NyaMisty / ssl-kill-switch3

Next Generation SSLKillSwitch with much more support!
Other
426 stars 52 forks source link

Not Working on iOS 15.7.9 #8

Open OsamaMahmood opened 9 months ago

OsamaMahmood commented 9 months ago

Hi team,

I installed this on my iPhone 6s on iOS 15.7.9 but it does not work for different apps when proxy is turned on.

But i am able to achieve this using Objection framework to bypass ssl pining.

NyaMisty commented 8 months ago

Could you please check if the latest release and latest debug build (https://github.com/NyaMisty/ssl-kill-switch3/actions/runs/6691090516) works? I've adapted all objection's technique into this tweak

P5-2005 commented 8 months ago

Could you please check if the latest release and latest debug build (https://github.com/NyaMisty/ssl-kill-switch3/actions/runs/6691090516) works? I've adapted all objection's technique into this tweak

used debug one on rootless:

Nov  7 06:07:27 mtmergeprops(SSLKillSwitch2.dylib)[2489] <Notice>: === SSL Kill Switch 2: Preference set to 1.
Nov  7 06:07:27 mtmergeprops(SSLKillSwitch2.dylib)[2489] <Notice>: === SSL Kill Switch 2: Hook enabled.
Nov  7 06:07:27 mtmergeprops(SSLKillSwitch2.dylib)[2489] <Notice>: === SSL Kill Switch 2: iOS 13+ detected
Nov  7 06:07:29 GenericKextUpdaterService(SSLKillSwitch2.dylib)[2490] <Notice>: === SSL Kill Switch 2: Preference set to 1.
Nov  7 06:07:29 GenericKextUpdaterService(SSLKillSwitch2.dylib)[2490] <Notice>: === SSL Kill Switch 2: Hook enabled.
Nov  7 06:07:29 GenericKextUpdaterService(SSLKillSwitch2.dylib)[2490] <Notice>: === SSL Kill Switch 2: iOS 13+ detected
Nov  7 06:07:29 GenericKextUpdaterService(SSLKillSwitch2.dylib)[2490] <Notice>: === SSL Kill Switch 2: SecTrustEvaluate jumps to 0x1abeed7a4: a9054ff4d101c3ff, hook new addr instead!
Nov  7 06:10:51 assistantd(libboringssl.dylib)[2743] <Error>: boringssl_context_error_print(1981) [C1.1.1.1:1][0xcea842680] Error: 55475233768:error:1000007d:SSL routines:OPENSSL_internal:CERTIFICATE_VERIFY_FAILED:/Library/Caches/com.apple.xbs/Sources/boringssl/ssl/handshake.cc:419:
Nov  7 06:10:51 assistantd(libboringssl.dylib)[2743] <Error>: boringssl_session_handshake_incomplete(88) [C1.1.1.1:1][0xcea842680] SSL library error
Nov  7 06:10:51 assistantd(libboringssl.dylib)[2743] <Error>: boringssl_session_handshake_error_print(43) [C1.1.1.1:1][0xcea842680] Error: 55475233768:error:1000007d:SSL routines:OPENSSL_internal:CERTIFICATE_VERIFY_FAILED:/Library/Caches/com.apple.xbs/Sources/boringssl/ssl/handshake.cc:419:

device still on blackscreen or apple logo(when doing user reboot space only: syslog output only this :

