From 87ec1c479539640b0d068dbdb04e7e752d4f445b Mon Sep 17 00:00:00 2001 From: AgentHV <39234676+AgentHV@users.noreply.github.com> Date: Wed, 23 Feb 2022 16:24:58 +0100 Subject: [PATCH] Fixed SSH forwarding example for checkra1n Updated README.MD to add example for checkra1n users as current example crashes the script for checkra1n users (because checkra1n deploys localhost SSH on port 44 instead of port 22 for some reason). --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 1d6b526..270f389 100644 --- a/README.md +++ b/README.md @@ -6,7 +6,7 @@ Pull a decrypted IPA from a jailbroken device 1. Install [frida](http://www.frida.re/) on device 2. `sudo pip install -r requirements.txt --upgrade` - 3. Run usbmuxd/iproxy SSH forwarding over USB (Default 2222 -> 22). e.g. `iproxy 2222 22` + 3. Run usbmuxd/iproxy SSH forwarding over USB (Default 2222 -> 22). e.g. `iproxy 2222 22` (if using checkra1n forward port 44 instead as checkra1n uses port 44 for localhost SSH. e.g. `iproxy 2222 44`) 4. Run ./dump.py `Display name` or `Bundle identifier` For SSH/SCP make sure you have your public key added to the target device's ~/.ssh/authorized_keys file.