diff --git a/README.md b/README.md index 9059d1f..54ff38a 100644 --- a/README.md +++ b/README.md @@ -38,3 +38,8 @@ The work here was done by using [Charles Proxy](https://www.charlesproxy.com/) a The `tools/frida-ssl-pin.js` file is a Frida script that can attach to any macOS process and disable all SSL verification and SSL certificate pinning. This has allowed me to deeply examine the requests going to Apple's servers. This script is likely useful for many other use cases. If anyone else uses it, I'd love to hear about how it was used (I'm a super huge nerd and am quite interested in reverse engineering). +Note that SIP will need to be disabled in order to correctly use it. + +I also have a modified Frida Python script which targets `AssetCache` directly. +Since `AssetCache` is spawned by launchd, you can attach Frida to launchd, and wait +spawn `AssetCache` via the service. diff --git a/tools/frida-ssl-pin-targeted.py b/tools/frida-ssl-pin-targeted.py index 8346488..5aa5351 100644 --- a/tools/frida-ssl-pin-targeted.py +++ b/tools/frida-ssl-pin-targeted.py @@ -48,8 +48,6 @@ class Application(object): self._sessions.add(session) def _on_child_added(self, child): - if child.path != '/usr/libexec/AssetCache': - return print("⚡ child_added: {}".format(child)) self._instrument(child.pid)