<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Eswick</id>
	<title>The iPhone Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Eswick"/>
	<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/wiki/Special:Contributions/Eswick"/>
	<updated>2026-05-06T13:11:28Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.14</generator>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=System_Log&amp;diff=43065</id>
		<title>System Log</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=System_Log&amp;diff=43065"/>
		<updated>2014-10-24T21:21:32Z</updated>

		<summary type="html">&lt;p&gt;Eswick: /* Reading syslog */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;iOS devices have a '''system log''' ('''syslog''') like other UNIX-derived operating systems do. See [http://en.wikipedia.org/wiki/Syslog Syslog on Wikipedia] for background.&lt;br /&gt;
&lt;br /&gt;
If you're a developer who needs simple instructions to give to a user about how to send a syslog to you, you can give them [http://www.jailbreakqa.com/questions/32462/frequently-asked-questions#81925 &amp;quot;A developer asked for my device's syslog. How do I send it?&amp;quot; in the JailbreakQA FAQ].&lt;br /&gt;
&lt;br /&gt;
== Reading syslog ==&lt;br /&gt;
=== On-device ===&lt;br /&gt;
&lt;br /&gt;
'''Method 1'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- TODO: Add a description of what socat is&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
As [[iOS]] is [[wikipedia:Unix|Unix]] based, it comes as no surprise that its syslog can be read using the same tools desktop Unix and [[wikipedia:Linux|Linux]] power users use; provided the tools are compiled for ARM. The most common tool is &amp;lt;code&amp;gt;socat(1)&amp;lt;/code&amp;gt;&amp;lt;sup&amp;gt;[{{man|socat|1}}]&amp;lt;/sup&amp;gt;. If you don't have it yet, just run an &amp;lt;code&amp;gt;apt-get&amp;lt;/code&amp;gt; on the package &amp;lt;code&amp;gt;socat&amp;lt;/code&amp;gt;. In order to use it, just connect to the syslog socket with the following command:&lt;br /&gt;
 socat - UNIX-CONNECT:/var/run/lockdown/syslog.sock&lt;br /&gt;
This gives an interactive shell with the syslog daemon (no need to enable file output). If you execute the &amp;lt;code&amp;gt;watch&amp;lt;/code&amp;gt; command, a backlog of messages will be printed and new messages will be printed as they arrive.&lt;br /&gt;
&lt;br /&gt;
'''Method 2'''&lt;br /&gt;
&lt;br /&gt;
Evan Swick's [https://github.com/eswick/ondeviceconsole ondeviceconsole] tool can be used in place of the method mentioned above. It functions similar to Ryan Petrich's [https://github.com/rpetrich/deviceconsole deviceconsole] tool, but runs directly on the device, without the need of a computer. It connects directly to the syslog socket, and displays log entries in real-time, with syntax highlighting. A precompiled version is available in the BigBoss repository.&lt;br /&gt;
&lt;br /&gt;
=== On OS X through [[lockdownd]] ===&lt;br /&gt;
&amp;lt;!-- TODO: Add explanation&lt;br /&gt;
--&amp;gt;A binary (and its source code) to view ASL messages from Mac using the MobileDevice.framework has been made available on http://newosxbook.com/index.php?page=downloads. Ryan Petrich's [https://github.com/rpetrich/deviceconsole deviceconsole] also provides the same functionality with useful color-coding.&lt;br /&gt;
&lt;br /&gt;
=== On Windows through [[lockdownd]] ===&lt;br /&gt;
Apple's [http://support.apple.com/kb/dl1466 iPhone Configuration Utility] can display the syslog on Windows.&lt;br /&gt;
&lt;br /&gt;
=== bgm's trick for enabling system log ===&lt;br /&gt;
This method will constantly write syslog output to a file. This is not recommended as it is slower, and can become fairly large. Install &amp;quot;syslogd to /var/log/syslog&amp;quot; from [[saurik]]'s repo and reboot your device.&lt;br /&gt;
&lt;br /&gt;
If you don't want to reboot, you can restart the syslogd instead:&lt;br /&gt;
 launchctl unload /System/Library/LaunchDaemons/com.apple.syslogd.plist&lt;br /&gt;
 launchctl load /System/Library/LaunchDaemons/com.apple.syslogd.plist&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;/var/log/syslog&amp;lt;/tt&amp;gt; will now be appended to automatically, and you can watch it like so:&lt;br /&gt;
 tail -f /var/log/syslog&lt;br /&gt;
