Category Archives: iOS

The State of Security: New iOS Bug Crashes Apple Devices, Blocks Access to Apps and iMessages

A new bug in certain versions of Apple’s operating system can cause iPhones, Macs and even Apple Watches to crash, blocking access to iMessages and other popular apps. As reported by Italian blog Mobile World, the bug affects devices running iOS11 when an Indian language (Telugu) character is received or simply typed in a text field. […]… Read More

The post New iOS Bug Crashes Apple Devices, Blocks Access to Apps and iMessages appeared first on The State of Security.



The State of Security

New iOS Bug Crashes Apple Devices, Blocks Access to Apps and iMessages

A new bug in certain versions of Apple’s operating system can cause iPhones, Macs and even Apple Watches to crash, blocking access to iMessages and other popular apps. As reported by Italian blog Mobile World, the bug affects devices running iOS11 when an Indian language (Telugu) character is received or simply typed in a text field. […]… Read More

The post New iOS Bug Crashes Apple Devices, Blocks Access to Apps and iMessages appeared first on The State of Security.

Facebook Offers A VPN Client Under ‘Protect’ Option For iOS

Is Facebook-owned ‘Onavo Protect’ app, a spyware?

Facebook who is no stranger to privacy-related controversy has adopted a novel way to collect and track its users’ data that gives information about their online habits.

Apparently, Facebook is pushing its users to download and install a Facebook-owned VPN client called “Onavo Protect” on their devices under the pretext of protecting their account. VPN (short for virtual private network) is used to safeguard users’ online privacy and keep their IP address anonymous particularly when using public Wi-Fi networks by creating a secure connection to another network over the Internet. However, Onavo Protect is just doing exactly the opposite. In fact, the VPN client is tracking users’ apps, how often they are used and what websites users visit and is sending these information back to Facebook.

However, this VPN client has been added only to the iOS platform of mobile app and not the Android app, according to TechCrunch, who were the first to spot the new “Protect” option under the “Apps” section on the Facebook mobile iOS app. On clicking this option, the user will be directed to Apple’s App Store and pushed to download Onavo Protect VPN.

In a statement to TechCrunch, Facebook has confirmed that it had recently started rolling out the Onavo Protect app access directly from its iOS app. “We recently began letting people in the US access Onavo Protect from the Facebook app on their iOS devices. Like other VPNs, it acts as a secure connection to protect people from potentially harmful sites. The app may collect your mobile data traffic to help us recognise tactics that bad actors use. Over time, this helps the tool work better for you and others. We let people know about this activity and other ways that Onavo uses and analyses data before they download it,” said Erez Naveh, Product Manager at Onavo in the statement.

It is unclear how Facebook is planning to influence the user data it will collect through the Onavo Protect app. While the app claims to ‘keep your data safe’ and add an extra layer of protection to your mobile traffic by routing it through their servers, the description of the app throws light on how the service work.

It reads, “Onavo uses a VPN to establish a secure connection to direct all of your network communications through Onavo’s servers. As part of this process, Onavo collects your mobile data traffic. This helps us improve and operate the Onavo service by analyzing your use of websites, apps and data. Because we’re part of Facebook, we also use this info to improve Facebook products and services, gain insights into the products and services people value, and build better experiences.”

While many have called the Onavo Protect app as a spyware, others who are unaware might never know that Facebook uses the data from the app for marketing purposes. However, the good news is that the app is not activated by default and requires you to navigate to the Protect tab in the app’s settings, and then install the app yourself. Those users who are unsure about the app, should refrain from installing it.

Source: NDTV, Neowin

The post Facebook Offers A VPN Client Under ‘Protect’ Option For iOS appeared first on TechWorm.

