Open OsamaMahmood opened 9 months ago
Could you please check if the latest release and latest debug build (https://github.com/NyaMisty/ssl-kill-switch3/actions/runs/6691090516) works? I've adapted all objection's technique into this tweak
Could you please check if the latest release and latest debug build (https://github.com/NyaMisty/ssl-kill-switch3/actions/runs/6691090516) works? I've adapted all objection's technique into this tweak
used debug one on rootless:
Nov 7 06:07:27 mtmergeprops(SSLKillSwitch2.dylib)[2489] <Notice>: === SSL Kill Switch 2: Preference set to 1.
Nov 7 06:07:27 mtmergeprops(SSLKillSwitch2.dylib)[2489] <Notice>: === SSL Kill Switch 2: Hook enabled.
Nov 7 06:07:27 mtmergeprops(SSLKillSwitch2.dylib)[2489] <Notice>: === SSL Kill Switch 2: iOS 13+ detected
Nov 7 06:07:29 GenericKextUpdaterService(SSLKillSwitch2.dylib)[2490] <Notice>: === SSL Kill Switch 2: Preference set to 1.
Nov 7 06:07:29 GenericKextUpdaterService(SSLKillSwitch2.dylib)[2490] <Notice>: === SSL Kill Switch 2: Hook enabled.
Nov 7 06:07:29 GenericKextUpdaterService(SSLKillSwitch2.dylib)[2490] <Notice>: === SSL Kill Switch 2: iOS 13+ detected
Nov 7 06:07:29 GenericKextUpdaterService(SSLKillSwitch2.dylib)[2490] <Notice>: === SSL Kill Switch 2: SecTrustEvaluate jumps to 0x1abeed7a4: a9054ff4d101c3ff, hook new addr instead!
Nov 7 06:10:51 assistantd(libboringssl.dylib)[2743] <Error>: boringssl_context_error_print(1981) [C1.1.1.1:1][0xcea842680] Error: 55475233768:error:1000007d:SSL routines:OPENSSL_internal:CERTIFICATE_VERIFY_FAILED:/Library/Caches/com.apple.xbs/Sources/boringssl/ssl/handshake.cc:419:
Nov 7 06:10:51 assistantd(libboringssl.dylib)[2743] <Error>: boringssl_session_handshake_incomplete(88) [C1.1.1.1:1][0xcea842680] SSL library error
Nov 7 06:10:51 assistantd(libboringssl.dylib)[2743] <Error>: boringssl_session_handshake_error_print(43) [C1.1.1.1:1][0xcea842680] Error: 55475233768:error:1000007d:SSL routines:OPENSSL_internal:CERTIFICATE_VERIFY_FAILED:/Library/Caches/com.apple.xbs/Sources/boringssl/ssl/handshake.cc:419:
device still on blackscreen or apple logo(when doing user reboot space only: syslog output only this :
Nov 7 06:16:45 ProtectedCloudKeySyncing(SSLKillSwitch2.dylib)[3332] <Notice>: === SSL Kill Switch 2: Preference set to 1.
Nov 7 06:16:45 ProtectedCloudKeySyncing(SSLKillSwitch2.dylib)[3332] <Notice>: === SSL Kill Switch 2: Hook enabled.
Nov 7 06:16:45 ProtectedCloudKeySyncing(SSLKillSwitch2.dylib)[3332] <Notice>: === SSL Kill Switch 2: iOS 13+ detected
Nov 7 06:16:45 ProtectedCloudKeySyncing(SSLKillSwitch2.dylib)[3332] <Notice>: === SSL Kill Switch 2: SecTrustEvaluate jumps to 0x1cfe097a4: a9054ff4d101c3ff, hook new addr instead!
Nov 7 06:16:48 GenericKextUpdaterService(SSLKillSwitch2.dylib)[3334] <Notice>: === SSL Kill Switch 2: Preference set to 1.
Nov 7 06:16:48 GenericKextUpdaterService(SSLKillSwitch2.dylib)[3334] <Notice>: === SSL Kill Switch 2: Hook enabled.
Nov 7 06:16:48 GenericKextUpdaterService(SSLKillSwitch2.dylib)[3334] <Notice>: === SSL Kill Switch 2: iOS 13+ detected
Nov 7 06:16:48 GenericKextUpdaterService(SSLKillSwitch2.dylib)[3334] <Notice>: === SSL Kill Switch 2: SecTrustEvaluate jumps to 0x1cfe097a4: a9054ff4d101c3ff, hook new addr instead!
Nov 7 06:16:49 adid(SSLKillSwitch2.dylib)[3335] <Notice>: === SSL Kill Switch 2: Preference set to 1.