(The &amp;quot;tail&amp;quot; command is in the package &amp;quot;Core Utilities&amp;quot; (coreutils) in the Cydia/Telesphoreo repository.) If you keep your device full of data, be careful you don't fill the disk. Unix systems tend to break when they can't write to the syslog. Keep an eye on it or employ some log rotation.&lt;br /&gt;
&lt;br /&gt;
To disable syslog writing, run:&lt;br /&gt;
 rm /var/log/syslog;&lt;br /&gt;
 mknod /var/log/syslog c 3 2&lt;br /&gt;
This will delete (&amp;lt;tt&amp;gt;rm&amp;lt;/tt&amp;gt;) the file and create a [[:/dev/null]]. (&amp;lt;tt&amp;gt;mknod *** c 3 2&amp;lt;/tt&amp;gt;)&lt;br /&gt;
&lt;br /&gt;
To re-enable syslog writing, run:&lt;br /&gt;
 rm /var/log/syslog&lt;br /&gt;
 touch /var/log/syslog&lt;br /&gt;
&lt;br /&gt;
This will delete (&amp;lt;tt&amp;gt;rm&amp;lt;/tt&amp;gt;) the file and and make a blank regular file. (&amp;lt;tt&amp;gt;touch&amp;lt;/tt&amp;gt;)&lt;br /&gt;
&lt;br /&gt;
==== SBSettings Toggle ====&lt;br /&gt;
An SBSettings [http://apt.thebigboss.org/onepackage.php?bundleid=sbsettingssyslogd toggle] for enabling/disabling the syslog in this way is available at BigBoss' Cydia repository. Ensure &amp;quot;syslogd to /var/log/syslog&amp;quot; is installed - the toggle package hasn't marked it as a dependency.&lt;br /&gt;
&lt;br /&gt;
=== On OS X or Windows through cinject ===&lt;br /&gt;
&lt;br /&gt;
# Plug your device into your computer.&lt;br /&gt;
# Download [http://blog.iphone-dev.org/post/24395681708/pre-dc cinject from this Dev Team blog post] (for OS X and Windows).&lt;br /&gt;
# Unzip the file.&lt;br /&gt;
# Open up a terminal on your computer (if you use OS X, you can use the Terminal application in the /Applications/Utilities/ folder.)&lt;br /&gt;
# Assuming you're using OS X and have downloads configured to use the default Downloads folder, run this command (copy and paste it and then hit the return key): &amp;lt;tt&amp;gt;cd ~/Downloads/cinject-0.5.4&amp;lt;/tt&amp;gt; and then run &amp;lt;tt&amp;gt;./cinject -w&amp;lt;/tt&amp;gt;&lt;br /&gt;
# That should display the running syslog from your device.&lt;br /&gt;
&lt;br /&gt;
== Reference ==&lt;br /&gt;
* [http://code.google.com/p/iphone-elite/wiki/IphoneSyslogd Google Code]&lt;br /&gt;
* [http://code.google.com/p/iphone-elite/source/list?path=/wiki/IphoneSyslogd.wiki&amp;amp;start=398 Full History]&lt;br /&gt;
&lt;br /&gt;
[[Category:Filesystem]]&lt;br /&gt;
[[Category:Daemons]]&lt;/div&gt;</summary>
		<author><name>Eswick</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Unflod&amp;diff=40858</id>
		<title>Unflod</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Unflod&amp;diff=40858"/>
		<updated>2014-04-19T18:53:06Z</updated>

		<summary type="html">&lt;p&gt;Eswick: Dynamic libraries aren't configuration files&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Unflod was a malicious piece of software targeting jailbroken iOS devices. It attempts to capture the user's Apple ID and password by using MobileSubstrate to hook into the ''SSLWrite'' function of [[Security.framework]] and then listening to data passed to it. Once the Apple ID and password are captured, it is sent to a Chinese IP address.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The virus is a library which uses MobileSubstrate to inject itself into processes. It is installed to /Library/MobileSubstrate/DynamicLibraries/Unflod.dylib. Since the virus is just a dynamic library, it can be removed by simply deleting the file. This can be automated by using CoolStar's [http://cl.ly/V5Kh Un-Unflod Tool].&lt;br /&gt;
&lt;br /&gt;
== History ==&lt;br /&gt;
The Unflod virus was inadvertently discovered by a Reddit user on April 17th, 2014. After posting about it, multiple reverse engineers were able to determine that it was indeed malicious.&lt;br /&gt;
The origin of Unflod is unknown. It is believed to come from Chinese piracy repositories, but the true source is yet to be discovered.&lt;br /&gt;
&lt;br /&gt;
== External Resources ==&lt;br /&gt;
* https://www.sektioneins.de/en/blog/14-04-18-iOS-malware-campaign-unflod-baby-panda.html&lt;/div&gt;</summary>
		<author><name>Eswick</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Unflod&amp;diff=40848</id>
