Reverse Engineering Asked on March 3, 2021
I want to find out the compression method used by an iOS app used for music notation to store its files. The files of its OSX counterpart are zipped files. You cannot create files in the iOS app, but you can upload them using the desktop application to the application’s cloud server and from there download them to your iOS device for offline viewing. My findings so far:
58 54 5A 00
, which isn’t listed in any file signatures table I have searched infile
and binwalk
, do not identify the formatThe following files are actually all the same file downloaded from the server 4 times.
I have produced three files, the first contains “A”, the second “AA”, the third “AAA”. The first set of files comes from iOS, the second from OSX.
.
I think these files are encrypted rather than compressed.
I've run file
at all offsets from start and found format consistent across the files at the same offset.
The files have only a constant value in the first 4 bytes. The rest is high entropy.
The same content saved at different times produces a different binary file each time.
File sizes are similar in previous instances when content was different in size, indicating padding of some sort.
I think this is may how IOS handles file security for some apps
Answered by pythonpython on March 3, 2021
Get help from others!
Recent Answers
Recent Questions
© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP