<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jack</id>
	<title>The iPhone Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jack"/>
	<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/wiki/Special:Contributions/Jack"/>
	<updated>2026-04-27T20:26:51Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.14</generator>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Untethered_jailbreak&amp;diff=12974</id>
		<title>Untethered jailbreak</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Untethered_jailbreak&amp;diff=12974"/>
		<updated>2010-11-16T21:38:20Z</updated>

		<summary type="html">&lt;p&gt;Jack: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;An untethered jailbreak is a type of [[jailbreak]] where your device does not require you to reboot with a connection to an external device capable of executing commands on the device. &lt;br /&gt;
&lt;br /&gt;
== Device support ==&lt;br /&gt;
Many device/firmware combinations can use an untethered jailbreak. The most current versions of iOS (3.2.2 and 4.1), as well as the [[N81ap|iPod touch 4G]], can be jailbroken already with [[limera1n]] or [[greenpois0n]].&lt;br /&gt;
&lt;br /&gt;
Devices as new as the [[N81ap|iPod touch 4G]]/[[K66ap|Apple TV 2G]] have known [[bootrom]] exploits. However, the [[N88ap|iPhone 3GS]] ([[iBoot-359.3|old bootrom]]) and older have bootrom exploits that allow for an untethered jailbreak. Newer devices as old as the [[N88ap|iPhone 3GS]] ([[iBoot-359.3.2|new bootrom]]), [[N72ap|iPod touch 2G]] ([[iBoot-240.5.1|new bootrom]]), and [[N18ap|iPod touch 3G]] have bootrom exploits that are limited to a [[tethered jailbreak]] (without the assistance of a firmware-based exploit).&lt;br /&gt;
&lt;br /&gt;
==Utilities capable of untethered jailbreaks==&lt;br /&gt;
These jailbreak utilities can perform an untethered jailbreak, sorted by operating system.&lt;br /&gt;
&lt;br /&gt;
===iOS===&lt;br /&gt;
[[Star]] runs on the device itself, and is completely independent of a computer's operating system.&lt;br /&gt;
&lt;br /&gt;
===Mac OS X===&lt;br /&gt;
* [[Spirit]]&lt;br /&gt;
* [[blackra1n]]&lt;br /&gt;
* [[greenpois0n]]&lt;br /&gt;
* [[limera1n]]&lt;br /&gt;
* [[PwnageTool]]&lt;br /&gt;
* [[redsn0w]]&lt;br /&gt;
&lt;br /&gt;
===Windows===&lt;br /&gt;
* [[Spirit]]&lt;br /&gt;
* [[blackra1n]]&lt;br /&gt;
* [[greenpois0n]]&lt;br /&gt;
* [[limera1n]]&lt;br /&gt;
* [[redsn0w]]&lt;br /&gt;
* [[sn0wbreeze]]&lt;br /&gt;
&lt;br /&gt;
===Linux===&lt;br /&gt;
* [[Spirit]]&lt;br /&gt;
* [[greenpois0n]]&lt;br /&gt;
* [[redsn0w]] (Certain Versions)&lt;/div&gt;</summary>
		<author><name>Jack</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=MobileBackup_Copy_Exploit&amp;diff=10997</id>
		<title>MobileBackup Copy Exploit</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=MobileBackup_Copy_Exploit&amp;diff=10997"/>
		<updated>2010-10-22T21:32:19Z</updated>

		<summary type="html">&lt;p&gt;Jack: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;BackupAgent normally restricts files to be restored to a specific set of directories (&amp;quot;domains&amp;quot;).  It even has a check to ensure that &amp;quot;..&amp;quot; isn't in the path:&lt;br /&gt;
&lt;br /&gt;
    Path contains sneaky dots to traverse up outside of the domain: %@&lt;br /&gt;
&lt;br /&gt;
However, for some reason, this check isn't applied when taking alternate code paths for special handling of certain files.  For example, a restore to HomeDomain with a path starting with Library/Preferences/SystemConfiguration/ is migrated to the new directory for system configuration, /var/preferences/SystemConfiguration.  This bypasses the sneaky dots check, so spirit is able to restore to this path:&lt;br /&gt;
