<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=0x8FF</id>
	<title>The iPhone Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=0x8FF"/>
	<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/wiki/Special:Contributions/0x8FF"/>
	<updated>2026-04-29T21:06:42Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.14</generator>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=User:0x8FF&amp;diff=126049</id>
		<title>User:0x8FF</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=User:0x8FF&amp;diff=126049"/>
		<updated>2023-04-13T00:12:54Z</updated>

		<summary type="html">&lt;p&gt;0x8FF: Blanked the page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>0x8FF</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Cheyote&amp;diff=126048</id>
		<title>Cheyote</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Cheyote&amp;diff=126048"/>
		<updated>2023-04-13T00:12:33Z</updated>

		<summary type="html">&lt;p&gt;0x8FF: RIP&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Infobox software&lt;br /&gt;
 | name                   = Cheyote&lt;br /&gt;
 | title                  = Cheyote&lt;br /&gt;
 | developer              = [https://twitter.com/OdysseyTeam_ OdysseyTeam_] [https://twitter.com/coolstarorg CoolStar]&lt;br /&gt;
 | operating system       = iOS&lt;br /&gt;
 | language               = English&lt;br /&gt;
 | genre                  = Jailbreaking&lt;br /&gt;
}}&lt;br /&gt;
'''Cheyote''' (formerly known as '''Taurine15''') is an canceled jailbreak for iOS/iPadOS 15. It was going to initially support 15.0-15.1.1.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;br /&gt;
[https://www.reddit.com/r/jailbreak/comments/w1cmv0/news_on_taurine15_zebra_2_and_my_future_in_the/ Announcement]&lt;br /&gt;
&lt;br /&gt;
[https://www.tumblr.com/coolstarorg/713631798916202496/leaving-the-jailbreak-community?source=share Cancellation]&lt;br /&gt;
&lt;br /&gt;
[[Category:Jailbreaks]]&lt;br /&gt;
[[Category:Jailbreaking]]&lt;br /&gt;
{{stub|software}}&lt;/div&gt;</summary>
		<author><name>0x8FF</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=IBoot-99&amp;diff=126007</id>
		<title>IBoot-99</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=IBoot-99&amp;diff=126007"/>
		<updated>2023-01-23T04:27:08Z</updated>

		<summary type="html">&lt;p&gt;0x8FF: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Iboot-99.jpeg |thumb|right|iBoot-99 running in QEMU (image from [https://twitter.com/mcg29_/status/1606861304697864193 @mcg29])]]&lt;br /&gt;
&lt;br /&gt;
This version of iBoot can be found in [[Alpine 1A420]] NOR dump. It's stored in unencrypted form.&lt;br /&gt;
&lt;br /&gt;
{{stub|firmware}}&lt;br /&gt;
[[Category:iBoot]]&lt;/div&gt;</summary>
		<author><name>0x8FF</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=File:Iboot-99.jpeg&amp;diff=126006</id>
		<title>File:Iboot-99.jpeg</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=File:Iboot-99.jpeg&amp;diff=126006"/>
		<updated>2023-01-23T04:21:48Z</updated>

		<summary type="html">&lt;p&gt;0x8FF: Image taken from @mcg29 on Twitter.

https://twitter.com/mcg29_/status/1606861304697864193/&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
Image taken from @mcg29 on Twitter.&lt;br /&gt;
&lt;br /&gt;
https://twitter.com/mcg29_/status/1606861304697864193/&lt;/div&gt;</summary>
		<author><name>0x8FF</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=User:0x8FF&amp;diff=125988</id>
		<title>User:0x8FF</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=User:0x8FF&amp;diff=125988"/>
		<updated>2023-01-05T09:33:00Z</updated>

		<summary type="html">&lt;p&gt;0x8FF: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;ADAAeAA4AGYAZgAuAG4AZQB0&lt;/div&gt;</summary>
		<author><name>0x8FF</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Sa%C3%AFgon&amp;diff=125987</id>
		<title>Saïgon</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Sa%C3%AFgon&amp;diff=125987"/>
		<updated>2023-01-05T09:29:57Z</updated>

		<summary type="html">&lt;p&gt;0x8FF: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Infobox software&lt;br /&gt;
 | name                   = Saïgon&lt;br /&gt;
 | title                  = Saïgon&lt;br /&gt;
 | developer              = [https://twitter.com/cheesecakeufo Abraham Masri (@cheesecakeufo)]&lt;br /&gt;
 | released               = {{Start date|2017|10|15|df=yes}}&lt;br /&gt;
 | latest release version = beta 3&lt;br /&gt;
 | latest release date    = {{Start date and age|2017|12|10|df=yes}}&lt;br /&gt;
 | discontinued           = {{Start date|2018|01|04}}&lt;br /&gt;
 | status                 = Abandoned&lt;br /&gt;
 | operating system       = iOS&lt;br /&gt;
 | language               = English&lt;br /&gt;
 | genre                  = Jailbreaking&lt;br /&gt;
 | website                = [https://web.archive.org/web/20180708221035/https://iabem97.github.io/saigon_website/ GitHub Page (Web Archive) - Saïgon]&lt;br /&gt;
}}&lt;br /&gt;
'''Saïgon''' is a [[semi-untethered jailbreak]] for certain 64-bit devices, running iOS 10.2.1, developed by cheesecakeufo. Saïgon works by sideloading an IPA using [[Cydia Impactor]]. The first beta was released on {{date|2017|10|15}}. It was announced that support for [[iPhone 6s]] on iOS 10.3.1 would come in the future.&lt;br /&gt;
&lt;br /&gt;
Originally based on Adam Donenfeld’s ziVA exploit, Saïgon has been based on Siguza’s [[v0rtex]] exploit since beta 3.&lt;br /&gt;
&lt;br /&gt;
cheesecakeufo no longer provides updates for Saïgon, and has open-sourced the jailbreak on GitHub&amp;lt;ref&amp;gt;https://twitter.com/cheesecakeufo/status/948752448654635008&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
== Version Change Log ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Version&lt;br /&gt;
! Date&lt;br /&gt;
! Changes&lt;br /&gt;
|-&lt;br /&gt;
| beta 1&lt;br /&gt;
| {{date|2017|10|15}}&lt;br /&gt;
|&lt;br /&gt;
*Initial release with support for the following devices:&lt;br /&gt;
**[[iPhone 6]]&lt;br /&gt;
**[[iPhone 6 Plus]] (10.2.1)&lt;br /&gt;
**[[iPhone SE (1st generation)]] (10.2.1) (not tested)&lt;br /&gt;
**[[iPhone 6s]] (10.2.1) (not tested)&lt;br /&gt;
**[[J81AP|iPad Air 2 (Wi-Fi)]] (10.2.1) (not tested)&lt;br /&gt;
|-&lt;br /&gt;
| beta 2&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | {{date|2017|10|21}}&lt;br /&gt;
|&lt;br /&gt;
*Fix for camera not working after jailbreaking&lt;br /&gt;
*Support for [[iPhone 6s Plus]]/[[iPad mini 4]]/[[iPad Air 2]]&lt;br /&gt;
*Minor bug fixes and changes&lt;br /&gt;
*Slightly better at escaping sandbox&lt;br /&gt;
*Option to reinstall [[Cydia]] by holding 'jailbreak' button then tapping it again&lt;br /&gt;
*Display device model and version&lt;br /&gt;
|-&lt;br /&gt;
| beta 2 revision 1&lt;br /&gt;
|&lt;br /&gt;
*Disables Cydia stashing&lt;br /&gt;
*Add support for [[iPod touch (6th generation)]]&lt;br /&gt;
|-&lt;br /&gt;
| beta 3&lt;br /&gt;
| {{date|2017|12|10}}&lt;br /&gt;
|&lt;br /&gt;
*Significantly better success rate using new exploit (v0rtex)&lt;br /&gt;
*Support for more devices (not tested)&lt;br /&gt;
*Complete re-write of the application&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
* [[doubleH3lix]] a 64-bit counterpart&lt;br /&gt;
* [[Meridian]] &lt;br /&gt;
* [[v0rtex]]&lt;br /&gt;
* [https://web.archive.org/web/20180906063235/https://github.com/cheesecakeufo/saigon Source code on GitHub (Web Archive)]&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Jailbreaks]]&lt;br /&gt;
[[Category:Jailbreaking]]&lt;/div&gt;</summary>
		<author><name>0x8FF</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Sa%C3%AFgon&amp;diff=125986</id>
		<title>Saïgon</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Sa%C3%AFgon&amp;diff=125986"/>
		<updated>2023-01-05T09:27:43Z</updated>