		<title>Unflod</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Unflod&amp;diff=40848"/>
		<updated>2014-04-18T20:42:19Z</updated>

		<summary type="html">&lt;p&gt;Eswick: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Unflod was a malicious piece of software targeting jailbroken iOS devices. It attempts to capture the user's Apple ID and password by using MobileSubstrate to hook into the ''SSLWrite'' function of [[Security.framework]] and then listening to data passed to it. Once the Apple ID and password are captured, it is sent to a Chinese IP address.&lt;br /&gt;
&lt;br /&gt;
The virus is installed to /Library/MobileSubstrate/DynamicLibraries/Unflod.dylib and can be removed by simply deleting the file.&lt;br /&gt;
&lt;br /&gt;
== History ==&lt;br /&gt;
The Unflod virus was inadvertently discovered by a Reddit user on April 17th, 2014. After posting about it, multiple reverse engineers were able to determine that it was indeed malicious.&lt;br /&gt;
The origin of Unflod is unknown. It is believed to come from Chinese piracy repositories, but the true source is yet to be discovered.&lt;br /&gt;
&lt;br /&gt;
== External Resources ==&lt;br /&gt;
* https://www.sektioneins.de/en/blog/14-04-18-iOS-malware-campaign-unflod-baby-panda.html&lt;/div&gt;</summary>
		<author><name>Eswick</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Unflod&amp;diff=40847</id>
		<title>Unflod</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Unflod&amp;diff=40847"/>
		<updated>2014-04-18T20:35:49Z</updated>

		<summary type="html">&lt;p&gt;Eswick: Created page with &amp;quot;Unflod was a malicious piece of software targeting jailbroken iOS devices. It attempts to capture the user's Apple ID and password by using MobileSubstrate to hook into the ''...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Unflod was a malicious piece of software targeting jailbroken iOS devices. It attempts to capture the user's Apple ID and password by using MobileSubstrate to hook into the ''SSLWrite'' function of [[Security.framework]] and then listening to data passed to it. Once the Apple ID and password are captured, it is sent to a Chinese IP address.&lt;br /&gt;
&lt;br /&gt;
The virus is installed to /Library/MobileSubstrate/DynamicLibraries/Unflod.dylib and can be removed by simply deleting the file.&lt;br /&gt;
&lt;br /&gt;
== History ==&lt;br /&gt;
The Unflod virus was inadvertently discovered by a Reddit user on April 17th, 2014. After posting about it, multiple reverse engineers were able to determine that it was indeed malicious.&lt;br /&gt;
The origin of Unflod is unknown. It is believed to come from Chinese piracy repositories, but the true source is yet to be discovered.&lt;/div&gt;</summary>
		<author><name>Eswick</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Main_Page&amp;diff=39457</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Main_Page&amp;diff=39457"/>
		<updated>2014-02-07T21:13:40Z</updated>

		<summary type="html">&lt;p&gt;Eswick: Added symbolic link vulnerability to list of vulnerabilities.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Iptwiki.png|center]]&lt;br /&gt;
{{:Main Page/Welcome}}&lt;br /&gt;
&lt;br /&gt;
== Jailbreak/Unlock Status ==&lt;br /&gt;
&amp;lt;!-- Do not merge cells unless they detail the same device type (i.e. Apple TV, etc.) --&amp;gt;&lt;br /&gt;
More information, including information for older devices, is available on the [[Firmware]] and [[Jailbreak]] pages.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;font-size:1em; width:100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;width:15%;&amp;quot; | [[Models|Device]]&lt;br /&gt;
! [[k66ap|Apple TV 2G]]&lt;br /&gt;
! [[Apple TV 3G]]&lt;br /&gt;
! [[iPhone 4]]&lt;br /&gt;
! [[iPad 2]] and newer&amp;lt;br /&amp;gt;[[iPad mini 1G]] and newer&amp;lt;br /&amp;gt;[[n94ap|iPhone 4S]], [[iPhone 5]], [[n48ap|iPhone 5c (iPhone5,3)]], [[n51ap|iPhone 5s (iPhone6,1)]]&amp;lt;br /&amp;gt;[[iPod touch 5G]]&lt;br /&gt;
! [[n49ap|iPhone 5c (iPhone5,4)]]&amp;lt;br /&amp;gt;[[n53ap|iPhone 5s (iPhone6,2)]]&lt;br /&gt;
|-&lt;br /&gt;
! Latest [[firmware]]&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | 6.0.2 &amp;lt;small&amp;gt;(Build 11B554a)&amp;lt;/small&amp;gt;&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | 7.0.4 &amp;lt;small&amp;gt;(Build 11B554a)&amp;lt;/small&amp;gt;&lt;br /&gt;