Apple’s Software ‘Problem’ and ‘Fixing’ It

According to media reports, Apple is planning to postpone some new features for iOS and macOS this year to focus on improving reliability, stability and performance of the existing versions. Steven Sinofsky, a former President of the Windows Division, shared his insights into the significance of this development: Several important points are conflated in the broad discussion about Apple and software: Quality, pace of change, features "versus" quality, and innovation. Scanning the landscape, it is important to recognize that in total the work Apple has been doing across hardware, software, services, and even AI/ML, in total -- is breathtaking and unprecedented in scope, scale, and quality. Few companies have done so much for so long with such a high level of consistency. This all goes back to the bet on the NeXT code base and move to Intel for Mac OS plus the iPod, which began the journey to where we are today. [...] What is lost in all of this recent discussion is the nuance between features, schedule, and quality. It is like having a discussion with a financial advisor over income, risk, and growth. You don't just show up and say you want all three and get a "sure." On the other hand, this is precisely what Apple did so reliably over 20 years. But behind the scenes there is a constant discussion over balancing these three legs of the tripod. You have to have all of them but you "can't" but you have to. This is why they get paid big $. [...] A massive project like an OS (+h/w +cloud) is like a large investment portfolio and some things will work (in market) and others won't, some things are designed to return right away, some are safe bets, some are long term investments. And some mistakes... Customers don't care about any of that and that's ok. They just look for what they care about. Each evaluates through their own lens. Apple's brilliance is in focusing mostly on two audiences -- Send-users and developers -- tending to de-emphasize the whole "techie" crowd, even IT. When you look at a feature like FaceID and trace it backwards all the way to keychain -- see how much long term thought can go into a feature and how much good work can go unnoticed (or even "fail") for years before surfacing as a big advantage. That's a long term POV AND focus. This approach is rather unique compared to other tech companies that tend to develop new things almost independent of everything else. So new things show up and look bolted on the side of what already exists. (Sure Apple can do that to, but not usually). All the while while things are being built the team is just a dev team and trying to come up with a reliable schedule and fix bug. This is just software development.

Read more of this story at Slashdot.

Apple Intern Reportedly Leaked iPhone Source Code

Earlier this week, a portion of iOS source code was posted online to GitHub, and in an interesting twist, a new report from Motherboard reveals that the code was originally leaked by a former Apple intern. The Verge reports: According to Motherboard, the intern who stole the code took it and distributed it to a small group of five friends in the iOS jailbreaking community in order to help them with their ongoing efforts to circumvent Apple's locked down mobile operating system. The former employee apparently took "all sorts of Apple internal tools and whatnot," according to one of the individuals who had originally received the code, including additional source code that was apparently not included in the initial leak. The plan was originally to make sure that the code never left the initial circle of five friends, but apparently the code spread beyond the original group sometime last year. Eventually, the code was then posted in a Discord chat group, and was shared to Reddit roughly four months ago (although that post was apparently removed by a moderation bot automatically). But then, it was posted again to GitHub this week, which is when things snowballed to where they are now, with Apple ordering GitHub to remove the code.

Read more of this story at Slashdot.

EFF Seeks Right to Jailbreak Alexa, Voice Assistants

The Electronic Frontier Foundation (EFF) is asking the Library of Congress to give owners of voice assistant devices like Amazon’s Echo, Google Home and other voice assistants the right to “jailbreak” the devices: freeing them from content control features designed to prevent users from running unauthorized code on those...

Read the whole entry... »

Related Stories

Apple Says the Leaked iPhone Source Code is Outdated

Apple has responded to security concerns surrounding leaked iPhone source code, pointing out that any potential vulnerabilities would be outdated. From a report: "Old source code from three years ago appears to have been leaked," Apple said in a statement, "but by design the security of our products doesn't depend on the secrecy of our source code. There are many layers of hardware and software protections built in to our products, and we always encourage customers to update to the newest software releases to benefit from the latest protections." The iBoot source code for iOS 9, a core part of what keeps your iPhones and iPads secure when they turn on, was leaked on GitHub, Motherboard first reported. The source code leak was considered a major security issue for Apple, as hackers could dig through it and search for any vulnerabilities in iBoot. Apple had used a DMCA notice to get the Github page hosting the leaked code taken down, but multiple copies of the code have already spread online.

Read more of this story at Slashdot.