		<summary type="html">&lt;p&gt;0x8FF: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Infobox software&lt;br /&gt;
 | name                   = Saïgon&lt;br /&gt;
 | title                  = Saïgon&lt;br /&gt;
 | developer              = [https://twitter.com/cheesecakeufo Abraham Masri (@cheesecakeufo)]&lt;br /&gt;
 | released               = {{Start date|2017|10|15|df=yes}}&lt;br /&gt;
 | latest release version = beta 3&lt;br /&gt;
 | latest release date    = {{Start date and age|2017|12|10|df=yes}}&lt;br /&gt;
 | discontinued           = {{Start date|2018|01|04}}&lt;br /&gt;
 | status                 = Abandoned&lt;br /&gt;
 | operating system       = iOS&lt;br /&gt;
 | language               = English&lt;br /&gt;
 | genre                  = Jailbreaking&lt;br /&gt;
 | website                = [https://iabem97.github.io/saigon_website/ GitHub Page - Saïgon]&lt;br /&gt;
}}&lt;br /&gt;
'''Saïgon''' is a [[semi-untethered jailbreak]] for certain 64-bit devices, running iOS 10.2.1, developed by cheesecakeufo. Saïgon works by sideloading an IPA using [[Cydia Impactor]]. The first beta was released on {{date|2017|10|15}}. It was announced that support for [[iPhone 6s]] on iOS 10.3.1 would come in the future.&lt;br /&gt;
&lt;br /&gt;
Originally based on Adam Donenfeld’s ziVA exploit, Saïgon has been based on Siguza’s [[v0rtex]] exploit since beta 3.&lt;br /&gt;
&lt;br /&gt;
cheesecakeufo no longer provides updates for Saïgon, and has open-sourced the jailbreak on GitHub&amp;lt;ref&amp;gt;https://twitter.com/cheesecakeufo/status/948752448654635008&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
== Version Change Log ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Version&lt;br /&gt;
! Date&lt;br /&gt;
! Changes&lt;br /&gt;
|-&lt;br /&gt;
| beta 1&lt;br /&gt;
| {{date|2017|10|15}}&lt;br /&gt;
|&lt;br /&gt;
*Initial release with support for the following devices:&lt;br /&gt;
**[[iPhone 6]]&lt;br /&gt;
**[[iPhone 6 Plus]] (10.2.1)&lt;br /&gt;
**[[iPhone SE (1st generation)]] (10.2.1) (not tested)&lt;br /&gt;
**[[iPhone 6s]] (10.2.1) (not tested)&lt;br /&gt;
**[[J81AP|iPad Air 2 (Wi-Fi)]] (10.2.1) (not tested)&lt;br /&gt;
|-&lt;br /&gt;
| beta 2&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | {{date|2017|10|21}}&lt;br /&gt;
|&lt;br /&gt;
*Fix for camera not working after jailbreaking&lt;br /&gt;
*Support for [[iPhone 6s Plus]]/[[iPad mini 4]]/[[iPad Air 2]]&lt;br /&gt;
*Minor bug fixes and changes&lt;br /&gt;
*Slightly better at escaping sandbox&lt;br /&gt;
*Option to reinstall [[Cydia]] by holding 'jailbreak' button then tapping it again&lt;br /&gt;
*Display device model and version&lt;br /&gt;
|-&lt;br /&gt;
| beta 2 revision 1&lt;br /&gt;
|&lt;br /&gt;
*Disables Cydia stashing&lt;br /&gt;
*Add support for [[iPod touch (6th generation)]]&lt;br /&gt;
|-&lt;br /&gt;
| beta 3&lt;br /&gt;
| {{date|2017|12|10}}&lt;br /&gt;
|&lt;br /&gt;
*Significantly better success rate using new exploit (v0rtex)&lt;br /&gt;
*Support for more devices (not tested)&lt;br /&gt;
*Complete re-write of the application&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
* [[doubleH3lix]] a 64-bit counterpart&lt;br /&gt;
* [[Meridian]] &lt;br /&gt;
* [[v0rtex]]&lt;br /&gt;
* [https://web.archive.org/web/20180906063235/https://github.com/cheesecakeufo/saigon Source code on GitHub (Internet Archive)]&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Jailbreaks]]&lt;br /&gt;
[[Category:Jailbreaking]]&lt;/div&gt;</summary>
		<author><name>0x8FF</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Fugu15&amp;diff=125985</id>
		<title>Fugu15</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Fugu15&amp;diff=125985"/>
		<updated>2023-01-05T09:13:25Z</updated>

