass certificate error. I've googled enough and decided to cheat. By putting the egg file in ~ it just works…

cd ~
wget `wget -q "https://pypi.python.org/pypi/frida" -O- | grep macosx | tail -1 | cut -d "\"" -f 2`
pip3 install frida

1.2. Install objection

pip3 install objection -U

1.3. Install applesign

npm install -g applesign

1.4. Install insert_dylib

cd ~/Documents
git clone https://github.com/Tyilo/insert_dylib
cd insert_dylib
xcodebuild
cp build/Release/insert_dylib /usr/local/bin/insert_dylib

1.5. Install ios-deploy

npm install -g ios-deploy

1.6. Create a frida gadget configuration file

The Frida Gadget supports configuration parameters, that will allow the gadget to start in a variety of modes. We need to add this file to the IPA which will be read by the gadget during application load. This is particularly important, since we dont want to be dependent on the USB cable which is the default behaviour. At the moment, the behaviour here is to wait for frida to connect. Later, we can have our own gadget scripts that we will add into the IPA which will work standalone, without a need to have a network connection at all.

Download this file to ~/Documents

FridaGadget.config
{
  "interaction": {
    "type": "listen",
    "address": "0.0.0.0",
    "port": 27042,
    "on_load": "wait"
  }
}

Or, if you're ready to do some on-board hooking without any external comms, use this instead

FridaGadget.config
{
  "interaction": {
    "type": "script",
    "path": "Tweak.js",
    "on_change": "reload"
  },
  "code_signing": "required"
}

and create Tweak.js in the same directory with your required hooks.

2. Generate (or renew) signing credentials

2.1. Generate a code signing certificate

2.2. Generate a mobileprovision file

2.3. Take note of your code signing value

You will need a hex string to use below, which is your code-signing identity. Execute this command to get your value

security find-identity -p codesigning -v

3. Application Acquisition

It goes without saying you will need an IPA file to play with. Below, it is assumed you have downloaded your IPA file and saved it to “~/Documents/DJI GO 4.ipa”

NB: This MUST be a decrypted Go4 app. these are available to download here

4. Application Modification & Signing

cd ~/Documents
rm -rf Payload
mkdir -p "Payload/DJI GO 4.app/Frameworks"
cp FridaGadget.config Tweak.js "Payload/DJI GO 4.app/Frameworks/"
zip -r "DJI GO 4.ipa" Payload
objection patchipa -s "DJI GO 4.ipa" --codesign-signature <your signature>

5. Application Deploying

cd ~/Documents
rm -rf Payload
unzip *-frida-codesigned.ipa
ios-deploy --bundle Payload/*.app -W

6. Launch the app

There are a few options for launching… Pick which is best for you

6.1 Launch with lldb debugger active

Device must be connected via USB and unlocked.

ios-deploy --bundle ~/Documents/Payload/*.app -W -d -m

this may also be of interest to trace some of the flow via lldb

6.2 Just launch with no debugger active

ios-deploy --bundle ~/Documents/Payload/*.app -m -L

After launch is complete, you can disconnect the USB cable. Make sure you promptly launch Frida if you have it in “wait” mode, otherwise the app will fail to completely launch.

6.3 Launch in Springboard

We can now launch in Springboard, if you correctly configured your Frida configuration file, and you are only using Swizzle hooks.

7. Launch objection

Launch the objection user interface in a new terminal window. Objection is a front end with pre packaged Frida hooks.

7.1 USB Connection

objection explore

7.2 Network Connection

objection -N -h <mobile-device-ip>  explore

8. Use The Hooks

Too many hooks to cover here… but the first one that was of interest to me is listed below.

ios sslpinning disable

9. What's next

9.1. Explore network traffic

Look at traffic that we can see, noting that most of it is now not SSL pinned. What is of interest?

Starting objection as described above is great - but there is one better option.

objection -N -h <mobile-device-ip>  explore --startup-command "ios sslpinning disable"

This will automatically apply the SSL pinning bypass as soon as frida connects. By doing this, we appear to get access to all SSL comms without pinning, with the exception of traffic to https://statistical-report.djiservice.org … for reasons unknown at this time.