&lt;br /&gt;
    Library/Preferences/SystemConfiguration/../../../../../var/db/launchd.db/com.apple.launchd/overrides.plist&lt;br /&gt;
&lt;br /&gt;
This was fixed in iOS 3.2.1 and 4.0.&lt;br /&gt;
&lt;br /&gt;
Used in [[comex]]'s [[Spirit]] Jailbreak.&lt;br /&gt;
&lt;br /&gt;
[[Category:Exploits]]&lt;/div&gt;</summary>
		<author><name>Jack</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Malformed_CFF_Vulnerability&amp;diff=10460</id>
		<title>Malformed CFF Vulnerability</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Malformed_CFF_Vulnerability&amp;diff=10460"/>
		<updated>2010-10-11T20:54:46Z</updated>

		<summary type="html">&lt;p&gt;Jack: New page:   == Exploit Status: PATCHED ==   This is the exploit used in Comex's JailbreakMe 2.0 'star' (The First public Jailbreak for the iPhone 4 running 4.0 or 4.0.1)  After this jailbreak/exploi...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;br /&gt;
== Exploit Status: PATCHED ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This is the exploit used in Comex's JailbreakMe 2.0 'star' (The First public Jailbreak for the iPhone 4 running 4.0 or 4.0.1)&lt;br /&gt;
&lt;br /&gt;
After this jailbreak/exploit was released, 10 days later, Apple fixed this exploit in the iOS 4.0.2 software update, rendering JailbreakMe useless on 4.0.2&lt;/div&gt;</summary>
		<author><name>Jack</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Limera1n&amp;diff=10458</id>
		<title>Limera1n</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Limera1n&amp;diff=10458"/>
		<updated>2010-10-11T20:25:05Z</updated>

		<summary type="html">&lt;p&gt;Jack: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Ra1ndrop.png|right]]&lt;br /&gt;
This is [[User:Geohot|geohot's]] latest [[jailbreak]] utility. It uses his undisclosed exploit, along with [[User:Comex|comex]]'s [[userland exploit]], to achieve an [[untethered jailbreak]] on newer devices.&lt;br /&gt;
* [[N88ap|iPhone 3GS]]&lt;br /&gt;
* [[N90ap|iPhone 4]]&lt;br /&gt;
* [[N72ap|iPod touch 2G]] (support announced, not released)&lt;br /&gt;
* [[N18ap|iPod touch 3G]]&lt;br /&gt;
* [[N81ap|iPod touch 4G]]&lt;br /&gt;
* [[K48ap|iPad]]&lt;br /&gt;
* [[K66ap|AppleTV]] ([http://www.tuaw.com/2010/10/09/limera1n-jailbreak-released-greenpois0n-jailbreak-delayed/ However it's current usefulness is debatable])&lt;br /&gt;
&lt;br /&gt;
It has been demonstrated multiple times by [[User:Geohot|geohot]], using blog posts on his now private blog. [[User:Geohot|Geohot]] [http://1.bp.blogspot.com/_NJ4JFBfr1tY/TDgkAsTQEmI/AAAAAAAAAcw/ZNHDxMNNL4Y/s1600/iphone4.png showed off a high-res picture of Cydia on an iPhone 4]. He [http://www.youtube.com/watch?v=__TR86PLiHw displayed an iPod touch 3G with an untethered jailbreak] that met MuscleNerd's requirements for a good video. In addition, he took a [http://4.bp.blogspot.com/_NJ4JFBfr1tY/S7_OvGMqJMI/AAAAAAAAAcE/R5WLrCizGw0/s1600/ipad_jb.jpg picture of Cydia and blackra1n icons on his iPad's SpringBoard].&lt;br /&gt;
&lt;br /&gt;
limera1n was released to the public on October 9, 2010, delaying the release of [[greenpois0n]], because [[greenpois0n]] has to be rewritten to use the limera1n exploit instead of [[SHAtter]]. It only supports Windows at the moment, and there are some devices with issues.&lt;br /&gt;
&lt;br /&gt;
==Release text==&lt;br /&gt;
&amp;lt;center&amp;gt;limera1n, 6 months in the making&amp;lt;br /&amp;gt;&lt;br /&gt;