Nov 7 06:16:49 adid(SSLKillSwitch2.dylib)[3335] <Notice>: === SSL Kill Switch 2: Hook enabled.
Nov 7 06:16:49 adid(SSLKillSwitch2.dylib)[3335] <Notice>: === SSL Kill Switch 2: iOS 13+ detected
Nov 7 06:16:49 adid(SSLKillSwitch2.dylib)[3335] <Notice>: === SSL Kill Switch 2: SecTrustEvaluate jumps to 0x1cfe097a4: a9054ff4d101c3ff, hook new addr instead!
Nov 7 06:16:49 mtmergeprops(SSLKillSwitch2.dylib)[3336] <Notice>: === SSL Kill Switch 2: Preference set to 1.
Nov 7 06:16:49 mtmergeprops(SSLKillSwitch2.dylib)[3336] <Notice>: === SSL Kill Switch 2: Hook enabled.
Nov 7 06:16:49 mtmergeprops(SSLKillSwitch2.dylib)[3336] <Notice>: === SSL Kill Switch 2: iOS 13+ detected
Nov 7 06:16:51 corespeechd(SSLKillSwitch2.dylib)[3337] <Notice>: === SSL Kill Switch 2: Preference set to 1.
Nov 7 06:16:51 corespeechd(SSLKillSwitch2.dylib)[3337] <Notice>: === SSL Kill Switch 2: Hook enabled.
Nov 7 06:16:51 corespeechd(SSLKillSwitch2.dylib)[3337] <Notice>: === SSL Kill Switch 2: iOS 13+ detected
Nov 7 06:16:51 corespeechd(SSLKillSwitch2.dylib)[3337] <Notice>: === SSL Kill Switch 2: SecTrustEvaluate jumps to 0x1cfe097a4: a9054ff4d101c3ff, hook new addr instead!
Nov 7 06:16:51 OTATaskingAgent(SSLKillSwitch2.dylib)[3338] <Notice>: === SSL Kill Switch 2: Preference set to 1.
Nov 7 06:16:51 OTATaskingAgent(SSLKillSwitch2.dylib)[3338] <Notice>: === SSL Kill Switch 2: Hook enabled.
Nov 7 06:16:51 OTATaskingAgent(SSLKillSwitch2.dylib)[3338] <Notice>: === SSL Kill Switch 2: iOS 13+ detected
Nov 7 06:16:51 OTATaskingAgent(SSLKillSwitch2.dylib)[3338] <Notice>: === SSL Kill Switch 2: SecTrustEvaluate jumps to 0x1cfe097a4: a9054ff4d101c3ff, hook new addr instead!
Nov 7 06:16:59 GenericKextUpdaterService(SSLKillSwitch2.dylib)[3339] <Notice>: === SSL Kill Switch 2: Preference set to 1.
Nov 7 06:16:59 GenericKextUpdaterService(SSLKillSwitch2.dylib)[3339] <Notice>: === SSL Kill Switch 2: Hook enabled.
Nov 7 06:16:59 GenericKextUpdaterService(SSLKillSwitch2.dylib)[3339] <Notice>: === SSL Kill Switch 2: iOS 13+ detected
Nov 7 06:16:59 GenericKextUpdaterService(SSLKillSwitch2.dylib)[3339] <Notice>: === SSL Kill Switch 2: SecTrustEvaluate jumps to 0x1cfe097a4: a9054ff4d101c3ff, hook new addr instead!
Nov 7 06:16:59 mtmergeprops(SSLKillSwitch2.dylib)[3340] <Notice>: === SSL Kill Switch 2: Preference set to 1.
Nov 7 06:16:59 mtmergeprops(SSLKillSwitch2.dylib)[3340] <Notice>: === SSL Kill Switch 2: Hook enabled.
Nov 7 06:16:59 mtmergeprops(SSLKillSwitch2.dylib)[3340] <Notice>: === SSL Kill Switch 2: iOS 13+ detected
also the crash is because when booted jailbroken rootless and ellekit on /etc/rc.d sslkill will inject on any process(even not exist on that plist), must inject only on the bundles/exec from that plist, any workaround i can do only this? target only bundles/exec on that plist thats all not any process
Hi, I was trying your app. However, the more recent releses are not installable to iphone 7 running ios 15.7.9. And the first version is looking like ssl kill switch in the system and also does not work for the app I need to. can you please create non 64bit release as well so it could be tested on ios 15.7.9?