Key iPhone Source Code Gets Posted On GitHub

Jason Koebler shares a report from Motherboard: An anonymous person posted what experts say is the source code for a core component of the iPhone's operating system on GitHub, which could pave the way for hackers and security researchers to find vulnerabilities in iOS and make iPhone jailbreaks easier to achieve. The code is for "iBoot," which is the part of iOS that is responsible for ensuring a trusted boot of the operating system. It's the program that loads iOS, the very first process that runs when you turn on your iPhone. The code says it's for iOS 9, an older version of the operating system, but portions of it are likely to still be used in iOS 11. Bugs in the boot process are the most valuable ones if reported to Apple through its bounty program, which values them at a max payment of $200,000. "This is the biggest leak in history," Jonathan Levin, the author of a series of books on iOS and Mac OSX internals, told Motherboard in an online chat. "It's a huge deal." Levin, along with a second security researcher familiar with iOS, says the code appears to be the real iBoot code because it aligns with the code he reverse engineered himself.

Read more of this story at Slashdot.

Bug in iOS 11.3 beta 1 refuses to connect to secure Wi-Fi network

Wi-Fi bug in iOS 11.3 beta 1 compelling users to downgrade

About a week ago, Apple had released its first beta version for iOS 11.3. However, it appears that users who are testing this beta version experiencing difficulties due to some nasty bugs.

For instance, the Skype application crashes every time it is launched making it difficult for users who heavily depend on it. Secondly, while some users complained about the inability of iOS 11.3 beta 1 to connect to secured Wi-Fi networks, however, they were not facing any problems while connecting to open/unsecured Wi-Fi networks.

my iPad Mini 2 with 11.3 Public Beta can connect with my wifi network now. But, I must to turn off my wifi password first on router settings

Same issue here. I have an iPad Air, and after updating the software it would no longer log in to any of my wi-fi networks or iCloud account.

First any WiFi with encryption password does not work (WEP, WPA2). Open WiFi works (with or without captive portal)

Other users who managed to connect to open Wi-Fi network reported Apple ID related problems:

I am having the same issue, although I created a unsecure Wifi network (locked down to MAC address) and it connects. Another problem I have come across since the 11.3 (15E5167f) update, it wont accept my apple ID password “verification failed” so other issue there. Awaiting fix!

I was able to by pass the wifi by going to public wifi without any password….the problem with 11.3 beta is the apple ID verification process….it failed even after reset all settings.

According to reports, at least one user has been contacted by Apple for more information about the bug. However, that person had already downgraded to iOS 11.2.5 to fix the problem.

If you too are facing this connectivity problem after installing iOS 11.3 beta 1, you will need to downgrade to the latest stable version (iOS 11.2.5), or wait for the beta 2 release.

Source: piunikaweb

The post Bug in iOS 11.3 beta 1 refuses to connect to secure Wi-Fi network appeared first on TechWorm.

There May Not Be An iPhone SE 2 After All

KGI Securities analyst Ming-Chi Kuo issued a research note today that casts doubt on rumors about a second-generation iPhone SE launching in the second quarter of 2018. If there is a successor, customers can expect a minor update that amounts to a run-of-the-mill spec boost and no new features like wireless charging or Face ID. The Verge reports: According to Kuo, between the three phones Apple released last year (iPhone 8, 8 Plus, and X) and the three phones rumored to be released this fall, the company may not have enough development resources for an SE follow up as a fourth phone for 2018. That said, Kuo also does acknowledge that a basic processor update could still happen, but it seems that SE fans should keep expectations low. The iPhone SE still fills an interesting place in Apple's lineup. It uses the same design as the iPhone 5, which was released in 2012, with the 2015 internals of an iPhone 6s. This means the current model would get a boost in processor speed -- something that will likely continue to get worse with the presumed release of iOS 12 this fall. But SE is still popular for its low price and smaller size among consumers. Compared to the giant 6-inch-plus phones Apple is rumored to be releasing this year, it could make sense to keep an updated version of the smaller SE around.

Read more of this story at Slashdot.

How to Convert and Copy a DVD to Your PC, iOS and Android Gadgets?

Sometimes, you may want a copy of your DVD collection on your computer. Therefore you can watch it at any time, and don’t have to necessarily have the DVD disc on hand every time. Or perhaps, you need to make a backup of DVD just in case of losing the DVD content when it’s damaged.