| 7.0.5 &amp;lt;small&amp;gt;(Build 11B601)&amp;lt;/small&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! Was a [[jailbreak]] released?&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
! Software [[unlock]] hack available?&amp;lt;br /&amp;gt;&amp;lt;small&amp;gt;(if carrier locked)&amp;lt;/small&amp;gt;&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
| {{partial|}} Requires baseband [[01.59.00]]&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:50%; text-align:left; vertical-align:text-top;&amp;quot; | &lt;br /&gt;
== Software ==&lt;br /&gt;
* [[Apple Internal Apps]]&lt;br /&gt;
* [[:Category:File Formats|File formats]]&lt;br /&gt;
* [[/|Filesystem]]&lt;br /&gt;
* [[Firmware]]&lt;br /&gt;
** [[Beta Firmware]]&lt;br /&gt;
** [[OTA Updates]]&lt;br /&gt;
* [[iTunes]]&lt;br /&gt;
** [[iTunes Errors]]&lt;br /&gt;
** [[iTunes Modes]]&lt;br /&gt;
** [[MobileDevice Library]]&lt;br /&gt;
* [[Keys]]&lt;br /&gt;
** [[AES Keys]]&lt;br /&gt;
** [[CERT|Apple Certificate]]&lt;br /&gt;
** [[Baseband RSA Keys|RSA Keys]]&lt;br /&gt;
** [[Baseband TEA Keys|TEA Keys]]&lt;br /&gt;
** [[Firmware Keys]]&lt;br /&gt;
*** [[Decrypting Firmwares]]&lt;br /&gt;
** [[GID Key]]&lt;br /&gt;
** [[NCK]]&lt;br /&gt;
* [[Protocols]]&lt;br /&gt;
** [[Baseband Bootrom Protocol]]&lt;br /&gt;
** [[DFU (Protocol)|DFU]]&lt;br /&gt;
** [[Interactive Mode|Baseband Bootloader Protocol]]&lt;br /&gt;
** [[Normal Mode]]&lt;br /&gt;
** [[Recovery Mode (Protocols)|Recovery Mode]]&lt;br /&gt;
** [[Restore Mode]]&lt;br /&gt;
* [[System Log|System Log (syslog)]]&lt;br /&gt;
&lt;br /&gt;
==== [[:Category:Jailbreaks|Jailbreak Software]] ====&lt;br /&gt;
* [[Absinthe]]&lt;br /&gt;
* [[blackra1n]]&lt;br /&gt;
* [[Corona]]&lt;br /&gt;
* [[evasi0n]]&lt;br /&gt;
* [[evasi0n7]]&lt;br /&gt;
* [[Greenpois0n (jailbreak)|greenpois0n]]&lt;br /&gt;
* [[JailbreakMe]]&lt;br /&gt;
* [[limera1n]]&lt;br /&gt;
* [[p0sixspwn]]&lt;br /&gt;
* [[PwnageTool]]&lt;br /&gt;
* [[redsn0w]]&lt;br /&gt;
* [[Rocky Racoon]]&lt;br /&gt;
* [[Seas0nPass]]&lt;br /&gt;
* [[sn0wbreeze]]&lt;br /&gt;
* [[Spirit]]&lt;br /&gt;
* [[unthredera1n]]&lt;br /&gt;
&lt;br /&gt;
==== [[:Category:Patches|Patches]] ====&lt;br /&gt;
* [[Kernel Patches|Kernel]]&lt;br /&gt;
** [[AMFI Binary Trust Cache Patch]]&lt;br /&gt;
** [[PE i can has debugger Patch]]&lt;br /&gt;
** [[Sandbox Patch]]&lt;br /&gt;
** [[Vm map enter Patch]]&lt;br /&gt;
** [[Vm map protect Patch]]&lt;br /&gt;
* [[:Category:Ramdisk Patches|Ramdisk]]: [[ASR]]&lt;br /&gt;
&lt;br /&gt;
==== [[:Category:Exploits|Vulnerabilities and Exploits]] ====&lt;br /&gt;
* [[0x24000 Segment Overflow]] (24kpwn)&lt;br /&gt;
* [[BPF STX Kernel Write Exploit]]&lt;br /&gt;
* [[CVE-2013-0964]]&lt;br /&gt;
* [[HFS Heap Overflow]]&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]] (feedface)&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]]&lt;br /&gt;
* [[Limera1n Exploit]]&lt;br /&gt;
* [[Malformed CFF Vulnerability]]&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]]&lt;br /&gt;
* [[SHA-1 Image Segment Overflow]] (SHAtter)&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]]&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (steaks4uce)&lt;br /&gt;
* [[Symbolic Link Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
====Various Software====&lt;br /&gt;
* [[Cydia.app|Cydia]]&lt;br /&gt;
* [[EDA]]&lt;br /&gt;
* [[iDroid]]&lt;br /&gt;
* [[iFaith]]&lt;br /&gt;
* [[iPhone Tracker]]&lt;br /&gt;
* [[SemiRestore]]&lt;br /&gt;
* [[TinyUmbrella]]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:50%; text-align:left; vertical-align:text-top;&amp;quot; | &lt;br /&gt;
== Hardware ==&lt;br /&gt;
==== Devices ====&lt;br /&gt;
{{see also|Models|Prototypes}}&lt;br /&gt;
* [[iPhone]]&lt;br /&gt;
** iPhone ([[m68ap]])&lt;br /&gt;
** iPhone 3G ([[n82ap]])&lt;br /&gt;
** iPhone 3GS ([[n88ap]])&lt;br /&gt;
** [[iPhone 4]] ([[n90ap]], [[n90bap]], [[n92ap]])&lt;br /&gt;
** iPhone 4S ([[n94ap]])&lt;br /&gt;
** [[iPhone 5]] ([[n41ap]], [[n42ap]])&lt;br /&gt;
** [[iPhone 5c]] ([[n48ap]], [[n49ap]])&lt;br /&gt;
** [[iPhone 5s]] ([[n51ap]], [[n53ap]])&lt;br /&gt;
* [[iPod touch]]&lt;br /&gt;