		<summary type="html">&lt;p&gt;0x8FF: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Infobox software&lt;br /&gt;
 | name                   = Fugu15&lt;br /&gt;
 | title                  = Fugu15&lt;br /&gt;
 | logo                   = [[File:Fugu15 icon.png|85px]]&lt;br /&gt;
 | developer              = [https://twitter.com/LinusHenze Linus Henze]&lt;br /&gt;
 | released               = {{Start date|2022|10|31|df=yes}}&lt;br /&gt;
 | operating system       = iOS&lt;br /&gt;
 | language               = English&lt;br /&gt;
 | genre                  = Jailbreaking&lt;br /&gt;
 | license                = [[wikipedia:MIT License|MIT License]]&lt;br /&gt;
 | website                = [https://github.com/pinauten/Fugu15 The GitHub page]&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
'''Fugu15''' is a [[semi-untethered jailbreak]] for iOS 15 (up to 15.4.1 or 15.5 beta 2&amp;lt;ref&amp;gt;https://appledb.dev/jailbreak/Fugu15.html&amp;lt;/ref&amp;gt;). Like [[Fugu14]], it only supports arm64e devices out of the box. It does not support tweak injection due to being a rootless jailbreak.&lt;br /&gt;
&lt;br /&gt;
It has been tested to work on the [[D331pAP|iPhone XS Max]], [[N104AP|iPhone 11]], [[D53gAP|iPhone 12]], [[D54pAP|iPhone 12 Pro Max]], and [[D17AP|iPhone 13]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;br /&gt;
[https://objectivebythesea.org/v5/talks/OBTS_v5_lHenze.pdf Slides Presented at Objective by the Sea v5]&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=aK0xPGMG0NI Video Presentation at Objective by the Sea v5]&lt;br /&gt;
[[Category:Jailbreaks]]&lt;br /&gt;
[[Category:Jailbreaking]]&lt;br /&gt;
{{stub|software}}&lt;/div&gt;</summary>
		<author><name>0x8FF</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Palera1n&amp;diff=125984</id>
		<title>Palera1n</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Palera1n&amp;diff=125984"/>
		<updated>2023-01-05T09:10:35Z</updated>

		<summary type="html">&lt;p&gt;0x8FF: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}&lt;br /&gt;
{{Infobox software&lt;br /&gt;
 | name                   = palera1n&lt;br /&gt;
 | title                  = palera1n&lt;br /&gt;
 | logo                   = [[File:palera1n logo.png|85px]]&lt;br /&gt;
 | developer              = [https://twitter.com/itsnebulalol Nebula]&amp;lt;br&amp;gt;[https://twitter.com/mineekdev Mineek]&amp;lt;br&amp;gt;[https://twitter.com/dedbeddedbed Nathan]&amp;lt;br&amp;gt;[https://twitter.com/riscv64 asdfugil]&amp;lt;br&amp;gt;[https://twitter.com/llsc121 llsc12]&amp;lt;br&amp;gt;[https://twitter.com/bestdevelopr Plooshi]&lt;br /&gt;
 | latest release version = 1.4.1&lt;br /&gt;
 | latest release date    = {{start date and age|2022|12|18}}&lt;br /&gt;
 | released               = &lt;br /&gt;
 | operating system       = [[wikipedia:macOS|macOS]]&amp;lt;br&amp;gt;[[wikipedia:Linux|Linux]]&lt;br /&gt;
 | language               = English&lt;br /&gt;
 | genre                  = Jailbreaking&lt;br /&gt;
 | license                = [[wikipedia:GNU General Public License#Version 3|GNU GPL v3]]&lt;br /&gt;
 | website                = [https://palera.in palera.in]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
'''palera1n''' is a jailbreak for iOS/iPadOS 15 and later on all devices vulnerable to the [[checkm8 Exploit]].&lt;br /&gt;
&lt;br /&gt;
== Compatibility ==&lt;br /&gt;
palera1n supports iOS/iPadOS 15.0 and later. It can jailbreak [[Semi-tethered jailbreak|semi-tethered]] with tweak injection on 15.0-15.3.1. On 15.4 and later, it can jailbreak semi-tethered without tweaks, [[Tethered jailbreak|tethered]] with tweaks, or semi-tethered with tweaks (this last option uses 5-10 GB of storage).&lt;br /&gt;
&lt;br /&gt;
On A10 and A11 devices, the passcode must be disabled while in the jailbroken state, and on A10 and A11 devices running iOS/iPadOS 16 and later, you can't jailbreak if you've ever set a passcode, which requires a reset to factory settings to fix.&lt;br /&gt;
&lt;br /&gt;
[[Category:Jailbreaks]]&lt;br /&gt;
[[Category:Jailbreaking]]&lt;br /&gt;
{{stub|software}}&lt;/div&gt;</summary>
		<author><name>0x8FF</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=User:0x8FF&amp;diff=125915</id>
		<title>User:0x8FF</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=User:0x8FF&amp;diff=125915"/>
		<updated>2022-12-09T07:19:02Z</updated>

		<summary type="html">&lt;p&gt;0x8FF: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I like trolling big corporations :P&lt;/div&gt;</summary>
		<author><name>0x8FF</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=User:0x8FF&amp;diff=125422</id>
		<title>User:0x8FF</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=User:0x8FF&amp;diff=125422"/>
		<updated>2022-09-26T06:52:04Z</updated>

		<summary type="html">&lt;p&gt;0x8FF: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;ligma&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
Website: https://0x8ff.net/&lt;br /&gt;
&lt;br /&gt;
GitHub: https://github.com/0x8ff/&lt;br /&gt;
&lt;br /&gt;
Twitter: https://twitter.com/0x8ff/&lt;/div&gt;</summary>
		<author><name>0x8FF</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=User:0x8FF&amp;diff=124132</id>
		<title>User:0x8FF</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=User:0x8FF&amp;diff=124132"/>
		<updated>2022-08-10T00:27:00Z</updated>

		<summary type="html">&lt;p&gt;0x8FF: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hobbyist hacker. Pwn da world!!&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
Website: https://0x8ff.net/&lt;br /&gt;
&lt;br /&gt;
GitHub: https://github.com/0x8ff/&lt;br /&gt;
&lt;br /&gt;
Twitter: https://twitter.com/0x8ff/&lt;/div&gt;</summary>
		<author><name>0x8FF</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=User:0x8FF&amp;diff=124131</id>
		<title>User:0x8FF</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=User:0x8FF&amp;diff=124131"/>
		<updated>2022-08-10T00:21:25Z</updated>

		<summary type="html">&lt;p&gt;0x8FF: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Pwn da world!! Or something.&lt;br /&gt;
&lt;br /&gt;
* Socials *&lt;br /&gt;
&lt;br /&gt;
GitHub: https://github.com/0x8ff/&lt;br /&gt;
Twitter: https://twitter.com/0x8ff/&lt;br /&gt;
Website: https://0x8ff.net/&lt;/div&gt;</summary>
		<author><name>0x8FF</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=User:0x8FF&amp;diff=123588</id>
		<title>User:0x8FF</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=User:0x8FF&amp;diff=123588"/>
		<updated>2022-07-07T22:52:52Z</updated>

		<summary type="html">&lt;p&gt;0x8FF: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I have a Twitter:&lt;br /&gt;
&lt;br /&gt;
https://twitter.com/0x8ff/&lt;/div&gt;</summary>
		<author><name>0x8FF</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=122336</id>
		<title>Jailbreak Exploits</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=122336"/>
		<updated>2022-05-01T04:17:58Z</updated>

