{"id":18,"date":"2024-06-23T19:05:04","date_gmt":"2024-06-23T22:05:04","guid":{"rendered":"https:\/\/windowsofender.zip\/?p=18"},"modified":"2024-07-08T16:08:40","modified_gmt":"2024-07-08T19:08:40","slug":"iossecuritysuite-bypass","status":"publish","type":"post","link":"https:\/\/windowsofender.zip\/?p=18","title":{"rendered":"IOSSecuritySuite &#8211; Bypass"},"content":{"rendered":"\n<p><br>In this blog post, I will show you how to use a script I created to bypass some of IOSSecuritySuite&#8217;s features.<br>IOSSecuritySuite is a common library used perform anti-tampering and increase the security of an IOS application.<\/p>\n\n\n\n<p> I&#8217;ve created a simple APP to test the IOSSecuritySuite functionalities. You can download the IPA file <a href=\"https:\/\/github.com\/dant0x65\/IOSSecuritySuiteBypass\">here<\/a>.<br>To install it just unzip the IPA file and move the .app folder to <strong>\/Applications<\/strong> on devices with a Rootfull jailbreak or <strong>\/var\/jb\/Applcations<\/strong> on devices with Rootless jailbreak. After it, just run <strong>uicache -ar<\/strong> command and the app will show on homescreen. This is a print of the app running on my device. Basically it shows some features that are triggered.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"473\" height=\"1024\" src=\"http:\/\/windowsofender.zip\/wp-content\/uploads\/2024\/06\/IMG_9408-473x1024.png\" alt=\"\" class=\"wp-image-21\" srcset=\"https:\/\/windowsofender.zip\/wp-content\/uploads\/2024\/06\/IMG_9408-473x1024.png 473w, https:\/\/windowsofender.zip\/wp-content\/uploads\/2024\/06\/IMG_9408-139x300.png 139w, https:\/\/windowsofender.zip\/wp-content\/uploads\/2024\/06\/IMG_9408-768x1663.png 768w, https:\/\/windowsofender.zip\/wp-content\/uploads\/2024\/06\/IMG_9408-709x1536.png 709w, https:\/\/windowsofender.zip\/wp-content\/uploads\/2024\/06\/IMG_9408-946x2048.png 946w, https:\/\/windowsofender.zip\/wp-content\/uploads\/2024\/06\/IMG_9408.png 1125w\" sizes=\"(max-width: 473px) 100vw, 473px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>The script<\/strong><\/p>\n\n\n\n<p>This is the script that I created. It will be progressively enhanced as time goes by. Download the most recent version from <a href=\"https:\/\/github.com\/dant0x65\/IOSSecuritySuiteBypass\">github<\/a>.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>function hook_by_export(module_name, func_name){\n\n    var target_ptr = Module.findExportByName(module_name, func_name); \n\n    if(target_ptr != null){\n          Interceptor.attach(target_ptr, {\n            onEnter:  function(args){\n\t\t\t\tconsole.log(\"&#91;+] Bypassing: \" + func_name)\n            },\n              onLeave: function(retval) {\n\n                  retval.replace(0x0); \/\/ Force return value to be 0x0\n              }\n          });\n      }else{\n        console.log(\"&#91;-] Not found: \" + func_name);\n      }\n}\n\n\n\nsetTimeout(function(){\n\ttry{\n\n\t\tvar moduleName = \"Test_IOSSECURITY\"; \/\/Change it\n\t\tvar amIJailBroken = \"$s16IOSSecuritySuiteAAC13amIJailbrokenSbyFZ\";\n\t\tvar amIReverseengineered = \"$s16IOSSecuritySuiteAAC20amIReverseEngineeredSbyFZ\";\n\t\tvar amIProxied = \"$s16IOSSecuritySuiteAAC10amIProxiedSbyFZ\"\n\t\tvar amIDebugged = \"$s16IOSSecuritySuiteAAC11amIDebuggedSbyFZ\"\n\t\tvar isRunningEmulator = \"$s16IOSSecuritySuiteAAC16amIRunInEmulatorSbyFZ\"\n\t\tvar amITampered = \"$s16IOSSecuritySuiteAAC11amITamperedySb6result_SayAA18FileIntegrityCheckOG9hitCheckstAGFZ\";\n\t\tvar denyDebbuger = \"$s16IOSSecuritySuiteAAC12denyDebuggeryyFZ\";\n\t\thook_by_export(moduleName, amIJailBroken);\n\t\thook_by_export(moduleName, amIReverseengineered);\n\t\thook_by_export(moduleName, amIProxied);\n\t\thook_by_export(moduleName, amIDebugged);\n\t\thook_by_export(moduleName, isRunningEmulator);\n\t\thook_by_export(moduleName, amITampered);\n\t\thook_by_export(moduleName, denyDebbuger);\n\n\t}catch(e){\n\t\tconsole.log(e.emssage)\n\t}\n    \n}, 1);<\/code><\/pre>\n\n\n\n<p><\/p>\n\n\n\n<p>To use this script, you need to first enumerate the module from which IOSSecuritySuite