Nov 7 06:10:51 assistantd(libboringssl.dylib)[2743]
: boringssl_context_error_print(1981) [C1.1.1.1:1][0xcea842680] Error: 55475233768:error:1000007d:SSL routines:OPENSSL_internal:CERTIFICATE_VERIFY_FAILED:/Library/Caches/com.apple.xbs/Sources/boringssl/ssl/handshake.cc:419:
The log doesn't show assisstantd
was injected. As you mentioned the respring-loop, I assume that you installed this tweak without doing respring. Then I believe assisstantd wasn't actually injected. Before resolving respring-loop, you can killall assisstantd
and test again.
also the crash is because when booted jailbroken rootless and ellekit on /etc/rc.d sslkill will inject on any process(even not exist on that plist), must inject only on the bundles/exec from that plist, any workaround i can do only this? target only bundles/exec on that plist thats all not any process
I think injecting all process should also work. Maybe you can post up the crash log in the CrashReporter directory?
Nov 7 06:10:51 assistantd(libboringssl.dylib)[2743] : boringssl_context_error_print(1981) [C1.1.1.1:1][0xcea842680] Error: 55475233768:error:1000007d:SSL routines:OPENSSL_internal:CERTIFICATE_VERIFY_FAILED:/Library/Caches/com.apple.xbs/Sources/boringssl/ssl/handshake.cc:419:
The log doesn't show
assisstantd
was injected. As you mentioned the respring-loop, I assume that you installed this tweak without doing respring. Then I believe assisstantd wasn't actually injected. Before resolving respring-loop, you cankillall assisstantd
and test again.also the crash is because when booted jailbroken rootless and ellekit on /etc/rc.d sslkill will inject on any process(even not exist on that plist), must inject only on the bundles/exec from that plist, any workaround i can do only this? target only bundles/exec on that plist thats all not any process
I think injecting all process should also work. Maybe you can post up the crash log in the CrashReporter directory?
i did reboot userspace, also with ellekit on /etc/rc.d, next boot on jailbroken mode will stay on apple logo and crash after timeout
Nov 7 06:10:51 assistantd(libboringssl.dylib)[2743] : boringssl_context_error_print(1981) [C1.1.1.1:1][0xcea842680] Error: 55475233768:error:1000007d:SSL routines:OPENSSL_internal:CERTIFICATE_VERIFY_FAILED:/Library/Caches/com.apple.xbs/Sources/boringssl/ssl/handshake.cc:419:
The log doesn't show
assisstantd
was injected. As you mentioned the respring-loop, I assume that you installed this tweak without doing respring. Then I believe assisstantd wasn't actually injected. Before resolving respring-loop, you cankillall assisstantd
and test again.also the crash is because when booted jailbroken rootless and ellekit on /etc/rc.d sslkill will inject on any process(even not exist on that plist), must inject only on the bundles/exec from that plist, any workaround i can do only this? target only bundles/exec on that plist thats all not any process
I think injecting all process should also work. Maybe you can post up the crash log in the CrashReporter directory?
Nov 7 06:10:51 assistantd(libboringssl.dylib)[2743] : boringssl_context_error_print(1981) [C1.1.1.1:1][0xcea842680] Error: 55475233768:error:1000007d:SSL routines:OPENSSL_internal:CERTIFICATE_VERIFY_FAILED:/Library/Caches/com.apple.xbs/Sources/boringssl/ssl/handshake.cc:419:
The log doesn't show
assisstantd
was injected. As you mentioned the respring-loop, I assume that you installed this tweak without doing respring. Then I believe assisstantd wasn't actually injected. Before resolving respring-loop, you cankillall assisstantd
and test again.also the crash is because when booted jailbroken rootless and ellekit on /etc/rc.d sslkill will inject on any process(even not exist on that plist), must inject only on the bundles/exec from that plist, any workaround i can do only this? target only bundles/exec on that plist thats all not any process
I think injecting all process should also work. Maybe you can post up the crash log in the CrashReporter directory?
this part on syslog what make me think it hook:
Nov 8 10:10:00 GenericKextUpdaterService(SSLKillSwitch2.dylib)[10539] <Notice>: === SSL Kill Switch 2: SecTrustEvaluate jumps to 0x1908197a4: a9054ff4d101c3ff, hook new addr instead!
@P5-2005 wait for the newest debug build ( https://github.com/NyaMisty/ssl-kill-switch3/actions/runs/6804010724 ), and try that again
@P5-2005 wait for the newest debug build ( https://github.com/NyaMisty/ssl-kill-switch3/actions/runs/6804010724 ), and try that again
more log this time, but still stucked on apple logo after reboot userspace:
C:\Users\PC\Downloads\libimobile-suite-latest_x86_64-mingw64>idevicesyslog.exe -m SSL
[connected:b576b7ec31439ef4fad15985b4edc7b1f68b72ef]
Nov 8 20:56:46 mtmergeprops(SSLKillSwitch2.dylib)[11356] <Notice>: === SSL Kill Switch 3: [info] Using LogLevel = 10
Nov 8 20:56:46 mtmergeprops(SSLKillSwitch2.dylib)[11356] <Notice>: === SSL Kill Switch 3: [info] Preference set to 1.
