Safari RejailBreak (iOS 9.3.3) vulnerability shows a video that allows a mobile phone to be remotely controlled by a hacker after viewing a web page. As for what you can do when you’re remotely controlled, check out the video below.
After watching the video, were you shocked to see the camera automatically take photos, send messages, and remotely control “I see you”?
Yes, hackers can do this by taking control of your iPhone, surreptitiously taking photos, texting, and making Siri say something. This video reminds me of a few years ago, when iPhone jailbreak just came out, everyone didn’t know how to change the default SSH password after jailbreak. It was really bad that someone remotely connected to a colleague’s iPhone and secretly played a female ghost video. However, after hackers control your phone, they can do more than prank, they can also achieve the following functions:
-
By default, in the video, the front and rear cameras can take photos, download photos, sound the phone and pop up messages under the locked screen, as shown in the black part below:
sysinfo : get system informationls : list contents of directorycd : change directories rm : delete filepwd : get current directorydownload : download file frontcam : take picture through front camerabackcam : take picture through back camera mic : record microphonegetpid : get process idvibrate : make device vibrate alert : make alert show up on device say : make device speaklocate : get device locationrespring : respring device setvol : set mediaplayer volumegetvol : view mediaplayer volumeisplaying : view mediaplayer infoopenurl : open url on devicedial : dial number on devicebattery : get battery levellistapps : list bundle identifiersopen : open apppersistence : installs LaunchDaemon – tries to connect every 30 secondsrmpersistence : uninstalls LaunchDaemoninstallpro : installs eggshellpro to device
-
Other expert-level high-level functions are required to jailbreak the environment, using the Cydia Substrate Extension module:
lock : simulate lock button press
wake : wake device from sleeping state
home : simulate home button press
doublehome : simulate home button double pressplay : plays musicpause : pause musicnext : next trackprev : previous trackgetpasscode : log successfull passcode attemptsunlock : unlock with passcode keylog : log keystrokeskeylogclear : clear keylog datalocationservice: turn on or off location services
This tool is currently open source, the author is a serious programmer, just his old tool code and remote jailbreak vulnerability integration, did not expect such amazing results, everyone can go to the author’s Github to watch the code.
https://github.com/neoneggplant/EggShell
I recommend that you continue to follow my wechat public account
-
Long press the qr code below