Xcode 6.4 Dmg

broken image


  1. Xcode 6.4 Dmg Software
  2. Xcode 6.4.dmg
  3. Xcode 6.4 Dmg Software
  4. Xcode 6.4 Dmg Download

Markmentovai Xcode 13.0b1 13A5154h. Loading status checks. Latest commit 5c586e1 4 days ago History. Commandline Toolsosx10.10 For Xcode6.4.dmg Mac Os High Sierra Download Dmg Mega Mabinogi Dmg Formula Google Sheet Vray For Sketchup Mac Osx Crack.dmg Dmg To Usb Mac Software How To Create O Instead Of Dmg Using Disck Utilities Dmg Display Rules Of Survival Poe 3.0 Good Shield Spell Dmg What Does A Dmg File Mean. Learn about the key features available in Xcode, the integrated development environment for building apps for Mac, iPhone, iPad, Apple Watch, and Apple TV. Mar 13, 2018 I tried to download xcode 4.6 dmg file from apple developer section. I have downloaded it twice but the weird thing is after it completes the download the xcode dmg file which is 1.4GBs on size changes to a login.html which is only 8kbs in size! Anyone had any experience with these kinds of files? Xcode 6.1 Download Dmg - abcprofit. If the GoTo Opener application is not installed (either first time joining or it was removed), then the GoTo Opener.dmg file will automatically start downloading. If the GoTo Opener application is already installed, then some or all of the following steps will be skipped. GoTo Opener – This is the 'helper.

Ok, i was doing some work with Mac Ports on an old 10.7.5 machine (9 year old iMac still works great). I realized that i needed an Xcode install for 10.7.5. I spent hours trying to find links to old Xcode versions on Apple’s Developer site. They are gone. Broadening my search to google, I found this amazing trove of links. I am posting them here for my own selfish reasons, but i linked to the original post. Why must Apple insist on deleting the past. enjoy them while they still work.

(you will need to be registered as an apple developer for these links to work. Anyone can do it and it is free.)

Addition:

Xcode 11
11.4 Beta 3: https://developer.apple.com/services-account/download?path=/Developer_Tools/Xcode_11.4_beta_3/Xcode_11.4_beta_3.xip
11.4 Beta 2: https://download.developer.apple.com/Developer_Tools/Xcode_11.4_beta_2/Xcode_11.4_beta_2.xip
11.3.1: https://download.developer.apple.com/Developer_Tools/Xcode_11.3.1/Xcode_11.3.1.xip
11 Beta: https://developer.apple.com/services-account/download?path=/WWDC_2019/Xcode_11_Beta/Xcode_11_Beta.xip

Xcode 10
10.2.1: https://download.developer.apple.com/Developer_Tools/Xcode_10.2.1/Xcode_10.2.1.xip
10.2: https://download.developer.apple.com/Developer_Tools/Xcode_10.2/Xcode_10.2.xip
10.1: https://download.developer.apple.com/Developer_Tools/Xcode_10.1/Xcode_10.1.xip
Beta 2: https://developer.apple.com/services-account/download?path=/Developer_Tools/Xcode_10_Beta_2/Xcode_10_Beta_2.xip

Xcode 9
9.4.1 9F2000: https://itunes.apple.com/us/app/xcode/id497799835?ls=1&mt=12
9.3: https://download.developer.apple.com/Developer_Tools/Xcode_9.3/Xcode_9.3.xip
9.2: https://download.developer.apple.com/Developer_Tools/Xcode_9.2/Xcode_9.2.xip
9.1: https://download.developer.apple.com/Developer_Tools/Xcode_9.1/Xcode_9.1.xip
beta GM 9A235: https://download.developer.apple.com/…/Xcode_9_GM_seed.xip

Xcode 8
8.3.3: https://download.developer.apple.com/…/Xcode8.3.3.xip
8.3: https://download.developer.apple.com/…/Xcode_8.3.xip
8.2: https://download.developer.apple.com/…/Xcode_8.2.xip
8.1: https://download.developer.apple.com/…/Xcode_8.1.xip
8: https://download.developer.apple.com/…/Xcode_8.xip

Xcode 7
7.3.1: https://download.developer.apple.com/…/Xcode_7.3.1.dmg
7.2: https://download.developer.apple.com/…/Xcode_7.2.dmg
7.1.1: https://download.developer.apple.com/…/Xcode_7.1.1.dmg

Download Xcode DMG for all version

You can find the DMGs for Xcode and other development tools on https://developer.apple.com/downloads/ (requires Apple ID to login).

You must login to have a valid session before downloading anything below.