Nov  7 06:16:45 ProtectedCloudKeySyncing(SSLKillSwitch2.dylib)[3332] <Notice>: === SSL Kill Switch 2: Preference set to 1.
Nov  7 06:16:45 ProtectedCloudKeySyncing(SSLKillSwitch2.dylib)[3332] <Notice>: === SSL Kill Switch 2: Hook enabled.
Nov  7 06:16:45 ProtectedCloudKeySyncing(SSLKillSwitch2.dylib)[3332] <Notice>: === SSL Kill Switch 2: iOS 13+ detected
Nov  7 06:16:45 ProtectedCloudKeySyncing(SSLKillSwitch2.dylib)[3332] <Notice>: === SSL Kill Switch 2: SecTrustEvaluate jumps to 0x1cfe097a4: a9054ff4d101c3ff, hook new addr instead!
Nov  7 06:16:48 GenericKextUpdaterService(SSLKillSwitch2.dylib)[3334] <Notice>: === SSL Kill Switch 2: Preference set to 1.
Nov  7 06:16:48 GenericKextUpdaterService(SSLKillSwitch2.dylib)[3334] <Notice>: === SSL Kill Switch 2: Hook enabled.
Nov  7 06:16:48 GenericKextUpdaterService(SSLKillSwitch2.dylib)[3334] <Notice>: === SSL Kill Switch 2: iOS 13+ detected
Nov  7 06:16:48 GenericKextUpdaterService(SSLKillSwitch2.dylib)[3334] <Notice>: === SSL Kill Switch 2: SecTrustEvaluate jumps to 0x1cfe097a4: a9054ff4d101c3ff, hook new addr instead!
Nov  7 06:16:49 adid(SSLKillSwitch2.dylib)[3335] <Notice>: === SSL Kill Switch 2: Preference set to 1.
Nov  7 06:16:49 adid(SSLKillSwitch2.dylib)[3335] <Notice>: === SSL Kill Switch 2: Hook enabled.
Nov  7 06:16:49 adid(SSLKillSwitch2.dylib)[3335] <Notice>: === SSL Kill Switch 2: iOS 13+ detected
Nov  7 06:16:49 adid(SSLKillSwitch2.dylib)[3335] <Notice>: === SSL Kill Switch 2: SecTrustEvaluate jumps to 0x1cfe097a4: a9054ff4d101c3ff, hook new addr instead!
Nov  7 06:16:49 mtmergeprops(SSLKillSwitch2.dylib)[3336] <Notice>: === SSL Kill Switch 2: Preference set to 1.
Nov  7 06:16:49 mtmergeprops(SSLKillSwitch2.dylib)[3336] <Notice>: === SSL Kill Switch 2: Hook enabled.
Nov  7 06:16:49 mtmergeprops(SSLKillSwitch2.dylib)[3336] <Notice>: === SSL Kill Switch 2: iOS 13+ detected
Nov  7 06:16:51 corespeechd(SSLKillSwitch2.dylib)[3337] <Notice>: === SSL Kill Switch 2: Preference set to 1.
Nov  7 06:16:51 corespeechd(SSLKillSwitch2.dylib)[3337] <Notice>: === SSL Kill Switch 2: Hook enabled.
Nov  7 06:16:51 corespeechd(SSLKillSwitch2.dylib)[3337] <Notice>: === SSL Kill Switch 2: iOS 13+ detected
Nov  7 06:16:51 corespeechd(SSLKillSwitch2.dylib)[3337] <Notice>: === SSL Kill Switch 2: SecTrustEvaluate jumps to 0x1cfe097a4: a9054ff4d101c3ff, hook new addr instead!
Nov  7 06:16:51 OTATaskingAgent(SSLKillSwitch2.dylib)[3338] <Notice>: === SSL Kill Switch 2: Preference set to 1.
Nov  7 06:16:51 OTATaskingAgent(SSLKillSwitch2.dylib)[3338] <Notice>: === SSL Kill Switch 2: Hook enabled.
Nov  7 06:16:51 OTATaskingAgent(SSLKillSwitch2.dylib)[3338] <Notice>: === SSL Kill Switch 2: iOS 13+ detected
Nov  7 06:16:51 OTATaskingAgent(SSLKillSwitch2.dylib)[3338] <Notice>: === SSL Kill Switch 2: SecTrustEvaluate jumps to 0x1cfe097a4: a9054ff4d101c3ff, hook new addr instead!
Nov  7 06:16:59 GenericKextUpdaterService(SSLKillSwitch2.dylib)[3339] <Notice>: === SSL Kill Switch 2: Preference set to 1.
Nov  7 06:16:59 GenericKextUpdaterService(SSLKillSwitch2.dylib)[3339] <Notice>: === SSL Kill Switch 2: Hook enabled.
Nov  7 06:16:59 GenericKextUpdaterService(SSLKillSwitch2.dylib)[3339] <Notice>: === SSL Kill Switch 2: iOS 13+ detected
Nov  7 06:16:59 GenericKextUpdaterService(SSLKillSwitch2.dylib)[3339] <Notice>: === SSL Kill Switch 2: SecTrustEvaluate jumps to 0x1cfe097a4: a9054ff4d101c3ff, hook new addr instead!
Nov  7 06:16:59 mtmergeprops(SSLKillSwitch2.dylib)[3340] <Notice>: === SSL Kill Switch 2: Preference set to 1.
Nov  7 06:16:59 mtmergeprops(SSLKillSwitch2.dylib)[3340] <Notice>: === SSL Kill Switch 2: Hook enabled.
Nov  7 06:16:59 mtmergeprops(SSLKillSwitch2.dylib)[3340] <Notice>: === SSL Kill Switch 2: iOS 13+ detected
P5-2005 commented 8 months ago

also the crash is because when booted jailbroken rootless and ellekit on /etc/rc.d sslkill will inject on any process(even not exist on that plist), must inject only on the bundles/exec from that plist, any workaround i can do only this? target only bundles/exec on that plist thats all not any process

Comodore125 commented 8 months ago

Hi, I was trying your app. However, the more recent releses are not installable to iphone 7 running ios 15.7.9. And the first version is looking like ssl kill switch in the system and also does not work for the app I need to. can you please create non 64bit release as well so it could be tested on ios 15.7.9?

