iOS Hacker Trap Setup
Description
My iPhone shows clear signs of an active breach, and anything I do on the device could be watched. I need a seasoned security specialist who can quietly install and run a well-concealed trap that logs the attacker’s activity, fingerprints their entry point, and relays evidence to a clean, external location without alerting them.
Here is the situation you will be working with: • The hacked device is a mobile phone running iOS. • I cannot risk knowing every detail of the trap ahead of time because the environment may already be monitored.
Your mission is to plan, deploy, and supervise a covert collection mechanism suited to iOS—think custom-signed profiles, on-device logging hooks, or a lightweight MDM configuration—then hand me a concise set of instructions I can follow blindly (or that you can execute via remote session) to arm it. Once data starts flowing, you’ll monitor the feed, analyze indicators of compromise, and compile a clear report that identifies the attacker’s methods, IPs, and any harvested data.
Deliverables
- A stealth trapping strategy tailored for my iPhone, with minimal user interaction.
- All configuration files, test certificates, or scripts ready for immediate deployment.
- A secure monitoring channel I can access from a separate, uncompromised device.
- A final evidence package and mitigation roadmap once the attacker is exposed.
I am ready to move quickly, so please outline your initial approach, any specialized iOS tooling you intend to use (e.g., Frida, Libimobiledevice, custom MDM, remote syslog), and the estimated timeline to reach the first evidence capture. Budget: USD 250–750 Skills: Mobile App Development, iPhone, Mac OS, Objective C, Penetration Testing, iOS Development, Network Security, Data Protection
Skills
Want AI to find more roles like this?
Upload your CV once. Get matched to relevant assignments automatically.