** iPod touch ([[n45ap]])&lt;br /&gt;
** iPod touch 2G ([[n72ap]])&lt;br /&gt;
** iPod touch 3G ([[n18ap]])&lt;br /&gt;
** iPod touch 4G ([[n81ap]])&lt;br /&gt;
** [[iPod touch 5G]] ([[n78ap]], [[n78aap]])&lt;br /&gt;
* [[iPad]]&lt;br /&gt;
** iPad ([[k48ap]])&lt;br /&gt;
** [[iPad 2]] ([[k93ap]], [[k94ap]], [[k95ap]], [[k93aap]])&lt;br /&gt;
** [[iPad 3]] ([[j1ap]], [[j2ap]], [[j2aap]])&lt;br /&gt;
** [[iPad 4]] ([[p101ap]], [[p102ap]], [[p103ap]])&lt;br /&gt;
** [[iPad Air]] ([[j71ap]], [[j72ap]])&lt;br /&gt;
* [[iPad mini]]&lt;br /&gt;
** [[iPad mini 1G]] ([[p105ap]], [[p106ap]], [[p107ap]])&lt;br /&gt;
** [[iPad mini 2G]] ([[j85ap]], [[j86ap]])&lt;br /&gt;
* [[Apple TV]]&lt;br /&gt;
** Apple TV 2G ([[k66ap]])&lt;br /&gt;
** [[Apple TV 3G]] ([[j33ap]], [[j33iap]])&lt;br /&gt;
&lt;br /&gt;
==== [[Application Processor]]s ====&lt;br /&gt;
* [[S5L8900]] ([[m68ap|iPhone 2G]], [[n45ap|iPod touch 1G]], [[n82ap|iPhone 3G]])&lt;br /&gt;
* [[S5L8720]] ([[n72ap|iPod touch 2G]])&lt;br /&gt;
* [[S5L8920]] ([[n88ap|iPhone 3GS]])&lt;br /&gt;
* [[S5L8922]] ([[n18ap|iPod touch 3G]])&lt;br /&gt;
* [[S5L8930]] A4 ([[k48ap|iPad]], [[iPhone 4]], [[n81ap|iPod touch 4G]], [[k66ap|Apple TV 2G]])&lt;br /&gt;
* [[S5L8940]] A5 ([[iPad 2]], [[n94ap|iPhone 4S]])&lt;br /&gt;
* [[S5L8942]] A5 Rev A ([[j33ap|Apple TV 3G]], [[k93aap|iPad 2 (iPad2,4)]], [[iPod touch 5G]], [[iPad mini 1G]])&lt;br /&gt;
* [[S5L8945]] A5X ([[iPad 3]])&lt;br /&gt;
* [[S5L8947]] A5 Rev B ([[j33iap|Apple TV 3G (AppleTV3,2)]])&lt;br /&gt;
* [[S5L8950]] A6 ([[iPhone 5]], [[iPhone 5c]])&lt;br /&gt;
* [[S5L8955]] A6X ([[iPad 4]])&lt;br /&gt;
* [[S5L8960]] A7 ([[iPhone 5s]], [[iPad mini 2G]])&lt;br /&gt;
* [[S5L8965]] A7 Variant ([[iPad Air]])&lt;br /&gt;
&lt;br /&gt;
==== [[Baseband Device]]s ====&lt;br /&gt;
* [[S-Gold 2|PMB8876 or S-Gold 2]] ([[m68ap|iPhone]])&lt;br /&gt;
* [[X-Gold 608|PMB8878 or X-Gold 608]] ([[n82ap|iPhone 3G]], [[n88ap|iPhone 3GS]], [[k48ap|iPad]])&lt;br /&gt;
* [[XMM 6180|XMM6180 or X-Gold 618]] ([[iPhone 4]] (iPhone3,1 and iPhone3,2), [[k94ap|iPad 2 (iPad2,2)]])&lt;br /&gt;
* [[MDM6600]] ([[n92ap|iPhone 4 (iPhone3,3)]], [[k95ap|iPad 2 (iPad2,3)]])&lt;br /&gt;
* [[MDM6610]] ([[n94ap|iPhone 4S]])&lt;br /&gt;
* [[MDM9x00]] ([[iPad 3]])&lt;br /&gt;
* [[MDM9615]] ([[iPhone 5]], [[iPad 4]], [[iPad mini 1G]], [[iPhone 5c]], [[iPhone 5s]], [[iPad Air]], [[iPad mini 2G]])&lt;br /&gt;
&lt;br /&gt;
==== [[Motion Processor|Motion Co-processors]] ====&lt;br /&gt;
* [[LPC18A1]] M7 ([[iPhone 5s]], [[iPad Air]], [[iPad mini 2G]])&lt;br /&gt;
&lt;br /&gt;
==== WLAN/[[Bluetooth]] ====&lt;br /&gt;
* [[Marvell 88x8686]]&lt;br /&gt;
* [[BlueCore 4]]&lt;br /&gt;
* [[BlueCore 6]]&lt;br /&gt;
* [[BCM4325]]&lt;br /&gt;
* [[BCM4329]]&lt;br /&gt;
* [[BCM4330]]&lt;br /&gt;
* [[BCM4334]]&lt;br /&gt;
* [[BCM43342]]&lt;br /&gt;
&lt;br /&gt;
==== [[Compass.app|Compass]] ====&lt;br /&gt;
* [[AKM8973]]&lt;br /&gt;
* [[AKM8975]]&lt;br /&gt;
* [[AK8963]]&lt;br /&gt;
&lt;br /&gt;
==== Other ====&lt;br /&gt;
* [[Accelerometer]]&lt;br /&gt;
* [[Gyroscope]]: [[AGD1 2022 FP6AQ]]&lt;br /&gt;
* Connectors: [[30-pin Connector|30-pin]], [[Lightning Connector|Lightning]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:50%; text-align:left; vertical-align:text-top;&amp;quot; | &lt;br /&gt;
== Development ==&lt;br /&gt;
==== [[:Category:Hackers|iPhone Hackers]] ====&lt;br /&gt;
* [[User:comex|comex]]&lt;br /&gt;
* [[User:geohot|geohot]]&lt;br /&gt;
* [[User:MuscleNerd|MuscleNerd]]&lt;br /&gt;
* [[User:planetbeing|planetbeing]]&lt;br /&gt;
* [[User:posixninja|posixninja]]&lt;br /&gt;
* [[User:pod2g|pod2g]]&lt;br /&gt;
* [[Pimskeks]]&lt;br /&gt;
* [[User:iH8sn0w|iH8sn0w]]&lt;br /&gt;
* [[User:winocm|winocm]]&lt;br /&gt;
* [[saurik|saurik]]&lt;br /&gt;
&lt;br /&gt;
==== iPhone Hacker Teams ====&lt;br /&gt;
* [[Chronic Dev (team)|Chronic Dev]]&lt;br /&gt;
* [[iPhone Dev Team]]&lt;br /&gt;
* [[Dream Team]]&lt;br /&gt;
* [[Evad3rs|evad3rs]]&lt;br /&gt;
&lt;br /&gt;
==== Application Development ====&lt;br /&gt;
* [[Apple Certification Process]]&lt;br /&gt;
* [[Bypassing iPhone Code Signatures]]&lt;br /&gt;
* [[Distribution Methods]]&lt;br /&gt;
* [[/System/Library/Frameworks|Frameworks]]&lt;br /&gt;
* [[MobileDevice Library]]&lt;br /&gt;
* [[Mobile Substrate]]&lt;br /&gt;
* [[Toolchain]] (Includes tutorials)&lt;br /&gt;
* [[Toolchain 2.0]] (Includes tutorials)&lt;br /&gt;