NyaMisty commented 8 months ago

Nov 7 06:10:51 assistantd(libboringssl.dylib)[2743] : boringssl_context_error_print(1981) [C1.1.1.1:1][0xcea842680] Error: 55475233768:error:1000007d:SSL routines:OPENSSL_internal:CERTIFICATE_VERIFY_FAILED:/Library/Caches/com.apple.xbs/Sources/boringssl/ssl/handshake.cc:419:

The log doesn't show assisstantd was injected. As you mentioned the respring-loop, I assume that you installed this tweak without doing respring. Then I believe assisstantd wasn't actually injected. Before resolving respring-loop, you can killall assisstantd and test again.

also the crash is because when booted jailbroken rootless and ellekit on /etc/rc.d sslkill will inject on any process(even not exist on that plist), must inject only on the bundles/exec from that plist, any workaround i can do only this? target only bundles/exec on that plist thats all not any process

I think injecting all process should also work. Maybe you can post up the crash log in the CrashReporter directory?

P5-2005 commented 8 months ago

Nov 7 06:10:51 assistantd(libboringssl.dylib)[2743] : boringssl_context_error_print(1981) [C1.1.1.1:1][0xcea842680] Error: 55475233768:error:1000007d:SSL routines:OPENSSL_internal:CERTIFICATE_VERIFY_FAILED:/Library/Caches/com.apple.xbs/Sources/boringssl/ssl/handshake.cc:419:

The log doesn't show assisstantd was injected. As you mentioned the respring-loop, I assume that you installed this tweak without doing respring. Then I believe assisstantd wasn't actually injected. Before resolving respring-loop, you can killall assisstantd and test again.

also the crash is because when booted jailbroken rootless and ellekit on /etc/rc.d sslkill will inject on any process(even not exist on that plist), must inject only on the bundles/exec from that plist, any workaround i can do only this? target only bundles/exec on that plist thats all not any process

I think injecting all process should also work. Maybe you can post up the crash log in the CrashReporter directory?

i did reboot userspace, also with ellekit on /etc/rc.d, next boot on jailbroken mode will stay on apple logo and crash after timeout

P5-2005 commented 8 months ago

Nov 7 06:10:51 assistantd(libboringssl.dylib)[2743] : boringssl_context_error_print(1981) [C1.1.1.1:1][0xcea842680] Error: 55475233768:error:1000007d:SSL routines:OPENSSL_internal:CERTIFICATE_VERIFY_FAILED:/Library/Caches/com.apple.xbs/Sources/boringssl/ssl/handshake.cc:419:

The log doesn't show assisstantd was injected. As you mentioned the respring-loop, I assume that you installed this tweak without doing respring. Then I believe assisstantd wasn't actually injected. Before resolving respring-loop, you can killall assisstantd and test again.

also the crash is because when booted jailbroken rootless and ellekit on /etc/rc.d sslkill will inject on any process(even not exist on that plist), must inject only on the bundles/exec from that plist, any workaround i can do only this? target only bundles/exec on that plist thats all not any process

I think injecting all process should also work. Maybe you can post up the crash log in the CrashReporter directory?

crash.zip

P5-2005 commented 8 months ago

Nov 7 06:10:51 assistantd(libboringssl.dylib)[2743] : boringssl_context_error_print(1981) [C1.1.1.1:1][0xcea842680] Error: 55475233768:error:1000007d:SSL routines:OPENSSL_internal:CERTIFICATE_VERIFY_FAILED:/Library/Caches/com.apple.xbs/Sources/boringssl/ssl/handshake.cc:419:

The log doesn't show assisstantd was injected. As you mentioned the respring-loop, I assume that you installed this tweak without doing respring. Then I believe assisstantd wasn't actually injected. Before resolving respring-loop, you can killall assisstantd and test again.

also the crash is because when booted jailbroken rootless and ellekit on /etc/rc.d sslkill will inject on any process(even not exist on that plist), must inject only on the bundles/exec from that plist, any workaround i can do only this? target only bundles/exec on that plist thats all not any process

I think injecting all process should also work. Maybe you can post up the crash log in the CrashReporter directory?

this part on syslog what make me think it hook:

Nov  8 10:10:00 GenericKextUpdaterService(SSLKillSwitch2.dylib)[10539] <Notice>: === SSL Kill Switch 2: SecTrustEvaluate jumps to 0x1908197a4: a9054ff4d101c3ff, hook new addr instead!
NyaMisty commented 8 months ago

@P5-2005 wait for the newest debug build ( https://github.com/NyaMisty/ssl-kill-switch3/actions/runs/6804010724 ), and try that again