To meet the demands, we highly recommend a program that allows you to copy protected DVDs on your PC and convert the content into one of common formats. That is WonderFox DVD Ripper Pro, which is excellent and can accomplish copying a DVD to your computer with just a few steps.

Note: WonderFox DVD Ripper Pro can be used to keep backups of your purchased DVDs for personal use. Please don’t use it for illegal sale.

Now, let’s start to learn more about the program. And also, here below is how to copy and convert a protected DVD to your PC with WonderFox DVD Ripper Pro.

WonderFox DVD Ripper Pro is one of the best Windows 10 DVD Ripper programs which help you create copies of DVDs and save them to your computer and portable devices. It is an alternative to HandBrake and DVD Shrink, giving the user the possibility to enjoy safe DVD movie backup without difficulty.

The software is full-featured. And after installing the program, you can see that it has an intuitive interface. There are 3 source options: DVD Disc, ISO Image, and DVD Folder. That means it can also convert and copy video_ts to MP4, MOV, and more common formats.

How to Convert and Copy a DVD to Your PC, iOS and Android Gadgets?

We press the DVD Disc button. And the program begins to analyze and decrypts the DVD. The time for analyzing depends on DVD data amount, your hard drive, etc. After a little while, we’ll see a new interface. See the image below. The program has already selected the right main movie of the DVD. Well, you can also choose the other content, such as Ads, to meet the best of your own needs.

How to Convert and Copy a DVD to Your PC, iOS and Android Gadgets?

And then you can convert it to a video format from its supported format lists on the right, including MP4, AVI, H.264, MPG, MKV, MOV and more. Besides, converting movie to audio like MP3, WAV, FLAV, ALAC, DTS, AAC, etc. is also available.

An interesting feature is that WonderFox DVD Ripper Pro can convert DVD to formats compatible with a wide range of gadgets such as iPhone, iPad, Apple TV, Samsung phones and tablets, HUAWEI devices, Windows Phone and other models of Android smartphones and tablets.After choosing a target output format or profile, press RUN at the right bottom.

Acquire a Licensed Copy with Special Discount

WonderFox DVD Ripper Pro provides the best, quickest and easiest way to convert DVD to digital copy. Readers of this review can take advantage of a time-limited offer to get a licensed copy with 50% discount.

The post How to Convert and Copy a DVD to Your PC, iOS and Android Gadgets? appeared first on TechWorm.

Apple offers another Meltdown fix for Mac users…

For Apple users worried about the Spectre and Meltdown CPU security vulnerabilities, it’s been a busy and slightly confusing few weeks.

Smashing Security #062: Tinder spying, Amazon shoplifting, and petrol pump malware

Smashing Security #062: Tinder spying, Amazon shoplifting, and petrol pump malware

Your Tinder swipes can be spied upon, Amazon is opening high street stores that don't require any staff, and Russian fuel pumps are being infected with malware in an elaborate scheme to make large amounts of money.

With Carole on a top secret special assignment, it's left to security veteran Graham Cluley to discuss all this and much much more on the "Smashing Security" podcast with special guests David McClelland and Vanja Švajcer.

Apple Will Soon Let Users Turn Off its iPhone-slowing Software

Following an uproar from customers last month, Apple on Wednesday said it's adding a feature to its latest iOS update that will let customers turn off software that slows down their iPhones. From a report: Apple in December revealed that it released software a year earlier that makes your phone run more slowly to prevent problems with its aging lithium ion battery, such as unexpected shutdowns. As part of the new iOS 11.3 update, iPhone users will get a recommendation if a battery needs to be serviced. Plus, they will be able to see if the power management feature that slows the phone's performance is on and can choose to turn it off, the company said Wednesday.

Read more of this story at Slashdot.

DuckDuckGo offers new privacy extension and app

DuckDuckGo, the company behind the eponymous privacy-minded Internet search engine, has announced a new browser extension and mobile app: DuckDuckGo Privacy Essentials. DuckDuckGo Privacy Essentials does four things: It makes DuckDuckGo the default search engine (this features is optional – it can be switched off). Forces websites to serve users with an encrypted version (i.e., HTTPS version) of the site – if it’s available. Blocks all hidden, third-party trackers it can find and provides users … More

chaiOS Bug can crash iMessage App on any iPhone and macOS with a simple link

The software developer Abraham Masri has discovered a new bug, dubbed ‘chaiOS’ that could be exploited to crash a target’s iMessage application.

