<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=0x56</id>
	<title>The iPhone Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=0x56"/>
	<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/wiki/Special:Contributions/0x56"/>
	<updated>2026-05-12T19:31:39Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.14</generator>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Scam_Jailbreaks_and_Unlocks&amp;diff=47319</id>
		<title>Scam Jailbreaks and Unlocks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Scam_Jailbreaks_and_Unlocks&amp;diff=47319"/>
		<updated>2015-08-16T14:52:35Z</updated>

		<summary type="html">&lt;p&gt;0x56: The term used here was &amp;quot;directs&amp;quot;, which it does with multiple prominent banner ads and links. The target has changed however, updated to reflect this.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is an ''incomplete'' list of community-reported '''scam sites''' that pretend to distribute or sell jailbreaking and unlocking tools/services. (There are many other scam sites not listed here yet.)&lt;br /&gt;
&lt;br /&gt;
If you see a site selling jailbreaking or unlocking software (or asking you to do a survey before downloading), it's a scam. (Companies make money when you fill out surveys, so they promise a jailbreak to get you to fill them out.) Scam sites may also provide free fake tools that actually install adware or other kinds of malware in order to make money from you. Some legitimate forms of unlocking are not free - third-party IMEI unlocks and SIM interposer devices both cost money - but ultrasn0w is always free.&lt;br /&gt;
&lt;br /&gt;
In general, please consider: '''is what the site promises too good to be true?''' Does it promise a new jailbreak for the latest iOS version, when nobody from trusted sources (such as well-known blogs or Reddit or developers on Twitter) is talking about this new jailbreak? When a real new jailbreak gets released, huge numbers of people talk about it - so if you find something people aren't talking about, be very skeptical and check trusted sources.&lt;br /&gt;
&lt;br /&gt;
=== You can contribute to this list ===&lt;br /&gt;
&lt;br /&gt;
Please contribute to this list if you find a scam site. By listing them here, we can help people find good information when they search Google for more information about these sites. If your site is listed here and you believe that's a mistake, you may contact an administrator to request removal.&lt;br /&gt;
&lt;br /&gt;
Be sure not to link to these pages, as all links will boost their Google ranking.&amp;lt;!-- Not if they have `rel=&amp;quot;nofollow&amp;quot;`? --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Jailbreak fakes ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Domain !! Notes &lt;br /&gt;
|-&lt;br /&gt;
| 7evasi0n.com || Fake&lt;br /&gt;
|-&lt;br /&gt;
| 7jailbreak.com || On-device survey scam&lt;br /&gt;
|-&lt;br /&gt;
| 71jailbreak.com || Fake&lt;br /&gt;
|-&lt;br /&gt;
| 8jailbreak.net || Fake&lt;br /&gt;
|-&lt;br /&gt;
| alphajailbreak.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| alpinejb.blogspot.com || Fake&lt;br /&gt;
|-&lt;br /&gt;
| apps.appshed.com/[various #] || On-device fake, webclips and profiles&lt;br /&gt;
|-&lt;br /&gt;
| celtikios7.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| cyberelevat0r.net || Fake&lt;br /&gt;
|-&lt;br /&gt;
| cyberelevat0r.us || Fake&lt;br /&gt;
|-&lt;br /&gt;
| cydia8jailbreak.com || Fake has you download multiple free-to-play apps hoping for in-app purchases&lt;br /&gt;
|-&lt;br /&gt;
| cydia-download.us || On-device scam, cost is unknown as it wants to install a profile and I'm not willing to go that far ;p&lt;br /&gt;
|-&lt;br /&gt;
| cyrooting.com || Affiliated with cydia-download.us which installs a profile from cyrooting.com&lt;br /&gt;
|-&lt;br /&gt;
| downgradeios7.com || Fake on-device downgrade tool&lt;br /&gt;
|-&lt;br /&gt;
| downgradeiphone.com || Sells a false promise (universal iOS/baseband downgrade) for $29&lt;br /&gt;
|-&lt;br /&gt;
| ecydia.com || Sells an unspecified tool for $24.99&lt;br /&gt;
|-&lt;br /&gt;
| equsi0n.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| evad3rs.me || No survey, not selling anything, just has downloads of evasi0n 1.0.7, calling it 1.0.8 and saying it works on iOS 7.1.x. Pointless.&lt;br /&gt;
|-&lt;br /&gt;
| evad3rsdevteam.com || Survey scam, copy of evasi0n.com&lt;br /&gt;
|-&lt;br /&gt;
| evad3rs-devteam.com || Copy of evasi0n.com&lt;br /&gt;
|-&lt;br /&gt;
| evad3rsjb.com || Fake&lt;br /&gt;
|-&lt;br /&gt;
| evad3rsteam.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| evasi0nblog.com || Repackaged evasi0n&lt;br /&gt;
|-&lt;br /&gt;
| evasi0ndevteam.com || Sells evasi0n for $15&lt;br /&gt;
|-&lt;br /&gt;
| evasi0njb.net || Copy of evasi0n.com&lt;br /&gt;
|-&lt;br /&gt;
| evasion-jailbreak.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| evasion-jailbreak7.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| evasi0n-jailbreak.net || Survey scam, copy of evasi0n.com&lt;br /&gt;
|-&lt;br /&gt;
| evasi0njailbreak.com || Fake&lt;br /&gt;
|-&lt;br /&gt;
| evasion7.com || Fake&lt;br /&gt;
|-&lt;br /&gt;
| evasion7download.info/pangu || Malware. See http://bit.ly/1Jcl1hw&lt;br /&gt;
|-&lt;br /&gt;
| evasioniosjailbreak.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| evasionjailbreak.net || Survey scam, copy of evasi0n.com&lt;br /&gt;
|-&lt;br /&gt;
| evasionjailbreak.us || Copy of evasi0n.com&lt;br /&gt;
|-&lt;br /&gt;
| evasionjailbreak7.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| evasi0n-official.com || Survey scam, loosely copied from evasi0n.com&lt;br /&gt;
|-&lt;br /&gt;
| evasl0n.blogspot.com || Survey scam, copy of evasi0n.com&lt;br /&gt;
|-&lt;br /&gt;
| evasi0n7.com/pangu || Fake&lt;br /&gt;
|-&lt;br /&gt;
| evasion7download.info || Malware. See http://bit.ly/1Jcl1hw&lt;br /&gt;
|-&lt;br /&gt;
| evasion7download.info/geeksn0w || Malware. See http://bit.ly/1Jcl1hw&lt;br /&gt;
|-&lt;br /&gt;
| evasion7-jailbreak.com || Fake&lt;br /&gt;
|-&lt;br /&gt;
| evazi0n.net || Fake&lt;br /&gt;
|-&lt;br /&gt;
| ex0dus-jailbreak.com || Unspecified tool, claims to be developed by @planetbeing and @pimskeks. Survey scam after being strung along downloading a fake tool which requires a patch, said patch download requiring survey completion.&lt;br /&gt;
|-&lt;br /&gt;
| factory-directme.com || Sells redsn0w for $14.95&lt;br /&gt;
|-&lt;br /&gt;
| firest0rm.net || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| freed0md00r.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| future7ios7.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| geeksn0w.net || Copy of geeksn0w.it&lt;br /&gt;
|-&lt;br /&gt;
| geeksn0w.net/pangu || Fake&lt;br /&gt;
|-&lt;br /&gt;
| geeksn0wdownload.com || Copy of Geeksn0w.it&lt;br /&gt;
|-&lt;br /&gt;
| getthebest365.com || Sells unspecified tool for $27.00&lt;br /&gt;
|-&lt;br /&gt;
| greenpois0n-gc.blogspot.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| icysn0w.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| idowngrade.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| iemu.org || Fake; previous site for [[iEmu]]&lt;br /&gt;
|-&lt;br /&gt;
| ievad3rs.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| ijailbreak-iphone.com || Sells an unspecified tool for $19.95&lt;br /&gt;
|-&lt;br /&gt;
| ijailbreakpro.com || Sells an unspecified tool for $29.90, $39.90 and $49.90&lt;br /&gt;
|-&lt;br /&gt;
| ijailbreaktool.com || Sells an unspecified tool for $24.99&lt;br /&gt;
|-&lt;br /&gt;
| imessagewin.com || Claims to have iMessage for Windows platform; Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| ineedjailbreak.com || Sells evasi0n / redsn0w for $24.95&lt;br /&gt;
|-&lt;br /&gt;
| inj3ct3d.klikkit.co.uk || asking for donations to publish a non-existent jailbreak&lt;br /&gt;
|-&lt;br /&gt;
| insanelyios.blogspot.com || Downgrade fake, survey scam&lt;br /&gt;
|-&lt;br /&gt;
| instajailbreaker.com || Sells unspecified tool(s) for $29.95&lt;br /&gt;
|-&lt;br /&gt;
| installcydia.mobi || Fake. Takes you to appial.com for freemium appstore games&lt;br /&gt;
|-&lt;br /&gt;
| ios-6-1-4-jailbreak.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| ios-jailbreak.com || Provides fake 8.4.1 jailbreak tool that includes malware&lt;br /&gt;
|-&lt;br /&gt;
| ios8jailbreak.org || Fake&lt;br /&gt;
|-&lt;br /&gt;
| ios8jailbreak.tk || Fake (alternate domain name is ios8-jailbreak.weebly.com)&lt;br /&gt;
|-&lt;br /&gt;
| ios8jailbreakdownload.net || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| ios8pangu.com || Fake, webclip. Wants to install unsigned profile that cannot be removed&lt;br /&gt;
|-&lt;br /&gt;
| ipadjailbreak3.com || Forwards to jailbreakunlock.org&lt;br /&gt;
|-&lt;br /&gt;
| ipangu.net || Fake. Passworded zip files&lt;br /&gt;
|-&lt;br /&gt;
| iphone5break.com || Sells unspecified tool for $49.99&lt;br /&gt;
|-&lt;br /&gt;
| iphonejailbreakplus.com || Sells evasi0n / redsn0w for $29.95&lt;br /&gt;
|-&lt;br /&gt;
| iphonejailbreak-unlock.com || Sells unspecified tool for $27.00&lt;br /&gt;
|-&lt;br /&gt;
| irevert.wordpress.com/ || Claims to be able to downgrade firmware&lt;br /&gt;
|-&lt;br /&gt;
| jailbreak.cc || Sells jailbreaking tools&lt;br /&gt;
|-&lt;br /&gt;
| jailbreak-7.com || App Store app download+play time required, artificially inflating its popularity&lt;br /&gt;
|-&lt;br /&gt;
| jailbreak-absinthe.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| jailbreak-ios-7.com || Tells people to go to thejailbreakshop.com&lt;br /&gt;
|-&lt;br /&gt;
| jailbreak-ios7.net || Sells unspecified tools for $29.95 and $39.95&lt;br /&gt;
|-&lt;br /&gt;
| jailbreak-my-ipad.org || Sells evasi0n / redsn0w for $29.95 '''per month'''&lt;br /&gt;
|-&lt;br /&gt;
| jailbreak-my-iphone.com || Sells unspecified tool for $29.97&lt;br /&gt;
|-&lt;br /&gt;
| jailbreak-team.com || Sells an unspecified tool for $29.99&lt;br /&gt;
|-&lt;br /&gt;
| jailbreak71.com || Fake&lt;br /&gt;
|-&lt;br /&gt;
| jailbreak7wizz.com || Links to jailbreakthings.com, which in turn links to instajailbreaker.com, which sells unspecified tools for $29.95&lt;br /&gt;
|-&lt;br /&gt;
| jailbreakandunlock1.pressdoc.com || Blog that is about jailbreak and unlock which uses fake tools.&lt;br /&gt;
|- &lt;br /&gt;
| jailbreakbj.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| jailbreakgenie.com || Scam. Sells unspecified jailbreak tool for $9.99&lt;br /&gt;
|-&lt;br /&gt;
| jailbreakios7untethered.com || Survey scam, all set up in advance for iOS 7&lt;br /&gt;
|-&lt;br /&gt;
| jailbreakiosnewversion.elitegamershub.com || Survey scam, copied/modified verion of evasi0n7&lt;br /&gt;
|-&lt;br /&gt;
| jailbreakiphone5s.com || Tells people to go to thejailbreakshop.com&lt;br /&gt;
|-&lt;br /&gt;
| jailbreakmenow.net || Sells unspecified tools for $19.95, $29.95, and $39.95 &lt;br /&gt;
|-&lt;br /&gt;
| jailbreaknewiphone.com || Survey scam after being strung along downloading a fake tool&lt;br /&gt;
|-&lt;br /&gt;
| jailbreaktheipad2.com || Sells unspecified tool for $14.95&lt;br /&gt;
|-&lt;br /&gt;
| jailbreakthings.com || Exists solely to promote instajailbreaker.com, a scam site&lt;br /&gt;
|-&lt;br /&gt;
| jailbreakunlock.info || Sells unspecified tools for $19.95, $29.95, and $39.95&lt;br /&gt;
|-&lt;br /&gt;
| jailbreakunlock.org || Sells evasi0n / redsn0w for $14.95&lt;br /&gt;
|-&lt;br /&gt;
| jailbroke.info || Sells jailbreaking &amp;quot;solutions&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| latestiphoneunlock.com || Sells an unspecified tool for $9.95 or $29.95&lt;br /&gt;
|-&lt;br /&gt;
| newios7jailbreak.com || Directs visitors to unlock-jailbreak.net&lt;br /&gt;
|-&lt;br /&gt;
| opensn0w.net || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| overcast7.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| pangu8.com || Fake. Installs webclip from semijb.com&lt;br /&gt;
|-&lt;br /&gt;
| pangudownload.com || Fake&lt;br /&gt;
|-&lt;br /&gt;
| pangu-jailbreak.com || Fake&lt;br /&gt;
|-&lt;br /&gt;
| pangujailbreak.info || Fake, survey scam, poor things can't even pay their hosting bill :)&lt;br /&gt;
|-&lt;br /&gt;
| pangujb.blogspot.com || Fake&lt;br /&gt;
|-&lt;br /&gt;
| pangunow.com || Fake&lt;br /&gt;
|-&lt;br /&gt;
| pod2gblog.blogspot.com || Copy of pod2g's blog&lt;br /&gt;
|-&lt;br /&gt;
| p0sixspwn.co || Windows version is a malware downloader that eventually downloads the real [[p0sixspwn]]&lt;br /&gt;
|-&lt;br /&gt;
| posixspwndownload.com || Copy of [[p0sixspwn]]&lt;br /&gt;
|-&lt;br /&gt;
| ppjailbreak.com || Copy of [[PPJailbreak]] and copyright infringement&lt;br /&gt;
|-&lt;br /&gt;
| premiumjailbreak.com || Sells jailbreaking tools&lt;br /&gt;
|-&lt;br /&gt;
| purpletools.wordpress.com || (and all the other sites/people offering similar stuff)&amp;lt;br /&amp;gt;Scam - Claims access to Apple's internal VPN&lt;br /&gt;
|-&lt;br /&gt;
| redpois0n.net || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| red-snow.com || Sells unspecified tools for $29.95 and $39.95&lt;br /&gt;
|-&lt;br /&gt;
| redsn0w-r9-new.blogspot.com || Survey scam, text is ripped from Dev-Team Blog&lt;br /&gt;
|-&lt;br /&gt;
| rocky-racoon.com || Survey scam, copy of Dev-Team Blog&lt;br /&gt;
|-&lt;br /&gt;
| safera1n.com || Sells an unspecified tool for $24.99&lt;br /&gt;
|-&lt;br /&gt;
| silv3rwind.com || Sells an unspecified tool for $20&lt;br /&gt;
|-&lt;br /&gt;
| semijb.com || Fake. Does not install &amp;quot;the cydia.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| semirestore.org || Fake redistributions of SemiRestore and SemiRestore7&lt;br /&gt;
|-&lt;br /&gt;
| spirit-jb.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| spiritjb.net || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| synergyjailbreak.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| taigremote.com || On-device app-download scam, basically a survey scam&lt;br /&gt;
|-&lt;br /&gt;
| taig8.net || Fake&lt;br /&gt;
|-&lt;br /&gt;
| team7jailbreak.com || On-device survey scam (redirects to 7jailbreak.com). [https://twitter.com/search?q=It%27s%20easy.%20%20Follow%20this%20realy%20simple%20guide%20from%20%40teamjailbreak7&amp;amp;src=typd&amp;amp;f=realtime Known to spam on Twitter]&lt;br /&gt;
|-&lt;br /&gt;
| theios7jailbreaker.com || Directs people to scam sites (ijailbreakpro.com, appleunlocker.com, ijailbreaktool.com)&lt;br /&gt;
|-&lt;br /&gt;
| theios8jailbreak.com || Fake&lt;br /&gt;
|-&lt;br /&gt;
| thejailbreakshop.com || Sells an unspecified tool for $29.97 and $49.97&lt;br /&gt;
|-&lt;br /&gt;
| trianglejailbreak.com || Sells jailbreaking tool&lt;br /&gt;
|-&lt;br /&gt;
| u7xjailbreak.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| unja1l.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| untetheredjailbreakios8.com || Survey scam&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Scam jailbreak and unlock sites ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Domain !! Notes &lt;br /&gt;
|-&lt;br /&gt;
| appleunlocker.com || Sells unspecified jailbreaking + unlocking software for $19.95&lt;br /&gt;
|-&lt;br /&gt;
| bestra1n.com || Sells unspecified jailbreaking + unlocking software for $24.99&lt;br /&gt;
|-&lt;br /&gt;
| cheapestiphoneunlock.com || Sells unspecified jailbreaking + unlocking software for $9.99&lt;br /&gt;
|-&lt;br /&gt;
| deblocage-iphone-fr.com || Sells unspecified unlocking software for €29.99&lt;br /&gt;
|-&lt;br /&gt;
| desbloquear-iphone-pro.com || Sells unspecified unlocking software for €29.99&lt;br /&gt;
|-&lt;br /&gt;
| e-imeiunlock.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| easyiphoneunlocking.com || Sells unspecified jailbreaking + unlocking software for $24.95&lt;br /&gt;
|-&lt;br /&gt;
| easyunlockiphone.net || Sells unspecified jailbreaking + unlocking software for $24.99&lt;br /&gt;
|-&lt;br /&gt;
| easyunlockingsolutions.com || Sells unspecified unlocking software for $19.99&lt;br /&gt;
|-&lt;br /&gt;
| how-jailbreak-iphone.com || Sells unspecified jailbreaking + unlocking software for $19.95&lt;br /&gt;
|-&lt;br /&gt;
| ijailbreakpro.com || Sells redsn0w for $29.90, $39.90, or $49.90&lt;br /&gt;
|-&lt;br /&gt;
| ijailbreaktool.com || Sells unspecified jailbreaking software for $24.99&lt;br /&gt;
|-&lt;br /&gt;
| ios7jailbreaker.net || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| ios7jailbreak.fr || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| iphone5break.com || Sells unspecified jailbreaking + unlocking software for $49.99&lt;br /&gt;
|-&lt;br /&gt;
| iphone-instant-unlock.com || Sells unspecified unlocking software for $14.95&lt;br /&gt;
|-&lt;br /&gt;
| iphone-unlock-pro.com || Redirects to unlock4iphone.com, desbloquear-iphone-pro.com, and deblocage-iphone-fr.com&lt;br /&gt;
|-&lt;br /&gt;
| iphone-unlocker-pro.com || Sells unspecified jailbreaking + unlocking software for $24.95&lt;br /&gt;
|-&lt;br /&gt;
| iphone-unlock-me.com || Sells unspecified unlocking software for $14.95&lt;br /&gt;
|-&lt;br /&gt;
| iphone-unlockme.com || Sells unspecified unlocking software for $14.95&lt;br /&gt;
|-&lt;br /&gt;
| iphoneunlocker.org.uk || Sells unspecified jailbreaking + unlocking software for £14.99&lt;br /&gt;
|-&lt;br /&gt;
| iphoneunlockersoftware.com || Sells unspecified jailbreaking + unlocking software for $24.97&lt;br /&gt;
|-&lt;br /&gt;
| iphoneunlockplus.com || Sells unspecified unlocking software for $22.99&lt;br /&gt;
|-&lt;br /&gt;
| iphoneunlockwiz.com || Sells unspecified jailbreaking + unlocking software for $29.97&lt;br /&gt;
|-&lt;br /&gt;
| jailbreakandunlockiphones.com || Glowing reviews of, and links to, scam sites which are mostly offline now&lt;br /&gt;
|-&lt;br /&gt;
| jailbreakiphone5express.com || Links to ijailbreakpro.com, appleunlocker.com and ijailbreaktool.com&lt;br /&gt;
|-&lt;br /&gt;
| myappledownload.com || Sells undefined non-existing jailbreaks, unlocks, downgrades for $19.99&lt;br /&gt;
|-&lt;br /&gt;
| mydowngrade.com || Sells undefined non-existing jailbreaks, unlocks, downgrades for $19.99&lt;br /&gt;
|-&lt;br /&gt;
| myunlocker.org || On-device survey / app download scam&lt;br /&gt;
|-&lt;br /&gt;
| phoneunlockguy.com || Sells unspecified jailbreaking + unlocking software for $14.95&lt;br /&gt;
|-&lt;br /&gt;
| solutions-directme.com || Sells unspecified jailbreaking software for $14.95&lt;br /&gt;
|-&lt;br /&gt;
| superiorsim.com || Sells SIM interposers, reported to be a scam by various websites&lt;br /&gt;
|-&lt;br /&gt;
| superunlockiphone.com || Sells unspecified jailbreaking + unlocking software for £14.99&lt;br /&gt;
|-&lt;br /&gt;
| tracyandmatt.co.uk || Refers victims to unlock-jailbreak.net&lt;br /&gt;
|-&lt;br /&gt;
| transx-solutions.com || Sells software for $14.95 which does not say what it is. Also requires a download&lt;br /&gt;
|-&lt;br /&gt;
| trusted-iphone-unlocker.com || Sells unspecified jailbreaking + unlocking software for $24.95&lt;br /&gt;
|-&lt;br /&gt;
| ultimateiphoneunlocker.com || Sells unspecified unlocking software for $19.95&lt;br /&gt;
|-&lt;br /&gt;
| unlock-your-phones.com || Sells evasi0n as an unlock for €8.99&lt;br /&gt;
|-&lt;br /&gt;
| unlock-apple-iphone.com || Sells unspecified jailbreaking + unlocking software for $29.99&lt;br /&gt;
|-&lt;br /&gt;
| unlock-appleiphone.com || Sells IMEI unlocks for ANY carrier (including Singtel, which is factory unlocked, and including Sprint, which is nearly impossible, and certainly not done for that price) for $29.95&lt;br /&gt;
|-&lt;br /&gt;
| unlock-ijailbreak.net || Added a letter to the URL, otherwise it's the same site as unlock-jailbreak.net&lt;br /&gt;
|-&lt;br /&gt;
| unlock-iphone.info || Fake. Claims that donating will expedite your request.&amp;lt;!-- Not to mention the request form isn't even an HTML &amp;lt;form&amp;gt;. The &amp;quot;submit&amp;quot; button is just a link. --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| unlock-jailbreak.net || Sells unspecified unlocking software for $24.99&lt;br /&gt;
|-&lt;br /&gt;
| unlock-jailbreak-iphone.com || Sells unspecified jailbreaking + unlocking software for $24.99&lt;br /&gt;
|-&lt;br /&gt;
| unlock-the-iphone.com || Sells unspecified jailbreaking + unlocking software for $29.95, $37.95, or $49&lt;br /&gt;
|-&lt;br /&gt;
| unlock4iphone.com || Sells unspecified unlocking software for $29.99&lt;br /&gt;
|-&lt;br /&gt;
| unlockimeiiphone.com || Sells unspecified jailbreaking + unlocking tool for $19.95&lt;br /&gt;
|-&lt;br /&gt;
| unlockiphone.net || Sells unspecified jailbreaking + unlocking tool&lt;br /&gt;
|-&lt;br /&gt;
| unlockiphone.org || Sells unspecified unlocking software for $24.95&lt;br /&gt;
|-&lt;br /&gt;
| unlockiphoneios5.com || Sells unspecified jailbreaking + unlocking software for $14.95&lt;br /&gt;
|-&lt;br /&gt;
| unlockiphonenow.org || Sells unspecified jailbreaking + unlocking software for $24.99&lt;br /&gt;
|-&lt;br /&gt;
| unlockiphonepro.com || Sells unspecified jailbreaking + unlocking software for $24.99&lt;br /&gt;
|-&lt;br /&gt;
| unlockjailbreaktool.com || Sells unspecified jailbreaking + unlocking software for $24.99&lt;br /&gt;
|-&lt;br /&gt;
| unlockmecentral.com || Sells jailbreaking &amp;quot;membership&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| ultrasn0wtool.com || Claims to unlock via a GUI app&lt;br /&gt;
|-&lt;br /&gt;
| ziphone.org || Directs visitors to iphone-unlocker-pro.com&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>0x56</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=46636</id>
		<title>Jailbreak Exploits</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=46636"/>
		<updated>2015-06-26T19:35:06Z</updated>

