Debugging An Undebuggable App
Debugging a highly protected iOS app involves dealing with advanced anti-debugging techniques, such as PT_DENY_ATTACH
, which prevents debuggers from attaching, and random crashes that reboot jailbroken devices. The article outlines methods to bypass these protections, including setting breakpoints to intercept calls and using assembly code to directly invoke low-level functions. Additionally, it discusses challenges when injecting code, often due to app group configurations that get disrupted during code signing. Ultimately, the author successfully circumvents anti-debugging measures, attaches a debugger, and injects code, showcasing various strategies for exploring and modifying iOS apps under restrictive conditions.