Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

Jailbreak Detection Megaissue #48

Closed
imnltsa opened this issue Jan 3, 2024 · 33 comments
Closed

Jailbreak Detection Megaissue #48

imnltsa opened this issue Jan 3, 2024 · 33 comments
Labels
documentation Improvements or additions to documentation

Comments

@imnltsa
Copy link
Collaborator

imnltsa commented Jan 3, 2024

This issue can be used to list off apps that have jailbreak detection advanced enough to detect WITHOUT injection with AppEnabler or even after uninstalling the bootstrap and removing /private/var/jb and /private/var/containers/Bundle/Application/.jbroot-$(jbrand)/ along with application data removal.

It's not necessarily helpful to link to tweaks which may bypass anything in here since this is an issue on the Bootstrap repo itself, but can narrow it down.

Before commenting, please ensure you 100% do not have anything visible like Filza's URL scheme (Remove Filza from TrollStore and install the no URL scheme version) and any other jailbreak application that may expose their URL scheme. Also, ensure your results aren't stored anywhere by clearing application data by uninstalling and reinstalling the application, assuming the results are stored there.

@imnltsa imnltsa added bug Something isn't working documentation Improvements or additions to documentation labels Jan 3, 2024
@imnltsa imnltsa pinned this issue Jan 3, 2024
@imnltsa
Copy link
Collaborator Author

imnltsa commented Jan 3, 2024

Fix issue with Roothide manager clean/var

This doesn't address the issue at hand; the problem still exists with RootHide as a whole. Removing all files doesn't fix the fact that there's something wrong with the bootstraps anti-jb detection.

Plus, this is an issue for ALL apps that have jailbreak detection, you need somewhere to complain about it. This is that place.

Running varClean with 'select all' is a fix for people ditching/coming to the bootstrap, but certainly not one for people that want to keep using it.

@roothide
Copy link
Collaborator

roothide commented Jan 3, 2024

follow this:

1: enable tweak for all trollstore apps

2: install roothide manager in sileo, try varClean all in roothide manager, some files may not be deleted automatically and you need to do it manually in filza.

@imnltsa
Copy link
Collaborator Author

imnltsa commented Jan 3, 2024

follow this:

1: enable tweak for all trollstore apps

2: install roothide manager in sileo, try varClean all in roothide manager, some files may not be deleted automatically and you need to do it manually in filza.

How does this affect people who want to still use the bootstrap? This is fine for people leaving the bootstrap but deletes pretty important stuff if you want to continue using it.

@imnltsa imnltsa changed the title Jailbreak Detection Jailbreak Detection Megaissue Jan 3, 2024
@roothide
Copy link
Collaborator

roothide commented Jan 4, 2024

follow this:
1: enable tweak for all trollstore apps
2: install roothide manager in sileo, try varClean all in roothide manager, some files may not be deleted automatically and you need to do it manually in filza.

How does this affect people who want to still use the bootstrap? This is fine for people leaving the bootstrap but deletes pretty important stuff if you want to continue using it.

1: Some users have installed other bootstrap with /var/jb before, and it is very easy to detect.

2: Some apps installed in the trollstore may be detected as jailbroken, not just because of URLSchemes. after enabling tweaks for them, Bootstrap will automatically hide some features for them.

3: Some tweaks and jailbreak apps (including apps installed in the trollstore) will generate some files in /var/ of the rootfs, which will also be used by the app to detect jailbreaks. they can be cleaned using roothide manager's varClean, and we strongly recommend tweaks and jailbreak apps should store their data and configuration in jbroot's /var/ rather than rootfs's /var/.

@imnltsa
Copy link
Collaborator Author

imnltsa commented Jan 4, 2024

follow this:
1: enable tweak for all trollstore apps
2: install roothide manager in sileo, try varClean all in roothide manager, some files may not be deleted automatically and you need to do it manually in filza.

How does this affect people who want to still use the bootstrap? This is fine for people leaving the bootstrap but deletes pretty important stuff if you want to continue using it.

1: Some users have installed other bootstrap with /var/jb before, and it is very easy to detect.

2: Some apps installed in the trollstore may be detected as jailbroken, not just because of URLSchemes. after enabling tweaks for them, Bootstrap will automatically hide some features for them.

3: Some tweaks and jailbreak apps (including apps installed in the trollstore) will generate some files in /var/ of the rootfs, which will also be used by the app to detect jailbreaks. they can be cleaned using roothide manager's varClean, and we strongly recommend tweaks and jailbreak apps should store their data and configuration in jbroot's /var/ rather than rootfs's /var/.

What can people do to mitigate detection without doing a full varClean (data loss, I know a loss of preference bundles is guaranteed, along with files from TrollStore applications like Derootifier or misaka)? Yes, you should wipe previous jailbreak files, but you can't necessarily tell which files are used in the current bootstrap or utilized by your TrollStore apps.