		<summary type="html">&lt;p&gt;0x8FF: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists the '''exploits''' used in [[jailbreak]]s.&lt;br /&gt;
&lt;br /&gt;
== Common exploits ==&lt;br /&gt;
These exploits are not dependent on any firmware; as such, they are used in numerous jailbreaking programs.&lt;br /&gt;
&lt;br /&gt;
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[M68AP|iPhone]], [[N45AP|iPod touch]], and [[N82AP|iPhone 3G]])&lt;br /&gt;
* [[ARM7 Go]] (from iOS 2.1.1) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
* [[0x24000 Segment Overflow]] (for [[untethered jailbreak]] on [[N88AP|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]] and [[N72AP|iPod touch (2nd generation)]] with [[Bootrom 240.4|old bootrom]]; another exploit as the [[limera1n Exploit]] is required)&lt;br /&gt;
* [[limera1n Exploit]] (for [[tethered jailbreak]] on [[N88AP|iPhone 3GS]], [[N18AP|iPod touch (3rd generation)]], [[K48AP|iPad]], [[iPhone 4]], [[N81AP|iPod touch (4th generation)]] and [[K66AP|Apple TV (2nd generation)]])&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (also known as &amp;quot;steaks4uce&amp;quot;) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
&lt;br /&gt;
== Jailbreak Programs ==&lt;br /&gt;
=== [[PwnageTool]] (2.0 - 5.1.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[redsn0w]] (3.0 - 6.0) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the same exploits as [[Absinthe|Absinthe]] and [[Absinthe|Absinthe 2.0]] to jailbreak iOS 5.0/5.0.1 and 5.1.1&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[sn0wbreeze]] (3.1.3 - 6.1.3) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 6.1.2&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 1.x ==&lt;br /&gt;
=== [[AppTapp Installer]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[iBrickr]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[AppSnapp]]/[[JailbreakMe|JailbreakMe 1.0]] (1.0 / 1.0.1 / 1.0.2 / 1.1.1) ===&lt;br /&gt;
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) ({{cve|2006-3459}})&lt;br /&gt;
&lt;br /&gt;
=== [[mknod|OktoPrep]] (1.1.2) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.2 from a jailbroken 1.1.1&lt;br /&gt;
* [[mknod]]&lt;br /&gt;
&lt;br /&gt;
=== [[Soft Upgrade]] (1.1.3) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.3 from a running jailbroken 1.1.2&lt;br /&gt;
&lt;br /&gt;
=== [[ZiPhone]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
&lt;br /&gt;
=== [[iLiberty+|iLiberty / iLiberty+]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 2.x ==&lt;br /&gt;
=== [[QuickPwn]] (2.0 - 2.2.1) ===&lt;br /&gt;
* uses [[Pwnage]] and [[Pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
=== [[Redsn0w Lite]] (2.1.1) ===&lt;br /&gt;
* [[ARM7 Go]] (for [[N72AP|iPod touch (2nd generation)]] only)&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 3.x ==&lt;br /&gt;
=== [[purplera1n]] (3.0) ===&lt;br /&gt;
* [[iBoot Environment Variable Overflow]] ({{cve|2009-2795}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[blackra1n]] (3.1 / 3.1.1 / 3.1.2) ===&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]] ({{cve|2010-0038}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Spirit]] (3.1.2 / 3.1.3 / 3.2) ===&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[BPF_STX Kernel Write Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (3.1.2 / 3.1.3 / 3.2 / 3.2.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] / [[greenpois0n (jailbreak)|greenpois0n]] (3.2.2) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 4.x ==&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (4.0 / 4.0.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] (4.0 / 4.0.1 / 4.0.2 / 4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.2.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.2.6 / 4.2.7 / 4.2.8) ===&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.2.6 - 4.2.10) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.3 / 4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
Except for the [[N18AP|iPod touch (3rd generation)]] on iOS 4.3.1.&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[IOMobileFrameBuffer Privilege Escalation Exploit]] ({{cve|2011-0227}})&lt;br /&gt;
&lt;br /&gt;
=== i0nic's Untether (4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
used in [[redsn0w]] to untether iOS 4.3.1 / 4.3.2 / 4.3.3&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.3 - 4.3.5) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 5.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe]] (5.0 on [[N94AP|iPhone 4S]] only / 5.0.1 on [[iPad 2]] and [[iPhone 4S]])  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}}) (used both for payload injection and untether)&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Corona|Corona Untether]] (5.0.1)  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}})&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe|Absinthe 2.0]] and [[Rocky Racoon|Rocky Racoon Untether]] (5.1.1) ===&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* Racoon DNS4/WINS4 table buffer overflow ({{cve|2012-3727}})&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (5.0-5.1.1) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 6.x ==&lt;br /&gt;
=== [[evasi0n]] (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2)  ===&lt;br /&gt;
* [[Symbolic Link Vulnerability]]&lt;br /&gt;
* [[Timezone Vulnerability]] ({{cve|2013-0979}})&lt;br /&gt;
* [[Shebang Trick]] ({{cve|2013-5154}})&lt;br /&gt;
* [[AMFID code signing evasion]]&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[IOUSBDeviceFamily Vulnerability]] ({{cve|2013-0981}})&lt;br /&gt;
* [[ARM Exception Vector Info Leak]] ({{cve|2013-0978}})&lt;br /&gt;
* [[dynamic memmove() locating]]&lt;br /&gt;
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]&lt;br /&gt;
* [[kernel memory write via ROP gadget]]&lt;br /&gt;
* [[Overlapping Segment Attack]] ({{cve|2013-0977}})&lt;br /&gt;
&lt;br /&gt;
=== [[p0sixspwn]] (6.1.3 / 6.1.4 / 6.1.5 / 6.1.6) ===&lt;br /&gt;
* [[posix_spawn kernel information leak]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[posix_spawn kernel exploit]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[mach_msg_ool_descriptor_ts for heap shaping]] ({{cve|2013-3953}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 7.x ==&lt;br /&gt;
=== [[evasi0n7]] (7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6) ===&lt;br /&gt;
{{Section Stub}}&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-5133}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* CrashHouseKeeping chmod vulnerability ({{cve|2014-1272}})&lt;br /&gt;
* ptmx_get_ioctl ioctl crafted call ({{cve|2014-1278}})&lt;br /&gt;
&lt;br /&gt;
=== [[Geeksn0w]] (7.1 / 7.1.1) ===&lt;br /&gt;
* [[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) (Pangu v1.0.0)&lt;br /&gt;
* AppleKeyStore::initUserClient info leak ({{cve|2014-4407}}) (Pangu &amp;gt;v1.0.0)&lt;br /&gt;
* break_early_random (by [[i0n1c]] and Tarjei Mandt of Azimuth) ({{cve|2014-4422}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOSharedDataQueue notification port overwrite ({{cve|2014-4461}})&lt;br /&gt;
* &amp;quot;syslogd chown&amp;quot; vulnerability&lt;br /&gt;
* enterprise certificate (no real exploit, used for initial &amp;quot;unsigned&amp;quot; code execution)&lt;br /&gt;
* &amp;quot;foo_extracted&amp;quot; symlink vulnerability (used to write to /var) ({{cve|2014-4386}})&lt;br /&gt;
* /tmp/bigfile (a big file for improvement of the reliability of a race condition)&lt;br /&gt;
* VoIP backgrounding trick (used to auto restart the app)&lt;br /&gt;
* hidden segment attack&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 8.x ==&lt;br /&gt;
=== [[Pangu8]] (8.0 / 8.0.1 / 8.0.2 / 8.1) ===&lt;br /&gt;
* an exploit for a bug in /usr/libexec/neagent (source @iH8sn0w)&lt;br /&gt;
* enterprise certificate (inside the IPA)&lt;br /&gt;