Xcode 7
7.1 beta: https://developer.apple.com/services-account/download…
7.0 : https://developer.apple.com/services-account/download…
Xcode 6
6.4: http://developer.apple.com/devcenter/download.action…
6.3.2: http://developer.apple.com/devcenter/download.action…
6.2: http://developer.apple.com/devcenter/download.action…
6.1.1: https://developer.apple.com/devcenter/download.action…
6.0.1: https://developer.apple.com/devcenter/download.action…
Xcode 5
5.1.1: https://developer.apple.com/devcenter/download.action…
5.0.2: https://developer.apple.com/devcenter/download.action…
Xcode 4
4.6.3: https://developer.apple.com/devcenter/download.action…
4.5.2: https://developer.apple.com/devcenter/download.action…
4.4.1: https://developer.apple.com/devcenter/download.action…
4.3.2: https://developer.apple.com/devcenter/download.action…
4.2: http://developer.apple.com/devcenter/download.action…
4.1: http://developer.apple.com/devcenter/download.action…
4.0.2: http://developer.apple.com/devcenter/download.action…
Even Older Versions
3.2.6: http://developer.apple.com/devcenter/download.action…
3.1.4: http://developer.apple.com/devcenter/download.action…
3.0: http://developer.apple.com/devcenter/download.action…
2.5: http://developer.apple.com/devcenter/download.action…
2.4.1: http://developer.apple.com/devcenter/download.action…
2.3: http://developer.apple.com/devcenter/download.action…
2.2.1: http://developer.apple.com/devcenter/download.action…
1.5: http://developer.apple.com/devcenter/download.action…
1.0: http://developer.apple.com/devcenter/download.action…

By

Category: Malware, Threat Prevention, Unit 42

Tags: Apple, Baidu, iOS, KeyRaider, OS X, Weibo, Xcode, XcodeGhost

This post is also available in: 日本語 (Japanese)

UPDATE: Since this report's original posting on September 17, three additional XCodeGhost updates have been published, available here, here and here.

On Wednesday, Chinese iOS developers disclosed a new OS X and iOS malware on Sina Weibo. Alibaba researchers then posted an analysis report on the malware, giving it the name XcodeGhost. We have investigated the malware to identify how it spreads, the techniques it uses and its impact.

XcodeGhost is the first compiler malware in OS X. Its malicious code is located in a Mach-O object file that was repackaged into some versions of Xcode installers. These malicious installers were then uploaded to Baidu’s cloud file sharing service for used by Chinese iOS/OS X developers. Xcode is Apple’s official tool for developing iOS or OS X apps and it is clear that some Chinese developers have downloaded these Trojanized packages.

(UPDATE: Following notification by Palo Alto Networks of malicious files hosted on their file sharing services, Baidu has removed all of the files.)

XcodeGhost exploits Xcode’s default search paths for system frameworks, and has successfully infected multiple iOS apps created by infected developers. At least two iOS apps were submitted to App Store, successfully passed Apple’s code review, and were published for public download.

This is the sixth malware that has made it through to the official App Store after LBTM, InstaStock, FindAndCall, Jekyll and FakeTor.

XcodeGhost’s primary behavior in infected iOS apps is to collect information on the devices and upload that data to command and control (C2) servers. The malware has exposed a very interesting attack vector, targeting the compilers used to create legitimate Apps. This technique could also be adopted to attack enterprise iOS apps or OS X apps in much more dangerous ways.

Distributing the Malicious Xcode Build

In China (and in other places around the world), sometimes network speeds are very slow when downloading large files from Apple’s servers. As the standard Xcode installer is nearly 3GB, some Chinese developers choose to download the package from other sources or get copies from colleagues.

By searching for “Xcode 下载” (Xcode downloading) in Google, in the first page of the search results (Figure 1), we found that six months ago someone posted Xcode download links to multiple forums or websites (including Douban, SwiftMi, CocoaChina, OSChina, etc.) that Chinese iOS developers frequently visit.

Figure 1. Google search results for 'Xcode downloading' in Chinese

These posts provided links to download all versions of Xcode from 6.0 to 7.0 (including beta versions). All of the links direct to Baidu Yunpan, a cloud based file storage and sharing service.

Xcode 6.4 dmg free

Figure 2. Malicious Xcode shared in Baidu Yunpan

We downloaded these Xcode installers and found that all versions of Xcode between 6.1 to 6.4 were infected. When attempting to verify the installers’ code signing signature, it’s clear that some extra files were added into the Xcode (Figure 3).

Figure 3. Code signing verification shows some extra files in Xcode

Those additional files are listed below.

  • Xcode.app/Contents/Developer/Platforms/iPhoneOS.platform/Developer/SDKs/Library/Frameworks/CoreServices.framework/CoreService
  • Xcode.app/Contents/Developer/Platforms/iPhoneOS.platform/Developer/SDKs/Library/PrivateFrameworks/IDEBundleInjection.framework/
  • Xcode.app/Contents/Developer/Platforms/iPhoneSimulator.platform/Developer/SDKs/Library/Frameworks/CoreServices.framework/CoreService
  • Xcode.app/Contents/Developer/Platforms/iPhoneSimulator.platform/Developer/SDKs/Library/PrivateFrameworks/IDEBundleInjection.framework/
  • Xcode.app/Contents/Developer/Platforms/MacOSX.platform/Developer/SDKs/Library/Frameworks/CoreServices.framework/CoreService
  • Xcode.app/Contents/Developer/Platforms/MacOSX.platform/Developer/SDKs/Library/PrivateFrameworks/IDEBundleInjection.framework/

How the Attack Works

The primary malicious component in the XcodeGhost infected version is “CoreServices”. What is different from all previous OS X and iOS malware instances is that this file is neither a Mach-O executable, nor a Mach-O dynamic library, but is a Mach-O object file that is used by LLVM linker and can’t directly execute in any way. This abnormal file format will cause crashes or errors when analyzing it by format parsers like MachOView, 010 Editor (with Mach-O template) or jtool.

