ssl-kill-switch2
TrustKit
ssl-kill-switch2 | TrustKit | |
---|---|---|
7 | 1 | |
2,993 | 1,977 | |
- | 1.0% | |
0.0 | 4.7 | |
11 months ago | 19 days ago | |
Objective-C | C | |
GNU General Public License v3.0 or later | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ssl-kill-switch2
- [$50][14.5.1][OPT] SSL Kill Switch / Bypass
- SSL Kill Switch / Bypass not working on 14.5.X
-
Is this networking knowledge enough ?
Another tip is looking at the source code of well-known tools that feature root/jailbreak/cert pinning bypasses like Objection, SSL Kill Switch 2, and Shadow to learn reverse engineering stuff.
- [Free Release] SSLUnpin
-
[$50][14] SSL Kill Switch 2 Update Needed
Sadly, the tweak (source: https://github.com/nabla-c0d3/ssl-kill-switch2) doesn't work on iOS 14 after installing (and calling Frida every time to disable Certificate Pinning is too annoying). Will gladly pay $50 to anyone that makes it work on A8 devices (I'm using iPad Mini 4) on iOS 14 (I'm using iOS 14.4.2). Thanks.
-
Clubhouse data leak: 1.3M user records leaked online for free
Jailbreaking an iPhone and using a tool like SSL Kill Switch [1] or just plain, old Frida with a script like [2] will do the job. Jailbreaking is the hard part, especially for an up to date iPhone, after that there's loads of guides you can follow that disable certificate validation for pretty much every application. It all boils down to hooking the necessary validation functions and having the APIs lie to the app code.
Some apps package their own crypto helpers (often with big crypto problems) to make this harder and require actual reverse engineering, but those are a pain to maintain and it's only a matter of time before someone finds a way around them. If you can extract the symbols (so if the app has not been obfuscated well) you can use Frida's API to hook those as well through any language you like. There's even an interactive Javascript console you can hook into the apps you're hooking!
Certificate pinning is a great way to protect users' security and privacy, especially in countries with questionable governments or ISPs, but it won't protect your app's secrets.
[1]: https://github.com/nabla-c0d3/ssl-kill-switch2
TrustKit
-
Securing API keys, clientId, clientSecret etc while distributing to App Store? Ways to prevent reverse engineering?
Good points. SSL pinning provides a certain level of protection. It’s tricky to implement correctly, so one can for instance consider https://github.com/datatheorem/TrustKit if you want to leverage SSL pinning.
What are some alternatives?
SSLUnpin - Bypass SSL pinning on iOS 8 to iOS 14
owasp-mastg - The Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the controls listed in the OWASP Mobile Application Security Verification Standard (MASVS).
SSLBypass - iOS SSL Pinning Bypass (iOS 8 - 14)
vger - 2D GPU renderer for dynamic UIs
shadow - A jailbreak detection bypass for modern iOS jailbreaks.
ffmpeg-kit - FFmpeg Kit for applications. Supports Android, Flutter, iOS, Linux, macOS, React Native and tvOS. Supersedes MobileFFmpeg, flutter_ffmpeg and react-native-ffmpeg.
MonkeyDev - CaptainHook Tweak、Logos Tweak and Command-line Tool、Patch iOS Apps, Without Jailbreak.
TrustKit-Android - Easy SSL pinning validation and reporting for Android.
IPAPatch - Patch iOS Apps, The Easy Way, Without Jailbreak.
Provenance - iOS & tvOS multi-emulator frontend, supporting various Atari, Bandai, NEC, Nintendo, Sega, SNK and Sony console systems… Get Started: https://wiki.provenance-emu.com |
plcrashreporter - Reliable, open-source crash reporting for iOS, macOS and tvOS
Down - Blazing fast Markdown / CommonMark rendering in Swift, built upon cmark.