<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Xblkx</id>
	<title>The iPhone Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Xblkx"/>
	<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/wiki/Special:Contributions/Xblkx"/>
	<updated>2026-04-30T21:41:47Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.14</generator>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Geeksn0w&amp;diff=54544</id>
		<title>Geeksn0w</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Geeksn0w&amp;diff=54544"/>
		<updated>2016-10-11T01:32:10Z</updated>

		<summary type="html">&lt;p&gt;Xblkx: /* The Semi-Tether */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{about|the semi-tethered jailbreak for iOS 7.1.x|the untethered jailbreak for iOS 7.1.x|Pangu}}&lt;br /&gt;
{{Infobox software&lt;br /&gt;
| title                  = Geeksn0w&lt;br /&gt;
| logo                   = [[File:Geeksn0w.png|75px]]&lt;br /&gt;
| screenshot             = [[File:Geeksn0w_2.8.2.png|250px]]&lt;br /&gt;
| caption                = Geeksn0w 2.8.2 on Windows 7&lt;br /&gt;
| author                 = [http://twitter.com/blackgeektuto BlackGeek]&lt;br /&gt;
| developer              = [http://twitter.com/blackgeektuto BlackGeek]&lt;br /&gt;
| released               = &lt;br /&gt;
| discontinued           = &lt;br /&gt;
| latest release version = 2.9.1&lt;br /&gt;
| latest release date    = {{Start date and age|2014|6|13|df=yes}}&lt;br /&gt;
| latest preview version = 1.0 beta (CLI)&lt;br /&gt;
| latest preview date    = {{Start date and age|2014|5|1|df=yes}}&lt;br /&gt;
| programming language   = .NET Visual Basic&lt;br /&gt;
| operating system       = [[wikipedia:Microsoft Windows|Windows]] / [[wikipedia:OS X|OS X]]&lt;br /&gt;
| size                   = &lt;br /&gt;
| platform               = &lt;br /&gt;
| language               = [[wikipedia:English|English]]&lt;br /&gt;
| status                 = Active&lt;br /&gt;
| genre                  = Jailbreaking&lt;br /&gt;
| license                = [[wikipedia:Freeware|Freeware]]&lt;br /&gt;
| website                = [http://Geeksn0w.it Geeksn0w.it]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
'''Geeksn0w''' is a [[jailbreak]] program that performs a semi-[[tethered jailbreak]] for the [[iPhone 4]] on iOS 7.1.x.&lt;br /&gt;
&lt;br /&gt;
== Supported Devices and Requirements==&lt;br /&gt;
The only supported devices are those of the [[iPhone 4]]. This is because Geeksn0w uses the [[A4]]-dependent [[limera1n exploit]] and the [[iPhone 4]] is the only A4 device running [[iOS]] 7. Geeksn0w currently only supports Windows (unless you use BootCamp or another VM on your Mac to install Windows). Geeksn0w requires [http://www.oracle.com/technetwork/java/javase/downloads/jdk7-downloads-1880260.html Java Development Kit for 32-bit PCs] and [http://www.microsoft.com/net .NET Framework] installed on your computer to be able to run. Unlike other jailbreak tools (such as [[evasi0n7]]), Geeksn0w does not need iTunes to be installed.&lt;br /&gt;
&lt;br /&gt;
==Versions and Updates==&lt;br /&gt;