		<summary type="html">&lt;p&gt;0x56: more exploit description updates&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists the '''exploits''' used in [[jailbreak]]s.&lt;br /&gt;
&lt;br /&gt;
== Common exploits which are used in order to jailbreak different versions of iOS ==&lt;br /&gt;
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[n82ap|iPhone 3G]])&lt;br /&gt;
* [[ARM7 Go]] (from iOS 2.1.1) (for [[tethered jailbreak]] on [[n72ap|iPod touch 2G]])&lt;br /&gt;
* [[0x24000 Segment Overflow]] (for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]] and [[n72ap|iPod touch 2G]] with [[Bootrom 240.4|old bootrom]]; another exploit as the [[limera1n Exploit]] is required)&lt;br /&gt;
* [[limera1n Exploit]] (for [[tethered jailbreak]] on [[n88ap|iPhone 3GS]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], [[n81ap|iPod touch 4G]] and [[k66ap|Apple TV 2G]])&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (also known as &amp;quot;steaks4uce&amp;quot;) (for [[tethered jailbreak]] on [[n72ap|iPod touch 2G]])&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak different versions of iOS ==&lt;br /&gt;
=== [[PwnageTool]] (2.0 - 5.1.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[redsn0w]] (3.0 - 6.0) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the same exploits as [[Absinthe|Absinthe]] and [[Absinthe|Absinthe 2.0]] to jailbreak iOS 5.0/5.0.1 and 5.1.1&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[sn0wbreeze]] (3.1.3 - 6.1.3) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 6.1.2&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 1.x ==&lt;br /&gt;
=== [[AppTapp Installer]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[iBrickr]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[AppSnapp]]/[[JailbreakMe|JailbreakMe 1.0]] (1.0 / 1.0.1 / 1.0.2 / 1.1.1) ===&lt;br /&gt;
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) ({{cve|2006-3459}})&lt;br /&gt;
&lt;br /&gt;
=== [[mknod|OktoPrep]] (1.1.2) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.2 from a jailborken 1.1.1&lt;br /&gt;
* [[mknod]]&lt;br /&gt;
&lt;br /&gt;
=== [[Soft Upgrade]] (1.1.3) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.3 from a running jailbroken 1.1.2&lt;br /&gt;
&lt;br /&gt;
=== [[ZiPhone]] (1.1.3 / 1.1.4 /1.1.5) ===&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
&lt;br /&gt;
=== [[iLiberty+|iLiberty / iLiberty+]] (1.1.3 / 1.1.4 /1.1.5) ===&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 2.x ==&lt;br /&gt;
=== [[QuickPwn]] (2.0 - 2.2.1) ===&lt;br /&gt;
* uses [[Pwnage]] and [[Pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
=== [[Redsn0w Lite]] (2.1.1) ===&lt;br /&gt;
* [[ARM7 Go]] (for [[n72ap|iPod touch 2G]] only)&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 3.x ==&lt;br /&gt;
=== [[purplera1n]] (3.0) ===&lt;br /&gt;
* [[iBoot Environment Variable Overflow]] ({{cve|2009-2795}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[blackra1n]] (3.1.2) ===&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]] ({{cve|2010-0038}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Spirit]] (3.1.2 / 3.1.3 / 3.2) ===&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[BPF_STX Kernel Write Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (3.1.2 / 3.1.3 / 3.2 / 3.2.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] / [[greenpois0n (jailbreak)|greenpois0n]] (3.2.2) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 4.x ==&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (4.0 / 4.0.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] /  (4.0 / 4.0.1 / 4.0.2 / 4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.2.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.2.6 / 4.2.7 / 4.2.8) ===&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.3 / 4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
Except for the [[n18ap|iPod touch 3G]] on iOS 4.3.1.&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[IOMobileFrameBuffer Privilege Escalation Exploit]] ({{cve|2011-0227}})&lt;br /&gt;
&lt;br /&gt;
=== i0nic's Untether (4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
used in [[redsn0w]] to untether iOS 4.3.1 / 4.3.2 / 4.3.3&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 5.x ==&lt;br /&gt;
=== [[unthredera1n]] (5.0 / 5.0.1 / 5.1 / 5.1.1) ===&lt;br /&gt;
Except for the [[iPad 3]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe]] (5.0 on [[n94ap|iPhone 4S]] only / 5.0.1 on [[iPad 2]] and [[iPhone 4S]])  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}}) (used both for payload injection and untether)&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Corona|Corona Untether]] (5.0.1)  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}})&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe|Absinthe 2.0]] and [[Rocky Racoon|Rocky Racoon Untether]] (5.1.1) ===&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* Racoon DNS4/WINS4 table buffer overflow ({{cve|2012-3727}})&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 6.x ==&lt;br /&gt;
=== [[evasi0n]] (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2)  ===&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-0979}})&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
* [[Shebang Trick]] ({{cve|2013-5154}})&lt;br /&gt;
* [[AMFID code signing evasion]]&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[IOUSBDeviceFamily Vulnerability]] ({{cve|2013-0981}})&lt;br /&gt;
* [[ARM Exception Vector Info Leak]] ({{cve|2013-0978}})&lt;br /&gt;
* [[dynamic memmove() locating]]&lt;br /&gt;
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]&lt;br /&gt;
* [[kernel memory write via ROP gadget]]&lt;br /&gt;
* [[Overlapping Segment Attack]] ({{cve|2013-0977}})&lt;br /&gt;
&lt;br /&gt;
=== [[p0sixspwn]] (6.1.3 / 6.1.4 / 6.1.5 / 6.1.6) ===&lt;br /&gt;
* [[posix_spawn kernel information leak]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[posix_spawn kernel exploit]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[mach_msg_ool_descriptor_ts for heap shaping]] ({{cve|2013-3953}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 7.x ==&lt;br /&gt;
=== [[evasi0n7]] (7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6) ===&lt;br /&gt;
{{Section Stub}}&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-5133}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* CrashHouseKeeping chmod vulnarability ({{cve|2014-1272}})&lt;br /&gt;
* ptmx_get_ioctl ioctl crafted call ({{cve|2014-1278}})&lt;br /&gt;
&lt;br /&gt;
=== [[Geeksn0w]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* [[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) (Pangu v1.0.0)&lt;br /&gt;
* AppleKeyStore::initUserClient info leak ({{cve|2014-4407}}) (Pangu &amp;gt;v1.0.0)&lt;br /&gt;
* break_early_random (by [[i0n1c]] and Tarjei Mandt of Azimuth) ({{cve|2014-4422}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOSharedDataQueue notification port overwrite ({{cve|2014-4461}})&lt;br /&gt;
* &amp;quot;syslogd chown&amp;quot; vulnerability&lt;br /&gt;
* enterprise certificate (no real exploit, used for initial &amp;quot;unsigned&amp;quot; code execution)&lt;br /&gt;
* &amp;quot;foo_extracted&amp;quot; symlink vulnerability (used to write to /var) ({{cve|2014-4386}})&lt;br /&gt;
* /tmp/bigfile (a big file for improvement of the reliability of a race condition)&lt;br /&gt;
* VoIP backgrounding trick (used to auto restart the app)&lt;br /&gt;
* hidden segment attack&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 8.x ==&lt;br /&gt;
=== [[Pangu8]] (8.0 / 8.0.1 / 8.0.2 / 8.1) ===&lt;br /&gt;
* an exploit for a bug in /usr/libexec/neagent (source @iH8sn0w)&lt;br /&gt;
* enterprise certificate (inside the IPA)&lt;br /&gt;
* a kind of dylib injection into a system process (see IPA)&lt;br /&gt;
* a dmg mount command (looks like the Developer DMG) (syslog while jailbreaking)&lt;br /&gt;
* a sandboxing problem in debugserver ({{cve|2014-4457}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* the same kernel exploit as used in [[Pangu|the first Pangu]] ({{cve|2014-4461}}) (source @iH8sn0w)&lt;br /&gt;
* enable-dylibs-to-override-cache&lt;br /&gt;
* a new ovelapping segment attack ({{cve|2014-4455}})&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}})&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) ===&lt;br /&gt;
(See also details at [http://newosxbook.com/articles/TaiG.html newosxbook.com])&lt;br /&gt;
* A new AFC symlink attack ({{cve|2014-4480}}) - to get onto the device filesystem&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]], also used in p0sixspwn) - to mount a fake DDI and instantly overwrite (via union) libmis/xpcd_cache&lt;br /&gt;
* A new overlapping segment attack [in a modified version], dyld, ({{cve|2014-4455}}) - negative LC_SEGMENT - to allow libmis and xpcdcache to load&lt;br /&gt;
* libmis redirection of MISValidateSignature (as per evasion) to kCFEqual, with overlapping segment variant on TaiG (Segment at end of file, negative)&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis/xpcd_cache)&lt;br /&gt;
* MobileStorageMounter exploit ({{cve|2015-1062}})&lt;br /&gt;
* Backup exploit used to access restricted parts of the filesystem ({{cve|2015-1087}})&lt;br /&gt;
&lt;br /&gt;
Kernel:&lt;br /&gt;
&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) - leaks slid addresses&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOHIDFamily Kernel exploit ({{cve|2014-4487}}) - to overwrite memory&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] (8.1.3 / 8.2 / 8.3) ===&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (also used in TaiG for 8.0-8.1.2 but modified) - to mount a fake DDI&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis)&lt;br /&gt;
* (rest currently unknown)&lt;/div&gt;</summary>
		<author><name>0x56</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=46635</id>
		<title>Jailbreak Exploits</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=46635"/>
		<updated>2015-06-26T19:21:54Z</updated>

		<summary type="html">&lt;p&gt;0x56: /* Pangu (7.1 / 7.1.1 / 7.1.2) */ copy/paste fail&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists the '''exploits''' used in [[jailbreak]]s.&lt;br /&gt;
&lt;br /&gt;
== Common exploits which are used in order to jailbreak different versions of iOS ==&lt;br /&gt;
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[n82ap|iPhone 3G]])&lt;br /&gt;
* [[ARM7 Go]] (from iOS 2.1.1) (for [[tethered jailbreak]] on [[n72ap|iPod touch 2G]])&lt;br /&gt;
* [[0x24000 Segment Overflow]] (for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]] and [[n72ap|iPod touch 2G]] with [[Bootrom 240.4|old bootrom]]; another exploit as the [[limera1n Exploit]] is required)&lt;br /&gt;
* [[limera1n Exploit]] (for [[tethered jailbreak]] on [[n88ap|iPhone 3GS]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], [[n81ap|iPod touch 4G]] and [[k66ap|Apple TV 2G]])&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (also known as &amp;quot;steaks4uce&amp;quot;) (for [[tethered jailbreak]] on [[n72ap|iPod touch 2G]])&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak different versions of iOS ==&lt;br /&gt;
=== [[PwnageTool]] (2.0 - 5.1.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[redsn0w]] (3.0 - 6.0) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the same exploits as [[Absinthe|Absinthe]] and [[Absinthe|Absinthe 2.0]] to jailbreak iOS 5.0/5.0.1 and 5.1.1&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[sn0wbreeze]] (3.1.3 - 6.1.3) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 6.1.2&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 1.x ==&lt;br /&gt;
=== [[AppTapp Installer]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[iBrickr]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[AppSnapp]]/[[JailbreakMe|JailbreakMe 1.0]] (1.0 / 1.0.1 / 1.0.2 / 1.1.1) ===&lt;br /&gt;
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) ({{cve|2006-3459}})&lt;br /&gt;
&lt;br /&gt;
=== [[mknod|OktoPrep]] (1.1.2) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.2 from a jailborken 1.1.1&lt;br /&gt;
* [[mknod]]&lt;br /&gt;
&lt;br /&gt;
=== [[Soft Upgrade]] (1.1.3) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.3 from a running jailbroken 1.1.2&lt;br /&gt;
&lt;br /&gt;
=== [[ZiPhone]] (1.1.3 / 1.1.4 /1.1.5) ===&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
&lt;br /&gt;
=== [[iLiberty+|iLiberty / iLiberty+]] (1.1.3 / 1.1.4 /1.1.5) ===&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 2.x ==&lt;br /&gt;
=== [[QuickPwn]] (2.0 - 2.2.1) ===&lt;br /&gt;
* uses [[Pwnage]] and [[Pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
=== [[Redsn0w Lite]] (2.1.1) ===&lt;br /&gt;
* [[ARM7 Go]] (for [[n72ap|iPod touch 2G]] only)&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 3.x ==&lt;br /&gt;
=== [[purplera1n]] (3.0) ===&lt;br /&gt;
* [[iBoot Environment Variable Overflow]] ({{cve|2009-2795}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[blackra1n]] (3.1.2) ===&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]] ({{cve|2010-0038}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Spirit]] (3.1.2 / 3.1.3 / 3.2) ===&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[BPF_STX Kernel Write Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (3.1.2 / 3.1.3 / 3.2 / 3.2.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] / [[greenpois0n (jailbreak)|greenpois0n]] (3.2.2) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 4.x ==&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (4.0 / 4.0.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] /  (4.0 / 4.0.1 / 4.0.2 / 4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.2.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.2.6 / 4.2.7 / 4.2.8) ===&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.3 / 4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
Except for the [[n18ap|iPod touch 3G]] on iOS 4.3.1.&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[IOMobileFrameBuffer Privilege Escalation Exploit]] ({{cve|2011-0227}})&lt;br /&gt;
&lt;br /&gt;
=== i0nic's Untether (4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
used in [[redsn0w]] to untether iOS 4.3.1 / 4.3.2 / 4.3.3&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 5.x ==&lt;br /&gt;
=== [[unthredera1n]] (5.0 / 5.0.1 / 5.1 / 5.1.1) ===&lt;br /&gt;
Except for the [[iPad 3]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe]] (5.0 on [[n94ap|iPhone 4S]] only / 5.0.1 on [[iPad 2]] and [[iPhone 4S]])  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}}) (used both for payload injection and untether)&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Corona|Corona Untether]] (5.0.1)  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}})&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe|Absinthe 2.0]] and [[Rocky Racoon|Rocky Racoon Untether]] (5.1.1) ===&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* Racoon DNS4/WINS4 table buffer overflow ({{cve|2012-3727}})&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 6.x ==&lt;br /&gt;
=== [[evasi0n]] (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2)  ===&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-0979}})&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
* [[Shebang Trick]] ({{cve|2013-5154}})&lt;br /&gt;
* [[AMFID code signing evasion]]&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[IOUSBDeviceFamily Vulnerability]] ({{cve|2013-0981}})&lt;br /&gt;
* [[ARM Exception Vector Info Leak]] ({{cve|2013-0978}})&lt;br /&gt;
* [[dynamic memmove() locating]]&lt;br /&gt;
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]&lt;br /&gt;
* [[kernel memory write via ROP gadget]]&lt;br /&gt;
* [[Overlapping Segment Attack]] ({{cve|2013-0977}})&lt;br /&gt;
&lt;br /&gt;
=== [[p0sixspwn]] (6.1.3 / 6.1.4 / 6.1.5 / 6.1.6) ===&lt;br /&gt;
* [[posix_spawn kernel information leak]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[posix_spawn kernel exploit]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[mach_msg_ool_descriptor_ts for heap shaping]] ({{cve|2013-3953}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 7.x ==&lt;br /&gt;
=== [[evasi0n7]] (7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6) ===&lt;br /&gt;
{{Section Stub}}&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-5133}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* CrashHouseKeeping chmod vulnarability ({{cve|2014-1272}})&lt;br /&gt;
* ptmx_get_ioctl ioctl crafted call ({{cve|2014-1278}})&lt;br /&gt;
&lt;br /&gt;
=== [[Geeksn0w]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* [[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) (Pangu v1.0.0)&lt;br /&gt;
* AppleKeyStore::initUserClient info leak ({{cve|2014-4407}}) (Pangu &amp;gt;v1.0.0)&lt;br /&gt;
* break_early_random (by [[i0n1c]] and Tarjei Mandt of Azimuth) ({{cve|2014-4422}})&lt;br /&gt;
* mach_port_kobject info leak ({{cve|2014-4496}})&lt;br /&gt;
* IOSharedDataQueue notification port overwrite ({{cve|2014-4461}})&lt;br /&gt;
* &amp;quot;syslogd chown&amp;quot; vulnerability&lt;br /&gt;
* enterprise certificate (no real exploit, used for initial &amp;quot;unsigned&amp;quot; code execution)&lt;br /&gt;
* &amp;quot;foo_extracted&amp;quot; symlink vulnerability (used to write to /var) ({{cve|2014-4386}})&lt;br /&gt;
* /tmp/bigfile (a big file for improvement of the reliability of a race condition)&lt;br /&gt;
* VoIP backgrounding trick (used to auto restart the app)&lt;br /&gt;
* hidden segment attack&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 8.x ==&lt;br /&gt;
=== [[Pangu8]] (8.0 / 8.0.1 / 8.0.2 / 8.1) ===&lt;br /&gt;
* an exploit for a bug in /usr/libexec/neagent (source @iH8sn0w)&lt;br /&gt;
* enterprise certificate (inside the IPA)&lt;br /&gt;
* a kind of dylib injection into a system process (see IPA)&lt;br /&gt;
* a dmg mount command (looks like the Developer DMG) (syslog while jailbreaking)&lt;br /&gt;
* a sandboxing problem in debugserver ({{cve|2014-4457}})&lt;br /&gt;
* the same/a similar kernel exploit as used in [[Pangu|the first Pangu]] ({{cve|2014-4461}}) (source @iH8sn0w)&lt;br /&gt;
* enable-dylibs-to-override-cache&lt;br /&gt;
* a new ovelapping segment attack ({{cve|2014-4455}})&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}})&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) ===&lt;br /&gt;
(See also details at [http://newosxbook.com/articles/TaiG.html newosxbook.com])&lt;br /&gt;
* A new AFC symlink attack ({{cve|2014-4480}}) - to get onto the device filesystem&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]], also used in p0sixspwn) - to mount a fake DDI and instantly overwrite (via union) libmis/libxpcd.cache&lt;br /&gt;
* A new overlapping segment attack [in a modified version], dyld, ({{cve|2014-4455}}) - negative LC_SEGMENT - to allow libmis and xpcdcache to load&lt;br /&gt;
* libmis redirection of MISValidateSignature (as per evasion) to kCFEqual, with overlapping segment variant on TaiG (Segment at end of file, negative)&lt;br /&gt;
* enable-dylibs-to-override-cache - (not an exploit, a feature) - required to allow loading of xpcd/libmis from filesystem, because they are both in shared cache&lt;br /&gt;
* MobileStorageMounter exploit ({{cve|2015-1062}})&lt;br /&gt;
* Backup exploit used to access restricted parts of the filesystem ({{cve|2015-1087}})&lt;br /&gt;
&lt;br /&gt;
Kernel:&lt;br /&gt;
&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) - leaks slid addresses&lt;br /&gt;
* mach_port_kobject exploit - to defeat KASLR {{cve|2014-4496}}&lt;br /&gt;
* IOHIDFamily Kernel exploit ({{cve|2014-4487}}) - to overwrite memory&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] (8.1.3 / 8.2 / 8.3) ===&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (also used in TaiG for 8.0-8.1.2 but modified) - to mount a fake DDI and instantly overwrite (via union) libmis/libxpcd.cache&lt;br /&gt;
* enable-dylibs-to-override-cache - (not an exploit, a feature) - required to allow loading of xpcd/libmis from filesystem, because they are both in shared cache&lt;br /&gt;
* (rest currently unknown)&lt;/div&gt;</summary>
		<author><name>0x56</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=46634</id>
		<title>Jailbreak Exploits</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=46634"/>
		<updated>2015-06-26T19:19:54Z</updated>

