TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Reverse engineering and removing Pokémon GO’s certificate pinning

145 pointsby mkane848almost 9 years ago

11 comments

chinpokomonalmost 9 years ago
Pretty much how I started cracking game copy protections in the late 80&#x27;s&#x2F;early 90&#x27;s. I already owned the games I was cracking, it just became more interesting to me how these protections were implemented and how I&#x27;d defeat them. Sometimes I think that was more fun than the game itself. I just didn&#x27;t want to have to look up pages in manuals or read maroon colored paper with dark blue ink.<p>I didn&#x27;t have the luxury of Ida Pro back then, but I did find a disassembler. Using that I&#x27;d read through the game code until I found the conditional jumps and then patched the original file with 0xE8 (JEZ?), 0xEB (JMP?), or 0xCD 0x90 (NOP?). At one time I used to be able to recognize just the Opcodes in hex, so I might have those wrong today.<p>When I started working at Egghead, I was granted time by my manger to crack games for our demo station, so we wouldn&#x27;t have to jump through hoops on the sales floor. For various professional reasons I&#x27;ve had the pleasure of bypassing my company&#x27;s own protections. Most recently I used Smali&#x2F;Baksmali to demonstrate how our company&#x27;s Android beta timebomb was pretty easy to circumvent.<p>Once a hacker, always a hacker. I have no doubt that this low level tinkering was why I got into computers in the first place and why they still hold my fascination.
paste0x78almost 9 years ago
Seems to be down, Google webcache version: <a href="http:&#x2F;&#x2F;webcache.googleusercontent.com&#x2F;search?q=cache:https:&#x2F;&#x2F;eaton-works.com&#x2F;2016&#x2F;07&#x2F;31&#x2F;reverse-engineering-and-removing-pokemon-gos-certificate-pinning&#x2F;" rel="nofollow">http:&#x2F;&#x2F;webcache.googleusercontent.com&#x2F;search?q=cache:https:&#x2F;...</a>
评论 #12205407 未加载
评论 #12206621 未加载
dozyalmost 9 years ago
Patching an APK like this would break parts of the app, specifically the parts that are arguably the most crucial to be followed by pinned API calls. For example, in-app purchases via Google Play that validate the app&#x27;s signing would all fail. Similarly restoring any previous in app purchases would also fail. Finally, you wouldn&#x27;t be able to install this APK without uninstalling the valid production APK first, again due to signature&#x2F;signing mismatch.
评论 #12205853 未加载
评论 #12206229 未加载
ethanhunt_almost 9 years ago
Very cool workaround in the article, but it feels like it&#x27;s just another hole that is going to be closed off. It&#x27;s impossible to balance because on the one hand we want these fortresses to protect us from prying eyes (see apple vs fbi), but manufacturers are also using these fortresses to keep out owners who just want to hack on their own things.<p>I&#x27;m glad Apple is working to keep backdoors out of iOS, but I still prefer Android because I can get into it anyway I want, and do things like the OP without having to resort to backdooring my own device.
评论 #12205961 未加载
评论 #12208837 未加载
评论 #12205804 未加载
dpflanalmost 9 years ago
Related: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=12204742" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=12204742</a>
alfonalmost 9 years ago
In iOS though, SSLKillSwitch v2 does the job well.
babyalmost 9 years ago
This seems like overly complicated. He could have made the public key extremely small by just placing 0x00s in it so that he could crack it. Easy patching.
评论 #12207575 未加载
dagwagingalmost 9 years ago
it could also be done pretty trivially using an xposed module, such as: <a href="http:&#x2F;&#x2F;repo.xposed.info&#x2F;module&#x2F;mobi.acpm.sslunpinning" rel="nofollow">http:&#x2F;&#x2F;repo.xposed.info&#x2F;module&#x2F;mobi.acpm.sslunpinning</a><p>i haven&#x27;t personally tried this route yet though
评论 #12207847 未加载
评论 #12207947 未加载
kamikizzlealmost 9 years ago
is this cert in the update the reason apps like pokevision stopped working?
评论 #12207592 未加载
评论 #12206089 未加载
thewarpaintalmost 9 years ago
What&#x27;s the added value of using imgur&#x27;s embed code rather than a good ol&#x27; &lt;img&gt;? Is this a trend? I would understand it for albums, but why would you do it for individual images? &lt;&#x2F;rant&gt;
评论 #12205715 未加载
评论 #12206597 未加载
评论 #12205941 未加载
bitmapbrotheralmost 9 years ago
As mentioned in the comments, this doesn&#x27;t work when you try to sign in via Google because it checks the signature of the app. The PTC signon doesn&#x27;t do this so it&#x27;s currently allowed, but I&#x27;m sure Niantic will patch it soon.