<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=ClaytonBraasch</id>
	<title>The iPhone Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=ClaytonBraasch"/>
	<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/wiki/Special:Contributions/ClaytonBraasch"/>
	<updated>2026-04-17T00:38:15Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.14</generator>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=User:Planetbeing&amp;diff=15781</id>
		<title>User:Planetbeing</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=User:Planetbeing&amp;diff=15781"/>
		<updated>2011-02-02T06:41:27Z</updated>

		<summary type="html">&lt;p&gt;ClaytonBraasch: Yiduo is planetbeing's &amp;quot;real&amp;quot; first name.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Planetbeing, whose real name is Yiduo David Wang, is one of the &amp;quot;core&amp;quot; [[iPhone Dev Team]] members. In contrast to [[User:MuscleNerd|MuscleNerd]], planetbeing is mainly focused on jailbreaking.&lt;br /&gt;
&lt;br /&gt;
[http://www.twitter.com/planetbeing planetbeing on Twitter]&lt;br /&gt;
&lt;br /&gt;
[[Category:Hackers]]&lt;/div&gt;</summary>
		<author><name>ClaytonBraasch</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Baseband_Commands&amp;diff=15679</id>
		<title>Baseband Commands</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Baseband_Commands&amp;diff=15679"/>
		<updated>2011-02-01T17:56:39Z</updated>

		<summary type="html">&lt;p&gt;ClaytonBraasch: New way to use Minicom added.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==About==&lt;br /&gt;
In this page, you'll find some Baseband Commands. You can use them with Minicom 2.2, that can be found on Cydia.&lt;br /&gt;
&lt;br /&gt;
==Setting up Minicom 2.2==&lt;br /&gt;
# After installing Minicom from Cydia, make sure the folder /usr/etc exists. SSH into your iPhone and then, type: ''minicom -s''.&lt;br /&gt;
# Now, select ''Serial Port Setup'' in the Menu and press Enter. Then, press &amp;quot;a&amp;quot; and set Serial Device to ''/dev/tty.debug'' (however, ''/dev/dlci.spi-baseband.extra_13'' also works and appears to be more reliable than the other device).&lt;br /&gt;
# Press Esc, and in the Main Menu, select ''Save setup as dfl''. Now, select &amp;quot;exit&amp;quot;.&lt;br /&gt;
# To run minicom using ssh, just run minicom -w&lt;br /&gt;
&lt;br /&gt;
==Running Minicom 2.2 from MobileTerminal==&lt;br /&gt;
'''Note''': minicom does work on MobileTerminal only on root (use su) and only after it has been configured (through the steps above).&lt;br /&gt;
# Open MobileTerminal.&lt;br /&gt;
# Run the command su, enter your root password (default alpine) and then run minicom -w.&lt;br /&gt;
# To exit minicom, slide your finger on the screen (&amp;quot;gesture&amp;quot;) to the bottom right (if you haven't changed this setting in MobileTerminal settings), then press A, X and enter.&lt;br /&gt;
&lt;br /&gt;
==How to run Baseband Commands==&lt;br /&gt;
&lt;br /&gt;
First, run Minicom. Then, type &amp;quot;at&amp;quot; and press Enter. Then, you can type the command that you want, have fun.&lt;br /&gt;
&lt;br /&gt;
==Baseband Commands==&lt;br /&gt;
For a complete list please see [[List of baseband commands]].&lt;br /&gt;
&lt;br /&gt;
===Getting Information===&lt;br /&gt;
* '''at+xgendata''': Display some baseband informations&lt;br /&gt;
* '''at&amp;amp;v''': Display the profiles in the Baseband (Active Profile, Stored Profile 0 and Stored Profile 1)&lt;br /&gt;
* '''at+clac''': Show some baseband commands&lt;br /&gt;
* '''at&amp;amp;h''': Show more Baseband Commands&lt;br /&gt;
* '''at+cgsn''': Show serial number from BBUpdaterExtreme&lt;br /&gt;
* '''at+xdrv=9,3''': Command from BBUpdaterExtreme&lt;br /&gt;
* '''at+cpwroff''': Powercycle baseband modem from BBUpdaterExtreme&lt;br /&gt;
* '''at+csq''': Get signal strength from BBUpdaterExtreme&lt;br /&gt;
&lt;br /&gt;
===Unlock===&lt;br /&gt;
* '''at+clck''': Traditional unlock command&lt;br /&gt;
* '''at+xlock''': Wildcard unlock&lt;br /&gt;
* '''at+xsimstate''': Print lock state (write at+xsimstate=1 to turn on, at+xsimstate=0 to turn off)&lt;br /&gt;
&lt;br /&gt;
===SMS===&lt;br /&gt;
* '''at+cmgf''': SMS operating mode (at+cmgf=0 - PDU, at+cmgf=1 - text)&lt;br /&gt;
* '''at+cmgs''': Send SMS (write at+cmgs=&amp;quot;[PHONE NUMBER]&amp;quot;[ENTER][MESSAGE][CTRL-Z] while [ENTER] is an enter (\r\n) and [CTRL-Z] is ASCII 26)&lt;br /&gt;
&lt;br /&gt;
===General===&lt;br /&gt;
* '''atz''': Reset modem&lt;br /&gt;
* '''ath''': Hangup modem&lt;/div&gt;</summary>
		<author><name>ClaytonBraasch</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=JailbreakMe&amp;diff=9328</id>
		<title>JailbreakMe</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=JailbreakMe&amp;diff=9328"/>
		<updated>2010-09-22T02:15:26Z</updated>

