In today's video I will demonstrate patching Myriam iOS Application's second challenge, that being a log in screen for which we don not know the password nor the username. This will involve static binary analysis and therefore NO JAILBREAK is required to complete this challenge. Myriam Application is a CFT-style app that I have created for those interested in learning iOS Security, and provides the newbies in this field with an application on which they can learn various hacking techniques while staying in the legal bounds.
For this lesson we're using Hopper Disassembler, a tool available for both Linux and macOS. Of course, if you are on Windows, you can use IDA Pro with the same results. Patching techniques are similar on both Windows and macOS, and therefore you shouldn't be encountering any problems.
Myriam application contains even more challenges that you can go for by using the same patching (NOPing) method. In one of my previous videos I've demonstrated Jailbreak Detection circumvention, so if you are interested into completing that challenge please refer to the tutorial linked down bellow.
Myriam App: //github.com/GeoSn0w/Myriam
ARM Assembly Instructions: //infocenter.arm.com
Understanding TBZ Instruction: //goo.gl/rw71gN
Patching Jailbreak Detection (in DVIA): //youtu.be/DVoCJJhN9HI
Reversing with Radare2 any binary: //youtu.be/hy81mnLMvnE
iOS Reverse Engineering Playlist: //goo.gl/x3krSO