* [http://iphonedevwiki.net iPhoneDevWiki]&lt;br /&gt;
&lt;br /&gt;
==== Application Copy Protection ====&lt;br /&gt;
* [[Application Structure and Signatures]]&lt;br /&gt;
* [[Bugging Debuggers]]&lt;br /&gt;
* [[Copy Protection Overview]]&lt;br /&gt;
* [[Defeating Cracks]]&lt;br /&gt;
* [[Mach-O Loading Process]]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:50%; text-align:left; vertical-align:text-top;&amp;quot; | &lt;br /&gt;
== Help ==&lt;br /&gt;
==== Guides ====&lt;br /&gt;
* [[Tutorials]]&lt;br /&gt;
* [[Useful Links]]&lt;br /&gt;
&lt;br /&gt;
==== Definitions ====&lt;br /&gt;
* [[Activation]] and [[Hacktivation]]&lt;br /&gt;
* [[ASLR]]&lt;br /&gt;
* [[Baseband Device|Baseband]]&lt;br /&gt;
* [[Baseband Bootloader|Bootloader]]&lt;br /&gt;
* [[Bootchain]]&lt;br /&gt;
* [[Bootrom]] / [[VROM]]&lt;br /&gt;
* [[Bricked]]&lt;br /&gt;
* [[CHIPID]]&lt;br /&gt;
* [[DFU Mode]]&lt;br /&gt;
* [[Failbreak]]&lt;br /&gt;
* [[iBEC]]&lt;br /&gt;
* [[iBoot (Bootloader)|iBoot]]&lt;br /&gt;
* [[iBSS]]&lt;br /&gt;
* [[IMG3 File Format|IMG3]] tags&lt;br /&gt;
** [[BORD]]&lt;br /&gt;
** [[CERT]]&lt;br /&gt;
** [[CHIP]]&lt;br /&gt;
** [[CPID]]&lt;br /&gt;
** [[DATA]]&lt;br /&gt;
** [[ECID]]&lt;br /&gt;
** [[KBAG]]&lt;br /&gt;
** [[PROD]]&lt;br /&gt;
** [[SDOM]]&lt;br /&gt;
** [[SEPO]]&lt;br /&gt;
** [[SHSH]]&lt;br /&gt;
** [[TYPE]]&lt;br /&gt;
** [[VERS]]&lt;br /&gt;
* [[Jailbreak]]&lt;br /&gt;
** [[Tethered jailbreak]]&lt;br /&gt;
** [[Untethered jailbreak]]&lt;br /&gt;
* [[Kernel]]&lt;br /&gt;
* [[launchd]]&lt;br /&gt;
* [[LLB]]&lt;br /&gt;
* [[NAND]]&lt;br /&gt;
* [[NOR]]&lt;br /&gt;
* [[NORID]]&lt;br /&gt;
* [[Unlock]]&lt;br /&gt;
* [[Userland]]&lt;br /&gt;
|}&lt;br /&gt;
__NOTOC____NOEDITSECTION__&lt;/div&gt;</summary>
		<author><name>Eswick</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Call_History_Database&amp;diff=33319</id>
		<title>Call History Database</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Call_History_Database&amp;diff=33319"/>
		<updated>2013-08-03T02:18:06Z</updated>

		<summary type="html">&lt;p&gt;Eswick: Fixed some grammar.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Call history''' is an SQLite 3 database file which contains the call history from MobilePhone.app on iOS.&lt;br /&gt;
==Serialization==&lt;br /&gt;
In the folder &amp;lt;code&amp;gt;/var/wireless/Library/CallHistory&amp;lt;/code&amp;gt; the file &amp;lt;code&amp;gt;call_history.db&amp;lt;/code&amp;gt; is located.&lt;br /&gt;
===Database file===&lt;br /&gt;
The &amp;lt;code&amp;gt;call_history.db&amp;lt;/code&amp;gt; SQLite 3 database has the following tables:&lt;br /&gt;
* _SqliteDatabaseProperties &lt;br /&gt;
* call&lt;br /&gt;
===Tables===&lt;br /&gt;
All date fields is shown as number of seconds since Jan 1st, 2001.&lt;br /&gt;
===_SqliteDatabaseProperties===&lt;br /&gt;
This is general-purpose table to store some configuration values.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;font-size: smaller; text-align: center; table-layout: fixed; border-collapse: collapse;&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
!field name&lt;br /&gt;
!type&lt;br /&gt;
|-&lt;br /&gt;
|key&lt;br /&gt;
|TEXT&lt;br /&gt;
|-&lt;br /&gt;
|value&lt;br /&gt;
|TEXT&lt;br /&gt;
|-&lt;br /&gt;
|colspan=&amp;quot;2&amp;quot; | UNIQUE(key)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
These values are stored in the table:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;font-size: smaller; text-align: center; table-layout: fixed; border-collapse: collapse;&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
!key&lt;br /&gt;
!value&lt;br /&gt;
!description&lt;br /&gt;
|-&lt;br /&gt;
|call_history_limit&lt;br /&gt;
|100&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot; | Sets the limit on the number of entries in the call history, increasing this value has no effect however.&lt;br /&gt;
|-&lt;br /&gt;
|timer_lifetime&lt;br /&gt;
|431337&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot; | A call time counter which counts the number of seconds for all phone calls ever made (both incoming and outgoing)&lt;br /&gt;
|-&lt;br /&gt;
|data_up_last&lt;br /&gt;
|0&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot; | ?&lt;br /&gt;
|-&lt;br /&gt;
|data_down_last&lt;br /&gt;
