Skip to content

Commit

Permalink
Update Document/0x06c-Reverse-Engineering-and-Tampering.md
Browse files Browse the repository at this point in the history
Co-authored-by: Sven <[email protected]>
  • Loading branch information
cpholguera and sushi2k authored Oct 14, 2021
1 parent 404e085 commit 959a46d
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion Document/0x06c-Reverse-Engineering-and-Tampering.md
Original file line number Diff line number Diff line change
Expand Up @@ -760,7 +760,7 @@ Writing executable to Payload/UnCrackable Level 1.app/UnCrackable Level 1...
By default, an app available on the Apple App Store is not debuggable. In order to debug an iOS application, it must have the `get-task-allow` entitlement enabled. This entitlement allows other processes (like a debugger) to attach to the app. Xcode is not adding the `get-task-allow` entitlement in a distribution provisioning profile; it is only whitelisted and added in a development provisioning profile.
Thus, to debug an iOS application obtained from the App Store, it needs to be re-signed with a development provisioning profile with `get-task-allow` entitlement. How to re-sign an application is discussed in the next section.
Thus, to debug an iOS application obtained from the App Store, it needs to be re-signed with a development provisioning profile with the `get-task-allow` entitlement. How to re-sign an application is discussed in the next section.
#### Repackaging and Re-Signing
Expand Down

0 comments on commit 959a46d

Please sign in to comment.