* a kind of dylib injection into a system process (see IPA)&lt;br /&gt;
* a dmg mount command (looks like the Developer DMG) (syslog while jailbreaking)&lt;br /&gt;
* a sandboxing problem in debugserver ({{cve|2014-4457}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* the same kernel exploit as used in [[Pangu|the first Pangu]] ({{cve|2014-4461}}) (source @iH8sn0w) - now used to also leak kernel memory (source @Morpheus______)&lt;br /&gt;
* enable-dylibs-to-override-cache&lt;br /&gt;
* a new ovelapping segment attack ({{cve|2014-4455}})&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) ===&lt;br /&gt;
(See also details at [http://newosxbook.com/articles/TaiG.html newosxbook.com])&lt;br /&gt;
* A new AFC symlink attack ({{cve|2014-4480}}) - to get onto the device filesystem&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]], also used in p0sixspwn) - to mount a fake DDI and instantly overwrite (via union) libmis/xpcd_cache&lt;br /&gt;
* A new overlapping segment attack [in a modified version], dyld, ({{cve|2014-4455}}) - negative LC_SEGMENT - to allow libmis and xpcdcache to load&lt;br /&gt;
* libmis redirection of MISValidateSignature (as per evasion) to kCFEqual, with overlapping segment variant on TaiG (Segment at end of file, negative)&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis/xpcd_cache)&lt;br /&gt;
* MobileStorageMounter exploit ({{cve|2015-1062}})&lt;br /&gt;
* Backup exploit used to access restricted parts of the filesystem ({{cve|2015-1087}})&lt;br /&gt;
&lt;br /&gt;
Kernel:&lt;br /&gt;
&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) - leaks slid addresses&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOHIDFamily Kernel exploit ({{cve|2014-4487}}) - to overwrite memory&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.1.3 / 8.2 / 8.3 / 8.4) ===&lt;br /&gt;
(See also details at http://newosxbook.com/articles/28DaysLater.html and http://newosxbook.com/articles/HIDeAndSeek.html)&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (also used in TaiG for 8.0-8.1.2 but modified) - to mount a fake DDI&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis)&lt;br /&gt;
* Symbolic linking to AFC ({{cve|2015-5746}})&lt;br /&gt;
* Backup exploit to write to protected regions of the disk ({{cve|2015-5752}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3802}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3803}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3805}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3806}})&lt;br /&gt;
* IOHIDFamily exploit ({{cve|2015-5774}})&lt;br /&gt;
* Air Traffic exploit to allow attackers to access arbitrary filesystem locations via vectors related to asset handling ({{cve|2015-5766}})&lt;br /&gt;
&lt;br /&gt;
=== [[EtasonJB]] and [[Home Depot]] (8.4.1) === &lt;br /&gt;
&lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 9.x ==&lt;br /&gt;
=== [[Pangu9]] (9.0 / 9.0.1 / 9.0.2 / 9.1) ===&lt;br /&gt;
* Photos exploit to gain arbitrary unsandboxed file system access as mobile to load outdated DDI. ({{cve|2015-7037}})&lt;br /&gt;
* MobileStorageMounter allowed older DeveloperDiskImages to be mounted, resulting in unsandboxed unsigned code execution due to known weaknesses in entitled executables.  ({{cve|2015-7051}})&lt;br /&gt;
* IOHIDFamily Use-After-Free for kernel information leak / code execution as mobile. ({{cve|2015-6974}})&lt;br /&gt;
* dyld exploit in dyld shared cache handling to override MISValidateSignature in libmis.dylib for persistency ({{cve|2015-7079}})&lt;br /&gt;
* Racing KPP for some of the patches.&lt;br /&gt;
* AMFI MAC Hooks were in non-__const __DATA section, so wouldn't be integrity checked by KPP, allowing to replace MAC hooks required for code-signing. ({{cve|2015-7055}})&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu9]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* IOMobileFrameBuffer exploit to execute arbitrary code with kernel privileges. ({{cve|2016-4654}})&lt;br /&gt;
&lt;br /&gt;
=== [[jbme]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Home Depot]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
=== [[JailbreakMe 4.0]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Phœnix]] (9.3.5 / 9.3.6) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* mach_port_register Kernel exploit ({{cve|2016-4669}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 10.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[extra_recipe+yaluX]] (10.0-10.1.1) ===&lt;br /&gt;
&lt;br /&gt;
* set_dp_control_port exploit to execute arbitrary code with kernel privileges. ({{cve|2016-7644}})&lt;br /&gt;
&lt;br /&gt;
=== [[yalu102]] (10.0.1-10.2) ===&lt;br /&gt;
&lt;br /&gt;
* mach_voucher_extract_attr_recipe_trap memory corruption. ({{cve|2017-2370}})&lt;br /&gt;
&lt;br /&gt;
=== [[doubleH3lix]] (10.0.1 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[Meridian]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[TotallyNotSpyware]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
* WebKit JIT optimization bug exploit ({{cve|2018-4233}})&lt;br /&gt;
&lt;br /&gt;
=== [[H3lix]] (10.0.1 - 10.3.4) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 11.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2 &lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
===[[Electra]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* v1ntex ({{cve|2019-6225}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 12.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Chimera]] (12.0 - 12.5.3)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* SockPuppet ({{cve|2019-8605}})&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (12.0 - 12.5.3)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* SockPuppet ({{cve|2019-8605}})&lt;br /&gt;
&lt;br /&gt;
12.4.1&lt;br /&gt;
&lt;br /&gt;
* AppleAVE2Driver exploit ({{cve|2019-8795}})&lt;br /&gt;
* AppleSPUProfileDriver information leak ({{cve|2019-8794}})&lt;br /&gt;
&lt;br /&gt;
12.4.2 - 12.5.3&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
* cuck00 information leak ({{cve|2020-3836}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (12.3 - 12.5.3)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 13.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (13.0 - 13.5.5~b1 (excluding 13.5.1))===&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.3 (before version 5.0.0)&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
* cuck00 information leak ({{cve|2020-3836}})&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.5.5~b1 (excluding 13.5.1) (since version 5.0.0)&lt;br /&gt;
&lt;br /&gt;
* tachy0n (LightSpeed) ({{cve|2020-9859}})&lt;br /&gt;
&lt;br /&gt;
===[[Odyssey]] (13.0 - 13.7)===&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.5&lt;br /&gt;
&lt;br /&gt;
* tardy0n (LightSpeed) ({{cve|2020-9859}})&lt;br /&gt;
&lt;br /&gt;
13.5.1 - 13.7 (for devices with SoCs other than the A8 and A9)&lt;br /&gt;
&lt;br /&gt;
* FreeTheSandbox_LPE_POC_13.7&lt;br /&gt;
&lt;br /&gt;
13.5.1 - 13.7 (for devices with A8/A9 SoCs)&lt;br /&gt;
&lt;br /&gt;
* oob_events ({{cve|2020-27905}}), ({{cve|2020-9964}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (13.0 - 13.7)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 14.x ==&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (14.0 - 14.8.1)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (14.0 - 14.8)===&lt;br /&gt;
&lt;br /&gt;
* ivac entry use-after-free ({{cve|2021-1782}})&lt;br /&gt;
* pattern-f's closed source exploit ({{cve|2021-30883}})&lt;br /&gt;
&lt;br /&gt;
===[[Taurine]] (14.0 - 14.3)===&lt;br /&gt;
&lt;br /&gt;
* cicuta_virosa ({{cve|2021-1782}})&lt;/div&gt;</summary>
		<author><name>0x8FF</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=122335</id>
		<title>Jailbreak Exploits</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=122335"/>
		<updated>2022-05-01T04:16:21Z</updated>