Nov 8 20:56:46 mtmergeprops(SSLKillSwitch2.dylib)[11356] <Notice>: === SSL Kill Switch 3: [info] Hook enabled.
Nov 8 20:56:46 mtmergeprops(SSLKillSwitch2.dylib)[11356] <Notice>: === SSL Kill Switch 3: [info] iOS 13+ detected
Nov 8 20:56:46 mtmergeprops(SSLKillSwitch2.dylib)[11356] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('/usr/lib/libboringssl.dylib', 'SSL_set_custom_verify', 0x10487c738, 0x104880558);
Nov 8 20:56:46 mtmergeprops(SSLKillSwitch2.dylib)[11356] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x1bf13db10 -> 0x1bf13db10
Nov 8 20:56:46 mtmergeprops(SSLKillSwitch2.dylib)[11356] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SSL_set_custom_verify ptr 0x1bf13db10, from 0xb4000068f9400408 0xf90019023904c101 0x79468008d65f03c0 to 0xd61f020058000050 0x10487c738 0x79468008d65f03c0
Nov 8 20:56:46 mtmergeprops(SSLKillSwitch2.dylib)[11356] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('/usr/lib/libboringssl.dylib', 'SSL_get_psk_identity', 0x10487b5bc, 0x0);
Nov 8 20:56:46 mtmergeprops(SSLKillSwitch2.dylib)[11356] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x1bf13e1b8 -> 0x1bf13e1b8
Nov 8 20:56:46 mtmergeprops(SSLKillSwitch2.dylib)[11356] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SSL_get_psk_identity ptr 0x1bf13e1b8, from 0x910003fda9bf7bfd 0x94008cb9b4000080 0xf9404400b4000040 to 0xd61f020058000050 0x10487b5bc 0xf9404400b4000040
Nov 8 20:56:46 mtmergeprops(SSLKillSwitch2.dylib)[11356] <Notice>: === SSL Kill Switch 3: [info] Hooking Security framework...
Nov 8 20:56:46 mtmergeprops(SSLKillSwitch2.dylib)[11356] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecIsInternalRelease', 0x10487cdc4, 0x1048805a0);
Nov 8 20:56:46 mtmergeprops(SSLKillSwitch2.dylib)[11356] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e745864 -> 0x19e745864
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [info] Using LogLevel = 10
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [info] Preference set to 1.
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [info] Hook enabled.
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [info] iOS 13+ detected
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('/usr/lib/libboringssl.dylib', 'SSL_set_custom_verify', 0x104d0c738, 0x104d10558);
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x1bf13db10 -> 0x1bf13db10
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SSL_set_custom_verify ptr 0x1bf13db10, from 0xb4000068f9400408 0xf90019023904c101 0x79468008d65f03c0 to 0xd61f020058000050 0x104d0c738 0x79468008d65f03c0
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('/usr/lib/libboringssl.dylib', 'SSL_get_psk_identity', 0x104d0b5bc, 0x0);
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x1bf13e1b8 -> 0x1bf13e1b8
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SSL_get_psk_identity ptr 0x1bf13e1b8, from 0x910003fda9bf7bfd 0x94008cb9b4000080 0xf9404400b4000040 to 0xd61f020058000050 0x104d0b5bc 0xf9404400b4000040
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [info] Hooking Security framework...
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecIsInternalRelease', 0x104d0cdc4, 0x104d105a0);
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e745864 -> 0x19e745864
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecIsInternalRelease ptr 0x19e745864, from 0x91012000d00009c0 0xa9bd57f615943c41 0xa9027bfda9014ff4 to 0x91012000d4200020 0xa9bd57f615943c41 0xa9027bfda9014ff4
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluate', 0x104d0ce68, 0x104d105a8);
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e812dfc -> 0x19e812dfc
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [info] SecTrustEvaluate jumps to 0x19e7357a4: a9054ff4d101c3ff, hook new addr instead!