|0&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot; | ?&lt;br /&gt;
|-&lt;br /&gt;
|data_up_all&lt;br /&gt;
|1337.72234523&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot; | A data counter which counts the number of megabytes sent via Cellular Network Data (i.e. not WiFi), since last statistics reset.&lt;br /&gt;
|-&lt;br /&gt;
|data_down_all&lt;br /&gt;
|31337.56235627&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot; | A data counter which counts the number of megabytes received via Cellular Network Data (i.e. not WiFi), since last statistics reset.&lt;br /&gt;
|-&lt;br /&gt;
|data_up_lifetime&lt;br /&gt;
|1337.72234523&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot; | A lifetime data counter which counts the number of megabytes sent via Cellular Network Data (i.e. not WiFi), doesn't get reset on a statistics reset. &lt;br /&gt;
|-&lt;br /&gt;
|data_down_lifetime&lt;br /&gt;
|31337.56235627&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot; | A lifetime data counter which counts the number of megabytes received via Cellular Network Data (i.e. not WiFi), doesn't get reset on a statistics reset. &lt;br /&gt;
|-&lt;br /&gt;
|_UniqueIdentifier&lt;br /&gt;
|CAFEBABE-F00D-DEAD-BEEF-31337ABFDEDA&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot; | An unique identifier for this phone&lt;br /&gt;
|-&lt;br /&gt;
|_ClientVersion&lt;br /&gt;
|11&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot; | The version of this database, version 11 is used on iOS 6.1.2&lt;br /&gt;
|-&lt;br /&gt;
|timer_last&lt;br /&gt;
|1337&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot; | The length of the last phone call (in seconds)&lt;br /&gt;
|-&lt;br /&gt;
|timer_outgoing&lt;br /&gt;
|31337&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot; | The total length of all outgoing phone calls, since last statistics reset&lt;br /&gt;
|-&lt;br /&gt;
|timer_ingoing&lt;br /&gt;
|41337&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot; | The total length of all incoming phone calls, since last statistics reset&lt;br /&gt;
|-&lt;br /&gt;
|timer_all&lt;br /&gt;
|72674&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot; | The total length of all incoming/outgoing phone calls, since last statistics reset&lt;br /&gt;
|-&lt;br /&gt;
|timer_last_reset&lt;br /&gt;
|232345655.1842&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot; | The date the call timer statics was last reset, usally (almost) the same as data_last_reset.&lt;br /&gt;
|-&lt;br /&gt;
|data_last_reset&lt;br /&gt;
|232345655.1942444&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot; | The date the data statics was last reset, usally (almost) the same as timer_last_reset.&lt;br /&gt;
|-&lt;br /&gt;
|__CPRecordSequenceNumber&lt;br /&gt;
|39461&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot; | ?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===call===&lt;br /&gt;
This is the main table where the call history is stored:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;font-size: smaller; text-align: center; table-layout: fixed; border-collapse: collapse;&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
!field name&lt;br /&gt;
!type&lt;br /&gt;
!value / description&lt;br /&gt;
|-&lt;br /&gt;
|ROWID&lt;br /&gt;
|INTEGER PRIMARY KEY AUTOINCREMENT&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot; | primary key&lt;br /&gt;
|-&lt;br /&gt;
|address&lt;br /&gt;
|TEXT&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot; | Phone number or FaceTime ID of contact that has been called/has received call from.&lt;br /&gt;
|-&lt;br /&gt;
|duration&lt;br /&gt;
|INTEGER&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot; | number of seconds the phone call lasted&lt;br /&gt;
|-&lt;br /&gt;
|flags&lt;br /&gt;
|INTEGER&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot; | flag is 4 for incoming calls, 5 for outgoing calls, 8 for blocked calls&lt;br /&gt;
|-&lt;br /&gt;
|id&lt;br /&gt;
|INTEGER&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot; | Contacts or Address Book ID of the contact being called. This column would be '''-1''' if the contact is unknown (e.g. not in address book). This column is always '''-1''' on incoming calls.&lt;br /&gt;
|-&lt;br /&gt;
|name&lt;br /&gt;
