The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Main Page"
m (iOS 5.1.1 for the Apple TVs.) |
|||
Line 1: | Line 1: | ||
<!-- Logo by iHassan --> |
<!-- Logo by iHassan --> |
||
− | [[Image: |
+ | [[Image:Iptwiki2.png|center]] |
<!-- Added a split column information box- computid --> |
<!-- Added a split column information box- computid --> |
||
{{:Main Page/Welcome}} |
{{:Main Page/Welcome}} |
Revision as of 21:34, 22 December 2012
Template:Heading More information, including information for older devices, is available on the Firmware and Jailbreak pages.
Device | iPhone 3GS (old bootrom) | iPhone 3GS (new bootrom), | Apple TV 2G | Apple TV 3G | iPad 2, iPad 3, and iPhone 4S | iPad 4, iPad mini, iPhone 5, iPod touch 5G |
---|---|---|---|---|---|---|
Latest Firmware | 6.0.1 (Build 10A523) |
6.0.1 (Build 10A523) |
5.1.1 (Build 10A831) |
5.1.1 (Build 10A831) |
6.0.1 (Build 10A523) |
6.0.1 (Build 10A523)
(Build 10A525 for iPhone 5) |
Is there a jailbreak available? | Yes | Yes, tethered | Yes, tethered | No | No | No |
If the device is carrier-locked, is there a software-based unlock? | Requires an old baseband, or baseband 06.15.00 | iPhone 3GS: Requires an old baseband, or baseband 06.15.00
iPhone 4 GSM model: Requires baseband 01.59.00 |
N/A | No | No |
Template:Col-begin Template:Col-2 Template:Heading
Jailbreak Software
Patches
Vulnerabilities and Exploits
- 0x24000 Segment Overflow (24kpwn)
- BPF STX Kernel Write Exploit
- HFS Heap Overflow
- HFS Legacy Volume Name Stack Buffer Overflow (feedface)
- Incomplete Codesign Exploit
- IOSurface Kernel Exploit
- Limera1n Exploit
- Malformed CFF Vulnerability
- MobileBackup Copy Exploit
- ndrv_setspec() Integer Overflow
- Packet Filter Kernel Exploit
- Racoon String Format Overflow Exploit
- SHA-1 Image Segment Overflow (SHAtter)
- usb_control_msg(0x21, 2) Exploit
- usb_control_msg(0xA1, 1) Exploit (steaks4uce)
Template:Col-2 Template:HeadingB
Devices (see also Models)
Application Processors
- S5L8900 (iPhone, iPod touch, iPhone 3G)
- S5L8720 (iPod touch 2G)
- S5L8920 (iPhone 3GS)
- S5L8922 (iPod touch 3G)
- S5L8930 A4 (iPad, iPhone 4 GSM, iPod touch 4G, Apple TV 2G, iPhone 4 CDMA)
- S5L8940 A5 (iPad 2, iPhone 4S)
- S5L8942 A5 Rev. A (Apple TV 3G, iPad 2 R2, iPod touch 5G, iPad mini 1G)
- S5L8945 A5X (iPad 3)
- S5L8950 A6 (iPhone 5)
- S5L8955 A6X (iPad 4)
Baseband Devices
- PMB8876 or S-Gold 2 (iPhone)
- PMB8878 or X-Gold 608 (iPhone 3G, iPhone 3GS, iPad)
- XMM6180 or X-Gold 618 (iPhone 4 GSM, iPad 2 GSM)
- MDM6600 (iPhone 4 CDMA, iPad 2 CDMA)
- MDM6610 (iPhone 4S)
- MDM9x00 (iPad 3)
- MDM9615 (iPhone 5)
Other
- Accelerometer
- WLAN/Bluetooth:
- Compass: AKM8973, AKM8975
- Gyroscope: AGD1 2022 FP6AQ
- Connectors: 30-pin, Lightning
Template:Col-begin Template:Col-2 Template:Heading
iPhone Hackers
iPhone Hacker Teams
Application Development
- Apple Certification Process
- Bypassing iPhone Code Signatures
- Distribution Methods
- Frameworks
- MobileDevice Library
- Toolchain (Includes tutorials)
- Toolchain 2.0 (Includes tutorials)
Application Copy Protection
- Application Structure and Signatures
- Bugging Debuggers
- Copy Protection Overview
- Defeating Cracks
- Mach-O Loading Process
Template:Col-2 Template:HeadingB
Guides
Definitions
- Activation
- ASLR
- Baseband
- Bootloader
- Bootchain
- Bootrom / VROM
- CHIPID
- CPID
- DFU Mode
- ECID
- iBEC
- iBoot
- iBSS
- Jailbreak
- Kernel
- launchd
- LLB
- NAND
- NOR
- NORID
- SHSH
- Unlock
Disclaimer |