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluate ptr 0x19e812dfc, from 0xd10103ff17fc8a6a 0xa9037bfda9024ff4 0x902644a89100c3fd to 0xd10103ff17fc8a6a 0xa9037bfda9024ff4 0x902644a89100c3fd
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluateAsync', 0x104d0cf60, 0x104d105b0);
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e813ff8 -> 0x19e813ff8
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluateAsync ptr 0x19e813ff8, from 0xa90357f6d10183ff 0xa9057bfda9044ff4 0xaa0203f4910143fd to 0xd61f020058000050 0x104d0cf60 0xaa0203f4910143fd
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluateWithError', 0x104d0d094, 0x104d105b8);
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e746148 -> 0x19e746148
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluateWithError ptr 0x19e746148, from 0xa9014ff4d100c3ff 0x910083fda9027bfd 0xaa0003f4aa0103f3 to 0xd61f020058000050 0x104d0d094 0xaa0003f4aa0103f3
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluateAsyncWithError', 0x104d0d1a0, 0x104d105c0);
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e814dc8 -> 0x19e814dc8
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluateAsyncWithError ptr 0x19e814dc8, from 0xa90357f6d10183ff 0xa9057bfda9044ff4 0xaa0003f4910143fd to 0xd61f020058000050 0x104d0d1a0 0xaa0003f4910143fd
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluateFastAsync', 0x104d0d2d4, 0x104d105c8);
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e8140dc -> 0x19e8140dc
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluateFastAsync ptr 0x19e8140dc, from 0xa90357f6d10183ff 0xa9057bfda9044ff4 0xaa0003f4910143fd to 0xd61f020058000050 0x104d0d2d4 0xaa0003f4910143fd
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustSetPolicies', 0x104d0d408, 0x104d105d0);
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e810a58 -> 0x19e810a58
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustSetPolicies ptr 0x19e810a58, from 0x6d0723e9d10383ff 0xa90967faa9086ffc 0xa90b57f6a90a5ff8 to 0xd61f020058000050 0x104d0d408 0xa90b57f6a90a5ff8
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [info] Hooking URLSession...
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookM(0x1f2233be8, '_onqueue_didReceiveChallenge:request:withCompletion:', 0x104d0d4ac, 0x104d105d8);
Nov 8 20:56:50 corespeechd(SSLKillSwitch2.dylib)[11357] <Notice>: === SSL Kill Switch 3: [verb] [init] hookM(0x1ed1f6948, '_onqueue_sendSessionChallenge:completionHandler:', 0x104d0d658, 0x104d105e0);
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [info] Using LogLevel = 10
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [info] Preference set to 1.
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [info] Hook enabled.
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [info] iOS 13+ detected
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('/usr/lib/libboringssl.dylib', 'SSL_set_custom_verify', 0x1046ec738, 0x1046f0558);
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x1bf13db10 -> 0x1bf13db10
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SSL_set_custom_verify ptr 0x1bf13db10, from 0xb4000068f9400408 0xf90019023904c101 0x79468008d65f03c0 to 0xd61f020058000050 0x1046ec738 0x79468008d65f03c0
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('/usr/lib/libboringssl.dylib', 'SSL_get_psk_identity', 0x1046eb5bc, 0x0);
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x1bf13e1b8 -> 0x1bf13e1b8
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SSL_get_psk_identity ptr 0x1bf13e1b8, from 0x910003fda9bf7bfd 0x94008cb9b4000080 0xf9404400b4000040 to 0xd61f020058000050 0x1046eb5bc 0xf9404400b4000040
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [info] Hooking Security framework...
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecIsInternalRelease', 0x1046ecdc4, 0x1046f05a0);
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e745864 -> 0x19e745864
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecIsInternalRelease ptr 0x19e745864, from 0x91012000d00009c0 0xa9bd57f615943c41 0xa9027bfda9014ff4 to 0x91012000d4200020 0xa9bd57f615943c41 0xa9027bfda9014ff4
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluate', 0x1046ece68, 0x1046f05a8);
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e812dfc -> 0x19e812dfc
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [info] SecTrustEvaluate jumps to 0x19e7357a4: a9054ff4d101c3ff, hook new addr instead!
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluate ptr 0x19e812dfc, from 0xd10103ff17fc8a6a 0xa9037bfda9024ff4 0x902644a89100c3fd to 0xd10103ff17fc8a6a 0xa9037bfda9024ff4 0x902644a89100c3fd
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluateAsync', 0x1046ecf60, 0x1046f05b0);
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e813ff8 -> 0x19e813ff8
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluateAsync ptr 0x19e813ff8, from 0xa90357f6d10183ff 0xa9057bfda9044ff4 0xaa0203f4910143fd to 0xd61f020058000050 0x1046ecf60 0xaa0203f4910143fd
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluateWithError', 0x1046ed094, 0x1046f05b8);
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e746148 -> 0x19e746148
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluateWithError ptr 0x19e746148, from 0xa9014ff4d100c3ff 0x910083fda9027bfd 0xaa0003f4aa0103f3 to 0xd61f020058000050 0x1046ed094 0xaa0003f4aa0103f3
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluateAsyncWithError', 0x1046ed1a0, 0x1046f05c0);
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e814dc8 -> 0x19e814dc8
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluateAsyncWithError ptr 0x19e814dc8, from 0xa90357f6d10183ff 0xa9057bfda9044ff4 0xaa0003f4910143fd to 0xd61f020058000050 0x1046ed1a0 0xaa0003f4910143fd
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluateFastAsync', 0x1046ed2d4, 0x1046f05c8);
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e8140dc -> 0x19e8140dc
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluateFastAsync ptr 0x19e8140dc, from 0xa90357f6d10183ff 0xa9057bfda9044ff4 0xaa0003f4910143fd to 0xd61f020058000050 0x1046ed2d4 0xaa0003f4910143fd
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustSetPolicies', 0x1046ed408, 0x1046f05d0);
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e810a58 -> 0x19e810a58
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustSetPolicies ptr 0x19e810a58, from 0x6d0723e9d10383ff 0xa90967faa9086ffc 0xa90b57f6a90a5ff8 to 0xd61f020058000050 0x1046ed408 0xa90b57f6a90a5ff8
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [info] Hooking URLSession...