P5-2005 commented 8 months ago

@P5-2005 wait for the newest debug build ( https://github.com/NyaMisty/ssl-kill-switch3/actions/runs/6804010724 ), and try that again

more log this time, but still stucked on apple logo after reboot userspace:

C:\Users\PC\Downloads\libimobile-suite-latest_x86_64-mingw64>idevicesyslog.exe -m SSL
[connected:b576b7ec31439ef4fad15985b4edc7b1f68b72ef]
Nov  8 20:56:46 mtmergeprops(SSLKillSwitch2.dylib)[11356] <Notice>: === SSL Kill Switch 3: [info] Using LogLevel = 10
Nov  8 20:56:46 mtmergeprops(SSLKillSwitch2.dylib)[11356] <Notice>: === SSL Kill Switch 3: [info] Preference set to 1.
Nov  8 20:56:46 mtmergeprops(SSLKillSwitch2.dylib)[11356] <Notice>: === SSL Kill Switch 3: [info] Hook enabled.
Nov  8 20:56:46 mtmergeprops(SSLKillSwitch2.dylib)[11356] <Notice>: === SSL Kill Switch 3: [info] iOS 13+ detected
Nov  8 20:56:46 mtmergeprops(SSLKillSwitch2.dylib)[11356] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('/usr/lib/libboringssl.dylib', 'SSL_set_custom_verify', 0x10487c738, 0x104880558);
Nov  8 20:56:46 mtmergeprops(SSLKillSwitch2.dylib)[11356] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x1bf13db10 -> 0x1bf13db10
Nov  8 20:56:46 mtmergeprops(SSLKillSwitch2.dylib)[11356] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SSL_set_custom_verify ptr 0x1bf13db10, from 0xb4000068f9400408 0xf90019023904c101 0x79468008d65f03c0 to 0xd61f020058000050 0x10487c738 0x79468008d65f03c0
Nov  8 20:56:46 mtmergeprops(SSLKillSwitch2.dylib)[11356] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('/usr/lib/libboringssl.dylib', 'SSL_get_psk_identity', 0x10487b5bc, 0x0);
Nov  8 20:56:46 mtmergeprops(SSLKillSwitch2.dylib)[11356] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x1bf13e1b8 -> 0x1bf13e1b8
Nov  8 20:56:46 mtmergeprops(SSLKillSwitch2.dylib)[11356] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SSL_get_psk_identity ptr 0x1bf13e1b8, from 0x910003fda9bf7bfd 0x94008cb9b4000080 0xf9404400b4000040 to 0xd61f020058000050 0x10487b5bc 0xf9404400b4000040
Nov  8 20:56:46 mtmergeprops(SSLKillSwitch2.dylib)[11356] <Notice>: === SSL Kill Switch 3: [info] Hooking Security framework...
Nov  8 20:56:46 mtmergeprops(SSLKillSwitch2.dylib)[11356] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecIsInternalRelease', 0x10487cdc4, 0x1048805a0);
Nov  8 20:56:46 mtmergeprops(SSLKillSwitch2.dylib)[11356] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e745864 -> 0x19e745864
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [info] Using LogLevel = 10
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [info] Preference set to 1.
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [info] Hook enabled.
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [info] iOS 13+ detected
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('/usr/lib/libboringssl.dylib', 'SSL_set_custom_verify', 0x104d0c738, 0x104d10558);
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x1bf13db10 -> 0x1bf13db10
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SSL_set_custom_verify ptr 0x1bf13db10, from 0xb4000068f9400408 0xf90019023904c101 0x79468008d65f03c0 to 0xd61f020058000050 0x104d0c738 0x79468008d65f03c0
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('/usr/lib/libboringssl.dylib', 'SSL_get_psk_identity', 0x104d0b5bc, 0x0);
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x1bf13e1b8 -> 0x1bf13e1b8
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SSL_get_psk_identity ptr 0x1bf13e1b8, from 0x910003fda9bf7bfd 0x94008cb9b4000080 0xf9404400b4000040 to 0xd61f020058000050 0x104d0b5bc 0xf9404400b4000040
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [info] Hooking Security framework...
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecIsInternalRelease', 0x104d0cdc4, 0x104d105a0);
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e745864 -> 0x19e745864
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecIsInternalRelease ptr 0x19e745864, from 0x91012000d00009c0 0xa9bd57f615943c41 0xa9027bfda9014ff4 to 0x91012000d4200020 0xa9bd57f615943c41 0xa9027bfda9014ff4
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluate', 0x104d0ce68, 0x104d105a8);
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e812dfc -> 0x19e812dfc
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [info] SecTrustEvaluate jumps to 0x19e7357a4: a9054ff4d101c3ff, hook new addr instead!
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluate ptr 0x19e812dfc, from 0xd10103ff17fc8a6a 0xa9037bfda9024ff4 0x902644a89100c3fd to 0xd10103ff17fc8a6a 0xa9037bfda9024ff4 0x902644a89100c3fd
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluateAsync', 0x104d0cf60, 0x104d105b0);
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e813ff8 -> 0x19e813ff8
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluateAsync ptr 0x19e813ff8, from 0xa90357f6d10183ff 0xa9057bfda9044ff4 0xaa0203f4910143fd to 0xd61f020058000050 0x104d0cf60 0xaa0203f4910143fd
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluateWithError', 0x104d0d094, 0x104d105b8);
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e746148 -> 0x19e746148
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluateWithError ptr 0x19e746148, from 0xa9014ff4d100c3ff 0x910083fda9027bfd 0xaa0003f4aa0103f3 to 0xd61f020058000050 0x104d0d094 0xaa0003f4aa0103f3
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluateAsyncWithError', 0x104d0d1a0, 0x104d105c0);
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e814dc8 -> 0x19e814dc8