		<summary type="html">&lt;p&gt;0x56: /* Pangu (7.1 / 7.1.1 / 7.1.2) */ template formatting error&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists the '''exploits''' used in [[jailbreak]]s.&lt;br /&gt;
&lt;br /&gt;
== Common exploits which are used in order to jailbreak different versions of iOS ==&lt;br /&gt;
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[n82ap|iPhone 3G]])&lt;br /&gt;
* [[ARM7 Go]] (from iOS 2.1.1) (for [[tethered jailbreak]] on [[n72ap|iPod touch 2G]])&lt;br /&gt;
* [[0x24000 Segment Overflow]] (for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]] and [[n72ap|iPod touch 2G]] with [[Bootrom 240.4|old bootrom]]; another exploit as the [[limera1n Exploit]] is required)&lt;br /&gt;
* [[limera1n Exploit]] (for [[tethered jailbreak]] on [[n88ap|iPhone 3GS]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], [[n81ap|iPod touch 4G]] and [[k66ap|Apple TV 2G]])&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (also known as &amp;quot;steaks4uce&amp;quot;) (for [[tethered jailbreak]] on [[n72ap|iPod touch 2G]])&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak different versions of iOS ==&lt;br /&gt;
=== [[PwnageTool]] (2.0 - 5.1.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[redsn0w]] (3.0 - 6.0) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the same exploits as [[Absinthe|Absinthe]] and [[Absinthe|Absinthe 2.0]] to jailbreak iOS 5.0/5.0.1 and 5.1.1&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[sn0wbreeze]] (3.1.3 - 6.1.3) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 6.1.2&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 1.x ==&lt;br /&gt;
=== [[AppTapp Installer]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[iBrickr]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[AppSnapp]]/[[JailbreakMe|JailbreakMe 1.0]] (1.0 / 1.0.1 / 1.0.2 / 1.1.1) ===&lt;br /&gt;
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) ({{cve|2006-3459}})&lt;br /&gt;
&lt;br /&gt;
=== [[mknod|OktoPrep]] (1.1.2) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.2 from a jailborken 1.1.1&lt;br /&gt;
* [[mknod]]&lt;br /&gt;
&lt;br /&gt;
=== [[Soft Upgrade]] (1.1.3) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.3 from a running jailbroken 1.1.2&lt;br /&gt;
&lt;br /&gt;
=== [[ZiPhone]] (1.1.3 / 1.1.4 /1.1.5) ===&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
&lt;br /&gt;
=== [[iLiberty+|iLiberty / iLiberty+]] (1.1.3 / 1.1.4 /1.1.5) ===&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 2.x ==&lt;br /&gt;
=== [[QuickPwn]] (2.0 - 2.2.1) ===&lt;br /&gt;
* uses [[Pwnage]] and [[Pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
=== [[Redsn0w Lite]] (2.1.1) ===&lt;br /&gt;
* [[ARM7 Go]] (for [[n72ap|iPod touch 2G]] only)&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 3.x ==&lt;br /&gt;
=== [[purplera1n]] (3.0) ===&lt;br /&gt;
* [[iBoot Environment Variable Overflow]] ({{cve|2009-2795}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[blackra1n]] (3.1.2) ===&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]] ({{cve|2010-0038}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Spirit]] (3.1.2 / 3.1.3 / 3.2) ===&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[BPF_STX Kernel Write Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (3.1.2 / 3.1.3 / 3.2 / 3.2.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] / [[greenpois0n (jailbreak)|greenpois0n]] (3.2.2) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 4.x ==&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (4.0 / 4.0.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] /  (4.0 / 4.0.1 / 4.0.2 / 4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.2.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.2.6 / 4.2.7 / 4.2.8) ===&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.3 / 4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
Except for the [[n18ap|iPod touch 3G]] on iOS 4.3.1.&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[IOMobileFrameBuffer Privilege Escalation Exploit]] ({{cve|2011-0227}})&lt;br /&gt;
&lt;br /&gt;
=== i0nic's Untether (4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
used in [[redsn0w]] to untether iOS 4.3.1 / 4.3.2 / 4.3.3&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 5.x ==&lt;br /&gt;
=== [[unthredera1n]] (5.0 / 5.0.1 / 5.1 / 5.1.1) ===&lt;br /&gt;
Except for the [[iPad 3]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe]] (5.0 on [[n94ap|iPhone 4S]] only / 5.0.1 on [[iPad 2]] and [[iPhone 4S]])  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}}) (used both for payload injection and untether)&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Corona|Corona Untether]] (5.0.1)  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}})&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe|Absinthe 2.0]] and [[Rocky Racoon|Rocky Racoon Untether]] (5.1.1) ===&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* Racoon DNS4/WINS4 table buffer overflow ({{cve|2012-3727}})&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 6.x ==&lt;br /&gt;
=== [[evasi0n]] (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2)  ===&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-0979}})&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
* [[Shebang Trick]] ({{cve|2013-5154}})&lt;br /&gt;
* [[AMFID code signing evasion]]&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[IOUSBDeviceFamily Vulnerability]] ({{cve|2013-0981}})&lt;br /&gt;
* [[ARM Exception Vector Info Leak]] ({{cve|2013-0978}})&lt;br /&gt;
* [[dynamic memmove() locating]]&lt;br /&gt;
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]&lt;br /&gt;
* [[kernel memory write via ROP gadget]]&lt;br /&gt;
* [[Overlapping Segment Attack]] ({{cve|2013-0977}})&lt;br /&gt;
&lt;br /&gt;
=== [[p0sixspwn]] (6.1.3 / 6.1.4 / 6.1.5 / 6.1.6) ===&lt;br /&gt;
* [[posix_spawn kernel information leak]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[posix_spawn kernel exploit]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[mach_msg_ool_descriptor_ts for heap shaping]] ({{cve|2013-3953}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 7.x ==&lt;br /&gt;
=== [[evasi0n7]] (7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6) ===&lt;br /&gt;
{{Section Stub}}&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-5133}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* CrashHouseKeeping chmod vulnarability ({{cve|2014-1272}})&lt;br /&gt;
* ptmx_get_ioctl ioctl crafted call ({{cve|2014-1278}})&lt;br /&gt;
&lt;br /&gt;
=== [[Geeksn0w]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* [[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) (Pangu v1.0.0)&lt;br /&gt;
* AppleKeyStore::initUserClient info leak ({{cve|2014-4407}}) (Pangu &amp;gt;v1.0.0)&lt;br /&gt;
* break_early_random (by [[i0n1c]] and Tarjei Mandt of Azimuth) ({{cve|2014-4422}})&lt;br /&gt;
* mach_port_kobject info leak ({{cve|2014-4496}})&lt;br /&gt;
* IOSharedDataQueue notification port overwrite ({{cve|2014-4487}})&lt;br /&gt;
* &amp;quot;syslogd chown&amp;quot; vulnerability&lt;br /&gt;
* enterprise certificate (no real exploit, used for initial &amp;quot;unsigned&amp;quot; code execution)&lt;br /&gt;
* &amp;quot;foo_extracted&amp;quot; symlink vulnerability (used to write to /var) ({{cve|2014-4386}})&lt;br /&gt;
* /tmp/bigfile (a big file for improvement of the reliability of a race condition)&lt;br /&gt;
* VoIP backgrounding trick (used to auto restart the app)&lt;br /&gt;
* hidden segment attack&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 8.x ==&lt;br /&gt;
=== [[Pangu8]] (8.0 / 8.0.1 / 8.0.2 / 8.1) ===&lt;br /&gt;
* an exploit for a bug in /usr/libexec/neagent (source @iH8sn0w)&lt;br /&gt;
* enterprise certificate (inside the IPA)&lt;br /&gt;
* a kind of dylib injection into a system process (see IPA)&lt;br /&gt;
* a dmg mount command (looks like the Developer DMG) (syslog while jailbreaking)&lt;br /&gt;
* a sandboxing problem in debugserver ({{cve|2014-4457}})&lt;br /&gt;
* the same/a similar kernel exploit as used in [[Pangu|the first Pangu]] ({{cve|2014-4461}}) (source @iH8sn0w)&lt;br /&gt;
* enable-dylibs-to-override-cache&lt;br /&gt;
* a new ovelapping segment attack ({{cve|2014-4455}})&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}})&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) ===&lt;br /&gt;
(See also details at [http://newosxbook.com/articles/TaiG.html newosxbook.com])&lt;br /&gt;
* A new AFC symlink attack ({{cve|2014-4480}}) - to get onto the device filesystem&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]], also used in p0sixspwn) - to mount a fake DDI and instantly overwrite (via union) libmis/libxpcd.cache&lt;br /&gt;
* A new overlapping segment attack [in a modified version], dyld, ({{cve|2014-4455}}) - negative LC_SEGMENT - to allow libmis and xpcdcache to load&lt;br /&gt;
* libmis redirection of MISValidateSignature (as per evasion) to kCFEqual, with overlapping segment variant on TaiG (Segment at end of file, negative)&lt;br /&gt;
* enable-dylibs-to-override-cache - (not an exploit, a feature) - required to allow loading of xpcd/libmis from filesystem, because they are both in shared cache&lt;br /&gt;
* MobileStorageMounter exploit ({{cve|2015-1062}})&lt;br /&gt;
* Backup exploit used to access restricted parts of the filesystem ({{cve|2015-1087}})&lt;br /&gt;
&lt;br /&gt;
Kernel:&lt;br /&gt;
&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) - leaks slid addresses&lt;br /&gt;
* mach_port_kobject exploit - to defeat KASLR {{cve|2014-4496}}&lt;br /&gt;
* IOHIDFamily Kernel exploit ({{cve|2014-4487}}) - to overwrite memory&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] (8.1.3 / 8.2 / 8.3) ===&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (also used in TaiG for 8.0-8.1.2 but modified) - to mount a fake DDI and instantly overwrite (via union) libmis/libxpcd.cache&lt;br /&gt;
* enable-dylibs-to-override-cache - (not an exploit, a feature) - required to allow loading of xpcd/libmis from filesystem, because they are both in shared cache&lt;br /&gt;
* (rest currently unknown)&lt;/div&gt;</summary>
		<author><name>0x56</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=46633</id>
		<title>Jailbreak Exploits</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=46633"/>
		<updated>2015-06-26T19:19:09Z</updated>

		<summary type="html">&lt;p&gt;0x56: /* Pangu (7.1 / 7.1.1 / 7.1.2) */  update exploit list and descriptions&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists the '''exploits''' used in [[jailbreak]]s.&lt;br /&gt;
&lt;br /&gt;
== Common exploits which are used in order to jailbreak different versions of iOS ==&lt;br /&gt;
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[n82ap|iPhone 3G]])&lt;br /&gt;
* [[ARM7 Go]] (from iOS 2.1.1) (for [[tethered jailbreak]] on [[n72ap|iPod touch 2G]])&lt;br /&gt;
* [[0x24000 Segment Overflow]] (for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]] and [[n72ap|iPod touch 2G]] with [[Bootrom 240.4|old bootrom]]; another exploit as the [[limera1n Exploit]] is required)&lt;br /&gt;
* [[limera1n Exploit]] (for [[tethered jailbreak]] on [[n88ap|iPhone 3GS]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], [[n81ap|iPod touch 4G]] and [[k66ap|Apple TV 2G]])&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (also known as &amp;quot;steaks4uce&amp;quot;) (for [[tethered jailbreak]] on [[n72ap|iPod touch 2G]])&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak different versions of iOS ==&lt;br /&gt;
=== [[PwnageTool]] (2.0 - 5.1.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[redsn0w]] (3.0 - 6.0) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the same exploits as [[Absinthe|Absinthe]] and [[Absinthe|Absinthe 2.0]] to jailbreak iOS 5.0/5.0.1 and 5.1.1&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[sn0wbreeze]] (3.1.3 - 6.1.3) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 6.1.2&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 1.x ==&lt;br /&gt;
=== [[AppTapp Installer]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[iBrickr]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[AppSnapp]]/[[JailbreakMe|JailbreakMe 1.0]] (1.0 / 1.0.1 / 1.0.2 / 1.1.1) ===&lt;br /&gt;
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) ({{cve|2006-3459}})&lt;br /&gt;
&lt;br /&gt;
=== [[mknod|OktoPrep]] (1.1.2) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.2 from a jailborken 1.1.1&lt;br /&gt;
* [[mknod]]&lt;br /&gt;
&lt;br /&gt;
=== [[Soft Upgrade]] (1.1.3) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.3 from a running jailbroken 1.1.2&lt;br /&gt;
&lt;br /&gt;
=== [[ZiPhone]] (1.1.3 / 1.1.4 /1.1.5) ===&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
&lt;br /&gt;
=== [[iLiberty+|iLiberty / iLiberty+]] (1.1.3 / 1.1.4 /1.1.5) ===&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 2.x ==&lt;br /&gt;
=== [[QuickPwn]] (2.0 - 2.2.1) ===&lt;br /&gt;
* uses [[Pwnage]] and [[Pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
=== [[Redsn0w Lite]] (2.1.1) ===&lt;br /&gt;
* [[ARM7 Go]] (for [[n72ap|iPod touch 2G]] only)&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 3.x ==&lt;br /&gt;
=== [[purplera1n]] (3.0) ===&lt;br /&gt;
* [[iBoot Environment Variable Overflow]] ({{cve|2009-2795}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[blackra1n]] (3.1.2) ===&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]] ({{cve|2010-0038}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Spirit]] (3.1.2 / 3.1.3 / 3.2) ===&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[BPF_STX Kernel Write Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (3.1.2 / 3.1.3 / 3.2 / 3.2.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] / [[greenpois0n (jailbreak)|greenpois0n]] (3.2.2) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 4.x ==&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (4.0 / 4.0.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] /  (4.0 / 4.0.1 / 4.0.2 / 4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.2.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.2.6 / 4.2.7 / 4.2.8) ===&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.3 / 4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
Except for the [[n18ap|iPod touch 3G]] on iOS 4.3.1.&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[IOMobileFrameBuffer Privilege Escalation Exploit]] ({{cve|2011-0227}})&lt;br /&gt;
&lt;br /&gt;
=== i0nic's Untether (4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
used in [[redsn0w]] to untether iOS 4.3.1 / 4.3.2 / 4.3.3&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 5.x ==&lt;br /&gt;
=== [[unthredera1n]] (5.0 / 5.0.1 / 5.1 / 5.1.1) ===&lt;br /&gt;
Except for the [[iPad 3]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe]] (5.0 on [[n94ap|iPhone 4S]] only / 5.0.1 on [[iPad 2]] and [[iPhone 4S]])  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}}) (used both for payload injection and untether)&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Corona|Corona Untether]] (5.0.1)  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}})&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe|Absinthe 2.0]] and [[Rocky Racoon|Rocky Racoon Untether]] (5.1.1) ===&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* Racoon DNS4/WINS4 table buffer overflow ({{cve|2012-3727}})&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 6.x ==&lt;br /&gt;
=== [[evasi0n]] (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2)  ===&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-0979}})&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
* [[Shebang Trick]] ({{cve|2013-5154}})&lt;br /&gt;
* [[AMFID code signing evasion]]&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[IOUSBDeviceFamily Vulnerability]] ({{cve|2013-0981}})&lt;br /&gt;
* [[ARM Exception Vector Info Leak]] ({{cve|2013-0978}})&lt;br /&gt;
* [[dynamic memmove() locating]]&lt;br /&gt;
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]&lt;br /&gt;
* [[kernel memory write via ROP gadget]]&lt;br /&gt;
* [[Overlapping Segment Attack]] ({{cve|2013-0977}})&lt;br /&gt;
&lt;br /&gt;
=== [[p0sixspwn]] (6.1.3 / 6.1.4 / 6.1.5 / 6.1.6) ===&lt;br /&gt;
* [[posix_spawn kernel information leak]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[posix_spawn kernel exploit]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[mach_msg_ool_descriptor_ts for heap shaping]] ({{cve|2013-3953}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 7.x ==&lt;br /&gt;
=== [[evasi0n7]] (7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6) ===&lt;br /&gt;
{{Section Stub}}&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-5133}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* CrashHouseKeeping chmod vulnarability ({{cve|2014-1272}})&lt;br /&gt;
* ptmx_get_ioctl ioctl crafted call ({{cve|2014-1278}})&lt;br /&gt;
&lt;br /&gt;
=== [[Geeksn0w]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* [[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) (Pangu v1.0.0)&lt;br /&gt;
* AppleKeyStore::initUserClient info leak ({{cve|2014-4407}}) (Pangu &amp;gt;v1.0.0)&lt;br /&gt;
* break_early_random (by [[i0n1c]] and Tarjei Mandt of Azimuth) ({{CVE|2014-4422}})&lt;br /&gt;
* mach_port_kobject info leak ({{cve|2014-4496}})&lt;br /&gt;
* IOSharedDataQueue notification port overwrite ({{cve|2014-4487}})&lt;br /&gt;
* &amp;quot;syslogd chown&amp;quot; vulnerability&lt;br /&gt;
* enterprise certificate (no real exploit, used for initial &amp;quot;unsigned&amp;quot; code execution)&lt;br /&gt;
* &amp;quot;foo_extracted&amp;quot; symlink vulnerability (used to write to /var) ({{cve|2014-4386}})&lt;br /&gt;
* /tmp/bigfile (a big file for improvement of the reliability of a race condition)&lt;br /&gt;
* VoIP backgrounding trick (used to auto restart the app)&lt;br /&gt;
* hidden segment attack&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 8.x ==&lt;br /&gt;
=== [[Pangu8]] (8.0 / 8.0.1 / 8.0.2 / 8.1) ===&lt;br /&gt;
* an exploit for a bug in /usr/libexec/neagent (source @iH8sn0w)&lt;br /&gt;
* enterprise certificate (inside the IPA)&lt;br /&gt;
* a kind of dylib injection into a system process (see IPA)&lt;br /&gt;
* a dmg mount command (looks like the Developer DMG) (syslog while jailbreaking)&lt;br /&gt;
* a sandboxing problem in debugserver ({{cve|2014-4457}})&lt;br /&gt;
* the same/a similar kernel exploit as used in [[Pangu|the first Pangu]] ({{cve|2014-4461}}) (source @iH8sn0w)&lt;br /&gt;
* enable-dylibs-to-override-cache&lt;br /&gt;
* a new ovelapping segment attack ({{cve|2014-4455}})&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}})&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) ===&lt;br /&gt;
(See also details at [http://newosxbook.com/articles/TaiG.html newosxbook.com])&lt;br /&gt;
* A new AFC symlink attack ({{cve|2014-4480}}) - to get onto the device filesystem&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]], also used in p0sixspwn) - to mount a fake DDI and instantly overwrite (via union) libmis/libxpcd.cache&lt;br /&gt;
* A new overlapping segment attack [in a modified version], dyld, ({{cve|2014-4455}}) - negative LC_SEGMENT - to allow libmis and xpcdcache to load&lt;br /&gt;
* libmis redirection of MISValidateSignature (as per evasion) to kCFEqual, with overlapping segment variant on TaiG (Segment at end of file, negative)&lt;br /&gt;
* enable-dylibs-to-override-cache - (not an exploit, a feature) - required to allow loading of xpcd/libmis from filesystem, because they are both in shared cache&lt;br /&gt;
* MobileStorageMounter exploit ({{cve|2015-1062}})&lt;br /&gt;
* Backup exploit used to access restricted parts of the filesystem ({{cve|2015-1087}})&lt;br /&gt;
&lt;br /&gt;
Kernel:&lt;br /&gt;
&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) - leaks slid addresses&lt;br /&gt;
* mach_port_kobject exploit - to defeat KASLR {{cve|2014-4496}}&lt;br /&gt;
* IOHIDFamily Kernel exploit ({{cve|2014-4487}}) - to overwrite memory&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] (8.1.3 / 8.2 / 8.3) ===&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (also used in TaiG for 8.0-8.1.2 but modified) - to mount a fake DDI and instantly overwrite (via union) libmis/libxpcd.cache&lt;br /&gt;
* enable-dylibs-to-override-cache - (not an exploit, a feature) - required to allow loading of xpcd/libmis from filesystem, because they are both in shared cache&lt;br /&gt;
* (rest currently unknown)&lt;/div&gt;</summary>
		<author><name>0x56</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Memz_create&amp;diff=45833</id>
		<title>Memz create</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Memz_create&amp;diff=45833"/>
		<updated>2015-05-19T05:25:56Z</updated>