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookM(0x1f2233be8, '_onqueue_didReceiveChallenge:request:withCompletion:', 0x1046ed4ac, 0x1046f05d8);
Nov 8 20:56:50 OTATaskingAgent(SSLKillSwitch2.dylib)[11358] <Notice>: === SSL Kill Switch 3: [verb] [init] hookM(0x1ed1f6948, '_onqueue_sendSessionChallenge:completionHandler:', 0x1046ed658, 0x1046f05e0);
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [info] Using LogLevel = 10
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [info] Preference set to 1.
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [info] Hook enabled.
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [info] iOS 13+ detected
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('/usr/lib/libboringssl.dylib', 'SSL_set_custom_verify', 0x102c6c738, 0x102c70558);
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x1bf13db10 -> 0x1bf13db10
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SSL_set_custom_verify ptr 0x1bf13db10, from 0xb4000068f9400408 0xf90019023904c101 0x79468008d65f03c0 to 0xd61f020058000050 0x102c6c738 0x79468008d65f03c0
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('/usr/lib/libboringssl.dylib', 'SSL_get_psk_identity', 0x102c6b5bc, 0x0);
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x1bf13e1b8 -> 0x1bf13e1b8
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SSL_get_psk_identity ptr 0x1bf13e1b8, from 0x910003fda9bf7bfd 0x94008cb9b4000080 0xf9404400b4000040 to 0xd61f020058000050 0x102c6b5bc 0xf9404400b4000040
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [info] Hooking Security framework...
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecIsInternalRelease', 0x102c6cdc4, 0x102c705a0);
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e745864 -> 0x19e745864
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecIsInternalRelease ptr 0x19e745864, from 0x91012000d00009c0 0xa9bd57f615943c41 0xa9027bfda9014ff4 to 0x91012000d4200020 0xa9bd57f615943c41 0xa9027bfda9014ff4
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluate', 0x102c6ce68, 0x102c705a8);
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e812dfc -> 0x19e812dfc
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [info] SecTrustEvaluate jumps to 0x19e7357a4: a9054ff4d101c3ff, hook new addr instead!
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluate ptr 0x19e812dfc, from 0xd10103ff17fc8a6a 0xa9037bfda9024ff4 0x902644a89100c3fd to 0xd10103ff17fc8a6a 0xa9037bfda9024ff4 0x902644a89100c3fd
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluateAsync', 0x102c6cf60, 0x102c705b0);
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e813ff8 -> 0x19e813ff8
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluateAsync ptr 0x19e813ff8, from 0xa90357f6d10183ff 0xa9057bfda9044ff4 0xaa0203f4910143fd to 0xd61f020058000050 0x102c6cf60 0xaa0203f4910143fd
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluateWithError', 0x102c6d094, 0x102c705b8);
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e746148 -> 0x19e746148
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluateWithError ptr 0x19e746148, from 0xa9014ff4d100c3ff 0x910083fda9027bfd 0xaa0003f4aa0103f3 to 0xd61f020058000050 0x102c6d094 0xaa0003f4aa0103f3
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluateAsyncWithError', 0x102c6d1a0, 0x102c705c0);
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e814dc8 -> 0x19e814dc8
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluateAsyncWithError ptr 0x19e814dc8, from 0xa90357f6d10183ff 0xa9057bfda9044ff4 0xaa0003f4910143fd to 0xd61f020058000050 0x102c6d1a0 0xaa0003f4910143fd
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluateFastAsync', 0x102c6d2d4, 0x102c705c8);
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e8140dc -> 0x19e8140dc
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluateFastAsync ptr 0x19e8140dc, from 0xa90357f6d10183ff 0xa9057bfda9044ff4 0xaa0003f4910143fd to 0xd61f020058000050 0x102c6d2d4 0xaa0003f4910143fd
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustSetPolicies', 0x102c6d408, 0x102c705d0);
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e810a58 -> 0x19e810a58
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustSetPolicies ptr 0x19e810a58, from 0x6d0723e9d10383ff 0xa90967faa9086ffc 0xa90b57f6a90a5ff8 to 0xd61f020058000050 0x102c6d408 0xa90b57f6a90a5ff8
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [info] Hooking URLSession...