@roothide
Copy link
Collaborator

roothide commented Jan 8, 2024

whether it is a tweak or a trollstore app/jailbreak app, data and configuration should be stored in the sandbox container or jbroot:/var/, not rootfs:/var/.

the roothide manager can help users find files stored in rootfs:/var/ that may lead to the detection of jailbreak. once the future tweaks store data and configuration in the sandbox container or jbroot:/var/, then we can get rid of this is a legacy issue from history, but it will take time.

In rootihde jailbreak (such as roothide dopamine), the tweak preferences will be automatically redirected to jbroot for storage by cfprefsd-hook, but in Bootstrap we are not able to achieve this yet.

@Kawaoii
Copy link

Kawaoii commented Jan 9, 2024

Question. Idk if I ask this here. If I have a phone without JB but only ts. And want to install and use roothide bootstrap for sileo can banking/gov apps detect this process and/or are there steps to avoid this issue? Essentially what I want to know is if roothide bootstrap can be detected as JB.

@roothide
Copy link
Collaborator

roothide commented Jan 9, 2024

Question. Idk if I ask this here. If I have a phone without JB but only ts. And want to install and use roothide bootstrap for sileo can banking/gov apps detect this process and/or are there steps to avoid this issue? Essentially what I want to know is if roothide bootstrap can be detected as JB.

any behavior beyond the scope allowed by apple may be detected as a jailbreak, including trollstore.

even if you only use a developer certificate to sideload some apps (such as filza), some appstore apps may report that your device is jailbroken.

the significance of roothide is that it provides a universal solution to these troubles.

@MysticallyQ8
Copy link

Hello, i have recently encountered my banking app that detect my JB, iphone 14 pro max ios 16.6.1, i have been using the app without no bypass tweaks and it was fine for almost 2 weeks until yesterday it detected as My device is unsecured Bc of jailbreak. I followed the uninstallation method from A to Z and yet i still get the window saying “Device is unsecured”
IMG_4510

https://apps.apple.com/kw/app/gulf-bank-mobile-banking/id1577206679

^ this is the link to my banking application

@imnltsa imnltsa mentioned this issue Jan 25, 2024
1 task
@imnltsa imnltsa removed the bug Something isn't working label Feb 5, 2024
@imnltsa

This comment was marked as off-topic.

@SATIS8CHIMPALEE
Copy link
Contributor

IMG_6278

TrueMoney Wallet App update to version 5.52.0 for jailbreak detection on bootstrap

previously version 5.51.0 works fine after downgrade by appstore++

PS. No Filza installed

https://apps.apple.com/th/app/truemoney/id663885752?l=th

@m1337v

This comment was marked as resolved.

@SATIS8CHIMPALEE
Copy link
Contributor

For me Gulfbank works without problems (as far as you can go without being a customer)

Can confirm Truemoney doesn't work without tweaks enabled for it (no Filza, Crane etc. installed and var completely cleaned)

After doing varClean I was able to access the app. But only after opening Sileo. It can be detected Even though I didn't install any tweaks.

IMG_9666
IMG_9667
IMG_9668
IMG_9669

@imnltsa
Copy link
Collaborator Author

imnltsa commented Feb 6, 2024

You may be able to use a Shortcut to open the app if you have openssh installed.

SSH into 127.0.0.1, and run a command that removes /var/mobile/Library/SplashBoard/Snapshots/org.coolstar.SileoStore (or the file that trips jailbreak detection). Then, add a block to open the app you're looking to bypass detection on.

You can then add this Shortcut to your homescreen and use that to open the application. Note, you will not get notification badges on that icon, and opening the application with ANY other means will trip jailbreak detection once more.

@MysticallyQ8

This comment was marked as spam.

@jrew20
Copy link

jrew20 commented Feb 25, 2024

I manage to fixed jailbreak detection, I'm using Gcash app from philippines and the app detected jailbroken even I did not enable from bootstrap.

I fixed it by deleting jb shortcuts in filza from private/var/ folder

you will find shortcuts with white icon
to know that is from jb try to check details the "i" on right side then you will see path "var/jb" I deleted those shortcuts and restart the app and jailbreak detection gone.

@T5ive

This comment was marked as off-topic.

@skell79

This comment was marked as off-topic.

@imnltsa
Copy link
Collaborator Author

imnltsa commented Feb 27, 2024

This issue has gone off track, please only list apps and tweak solutions / report applications that still detect the presence of a jailbreak. If you need help for a specific application, please do so in the roothide Discord server linked in this repositories README.md.

Please refer to the FAQ in README.md on how to self-remedy jailbreak detection.