		<summary type="html">&lt;p&gt;0x56: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{DISPLAYTITLE:memz_create}}&lt;br /&gt;
==Decompilation==&lt;br /&gt;
 #define kMemzImageContainer 0x4D656D7A&lt;br /&gt;
 &lt;br /&gt;
 [[MemzDescriptor]]* memz_create(unsigned char* address, unsigned int size, unsigned int flags) {&lt;br /&gt;
     [[MemzDescriptor]]* memz = ([[MemzDescriptor]]*) malloc(sizeof([[MemzDescriptor]]));&lt;br /&gt;
     if(memz != NULL) {&lt;br /&gt;
         memz-&amp;gt;fileSize = size;&lt;br /&gt;
         memz-&amp;gt;imageSize = size;&lt;br /&gt;
         memz-&amp;gt;type = kMemzImageContainer;&lt;br /&gt;
         memz-&amp;gt;flags = flags;&lt;br /&gt;
         memz-&amp;gt;address = address;&lt;br /&gt;
     }&lt;br /&gt;
     return memz;&lt;br /&gt;
 }&lt;/div&gt;</summary>
		<author><name>0x56</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=MemzDescriptor&amp;diff=45832</id>
		<title>MemzDescriptor</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=MemzDescriptor&amp;diff=45832"/>
		<updated>2015-05-19T05:25:21Z</updated>

		<summary type="html">&lt;p&gt;0x56: Undo revision 44801 by 5urd (talk)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Structure==&lt;br /&gt;
 typedef struct MemzDescriptor {&lt;br /&gt;
 	unsigned int fileSize;&lt;br /&gt;
 	unsigned int imageSize;&lt;br /&gt;
 	unsigned int dataSize;&lt;br /&gt;
 	unsigned int container;&lt;br /&gt;
 	unsigned int flags;&lt;br /&gt;
 	unsigned char* address;&lt;br /&gt;
 	unsigned int unk18;&lt;br /&gt;
 };&lt;/div&gt;</summary>
		<author><name>0x56</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Ramdisk_(iBoot_command)&amp;diff=45831</id>
		<title>Ramdisk (iBoot command)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Ramdisk_(iBoot_command)&amp;diff=45831"/>
		<updated>2015-05-19T05:24:28Z</updated>

		<summary type="html">&lt;p&gt;0x56: Undo revision 38946 by 5urd (talk)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description == &lt;br /&gt;
A command found in [[iBoot]], [[iBSS]], and [[iBEC]] that verifies and preps a ramdisk image which has been previously uploaded.&lt;br /&gt;
&lt;br /&gt;
== Decompilation ==&lt;br /&gt;
iPhone 3GS 8920x from iBoot-636.66&lt;br /&gt;
 #define kLoadAddress 0x41000000&lt;br /&gt;
 #define kRamdiskMaxSize 0x2000000&lt;br /&gt;
 #define kRamdiskAddress 0x44000000&lt;br /&gt;
 #define kRamdiskImageType 0x7264736B&lt;br /&gt;
 &lt;br /&gt;
 unsigned int* gRamdiskSize;&lt;br /&gt;
 unsigned char** gRamdiskAddr;&lt;br /&gt;
 &lt;br /&gt;
 int cmd_ramdisk(int argc, [[CmdArg]]* argv) {&lt;br /&gt;
 	if(argc &amp;gt; 3 || !strcmp(&amp;quot;help&amp;quot;, argv[1].string)) {&lt;br /&gt;
 		printf(&amp;quot;usage:\n\t%s [&amp;lt;len&amp;gt;] [&amp;lt;address&amp;gt;]\n&amp;quot;, argv[0].string);&lt;br /&gt;
 		return -1;&lt;br /&gt;
 	}&lt;br /&gt;
 	&lt;br /&gt;
 	unsigned int filesize = (unsigned int) [[nvram_getint]](&amp;quot;filesize&amp;quot;, 0);&lt;br /&gt;
 	unsigned char* loadaddr = (unsigned char*) [[nvram_getint]](&amp;quot;loadaddr&amp;quot;, kLoadAddress);&lt;br /&gt;
 	if(filesize == 0) {&lt;br /&gt;
 		printf(&amp;quot;filesize variable invalid or not set, aborting\n&amp;quot;);&lt;br /&gt;
 		return -1;&lt;br /&gt;
 	}&lt;br /&gt;
 	&lt;br /&gt;
 	if(range_check(loadaddr, filesize) == 0) {&lt;br /&gt;
 		printf(&amp;quot;Permission Denied\n&amp;quot;);&lt;br /&gt;
 		return -1;&lt;br /&gt;
 	}&lt;br /&gt;
 	&lt;br /&gt;
 	[[MemzDescriptor]]* memz = [[memz_create]](loadaddr, filesize, 0);&lt;br /&gt;
 	if(memz == NULL) {&lt;br /&gt;
 		printf(&amp;quot;Ramdisk image not valid\n&amp;quot;);&lt;br /&gt;
 		return -1;&lt;br /&gt;
 	}&lt;br /&gt;
 	&lt;br /&gt;
 	if(memz-&amp;gt;imageSize &amp;gt; kRamdiskMaxSize) {&lt;br /&gt;
 		printf(&amp;quot;Ramdisk too large\n&amp;quot;);&lt;br /&gt;
 		return -1;&lt;br /&gt;
 	}&lt;br /&gt;
 	&lt;br /&gt;
 	*gRamdiskAddr = kRamdiskAddress;&lt;br /&gt;
 	*gRamdiskSize = memz-&amp;gt;imageSize;&lt;br /&gt;
 	if(image_load(memz, kRamdiskImageType, gRamdiskAddr, gRamdiskSize) &amp;gt;= 0) {&lt;br /&gt;
 		printf(&amp;quot;creating ramdisk at 0x%x of size 0x%x, from image at 0x%x\n&amp;quot;, gRamdiskAddr, gRamdiskSize, loadaddr);&lt;br /&gt;
 		return 0;&lt;br /&gt;
 	}&lt;br /&gt;
 	&lt;br /&gt;
 	*gRamdiskAddr = 0;&lt;br /&gt;
 	*gRamdiskSize = 0;&lt;br /&gt;
 	return -1;&lt;br /&gt;
 }&lt;/div&gt;</summary>
		<author><name>0x56</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:MemzDescriptor&amp;diff=45830</id>
		<title>Talk:MemzDescriptor</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:MemzDescriptor&amp;diff=45830"/>
		<updated>2015-05-19T05:23:53Z</updated>

		<summary type="html">&lt;p&gt;0x56: Reason for removing deletion markers from a few pages&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== What is this? ==&lt;br /&gt;
What is this content? If it is useless we should delete it. --[[User:IAdam1n|iAdam1n]] ([[User talk:IAdam1n|talk]]) 13:13, 9 July 2013 (UTC)&lt;br /&gt;
:Look at &amp;quot;What links here&amp;quot;. Like the related pages; it's possible to merge them. Or just leave it. --[[User:Http|http]] ([[User talk:Http|talk]]) 17:54, 9 July 2013 (UTC)&lt;br /&gt;
::We could make [[Memz]] and do headings for these two similar pages. What do you think? --[[User:IAdam1n|iAdam1n]] ([[User talk:IAdam1n|talk]]) 18:43, 9 July 2013 (UTC)&lt;br /&gt;
:::There are five very related pages: [[Ramdisk (iBoot command)]], [[memz_create]], [[MemzDescriptor]], [[nvram_getint]], [[NvramVar]]. It all started, with this: [http://theiphonewiki.com/w/index.php?title=Ramdisk_(iBoot_command)&amp;amp;oldid=5879 Ramdisk (iBoot command)] by [[User:Dimo|Dimo]]. Then [[User:Posixninja|p0sixninja]] came along and cleaned it up to these five pages and the comment &amp;quot;please try to keep command entries more like this&amp;quot;. Of course you could put everything onto the page [[Ramdisk (iBoot command)]] and delete the others, but we could also simply leave it as it is. There's nothing bad with the current pages. But don't create a &amp;quot;Memz&amp;quot; page. --[[User:Http|http]] ([[User talk:Http|talk]]) 23:33, 10 July 2013 (UTC)&lt;br /&gt;
:Not everything needs to be deleted just because its purpose isn't known. Something like this could be a reverse engineered structure. In that case, we ''should'' keep it. --[[User:5urd|5urd]] ([[User talk:5urd|talk]]) 20:41, 9 July 2013 (UTC)&lt;br /&gt;
:These pages are documenting various bits of iBoot functionality that afaik is not recorded elsewhere. They don't contain much information overall, and should probably be condensed into one or two more generic pages. Leaving them marked for deletion until this happens however seems a bit like leaving important documents on top of the trash can for safekeeping, --[[User:0x56|0x56]] ([[User talk:0x56|talk]]) 05:23, 19 May 2015 (UTC)&lt;/div&gt;</summary>
		<author><name>0x56</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Bluefreeze&amp;diff=37519</id>
		<title>Bluefreeze</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Bluefreeze&amp;diff=37519"/>
		<updated>2013-11-13T04:50:46Z</updated>

		<summary type="html">&lt;p&gt;0x56: removed contradictory information, clarified why this method is /not/ compatible with an untethered jailbreak&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[iFaith]] has a protection that you don't use it on the wrong firmware to protect you. '''Bluefreeze''', a tool written by a group called The Private Dev Team, modifies the firmware version (and firmware checksum) in the iFaith certificate file, so that this check gets disabled. By doing so, you can install any firmware version on your device, even without having saved the [[SHSH]] files. The problem by doing so is that you actually install a firmware without signatures, with all consequences.&lt;br /&gt;
&lt;br /&gt;
Bluefreeze asks you to build and browse to two ipsw's one signed properly and one not signed. Then Bluefreeze swaps the properly signed img3 files in the properly signed firmware file with the incorrectly signed img3 files in the unsigned ipsw thus resulting in an ipsw file with properly signed img3 files. This firmware file is used for the downgrade.&lt;br /&gt;
&lt;br /&gt;
Having an incorrectly signed firmware installed won't let you boot of course. But because the limera1n exploit ignores incorrect signatures we can use the limera1n exploit (DFU mode, then using redsn0w) to boot up your device. The problem is only that you have to repeat this every time (similar to a tethered jailbreak), so it's not a downgrade you would want. This should be your last resort, and only if you absolutely need a downgrade.&lt;br /&gt;
 &lt;br /&gt;
This way a downgrade to [[iOS]] 4.3, 4.3.5, or 5.0 from 5.0.1 is possible. Supported devices are iPhone 3GS, iPod touch 3G, and all [[S5L8930|A4]] devices.&lt;br /&gt;
&lt;br /&gt;
Installing a firmware version using this method (without valid SHSH blobs) is incompatible with an untethered jailbreak. Each time the device boots, the bootrom validates the SHSH blobs for LLB, LLB for iBoot, and so on. Therefore, the image validation function must be patched or bypassed with an appropriate bootrom exploit payload on every boot or the device will be forced into DFU mode.&lt;br /&gt;
&lt;br /&gt;
== Purpose ==&lt;br /&gt;
With this method you can install a firmware for which you don't have [[SHSH]] saved for some tests, for example if you're a software developer and need to do some tests on a specific version.&lt;br /&gt;
&lt;br /&gt;
== Alternative ==&lt;br /&gt;
A much easier way to do a &amp;quot;tethered downgrade&amp;quot; (unsure if this still works):&lt;br /&gt;
* 1. Patch ASR on the Ramdisk (you can just create a custom IPSW and use that.)&lt;br /&gt;
* 2. Replace the Rootfs-DMG of the currently signed Firmware with the decrypted Rootfs-DMG of the older Firmware&lt;br /&gt;
* 3. After the Filesystem of the old Firmware is installed, use iRecovery and upload a pwned iBSS, iBEC and Kernel from the old Firmware&lt;br /&gt;
* 4. Send the device the &amp;quot;bootx&amp;quot;-Command using iRecovery.&lt;br /&gt;
* 5. Done! Remember your device will always need to boot tethered.&lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
* [http://www.mediafire.com/?9olh9qd8v1q4xm7 Windows]&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [https://github.com/ThePrivateDevTeam/Bluefreeze GitHub]&lt;br /&gt;
* [http://www.youtube.com/watch?v=UpZKxqLqK7A Guide]&lt;br /&gt;
* [http://bluefreeze.weebly.com/index.html Home Page]&lt;br /&gt;
&lt;br /&gt;
[[Category:GUI Tools]]&lt;/div&gt;</summary>
		<author><name>0x56</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Template:Latest_beta_firmware&amp;diff=35408</id>
		<title>Template:Latest beta firmware</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Template:Latest_beta_firmware&amp;diff=35408"/>
		<updated>2013-09-18T23:32:32Z</updated>

		<summary type="html">&lt;p&gt;0x56: two build IDs for 7.0.1, adding the highest&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{#switch: {{{1}}}&lt;br /&gt;
 | Apple TV 2G&lt;br /&gt;
 | Apple TV 3G&lt;br /&gt;
 | Apple TV 3G Rev A = [[BrightonTide 10B809 ({{{1}}})|5.3/6.1.3&amp;lt;br /&amp;gt;(10B809)]]&lt;br /&gt;
 | iPhone 5c GSM&lt;br /&gt;
 | iPhone 5c Global&lt;br /&gt;
 | iPhone 5s GSM&lt;br /&gt;
 | iPhone 5s Global =  [[Innsbruck 11A471 ({{{1}}})|7.0.1&amp;lt;br /&amp;gt;(11A471)]]&lt;br /&gt;
 | #default = [[Innsbruck 11A465 ({{{1}}})|7.0&amp;lt;br /&amp;gt;(11A465)]]&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>0x56</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Template:Latest_firmware&amp;diff=35407</id>
		<title>Template:Latest firmware</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Template:Latest_firmware&amp;diff=35407"/>
		<updated>2013-09-18T23:32:08Z</updated>

		<summary type="html">&lt;p&gt;0x56: two build IDs for 7.0.1, adding the highest&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{#switch: {{{1}}}&lt;br /&gt;
 | Apple TV 2G&lt;br /&gt;
 | Apple TV 3G&lt;br /&gt;
 | Apple TV 3G Rev A = [[InnsbruckVailPrime 11A4449a ({{{1}}})|5.4b4/7.0b5&amp;lt;br /&amp;gt;(11A4449a)]]&lt;br /&gt;
 | iPhone 5c GSM&lt;br /&gt;
 | iPhone 5c Global&lt;br /&gt;
 | iPhone 5s GSM&lt;br /&gt;
 | iPhone 5s Global = [[Innsbruck 11A471 ({{{1}}})|7.0.1&amp;lt;br /&amp;gt;(11A471)]]&lt;br /&gt;
 | #default = [[Innsbruck 11A465 ({{{1}}})|7.0&amp;lt;br /&amp;gt;(11A465)]]&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>0x56</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:Main_Page&amp;diff=35102</id>
		<title>Talk:Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:Main_Page&amp;diff=35102"/>
		<updated>2013-09-12T03:52:48Z</updated>