		<summary type="html">&lt;p&gt;0x8FF: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists the '''exploits''' used in [[jailbreak]]s.&lt;br /&gt;
&lt;br /&gt;
== Common exploits ==&lt;br /&gt;
These exploits are not dependent on any firmware; as such, they are used in numerous jailbreaking programs.&lt;br /&gt;
&lt;br /&gt;
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[M68AP|iPhone]], [[N45AP|iPod touch]], and [[N82AP|iPhone 3G]])&lt;br /&gt;
* [[ARM7 Go]] (from iOS 2.1.1) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
* [[0x24000 Segment Overflow]] (for [[untethered jailbreak]] on [[N88AP|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]] and [[N72AP|iPod touch (2nd generation)]] with [[Bootrom 240.4|old bootrom]]; another exploit as the [[limera1n Exploit]] is required)&lt;br /&gt;
* [[limera1n Exploit]] (for [[tethered jailbreak]] on [[N88AP|iPhone 3GS]], [[N18AP|iPod touch (3rd generation)]], [[K48AP|iPad]], [[iPhone 4]], [[N81AP|iPod touch (4th generation)]] and [[K66AP|Apple TV (2nd generation)]])&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (also known as &amp;quot;steaks4uce&amp;quot;) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
&lt;br /&gt;
== Jailbreak Programs ==&lt;br /&gt;
=== [[PwnageTool]] (2.0 - 5.1.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[redsn0w]] (3.0 - 6.0) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the same exploits as [[Absinthe|Absinthe]] and [[Absinthe|Absinthe 2.0]] to jailbreak iOS 5.0/5.0.1 and 5.1.1&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[sn0wbreeze]] (3.1.3 - 6.1.3) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 6.1.2&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 1.x ==&lt;br /&gt;
=== [[AppTapp Installer]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[iBrickr]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[AppSnapp]]/[[JailbreakMe|JailbreakMe 1.0]] (1.0 / 1.0.1 / 1.0.2 / 1.1.1) ===&lt;br /&gt;
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) ({{cve|2006-3459}})&lt;br /&gt;
&lt;br /&gt;
=== [[mknod|OktoPrep]] (1.1.2) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.2 from a jailbroken 1.1.1&lt;br /&gt;
* [[mknod]]&lt;br /&gt;
&lt;br /&gt;
=== [[Soft Upgrade]] (1.1.3) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.3 from a running jailbroken 1.1.2&lt;br /&gt;
&lt;br /&gt;
=== [[ZiPhone]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
&lt;br /&gt;
=== [[iLiberty+|iLiberty / iLiberty+]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 2.x ==&lt;br /&gt;
=== [[QuickPwn]] (2.0 - 2.2.1) ===&lt;br /&gt;
* uses [[Pwnage]] and [[Pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
=== [[Redsn0w Lite]] (2.1.1) ===&lt;br /&gt;
* [[ARM7 Go]] (for [[N72AP|iPod touch (2nd generation)]] only)&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 3.x ==&lt;br /&gt;
=== [[purplera1n]] (3.0) ===&lt;br /&gt;
* [[iBoot Environment Variable Overflow]] ({{cve|2009-2795}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[blackra1n]] (3.1 / 3.1.1 / 3.1.2) ===&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]] ({{cve|2010-0038}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Spirit]] (3.1.2 / 3.1.3 / 3.2) ===&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[BPF_STX Kernel Write Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (3.1.2 / 3.1.3 / 3.2 / 3.2.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] / [[greenpois0n (jailbreak)|greenpois0n]] (3.2.2) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 4.x ==&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (4.0 / 4.0.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] (4.0 / 4.0.1 / 4.0.2 / 4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.2.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.2.6 / 4.2.7 / 4.2.8) ===&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.2.6 - 4.2.10) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.3 / 4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
Except for the [[N18AP|iPod touch (3rd generation)]] on iOS 4.3.1.&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[IOMobileFrameBuffer Privilege Escalation Exploit]] ({{cve|2011-0227}})&lt;br /&gt;
&lt;br /&gt;
=== i0nic's Untether (4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
used in [[redsn0w]] to untether iOS 4.3.1 / 4.3.2 / 4.3.3&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.3 - 4.3.5) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 5.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe]] (5.0 on [[N94AP|iPhone 4S]] only / 5.0.1 on [[iPad 2]] and [[iPhone 4S]])  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}}) (used both for payload injection and untether)&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Corona|Corona Untether]] (5.0.1)  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}})&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe|Absinthe 2.0]] and [[Rocky Racoon|Rocky Racoon Untether]] (5.1.1) ===&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* Racoon DNS4/WINS4 table buffer overflow ({{cve|2012-3727}})&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (5.0-5.1.1) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 6.x ==&lt;br /&gt;
=== [[evasi0n]] (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2)  ===&lt;br /&gt;
* [[Symbolic Link Vulnerability]]&lt;br /&gt;
* [[Timezone Vulnerability]] ({{cve|2013-0979}})&lt;br /&gt;
* [[Shebang Trick]] ({{cve|2013-5154}})&lt;br /&gt;
* [[AMFID code signing evasion]]&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[IOUSBDeviceFamily Vulnerability]] ({{cve|2013-0981}})&lt;br /&gt;
* [[ARM Exception Vector Info Leak]] ({{cve|2013-0978}})&lt;br /&gt;
* [[dynamic memmove() locating]]&lt;br /&gt;
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]&lt;br /&gt;
* [[kernel memory write via ROP gadget]]&lt;br /&gt;
* [[Overlapping Segment Attack]] ({{cve|2013-0977}})&lt;br /&gt;
&lt;br /&gt;
=== [[p0sixspwn]] (6.1.3 / 6.1.4 / 6.1.5 / 6.1.6) ===&lt;br /&gt;
* [[posix_spawn kernel information leak]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[posix_spawn kernel exploit]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[mach_msg_ool_descriptor_ts for heap shaping]] ({{cve|2013-3953}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 7.x ==&lt;br /&gt;
=== [[evasi0n7]] (7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6) ===&lt;br /&gt;
{{Section Stub}}&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-5133}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* CrashHouseKeeping chmod vulnerability ({{cve|2014-1272}})&lt;br /&gt;
* ptmx_get_ioctl ioctl crafted call ({{cve|2014-1278}})&lt;br /&gt;
&lt;br /&gt;
=== [[Geeksn0w]] (7.1 / 7.1.1) ===&lt;br /&gt;
* [[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) (Pangu v1.0.0)&lt;br /&gt;
* AppleKeyStore::initUserClient info leak ({{cve|2014-4407}}) (Pangu &amp;gt;v1.0.0)&lt;br /&gt;
* break_early_random (by [[i0n1c]] and Tarjei Mandt of Azimuth) ({{cve|2014-4422}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOSharedDataQueue notification port overwrite ({{cve|2014-4461}})&lt;br /&gt;
* &amp;quot;syslogd chown&amp;quot; vulnerability&lt;br /&gt;
* enterprise certificate (no real exploit, used for initial &amp;quot;unsigned&amp;quot; code execution)&lt;br /&gt;
* &amp;quot;foo_extracted&amp;quot; symlink vulnerability (used to write to /var) ({{cve|2014-4386}})&lt;br /&gt;
* /tmp/bigfile (a big file for improvement of the reliability of a race condition)&lt;br /&gt;
* VoIP backgrounding trick (used to auto restart the app)&lt;br /&gt;
* hidden segment attack&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 8.x ==&lt;br /&gt;
=== [[Pangu8]] (8.0 / 8.0.1 / 8.0.2 / 8.1) ===&lt;br /&gt;
* an exploit for a bug in /usr/libexec/neagent (source @iH8sn0w)&lt;br /&gt;
* enterprise certificate (inside the IPA)&lt;br /&gt;