The researcher and software developer Abraham Masri has discovered a new bug, dubbed ‘chaiOS  Text Bomb’ that could be exploited to crash recipient’s iMessage application in a continuous loop.

The flaw exploited by the ‘chaiOS  Text Bomb’ affects both iOS and macOS, according to researchers at Yalu Jailbreak, the bug is currently compatible up till iOS 11.1.2 firmware, this means that it affects iMessage apps on macOS High Sierra, iOS 10 to 10.3.3, and iOS 11 to 11.2.1.

The exploitation of the issue is very simple, an attacker just needs to send a link to a web page hosting a JavaScript code that attempts to send an SMS message. The iMessage application fails to properly handle the code triggering the crash of the app. In some cases, it has been observed that the iMessage app enters a continuous reboot loop.

A proof-of-concept page has been put together by Masri and shared on Twitter yesterday, but the page has been removed from GitHub due to potential abuses, anyway, a new mirror has been already added.

chaiOS is a malicious iOS bug that can cause the target device to freeze, respring, drain the battery, and possibly kernel panic. It is developed by the eminent jailbreak developer, Abraham Masri.

Here are the known after-effects once someone opens the malicious link.

  • The stock Messages app goes completely blank.
  • Messages app crashes instantly after opening.
  • Slowdown the target device.

It weighs around 7MB and loads some the exploit into user’s browser window and then crashes it.” states  Yalu Jailbreak.

iphone chaiOS Bug

Below is a video PoC of the exploitation of the bug:

Researchers observed that the chaiOS Text Bomb can also affect Windows systems, it can also crash Chrome and Firefox web browsers.

The download link to the chaiOS is reported on the following page, but please don’t use it.

https://yalujailbreak.net/chaios/

Below instructions to trigger the bug:

  • Open the Messages app.
  • Select the recipient whose device you want to crash.
  • Send them the aforementioned link. Be sure to include a “/” at the end.
  • You are done with this now. Just wait for them to open the link in Safari.

Pierluigi Paganini

(Security Affairs – chaiOS  Text Bomb, hacking)

The post chaiOS Bug can crash iMessage App on any iPhone and macOS with a simple link appeared first on Security Affairs.

Apple Is Blocking an App That Detects Net Neutrality Violations

dmoberhaus writes: Apple isn't allowing a new app developed by a university professor that detects when your internet is being throttled by ISPs from being listed on the app store. The company claimed the app contained "objectionable content" and "has no direct benefits to the user." The reporter, who tested the app through the beta channel, writes: The app is designed to test download speeds from seven apps: YouTube, Amazon, NBCSports, Netflix, Skype, Spotify, and Vimeo. According to the app, my Verizon LTE service streamed YouTube to my iPhone at 6 Mbps, Amazon Prime video at 8 Mbps, and Netflix at 4 Mbps. It downloaded other data at speeds of up to 25 Mbps.

Read more of this story at Slashdot.

Apple updates iOS security guide

Apple has published an updated version of its iOS security guide, in which it details features introduced in iOS 11.2 (released on December 4, 2017) and iOS 11.1 (October 31, 2017). The company first released the first version of the document in June 2012, and has been updating it periodically ever since. New information in the iOS security guide This latest iteration contains more and updated details about Apple Pay Cash, security certifications and programs, … More

Coprocessor Attacks: the Hidden Threat

Botnets, DDoS and ransomware attacks, vulnerabilities in Internet of Things devices and Open Source Software, and the generally poor state of information security, dominate the discussion of cybersecurity. These same

The post Coprocessor Attacks: the Hidden Threat appeared first on The Cyber Security Place.

Adult Themed Virtual Reality App spills Names, Emails of Thousands

Thousands of users of an adult virtual reality application risk having their personal information, including names and email addresses exposed, according to researchers in the UK. Thousands of Internet denizens who wanted to explore their virtual naughty side are in for an unpleasant surprise after a firm offering an adult virtual reality game,...