Geeksn0w originally performed a [[tethered jailbreak]] on [[iOS]] 7.0 on the [[iPhone 4]] until [[evasi0n7]] was released. BlackGeek then updated Geeksn0w to use the same exploits as [[evasi0n7]] for all devices. Versions 2.5 and above perform a tethered jailbreak on iOS 7.1 for the iPhone 4. Version 2.9 performs a semi-tethered jailbreak on iOS 7.1 and 7.1.1.&lt;br /&gt;
On May 1, 2014, BlackGeek released the Mac beta cli for OS X.&lt;br /&gt;
&lt;br /&gt;
===Download===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center;&amp;quot;&lt;br /&gt;
! Version&lt;br /&gt;
! OS&lt;br /&gt;
! Download&lt;br /&gt;
! Changelog&lt;br /&gt;
|-&lt;br /&gt;
! 2.5&lt;br /&gt;
| class=&amp;quot;noborderplz&amp;quot; rowspan=&amp;quot;8&amp;quot; | [[wikipedia:Microsoft Windows|Windows]]&lt;br /&gt;
| [https://www.mega.co.nz/#!cA0nRQZA!khTx3YZ-Q5nZq2nYaB0dJtLrp16OLaTmi-TUEaBjk0s MEGA]&lt;br /&gt;
| First release that jailbreaks iOS 7.1&lt;br /&gt;
|-&lt;br /&gt;
! 2.6&lt;br /&gt;
| [https://www.mega.co.nz#!YBcCmKTL!ViKwyAzB8k30nly_LBTVnzlH_KK7LUyvTgQMcBOENXs MEGA]&lt;br /&gt;
| Bug fixes&lt;br /&gt;
|-&lt;br /&gt;
! 2.7&lt;br /&gt;
| [https://www.mediafire.com/download/1j4q76u9bm24wc0/geeksn0w_win_2.7_ea343bc6ca7b07ad662e2c4b3e0cefa.zip MediaFire]&lt;br /&gt;
| &lt;br /&gt;
* Added official Cydia 1.1.9 build&lt;br /&gt;
* Fixed Mail, Safari, Calculator and Weather crash after doing a tethered boot (SandBox fix)&lt;br /&gt;
* Added auto-Hacktivation for locked iPhones&lt;br /&gt;
* Fixed a bug in the Progress Bar&lt;br /&gt;
* Added iDevice arch finder: now GeekSn0w can auto-detect your iPhone model&lt;br /&gt;
* Improved speed of root_fs mount&lt;br /&gt;
* Fixed mount.sh error&lt;br /&gt;
* Reduced the .exe size&lt;br /&gt;
* Speeded up the Jailbreak process&lt;br /&gt;
* Added AFC2 protocol (iFunBox, iExplorer)&lt;br /&gt;
|-&lt;br /&gt;
! 2.8&lt;br /&gt;
| [http://www.geeksn0w.it/GeekSn0w/Releases/Windows/geeksn0w_win_2.8_7c148dc55660b4466dade25aa19bb.zip geeksn0w.it]&lt;br /&gt;
| &lt;br /&gt;
* Fixed a huge bug of GeekSn0w's dfuarch extension&lt;br /&gt;
|-&lt;br /&gt;
! 2.8.1&lt;br /&gt;
| [http://www.geeksn0w.it/GeekSn0w/Releases/Windows/geeksn0w_win_2.8.1_0b65917a7fd23e279ac97763338ecf.zip geeksn0w.it]&lt;br /&gt;
| &lt;br /&gt;
* Removed &amp;quot;dfuarch&amp;quot;, now GeekSn0w uses iRecovery to identify the iPhone model&lt;br /&gt;
* Fixed &amp;quot;New Curses&amp;quot; installation error&lt;br /&gt;
|-&lt;br /&gt;
! 2.8.2&lt;br /&gt;
| [http://www.geeksn0w.it/GeekSn0w/Releases/Windows/geeksn0w_2.8.2_win_c7e3b8f62934143a93e69042c9de96f.zip geeksn0w.it]&lt;br /&gt;
| &lt;br /&gt;
* Fixed an issue with iPhone 3,2 and 3,3 Jailbreak's process&lt;br /&gt;
|-&lt;br /&gt;
! 2.8.3&lt;br /&gt;
| [http://www.geeksn0w.it/GeekSn0w/Releases/Windows/geeksn0w_win_2.8.3_3f17cffb2b38bc34a5d3dae91da8c2b.zip geeksn0w.it]&lt;br /&gt;
| &lt;br /&gt;
* Fixed an issue with New Curses installation&lt;br /&gt;
|-&lt;br /&gt;
! 2.9&lt;br /&gt;
| [http://www.geeksn0w.it/GeekSn0w/Releases/Windows/geeksn0w_win_2.9_6322a7e8d3b4bfefe9f585beb7d6d4a5.zip geeksn0w.it]&lt;br /&gt;
|&lt;br /&gt;