* a kind of dylib injection into a system process (see IPA)&lt;br /&gt;
* a dmg mount command (looks like the Developer DMG) (syslog while jailbreaking)&lt;br /&gt;
* a sandboxing problem in debugserver ({{cve|2014-4457}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* the same kernel exploit as used in [[Pangu|the first Pangu]] ({{cve|2014-4461}}) (source @iH8sn0w) - now used to also leak kernel memory (source @Morpheus______)&lt;br /&gt;
* enable-dylibs-to-override-cache&lt;br /&gt;
* a new ovelapping segment attack ({{cve|2014-4455}})&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) ===&lt;br /&gt;
(See also details at [http://newosxbook.com/articles/TaiG.html newosxbook.com])&lt;br /&gt;
* A new AFC symlink attack ({{cve|2014-4480}}) - to get onto the device filesystem&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]], also used in p0sixspwn) - to mount a fake DDI and instantly overwrite (via union) libmis/xpcd_cache&lt;br /&gt;
* A new overlapping segment attack [in a modified version], dyld, ({{cve|2014-4455}}) - negative LC_SEGMENT - to allow libmis and xpcdcache to load&lt;br /&gt;
* libmis redirection of MISValidateSignature (as per evasion) to kCFEqual, with overlapping segment variant on TaiG (Segment at end of file, negative)&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis/xpcd_cache)&lt;br /&gt;
* MobileStorageMounter exploit ({{cve|2015-1062}})&lt;br /&gt;
* Backup exploit used to access restricted parts of the filesystem ({{cve|2015-1087}})&lt;br /&gt;
&lt;br /&gt;
Kernel:&lt;br /&gt;
&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) - leaks slid addresses&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOHIDFamily Kernel exploit ({{cve|2014-4487}}) - to overwrite memory&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.1.3 / 8.2 / 8.3 / 8.4) ===&lt;br /&gt;
(See also details at http://newosxbook.com/articles/28DaysLater.html and http://newosxbook.com/articles/HIDeAndSeek.html)&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (also used in TaiG for 8.0-8.1.2 but modified) - to mount a fake DDI&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis)&lt;br /&gt;
* Symbolic linking to AFC ({{cve|2015-5746}})&lt;br /&gt;
* Backup exploit to write to protected regions of the disk ({{cve|2015-5752}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3802}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3803}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3805}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3806}})&lt;br /&gt;
* IOHIDFamily exploit ({{cve|2015-5774}})&lt;br /&gt;
* Air Traffic exploit to allow attackers to access arbitrary filesystem locations via vectors related to asset handling ({{cve|2015-5766}})&lt;br /&gt;
&lt;br /&gt;
=== [[EtasonJB]] and [[Home Depot]] (8.4.1) === &lt;br /&gt;
&lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 9.x ==&lt;br /&gt;
=== [[Pangu9]] (9.0 / 9.0.1 / 9.0.2 / 9.1) ===&lt;br /&gt;
* Photos exploit to gain arbitrary unsandboxed file system access as mobile to load outdated DDI. ({{cve|2015-7037}})&lt;br /&gt;
* MobileStorageMounter allowed older DeveloperDiskImages to be mounted, resulting in unsandboxed unsigned code execution due to known weaknesses in entitled executables.  ({{cve|2015-7051}})&lt;br /&gt;
* IOHIDFamily Use-After-Free for kernel information leak / code execution as mobile. ({{cve|2015-6974}})&lt;br /&gt;
* dyld exploit in dyld shared cache handling to override MISValidateSignature in libmis.dylib for persistency ({{cve|2015-7079}})&lt;br /&gt;
* Racing KPP for some of the patches.&lt;br /&gt;
* AMFI MAC Hooks were in non-__const __DATA section, so wouldn't be integrity checked by KPP, allowing to replace MAC hooks required for code-signing. ({{cve|2015-7055}})&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu9]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* IOMobileFrameBuffer exploit to execute arbitrary code with kernel privileges. ({{cve|2016-4654}})&lt;br /&gt;
&lt;br /&gt;
=== [[jbme]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Home Depot]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
=== [[JailbreakMe 4.0]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Phœnix]] (9.3.5 / 9.3.6) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* mach_port_register Kernel exploit ({{cve|2016-4669}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 10.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[extra_recipe+yaluX]] (10.0-10.1.1) ===&lt;br /&gt;
&lt;br /&gt;
* set_dp_control_port exploit to execute arbitrary code with kernel privileges. ({{cve|2016-7644}})&lt;br /&gt;
&lt;br /&gt;
=== [[yalu102]] (10.0.1-10.2) ===&lt;br /&gt;
&lt;br /&gt;
* mach_voucher_extract_attr_recipe_trap memory corruption. ({{cve|2017-2370}})&lt;br /&gt;
&lt;br /&gt;
=== [[doubleH3lix]] (10.0.1 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[Meridian]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[TotallyNotSpyware]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
* WebKit JIT optimization bug exploit ({{cve|2018-4233}})&lt;br /&gt;
&lt;br /&gt;
=== [[H3lix]] (10.0.1 - 10.3.4) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 11.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2 &lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
===[[Electra]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* v1ntex ({{cve|2019-6225}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 12.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Chimera]] (12.0 - 12.5.3)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* SockPuppet ({{cve|2019-8605}})&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (12.0 - 12.5.3)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* SockPuppet ({{cve|2019-8605}})&lt;br /&gt;
&lt;br /&gt;
12.4.1&lt;br /&gt;
&lt;br /&gt;
* AppleAVE2Driver exploit ({{cve|2019-8795}})&lt;br /&gt;
* AppleSPUProfileDriver information leak ({{cve|2019-8794}})&lt;br /&gt;
&lt;br /&gt;
12.4.2 - 12.5.3&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
* cuck00 information leak ({{cve|2020-3836}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (12.3 - 12.5.3)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 13.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (13.0 - 13.5.5~b1 (excluding 13.5.1))===&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.3 (before version 5.0.0)&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
* cuck00 information leak ({{cve|2020-3836}})&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.5.5~b1 (excluding 13.5.1) (since version 5.0.0)&lt;br /&gt;
&lt;br /&gt;
* tachy0n (LightSpeed) ({{cve|2020-9859}})&lt;br /&gt;
&lt;br /&gt;
===[[Odyssey]] (13.0 - 13.7)===&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.5&lt;br /&gt;
&lt;br /&gt;
* tardy0n (LightSpeed) ({{cve|2020-9859}})&lt;br /&gt;
&lt;br /&gt;
13.5.1 - 13.7 (for devices with SoCs other than the A8 and A9)&lt;br /&gt;
&lt;br /&gt;
* FreeTheSandbox_LPE_POC_13.7&lt;br /&gt;
&lt;br /&gt;
13.5.1 - 13.7 (for devices with A8/A9 SoCs)&lt;br /&gt;
&lt;br /&gt;
* oob_events ({{cve|2020-27905}}), ({{cve|2020-9964}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (13.0 - 13.7)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 14.x ==&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (14.0 - 14.8.1)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
===[[unc0ver]] (14.0 - 14.8)===&lt;br /&gt;
&lt;br /&gt;
* ivac entry use-after-free ({{cve|2021-1782}})&lt;br /&gt;
* pattern-f's closed source exploit ({{cve|2021-30883}})&lt;br /&gt;
&lt;br /&gt;
===[[Taurine]] (14.0 - 14.3)===&lt;br /&gt;
&lt;br /&gt;
* cicuta_virosa ({{cve|2021-1782}})&lt;/div&gt;</summary>
		<author><name>0x8FF</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=User:0x8FF&amp;diff=121856</id>
		<title>User:0x8FF</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=User:0x8FF&amp;diff=121856"/>
		<updated>2022-03-19T21:11:27Z</updated>