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluateAsyncWithError ptr 0x19e814dc8, from 0xa90357f6d10183ff 0xa9057bfda9044ff4 0xaa0003f4910143fd to 0xd61f020058000050 0x104d0d1a0 0xaa0003f4910143fd
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluateFastAsync', 0x104d0d2d4, 0x104d105c8);
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e8140dc -> 0x19e8140dc
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluateFastAsync ptr 0x19e8140dc, from 0xa90357f6d10183ff 0xa9057bfda9044ff4 0xaa0003f4910143fd to 0xd61f020058000050 0x104d0d2d4 0xaa0003f4910143fd
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustSetPolicies', 0x104d0d408, 0x104d105d0);
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e810a58 -> 0x19e810a58
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustSetPolicies ptr 0x19e810a58, from 0x6d0723e9d10383ff 0xa90967faa9086ffc 0xa90b57f6a90a5ff8 to 0xd61f020058000050 0x104d0d408 0xa90b57f6a90a5ff8
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [info] Hooking URLSession...
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookM(0x1f2233be8, '_onqueue_didReceiveChallenge:request:withCompletion:', 0x104d0d4ac, 0x104d105d8);
Nov  8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookM(0x1ed1f6948, '_onqueue_sendSessionChallenge:completionHandler:', 0x104d0d658, 0x104d105e0);
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [info] Using LogLevel = 10
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [info] Preference set to 1.
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [info] Hook enabled.
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [info] iOS 13+ detected
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('/usr/lib/libboringssl.dylib', 'SSL_set_custom_verify', 0x1046ec738, 0x1046f0558);
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x1bf13db10 -> 0x1bf13db10
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SSL_set_custom_verify ptr 0x1bf13db10, from 0xb4000068f9400408 0xf90019023904c101 0x79468008d65f03c0 to 0xd61f020058000050 0x1046ec738 0x79468008d65f03c0
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('/usr/lib/libboringssl.dylib', 'SSL_get_psk_identity', 0x1046eb5bc, 0x0);
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x1bf13e1b8 -> 0x1bf13e1b8
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SSL_get_psk_identity ptr 0x1bf13e1b8, from 0x910003fda9bf7bfd 0x94008cb9b4000080 0xf9404400b4000040 to 0xd61f020058000050 0x1046eb5bc 0xf9404400b4000040
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [info] Hooking Security framework...
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecIsInternalRelease', 0x1046ecdc4, 0x1046f05a0);
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e745864 -> 0x19e745864
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecIsInternalRelease ptr 0x19e745864, from 0x91012000d00009c0 0xa9bd57f615943c41 0xa9027bfda9014ff4 to 0x91012000d4200020 0xa9bd57f615943c41 0xa9027bfda9014ff4
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluate', 0x1046ece68, 0x1046f05a8);
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e812dfc -> 0x19e812dfc
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [info] SecTrustEvaluate jumps to 0x19e7357a4: a9054ff4d101c3ff, hook new addr instead!
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluate ptr 0x19e812dfc, from 0xd10103ff17fc8a6a 0xa9037bfda9024ff4 0x902644a89100c3fd to 0xd10103ff17fc8a6a 0xa9037bfda9024ff4 0x902644a89100c3fd
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluateAsync', 0x1046ecf60, 0x1046f05b0);
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e813ff8 -> 0x19e813ff8
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluateAsync ptr 0x19e813ff8, from 0xa90357f6d10183ff 0xa9057bfda9044ff4 0xaa0203f4910143fd to 0xd61f020058000050 0x1046ecf60 0xaa0203f4910143fd
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluateWithError', 0x1046ed094, 0x1046f05b8);
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e746148 -> 0x19e746148
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluateWithError ptr 0x19e746148, from 0xa9014ff4d100c3ff 0x910083fda9027bfd 0xaa0003f4aa0103f3 to 0xd61f020058000050 0x1046ed094 0xaa0003f4aa0103f3
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluateAsyncWithError', 0x1046ed1a0, 0x1046f05c0);
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e814dc8 -> 0x19e814dc8
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluateAsyncWithError ptr 0x19e814dc8, from 0xa90357f6d10183ff 0xa9057bfda9044ff4 0xaa0003f4910143fd to 0xd61f020058000050 0x1046ed1a0 0xaa0003f4910143fd
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluateFastAsync', 0x1046ed2d4, 0x1046f05c8);
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e8140dc -> 0x19e8140dc
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluateFastAsync ptr 0x19e8140dc, from 0xa90357f6d10183ff 0xa9057bfda9044ff4 0xaa0003f4910143fd to 0xd61f020058000050 0x1046ed2d4 0xaa0003f4910143fd
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustSetPolicies', 0x1046ed408, 0x1046f05d0);
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e810a58 -> 0x19e810a58
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustSetPolicies ptr 0x19e810a58, from 0x6d0723e9d10383ff 0xa90967faa9086ffc 0xa90b57f6a90a5ff8 to 0xd61f020058000050 0x1046ed408 0xa90b57f6a90a5ff8
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [info] Hooking URLSession...
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookM(0x1f2233be8, '_onqueue_didReceiveChallenge:request:withCompletion:', 0x1046ed4ac, 0x1046f05d8);
