[Code Obfuscation] react-native code obfuscation

 Use react native to develop apps and implement code obfuscation.

Whether it is encryption or a runtime virtual machine, the original code can be reversely generated through execution debugging. Although it can resist low-end hacker attacks, it is useless against high-end hackers. Code obfuscation makes the code difficult to understand and decompile by modifying the source code structure and variable names. This allows a hacker to obtain the code of the application and make it difficult to understand it. Whether he is a high-end or low-end hacker, there is currently no effective way to restore it to the original code, and it is recognized as one of the most effective methods. The following uses ipaguard as an example to introduce how to comprehensively modify and obfuscate the classes, methods, method parameters, variables, etc. in the ipa file, so that their names become meaningless garbled characters, which greatly increases the difficulty of application cracking. The ipaguard code obfuscation tool supports apps developed on various development platforms such as OC, Swift, Flutter, H5, HBuilder, Unity3D, Cocos2dx, etc.

Code obfuscation steps

1. Select the ipa file to be obfuscated and protected

2. Select the class name to obfuscate

Select the OC class name or Swift class name in the code module on the left, select the IPA binary file to be obfuscated, and then check the class name in the executable file code. If there are too many classes, you can use the search and view function. ipaguard provides level selection, name search, and selected and unselected filtering to help configure obfuscated objects.

3. Select the function to be obfuscated and protected by

Select the oc method or swift method under the code module on the left, click Select File on the right to select an executable binary file, and check the methods and functions that need obfuscation protection. ipaguard provides risk level filtering, name search filtering, and assists in configuring obfuscation targets based on class name filtering conditions.

4. Configure the signing certificate

Click Signature Configuration on the left to set the ios signature certificate, description file and other information. The development certificate is used during the testing phase, so that it can be easily installed on the test machine to check whether the tested app runs normally; the final configuration test is ok, and it will be changed to a publishing certificate when publishing. After the obfuscation configuration is completed, it can be submitted for release. 

5. Obfuscation and test running

Click the Start Processing button, ipaguard will obfuscate the content selected in the ipa, and install the obfuscated ipa on the mobile phone. If it runs ok, click to save the configuration. You can directly load the configuration next time. There is no need to configure obfuscation every time. content. 

ipaguard is very user-friendly when it comes to obfuscation. The obfuscation target and intensity are controllable, which greatly simplifies the process of configuring obfuscation content, and the visual operation is also very convenient.

ipaguardThen package it according to the official recommendations of react native .

Guess you like

Origin blog.csdn.net/qq_24694139/article/details/135226035