macOS Function Hooking

Function Interposing

Create a dylib with an __interpose (__DATA___interpose) section (or a section flagged with S_INTERPOSING) containing tuples of function pointers that refer to the original and the replacement functions.

Then, inject the dylib with DYLD_INSERT_LIBRARIES (the interposing needs occur before the main app loads). Obviously the restrictions applied to the use of DYLD_INSERT_LIBRARIES applies here also.

Interpose printf

interpose.c
// gcc -dynamiclib interpose.c -o interpose.dylib
#include <stdio.h>
#include <stdarg.h>

int my_printf(const char *format, ...) {
    //va_list args;
    //va_start(args, format);
    //int ret = vprintf(format, args);
    //va_end(args);

    int ret = printf("Hello from interpose\n");
    return ret;
}

__attribute__((used)) static struct { const void *replacement; const void *replacee; } _interpose_printf
__attribute__ ((section ("__DATA,__interpose"))) = { (const void *)(unsigned long)&my_printf, (const void *)(unsigned long)&printf };

Also note that interposing occurs between the process and the loaded libraries, it doesn't work with the shared library cache.

Dynamic Interposing

Now it's also possible to interpose a function dynamically using the function dyld_dynamic_interpose. This allows to programatically interpose a function in run time instead of doing it only from the begining.

It's just needed to indicate the tuples of the function to replace and the replacement function.

Method Swizzling

In ObjectiveC this is how a method is called like: [myClassInstance nameOfTheMethodFirstParam:param1 secondParam:param2]

It's needed the object, the method and the params. And when a method is called a msg is sent using the function objc_msgSend: int i = ((int (*)(id, SEL, NSString *, NSString *))objc_msgSend)(someObject, @selector(method1p1:p2:), value1, value2);

The object is someObject, the method is @selector(method1p1:p2:) and the arguments are value1, value2.

Following the object structures, it's possible to reach an array of methods where the names and pointers to the method code are located.

Accessing the raw methods

It's possible to access the information of the methods such as name, number of params or address like in the following example:

Method Swizzling with method_exchangeImplementations

The function method_exchangeImplementations allows to change the address of the implementation of one function for the other.

Method Swizzling with method_setImplementation

The previous format is weird because you are changing the implementation of 2 methods one from the other. Using the function method_setImplementation you can change the implementation of a method for the other one.

Just remember to store the address of the implementation of the original one if you are going to to call it from the new implementation before overwriting it because later it will be much complicated to locate that address.

Hooking Attack Methodology

In this page different ways to hook functions were discussed. However, they involved running code inside the process to attack.

In order to do that the easiest technique to use is to inject a Dyld via environment variables or hijacking. However, I guess this could also be done via Dylib process injection.

However, both options are limited to unprotected binaries/processes. Check each technique to learn more about the limitations.

However, a function hooking attack is very specific, an attacker will do this to steal sensitive information from inside a process (if not you would just do a process injection attack). And this sensitive information might be located in user downloaded Apps such as MacPass.

So the attacker vector would be to either find a vulnerability or strip the signature of the application, inject the DYLD_INSERT_LIBRARIES env variable through the Info.plist of the application adding something like:

and then re-register the application:

Add in that library the hooking code to exfiltrate the information: Passwords, messages...

Library example

References

Last updated