		<summary type="html">&lt;p&gt;0x8FF: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I am also known as shulkk.&lt;br /&gt;
&lt;br /&gt;
Twitter:&lt;br /&gt;
https://twitter.com/_shulkk&lt;/div&gt;</summary>
		<author><name>0x8FF</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=User:0x8FF&amp;diff=121855</id>
		<title>User:0x8FF</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=User:0x8FF&amp;diff=121855"/>
		<updated>2022-03-19T21:11:10Z</updated>

		<summary type="html">&lt;p&gt;0x8FF: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Hello World'''&lt;br /&gt;
I am also known as shulkk.&lt;br /&gt;
&lt;br /&gt;
Twitter:&lt;br /&gt;
https://twitter.com/_shulkk&lt;/div&gt;</summary>
		<author><name>0x8FF</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=User:0x8FF&amp;diff=121602</id>
		<title>User:0x8FF</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=User:0x8FF&amp;diff=121602"/>
		<updated>2022-03-08T03:56:04Z</updated>

		<summary type="html">&lt;p&gt;0x8FF: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hello World!&lt;br /&gt;
&lt;br /&gt;
twitter.com/0x8FF&lt;br /&gt;
github.com/0x8FF&lt;/div&gt;</summary>
		<author><name>0x8FF</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Sileo&amp;diff=121567</id>
		<title>Sileo</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Sileo&amp;diff=121567"/>
		<updated>2022-03-04T05:03:25Z</updated>

		<summary type="html">&lt;p&gt;0x8FF: Remove Broken BigBoss Hyperlink and More&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Sileo''' is an open source software installer created by Sileo Team ([https://www.twitter.com/cstar_ow CoolStar], [https://www.twitter.com/aesign_ Alessandro Chiarlitti] and [https://www.twitter.com/kabiroberai Kabir Oberai]) that uses the Debian [[APT]] system for package management. &lt;br /&gt;
&lt;br /&gt;
Sileo, which supports all devices (except [[List of Apple Watches|Apple Watches]]) running iPhone/Apple TV tvOS 11 - iOS 12.4 on [[Electra]] and [[Chimera]] jailbreaks. &lt;br /&gt;
&lt;br /&gt;
By default, Sileo includes the third party repos such as: BigBoss, Chariz, Chimera (or Electra, depending on the jailbreak tool), Dynastic and Packix.&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [[Sileo Errors]]&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [https://getsileo.app/ Sileo website]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Software]]&lt;br /&gt;
[[Category:Application]]&lt;br /&gt;
[[Category:Jailbreaking]]&lt;br /&gt;
[[Category:Package Manager]]&lt;/div&gt;</summary>
		<author><name>0x8FF</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Sileo&amp;diff=121478</id>
		<title>Sileo</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Sileo&amp;diff=121478"/>
		<updated>2022-03-02T00:48:44Z</updated>

		<summary type="html">&lt;p&gt;0x8FF: Added a few words.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Sileo''' is an open source software installer created by Sileo Team ([https://www.twitter.com/cstar_ow CoolStar], [https://www.twitter.com/aesign_ Alessandro Chiarlitti] and [https://www.twitter.com/kabiroberai Kabir Oberai]) that uses the Debian [[APT]] system for package management. &lt;br /&gt;
&lt;br /&gt;
Sileo, which supports all devices (except [[List of Apple Watches|Apple Watches]]) running iPhone/Apple TV tvOS 11 - iOS 12.4 on [[Electra]] and [[Chimera]] jailbreaks. &lt;br /&gt;
&lt;br /&gt;
By default, Sileo includes the third party repos [[BigBoss]], Chariz, Chimera (or Electra, depending on the jailbreak tool), Dynastic and Packix.&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [[Sileo Errors]]&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [https://getsileo.app/ Sileo website]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Software]]&lt;br /&gt;
[[Category:Application]]&lt;br /&gt;
[[Category:Jailbreaking]]&lt;br /&gt;
[[Category:Package Manager]]&lt;/div&gt;</summary>
		<author><name>0x8FF</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=User:0x8FF&amp;diff=121477</id>
		<title>User:0x8FF</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=User:0x8FF&amp;diff=121477"/>
		<updated>2022-03-02T00:24:55Z</updated>

		<summary type="html">&lt;p&gt;0x8FF: Created page with &amp;quot;d2h5IGRpZCB5b3UgZXZlbiBib3RoZXI=&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;d2h5IGRpZCB5b3UgZXZlbiBib3RoZXI=&lt;/div&gt;</summary>
		<author><name>0x8FF</name></author>
		
	</entry>
</feed>