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookM(0x1f2233be8, '_onqueue_didReceiveChallenge:request:withCompletion:', 0x102c6d4ac, 0x102c705d8);
Nov 8 20:56:51 GenericKextUpdaterService(SSLKillSwitch2.dylib)[11359] <Notice>: === SSL Kill Switch 3: [verb] [init] hookM(0x1ed1f6948, '_onqueue_sendSessionChallenge:completionHandler:', 0x102c6d658, 0x102c705e0);
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [info] Using LogLevel = 10
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [info] Preference set to 1.
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [info] Hook enabled.
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [info] iOS 13+ detected
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('/usr/lib/libboringssl.dylib', 'SSL_set_custom_verify', 0x100f9c738, 0x100fa0558);
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x1bf13db10 -> 0x1bf13db10
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SSL_set_custom_verify ptr 0x1bf13db10, from 0xb4000068f9400408 0xf90019023904c101 0x79468008d65f03c0 to 0xd61f020058000050 0x100f9c738 0x79468008d65f03c0
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('/usr/lib/libboringssl.dylib', 'SSL_get_psk_identity', 0x100f9b5bc, 0x0);
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x1bf13e1b8 -> 0x1bf13e1b8
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SSL_get_psk_identity ptr 0x1bf13e1b8, from 0x910003fda9bf7bfd 0x94008cb9b4000080 0xf9404400b4000040 to 0xd61f020058000050 0x100f9b5bc 0xf9404400b4000040
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [info] Hooking Security framework...
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecIsInternalRelease', 0x100f9cdc4, 0x100fa05a0);
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e745864 -> 0x19e745864
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecIsInternalRelease ptr 0x19e745864, from 0x91012000d00009c0 0xa9bd57f615943c41 0xa9027bfda9014ff4 to 0x91012000d4200020 0xa9bd57f615943c41 0xa9027bfda9014ff4
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluate', 0x100f9ce68, 0x100fa05a8);
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e812dfc -> 0x19e812dfc
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [info] SecTrustEvaluate jumps to 0x19e7357a4: a9054ff4d101c3ff, hook new addr instead!
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluate ptr 0x19e812dfc, from 0xd10103ff17fc8a6a 0xa9037bfda9024ff4 0x902644a89100c3fd to 0xd10103ff17fc8a6a 0xa9037bfda9024ff4 0x902644a89100c3fd
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluateAsync', 0x100f9cf60, 0x100fa05b0);
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e813ff8 -> 0x19e813ff8
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluateAsync ptr 0x19e813ff8, from 0xa90357f6d10183ff 0xa9057bfda9044ff4 0xaa0203f4910143fd to 0xd61f020058000050 0x100f9cf60 0xaa0203f4910143fd
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluateWithError', 0x100f9d094, 0x100fa05b8);
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e746148 -> 0x19e746148
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluateWithError ptr 0x19e746148, from 0xa9014ff4d100c3ff 0x910083fda9027bfd 0xaa0003f4aa0103f3 to 0xd61f020058000050 0x100f9d094 0xaa0003f4aa0103f3
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluateAsyncWithError', 0x100f9d1a0, 0x100fa05c0);
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e814dc8 -> 0x19e814dc8
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluateAsyncWithError ptr 0x19e814dc8, from 0xa90357f6d10183ff 0xa9057bfda9044ff4 0xaa0003f4910143fd to 0xd61f020058000050 0x100f9d1a0 0xaa0003f4910143fd
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustEvaluateFastAsync', 0x100f9d2d4, 0x100fa05c8);
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e8140dc -> 0x19e8140dc
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustEvaluateFastAsync ptr 0x19e8140dc, from 0xa90357f6d10183ff 0xa9057bfda9044ff4 0xaa0003f4910143fd to 0xd61f020058000050 0x100f9d2d4 0xaa0003f4910143fd
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecTrustSetPolicies', 0x100f9d408, 0x100fa05d0);
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e810a58 -> 0x19e810a58
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SecTrustSetPolicies ptr 0x19e810a58, from 0x6d0723e9d10383ff 0xa90967faa9086ffc 0xa90b57f6a90a5ff8 to 0xd61f020058000050 0x100f9d408 0xa90b57f6a90a5ff8
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [info] Hooking URLSession...