Nov  8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookM(0x1ed1f6948, '_onqueue_sendSessionChallenge:completionHandler:', 0x1046ed658, 0x1046f05e0);
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [info] Using LogLevel = 10
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [info] Preference set to 1.
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [info] Hook enabled.
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [info] iOS 13+ detected
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('/usr/lib/libboringssl.dylib', 'SSL_set_custom_verify', 0x102c6c738, 0x102c70558);
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x1bf13db10 -> 0x1bf13db10
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SSL_set_custom_verify ptr 0x1bf13db10, from 0xb4000068f9400408 0xf90019023904c101 0x79468008d65f03c0 to 0xd61f020058000050 0x102c6c738 0x79468008d65f03c0
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('/usr/lib/libboringssl.dylib', 'SSL_get_psk_identity', 0x102c6b5bc, 0x0);
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x1bf13e1b8 -> 0x1bf13e1b8
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SSL_get_psk_identity ptr 0x1bf13e1b8, from 0x910003fda9bf7bfd 0x94008cb9b4000080 0xf9404400b4000040 to 0xd61f020058000050 0x102c6b5bc 0xf9404400b4000040
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [info] Hooking Security framework...
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecIsInternalRelease', 0x102c6cdc4, 0x102c705a0);
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e745864 -> 0x19e745864
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecIsInternalRelease ptr 0x19e745864, from 0x91012000d00009c0 0xa9bd57f615943c41 0xa9027bfda9014ff4 to 0x91012000d4200020 0xa9bd57f615943c41 0xa9027bfda9014ff4
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluate', 0x102c6ce68, 0x102c705a8);
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e812dfc -> 0x19e812dfc
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [info] SecTrustEvaluate jumps to 0x19e7357a4: a9054ff4d101c3ff, hook new addr instead!
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluate ptr 0x19e812dfc, from 0xd10103ff17fc8a6a 0xa9037bfda9024ff4 0x902644a89100c3fd to 0xd10103ff17fc8a6a 0xa9037bfda9024ff4 0x902644a89100c3fd
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluateAsync', 0x102c6cf60, 0x102c705b0);
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e813ff8 -> 0x19e813ff8
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluateAsync ptr 0x19e813ff8, from 0xa90357f6d10183ff 0xa9057bfda9044ff4 0xaa0203f4910143fd to 0xd61f020058000050 0x102c6cf60 0xaa0203f4910143fd
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluateWithError', 0x102c6d094, 0x102c705b8);
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e746148 -> 0x19e746148
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluateWithError ptr 0x19e746148, from 0xa9014ff4d100c3ff 0x910083fda9027bfd 0xaa0003f4aa0103f3 to 0xd61f020058000050 0x102c6d094 0xaa0003f4aa0103f3
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluateAsyncWithError', 0x102c6d1a0, 0x102c705c0);
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e814dc8 -> 0x19e814dc8
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluateAsyncWithError ptr 0x19e814dc8, from 0xa90357f6d10183ff 0xa9057bfda9044ff4 0xaa0003f4910143fd to 0xd61f020058000050 0x102c6d1a0 0xaa0003f4910143fd
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluateFastAsync', 0x102c6d2d4, 0x102c705c8);
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e8140dc -> 0x19e8140dc
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluateFastAsync ptr 0x19e8140dc, from 0xa90357f6d10183ff 0xa9057bfda9044ff4 0xaa0003f4910143fd to 0xd61f020058000050 0x102c6d2d4 0xaa0003f4910143fd
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustSetPolicies', 0x102c6d408, 0x102c705d0);
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e810a58 -> 0x19e810a58
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustSetPolicies ptr 0x19e810a58, from 0x6d0723e9d10383ff 0xa90967faa9086ffc 0xa90b57f6a90a5ff8 to 0xd61f020058000050 0x102c6d408 0xa90b57f6a90a5ff8
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [info] Hooking URLSession...
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookM(0x1f2233be8, '_onqueue_didReceiveChallenge:request:withCompletion:', 0x102c6d4ac, 0x102c705d8);
Nov  8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookM(0x1ed1f6948, '_onqueue_sendSessionChallenge:completionHandler:', 0x102c6d658, 0x102c705e0);
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [info] Using LogLevel = 10
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [info] Preference set to 1.
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [info] Hook enabled.
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [info] iOS 13+ detected
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('/usr/lib/libboringssl.dylib', 'SSL_set_custom_verify', 0x100f9c738, 0x100fa0558);
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x1bf13db10 -> 0x1bf13db10
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SSL_set_custom_verify ptr 0x1bf13db10, from 0xb4000068f9400408 0xf90019023904c101 0x79468008d65f03c0 to 0xd61f020058000050 0x100f9c738 0x79468008d65f03c0
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('/usr/lib/libboringssl.dylib', 'SSL_get_psk_identity', 0x100f9b5bc, 0x0);
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x1bf13e1b8 -> 0x1bf13e1b8