iPhone 3GS, iPod Touch 3G, iPad, iPhone 4, iPod Touch 4G&amp;lt;br /&amp;gt;&lt;br /&gt;
4.0-4.1 and beyond+++&amp;lt;br /&amp;gt;&lt;br /&gt;
limera1n is unpatchable&amp;lt;br /&amp;gt;&lt;br /&gt;
untethered thanks to jailbreakme star '''comex'''&amp;lt;br /&amp;gt;&lt;br /&gt;
released today to get chronicdev to do the right thing&amp;lt;br /&amp;gt;&lt;br /&gt;
brought to you by '''geohot'''&amp;lt;br /&amp;gt;&lt;br /&gt;
hacktivates&amp;lt;br /&amp;gt;&lt;br /&gt;
Mac coming soon&amp;lt;br /&amp;gt;&lt;br /&gt;
follow the instructions in the box, sadly limera1n isn't one click&amp;lt;br /&amp;gt;&lt;br /&gt;
that's the price of unpatchability&amp;lt;br /&amp;gt;&lt;br /&gt;
as usual, donations appreciated but not required&amp;lt;br /&amp;gt;&lt;br /&gt;
still in beta, pardon my ragged edges&amp;lt;br /&amp;gt;&lt;br /&gt;
AppleTV is technically supported, but theres no apps yet&amp;lt;br /&amp;gt;&lt;br /&gt;
zero pictures of my face&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Credit==&lt;br /&gt;
*[[User:Geohot|geohot]] - the program itself, and [[bootrom exploit]].&lt;br /&gt;
*[[User:Comex|comex]] - [[userland exploit]] that allows limera1n to run [[untethered jailbreak|untethered]].&lt;br /&gt;
&lt;br /&gt;
==Changelog==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;border-collapse:collapse;&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;center&amp;gt;'''Version'''&amp;lt;/center&amp;gt;&lt;br /&gt;
|&amp;lt;center&amp;gt;'''Release time'''&amp;lt;/center&amp;gt;&lt;br /&gt;
|&amp;lt;center&amp;gt;'''MD5 Hash'''&amp;lt;/center&amp;gt;&lt;br /&gt;
|&amp;lt;center&amp;gt;'''Change comment'''&amp;lt;/center&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|beta 1&lt;br /&gt;
|9 Oct 2010 XX:XX GMT&lt;br /&gt;
|2f2b09a6ed5c5613d5361d8a9d0696b6&lt;br /&gt;
|First release.&lt;br /&gt;
|-&lt;br /&gt;
|beta 2&lt;br /&gt;
|9 Oct 2010 XX:XX GMT&lt;br /&gt;
|a70dccb3dfc0e505687424184dc3d1ce&lt;br /&gt;
|Fixed kernel patching magic. Rerun BETA2+ over BETA1.&lt;br /&gt;
|-&lt;br /&gt;
|beta 3&lt;br /&gt;
|9 Oct 2010 XX:XX GMT&lt;br /&gt;
|81730090f7de1576268ee8c2407c3d35&lt;br /&gt;
|Fixed an issue with [[N88ap|iPhone 3GS]] ([[iBoot-359.3.2|new bootrom]])&lt;br /&gt;
|-&lt;br /&gt;
| beta 4&lt;br /&gt;
|9 Oct 2010 XX:XX GMT&lt;br /&gt;
|d901c4b3a544983f095b0d03eb94e4db&lt;br /&gt;
|Uninstall fixed, respring fixed&lt;br /&gt;
|-&lt;br /&gt;
| RC1&lt;br /&gt;
|11 Oct 2010 XX:XX GMT&lt;br /&gt;
|0622d99ffe4c25f75c720a689853845f&lt;br /&gt;
|out of beta! afc2, reliability improvements, no reboot for cydia, 2kb smaller&lt;br /&gt;
|-&lt;br /&gt;
| RC1b&lt;br /&gt;
|11 Oct 2010 XX:XX GMT&lt;br /&gt;
|fc6f7d696a57c3baede49bdff8a7f43f&lt;br /&gt;
|Fixed an iPad install bug&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Technical Information==&lt;br /&gt;
=== Basics ===&lt;br /&gt;
* limera1n does not use [[SHAtter]].&lt;br /&gt;
* limera1n uses a [[bootrom exploit]] to achieve the [[tethered jailbreak]] and [[unsigned code execution]].&lt;br /&gt;
* limera1n uses a userland exploit to make the jailbreak [[Untethered jailbreak|untethered]], which was developed by [[User:Comex|comex]].&lt;br /&gt;
&lt;br /&gt;
=== Exploits ===&lt;br /&gt;
Details of the [[bootrom exploit]] to follow.&lt;br /&gt;
&lt;br /&gt;
=== Process ===&lt;br /&gt;
The jailbreak appears to execute something like the following (in no particular order):&lt;br /&gt;
* In [[recovery1]],&lt;br /&gt;
 &amp;quot;setenv debug-uarts 1&lt;br /&gt;