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookM(0x1f2233be8, '_onqueue_didReceiveChallenge:request:withCompletion:', 0x100f9d4ac, 0x100fa05d8);
Nov 8 20:56:52 adid(SSLKillSwitch2.dylib)[11360] <Notice>: === SSL Kill Switch 3: [verb] [init] hookM(0x1ed1f6948, '_onqueue_sendSessionChallenge:completionHandler:', 0x100f9d658, 0x100fa05e0);
Nov 8 20:56:56 mtmergeprops(SSLKillSwitch2.dylib)[11361] <Notice>: === SSL Kill Switch 3: [info] Using LogLevel = 10
Nov 8 20:56:56 mtmergeprops(SSLKillSwitch2.dylib)[11361] <Notice>: === SSL Kill Switch 3: [info] Preference set to 1.
Nov 8 20:56:56 mtmergeprops(SSLKillSwitch2.dylib)[11361] <Notice>: === SSL Kill Switch 3: [info] Hook enabled.
Nov 8 20:56:56 mtmergeprops(SSLKillSwitch2.dylib)[11361] <Notice>: === SSL Kill Switch 3: [info] iOS 13+ detected
Nov 8 20:56:56 mtmergeprops(SSLKillSwitch2.dylib)[11361] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('/usr/lib/libboringssl.dylib', 'SSL_set_custom_verify', 0x102484738, 0x102488558);
Nov 8 20:56:56 mtmergeprops(SSLKillSwitch2.dylib)[11361] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x1bf13db10 -> 0x1bf13db10
Nov 8 20:56:56 mtmergeprops(SSLKillSwitch2.dylib)[11361] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SSL_set_custom_verify ptr 0x1bf13db10, from 0xb4000068f9400408 0xf90019023904c101 0x79468008d65f03c0 to 0xd61f020058000050 0x102484738 0x79468008d65f03c0
Nov 8 20:56:56 mtmergeprops(SSLKillSwitch2.dylib)[11361] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('/usr/lib/libboringssl.dylib', 'SSL_get_psk_identity', 0x1024835bc, 0x0);
Nov 8 20:56:56 mtmergeprops(SSLKillSwitch2.dylib)[11361] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x1bf13e1b8 -> 0x1bf13e1b8
Nov 8 20:56:56 mtmergeprops(SSLKillSwitch2.dylib)[11361] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF result: func SSL_get_psk_identity ptr 0x1bf13e1b8, from 0x910003fda9bf7bfd 0x94008cb9b4000080 0xf9404400b4000040 to 0xd61f020058000050 0x1024835bc 0xf9404400b4000040
Nov 8 20:56:56 mtmergeprops(SSLKillSwitch2.dylib)[11361] <Notice>: === SSL Kill Switch 3: [info] Hooking Security framework...
Nov 8 20:56:56 mtmergeprops(SSLKillSwitch2.dylib)[11361] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF('(null)', 'SecIsInternalRelease', 0x102484dc4, 0x1024885a0);
Nov 8 20:56:56 mtmergeprops(SSLKillSwitch2.dylib)[11361] <Notice>: === SSL Kill Switch 3: [verb] [init] hookF resolved pFunc -> 0x19e745864 -> 0x19e745864
@P5-2005 give me the crash log pls
don't know why. I believe it's an ellekit bug.
don't know why. I believe it's an ellekit bug.
iirc ellekit dev said there is one bug to be fixed(seeing this on twitter) so i thought is only the new build not current one, but im not aware is related with that bug, i used ellekit from sileo for sure not the last one @evelyneee
Try using the ellekit 1.1 build on my twitter
Try using the ellekit 1.1 build on my twitter CrashLog-ellekit_1.0-21.4cf7883_iphoneos-arm64.txt got the deb as you mentionned : https://x.com/eveiyneee/status/1715778690297090060?s=46
@P5-2005 That's a system panic lol. eve got things to do ;)
I finally got ElleKit 1.1 on corellium, so issues should be fixed soon
@P5-2005 That's a system panic lol. eve got things to do ;)
tbh only the build from twitter got that full panic, the one on sileo repo no full panic at all, only stuck on apple logo or blackscreen when using sslkillswitch and reboot userspace or booting jailbroken and tweak is enabled
Can you test the ElleKit 1.1 from the repo
Can you test the ElleKit 1.1 from the repo used last ellekit, also used last sslkill, here next boot jailbroken log, also still same issue when doing reboot userspace nextboot-jailbroken.txt
Hi team,
I installed this on my iPhone 6s on iOS 15.7.9 but it does not work for different apps when proxy is turned on.
But i am able to achieve this using Objection framework to bypass ssl pining.