Read the whole entry... »

Related Stories

Smashing Security podcast #058: Face ID, Firefox, and Windows SNAFUs, plus Bitcoin FOMO

Smashing Security podcast #058: Face ID, Firefox, and Windows SNAFUs, plus Bitcoin FOMO

Is Face ID racist? Has Mr Robot infected your Firefox browser? Has Microsoft pushed a buggy password manager onto your Windows PC?

All this and much much more is discussed in the special first birthday edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by original co-host Vanja Švajcer.

Researchers find hundreds of easily-breached messaging apps

The security of our personal data is top of mind right now, so the news that nearly 700 apps for iOS and Android were easily exploited to show private messages and calls is troubling, to say the least. Security company Appthority discovered the exploit, dubbed "Eavesdropper," and published its findings this morning. According to the company's research, up to 180 million Android devices could be affected, as well as an unknown number of iOS devices.

Via: Reuters

Source: Appthority

Which operating system is the most secure? Four points to remember.

No, you are almost certainly wrong if you tried to guess. A recent study shows that products from Apple actually are at the top when counting vulnerabilities, and that means at the bottom security-wise. Just counting vulnerabilities is not a very scientific way to measure security, and there is a debate over how to interpret the figures. But this is anyway a welcome eye-opener that helps kill old myths.

Apple did for a long time stubbornly deny security problems and their marketing succeeded in building an image of security. Meanwhile Windows was the biggest and most malware-targeted system. Microsoft rolled up the sleeves and fought at the frontline against viruses and vulnerabilities. Their reputation suffered but Microsoft gradually improved in security and built an efficient process for patching security holes. Microsoft had what is most important in security, the right attitude. Apple didn’t and the recent vulnerability study shows the result.

Here’s four points for people who want to select a secure operating system.

  • Forget reputation when thinking security. Windows used to be bad and nobody really cared to attack Apple’s computers before they became popular. The old belief that Windows is unsafe and Apple is safe is just a myth nowadays.
  • There is malware on almost all commonly used platforms. Windows Phone is the only exception with practically zero risk. Windows and Android are the most common systems and malware authors are targeting them most. So the need for an anti-malware product is naturally bigger on these systems. But the so called antivirus products of today are actually broad security suites. They protect against spam and harmful web sites too, just to mention some examples. So changes are that you want a security product anyway even if your system isn’t one of the main malware targets.
  • So which system is most secure? It’s the one that is patched regularly. All the major systems, Windows, OS X and Linux have sufficient security for a normal private user. But they will also all become unsafe if the security updates are neglected. So security is not really a selection criteria for ordinary people.
  • Mobile devices, phones and tablets, generally have a more modern systems architecture and a safer software distribution process. Do you have to use a desktop or laptop, or can you switch to a tablet? Dumping the big old-school devices is a way to improve security. Could it work for you?

So all this really boils down to the fact that you can select any operating system you like and still be reasonable safe. There are some differences though, but it is more about old-school versus new-school devices. Not about Apple versus Microsoft versus Linux. Also remember that your own behavior affects security more than your choice of device, and that you never are 100% safe no matter what you do.

 

Safe surfing,
Micke

 

Added February 27th. Yes, this controversy study has indeed stirred a heated debate, which isn’t surprising at all. Here’s an article defending Apple. It has flaws and represent a very limited view on security, but one of its important points still stands. If someone still thinks Apple is immortal and invincible, it’s time to wake up. And naturally that this whole debate is totally meaningless for ordinary users. Just keep patching what you have and you will be fine. 🙂 Thanks to Jussi (and others) for feedback.

