ptoomey3 / Keychain-Dumper

A tool to check which keychain items are available to an attacker once an iOS device has been jailbroken
BSD 3-Clause "New" or "Revised" License
1.35k stars 299 forks source link

Bad CPU type in executable #26

Closed jjacquet closed 7 years ago

jjacquet commented 8 years ago

MacBook-Air.local 15.6.0 Darwin Kernel Version 15.6.0: root:xnu-3248.60.10~1/RELEASE_X86_64 x86_64

i386

ptoomey3 commented 8 years ago

Are you trying to run this on your computer/emulator? This only works on ARM based iOS devices.

jjacquet commented 8 years ago

I am trying to remove a keychain on a device from the terminal for automation purposes. Maybe I am not using this tool correctly? I have removed the password from the handset and it's a Jailed device. I can confirm I can interact with the device because I am using ideviceinstaller to remove and add APPID's. To give further context to this issue I have ran make and then make codesign so the keychain_dumper is installed

The error I am getting after running ./keychain_dumper is ./keychain_dumper: Bad CPU type in executable What should an inline command in there terminal look like?

Annnnd I guess I don't know how to read. This is for jailbroken devices only. However, if you know of another way to accomplish what I am asking please share.

Thanks

ptoomey3 commented 8 years ago

Are you trying to run this from the Mac terminal or from the jailbroken iPhone's terminal? This app can only be run from a jailbroken iPhone that it has been copied to.

Daemonceltics commented 7 years ago

The keychain_dumper only run in arm arch ,your Mac CPU is x86 arch ,so.

ptoomey3 commented 7 years ago

Assuming the original submitter was running in the emulator (which has never worked).

iddoeldor commented 5 years ago

happens to me also

Darwin iPhone 17.3.0 Darwin Kernel Version 17.3.0: Mon Nov 6 21:19:15 PST 2017; root:xnu-4570.32.1~1/RELEASE_ARM64_S8000 iPhone8,2 arm64 N66AP Darwin