9.2. Implement enhanced SSL pinning hook

The default SSL pinning works out of the box with Frida/Objection - However, some DJI traffic is still not able to be read. Looking at lldb, we find:

DJI GO 4[5809:2007849] CFNetwork SSLHandshake failed (-9807)

This error message is defined here

errSSLXCertChainInvalid 	= -9807,	/* invalid certificate chain */

The default objection hook code is listed here for reference

We found that this was working for SOME requests, but not all. Particularly it appears on IOS10. Instead, you can replace the default hook with this alternative hook and you should be good to go. Install with the wget command below.

wget -q -O- https://raw.githubusercontent.com/vtky/Swizzler2/master/SSLKillSwitch.js > /Library/Frameworks/Python.framework/Versions/3.6/lib/python3.6/site-packages/objection/hooks/ios/pinning/disable.js

After making this change, DJI ssl pinning is your oyster. Crack it open!

9.3. Build our first hook

Frida is new to me - I would like to build a hook that tricks the DJI go app into thinking the terms and conditions have already been accepted - even for a new install.

bool __cdecl -[DJITermsNotificationController shouldShowTerms](DJITermsNotificationController *self, SEL a2)
{
  void *v2; // x0
  void *v3; // x0
  void *v4; // x21
  BOOL v5; // w22
 
  objc_msgSend(&OBJC_CLASS___NSUserDefaults, "standardUserDefaults");
  v2 = (void *)objc_retainAutoreleasedReturnValue();
  objc_msgSend(v2, "objectForKey:", CFSTR("AppleLanguages"));
  v3 = (void *)objc_retainAutoreleasedReturnValue();
  objc_msgSend(v3, "objectAtIndex:", 0LL);
  v4 = (void *)objc_retainAutoreleasedReturnValue();
  NSLog();
  if ( (unsigned __int64)objc_msgSend(v4, "hasPrefix:", CFSTR("zh-"), v4) & 1 )
    LOBYTE(v5) = 0;
  else
    v5 = (unsigned __int64)objc_msgSend(v4, "hasPrefix:", CFSTR("ru")) ^ 1;
  objc_release();
  objc_release();
  objc_release();
  return v5;
}
// 10276FD28: using guessed type __CFString cfstr_Applelanguages;
// 10279F268: using guessed type __CFString cfstr_Ru_0;
// 1027BEB88: using guessed type __CFString cfstr_Zh_0;
// 102D88FF0: using guessed type __objc2_ivar stru_102D88FF0;

So… What does the frida patch look like… (Thanks jezzab)

djihook.js
    //Terms and Conditions Bypass - jezzab
    var hook = ObjC.classes.DJITermsNotificationController["- shouldShowTerms"];
    Interceptor.attach(hook.implementation, {
                   onLeave: function(retval) {
                       console.log("Bypassing Terms and Conditions Dialog");
                       retval.replace(0);
                       }
   });

Subsequently, I spoke to the author of Frida about a problem with our work so far. Specifically, we want to be able to run the DJI GO app without launching via debug. He explained that the interceptor method is fairly intrusive, dynamically modifying code which gets caught by IOS. Instead, he suggested swizzling, which is an objective c alternative method to swap two functions. Even better, it passes all IOS security appsigning constraints.

He provided the following as a replacement sample for our simple hook.

djihook2.js
var DJITermsNotificationController = ObjC.classes.DJITermsNotificationController;
 
var shouldShowTerms = DJITermsNotificationController['- shouldShowTerms'];
shouldShowTerms.implementation = ObjC.implement(shouldShowTerms, function (handle, selector) {
  return false;
});

or if we want to see the original value…

djihook3.js
var DJITermsNotificationController = ObjC.classes.DJITermsNotificationController;
 
var shouldShowTerms = DJITermsNotificationController['- shouldShowTerms'];
var shouldShowTermsImpl = shouldShowTerms.implementation;
shouldShowTerms.implementation = ObjC.implement(shouldShowTerms, function (handle, selector) {
  var originalResult = shouldShowTermsImpl(handle, selector);
  console.log('Original says:', originalResult, 'we say: false');
  return false;
});

Some other comments… What about the original data that comes into this function? What can we do with it?

oleavr: method arguments follow self and sel (the first two implicit arguments). you can use var self = new ObjC.Object(handle); then you can access the instance variables of self through self.$ivars depending on whether you want to access method arguments or instance variables (or other things on the instance)

Lastly - If we need any intrusive hooks in our code - we can add the below if we need to have intrusive hooks for debugging.

if (Process.codeSigningPolicy === 'optional') {

9.4. First Standalone Patch

Good news. We accomplished this. Jezzab has packaged an earlier js file into an app, and launched in standalone mode. However, as per above notes - we had a limitation. We needed to launch with debug mode, otherwise we got code signing violations. Two things are needed to fix this…