 

Wirelurker for OSX, iOS (Part I) and Windows (Part II) samples


PART II

Wirelurker for Windows (WinLurker)

Research: Palo Alto Claud Xiao: Wirelurker for Windows

Sample credit: Claud Xiao



PART I


Research: Palo Alto Claud Xiao WIRELURKER: A New Era in iOS and OS X Malware

Palo Alto |Claud Xiao - blog post Wirelurker

Wirelurker Detector https://github.com/PaloAltoNetworks-BD/WireLurkerDetector


Sample credit: Claud Xiao


Download

Download Part I
Download Part II

Email me if you need the password




List of files
List of hashes 

Part II

s+«sìÜ 3.4.1.dmg 925cc497f207ec4dbcf8198a1b785dbd
apps.ipa 54d27da968c05d463ad3168285ec6097
WhatsAppMessenger 2.11.7.exe eca91fa7e7350a4d2880d341866adf35
使用说明.txt 3506a0c0199ed747b699ade765c0d0f8
libxml2.dll c86bebc3d50d7964378c15b27b1c2caa
libiconv-2_.dll 9c8170dc4a33631881120a467dc3e8f7
msvcr100.dll bf38660a9125935658cfa3e53fdc7d65
libz_.dll bd3d1f0a3eff8c4dd1e993f57185be75
mfc100u.dll f841f32ad816dbf130f10d86fab99b1a

zlib1.dll c7d4d685a0af2a09cbc21cb474358595


│   apps.ipa
│   σ╛«σìÜ 3.4.1.dmg

└───WhatsAppMessenger 2.11.7
            libiconv-2_.dll
            libxml2.dll
            libz_.dll
            mfc100u.dll
            msvcr100.dll
            WhatsAppMessenger 2.11.7.exe
            zlib1.dll
            使用说明.txt


Part I

BikeBaron 15e8728b410bfffde8d54651a6efd162
CleanApp c9841e34da270d94b35ae3f724160d5e
com.apple.MailServiceAgentHelper dca13b4ff64bcd6876c13bbb4a22f450
com.apple.appstore.PluginHelper c4264b9607a68de8b9bbbe30436f5f28
com.apple.appstore.plughelper.plist 94a933c449948514a3ce634663f9ccf8
com.apple.globalupdate.plist f92640bed6078075b508c9ffaa7f0a78
com.apple.globalupdate.plist f92640bed6078075b508c9ffaa7f0a78
com.apple.itunesupdate.plist 83317c311caa225b17ac14d3d504387d
com.apple.machook_damon.plist 6507f0c41663f6d08f497ab41893d8d9
com.apple.machook_damon.plist 6507f0c41663f6d08f497ab41893d8d9
com.apple.MailServiceAgentHelper.plist e6e6a7845b4e00806da7d5e264eed72b
com.apple.periodic-dd-mm-yy.plist bda470f4568dae8cb12344a346a181d9
com.apple.systemkeychain-helper.plist fd7b1215f03ed1221065ee4508d41de3
com.apple.watchproc.plist af772d9cca45a13ca323f90e7d874c2c
FontMap1.cfg 204b4836a9944d0f19d6df8af3c009d5
foundation 0ff51cd5fe0f88f02213d6612b007a45
globalupdate 9037cf29ed485dae11e22955724a00e7
globalupdate 9037cf29ed485dae11e22955724a00e7
itunesupdate a8dfbd54da805d3c52afc521ab7b354b
libcrypto.1.0.0.dylib 4c5384d667215098badb4e850890127b
libcrypto.1.0.0.dylib 3b533eeb80ee14191893e9a73c017445
libiconv.2.dylib 94f9882f5db1883e7295b44c440eb44c
libiconv.2.dylib fac8ef9dabdb92806ea9b1fde43ad746
libimobiledevice.4.dylib c596adb32c143430240abbf5aff02bc0
libimobiledevice.4.dylib 5b0412e19ec0af5ce375b8ab5a0bc5db
libiodb.dylib bc3aa0142fb15ea65de7833d65a70e36
liblzma.5.dylib 5bdfd2a20123e0893ef59bd813b24105
liblzma.5.dylib 9ebf9c0d25e418c8d0bed2a335aac8bf
libplist.2.dylib 903cbde833c91b197283698b2400fc9b
libplist.2.dylib 109a09389abef9a9388de08f7021b4cf
libssl.1.0.0.dylib 49b937c9ff30a68a0f663828be7ea704
libssl.1.0.0.dylib ab09435c0358b102a5d08f34aae3c244
libusbmuxd.2.dylib e8e0663c7c9d843e0030b15e59eb6f52
libusbmuxd.2.dylib 9efb552097cf4a408ea3bab4aa2bc957
libxml2.2.dylib 34f14463f28d11bd0299f0d7a3985718
libxml2.2.dylib 95506f9240efb416443fcd6d82a024b9
libz.1.dylib 28ef588ba7919f751ae40719cf5cffc6
libz.1.dylib f2b19c7a58e303f0a159a44d08c6df63
libzip.2.dylib 2a42736c8eae3a4915bced2c6df50397
machook 5b43df4fac4cac52412126a6c604853c
machook ecb429951985837513fdf854e49d0682
periodicdate aa6fe189baa355a65e6aafac1e765f41
pphelper 2b79534f22a89f73d4bb45848659b59b
sfbase.dylib bc3aa0142fb15ea65de7833d65a70e36
sfbase.dylib bc3aa0142fb15ea65de7833d65a70e36
sfbase_v4000.dylib 582fcd682f0f520e95af1d0713639864
sfbase_v4001.dylib e40de392c613cd2f9e1e93c6ffd05246
start e3a61139735301b866d8d109d715f102
start e3a61139735301b866d8d109d715f102
start.sh 3fa4e5fec53dfc9fc88ced651aa858c6
stty5.11.pl dea26a823839b1b3a810d5e731d76aa2
stty5.11.pl dea26a823839b1b3a810d5e731d76aa2
systemkeychain-helper e03402006332a6e17c36e569178d2097
watch.sh 358c48414219fdbbbbcff90c97295dff
WatchProc a72fdbacfd5be14631437d0ab21ff960
7b9e685e89b8c7e11f554b05cdd6819a 7b9e685e89b8c7e11f554b05cdd6819a
update 93658b52b0f538c4f3e17fdf3860778c
start.sh 9adfd4344092826ca39bbc441a9eb96f