@imnltsa imnltsa closed this as completed Apr 16, 2024
@Double077
Copy link

Double077 commented Apr 18, 2024

Picky app : "NAFATH" detects Dopamine Roothide
Crashes Immediately after opening
Screenshot 2024-04-18 213816

https://apps.apple.com/sa/app/%D9%86%D9%81%D8%A7%D8%B0-nafath/id1598909871

@roothider
Copy link
Contributor

Picky app : "NAFATH" detects roothide Crashes Immediately after opening Screenshot 2024-04-18 213816

https://apps.apple.com/sa/app/%D9%86%D9%81%D8%A7%D8%B0-nafath/id1598909871

roothide Dopamine or roothide Bootstrap?

@Double077
Copy link

Dopamine

@roothider
Copy link
Contributor

Dopamine

known issue, try this version:
https://filetransfer.io/data-package/MbuoIoLB#link

@Double077
Copy link

Nice works like a charm thank you

@imnltsa
Copy link
Collaborator Author

imnltsa commented Sep 30, 2024

Request: I do not want to use varClean to address this issue because it may remove my tweak configurations (correct me if I'm wrong). Is there an alternative solution to bypass the roothide detection without compromising my existing tweaks?

A lot of the files are detectable. Instead of wiping everything, just delete everything that isn't related to preferences (usually named after the tweak itself and ending in .plist).

@imnltsa
Copy link
Collaborator Author

imnltsa commented Sep 30, 2024

I just want to make sure, is the tweak's/app's plist related and would it be affected by this? I want to avoid deleting anything essential.

Send a list of the files and directories and I'll tell you which ones you should keep.

Are there any tricks to restore my apps or tweaks after doing a varClean, without having to reinstall each one manually?

No apps or tweaks are removed when doing a varClean as it's done in rootfs /var and not jbroot. The most damage that could be done is having a few tweaks that must be reconfigured.

@imnltsa
Copy link
Collaborator Author

imnltsa commented Sep 30, 2024

Try removing all files and directories BUT the following and see if it fixes your issue:

  • /var/mobile/.TrollApps/
  • /var/mobile/.serotonin_hidetext
  • /var/mobile/Serotonin.jp2
  • /var/mobile/Documents/.DynamicCowBackups/
  • Everything in /var/mobile/Library/Preferences/ (these are tweak preferences)

Directories in Saved Application State (or Snapshots, I really don't know anymore) will be created when applications are reopened (ex. Filza, Sileo). Please ensure these apps are closed and the directories removed before testing. If a file/directory being created when an application is opened causes your application to detect a jailbreak, look into this 'workaround'.

@honestyan

@imnltsa
Copy link
Collaborator Author

imnltsa commented Sep 30, 2024

What should I do next? I mean to prevent it was happened again.

Just keep an eye out on when it's triggered again and do process of elimination when finding out which file/directory is specifically triggering the detection, and either remove it again or use the shortcut method I linked above to automate it.

@imnltsa
Copy link
Collaborator Author

imnltsa commented Sep 30, 2024

Just to make sure—by deleting everything except the files and directories you mentioned, there won’t be any negative impact on my apps or jailbreak functionality, right?

Majority of it was stuff iOS creates on its own. It's safe to delete.

@imnltsa
Copy link
Collaborator Author

imnltsa commented Sep 30, 2024

Can you send me a a docs which OpenSSH tweak? I been try any tweaks on redd*t but I cant find which one the truly one.

OpenSSH is provided by the Procursus repository and is available in the Procursus(roothide) repository. You can then SSH into 127.0.0.1 and rm (or rm -rf) the file/directory triggering detection.

@imnltsa
Copy link
Collaborator Author

imnltsa commented Sep 30, 2024

OpenSSH is provided by the Procursus repository and is available in the Procursus(roothide) repository. You can then SSH into 127.0.0.1 and rm (or rm -rf) the file/directory triggering detection.

image am I did any failure? cause the data not deleted after I ran my shortcuts

I would not delete the folders as a whole (probably broke something, not sure) but delete the specific files/directories that trigger detection (ex. a Filza directory inside the Snapshots directory). The purpose of this is to remove the offending file/directory then the application is immediately launched after removal using the "Open App" block, causing the application to open flawlessly.

@imnltsa
Copy link
Collaborator Author

imnltsa commented Sep 30, 2024

It doesn't delete my folder. am I did something wrong?

Change /var/ to /rootfs/var/. roothide shenanigans :)

@roothider
Copy link
Contributor

all packages from procursus use jbroot as the default filesystem root on roothide, ref to: https://github.com/roothide/Developer/blob/main/vroot.md

@roothider roothider unpinned this issue Sep 30, 2024
# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
documentation Improvements or additions to documentation
Projects
None yet
Development

No branches or pull requests

11 participants