Reverse Engineering?

I have *.ipa file which is the iphone application.

  • Is that possible to use reverse engineering in that ipa and extract code..?

  • Well, its not really a hacking but it can surely help you identify some parts of the UI... Do the following:

    1- Create a new project on the Xcode (doesn't really mater what you choose)

    2- Connect your device to your computer

    3- Profile your project on your device.

    4- On the Profile, pick Core Animation

    5- On the options choose Color Blended Layers It will look like this: 在这里输入图像描述

    6- Unplug your device while the profile is running. Your phone will look like this now:

    在这里输入图像描述

    7- Go to the app you want to check.

    Although you can't see any code, this can help you out to identify key parts of the application. To get back to normal, you can restart your device, or just go to the profile and run it Again, and uncheck the Color Blended Layers option.


    As stated here: How to use Xcode to open decrypted IPA contents ipa is only a "zipped" version of the executable.

    So if you are able to extract, its mostly an issue of dissasemble the executable (assembly code/dissasemblers).

    But somehow this smells like fish.


    Not possible the way you intend it! .ipa files contain the resources(images,sound files, database files,etc) and compiled classes only. The code is contained in these compiled classes as binaries and thus, you can at the most see how the app was structured into classes and how the resources were used but can not get the actual code as written by the developers. You can refer this SO question to get a brief idea as to how that can be done.

    链接地址: http://www.djcxy.com/p/11142.html

    上一篇: 根据以前的排序进行排序

    下一篇: 逆向工程?