		<summary type="html">&lt;p&gt;0x56: /* Adding vulnerability to main page */ new section&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Talk Archive}}&lt;br /&gt;
&lt;br /&gt;
== Baseband Chip Page Titles ==&lt;br /&gt;
For the baseband chip page titles, I think we should stick with the model number despite the marketing name. Pages:&lt;br /&gt;
* [[S-Gold 2|PMB8876]] marketed &amp;quot;S-Gold 2&amp;quot;&lt;br /&gt;
* [[X-Gold 608|PMB8878]] marketed &amp;quot;X-Gold 608&amp;quot;&lt;br /&gt;
* [[XMM 6180]] marketed &amp;quot;X-Gold 618&amp;quot;&lt;br /&gt;
* [[MDM6600]] (unknown marketing name)&lt;br /&gt;
* [[MDM6610]] (unknown marketing name)&lt;br /&gt;
* [[MDM9x00]] (unknown marketing name)&lt;br /&gt;
--[[User:5urd|5urd]] 21:35, 8 May 2012 (MDT)&lt;br /&gt;
:I'm leaning more towards the marketing names, since I think people are more familiar with them and they've been in use for a long time. We've always referred to the iPhone 2G's baseband as the &amp;quot;S-Gold 2&amp;quot; and the iPhone 3G/3GS's baseband as the &amp;quot;X-Gold 608.&amp;quot; (By the way, it sounds like Qualcomm &amp;quot;markets&amp;quot; their chips by model number. [http://www.qualcomm.com/media/releases/2011/02/14/qualcomm-announces-commercial-availability-gobi3000-modules]) --[[User:Dialexio|&amp;lt;span style=&amp;quot;color:#C20; font-weight:normal;&amp;quot;&amp;gt;Dialexio&amp;lt;/span&amp;gt;]] 00:11, 9 May 2012 (MDT)&lt;br /&gt;
:I created most of these newer pages and always used the model number (without space). So I agree with that in general. Changing old ones is a totally different story though, where we need more consent. I would be for it (and create a redirect on the marketing names). --[[User:Http|http]] 01:52, 9 May 2012 (MDT)&lt;br /&gt;
&lt;br /&gt;
== Baseband downgrade possibility: Attempt for 04.11.08/04.12.01 to 04.10.01 ==&lt;br /&gt;
'''0x1''' There is no downgrade possibility; according to the most basis of fact in how baseband works as explained by dear MuscleNerd and there is signature checks as well as bootloader's chain of trust that I'm not going to repeat them again, but for this topic I start from iTunes error 1,-1,11 &lt;br /&gt;
 &lt;br /&gt;
'''0x2''' iTunes error 1,-1,11 :&lt;br /&gt;
We will get this error whenever we want to do something with BB which is not allowed by apple. you can read about these error in detail from here[http://theiphonewiki.com/wiki/index.php?title=ITunes_Errors].&lt;br /&gt;
Going deeper, this error raise by baseband's bootloader whenever you attempt to downgrade BB (in this case), this happens inside the NOR so this is why we can not exploit it easily from the outside.&lt;br /&gt;
Another reason for this error (and in here the most important one that I wanted to discuss) is that apple no longer signing that firmware.&lt;br /&gt;
&lt;br /&gt;
'''0x3''' The situation that there is no BB installed on iPhone! :&lt;br /&gt;
I could restore my iPhone4 in the case of there will be no BB at all. I called it reset my BB. There will be no Wifi, no BT.&lt;br /&gt;
At the first time (a few months since I've started to work on) I thought it is dead (as apple confirmed this also). But I could restore it only to stock firmware with the latest one.&lt;br /&gt;
So for who stays in 04.11.08 it may lead to do upgrade to 04.12.01 permanently with the latest iOS, now is 5.1.1 and before for me was 5.0.1, so be sure what you are doing and then go to reset the BB.&lt;br /&gt;
So back to the game, if there was no BB then there is no bootloeader inside the NOR to stuck BB update process but I do not know that in this case what happened to &amp;quot;sectable&amp;quot; also known as &amp;quot;locktable&amp;quot; which is the master accountable to unlock the carrier, any way  I think so only firmware signature checking by apple will be remain in &amp;quot;restore verify process&amp;quot; by iTunes. because as mentioned earlier, &amp;quot;currentBB&amp;quot;(BB to be updated) is allowed to be update by &amp;quot;comingBB&amp;quot; (BB to be updating to) only if :&lt;br /&gt;
1. &amp;quot;currentBB&amp;quot; &amp;lt; &amp;quot;comingBB&amp;quot; (= are you the most recent/lastest BB?)&lt;br /&gt;
2. &amp;quot;comingBB&amp;quot; is now signing by apple (=if so, does apple sign you? Are you eligible?) &lt;br /&gt;
Huum... What happens if &amp;quot;currentBB&amp;quot;=&amp;quot;null/zero/no matter&amp;quot;? Could we eliminate option (1) from the security check above in this case? So what next?&lt;br /&gt;
&lt;br /&gt;
'''0x4''' Track back to the issue lead us inside the bbfw file (ICE3_04.11.08_BOOT_02.13.Release) which contains four .fls files inside, and the most important one is psi_flash.fls who is in charge of security checks before handover the routines to stack.fls which is responsible for updating the baseband. This file does like NOR bootloader but fortunately it's outside the device so it is accessible but not such easy format to be understand by programmers. They are raw ROM based images for XMM6180 chip, ARM based and programmed in Thread-X, but the compiler is unknown; I will write about some disassembly notes using ida pro 6.1; by the way I leave my iPhone with no BB trying to find out and break the trust chains in the above files in order to bypass the bootloader security checks which may let us to downgrade to 04.10.01 which is currently unlocked by Gevey.&lt;br /&gt;
Keep in mind that if this solution works..., it will need the SHSH for downgrading the iOS firmware to do reset the BB.&lt;br /&gt;
I heard that iPhoneDevTeam are going to release the new version of Redsn0w which there will be no need to restore by iTunes but I do not know if the baseband approaches supposed to be addressed or it will work like iFaith that is basically bypass (preserve) BB, any way if I found this article useful I will note about disassembly and possibility approach as well as BB reset to share with any followers.&lt;br /&gt;
'''--[[User:Kambiz|Kambiz]] 07:49, 13 May 2012 (MDT)K.N'''&lt;br /&gt;
&lt;br /&gt;
== Bluetooth Chip on [[iPhone 5]] ==&lt;br /&gt;
Is there any confirmation of the Bluetooth chip used in the iPhone 5? If there is, can we edit this page and add it? --[[User:5urd|5urd]] 10:04, 8 October 2012 (MDT)&lt;br /&gt;
:Chipworks [http://www.chipworks.com/blog/recentteardowns/2012/10/02/apple-iphone-5-the-rf/ analyzed the iPhone 5's Murata Wi-Fi module] and determined it uses the [[BCM4334]]. I'll add it to the Main Page now. --[[User:Dialexio|&amp;lt;span style=&amp;quot;color:#C20; font-weight:normal;&amp;quot;&amp;gt;Dialexio&amp;lt;/span&amp;gt;]] 20:35, 8 October 2012 (MDT)&lt;br /&gt;
&lt;br /&gt;
== [[iPad 4]] and [[iPad mini]] ==&lt;br /&gt;
Can we add the new iPads to the list? The A6X is 8955 as per the heat sink cover on it. --[[User:5urd|5urd]] 09:43, 25 October 2012 (MDT)&lt;br /&gt;
:If you mean [http://images.apple.com/ipad/specs/images/specs_chip.jpg the badge Apple depicts the A6X as], the depiction actually still says &amp;quot;APL5498&amp;quot; (which translates to the S5L8945/A5X… yeah, Apple got lazy with this badge as well). The A6X probably will be S5L8955, but I haven't seen any sort of confirmation yet. --[[User:Dialexio|&amp;lt;span style=&amp;quot;color:#C20; font-weight:normal;&amp;quot;&amp;gt;Dialexio&amp;lt;/span&amp;gt;]] 09:56, 25 October 2012 (MDT)&lt;br /&gt;
::Yeah the badge. Derp. Anyways, the [[wikipedia:File:Apple A6X chip.jpg|A6X badge]] is &amp;lt;code&amp;gt;APL5598&amp;lt;/code&amp;gt; which translates to &amp;lt;code&amp;gt;S5L8955/A6X&amp;lt;/code&amp;gt;. Maybe it actually is 5598 (little endian?) but that is unlikely. --[[User:5urd|5urd]] 10:17, 25 October 2012 (MDT)&lt;br /&gt;
:::The description of that image clearly states that it's an enhanced version of the A5X image on Wikipedia (i.e. it's edited). --[[User:Dialexio|&amp;lt;span style=&amp;quot;color:#C20; font-weight:normal;&amp;quot;&amp;gt;Dialexio&amp;lt;/span&amp;gt;]] 10:57, 25 October 2012 (MDT)&lt;br /&gt;
::::Oh derp. From the [http://cdn.arstechnica.net/wp-content/uploads/2012/10/apple_pschiller_a6.jpg keynote], it appears to be &amp;lt;code&amp;gt;APL5498&amp;lt;/code&amp;gt; which is &amp;lt;code&amp;gt;8945&amp;lt;/code&amp;gt; ([[S5L8945|A5X]]). But I am sure it will be &amp;lt;code&amp;gt;S5L8955&amp;lt;/code&amp;gt;. The &amp;lt;code&amp;gt;[[S5L8942]]&amp;lt;/code&amp;gt; was a revised A5, not A5X. It appears Apple just opened their Photoshop document and changed the &amp;lt;code&amp;gt;A5X&amp;lt;/code&amp;gt; to &amp;lt;code&amp;gt;A6X&amp;lt;/code&amp;gt;. Guess we'll find out for sure from a Geekbench or the teardown. We can at least for sure add the iPad mini to the page. --[[User:5urd|5urd]] 11:36, 25 October 2012 (MDT)&lt;br /&gt;
&lt;br /&gt;
== Adding vulnerability to main page ==&lt;br /&gt;
&lt;br /&gt;
The page [[CVE-2013-0964]] is currently orphaned. I think it would fit under the &amp;quot;Vulnerabilities and Exploits&amp;quot; subheading. Can someone with adequate permission make the change? [[User:0x56|0x56]] ([[User talk:0x56|talk]]) 03:52, 12 September 2013 (UTC)&lt;/div&gt;</summary>
		<author><name>0x56</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=User:0x56&amp;diff=35101</id>
		<title>User:0x56</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=User:0x56&amp;diff=35101"/>
		<updated>2013-09-12T03:45:42Z</updated>

		<summary type="html">&lt;p&gt;0x56: contact info&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Twitter: @0x56&lt;br /&gt;
&lt;br /&gt;
IRC: x56 on Freenode, #openjailbreak or #jailbreakqa&lt;/div&gt;</summary>
		<author><name>0x56</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Hoodoo_9B176_(iPod4,1)&amp;diff=24894</id>
		<title>Hoodoo 9B176 (iPod4,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Hoodoo_9B176_(iPod4,1)&amp;diff=24894"/>
		<updated>2012-03-08T14:45:55Z</updated>

		<summary type="html">&lt;p&gt;0x56: fixed oops&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | version             = 5.1&lt;br /&gt;
 | build               = 9B176&lt;br /&gt;
 | device              = ipod41&lt;br /&gt;
 | codename            = Hoodoo&lt;br /&gt;
 | downloadurl         = http://appldnld.apple.com/iOS5/041-1542.20120307.Jyknq/iPod4,1_5.1_9B176_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | rootfsdmg           = 038-1765-165&lt;br /&gt;
 | rootfskey           = TODO&lt;br /&gt;
&lt;br /&gt;
 | updatedmg           = 038-1813-172&lt;br /&gt;
 | updateiv        = 78a5b5e905b90e50c0cdfa4f0859540e&lt;br /&gt;
 | updatekey      = e9a0754c02f259651587f150ee7a1e093429b9948c32157c58fb5619b0f9ee49&lt;br /&gt;
 &lt;br /&gt;
 | restoredmg          = 038-1800-166&lt;br /&gt;
 | restoreiv       = 25feaf8c2844ef2201a95fd28272e10a&lt;br /&gt;
 | restorekey     = b4ba159740f7572420b01a4a3c9e752e7d074f1b0e7ffe7732ac427f242779d5&lt;br /&gt;
&lt;br /&gt;
 | AppleLogoIV         = 9d8c3366e67a76fba95288c2da08f677&lt;br /&gt;
 | AppleLogoKey        = b165b5f5eaa3f9c4caa1ead70db3075f80f2d9ad86be84cfa42188fac3ef3c09&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0IV  = TODO&lt;br /&gt;
 | BatteryCharging0Key = TODO&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1IV  = TODO&lt;br /&gt;
 | BatteryCharging1Key = TODO&lt;br /&gt;
&lt;br /&gt;
 | BatteryFullIV       = TODO&lt;br /&gt;
 | BatteryFullKey      = TODO&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0IV       = TODO&lt;br /&gt;
 | BatteryLow0Key      = TODO&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1IV       = TODO&lt;br /&gt;
 | BatteryLow1Key      = TODO&lt;br /&gt;
&lt;br /&gt;
 | DeviceTreeIV        = TODO&lt;br /&gt;
 | DeviceTreeKey       = TODO&lt;br /&gt;
&lt;br /&gt;
 | GlyphChargingIV     = TODO&lt;br /&gt;
 | GlyphChargingKey    = TODO&lt;br /&gt;
&lt;br /&gt;
 | GlyphPluginIV       = TODO&lt;br /&gt;
 | GlyphPluginKey      = TODO&lt;br /&gt;
&lt;br /&gt;
 | iBECIV              = c8c8b3eba9a257c4ce0227098e431f23&lt;br /&gt;
 | iBECKey             = 0f6e9c878784f3b2ce6fa248cbf256dbfc77ca771c202f8c27e461ea4aa9e1aa&lt;br /&gt;
&lt;br /&gt;
 | iBootIV             = 16641c07fe97051c445d21258722f3d1&lt;br /&gt;
 | iBootKey            = d302a0ba7253453bce4431dd5a2a04fbf4da9868c340eae633a0202fe0995155&lt;br /&gt;
&lt;br /&gt;
 | iBSSIV              = ecd5bd9e4762aaae35637063420d54d1&lt;br /&gt;
 | iBSSKey             = a8ef6d02fa5958099fc58fbcc160066faafda0053916905c0009d33ef53c7d0d&lt;br /&gt;
&lt;br /&gt;
 | KernelcacheIV       = 54f4e3ccb841cd9dcdd9d863534f73ee&lt;br /&gt;
 | KernelcacheKey      = c1223786e83a731e3302e8b8226577428710db176e46a741582c2479cc6d61eb&lt;br /&gt;
&lt;br /&gt;
 | LLBIV               = 3f6f5128ae1198f57adf559123b1da1c&lt;br /&gt;
 | LLBKey              = 28dde68d793c8fa7abae54b479da5ce75369ae8cece745f7a435a5bf3b22e6bb&lt;br /&gt;
&lt;br /&gt;
 | RecoveryModeIV      = TODO&lt;br /&gt;
 | RecoveryModeKey     = TODO&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>0x56</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Hoodoo_9B176_(iPod4,1)&amp;diff=24893</id>
		<title>Hoodoo 9B176 (iPod4,1)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Hoodoo_9B176_(iPod4,1)&amp;diff=24893"/>
		<updated>2012-03-08T14:44:11Z</updated>

		<summary type="html">&lt;p&gt;0x56: Created page with &amp;quot;{{keys  | version             = 5.1  | build               = 9B176  | device              = ipod41  | codename            = Hoodoo  | downloadurl         = http://appldnld.apple....&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | version             = 5.1&lt;br /&gt;
 | build               = 9B176&lt;br /&gt;
 | device              = ipod41&lt;br /&gt;
 | codename            = Hoodoo&lt;br /&gt;
 | downloadurl         = http://appldnld.apple.com/iOS5/041-1542.20120307.Jyknq/iPod4,1_5.1_9B176_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | rootfsdmg           = 038-1765-165&lt;br /&gt;
 | rootfskey           = TODO&lt;br /&gt;
&lt;br /&gt;
 | updatedmg           = 038-1813-172&lt;br /&gt;
 | updatedmgiv        = 78a5b5e905b90e50c0cdfa4f0859540e&lt;br /&gt;
 | updatedmgkey      = e9a0754c02f259651587f150ee7a1e093429b9948c32157c58fb5619b0f9ee49&lt;br /&gt;
 &lt;br /&gt;
 | restoredmg          = 038-1800-166&lt;br /&gt;
 | restoredmgiv       = 25feaf8c2844ef2201a95fd28272e10a&lt;br /&gt;
 | restoredmgkey     = b4ba159740f7572420b01a4a3c9e752e7d074f1b0e7ffe7732ac427f242779d5&lt;br /&gt;
&lt;br /&gt;
 | AppleLogoIV         = 9d8c3366e67a76fba95288c2da08f677&lt;br /&gt;
 | AppleLogoKey        = b165b5f5eaa3f9c4caa1ead70db3075f80f2d9ad86be84cfa42188fac3ef3c09&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0IV  = TODO&lt;br /&gt;
 | BatteryCharging0Key = TODO&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1IV  = TODO&lt;br /&gt;
 | BatteryCharging1Key = TODO&lt;br /&gt;
&lt;br /&gt;
 | BatteryFullIV       = TODO&lt;br /&gt;
 | BatteryFullKey      = TODO&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0IV       = TODO&lt;br /&gt;
 | BatteryLow0Key      = TODO&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1IV       = TODO&lt;br /&gt;
 | BatteryLow1Key      = TODO&lt;br /&gt;
&lt;br /&gt;
 | DeviceTreeIV        = TODO&lt;br /&gt;
 | DeviceTreeKey       = TODO&lt;br /&gt;
&lt;br /&gt;
 | GlyphChargingIV     = TODO&lt;br /&gt;
 | GlyphChargingKey    = TODO&lt;br /&gt;
&lt;br /&gt;
 | GlyphPluginIV       = TODO&lt;br /&gt;
 | GlyphPluginKey      = TODO&lt;br /&gt;
&lt;br /&gt;
 | iBECIV              = c8c8b3eba9a257c4ce0227098e431f23&lt;br /&gt;
 | iBECKey             = 0f6e9c878784f3b2ce6fa248cbf256dbfc77ca771c202f8c27e461ea4aa9e1aa&lt;br /&gt;
&lt;br /&gt;
 | iBootIV             = 16641c07fe97051c445d21258722f3d1&lt;br /&gt;
 | iBootKey            = d302a0ba7253453bce4431dd5a2a04fbf4da9868c340eae633a0202fe0995155&lt;br /&gt;
&lt;br /&gt;
 | iBSSIV              = ecd5bd9e4762aaae35637063420d54d1&lt;br /&gt;
 | iBSSKey             = a8ef6d02fa5958099fc58fbcc160066faafda0053916905c0009d33ef53c7d0d&lt;br /&gt;
&lt;br /&gt;
 | KernelcacheIV       = 54f4e3ccb841cd9dcdd9d863534f73ee&lt;br /&gt;
 | KernelcacheKey      = c1223786e83a731e3302e8b8226577428710db176e46a741582c2479cc6d61eb&lt;br /&gt;
&lt;br /&gt;
 | LLBIV               = 3f6f5128ae1198f57adf559123b1da1c&lt;br /&gt;
 | LLBKey              = 28dde68d793c8fa7abae54b479da5ce75369ae8cece745f7a435a5bf3b22e6bb&lt;br /&gt;
&lt;br /&gt;
 | RecoveryModeIV      = TODO&lt;br /&gt;
 | RecoveryModeKey     = TODO&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>0x56</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=The_iPhone_Wiki:Community_portal&amp;diff=24771</id>
		<title>The iPhone Wiki:Community portal</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=The_iPhone_Wiki:Community_portal&amp;diff=24771"/>
		<updated>2012-03-05T14:00:33Z</updated>

		<summary type="html">&lt;p&gt;0x56: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Talk Archive|2010|2011|2012}}&lt;br /&gt;
This is the place to post tasks that need to be done on the wiki. Also this is the place for proposed changes. I heard about people wanting a favicon and arranging the main page into categories.&lt;br /&gt;
&lt;br /&gt;
== Site Related Requests ==&lt;br /&gt;
=== AcidSn0w ===&lt;br /&gt;
Can I propose a page for acidsn0w? I heard that there was stolen code, so I haven't posted. --[[User:Dylan Laws|Dylan Laws]] 17:02, 17 January 2012 (MST)&lt;br /&gt;
:The first beta did use stolen code, but the second beta fixed that. As it is still in beta, a page may not be a good idea. It does have a good user-base as shown in their blog comments, but it is up to the sysops. If you are in the Pwn Dev Team, then NO. --[[User:5urd|5urd]] 17:09, 17 January 2012 (MST)&lt;br /&gt;
:: I am not in their team. :P I'll wait till/if they release it. --[[User:Dylan Laws|Dylan Laws]] 17:37, 17 January 2012 (MST) &lt;br /&gt;
:::I want to make something clear about this wiki, it's called &amp;quot;The iPhone Wiki&amp;quot;, not &amp;quot;The iPhone Community Wiki&amp;quot;, or even &amp;quot;The Jailbreaking Wiki&amp;quot;. This site exists to document the iPhone, not who made what GUI. A jailbreak tool that doesn't introduce exploits or isn't very widely used isn't notable. To clarify, the [[Limera1n_Exploit]] page is far more valuable than the [[limera1n]] page. Please focus on adding technical content instead of thinly veiled advertisements. For example, it's appalling we don't have a page documenting [[ASLR]] --[[User:Geohot|geohot]] 23:16, 17 January 2012 (MST)&lt;br /&gt;
:::I would also like to see the Baseband ticket system documented --[[User:Geohot|geohot]] 14:48, 18 January 2012 (MST)&lt;br /&gt;
&lt;br /&gt;
=== 2.2b1 ===&lt;br /&gt;
Is 2.2b1 5G26 or 5G27, because on [[Beta Firmware]], it says 5G27 while on the previous revisions of [[VFDecrypt Keys]] is said 5G26 --[[User:balloonhead66|5urd]] 18:47, 14 January 2012 (MST)&lt;br /&gt;
&lt;br /&gt;
=== IMG3 File Key Grabbing ===&lt;br /&gt;
How does one grab the keys for the IMG3 files if they have a decrypted ramdisk? I have genpass, xpwn, and vfdecrypt, but what do I use to get keys for IMG3 files? --[[User:5urd|5urd]] 17:17, 2 February 2012 (MST)&lt;br /&gt;
:Unlike the vfdecrypt key, the keys for decrypting the [[IMG3_File_Format#Tags | IMG3]] are stored encrypted in the [[KBAG]] section of the IMG3 file itself, not the ramdisk. These keys are encrypted using the [[GID-key]], so access to the AES engine is required. On a device compatible with greenpois0n or openiBoot, this process is (loosely) documented [[AES_Keys#Running_The_Engine | here]]. I am working on implementing a method that can be performed on a jailbroken 4S or iPad 2 (is that is what you're looking for?) and will release when finished --[[User:0x56|0x56]] 20:12, 1 March 2012 (MST)&lt;br /&gt;
::Yah, running greenpois0n is my problem. I cant find the program. --[[User:5urd|5urd]] 21:02, 1 March 2012 (MST)&lt;br /&gt;
:::I was mistaken, I won't be able to accomplish this for the 4S or iPad 2 due to a limitation that was not documented here --[[User:0x56|0x56]] 07:00, 5 March 2012 (MST)&lt;/div&gt;</summary>
		<author><name>0x56</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=AES_Keys&amp;diff=24713</id>
		<title>AES Keys</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=AES_Keys&amp;diff=24713"/>
		<updated>2012-03-02T15:45:02Z</updated>