File listing

├───databases
│       foundation
├───dropped
│   ├───version_A
│   │   │   com.apple.globalupdate.plist
│   │   │   com.apple.machook_damon.plist
│   │   │   globalupdate
│   │   │   machook
│   │   │   sfbase.dylib
│   │   │   watch.sh
│   │   │
│   │   ├───dylib
│   │   │       libcrypto.1.0.0.dylib
│   │   │       libiconv.2.dylib
│   │   │       libimobiledevice.4.dylib
│   │   │       liblzma.5.dylib
│   │   │       libplist.2.dylib
│   │   │       libssl.1.0.0.dylib
│   │   │       libusbmuxd.2.dylib
│   │   │       libxml2.2.dylib
│   │   │       libz.1.dylib
│   │   │
│   │   ├───log
│   │   └───update
│   ├───version_B
│   │       com.apple.globalupdate.plist
│   │       com.apple.itunesupdate.plist
│   │       com.apple.machook_damon.plist
│   │       com.apple.watchproc.plist
│   │       globalupdate
│   │       itunesupdate
│   │       machook
│   │       start
│   │       WatchProc
│   │
│   └───version_C
│       │   com.apple.appstore.plughelper.plist
│       │   com.apple.appstore.PluginHelper
│       │   com.apple.MailServiceAgentHelper
│       │   com.apple.MailServiceAgentHelper.plist
│       │   com.apple.periodic-dd-mm-yy.plist
│       │   com.apple.systemkeychain-helper.plist
│       │   periodicdate
│       │   stty5.11.pl
│       │   systemkeychain-helper
│       │
│       └───manpath.d
│               libcrypto.1.0.0.dylib
│               libiconv.2.dylib
│               libimobiledevice.4.dylib
│               libiodb.dylib
│               liblzma.5.dylib
│               libplist.2.dylib
│               libssl.1.0.0.dylib
│               libusbmuxd.2.dylib
│               libxml2.2.dylib
│               libz.1.dylib
│               libzip.2.dylib
├───iOS
│       sfbase.dylib
│       sfbase_v4000.dylib
│       sfbase_v4001.dylib
│       start
│       stty5.11.pl
├───IPAs
│       7b9e685e89b8c7e11f554b05cdd6819a
│       pphelper
├───original
│       BikeBaron
│       CleanApp
│       FontMap1.cfg
│       start.sh
└───update
        start.sh
        update