* Updated Jailbreak payload: GeekSn0w now executes a [[Tethered jailbreak|Semi-Tethered Jailbreak]]&lt;br /&gt;
* Updated .NET Framework version of some resources&lt;br /&gt;
* Removed Respring after any reboot: now all the hack stuff is executed during Apple Logo stage&lt;br /&gt;
* Supports iOS 7.1.1&lt;br /&gt;
|-&lt;br /&gt;
! 1.0 beta (cli)&lt;br /&gt;
| [[wikipedia:OS X|OS X]]&lt;br /&gt;
| [http://www.geeksn0w.it/GeekSn0w/Releases/Mac_cli/geeksn0w_cli_mac_1.0_d4bdaea1f30d353297d3d4293491f741.zip geeksn0w.it]&lt;br /&gt;
| &lt;br /&gt;
* First version for OS X.&lt;br /&gt;
|-&lt;br /&gt;
! 2.9.1&lt;br /&gt;
| Windows&lt;br /&gt;
| [http://www.geeksn0w.it/GeekSn0w/Releases/Windows/geeksn0w_win_2.9.1_c2d308ebe982521ba066a7299598372e.zip geeksn0w.it]&lt;br /&gt;
|&lt;br /&gt;
* Bundled with Cydia 1.1.12.&lt;br /&gt;
* Minor bug fixes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==How it works==&lt;br /&gt;
Geeksn0w uses msftguy and DevBug's [[SSH Ramdisk]] tool which uses [[geohot]]'s [[limera1n exploit]] to obtain root access. It then installs Cydia and mounts the root filesystem. It then uses [[opensn0w]] to boot the [[iPhone 4]] tethered. Geeksn0w is technically a GUI of [[opensn0w]] and [[SSH Ramdisk|ssh_rd]].&lt;br /&gt;
===The Semi-Tether===&lt;br /&gt;
When the device is booted, it uses a LaunchDaemon to start a script in /gfix that reinstalls MobileSubstrate and PreferenceLoader from a local package and then kills the springboard and remounts the system partition as r/w. At installation time it sets the 'nvram' variable boot-args to true, which prevents [[Recovery Mode]]. However, it reinstalls MobileSubstrate and PreferenceLoader from a local package, which prevents [[saurik]] from updating it. It also kills the [[SpringBoard]] which adds additional boot time, and it remounts the fs after the first [[SpringBoard]]  launch, which may cause other LaunchDaemons that needs r/w at boot time to fail. This is why many people have made their own SemiTether packages that use the 'dirhelper' which is being executed during the boot, to remount the fs and looping through /etc/rc.d and execute every binary there, just like [[evasi0n7]] does, which directly injects MobileSubstrate. They then use 'auto-boot' to prevent [[Recovery Mode]]. This resulting package boots faster and is far more efficient than the way it is currently used by. The reason that Geeksn0w is not an [[untethered jailbreak]], is that there is no kernel exploit. (Also call Semi-Untethered).&lt;br /&gt;
&lt;br /&gt;
==The Semi-Tether==&lt;br /&gt;
*On April 21, 2014, BlackGeek announced on Twitter that he had achieved a [[Tethered_jailbreak#Using_a_tethered_(or_semi-tethered)_jailbreak|Semi-Tethered Jailbreak]] on the iPhone 4 on 7.1&amp;lt;ref&amp;gt;https://twitter.com/blackgeektuto/status/458283310100541441&amp;lt;/ref&amp;gt;. On April 25, BlackGeek updated Geeksn0w to version 2.9 which achieved a semi-tethered jailbreak for 7.1 or 7.1.1. He also added the semi-tether package to his repo (http://geekrepo.beiphone.it) for people who had already jailbroken tethered on 7.1 and wanted to upgrade to Semi-Tethered.&lt;br /&gt;
