Unity 代码混淆

===oc-代码混淆===
====代码混淆过程====
由于ios过审没有通过,苹果回赠了一个2.1的大礼包。首先想到的可能的解决方案是代码混淆,关于object-c的代码混淆的流程如下

1,下载一个oc 的代码混淆工具:https://github.com/kaich/codeobscure  这是github地址,

2打开控制台  输入命令  sudo gem install codeobscure  进行安装codeobscure 工具

3安装完成之后 在控制台  输入 codeobscure -o  XcodeprojPath   进行混淆操作,这里的XcodeprojPath 是需要混淆的xcode工程路径混淆完成后如图所示的提示 进行操作

混淆完成后 

4, 在控制台 输入  codeobscure -i XcodeprojPath  命令执行后 会生成  ignoresymbols的文件,这个文件是用来过滤不需要的混淆的代码,此文件需要手动输入不需要混淆的代码关键字,关键字之间用“,”隔开,ignoresymbols文件内容如下

在保存 ignoresymbols的文件后  重启codeobscure -o  XcodeprojPath 命令即可


====ipa反编译过程====
如何反编译ipa包,查看所有的头文件和方法名(包括私有方法名)
1,下载安装class-dump-3.5.dmg 链接:http://stevenygard.com/projects/class-dump/
2,下载完成以后双击.dmg的文件,将里面的class-dump拷贝到/usr/local/bin路径下(快捷键 shift + command + G  弹出前往文件夹)
3,打开终端,在控制台输入class-dump
4,找到需要反编译的ipa文件,右键归为实用文档,会出现一个Payload文件夹
5,cd  (将 XXX.app 所在文件夹Payload拖过来)  XXX.app Path
 6,class-dump -H  XXX.app 即可此时,Payload文件夹中会出现XXX.ipa所有的.h文件(其中所有的方法名,包括.m中的私有方法名,都会在这些反编译的.h文件中展示出来)
淘宝花钱买的最新版!需要的拿去! This asset obfuscates your code to make it harder for bad guys to reverse engineer your projects. Specifically designed for Unity, it seamlessly links in with its build process. The top priority of this package is to work straight out of the box with no extra steps required. While other obfuscators can stop a game from working, Beebyte's obfuscator looks for specific Unity related code that must be protected. The contents of your source files are unchanged, the obfuscation targets the compiled assembly. Features: - Supports IL2CPP - Supports Assembly Definition Files (Unity 2017.3+) - Removes Namespaces without any conflicts - Recognises Unity related code that must not be changed - Renames Classes (including MonoBehaviours) - Renames Methods - Renames Parameters - Renames Fields - Renames Properties - Renames Events - String literal obfuscation - Adds fake methods - Easy and extensive customisation using the Unity inspector window - Consistent name translations are possible across multiple builds and developers - Semantically secure cryptographic naming convention for renamed members The asset works for both Unity Free and Unity Pro version 4.2.0 onwards (including Unity 5 & 2017 & 2018). Build targets include Standalone, Android, iOS, WebGL, UWP. Other platforms are not guaranteed or supported but may become supported at a future date. IL2CPP builds are much harder to reverse engineer but strings and member information (class, method names etc) are visible in the global-metadata.dat file. Obfuscation will apply to this file adding further security. Why not complement your security with the Anti-Cheat Toolkit - a great third party asset. For more information about the Obfuscator, please see the FAQ
This asset obfuscates your code to make it harder for bad guys to reverse engineer your projects. Specifically designed for Unity, it seamlessly links in with its build process. The top priority of this package is to work straight out of the box with no extra steps required. While other obfuscators can stop a game from working, Beebyte's obfuscator looks for specific Unity related code that must be protected. The contents of your source files are unchanged, the obfuscation targets the compiled assembly. Features: - Supports IL2CPP - Supports Assembly Definition Files (Unity 2017.3+) - Removes Namespaces without any conflicts - Recognises Unity related code that must not be changed - Renames Classes (including MonoBehaviours) - Renames Methods - Renames Parameters - Renames Fields - Renames Properties - Renames Events - String literal obfuscation - Adds fake methods - Easy and extensive customisation using the Unity inspector window - Consistent name translations are possible across multiple builds and developers - Semantically secure cryptographic naming convention for renamed members The asset works for both Unity Free and Unity Pro version 4.2.0 onwards (including Unity 5 & 2017 & 2018). Build targets include Standalone, Android, iOS, WebGL, UWP. Other platforms are not guaranteed or supported but may become supported at a future date. IL2CPP builds are much harder to reverse engineer but strings and member information (class, method names etc) are visible in the global-metadata.dat file. Obfuscation will apply to this file adding further security. Why not complement your security with the Anti-Cheat Toolkit - a great third party asset. For more information about the Obfuscator, please see the FAQ
评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值