|TEXT&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot; | always empty&lt;br /&gt;
|-&lt;br /&gt;
|country_code&lt;br /&gt;
|TEXT&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot; | The mobile country code (MCC) of the country the phone was in when the call was placed. Example: '''234''' for United Kingdom. ([http://en.wikipedia.org/wiki/Mobile_country_code list of MCC/MNC])&lt;br /&gt;
|-&lt;br /&gt;
|network_code&lt;br /&gt;
|TEXT&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot; | The mobile network code (MNC) of the network the phone was on when the call was placed. Example: '''30''' for T-Mobile (UK) ([http://en.wikipedia.org/wiki/Mobile_country_code list of MCC/MNC])&lt;br /&gt;
|-&lt;br /&gt;
|read&lt;br /&gt;
|INTEGER DEFAULT '1'&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot; | read=0 if the call is an missed call, which hasn't been &amp;quot;read&amp;quot;. Example there is a (number) on the Phone icon, showing number of missed calls. read=1 if the missed calls has been checked.&lt;br /&gt;
|-&lt;br /&gt;
|assisted&lt;br /&gt;
|INTEGER DEFAULT '0'&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot; | ?&lt;br /&gt;
|-&lt;br /&gt;
|face_time_data&lt;br /&gt;
|BLOB&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot; | ?&lt;br /&gt;
|-&lt;br /&gt;
|originalAddress&lt;br /&gt;
|TEXT DEFAULT ''&lt;br /&gt;
|style=&amp;quot;text-align:left;&amp;quot; | ?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
* [http://avi.alkalay.net/2011/12/iphone-call-history.html iPhone Call History Database]&lt;br /&gt;
* [http://code.google.com/p/iphonelogd/wiki/CallHistoryDatabase Call History Database]&lt;/div&gt;</summary>
		<author><name>Eswick</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=/System/Library/CoreServices/SpringBoard.app&amp;diff=33318</id>
		<title>/System/Library/CoreServices/SpringBoard.app</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=/System/Library/CoreServices/SpringBoard.app&amp;diff=33318"/>
		<updated>2013-08-03T02:12:22Z</updated>

		<summary type="html">&lt;p&gt;Eswick: Removed &amp;quot;Acts as a GSEvent pump&amp;quot; from primary functions list. This has since been replaced with backboardd.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:iOS4.jpg|right|thumb|360px|SpringBoard on an unmodified [[n90ap|iPhone 4]] running [[iOS]] 4.0]]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
== Summary ==&lt;br /&gt;
SpringBoard.app is essentially iOS's graphical user interface (much the same as GNOME is to Linux, Explorer is to Microsoft Windows, and Finder is to Mac OS) and manages graphical services ranging from icon badges, the dock, multitasking, and folders (among others). When it is launched, it registers PurpleSystemEventPort, essentially making it the main application.&lt;br /&gt;
&lt;br /&gt;
=== Primary Functions===&lt;br /&gt;
* SpringBoard acts a stacking window manager, rendering the child applications&lt;br /&gt;
* SpringBoard activates/deactivates and manages memory of the UIKit applications it launches&lt;br /&gt;
* SpringBoard is responsible for most of the interactions with CoreTelephony&lt;br /&gt;
&lt;br /&gt;
=== MobileSubstrate Extensions ===&lt;br /&gt;
After jailbreaking the device, SpringBoard.app can be extended with 3rd party extensions injected by [[Mobile Substrate]].&lt;br /&gt;
=== Alternatives ===&lt;br /&gt;
Apple developers and service center employees use SpringBoard's alternative called [[SwitchBoard.app]]. A simple launcher for other developer utilities, such as [[SkankPhone]] (SkankPod if on iPod device) and [[BurnIn]].&lt;br /&gt;
&lt;br /&gt;
==Main Application Ports==&lt;br /&gt;
* com.apple.SpringBoard&lt;br /&gt;
* com.apple.SpringBoard.UIKit.migserver&lt;br /&gt;
* PurpleSystemEventPort&lt;br /&gt;
* CARenderServer&lt;br /&gt;
&lt;br /&gt;
== Children ==&lt;br /&gt;
=== Folders ===&lt;br /&gt;
*Translations&lt;br /&gt;
=== Files ===&lt;br /&gt;
*[[Model definition file|Model definition file(s)]]&lt;br /&gt;
*Related artwork&lt;br /&gt;
*ring.m4r (Marimba)&lt;br /&gt;
&lt;br /&gt;
== Parents ==&lt;br /&gt;
[[:/|Root]]/[[/System|System]]/[[/System/Library|Library]]/[[/System/Library/CoreServices|CoreServices]]&lt;/div&gt;</summary>
		<author><name>Eswick</name></author>
		
	</entry>
</feed>