macOS Function Hooking
Learn & practice AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking:
HackTricks Training GCP Red Team Expert (GRTE)
Function Interposing
Create a dylib with an __interpose (__DATA___interpose) section (or a section flagged with S_INTERPOSING) containing tuples of function pointers that refer to the original and the replacement functions.
Then, inject the dylib with DYLD_INSERT_LIBRARIES (the interposing needs occur before the main app loads). Obviously the restrictions applied to the use of DYLD_INSERT_LIBRARIES applies here also.
Interpose printf
// gcc -dynamiclib interpose.c -o interpose.dylib
#include <stdio.h>
#include <stdarg.h>
int my_printf(const char *format, ...) {
//va_list args;
//va_start(args, format);
//int ret = vprintf(format, args);
//va_end(args);
int ret = printf("Hello from interpose\n");
return ret;
}
__attribute__((used)) static struct { const void *replacement; const void *replacee; } _interpose_printf
__attribute__ ((section ("__DATA,__interpose"))) = { (const void *)(unsigned long)&my_printf, (const void *)(unsigned long)&printf };//gcc hello.c -o hello
#include <stdio.h>
int main() {
printf("Hello World!\n");
return 0;
}The DYLD_PRINT_INTERPOSTING env variable can be used to debug interposing and will print the interpose process.
Also note that interposing occurs between the process and the loaded libraries, it doesn't work with the shared library cache.
Dynamic Interposing
Now it's also possible to interpose a function dynamically using the function dyld_dynamic_interpose. This allows to programatically interpose a function in run time instead of doing it only from the begining.
It's just needed to indicate the tuples of the function to replace and the replacement function.
Method Swizzling
In ObjectiveC this is how a method is called like: [myClassInstance nameOfTheMethodFirstParam:param1 secondParam:param2]
It's needed the object, the method and the params. And when a method is called a msg is sent using the function objc_msgSend: int i = ((int (*)(id, SEL, NSString *, NSString *))objc_msgSend)(someObject, @selector(method1p1:p2:), value1, value2);
The object is someObject, the method is @selector(method1p1:p2:) and the arguments are value1, value2.
Following the object structures, it's possible to reach an array of methods where the names and pointers to the method code are located.
Note that because methods and classes are accessed based on their names, this information is store in the binary, so it's possible to retrieve it with otool -ov </path/bin> or class-dump </path/bin>
Accessing the raw methods
It's possible to access the information of the methods such as name, number of params or address like in the following example:
Method Swizzling with method_exchangeImplementations
The function method_exchangeImplementations allows to change the address of the implementation of one function for the other.
So when a function is called what is executed is the other one.
In this case if the implementation code of the legit method verifies the method name it could detect this swizzling and prevent it from running.
The following technique doesn't have this restriction.
Method Swizzling with method_setImplementation
The previous format is weird because you are changing the implementation of 2 methods one from the other. Using the function method_setImplementation you can change the implementation of a method for the other one.
Just remember to store the address of the implementation of the original one if you are going to to call it from the new implementation before overwriting it because later it will be much complicated to locate that address.
Hooking Attack Methodology
In this page different ways to hook functions were discussed. However, they involved running code inside the process to attack.
In order to do that the easiest technique to use is to inject a Dyld via environment variables or hijacking. However, I guess this could also be done via Dylib process injection.
However, both options are limited to unprotected binaries/processes. Check each technique to learn more about the limitations.
However, a function hooking attack is very specific, an attacker will do this to steal sensitive information from inside a process (if not you would just do a process injection attack). And this sensitive information might be located in user downloaded Apps such as MacPass.
So the attacker vector would be to either find a vulnerability or strip the signature of the application, inject the DYLD_INSERT_LIBRARIES env variable through the Info.plist of the application adding something like:
and then re-register the application:
Add in that library the hooking code to exfiltrate the information: Passwords, messages...
Note that in newer versions of macOS if you strip the signature of the application binary and it was previously executed, macOS won't be executing the application anymore.
Library example
References
Learn & practice AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking:
HackTricks Training GCP Red Team Expert (GRTE)
Last updated