  • We need to use swizzling instead of intercepting in our hooks
  • The author of Frida has agreed to do a patch to the gadget, so that if a phone is not jailbroken and running without debug - the intercept methods and other naughtiness will be disabled - allowing a tweaked app to run with no code signing problems.
  • The above change is now in Frida… To implement this, we need the following frida configuration
{
  "interaction": {
    "type": "script",
    "path": "Tweak.js",
    "on_change": "reload"
  },
  "code_signing": "required"
}
  • One more thing… The on_change config item. This is another mod that oleavr made to Frida - In IOS, we can upload a .js file to user space via iTunes or ifunbox etc. When frida loads up, it will look first in the documents location for a JS file. If found, it will use it. If not found, it will look for one in the app from build time. The advantage of this is that we can update the JS without a complete app rebuild.

9.4. Add more Standalone Patches

Create more hooks and package with a frida tweak'd app to change the behaviour of the application. For example:

  1. Turning off SSL pinning by default
  2. Responding with “Approved” to all GEO requests
  3. Bypassing “terms of service” screens
  4. Login “offline”

9.5. Persistant Configuration

We need a way to store some persistent configuration that can be read by all of these hooks. At first glance, there is SQLite support, which will do the storage, but we really don't want to execute SQL code each time we want to test if a particular widget is enabled or disabled. Taking that forward, the next logical place to go would be to use frida-compile, which has the nice benefit of giving you access to thousands of existing modules from npm, including (plenty of options for persistence)

Some useful details are available here on how to use it to hack on `frida-java`, but just mentally replace that with any other module from npm.

There are some Frida-specific modules as well - like frida-uikit for UI automation on iOS

9.6. UI Settings

Having build a persistent configuration object, we now need to think about how we can build our own UI that will allow our custom settings to be changed.

10. General Notes

10.1. Useful LLDB commands

Interrupt process and halt

process interrupt

Set a breakpoint on SSLHandshake

b SSLHandshake

View registers

register read

If anything in the list looks like it has a CoreFoundation or Obj-C object, type the following:

po <register of object>

And finally, if you think there's a C string being pointed to by one of the variables, you can use this:

p (char*)<register of string>

10.2. Useful Objection Commands

ios cookies get
ios nsuserdefaults get
ios sslpinning disable

10.3. Tracing Application Flow and System Calls

This GitHub project may be useful when combined with lldb to get some more information about execution flow - but have not fully got it working yet.

10.4. Resources

10.5. Building Frida

We've worked with the author of Frida for a few things… Below is a simple set of instructions to rebuild the Frida Gadget for IOS, to take advantage of some new tweaks.

  • Install Xcode with command-line tools installed (Should already be done above)
  • Install Node.js (from nodes.org).
  • Do a git clone of the Frida repo
  • Set an environment variable IOS_CERTID to be the ID of a valid code-signing certificate
  • make gadget-ios

What does that bring us? We have a new config option

{ "code_signing": "required" }

This option will allow us to have a frida modified IPA that will run on our device, launched by springboard with no special debug startup sequences required.

11. Error Codes

If you get an error during install, this page is a good reference guide to help troubleshoot.

12. Credits

oleavr from Frida has been awesome through this process. Some of our needs were not readily possible in the existing Frida code. He has made changes throughout the process to the Frida-gadget which have been enormously helpful. In addition, he has provided guidance and coaching as we came up to speed with using Frida… so thanks oleavr.

13. Footnote

In parallel to the Objection method of patching, work has been ongoing into an alternate method that can be scripted “in the cloud”. This work is dependent on one component called isign

This work had stalled, but it was confirmed to be working. However, it was discovered recently that IPA files from 4.3.2 and later fail to be signed using this tool. Below is an analysis of the current state of problem solving.

Firstly… a quick review of the components. isign is a python app. It uses a component called “construct”. Note that iSign fails to operate with versions of Construct after 2.5.5. Also, pip fails to install 2.5.4 and 2.5.5 automatically. You will need to manually install if you want to experiment with these versions.

Construct is “Construct is a powerful declarative parser (and builder) for binary data.” In other words, you define a data structure and point the parser to a stream of data, and it builds python objects containing the data from the stream.