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SSL_get_psk_identity ptr 0x1bf13e1b8, from 0x910003fda9bf7bfd 0x94008cb9b4000080 0xf9404400b4000040 to 0xd61f020058000050 0x100f9b5bc 0xf9404400b4000040
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [info] Hooking Security framework...
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecIsInternalRelease', 0x100f9cdc4, 0x100fa05a0);
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e745864 -> 0x19e745864
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecIsInternalRelease ptr 0x19e745864, from 0x91012000d00009c0 0xa9bd57f615943c41 0xa9027bfda9014ff4 to 0x91012000d4200020 0xa9bd57f615943c41 0xa9027bfda9014ff4
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluate', 0x100f9ce68, 0x100fa05a8);
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e812dfc -> 0x19e812dfc
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [info] SecTrustEvaluate jumps to 0x19e7357a4: a9054ff4d101c3ff, hook new addr instead!
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluate ptr 0x19e812dfc, from 0xd10103ff17fc8a6a 0xa9037bfda9024ff4 0x902644a89100c3fd to 0xd10103ff17fc8a6a 0xa9037bfda9024ff4 0x902644a89100c3fd
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluateAsync', 0x100f9cf60, 0x100fa05b0);
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e813ff8 -> 0x19e813ff8
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluateAsync ptr 0x19e813ff8, from 0xa90357f6d10183ff 0xa9057bfda9044ff4 0xaa0203f4910143fd to 0xd61f020058000050 0x100f9cf60 0xaa0203f4910143fd
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluateWithError', 0x100f9d094, 0x100fa05b8);
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e746148 -> 0x19e746148
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluateWithError ptr 0x19e746148, from 0xa9014ff4d100c3ff 0x910083fda9027bfd 0xaa0003f4aa0103f3 to 0xd61f020058000050 0x100f9d094 0xaa0003f4aa0103f3
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluateAsyncWithError', 0x100f9d1a0, 0x100fa05c0);
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e814dc8 -> 0x19e814dc8
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluateAsyncWithError ptr 0x19e814dc8, from 0xa90357f6d10183ff 0xa9057bfda9044ff4 0xaa0003f4910143fd to 0xd61f020058000050 0x100f9d1a0 0xaa0003f4910143fd
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluateFastAsync', 0x100f9d2d4, 0x100fa05c8);
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e8140dc -> 0x19e8140dc
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluateFastAsync ptr 0x19e8140dc, from 0xa90357f6d10183ff 0xa9057bfda9044ff4 0xaa0003f4910143fd to 0xd61f020058000050 0x100f9d2d4 0xaa0003f4910143fd
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustSetPolicies', 0x100f9d408, 0x100fa05d0);
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e810a58 -> 0x19e810a58
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustSetPolicies ptr 0x19e810a58, from 0x6d0723e9d10383ff 0xa90967faa9086ffc 0xa90b57f6a90a5ff8 to 0xd61f020058000050 0x100f9d408 0xa90b57f6a90a5ff8
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [info] Hooking URLSession...
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookM(0x1f2233be8, '_onqueue_didReceiveChallenge:request:withCompletion:', 0x100f9d4ac, 0x100fa05d8);
Nov  8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookM(0x1ed1f6948, '_onqueue_sendSessionChallenge:completionHandler:', 0x100f9d658, 0x100fa05e0);
Nov  8 20:56:56 mtmergeprops(SSLKillSwitch2.dylib)[11361] <Notice>: === SSL Kill Switch 3: [info] Using LogLevel = 10
Nov  8 20:56:56 mtmergeprops(SSLKillSwitch2.dylib)[11361] <Notice>: === SSL Kill Switch 3: [info] Preference set to 1.
Nov  8 20:56:56 mtmergeprops(SSLKillSwitch2.dylib)[11361] <Notice>: === SSL Kill Switch 3: [info] Hook enabled.
Nov  8 20:56:56 mtmergeprops(SSLKillSwitch2.dylib)[11361] <Notice>: === SSL Kill Switch 3: [info] iOS 13+ detected
Nov  8 20:56:56 mtmergeprops(SSLKillSwitch2.dylib)[11361] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('/usr/lib/libboringssl.dylib', 'SSL_set_custom_verify', 0x102484738, 0x102488558);
Nov  8 20:56:56 mtmergeprops(SSLKillSwitch2.dylib)[11361] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x1bf13db10 -> 0x1bf13db10
Nov  8 20:56:56 mtmergeprops(SSLKillSwitch2.dylib)[11361] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SSL_set_custom_verify ptr 0x1bf13db10, from 0xb4000068f9400408 0xf90019023904c101 0x79468008d65f03c0 to 0xd61f020058000050 0x102484738 0x79468008d65f03c0
Nov  8 20:56:56 mtmergeprops(SSLKillSwitch2.dylib)[11361] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('/usr/lib/libboringssl.dylib', 'SSL_get_psk_identity', 0x1024835bc, 0x0);
Nov  8 20:56:56 mtmergeprops(SSLKillSwitch2.dylib)[11361] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x1bf13e1b8 -> 0x1bf13e1b8
Nov  8 20:56:56 mtmergeprops(SSLKillSwitch2.dylib)[11361] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SSL_get_psk_identity ptr 0x1bf13e1b8, from 0x910003fda9bf7bfd 0x94008cb9b4000080 0xf9404400b4000040 to 0xd61f020058000050 0x1024835bc 0xf9404400b4000040
Nov  8 20:56:56 mtmergeprops(SSLKillSwitch2.dylib)[11361] <Notice>: === SSL Kill Switch 3: [info] Hooking Security framework...
Nov  8 20:56:56 mtmergeprops(SSLKillSwitch2.dylib)[11361] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecIsInternalRelease', 0x102484dc4, 0x1024885a0);
Nov  8 20:56:56 mtmergeprops(SSLKillSwitch2.dylib)[11361] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e745864 -> 0x19e745864
NyaMisty commented 8 months ago