		<summary type="html">&lt;p&gt;ClaytonBraasch: The 'M' in JailbreakMe is supposed to be capitalized, last time I checked.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;JailbreakMe is a site that has been used multiple times to jailbreak iDevices. It is currently online with the [[Star]] Jailbreak by [[User:Comex|comex]].&lt;br /&gt;
&lt;br /&gt;
==First Incarnation (AppSnapp)==&lt;br /&gt;
Initially, [http://www.conceitedsoftware.com/ Conceited Software] utilized the [[LibTiff]] exploit with jailbreakme.com, which also went by the name &amp;quot;AppSnapp,&amp;quot; to jailbreak iOS 1.1.1. Upon the release of iOS 2.0 and the debut of the App Store, Conceited Software closed JailbreakMe, when it remained dormant for a while.&lt;br /&gt;
&lt;br /&gt;
==Second Incarnation (Star)==&lt;br /&gt;
[[User:Comex|comex]] has since repurposed the domain for [[Star]], his userland [[jailbreak]] for iOS 3.1.2 through 4.0.1 (with the exception of 3.2.2).&lt;br /&gt;
&lt;br /&gt;
==External Link==&lt;br /&gt;
[http://jailbreakme.com/ Jailbreakme.com]&lt;/div&gt;</summary>
		<author><name>ClaytonBraasch</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=User:Pod2g&amp;diff=9295</id>
		<title>User:Pod2g</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=User:Pod2g&amp;diff=9295"/>
		<updated>2010-09-21T02:47:30Z</updated>

		<summary type="html">&lt;p&gt;ClaytonBraasch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;iPhone Hacker, see also [[0x24000_Segment_Overflow]]&lt;br /&gt;
&lt;br /&gt;
He was the first to get the keys for [[iBSS]] for the [[Apex 8A306 (iPhone 4)]]: [http://twitter.com/pod2g/status/23932796062 Tweet by pod2g]&lt;br /&gt;
&lt;br /&gt;
He also discovered the [[Usb_control_msg(0xA1,_1)_Exploit]] for the [[iPod touch 2G]].&lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/pod2g pod2g on Twitter]&lt;br /&gt;
[[Category:Hackers]]&lt;/div&gt;</summary>
		<author><name>ClaytonBraasch</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=User:Pod2g&amp;diff=9294</id>
		<title>User:Pod2g</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=User:Pod2g&amp;diff=9294"/>
		<updated>2010-09-21T02:47:02Z</updated>

		<summary type="html">&lt;p&gt;ClaytonBraasch: Fixed broken link.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;iPhone Hacker, see also [[0x24000_Segment_Overflow]]&lt;br /&gt;
&lt;br /&gt;
He was the first to get the keys for [[iBSS]] for the [[Apex 8A306 (iPhone 4)]]: [http://twitter.com/pod2g/status/23932796062 Tweet by pod2g]&lt;br /&gt;
&lt;br /&gt;
He also discovered the [[usb_control_msg(0xA1, 1) exploit]] for the [[iPod touch 2G]].&lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/pod2g pod2g on Twitter]&lt;br /&gt;
[[Category:Hackers]]&lt;/div&gt;</summary>
		<author><name>ClaytonBraasch</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=User:Pod2g&amp;diff=9293</id>
		<title>User:Pod2g</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=User:Pod2g&amp;diff=9293"/>
		<updated>2010-09-21T02:46:18Z</updated>

		<summary type="html">&lt;p&gt;ClaytonBraasch: Edited the page to include another exploit he discovered.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;iPhone Hacker, see also [[0x24000_Segment_Overflow]]&lt;br /&gt;
&lt;br /&gt;
He was the first to get the keys for [[iBSS]] for the [[Apex 8A306 (iPhone 4)]]: [http://twitter.com/pod2g/status/23932796062 Tweet by pod2g]&lt;br /&gt;
&lt;br /&gt;
He also discovered the [[usb_control_msg(0xA1, 1)]] exploit for the [[iPod touch 2G]].&lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/pod2g pod2g on Twitter]&lt;br /&gt;
[[Category:Hackers]]&lt;/div&gt;</summary>
		<author><name>ClaytonBraasch</name></author>
		
	</entry>
</feed>