When using isign with IPA 4.3.2 or later, it parses all of the framework binaries, and then moves to the main DJI GO 4 macho binary and we get a construct error. A copy of the error message is listed below:

working on /tmp/isign-Kvt0Zy/Payload/DJI GO 4.app/DJI GO 4
removing ua: /tmp/isign-Kvt0Zy
Traceback (most recent call last):
  File "/usr/bin/isign", line 5, in <module>
    pkg_resources.run_script('isign==1.6.15.1547538117.dev26-root', 'isign')
  File "/usr/lib/python2.7/site-packages/pkg_resources.py", line 540, in run_script
    self.require(requires)[0].run_script(script_name, ns)
  File "/usr/lib/python2.7/site-packages/pkg_resources.py", line 1455, in run_script
    execfile(script_filename, namespace, namespace)
  File "/usr/lib/python2.7/site-packages/isign-1.6.15.1547538117.dev26_root-py2.7.egg/EGG-INFO/scripts/isign", line 252, in <module>
    isign.resign(app_path, **kwargs)
  File "/usr/lib/python2.7/site-packages/isign-1.6.15.1547538117.dev26_root-py2.7.egg/isign/isign.py", line 81, in resign
    alternate_entitlements_path)
  File "/usr/lib/python2.7/site-packages/isign-1.6.15.1547538117.dev26_root-py2.7.egg/isign/archive.py", line 400, in resign
    ua.bundle.resign(deep, signer, provisioning_profile, alternate_entitlements_path)
  File "/usr/lib/python2.7/site-packages/isign-1.6.15.1547538117.dev26_root-py2.7.egg/isign/bundle.py", line 262, in resign
    super(App, self).resign(deep, signer)
  File "/usr/lib/python2.7/site-packages/isign-1.6.15.1547538117.dev26_root-py2.7.egg/isign/bundle.py", line 177, in resign
    self.sign(deep, signer)
  File "/usr/lib/python2.7/site-packages/isign-1.6.15.1547538117.dev26_root-py2.7.egg/isign/bundle.py", line 172, in sign
    executable = self.signable_class(self, self.get_executable_path(), signer)
  File "/usr/lib/python2.7/site-packages/isign-1.6.15.1547538117.dev26_root-py2.7.egg/isign/signable.py", line 41, in __init__
    self.m = macho.MachoFile.parse_stream(self.f)
  File "/usr/lib/python2.7/site-packages/construct/core.py", line 193, in parse_stream
    return self._parse(stream, Container())
  File "/usr/lib/python2.7/site-packages/construct/core.py", line 665, in _parse
    subobj = sc._parse(stream, context)
  File "/usr/lib/python2.7/site-packages/construct/core.py", line 846, in _parse
    obj = self.cases.get(key, self.default)._parse(stream, context)
  File "/usr/lib/python2.7/site-packages/construct/core.py", line 665, in _parse
    subobj = sc._parse(stream, context)
  File "/usr/lib/python2.7/site-packages/construct/core.py", line 266, in _parse
    return self.subcon._parse(stream, context)
  File "/usr/lib/python2.7/site-packages/construct/core.py", line 440, in _parse
    raise ArrayError("expected %d, found %d" % (count, c), sys.exc_info()[1])
construct.core.ArrayError: ('expected 79, found 78', ArrayError('expected 6, found 3', SwitchError('no default case defined',)))

So. Lets talk about program flow. The structure of the macho binary is defined in macho.py. This object is used in signable.py in line 41

self.m = macho.MachoFile.parse_stream(self.f)

To help understand where the failure is happening, construct provides some debugging capabilities.

If you look at line 169 of macho.py, you will notice there is a probe command commented out.

#Probe(),

To get some debugging data as the IPA is parsed, remove the comment character above in macho.py

However, we get a new error when debugging is enabled. From what I can tell, the debugging stream is reset on changing input files. isign parses multiple files, and only fails on the last file. The debugger does not work well on opening the next file. To get debug data, I modified the test IPA file to remove all of the framework directories, Everything else was unchanged. I then get the following debug output

So. Whats next? To fix this problem will require comparing by hand the parsing of the 4.3.10 macho binary (specifically the DJI GO 4 file inside the IPA) against this debug data… and finding out what changes are required to macho.py to parse this file.