@P5-2005 give me the crash log pls

P5-2005 commented 8 months ago

@P5-2005 give me the crash log pls crash.zip

NyaMisty commented 8 months ago

don't know why. I believe it's an ellekit bug.

P5-2005 commented 8 months ago

don't know why. I believe it's an ellekit bug.

iirc ellekit dev said there is one bug to be fixed(seeing this on twitter) so i thought is only the new build not current one, but im not aware is related with that bug, i used ellekit from sileo for sure not the last one @evelyneee

evelyneee commented 8 months ago

Try using the ellekit 1.1 build on my twitter

P5-2005 commented 8 months ago

Try using the ellekit 1.1 build on my twitter CrashLog-ellekit_1.0-21.4cf7883_iphoneos-arm64.txt got the deb as you mentionned : https://x.com/eveiyneee/status/1715778690297090060?s=46

NyaMisty commented 8 months ago

@P5-2005 That's a system panic lol. eve got things to do ;)

evelyneee commented 8 months ago

I finally got ElleKit 1.1 on corellium, so issues should be fixed soon

P5-2005 commented 8 months ago

@P5-2005 That's a system panic lol. eve got things to do ;)

tbh only the build from twitter got that full panic, the one on sileo repo no full panic at all, only stuck on apple logo or blackscreen when using sslkillswitch and reboot userspace or booting jailbroken and tweak is enabled

evelyneee commented 7 months ago

Can you test the ElleKit 1.1 from the repo

P5-2005 commented 7 months ago

Can you test the ElleKit 1.1 from the repo used last ellekit, also used last sslkill, here next boot jailbroken log, also still same issue when doing reboot userspace nextboot-jailbroken.txt