 setenv auto-boot false&lt;br /&gt;
 saveenv&amp;quot;&lt;br /&gt;
* In [[DFU]], it uploads a [[payload]].&lt;br /&gt;
* In [[recovery2]], it uploads another [[payload]] and its [[ramdisk]].&lt;br /&gt;
 &amp;quot;setenv auto-boot true&lt;br /&gt;
  reset&lt;br /&gt;
  geohot done&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== Interesting Messages ===&lt;br /&gt;
*&lt;br /&gt;
 &amp;quot;geohot black is the new purple&amp;quot;&lt;br /&gt;
*&lt;br /&gt;
 &amp;quot;blackra1n start: %d current IRQ mask is %8.8X&lt;br /&gt;
 usb irq disabled...shhh&lt;br /&gt;
 fxns found @ %8.8X %8.8X&lt;br /&gt;
 found iBoot @ %8.8X&lt;br /&gt;
 i'm back from IRQland...&lt;br /&gt;
 3g detected, kicking nor&lt;br /&gt;
 nor kicked&lt;br /&gt;
 memcpy done&lt;br /&gt;
 iBoot restored!!!&lt;br /&gt;
 found command table @ %8.8X&lt;br /&gt;
 cmd_geohot added&lt;br /&gt;
 time to pray...%8.8X&amp;quot;&lt;br /&gt;
*&lt;br /&gt;
 &amp;quot;2.2X  send command(%d): %s&lt;br /&gt;
 send exploit!!!&lt;br /&gt;
 sent data to copy: %X&lt;br /&gt;
  sent shellcode: %X has real length %X&lt;br /&gt;
 never freed: %X&lt;br /&gt;
 sent fake data to timeout: %X&lt;br /&gt;
  sent exploit to heap overflow: %X&lt;br /&gt;
  sending file with length: 0x%X Mingw runtime failure:&lt;br /&gt;
   VirtualQuery failed for %d bytes at address %p      Unknown pseudo relocation protocol version %d.&lt;br /&gt;
     Unknown pseudo relocation bit size %d.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Controversy==&lt;br /&gt;
The release of this jailbreak is specifically designed to pressure [[Chronic Dev]] into not releasing the SHAtter exploit, instead implementing the limera1n exploit into [[greenpois0n]]. Now that [[User:Geohot|geohot]] has released limera1n, releasing [[SHAtter]] would uselessly disclose another [[bootrom exploit]] to Apple.&lt;br /&gt;
&lt;br /&gt;
[[User:Geohot|geohot]]'s rationale is that Apple has already discovered, through internal testing, the limera1n exploit, making it very likely that it will be fixed in the next bootrom. Because [[iBoot]] code is present both in the bootrom and firmware, and because firmware is refreshed much more often that bootrom code, any fix in this code branch would appear first in firmware. geohot observed his limera1n exploit was closed in firmware and concluded that it would almost certainly be fixed in the next bootrom revision, whereas SHAtter still has a chance of remaining useful in the 5th generation iPhone should it not be disclosed at this time.&lt;br /&gt;
&lt;br /&gt;
limera1n's [[Untethered jailbreak|untethered]] userland exploit was obtained by [[User:Geohot|geohot]] under questionable circumstances from [[User:Comex|comex]]. [[User:Comex|comex]] did in fact end up giving his approval for the exploit to be included in limera1n.&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://loadingchanges.com/wp-content/uploads/2010/10/limetime.jpg Picture of limera1n in action]&lt;br /&gt;
* [http://limera1n.com/ limera1n.com Actual limera1n domain] &amp;lt;nowiki&amp;gt;(using &amp;amp;lt;!--#include file=&amp;quot;http://www.theiphonewiki.com/limera1n&amp;quot; --&amp;amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
* [http://theiphonewiki.com/limera1n Actual site http://theiphonewiki.com/limera1n]&lt;br /&gt;
* [http://www.mediafire.com/?5sovoo41rbcdspw Limera1n RC Beta2 Dump on Mediafire]&lt;br /&gt;
* [http://www.pastie.org/1210054 Veence's explanation for release]&lt;/div&gt;</summary>
		<author><name>Jack</name></author>
		
	</entry>
</feed>