Open matusfaro opened 8 months ago
@matusfaro Thanks for the heads up.
The tool actually has 2 methods for trying to get the offsets for IDSProtoKeyTransparencyTrustedServiceReadFrom
, the 'hex offsets' (which unfortunately often doesn't get a unique match), and the 'symbol offsets' (which is pretty much always guaranteed to be correct due to the nature of how it works).
I would suspect if you use the offset value from the 'symbol offsets' it should work for you (arm64e: 0x0c0b84
), but given that seems to match the first offset listed in the 'hex offsets' section, and you said that didn't work, then I'm not too sure what the issue is without digging deeper into it unfortunately.
By the way, thanks for making this utility!!
No worries :) It was a fun little refresher on reverse engineering, and exploration into automating aspects of it.
⇒ sha256sum samples/macos-14.4-final-sonoma-identityservicesd
b82c5c6c9010a42cb64397e3760dd31144cbd471126111de9bb27fa3d2d2639a samples/macos-14.4-final-sonoma-identityservicesd
Just wanted to let you know I tried this on 14.4 Final but
arm64e
IDSProtoKeyTransparencyTrustedServiceReadFrom
appears to have found multiple addresses, see below. I tried using the first one, but messages were not coming through.By the way, thanks for making this utility!!