Below is a table of the modules found within DJI GO 4 version 4.3.10 - which was created by hand analysis of the actual IPA file. This shows 79 load commands, yet Construct finds only 78. Which one is missing? Time to compare the table below with the debug output

Manual analysis of DJI GO 4 v4.3.10

CountHexCommandName
119LC_SEGMENT_64_PAGEZERO
219LC_SEGMENT_64_TEXT
319LC_SEGMENT_64_DATA
419LC_SEGMENT_64_LINKEDIT
580000022LC_DYLD_INFO_ONLY
602LC_SYMTAB
70BLC_DYSYMTAB
808LC_LOAD_DYLINKER
91BLC_UUID
1025LC_VERSION_MIN_IPHONEOS
112ALC_SOURCE_VERSION
1280000028LC_MAIN
132CLC_ENCRYPYION_INFO_64
140CLC_LOAD_DYLIBlibc++.1.dylib
150CLC_LOAD_DYLIBlibsqlite3.dylib
160CLC_LOAD_DYLIBlibxml2.2.dylib
170CLC_LOAD_DYLIBlibz.1.dylib
180CLC_LOAD_DYLIBAVFoundation
190CLC_LOAD_DYLIBAccelerate
200CLC_LOAD_DYLIBAddressBook
210CLC_LOAD_DYLIBAssetsLibrary
220CLC_LOAD_DYLIBCFNetwork
230CLC_LOAD_DYLIBCoreData
240CLC_LOAD_DYLIBCoreFoundation
2580000018LC_LOAD_WEAK_DYLIBCoreGraphics
260CLC_LOAD_DYLIBCoreImage
2780000018LC_LOAD_WEAK_DYLIBCoreLocation
280CLC_LOAD_DYLIBCoreMedia
290CLC_LOAD_DYLIBCoreMotion
300CLC_LOAD_DYLIBCoreTelephony
310CLC_LOAD_DYLIBCoreText
320CLC_LOAD_DYLIBCoreVideo
3380000018LC_LOAD_WEAK_DYLIBFoundation
340CLC_LOAD_DYLIBImageIO
350CLC_LOAD_DYLIBMessageUI
360CLC_LOAD_DYLIBMobileCoreServices
370CLC_LOAD_DYLIBOpenGLES
3880000018LC_LOAD_WEAK_DYLIBQuartzCore
390CLC_LOAD_DYLIBSafariServices
4080000018LC_LOAD_WEAK_DYLIBSecurity
410CLC_LOAD_DYLIBStoreKit
420CLC_LOAD_DYLIBSystemConfiguration
4380000018LC_LOAD_WEAK_DYLIBUIKit
4480000018LC_LOAD_WEAK_DYLIBAccounts
4580000018LC_LOAD_WEAK_DYLIBAudioToolbox
4680000018LC_LOAD_WEAK_DYLIBSocial
4780000018LC_LOAD_WEAK_DYLIBWatchConnect
480CLC_LOAD_DYLIBAWSS3
490CLC_LOAD_DYLIBAWSCore
500CLC_LOAD_DYLIBMasonry
510CLC_LOAD_DYLIBpop
520CLC_LOAD_DYLIBCoreBluetooth
530CLC_LOAD_DYLIBDJIFlySimulator
540CLC_LOAD_DYLIBlibresolv.9.dylib
5580000018LC_LOAD_WEAK_DYLIBNetworkExtension
560CLC_LOAD_DYLIBlibicucore.A.dylib
570CLC_LOAD_DYLIBGLKit
580CLC_LOAD_DYLIBSceneKit
590CLC_LOAD_DYLIBVideoToolbox
600CLC_LOAD_DYLIBJavaScriptCore
6180000018LC_LOAD_WEAK_DYLIBReplayKit
620CLC_LOAD_DYLIBPhotos
630CLC_LOAD_DYLIBDJPanoramaKit
640CLC_LOAD_DYLIBBokehFramework
650CLC_LOAD_DYLIBMediaPlayer
660CLC_LOAD_DYLIBDJHttpProtocol
670CLC_LOAD_DYLIBlibiconv.2.dylib
680CLC_LOAD_DYLIBlibbz2.1.0.dylib
690CLC_LOAD_DYLIBlibobjc.A.dylib
700CLC_LOAD_DYLIBlibSystem.B.dylib
710CLC_LOAD_DYLIBAVKit
720CLC_LOAD_DYLIBExternalAccessory
730CLC_LOAD_DYLIBGameController
740CLC_LOAD_DYLIBMapKit
750CLC_LOAD_DYLIBWebKit
761CLC_RPATH
7726LC_FUNCTION_STARTS
7829LC_DATA_IN_CODE
791DLC_CODE_SIGNATURE
howto/iosfrida.1547606063.txt.gz · Last modified: 2019/01/16 02:34 by czokie