In iOS, the CoreServices contain many of the fundamental system services, and almost all complex iOS apps reply on it. When such an iOS app is compiled, Xcode will search for the CoreServices framework in some pre-defined paths to link with developer’s code.

XcodeGhost implemented malicious code in its own CoreServices object file, and copies this file to a specific position that is one of Xcode’s default framework search paths. Hence, the code in the malicious CoreServices file will be added into any iOS app compiled with the infected Xcode without the developers’ knowledge.

The malicious CoreServices file primarily implements extra code in UIWindow class and UIDevice class. The UIWindow class “manages and coordinates the views an app displays on a device screen”. Almost every iOS app has a UIWindow instance when it’s running.

When an infected app is executed, either in an iOS Simulator or on iOS devices, malicious code will collect some system and app information using its UIDevice AppleIncReserved method. The collected information includes:

  • Current time
  • Current infected app’s name
  • The app’s bundle identifier
  • Current device’s name and type
  • Current system’s language and country
  • Current device’s UUID
  • Network type

Figure 4. Collecting system and app information

Xcode 6.4 Dmg Software

Then, XcodeGhost will encrypt the information, and upload it to a C2 server through the HTTP protocol. From different versions of XcodeGhost, we found three C2 domain names:

  • http://init.crash-analytics[.]com
  • http://init.icloud-diagnostics[.]com
  • http://init.icloud-analysis[.]com

Figure 5. Uploading stolen information to C2 server

Note that, the domain name “icloud-analysis.com” was also used by a sample in the iOS trojan KeyRaider we recently found.

Malware In the App Store

According to JoeyBlue in Sina Weibo, at least two famous apps were infected by XcodeGhost and successfully landed in the App Store. We have confirmed both.

We downloaded the NetEase Cloud Music App (com.netease.cloudmusic) from Apples App Store (China region). In its latest version (2.8.3), Info.plist shows that it was built with Xcode 6.4 (6E35b). In the main executable file, the malicious XcodeGhost code is present (Figure 7 and Figure 8).

Figure 6. Infected NetEase App in the Apple App Store

Figure 7. XcodeGhost Present in the Infected NetEase App

Figure 8. Decompiled XcodeGhost Functions in the NetEase App

Security Risks

Compiler malware is not a new idea. Starting with the first proof-of-concept written by Ken Thompson 31 years ago, real compiler malware has been discovered in many platforms. Compared with other iOS malware, XcodeGhost’s behaviors are not especially significant or harmful. This is why the code can pass App Store code review.

However, XcodeGhost disclosed a very easy way to Trojanize apps built with Xcode. In fact, attackers do not need to trick developers into downloading untrusted Xcode packages, but can write an OS X malware that directly drops a malicious object file in the Xcode directory without any special permission.

Xcode 6.4.dmg

Additionally, although Apple’s code review for App Store submissions is very strict, some applications are never reviewed by Apple.If the iOS app is used by an enterprise internally, for example, it will be distributed in-house and won’t go through the App Store.In the same example, an OS X app can also be infected, and lots of OS X apps are directly distributed via the Internet other than App Stores.

In these situations, Xcode compiler malware can be much more aggressive and risky.

It’s difficult for iOS users or developers to be aware of this malware (or similar attacks) because it is deeply hidden, bypassing App Store code review. Because of these characteristics, Apple developers should always use Xcode directly downloaded from Apple, and regularly check their installed Xcode’s code signing integrity to prevent Xcode from being modified by other OS X malware.

Xcode 6.4 Dmg Software

Appendix

XcodeGhost file hashes

89c912d47165a3167611cebf74249f981a4490d9cdb842eccc6771ee4a97e07c CoreServices

b1f567afbf02b6993a1ee96bfdb9c54010a1ad732ab53e5149dda278dd06c979 CoreServices

f5a63c059e91f091d3f1e5d953d95d2f287ab6894552153f1cf8714a5a5bed2d CoreServices

2fde065892a8f1c9f498e6d21f421dbc653888f4102f91fc0fa314689d25c055 Xcode_6.2.dmg

c741af30aef915baa605856a5f662668fba1ae94a8f52faf957b8a52c8b23614 Xcode_6.4.dmg

Xcode 6.4 Dmg Download

Get updates from
Palo Alto
Networks!

Sign up to receive the latest news, cyber threat intelligence and research from us





broken image