jjolano / shadow

A jailbreak detection bypass for modern iOS jailbreaks.
https://ios.jjolano.me
BSD 3-Clause "New" or "Revised" License
798 stars 131 forks source link

Bertha Jailbreak Detection #17

Closed TheNoim closed 4 years ago

TheNoim commented 5 years ago

Could you please look into Bertha by Mercedes Benz (https://apps.apple.com/de/app/bertha-deine-tank-app/id1427658183) Shadow doesn't seem to do anything there.

jjolano commented 5 years ago

Unfortunately this app is not available in my region. What happens when you launch the app? Also, have you tried enabling Lockdown Mode (and maybe filtering dynamic linker)?

TheNoim commented 5 years ago

I tried every setting of shadow and reinstalled the app always, to make sure the app does not save anything related to the "block". Also I checked whether the app checks if the device is blacklists. However, it doesn't do any request to a server while launching. I am not experienced enough in reverse engineering to bypass the detection by myself. I had no luck with class dump or frida. There is a jailbreak related class, but it is empty. I could extract the ipa for you and send it over.

image

jjolano commented 5 years ago

Sure, if you can decrypt the app and send it I can have a look.

TheNoim commented 5 years ago

I already decrypted it. Where should I send it? I don’t think it is a good idea to upload it public and post it here. On 1. Aug 2019, 18:43 +0200, jjolano notifications@github.com, wrote:

Sure, if you can decrypt the app and send it I can have a look. — You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub, or mute the thread.

jjolano commented 5 years ago

Send me a link via DM on reddit: https://www.reddit.com/user/jjolano