Skip to content

Commit

Permalink
v0.0.2 - Public Release
Browse files Browse the repository at this point in the history
  • Loading branch information
Marco Lancini committed Aug 11, 2016
1 parent b89c1e3 commit 11b40c5
Show file tree
Hide file tree
Showing 75 changed files with 5,935 additions and 0 deletions.
7 changes: 7 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
# Change Log
All notable changes to this project will be documented in this file.
This project adheres to [Semantic Versioning](http://semver.org/).

## [0.0.2] - 2016-08-11
#### Added
- First Public Release
36 changes: 36 additions & 0 deletions LICENSE
Original file line number Diff line number Diff line change
@@ -0,0 +1,36 @@
Copyright (c) 2016 MWR InfoSecurity
All rights reserved.

Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are met:

* Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
* Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
* Neither the name of MWR InfoSecurity nor the names of its contributors
may be used to endorse or promote products derived from this software
without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL MWR INFOSECURITY BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.


This licence does not apply to the following components:

- ADVTrustStore, released under a GPLv2 License and available to download from: https://github.com/ADVTOOLS/ADVTrustStore
- BinaryCookieReader, available to download from: http://securitylearn.net/wp-content/uploads/tools/iOS/BinaryCookieReader.py
- FileDP, available to download from: http://www.securitylearn.net/wp-content/uploads/tools/iOS/FileDP.zip
- FSMon, available to download from: https://github.com/nowsecure/fsmon
- KeychainEditor, available to download from: https://github.com/NitinJami/keychaineditor
- PBWatcher, released under a MIT License and available to download from: https://github.com/dmayer/pbwatcher
- USBMUXD, released under a GPLv2 License and available to download from: https://github.com/libimobiledevice/usbmuxd
7 changes: 7 additions & 0 deletions needle/VERSION
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
__version__ = '0.0.2'

# ex. x.y.z
# x - Incremented for changes requiring migration. (major revision)
# y - Incremented for the addition of new features. (minor revision)
# z - Incremented for minor code changes and bug fixes. (hotfix)
# Subordinate items reset to 0 when superior items increment.
Empty file added needle/core/__init__.py
Empty file.
Empty file added needle/core/device/__init__.py
Empty file.
173 changes: 173 additions & 0 deletions needle/core/device/app.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,173 @@
import os

from ..utils.constants import Constants
from ..utils.utils import Utils


class App(object):
def __init__(self, device):
self._device = device
self._app = None

# ==================================================================================================================
# METADATA
# ==================================================================================================================
def get_metadata(self, app_name):
"""Retrieve metadata of the target app."""
self._app = app_name
if self._device._applist is None:
self._device._list_apps()
return self._retrieve_metadata()

def _retrieve_metadata(self):
"""Parse MobileInstallation.plist and the app's local Info.plist, and extract metadata."""
# Content of the MobileInstallation plist
plist_global = self._device._applist[self._app]
uuid = plist_global['BundleContainer'].rsplit('/', 1)[-1]
name = plist_global['Path'].rsplit('/', 1)[-1]
bundle_id = plist_global['CFBundleIdentifier']
bundle_directory = plist_global['BundleContainer']
data_directory = plist_global['Container']
binary_directory = plist_global['Path']
try:
entitlements = plist_global['Entitlements']
except:
entitlements = None

# Content of the app's local Info.plist
path_local = Utils.escape_path('%s/Info.plist' % plist_global['Path'])
plist_local = self._device.remote_op.parse_plist(path_local)
platform_version = plist_local['DTPlatformVersion']
sdk_version = plist_local['DTSDKName']
minimum_os = plist_local['MinimumOSVersion']
app_version_long = plist_local['CFBundleVersion']
app_version_short = plist_local['CFBundleShortVersionString']
app_version = '{} ({})'.format(app_version_long, app_version_short)
try:
url_handlers = plist_local['CFBundleURLTypes'][0]['CFBundleURLSchemes']
except:
url_handlers = None

# Compose binary path
binary_folder = binary_directory
binary_name = os.path.splitext(binary_folder.rsplit('/', 1)[-1])[0]
binary_path = Utils.escape_path(os.path.join(binary_folder, binary_name))

# Detect architectures
architectures = self._detect_architectures(binary_path)

# Pack into a dict
metadata = {
'uuid': uuid,
'name': name,
'app_version': app_version,
'bundle_id': bundle_id,
'bundle_directory': bundle_directory,
'data_directory': data_directory,
'binary_directory': binary_directory,
'binary_path': binary_path,
'binary_name': binary_name,
'entitlements': entitlements,
'platform_version': platform_version,
'sdk_version': sdk_version,
'minimum_os': minimum_os,
'url_handlers': url_handlers,
'architectures': architectures,
}
return metadata

def _detect_architectures(self, binary):
"""Use lipo to detect supported architectures."""
# Run lipo
cmd = '{lipo} -info {binary}'.format(lipo=Constants.DEVICE_TOOLS['LIPO'], binary=binary)
out = self._device.remote_op.command_blocking(cmd, internal=True)
# Parse output
msg = out[0].strip()
res = msg.rsplit(': ')[-1].split(' ')
return res