		<summary type="html">&lt;p&gt;0x56: made keys themselves subheadings of &amp;quot;Derived Keys&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The {{wp|System-on-a-chip|SoC}} in each device have an {{wp|Advanced_Encryption_Standard|AES}} coprocessor with the [[GID-key]] and [[UID-key]] built in.&lt;br /&gt;
&lt;br /&gt;
==Running The Engine==&lt;br /&gt;
Currently, there are several ways to run the hardware AES engine:&lt;br /&gt;
* Patch [[iBoot (Bootloader)|iBoot]] to jump to aes_decrypt.&lt;br /&gt;
* Use [http://github.com/planetbeing/iphonelinux/tree/master OpenIBoot].&lt;br /&gt;
* Use the crypto bundle provided in [[XPwn]] to utilize it via userland. This method requires a kernel patch.&lt;br /&gt;
* Use [[Greenpois0n (toolkit)|Greenpois0n]] console. &lt;br /&gt;
&lt;br /&gt;
If you want to decrypt [[IMG3 File Format|IMG3]] files you need to use this. The [[GID-key]] currently has not been extracted from the phone, so the only way to use it is on the phone itself.&lt;br /&gt;
&lt;br /&gt;
See [[Grabbing IMG3 Keys]] for an [[iBoot (Bootloader)|iBoot]] patch.&lt;br /&gt;
&lt;br /&gt;
==Derived keys==&lt;br /&gt;
&lt;br /&gt;
Some derived keys are computed by the IOAESAccelerator kernel service at boot. These keys are generated by encrypting static values either with the UID key (0x7D0 identifier) or the GID key (0x3E8 identifier). The values defined in the iPhone 4 5.0 kernel are :&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
__text:807E3000 keys_to_compute DCD 0x835,0x7D0,0x1010101,0x1010101,0x1010101,0x1010101&lt;br /&gt;
__text:807E3018                 DCD 0x899,0x7D0,0xB5FCE8D1,0x8DBF3739,0xD14CC7EF,0xB0D4F1D0&lt;br /&gt;
__text:807E3030                 DCD 0x89B,0x7D0,0x67993E18,0x543CB06B,0xF568A46F,0x49BD0C1C&lt;br /&gt;
__text:807E3048                 DCD 0x89A,0x7D0,0x335B1FDB,0x1C5F6C60,0x66AA3419,0x61069C58&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Key 0x835===&lt;br /&gt;
&lt;br /&gt;
Generated by encrypting 01010101010101010101010101010101 with the [[UID-key]]. Used for data protection.&lt;br /&gt;
&lt;br /&gt;
===Key 0x837===&lt;br /&gt;
Generated by encrypting 345A2D6C5050D058780DA431F0710E15 with the [[S5L8900]] [[GID-key]], resulting in 188458A6D15034DFE386F23B61D43774.&lt;br /&gt;
&lt;br /&gt;
It is used as the encryption key for [[S5L File Formats#IMG2|IMG2 files]]. With the introduction of [[IMG3 File Format|IMG3]] in iOS 2.0, [[KBAG]]s are now used instead of the 0x837 key. Because iOS versions 1.x were used only on the [[M68ap|iPhone]] and [[N45ap|iPod touch]] (both use the [[S5L8900]]) the encrypted values for other processors don't matter.&lt;br /&gt;
&lt;br /&gt;
===Key 0x89A===&lt;br /&gt;
For A4 devices:&lt;br /&gt;
Generated by encrypting DB1F5B33606C5F1C1934AA66589C0661 with the [[UID-key]], getting a device-specific key.&lt;br /&gt;
&lt;br /&gt;
It is used to encrypt the [[SHSH]] blobs on the device.&lt;br /&gt;
&lt;br /&gt;
===Key 0x89B===&lt;br /&gt;
&lt;br /&gt;
Generated by encrypting 183E99676BB03C546FA468F51C0CBD49 with the [[UID-key]]. It is used the encrypt the data partition key.&lt;br /&gt;
&lt;br /&gt;
===Key 0x899===&lt;br /&gt;
&lt;br /&gt;
Generated by encrypting D1E8FCB53937BF8DEFC74CD1D0F1D4B0 with the [[UID-key]]. Usage unknown.&lt;br /&gt;
&lt;br /&gt;
==Using [[Greenpois0n (toolkit)|greenpois0n]] to get the keys==&lt;br /&gt;
* Run steps 1 thru 5 from [[PwnStrap]]&lt;br /&gt;
* Use 'xpwntool file.img3 /dev/null' to extract the KBAG hex string from ''file.img3''&lt;br /&gt;
* Start greenpois0n console: irecovery -s&lt;br /&gt;
* Execute 'go aes dec _KBAG_STRING_' in irecovery console&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
[http://wikee.iphwn.org/s5l8900:encryption_keys Dev Team wiki]&lt;/div&gt;</summary>
		<author><name>0x56</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Kernel_Syscalls&amp;diff=24703</id>
		<title>Kernel Syscalls</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Kernel_Syscalls&amp;diff=24703"/>
		<updated>2012-03-02T03:15:44Z</updated>

		<summary type="html">&lt;p&gt;0x56: fixed markup&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Note on these ==&lt;br /&gt;
Args go in their normal registers, like arg1 in R0, as usual. Syscall # goes in IP (that's intra-procedural, not instruction pointer!), a.k.a R12.&lt;br /&gt;
&lt;br /&gt;
As in all ARM (i.e. also on Android) the kernel entry is accomplished by the SVC command (SWI in some debuggers and ARM dialects). On the kernel end, a low level CPU exception handler (fleh_swi) is installed as part of the ExceptionVectorsBase, and - upon issuing a SWI/SVC - control is transferred to that address. This handler can check the syscall number to distinguish between POSIX calls (non negative) and Mach traps (negative).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Unix ==&lt;br /&gt;
&lt;br /&gt;
=== Usage ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
MOV IP, #x // number from following list into Intraprocedural, a.k.a. r12&lt;br /&gt;
SVC 0x80   // Formerly, SWI (software interrupt)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For example:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(gdb) disass chown&lt;br /&gt;
0x30d2ad54 &amp;lt;chown&amp;gt;:	mov	r12, #16	       ; 0x10, being # of chown&lt;br /&gt;
0x30d2ad58 &amp;lt;chown+4&amp;gt;:	svc	0x00000080&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Most of these are the same as you would find in the XNU open source kernel, with ARM idiosyncrasies aside (and #372, ledger)&lt;br /&gt;
&lt;br /&gt;
=== List === &lt;br /&gt;
* '''exit''': 1&lt;br /&gt;
* '''fork''': 2&lt;br /&gt;
* '''read''': 3&lt;br /&gt;
* '''write''': 4&lt;br /&gt;
* '''open''': 5&lt;br /&gt;
* '''close''': 6&lt;br /&gt;
* '''wait4''': 7&lt;br /&gt;
* '''link''': 9&lt;br /&gt;
* '''unlink''': 10&lt;br /&gt;
* '''chdir''': 12&lt;br /&gt;
* '''fchdir''': 13&lt;br /&gt;
* '''mknod''': 14&lt;br /&gt;
* '''chmod''': 15&lt;br /&gt;
* '''chown''': 16&lt;br /&gt;
* '''getfsstat''': 18&lt;br /&gt;
* '''getpid''': 20&lt;br /&gt;
* '''setuid''': 23&lt;br /&gt;
* '''getuid''': 24&lt;br /&gt;
* '''geteuid''': 25&lt;br /&gt;
* '''ptrace''': 26&lt;br /&gt;
* '''recvmsg''': 27&lt;br /&gt;
* '''sendmsg''': 28&lt;br /&gt;
* '''recvfrom''': 29&lt;br /&gt;
* '''accept''': 30&lt;br /&gt;
* '''getpeername''': 31&lt;br /&gt;
* '''getsockname''': 32&lt;br /&gt;
* '''access''': 33&lt;br /&gt;
* '''chflags''': 34&lt;br /&gt;
* '''fchflags''': 35&lt;br /&gt;
* '''sync''': 36&lt;br /&gt;
* '''kill''': 37&lt;br /&gt;
* '''getppid''': 39&lt;br /&gt;
* '''dup''': 41&lt;br /&gt;
* '''pipe''': 42&lt;br /&gt;
* '''getegid''': 43&lt;br /&gt;
* '''profil''': 44&lt;br /&gt;
* '''sigaction''': 46&lt;br /&gt;
* '''getgid''': 47&lt;br /&gt;
* '''sigprocmask''': 48&lt;br /&gt;
* '''getlogin''': 49&lt;br /&gt;
* '''setlogin''': 50&lt;br /&gt;
* '''acct''': 51&lt;br /&gt;
* '''sigpending''': 52&lt;br /&gt;
* '''signalstack''': 53&lt;br /&gt;
* '''ioctl''': 54&lt;br /&gt;
* '''reboot''': 55&lt;br /&gt;
* '''revoke''': 56&lt;br /&gt;
* '''symlink''': 57&lt;br /&gt;
* '''readlink''': 58&lt;br /&gt;
* '''execve''': 59&lt;br /&gt;
* '''umask''': 60&lt;br /&gt;
* '''chroot''': 61&lt;br /&gt;
* '''msync''': 65&lt;br /&gt;
* '''vfork''': 66&lt;br /&gt;
* '''munmap''': 73&lt;br /&gt;
* '''mprotect''': 74&lt;br /&gt;
* '''madvise''': 75&lt;br /&gt;
* '''mincore''': 78&lt;br /&gt;
* '''getgroups''': 79&lt;br /&gt;
* '''setgroups''': 80&lt;br /&gt;
* '''getpgrp''': 81&lt;br /&gt;
* '''setpgid''': 82&lt;br /&gt;
* '''setitimer''': 83&lt;br /&gt;
* '''swapon''': 85&lt;br /&gt;
* '''getitimer''': 86&lt;br /&gt;
* '''getdtablesize''': 89&lt;br /&gt;
* '''dup2''': 90&lt;br /&gt;
* '''fnctl''': 92&lt;br /&gt;
* '''select''': 93&lt;br /&gt;
* '''fsync''': 95&lt;br /&gt;
* '''setpriority''': 96&lt;br /&gt;
* '''socket''': 97&lt;br /&gt;
* '''connect''': 98&lt;br /&gt;
* '''getpriority''': 100&lt;br /&gt;
* '''bind''': 104&lt;br /&gt;
* '''setsockopt''': 105&lt;br /&gt;
* '''listen''': 106&lt;br /&gt;
* '''sigsuspend''': 111&lt;br /&gt;
* '''gettimeofday''': 116&lt;br /&gt;
* '''getrusage''': 117&lt;br /&gt;
* '''getsockopt''': 118&lt;br /&gt;
* '''readv''': 120&lt;br /&gt;
* '''writev''': 121&lt;br /&gt;
* '''settimeofday''': 122&lt;br /&gt;
* '''fchown''': 123&lt;br /&gt;
* '''fchmod''': 124&lt;br /&gt;
* '''setreuid''': 126&lt;br /&gt;
* '''setregid''': 127&lt;br /&gt;
* '''rename''': 128&lt;br /&gt;
* '''flock''': 131&lt;br /&gt;
* '''mkfifo''': 132&lt;br /&gt;
* '''sendto''': 133&lt;br /&gt;
* '''shutdown''': 134&lt;br /&gt;
* '''socketpair''': 135&lt;br /&gt;
* '''mkdir''': 136&lt;br /&gt;
* '''rmdir''': 137&lt;br /&gt;
* '''utimes''': 138&lt;br /&gt;
* '''futimes''': 139&lt;br /&gt;
* '''adjtime''': 140&lt;br /&gt;
* '''gethostuuid''': 142&lt;br /&gt;
* '''setsid''': 145&lt;br /&gt;
* '''getpgid''': 151&lt;br /&gt;
* '''setprivexec''': 152&lt;br /&gt;
* '''pread''': 153&lt;br /&gt;
* '''pwrite''': 154&lt;br /&gt;
* '''statfs''': 157&lt;br /&gt;
* '''fstatfs''': 158&lt;br /&gt;
* '''unmount''': 159&lt;br /&gt;
* '''quotactl''': 165&lt;br /&gt;
* '''mount''': 167&lt;br /&gt;
* '''csops''': 169&lt;br /&gt;
* '''waitid''': 173&lt;br /&gt;
* '''add_profil''': 176&lt;br /&gt;
* '''kdebug_trace''': 180&lt;br /&gt;
* '''setgid''': 181&lt;br /&gt;
* '''setegid''': 182&lt;br /&gt;
* '''seteuid''': 183&lt;br /&gt;
* '''sigreturn''': 184&lt;br /&gt;
* '''chod''': 185&lt;br /&gt;
* '''fdatasync''': 187&lt;br /&gt;
* '''stat''': 188&lt;br /&gt;
* '''fstat''': 189&lt;br /&gt;
* '''lstat''': 190&lt;br /&gt;
* '''pathconf''': 191&lt;br /&gt;
* '''fpathconf''': 192&lt;br /&gt;
* '''getrlimit''': 194&lt;br /&gt;
* '''setrlimit''': 195&lt;br /&gt;
* '''getdirentries''': 196&lt;br /&gt;
* '''mmap''': 197&lt;br /&gt;
* '''lseek''': 199&lt;br /&gt;
* '''truncate''': 200&lt;br /&gt;
* '''ftruncate''': 201&lt;br /&gt;
* '''__sysctl''': 202&lt;br /&gt;
* '''mlock''': 203&lt;br /&gt;
* '''munlock''': 204&lt;br /&gt;
* '''undelete''': 205&lt;br /&gt;
* '''mkcomplex''': 216&lt;br /&gt;
* '''statv''': 217&lt;br /&gt;
* '''lstatv''': 218&lt;br /&gt;
* '''fstatv''': 219&lt;br /&gt;
* '''getattrlist''': 220&lt;br /&gt;
* '''setattrlist''': 221&lt;br /&gt;
* '''getdirentriesattr''': 222&lt;br /&gt;
* '''exchangedata''': 223&lt;br /&gt;
* '''fsgetpath''': 224&lt;br /&gt;
* '''searchfs''': 225&lt;br /&gt;
* '''delete''': 226&lt;br /&gt;
* '''copyfile''': 227&lt;br /&gt;
* '''fgetattrlist''': 228&lt;br /&gt;
* '''fsetattrlist''': 229&lt;br /&gt;
* '''poll''': 230&lt;br /&gt;
* '''watchevent''': 231&lt;br /&gt;
* '''waitevent''': 232&lt;br /&gt;
* '''modwatch''': 233&lt;br /&gt;
* '''getxattr''': 234&lt;br /&gt;
* '''fgetxattr''': 235&lt;br /&gt;
* '''setxattr''': 236&lt;br /&gt;
* '''fsetxattr''': 237&lt;br /&gt;
* '''removexattr''': 238&lt;br /&gt;
* '''fremovexattr''': 239&lt;br /&gt;
* '''listxattr''': 240&lt;br /&gt;
* '''flistxattr''': 241&lt;br /&gt;
* '''fsctl''': 242&lt;br /&gt;
* '''initgroups''': 243&lt;br /&gt;
* '''posix_spawn''': 244&lt;br /&gt;
* '''ffsctl''': 245&lt;br /&gt;
* '''minherit''': 250&lt;br /&gt;
* '''shm_open''': 266&lt;br /&gt;
* '''shm_unlink''': 267&lt;br /&gt;
* '''sem_open''': 268&lt;br /&gt;
* '''sem_close''': 269&lt;br /&gt;
* '''sem_unlink''': 270&lt;br /&gt;
* '''sem_wait''': 271&lt;br /&gt;
* '''sem_trywait''': 272&lt;br /&gt;
* '''sem_post''': 273&lt;br /&gt;
* '''sem_getvalue''': 274&lt;br /&gt;
* '''sem_init''': 275&lt;br /&gt;
* '''sem_destroy''': 276&lt;br /&gt;
* '''open_extended''': 277&lt;br /&gt;
* '''umask_extended''': 278&lt;br /&gt;
* '''stat_extended''': 279&lt;br /&gt;
* '''lstat_extended''': 280&lt;br /&gt;
* '''fstat_extended''': 281&lt;br /&gt;
* '''chmod_extended''': 282&lt;br /&gt;
* '''fchmod_extended''': 283&lt;br /&gt;
* '''access_extended''': 284&lt;br /&gt;
* '''settid''': 285&lt;br /&gt;
* '''gettid''': 286&lt;br /&gt;
* '''setsgroups''': 287&lt;br /&gt;
* '''getsgroups''': 288&lt;br /&gt;
* '''setwgroups''': 289&lt;br /&gt;
* '''getwgroups''': 290&lt;br /&gt;
* '''mkfifo_extended''': 291&lt;br /&gt;
* '''mkdir_extended''': 292&lt;br /&gt;
* '''identitysvc''': 293&lt;br /&gt;
* '''shared_region_check_np''': 294&lt;br /&gt;
* '''shared_region_map_np''': 295&lt;br /&gt;
* '''vm_pressure_monitor''': 296&lt;br /&gt;
* '''__pthread_mutex_destroy''': 301&lt;br /&gt;
* '''__pthread_mutex_init''': 302&lt;br /&gt;
* '''__pthread_mutex_lock''': 303&lt;br /&gt;
* '''__pthread_mutex_trylock''': 304&lt;br /&gt;
* '''__pthread_mutex_unlock''': 305&lt;br /&gt;
* '''__pthread_cond_init''': 306&lt;br /&gt;
* '''__pthread_cond_destroy''': 307&lt;br /&gt;
* '''__pthread_cond_broadcast''': 308&lt;br /&gt;
* '''__pthread_cond_signal''': 309&lt;br /&gt;
* '''getsid''': 310&lt;br /&gt;
* '''settid_with_pid''': 311&lt;br /&gt;
* '''__pthread_cond_timedwait''': 312&lt;br /&gt;
* '''aio_fsync''': 313&lt;br /&gt;
* '''aio_return''': 314&lt;br /&gt;
* '''aio_suspend''': 315&lt;br /&gt;
* '''aio_cancel''': 316&lt;br /&gt;
* '''aio_error''': 317&lt;br /&gt;
* '''aio_read''': 318&lt;br /&gt;
* '''aio_write''': 319&lt;br /&gt;
* '''lio_listio''': 320&lt;br /&gt;
* '''__pthread_cond_wait''': 321&lt;br /&gt;
* '''iopolicysys''': 322&lt;br /&gt;
* '''mlockall''': 324&lt;br /&gt;
* '''munlockall''': 325&lt;br /&gt;
* '''issetugid''': 327&lt;br /&gt;
* '''__pthread_kill''': 328&lt;br /&gt;
* '''__pthread_sigmask''': 329&lt;br /&gt;
* '''__sigwait''': 330&lt;br /&gt;
* '''__disable_threadsignal''': 331&lt;br /&gt;
* '''__pthread_markcancel''': 332&lt;br /&gt;
* '''__pthread_canceled''': 333&lt;br /&gt;
* '''proc_info''': 336&lt;br /&gt;
* '''stat64''': 338&lt;br /&gt;
* '''fstat64''': 339&lt;br /&gt;
* '''lstat64''': 340&lt;br /&gt;
* '''stat64_extended''': 341&lt;br /&gt;
* '''lstat64_extended''': 342&lt;br /&gt;
* '''fstat64_extended''': 343&lt;br /&gt;
* '''getdirectories64''': 344&lt;br /&gt;
* '''statfs64''': 345&lt;br /&gt;
* '''fstatfs64''': 346&lt;br /&gt;
* '''getfsstat64''': 347&lt;br /&gt;
* '''__pthread_chdir''': 348&lt;br /&gt;
* '''__pthread_fchdir''': 349&lt;br /&gt;
* '''kqueue''': 362&lt;br /&gt;
* '''kevent''': 363&lt;br /&gt;
* '''lchown''': 364&lt;br /&gt;
* '''stack_snapshot''': 365&lt;br /&gt;
* '''kevent64''': 369&lt;br /&gt;
* '''__semwait_signal''': 370&lt;br /&gt;
* '''__semwait_signal_nocancel''': 371&lt;br /&gt;
* '''ledger''': 372  - This Syscall exists only in iOS, having been taken out of OS X a while ago.&lt;br /&gt;
&lt;br /&gt;
The following syscalls are for BSD's Mandatory Access Control, on top of which Apple's &amp;quot;SandBox&amp;quot; (sandbox.kext) is implemented&lt;br /&gt;
&lt;br /&gt;
* '''__mac_execve''': 380&lt;br /&gt;
* '''__mac_syscall''': 381&lt;br /&gt;
* '''__mac_get_file''': 382&lt;br /&gt;
* '''__mac_set_file''': 383&lt;br /&gt;
* '''__mac_get_link''': 384&lt;br /&gt;
* '''__mac_set_link''': 385&lt;br /&gt;
* '''__mac_get_proc''': 386&lt;br /&gt;
* '''__mac_set_proc''': 387&lt;br /&gt;
* '''__mac_get_fd''': 388&lt;br /&gt;
* '''__mac_set_fd''': 389&lt;br /&gt;
* '''__mac_get_pid''': 390&lt;br /&gt;
* '''__mac_get_lcid''': 391&lt;br /&gt;
* '''__mac_get_lctx''': 392&lt;br /&gt;
* '''__mac_set_lctx''': 393&lt;br /&gt;
&lt;br /&gt;
---------&lt;br /&gt;
&lt;br /&gt;
* '''setlcid''': 394&lt;br /&gt;
* '''getlcid''': 395&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;nocancel&amp;quot;s are the same as their cancellable counterparts. In most cases, the latter are just wrappers, with a call to __pthread_testcancel(1);&lt;br /&gt;
 &lt;br /&gt;
* '''read_nocancel''': 396&lt;br /&gt;
* '''write_nocancel''': 397&lt;br /&gt;
* '''open_nocancel''': 398&lt;br /&gt;
* '''close_nocancel''': 399&lt;br /&gt;
* '''wait4_nocancel''': 400&lt;br /&gt;
* '''recvmsg_nocancel''': 401&lt;br /&gt;
* '''sendmsg_nocancel''': 402&lt;br /&gt;
* '''recvfrom_nocancel''': 403&lt;br /&gt;
* '''accept_nocancel''': 404&lt;br /&gt;
* '''msync_nocancel''': 405&lt;br /&gt;
* '''fnctl_nocancel''': 406&lt;br /&gt;
* '''select_nocancel''': 407&lt;br /&gt;
* '''fsync_nocancel''': 408&lt;br /&gt;
* '''connect_nocancel''': 409&lt;br /&gt;
* '''sigsuspend_nocancel''': 410&lt;br /&gt;
* '''readv_nocancel''': 411&lt;br /&gt;
* '''writev_nocancel''': 412&lt;br /&gt;
* '''sendto_nocancel''': 413&lt;br /&gt;
* '''pread_nocancel''': 414&lt;br /&gt;
* '''pwrite_nocancel''': 415&lt;br /&gt;
* '''waitid_nocancel''': 416&lt;br /&gt;
* '''poll_nocancel''': 417&lt;br /&gt;
* '''sem_wait_nocancel''': 420&lt;br /&gt;
* '''aio_suspend_nocancel''': 421&lt;br /&gt;
* '''__sigwait_nocancel''': 422&lt;br /&gt;
* '''__semwait_signal_nocancel''': 423&lt;br /&gt;
---------------------------------------------------------------------&lt;br /&gt;
* '''__mac_mount''': 424&lt;br /&gt;
* '''__mac_get_mount''': 425&lt;br /&gt;
* '''__mac_getfsstat''': 426&lt;br /&gt;
* '''fsgetpath_1''': 427&lt;br /&gt;
* '''_audit_session_self''': 428&lt;br /&gt;
* '''audit_session_join''': 429&lt;br /&gt;
* '''fileport_makeport''': 430&lt;br /&gt;
* '''fileport_makefd''': 431&lt;br /&gt;
* '''audit_session_port''': 432&lt;br /&gt;
* '''pid_suspend''': 433&lt;br /&gt;
* '''pid_resume''': 434&lt;br /&gt;
* '''pid_hibernate''': 435&lt;br /&gt;
* '''pid_shutdown_sockets''': 436&lt;br /&gt;
* '''(unused)''': 437&lt;br /&gt;
* '''shared_region_map_and_slide_np''': 438  (used in ASLR)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CPU ==&lt;br /&gt;
'''Note: the following are probably incorrect. These are carried out by ARM control registers (MRC, MCR commands)'''&lt;br /&gt;
Who put these in, in the first place?&lt;br /&gt;
=== Usage ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
MOV R12, #x // number from list&lt;br /&gt;
swi 0x80&lt;br /&gt;
bx lr&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;del&amp;gt;&lt;br /&gt;
=== List ===&lt;br /&gt;
* '''Clear Instruction Cache''': 0&lt;br /&gt;
* '''Flush Data Cache''': 1&lt;br /&gt;
* '''_pthread_set_self''': 2&lt;br /&gt;
* '''Unknown''': 3&lt;br /&gt;
&amp;lt;/del&amp;gt;&lt;/div&gt;</summary>
		<author><name>0x56</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=The_iPhone_Wiki:Community_portal&amp;diff=24702</id>
		<title>The iPhone Wiki:Community portal</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=The_iPhone_Wiki:Community_portal&amp;diff=24702"/>
		<updated>2012-03-02T03:12:31Z</updated>