functions are called. To do it, you can follow these steps:<br><br> 1 &#8211; Start your app using frida, like <strong>frida -U -f &lt;your_app<\/strong>&gt;<br> 2 &#8211; Run the following code: <strong>Process.enumerateModulesSync();<\/strong><br><\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"441\" src=\"http:\/\/windowsofender.zip\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-22-at-15.33.56-1024x441.png\" alt=\"\" class=\"wp-image-22\" srcset=\"https:\/\/windowsofender.zip\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-22-at-15.33.56-1024x441.png 1024w, https:\/\/windowsofender.zip\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-22-at-15.33.56-300x129.png 300w, https:\/\/windowsofender.zip\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-22-at-15.33.56-768x330.png 768w, https:\/\/windowsofender.zip\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-22-at-15.33.56-1536x661.png 1536w, https:\/\/windowsofender.zip\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-22-at-15.33.56-2048x881.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>This command shows all modules currently loaded inside the application. Now you need to infer which one is the correct module. In most of cases will be something like &#8220;IOSSecuritySuite&#8221; or &#8220;SecuritySuite&#8221;. In this case is &#8220;Test_IOSSecurity&#8221;.<br><strong>You need to change the variable <em>*moduleName*<\/em> inside the script by the correct module name.<\/strong><\/p>\n\n\n\n<p>Now you can just run the script as following<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>frida -U -f &lt;your application&gt; -l iossecurity.js<\/code><\/pre>\n\n\n\n<p>All the functions are not triggered<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"473\" height=\"1024\" src=\"http:\/\/windowsofender.zip\/wp-content\/uploads\/2024\/06\/IMG_9409-473x1024.png\" alt=\"\" class=\"wp-image-23\" srcset=\"https:\/\/windowsofender.zip\/wp-content\/uploads\/2024\/06\/IMG_9409-473x1024.png 473w, https:\/\/windowsofender.zip\/wp-content\/uploads\/2024\/06\/IMG_9409-139x300.png 139w, https:\/\/windowsofender.zip\/wp-content\/uploads\/2024\/06\/IMG_9409-768x1663.png 768w, https:\/\/windowsofender.zip\/wp-content\/uploads\/2024\/06\/IMG_9409-709x1536.png 709w, https:\/\/windowsofender.zip\/wp-content\/uploads\/2024\/06\/IMG_9409-946x2048.png 946w, https:\/\/windowsofender.zip\/wp-content\/uploads\/2024\/06\/IMG_9409.png 1125w\" sizes=\"(max-width: 473px) 100vw, 473px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>In this blog post, I will show you how to use a script I created to bypass some of IOSSecuritySuite&#8217;s features.IOSSecuritySuite is a common library used perform anti-tampering and increase the security of an IOS application. I&#8217;ve created a simple APP to test the IOSSecuritySuite functionalities. You can download the IPA file here.To install it [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[],"blocksy_meta":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/windowsofender.zip\/index.php?rest_route=\/wp\/v2\/posts\/18"}],"collection":[{"href":"https:\/\/windowsofender.zip\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/windowsofender.zip\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/windowsofender.zip\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/windowsofender.zip\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=18"}],"version-history":[{"count":20,"href":"https:\/\/windowsofender.zip\/index.php?rest_route=\/wp\/v2\/posts\/18\/revisions"}],"predecessor-version":[{"id":62,"href":"https:\/\/windowsofender.zip\/index.php?rest_route=\/wp\/v2\/posts\/18\/revisions\/62"}],"wp:attachment":[{"href":"https:\/\/windowsofender.zip\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=18"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/windowsofender.zip\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=18"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/windowsofender.zip\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=18"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}