# ==================================================================================================================
# MANIPULATE APP
# ==================================================================================================================
def open(self, bundle_id):
"""Launch the app with the specified Bundle ID."""
cmd = '{open} {app}'.format(open=self._device.DEVICE_TOOLS['OPEN'], app=bundle_id)
self._device.remote_op.command_blocking(cmd, internal=True)

def search_pid(self, appname):
"""Retrieve the PID of the app's process."""
self._device.printer.verbose('Retrieving the PID...')
cmd = "ps ax | grep -i '{appname}'".format(appname=appname)
out = self._device.remote_op.command_blocking(cmd)
try:
process_list = filter(lambda x: '/var/mobile' in x, out)
process = process_list[0].strip()
pid = process.split(' ')[0]
self._device.printer.verbose('PID found: %s' % pid)
return pid
except Exception as e:
raise Exception("PID not found")

def decrypt(self, app_metadata):
"""Decrypt the binary and unzip the IPA. Returns the full path of the decrypted binary"""
# Run Clutch
self._device.printer.info("Decrypting the binary...")
cmd = '{bin} -d {bundle} 2>&1'.format(bin=self._device.DEVICE_TOOLS['CLUTCH'], bundle=app_metadata['bundle_id'])
out = self._device.remote_op.command_blocking(cmd)

# Check if the app has been found
fname_decrypted = self._device.remote_op.build_temp_path_for_file('decrypted.ipa')
try:
# Parse the output filename
res = filter(lambda x: x.startswith('DONE'), out)
out_temp = res[0].split(':')[1].strip() # 'DONE: /private/var/mobile/Documents/Dumped/uid.ipa'
# Move IPA to TEMP folder
self._device.remote_op.file_copy(out_temp, fname_decrypted)
# Remove temp IPA
self._device.remote_op.file_delete(out_temp)
except Exception:
self._device.printer.warning('The app might be already decrypted. Trying to retrieve the IPA...')
# Retrieving the IPA
cmd = '{bin} -b {bundle} -o {out}'.format(bin=self._device.DEVICE_TOOLS['IPAINSTALLER'],
bundle=app_metadata['bundle_id'],
out=fname_decrypted)
out = self._device.remote_op.command_blocking(cmd)
self._device.printer.verbose("Decrypted IPA stored at: %s" % fname_decrypted)

# Leftovers Cleanup
payload_folder = '%s%s' % (self._device.TEMP_FOLDER, 'Payload')
itunes = '%s%s' % (self._device.TEMP_FOLDER, 'iTunesArtwork')
if self._device.remote_op.dir_exist(payload_folder): self._device.remote_op.dir_delete(payload_folder)
if self._device.remote_op.file_exist(itunes): self._device.remote_op.file_delete(itunes)

# Unzip
self._device.printer.info("Unpacking the decrypted IPA...")
cmd = '{bin} {ipa} -d {folder}'.format(bin=self._device.DEVICE_TOOLS['UNZIP'],
ipa=fname_decrypted,
folder=self._device.TEMP_FOLDER)
out = self._device.remote_op.command_blocking(cmd)

# Get full path to the binary
cmd = '{find} {folder} -type f -name "{appname}"'.format(find=self._device.DEVICE_TOOLS['FIND'],
folder=self._device.TEMP_FOLDER,
appname=app_metadata['binary_name'])
out = self._device.remote_op.command_blocking(cmd)
fname_binary = out[0].strip()
self._device.printer.debug("Full path of the application binary: %s" % fname_binary)
return fname_binary

# ==================================================================================================================
# MANIPULATE FILES
# ==================================================================================================================
def get_dataprotection(self, filelist):
"""Get the Data Protection of the files contained in 'filelist'."""
computed = []
for el in filelist:
fname = Utils.escape_path(el.strip())
dp = '{bin} -f {fname}'.format(bin=self._device.DEVICE_TOOLS['FILEDP'], fname=fname)
dp += ' 2>&1' # needed because by default FileDP prints to STDERR
res = self._device.remote_op.command_blocking(dp, internal=True)
# Parse class
cl = res[0].rsplit(None, 1)[-1]
computed.append((fname, cl))
return computed
Loading

0 comments on commit 11b40c5

Please sign in to comment.