		<summary type="html">&lt;p&gt;0x56: RE: IMG3 File Key Grabbing&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Talk Archive|2010|2011|2012}}&lt;br /&gt;
This is the place to post tasks that need to be done on the wiki. Also this is the place for proposed changes. I heard about people wanting a favicon and arranging the main page into categories.&lt;br /&gt;
&lt;br /&gt;
== Site Related Requests ==&lt;br /&gt;
=== AcidSn0w ===&lt;br /&gt;
Can I propose a page for acidsn0w? I heard that there was stolen code, so I haven't posted. --[[User:Dylan Laws|Dylan Laws]] 17:02, 17 January 2012 (MST)&lt;br /&gt;
:The first beta did use stolen code, but the second beta fixed that. As it is still in beta, a page may not be a good idea. It does have a good user-base as shown in their blog comments, but it is up to the sysops. If you are in the Pwn Dev Team, then NO. --[[User:5urd|5urd]] 17:09, 17 January 2012 (MST)&lt;br /&gt;
:: I am not in their team. :P I'll wait till/if they release it. --[[User:Dylan Laws|Dylan Laws]] 17:37, 17 January 2012 (MST) &lt;br /&gt;
:::I want to make something clear about this wiki, it's called &amp;quot;The iPhone Wiki&amp;quot;, not &amp;quot;The iPhone Community Wiki&amp;quot;, or even &amp;quot;The Jailbreaking Wiki&amp;quot;. This site exists to document the iPhone, not who made what GUI. A jailbreak tool that doesn't introduce exploits or isn't very widely used isn't notable. To clarify, the [[Limera1n_Exploit]] page is far more valuable than the [[limera1n]] page. Please focus on adding technical content instead of thinly veiled advertisements. For example, it's appalling we don't have a page documenting [[ASLR]] --[[User:Geohot|geohot]] 23:16, 17 January 2012 (MST)&lt;br /&gt;
:::I would also like to see the Baseband ticket system documented --[[User:Geohot|geohot]] 14:48, 18 January 2012 (MST)&lt;br /&gt;
&lt;br /&gt;
=== 2.2b1 ===&lt;br /&gt;
Is 2.2b1 5G26 or 5G27, because on [[Beta Firmware]], it says 5G27 while on the previous revisions of [[VFDecrypt Keys]] is said 5G26 --[[User:balloonhead66|5urd]] 18:47, 14 January 2012 (MST)&lt;br /&gt;
&lt;br /&gt;
=== IMG3 File Key Grabbing ===&lt;br /&gt;
How does one grab the keys for the IMG3 files if they have a decrypted ramdisk? I have genpass, xpwn, and vfdecrypt, but what do I use to get keys for IMG3 files? --[[User:5urd|5urd]] 17:17, 2 February 2012 (MST)&lt;br /&gt;
:Unlike the vfdecrypt key, the keys for decrypting the [[IMG3_File_Format#Tags | IMG3]] are stored encrypted in the [[KBAG]] section of the IMG3 file itself, not the ramdisk. These keys are encrypted using the [[GID-key]], so access to the AES engine is required. On a device compatible with greenpois0n or openiBoot, this process is (loosely) documented [[AES_Keys#Running_The_Engine | here]]. I am working on implementing a method that can be performed on a jailbroken 4S or iPad 2 (is that is what you're looking for?) and will release when finished --[[User:0x56|0x56]] 20:12, 1 March 2012 (MST)&lt;/div&gt;</summary>
		<author><name>0x56</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Apex_8A2062a&amp;diff=21625</id>
		<title>Apex 8A2062a</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Apex_8A2062a&amp;diff=21625"/>
		<updated>2011-10-12T08:43:28Z</updated>

		<summary type="html">&lt;p&gt;0x56: added link to usbmux page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Inferno 8A2062a''' is, apparently, an internal [[firmware]] used for testing. It was discovered on an [[N90ap|iPhone 4]] (GSM), but may be in use for other iDevices.&lt;br /&gt;
&lt;br /&gt;
== Legacy ==&lt;br /&gt;
Although Inferno comes in an [[IPSW File Format|IPSW]], flashing it via [[iTunes]] causes an error. Inferno is flashed using [[PurpleRestore]].&lt;br /&gt;
&lt;br /&gt;
== Interface ==&lt;br /&gt;
All tests are performed via a [[Usbmux | usbmux]] interface. During that time the iPhone displays a picture of a fireball. Partial output is displayed at the bottom.&lt;br /&gt;
&lt;br /&gt;
However when display tests are run, different output is produced.&lt;br /&gt;
&lt;br /&gt;
== Media ==&lt;br /&gt;
*[http://www.csmonitor.com/var/ezflow_site/storage/images/media/images/0512-iphone-4g-vietnam/7883588-1-eng-US/0512-iPhone-4G-vietnam_full_600.jpg Photo 1]&lt;br /&gt;
*[http://www.handyfreakz.info/wp-content/uploads/2010/05/Iphone-4G-Vietnam.jpg Photo 2]&lt;br /&gt;
*[http://www.youtube.com/watch?v=6AAnUHePbe4 YouTube video]&lt;br /&gt;
&lt;br /&gt;
== Source ==&lt;br /&gt;
This has been seen on the second leaked iPhone 4 from Vietnam.&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [[Inferno (utility)]]&lt;/div&gt;</summary>
		<author><name>0x56</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Normal_Mode&amp;diff=21624</id>
		<title>Normal Mode</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Normal_Mode&amp;diff=21624"/>
		<updated>2011-10-12T08:40:37Z</updated>

		<summary type="html">&lt;p&gt;0x56: moved usbmux related links to usbmux page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the protocol [[iTunes]] uses to talk to the booted iPhone. It uses [[Usbmux | usbmux]] to provide TCP like connectivity over a USB port using SSL. There is a pairing process iTunes uses to establish the secure channel. File transfer is provided by [[AFC]].&lt;br /&gt;
&lt;br /&gt;
==Device IDs==&lt;br /&gt;
It appears that it uses different device IDs:&lt;br /&gt;
* [[M68ap|iPhone]] - 0x1290&lt;br /&gt;
* [[N82ap|iPhone 3G]] - 0x1292&lt;br /&gt;
* [[N88ap|iPhone 3GS]] - 0x1294&lt;br /&gt;
* [[N90ap|iPhone 4 GSM]] - 0x1297&lt;br /&gt;
* [[N92ap|iPhone 4 CDMA]] - 0x129c&lt;br /&gt;
&lt;br /&gt;
* [[N45ap|iPod touch]] - 0x1291&lt;br /&gt;
* [[N72ap|iPod touch 2G]] - 0x1293&lt;br /&gt;
* [[N18ap|iPod touch 3G]] - 0x1299&lt;br /&gt;
* [[N81ap|iPod touch 4G]] - 0x129e&lt;br /&gt;
&lt;br /&gt;
* [[K48ap|iPad]] - 0x129a&lt;br /&gt;
* [[K93ap|iPad 2 Wi-Fi]] - 0x129f&lt;br /&gt;
* [[K94ap|iPad 2 GSM]] - 0x12a2&lt;br /&gt;
* [[K95ap|iPad 2 CDMA]] - 0x12a3&lt;br /&gt;
&lt;br /&gt;
* [[K66ap|Apple TV 2G]] -&lt;br /&gt;
&lt;br /&gt;
==Patch: Disable SSL==&lt;br /&gt;
There is a way to disable SSL encyption during iTunes communication on jailbroken devices by patching lockdownd binary:&lt;br /&gt;
&lt;br /&gt;
:(#) Disable SSL protection&lt;br /&gt;
:(#) FW 2.1&lt;br /&gt;
:(#) binary /usr/libexec/lockdownd&lt;br /&gt;
:-0x1000&lt;br /&gt;
'''Offset''' 000112F8: 0C 30 98 E5 &amp;gt; 00 30 A0 E3 ; Conn.UseSSL = false&lt;br /&gt;
&lt;br /&gt;
After applying the patch all packets between iPhone and iTunes become plain and clear. Musthave for R&amp;amp;D ppl.&lt;br /&gt;
&lt;br /&gt;
[[Category:Protocols (S5L)]]&lt;/div&gt;</summary>
		<author><name>0x56</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Usbmux&amp;diff=21623</id>
		<title>Usbmux</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Usbmux&amp;diff=21623"/>
		<updated>2011-10-12T08:37:15Z</updated>

		<summary type="html">&lt;p&gt;0x56: added resources links&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;During normal operations, iTunes communicates with the iPhone using something called “usbmux” – this is a system for multiplexing several “connections” over one USB pipe. Conceptually, it provides a TCP-like system – processes on the host machine open up connections to specific, numbered ports on the mobile device. (This resemblance is more than superficial – on the mobile device, usbmuxd actually makes TCP connections to localhost using the port number you give it.)&lt;br /&gt;
&lt;br /&gt;
On the Mac, this is handled by /System/Library/PrivateFrameworks/MobileDevice.framework/Resources/usbmuxd, a daemon that is started by launchd (see /System/Library/LaunchDaemons/ com.apple.usbmuxd.plist). It creates a listening UNIX Domain Socket at /var/run/usbmuxd. usbmuxd then watches for iPhone connections via USB; when it detects an iPhone running in normal user mode (as opposed to recovery mode), it will connect to it and then start relaying requests that it receives via /var/run/usbmuxd – this is to say, usbmuxd is the only thing that actually speaks USB to the iPhone. This means that third-party applications which wish to talk to the iPhone must either do so through usbmuxd, or usbmuxd must be replaced.&lt;br /&gt;
&lt;br /&gt;
== Layered Communications ==&lt;br /&gt;
&lt;br /&gt;
Communications between the host (generally, iTunes running on a Mac or Windows machine) and the device (an iPhone or iPod Touch) take place using a complicated scheme of nested layers. From lowest level to highest, they are:&lt;br /&gt;
&lt;br /&gt;
* USB protocol: multiplexes multiple data streams over one pair of bulk endpoints&lt;br /&gt;
* usbmuxd protocol: provides a way of opening connections to TCP ports on the device&lt;br /&gt;
* lockdownd protocol: tbd&lt;br /&gt;
* iTunesHelper?&lt;br /&gt;
* AFC?&lt;br /&gt;
&lt;br /&gt;
== Client to usbmuxd ==&lt;br /&gt;
&lt;br /&gt;
When a process on the host machine wants to talk to the iPhone, it opens up a connection to /var/run/usbmuxd. It then performs an initial handshake; after this handshake, the data in the socket is transparently tunneled to the specified TCP port on the phone. An easy way to watch this happen is to use socat, like so:&lt;br /&gt;
&lt;br /&gt;
 sudo mv /var/run/usbmuxd /var/run/usbmuxx&lt;br /&gt;
 sudo socat -t100 -x -v UNIX-LISTEN:/var/run/usbmuxd,mode=777,reuseaddr,fork UNIX-CONNECT:/var/run/usbmuxx&lt;br /&gt;
&lt;br /&gt;
=== Data structures ===&lt;br /&gt;
&lt;br /&gt;
All data structures are little-endian&lt;br /&gt;
&lt;br /&gt;
 struct usbmux_header {&lt;br /&gt;
 	u32 length;	// length of message, including header&lt;br /&gt;
 	u32 reserved;	// always zero&lt;br /&gt;
 	u32 type;       // message type&lt;br /&gt;
 	u32 tag;	// responses to this query will echo back this tag&lt;br /&gt;
 };&lt;br /&gt;
 &lt;br /&gt;
 struct usbmux_result {&lt;br /&gt;
 	struct usbmux_header header;&lt;br /&gt;
 	u32 result;&lt;br /&gt;
 };&lt;br /&gt;
 &lt;br /&gt;
 struct usbmux_connect_request {&lt;br /&gt;
 	struct usbmux_header header;&lt;br /&gt;
 	u32  device_id;&lt;br /&gt;
 	u16  port;		// TCP port number&lt;br /&gt;
 };&lt;br /&gt;
 &lt;br /&gt;
 enum {&lt;br /&gt;
 	usbmux_result  = 1,&lt;br /&gt;
 	usbmux_connect = 2,&lt;br /&gt;
 	usbmux_hello   = 3,&lt;br /&gt;
 };&lt;br /&gt;
&lt;br /&gt;
=== Sequence of Events ===&lt;br /&gt;
&lt;br /&gt;
1) Client opens connection to /var/run/usbmuxd&lt;br /&gt;
&lt;br /&gt;
2) Client sends &amp;quot;Hello&amp;quot; packet:&lt;br /&gt;
 10000000 00000000 03000000 02000000&lt;br /&gt;
 (length = 0x10, reserved = 0, type = 3, tag = 2)&lt;br /&gt;
&lt;br /&gt;
3) Client receives &amp;quot;Hello&amp;quot; response:&lt;br /&gt;
 14000000 00000000 01000000 02000000 00000000&lt;br /&gt;
 (length = 0x14, type = 1, tag = 2, result = 0)&lt;br /&gt;
&lt;br /&gt;
4) Client receives device ID:&lt;br /&gt;
 1c 01 00 00 00 00 00 00 04 00 00 00 00 00 00 00  ................&lt;br /&gt;
 19 00 00 00 91 12 31 33 31 34 64 66 34 61 30 30  ......1314df4a00&lt;br /&gt;
 65 37 31 37 35 35 62 31 32 30 31 66 64 36 34 34  e71755b1201fd644&lt;br /&gt;
 35 34 63 63 35 38 36 39 39 63 30 31 66 64 00 00  54cc58699c01fd..&lt;br /&gt;
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................&lt;br /&gt;
 [...]&lt;br /&gt;
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................&lt;br /&gt;
 00 00 00 00 00 00 00 00 00 00 10 fd              ............&lt;br /&gt;
 (length=0x1c1, type = 4, tag = 0, device_id = 0x19, usb_product_id = 0x1291, serial number string = &amp;quot;1314.....01fd&amp;quot;.... ?)&lt;br /&gt;
&lt;br /&gt;
5) Client sends TCP connect request:&lt;br /&gt;
 18000000 00000000 02000000 03000000 19000000 00160000&lt;br /&gt;
 (length = 0x18, type = 2, tag = 3, device_id = 0x19, port = 0x0016 (big-endian) = 22)&lt;br /&gt;
&lt;br /&gt;
6)  Client receives ACK:&lt;br /&gt;
 &lt;br /&gt;
* Connection refused:&lt;br /&gt;
 14000000 00000000 01000000 03000000 03000000&lt;br /&gt;
 (length = 0x14, type = 1, tag = 3, result = 3 -- connection refused?)&lt;br /&gt;
&lt;br /&gt;
* Connection established:&lt;br /&gt;
 14000000 00000000 01000000 03000000 00000000&lt;br /&gt;
 (length = 0x14, type = 1, tag = 3, result = 0 -- no error)&lt;br /&gt;
&lt;br /&gt;
From this point on, data is piped directly between the unix socket on the host and the TCP port on the device.&lt;br /&gt;
&lt;br /&gt;
== lockdownd protocol ==&lt;br /&gt;
&lt;br /&gt;
lockdownd uses port 62078. It uses a simple packet format - each packet is a 32-bit big-endian word indicating the size of the payload of the packet. Packets are in XML plist format, unless otherwise stated; the first two packets are shown in full, and the rest are abbreviated for the sake of readability.&lt;br /&gt;
&lt;br /&gt;
Example: plug iTouch into iTunes&lt;br /&gt;
&lt;br /&gt;
 1. request: {Label=iTunesHelper, Request=QueryType}&lt;br /&gt;
 0000011d (length of request, now in big-endian!)&lt;br /&gt;
 &lt;br /&gt;
 ASCII payload:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;UTF-8&amp;quot;?&amp;gt;&lt;br /&gt;
 &amp;lt;!DOCTYPE plist PUBLIC &amp;quot;-//Apple//DTD PLIST 1.0//EN&amp;quot; &amp;quot;http://www.apple.com/DTDs/PropertyList-1.0.dtd&amp;quot;&amp;gt;&lt;br /&gt;
 &amp;lt;plist version=&amp;quot;1.0&amp;quot;&amp;gt;&lt;br /&gt;
 &amp;lt;dict&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;Label&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;string&amp;gt;iTunesHelper&amp;lt;/string&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;Request&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;string&amp;gt;QueryType&amp;lt;/string&amp;gt;&lt;br /&gt;
 &amp;lt;/dict&amp;gt;&lt;br /&gt;
 &amp;lt;/plist&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 2. response: {Request=QueryType, Result=Success, Type=com.apple.mobile.lockdown}&lt;br /&gt;
 00000156 (length)&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;UTF-8&amp;quot;?&amp;gt;&lt;br /&gt;
 &amp;lt;!DOCTYPE plist PUBLIC &amp;quot;-//Apple//DTD PLIST 1.0//EN&amp;quot; &amp;quot;http://www.apple.com/DTDs/PropertyList-1.0.dtd&amp;quot;&amp;gt;&lt;br /&gt;
 &amp;lt;plist version=&amp;quot;1.0&amp;quot;&amp;gt;&lt;br /&gt;
 &amp;lt;dict&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;Request&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;string&amp;gt;QueryType&amp;lt;/string&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;Result&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;string&amp;gt;Success&amp;lt;/string&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;Type&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;string&amp;gt;com.apple.mobile.lockdown&amp;lt;/string&amp;gt;&lt;br /&gt;
 &amp;lt;/dict&amp;gt;&lt;br /&gt;
 &amp;lt;/plist&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 3. request: {Label=iTunesHelper, PairRecord={DeviceCertificate=xxxx,HostCertificate=xxxx,HostID=xxxx,RootCertificate=xxxx}, Request=ValidatePair}&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;dict&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;Label&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;string&amp;gt;iTunesHelper&amp;lt;/string&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;PairRecord&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;dict&amp;gt;&lt;br /&gt;
 		&amp;lt;key&amp;gt;DeviceCertificate&amp;lt;/key&amp;gt;&lt;br /&gt;
  		&amp;lt;data&amp;gt;&lt;br /&gt;
 		LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNOVENDQVIyZ0F3SUJB&lt;br /&gt;
 		[...]&lt;br /&gt;
 		RVJUSUZJQ0FURS0tLS0tCg==&lt;br /&gt;
 		&amp;lt;/data&amp;gt;&lt;br /&gt;
 		&amp;lt;key&amp;gt;HostCertificate&amp;lt;/key&amp;gt;&lt;br /&gt;
 		&amp;lt;data&amp;gt;&lt;br /&gt;
 		LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUN1akNDQWFLZ0F3SUJB&lt;br /&gt;
 		[...]&lt;br /&gt;
 		UlRJRklDQVRFLS0tLS0K&lt;br /&gt;
 		&amp;lt;/data&amp;gt;&lt;br /&gt;
 		&amp;lt;key&amp;gt;HostID&amp;lt;/key&amp;gt;&lt;br /&gt;
 		&amp;lt;string&amp;gt;D7......-....-....-....-........4EFE&amp;lt;/string&amp;gt;&lt;br /&gt;
 		&amp;lt;key&amp;gt;RootCertificate&amp;lt;/key&amp;gt;&lt;br /&gt;
 		&amp;lt;data&amp;gt;&lt;br /&gt;
 		LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNyVENDQVpXZ0F3SUJB&lt;br /&gt;
 		[...]&lt;br /&gt;
 		NUVPRitjZVFNcUovZHBFdz0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=&lt;br /&gt;
 		&amp;lt;/data&amp;gt;&lt;br /&gt;
 	&amp;lt;/dict&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;Request&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;string&amp;gt;ValidatePair&amp;lt;/string&amp;gt;&lt;br /&gt;
 &amp;lt;/dict&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 4. response: {Request=ValidatePair, Result=Success}&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;dict&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;Request&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;string&amp;gt;ValidatePair&amp;lt;/string&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;Result&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;string&amp;gt;Success&amp;lt;/string&amp;gt;&lt;br /&gt;
 &amp;lt;/dict&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 5. request: {HostID=xxx, Label=iTunesHelper, Request=StartSession}&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;dict&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;HostID&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;string&amp;gt;D7......-....-....-....-........4EFE&amp;lt;/string&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;Label&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;string&amp;gt;iTunesHelper&amp;lt;/string&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;Request&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;string&amp;gt;StartSession&amp;lt;/string&amp;gt;&lt;br /&gt;
 &amp;lt;/dict&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 6. response: {EnableSessionSSL=true, Request=StartSession, Result=Success, SessionID=xxx}&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;dict&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;EnableSessionSSL&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;true/&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;Request&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;string&amp;gt;StartSession&amp;lt;/string&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;Result&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;string&amp;gt;Success&amp;lt;/string&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;SessionID&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;string&amp;gt;DE622607-91A9-4DA7-A38C-F6DC1F8EF24F&amp;lt;/string&amp;gt;&lt;br /&gt;
 &amp;lt;/dict&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== usbmuxd to iPhone ==&lt;br /&gt;
&lt;br /&gt;
(TBD …)&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
&lt;br /&gt;
This document was originally part of wikee.iphwn.org, which no longer seems to exist. This version was pulled from archive.org on 12 Oct 2011, and was last edited on 13 Jul 2008. All credit for this document should go to the iPhone Dev Team.&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
&lt;br /&gt;
* [[MobileDevice Library]]&lt;br /&gt;
* [http://libimobiledevice.org/docs/html/files.html Protocol Documentation]&lt;br /&gt;
* [http://libimobiledevice.org/ iFuse]&lt;/div&gt;</summary>
		<author><name>0x56</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Normal_Mode&amp;diff=21622</id>
		<title>Normal Mode</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Normal_Mode&amp;diff=21622"/>
		<updated>2011-10-12T08:33:35Z</updated>

		<summary type="html">&lt;p&gt;0x56: /* Resources */ updated usbmux link to point to new page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the protocol [[iTunes]] uses to talk to the booted iPhone. It uses usbmux to provide TCP like connectivity over a USB port using SSL. There is a pairing process iTunes uses to establish the secure channel. File transfer is provided by [[AFC]].&lt;br /&gt;
&lt;br /&gt;
==Device IDs==&lt;br /&gt;
It appears that it uses different device IDs:&lt;br /&gt;
* [[M68ap|iPhone]] - 0x1290&lt;br /&gt;
* [[N82ap|iPhone 3G]] - 0x1292&lt;br /&gt;
* [[N88ap|iPhone 3GS]] - 0x1294&lt;br /&gt;
* [[N90ap|iPhone 4 GSM]] - 0x1297&lt;br /&gt;
* [[N92ap|iPhone 4 CDMA]] - 0x129c&lt;br /&gt;
&lt;br /&gt;
* [[N45ap|iPod touch]] - 0x1291&lt;br /&gt;
* [[N72ap|iPod touch 2G]] - 0x1293&lt;br /&gt;
* [[N18ap|iPod touch 3G]] - 0x1299&lt;br /&gt;
* [[N81ap|iPod touch 4G]] - 0x129e&lt;br /&gt;
&lt;br /&gt;
* [[K48ap|iPad]] - 0x129a&lt;br /&gt;
* [[K93ap|iPad 2 Wi-Fi]] - 0x129f&lt;br /&gt;
* [[K94ap|iPad 2 GSM]] - 0x12a2&lt;br /&gt;
* [[K95ap|iPad 2 CDMA]] - 0x12a3&lt;br /&gt;
&lt;br /&gt;
* [[K66ap|Apple TV 2G]] -&lt;br /&gt;
&lt;br /&gt;
==Patch: Disable SSL==&lt;br /&gt;
There is a way to disable SSL encyption during iTunes communication on jailbroken devices by patching lockdownd binary:&lt;br /&gt;
&lt;br /&gt;
:(#) Disable SSL protection&lt;br /&gt;
:(#) FW 2.1&lt;br /&gt;
:(#) binary /usr/libexec/lockdownd&lt;br /&gt;
:-0x1000&lt;br /&gt;
'''Offset''' 000112F8: 0C 30 98 E5 &amp;gt; 00 30 A0 E3 ; Conn.UseSSL = false&lt;br /&gt;
&lt;br /&gt;
After applying the patch all packets between iPhone and iTunes become plain and clear. Musthave for R&amp;amp;D ppl.&lt;br /&gt;
==USBMux Protocol==&lt;br /&gt;
&lt;br /&gt;
===Resources===&lt;br /&gt;
* [[MobileDevice Library]]&lt;br /&gt;
* [[Usbmux | usbmux - iPhone Dev Team]]&lt;br /&gt;
* [http://libimobiledevice.org/docs/html/files.html Protocol Documentation]&lt;br /&gt;
* [http://libimobiledevice.org/ iFuse]&lt;br /&gt;
&lt;br /&gt;
[[Category:Protocols (S5L)]]&lt;/div&gt;</summary>
		<author><name>0x56</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Usbmux&amp;diff=21621</id>
		<title>Usbmux</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Usbmux&amp;diff=21621"/>
		<updated>2011-10-12T08:29:24Z</updated>

		<summary type="html">&lt;p&gt;0x56: iPhone Dev Team writeup on usbmux&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;During normal operations, iTunes communicates with the iPhone using something called “usbmux” – this is a system for multiplexing several “connections” over one USB pipe. Conceptually, it provides a TCP-like system – processes on the host machine open up connections to specific, numbered ports on the mobile device. (This resemblance is more than superficial – on the mobile device, usbmuxd actually makes TCP connections to localhost using the port number you give it.)&lt;br /&gt;
&lt;br /&gt;
On the Mac, this is handled by /System/Library/PrivateFrameworks/MobileDevice.framework/Resources/usbmuxd, a daemon that is started by launchd (see /System/Library/LaunchDaemons/ com.apple.usbmuxd.plist). It creates a listening UNIX Domain Socket at /var/run/usbmuxd. usbmuxd then watches for iPhone connections via USB; when it detects an iPhone running in normal user mode (as opposed to recovery mode), it will connect to it and then start relaying requests that it receives via /var/run/usbmuxd – this is to say, usbmuxd is the only thing that actually speaks USB to the iPhone. This means that third-party applications which wish to talk to the iPhone must either do so through usbmuxd, or usbmuxd must be replaced.&lt;br /&gt;
&lt;br /&gt;
== Layered Communications ==&lt;br /&gt;
&lt;br /&gt;
Communications between the host (generally, iTunes running on a Mac or Windows machine) and the device (an iPhone or iPod Touch) take place using a complicated scheme of nested layers. From lowest level to highest, they are:&lt;br /&gt;
&lt;br /&gt;
* USB protocol: multiplexes multiple data streams over one pair of bulk endpoints&lt;br /&gt;
* usbmuxd protocol: provides a way of opening connections to TCP ports on the device&lt;br /&gt;
* lockdownd protocol: tbd&lt;br /&gt;
* iTunesHelper?&lt;br /&gt;
* AFC?&lt;br /&gt;
&lt;br /&gt;
== Client to usbmuxd ==&lt;br /&gt;
&lt;br /&gt;
When a process on the host machine wants to talk to the iPhone, it opens up a connection to /var/run/usbmuxd. It then performs an initial handshake; after this handshake, the data in the socket is transparently tunneled to the specified TCP port on the phone. An easy way to watch this happen is to use socat, like so:&lt;br /&gt;
&lt;br /&gt;
 sudo mv /var/run/usbmuxd /var/run/usbmuxx&lt;br /&gt;
 sudo socat -t100 -x -v UNIX-LISTEN:/var/run/usbmuxd,mode=777,reuseaddr,fork UNIX-CONNECT:/var/run/usbmuxx&lt;br /&gt;
&lt;br /&gt;
=== Data structures ===&lt;br /&gt;
&lt;br /&gt;
All data structures are little-endian&lt;br /&gt;
&lt;br /&gt;
 struct usbmux_header {&lt;br /&gt;
 	u32 length;	// length of message, including header&lt;br /&gt;
 	u32 reserved;	// always zero&lt;br /&gt;
 	u32 type;       // message type&lt;br /&gt;
 	u32 tag;	// responses to this query will echo back this tag&lt;br /&gt;
 };&lt;br /&gt;
 &lt;br /&gt;
 struct usbmux_result {&lt;br /&gt;
 	struct usbmux_header header;&lt;br /&gt;
 	u32 result;&lt;br /&gt;
 };&lt;br /&gt;
 &lt;br /&gt;
 struct usbmux_connect_request {&lt;br /&gt;
 	struct usbmux_header header;&lt;br /&gt;
 	u32  device_id;&lt;br /&gt;
 	u16  port;		// TCP port number&lt;br /&gt;
 };&lt;br /&gt;
 &lt;br /&gt;
 enum {&lt;br /&gt;
 	usbmux_result  = 1,&lt;br /&gt;
 	usbmux_connect = 2,&lt;br /&gt;
 	usbmux_hello   = 3,&lt;br /&gt;
 };&lt;br /&gt;
&lt;br /&gt;
=== Sequence of Events ===&lt;br /&gt;
&lt;br /&gt;
1) Client opens connection to /var/run/usbmuxd&lt;br /&gt;
&lt;br /&gt;
2) Client sends &amp;quot;Hello&amp;quot; packet:&lt;br /&gt;
 10000000 00000000 03000000 02000000&lt;br /&gt;
 (length = 0x10, reserved = 0, type = 3, tag = 2)&lt;br /&gt;
&lt;br /&gt;
3) Client receives &amp;quot;Hello&amp;quot; response:&lt;br /&gt;
 14000000 00000000 01000000 02000000 00000000&lt;br /&gt;
 (length = 0x14, type = 1, tag = 2, result = 0)&lt;br /&gt;
&lt;br /&gt;
4) Client receives device ID:&lt;br /&gt;
 1c 01 00 00 00 00 00 00 04 00 00 00 00 00 00 00  ................&lt;br /&gt;
 19 00 00 00 91 12 31 33 31 34 64 66 34 61 30 30  ......1314df4a00&lt;br /&gt;
 65 37 31 37 35 35 62 31 32 30 31 66 64 36 34 34  e71755b1201fd644&lt;br /&gt;
 35 34 63 63 35 38 36 39 39 63 30 31 66 64 00 00  54cc58699c01fd..&lt;br /&gt;
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................&lt;br /&gt;
 [...]&lt;br /&gt;
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................&lt;br /&gt;
 00 00 00 00 00 00 00 00 00 00 10 fd              ............&lt;br /&gt;
 (length=0x1c1, type = 4, tag = 0, device_id = 0x19, usb_product_id = 0x1291, serial number string = &amp;quot;1314.....01fd&amp;quot;.... ?)&lt;br /&gt;
&lt;br /&gt;
5) Client sends TCP connect request:&lt;br /&gt;
 18000000 00000000 02000000 03000000 19000000 00160000&lt;br /&gt;
 (length = 0x18, type = 2, tag = 3, device_id = 0x19, port = 0x0016 (big-endian) = 22)&lt;br /&gt;
&lt;br /&gt;
6)  Client receives ACK:&lt;br /&gt;
 &lt;br /&gt;
* Connection refused:&lt;br /&gt;
 14000000 00000000 01000000 03000000 03000000&lt;br /&gt;
 (length = 0x14, type = 1, tag = 3, result = 3 -- connection refused?)&lt;br /&gt;
&lt;br /&gt;
* Connection established:&lt;br /&gt;
 14000000 00000000 01000000 03000000 00000000&lt;br /&gt;
 (length = 0x14, type = 1, tag = 3, result = 0 -- no error)&lt;br /&gt;
&lt;br /&gt;
From this point on, data is piped directly between the unix socket on the host and the TCP port on the device.&lt;br /&gt;
&lt;br /&gt;
== lockdownd protocol ==&lt;br /&gt;
&lt;br /&gt;
lockdownd uses port 62078. It uses a simple packet format - each packet is a 32-bit big-endian word indicating the size of the payload of the packet. Packets are in XML plist format, unless otherwise stated; the first two packets are shown in full, and the rest are abbreviated for the sake of readability.&lt;br /&gt;
&lt;br /&gt;
Example: plug iTouch into iTunes&lt;br /&gt;
&lt;br /&gt;
 1. request: {Label=iTunesHelper, Request=QueryType}&lt;br /&gt;
 0000011d (length of request, now in big-endian!)&lt;br /&gt;
 &lt;br /&gt;
 ASCII payload:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;UTF-8&amp;quot;?&amp;gt;&lt;br /&gt;
 &amp;lt;!DOCTYPE plist PUBLIC &amp;quot;-//Apple//DTD PLIST 1.0//EN&amp;quot; &amp;quot;http://www.apple.com/DTDs/PropertyList-1.0.dtd&amp;quot;&amp;gt;&lt;br /&gt;
 &amp;lt;plist version=&amp;quot;1.0&amp;quot;&amp;gt;&lt;br /&gt;
 &amp;lt;dict&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;Label&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;string&amp;gt;iTunesHelper&amp;lt;/string&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;Request&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;string&amp;gt;QueryType&amp;lt;/string&amp;gt;&lt;br /&gt;
 &amp;lt;/dict&amp;gt;&lt;br /&gt;
 &amp;lt;/plist&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 2. response: {Request=QueryType, Result=Success, Type=com.apple.mobile.lockdown}&lt;br /&gt;
 00000156 (length)&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;UTF-8&amp;quot;?&amp;gt;&lt;br /&gt;
 &amp;lt;!DOCTYPE plist PUBLIC &amp;quot;-//Apple//DTD PLIST 1.0//EN&amp;quot; &amp;quot;http://www.apple.com/DTDs/PropertyList-1.0.dtd&amp;quot;&amp;gt;&lt;br /&gt;
 &amp;lt;plist version=&amp;quot;1.0&amp;quot;&amp;gt;&lt;br /&gt;
 &amp;lt;dict&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;Request&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;string&amp;gt;QueryType&amp;lt;/string&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;Result&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;string&amp;gt;Success&amp;lt;/string&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;Type&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;string&amp;gt;com.apple.mobile.lockdown&amp;lt;/string&amp;gt;&lt;br /&gt;
 &amp;lt;/dict&amp;gt;&lt;br /&gt;
 &amp;lt;/plist&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 3. request: {Label=iTunesHelper, PairRecord={DeviceCertificate=xxxx,HostCertificate=xxxx,HostID=xxxx,RootCertificate=xxxx}, Request=ValidatePair}&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;dict&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;Label&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;string&amp;gt;iTunesHelper&amp;lt;/string&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;PairRecord&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;dict&amp;gt;&lt;br /&gt;
 		&amp;lt;key&amp;gt;DeviceCertificate&amp;lt;/key&amp;gt;&lt;br /&gt;
  		&amp;lt;data&amp;gt;&lt;br /&gt;
 		LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNOVENDQVIyZ0F3SUJB&lt;br /&gt;
 		[...]&lt;br /&gt;
 		RVJUSUZJQ0FURS0tLS0tCg==&lt;br /&gt;
 		&amp;lt;/data&amp;gt;&lt;br /&gt;
 		&amp;lt;key&amp;gt;HostCertificate&amp;lt;/key&amp;gt;&lt;br /&gt;
 		&amp;lt;data&amp;gt;&lt;br /&gt;
 		LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUN1akNDQWFLZ0F3SUJB&lt;br /&gt;
 		[...]&lt;br /&gt;
 		UlRJRklDQVRFLS0tLS0K&lt;br /&gt;
 		&amp;lt;/data&amp;gt;&lt;br /&gt;
 		&amp;lt;key&amp;gt;HostID&amp;lt;/key&amp;gt;&lt;br /&gt;
 		&amp;lt;string&amp;gt;D7......-....-....-....-........4EFE&amp;lt;/string&amp;gt;&lt;br /&gt;
 		&amp;lt;key&amp;gt;RootCertificate&amp;lt;/key&amp;gt;&lt;br /&gt;
 		&amp;lt;data&amp;gt;&lt;br /&gt;
 		LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNyVENDQVpXZ0F3SUJB&lt;br /&gt;
 		[...]&lt;br /&gt;
 		NUVPRitjZVFNcUovZHBFdz0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=&lt;br /&gt;
 		&amp;lt;/data&amp;gt;&lt;br /&gt;
 	&amp;lt;/dict&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;Request&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;string&amp;gt;ValidatePair&amp;lt;/string&amp;gt;&lt;br /&gt;
 &amp;lt;/dict&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 4. response: {Request=ValidatePair, Result=Success}&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;dict&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;Request&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;string&amp;gt;ValidatePair&amp;lt;/string&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;Result&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;string&amp;gt;Success&amp;lt;/string&amp;gt;&lt;br /&gt;
 &amp;lt;/dict&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 5. request: {HostID=xxx, Label=iTunesHelper, Request=StartSession}&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;dict&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;HostID&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;string&amp;gt;D7......-....-....-....-........4EFE&amp;lt;/string&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;Label&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;string&amp;gt;iTunesHelper&amp;lt;/string&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;Request&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;string&amp;gt;StartSession&amp;lt;/string&amp;gt;&lt;br /&gt;
 &amp;lt;/dict&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 6. response: {EnableSessionSSL=true, Request=StartSession, Result=Success, SessionID=xxx}&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;dict&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;EnableSessionSSL&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;true/&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;Request&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;string&amp;gt;StartSession&amp;lt;/string&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;Result&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;string&amp;gt;Success&amp;lt;/string&amp;gt;&lt;br /&gt;
 	&amp;lt;key&amp;gt;SessionID&amp;lt;/key&amp;gt;&lt;br /&gt;
 	&amp;lt;string&amp;gt;DE622607-91A9-4DA7-A38C-F6DC1F8EF24F&amp;lt;/string&amp;gt;&lt;br /&gt;
 &amp;lt;/dict&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== usbmuxd to iPhone ==&lt;br /&gt;
&lt;br /&gt;
(TBD …)&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
&lt;br /&gt;
This document was originally part of wikee.iphwn.org, which no longer seems to exist. This version was pulled from archive.org on 12 Oct 2011, and was last edited on 13 Jul 2008. All credit for this document should go to the iPhone Dev Team.&lt;/div&gt;</summary>
		<author><name>0x56</name></author>
		
	</entry>
</feed>