&lt;br /&gt;
==Exploits==&lt;br /&gt;
*[[geohot]]'s [[Limera1n exploit]] - Tethered&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
*[[Tethered jailbreak]]&lt;br /&gt;
*[[limera1n exploit]]&lt;br /&gt;
*[[opensn0w]]&lt;br /&gt;
*[http://twitter.com/blackgeektuto BlackGeek] on Twitter&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Jailbreaks]]&lt;br /&gt;
[[Category:Jailbreaking]]&lt;/div&gt;</summary>
		<author><name>Xblkx</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Geeksn0w&amp;diff=54543</id>
		<title>Geeksn0w</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Geeksn0w&amp;diff=54543"/>
		<updated>2016-10-11T01:25:25Z</updated>

		<summary type="html">&lt;p&gt;Xblkx: /* Supported Devices and Requirements */  (typo)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{about|the semi-tethered jailbreak for iOS 7.1.x|the untethered jailbreak for iOS 7.1.x|Pangu}}&lt;br /&gt;
{{Infobox software&lt;br /&gt;
| title                  = Geeksn0w&lt;br /&gt;
| logo                   = [[File:Geeksn0w.png|75px]]&lt;br /&gt;
| screenshot             = [[File:Geeksn0w_2.8.2.png|250px]]&lt;br /&gt;
| caption                = Geeksn0w 2.8.2 on Windows 7&lt;br /&gt;
| author                 = [http://twitter.com/blackgeektuto BlackGeek]&lt;br /&gt;
| developer              = [http://twitter.com/blackgeektuto BlackGeek]&lt;br /&gt;
| released               = &lt;br /&gt;
| discontinued           = &lt;br /&gt;
| latest release version = 2.9.1&lt;br /&gt;
| latest release date    = {{Start date and age|2014|6|13|df=yes}}&lt;br /&gt;
| latest preview version = 1.0 beta (CLI)&lt;br /&gt;
| latest preview date    = {{Start date and age|2014|5|1|df=yes}}&lt;br /&gt;
| programming language   = .NET Visual Basic&lt;br /&gt;
| operating system       = [[wikipedia:Microsoft Windows|Windows]] / [[wikipedia:OS X|OS X]]&lt;br /&gt;
| size                   = &lt;br /&gt;
| platform               = &lt;br /&gt;
| language               = [[wikipedia:English|English]]&lt;br /&gt;
| status                 = Active&lt;br /&gt;
| genre                  = Jailbreaking&lt;br /&gt;
| license                = [[wikipedia:Freeware|Freeware]]&lt;br /&gt;
| website                = [http://Geeksn0w.it Geeksn0w.it]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
'''Geeksn0w''' is a [[jailbreak]] program that performs a semi-[[tethered jailbreak]] for the [[iPhone 4]] on iOS 7.1.x.&lt;br /&gt;
&lt;br /&gt;
== Supported Devices and Requirements==&lt;br /&gt;
The only supported devices are those of the [[iPhone 4]]. This is because Geeksn0w uses the [[A4]]-dependent [[limera1n exploit]] and the [[iPhone 4]] is the only A4 device running [[iOS]] 7. Geeksn0w currently only supports Windows (unless you use BootCamp or another VM on your Mac to install Windows). Geeksn0w requires [http://www.oracle.com/technetwork/java/javase/downloads/jdk7-downloads-1880260.html Java Development Kit for 32-bit PCs] and [http://www.microsoft.com/net .NET Framework] installed on your computer to be able to run. Unlike other jailbreak tools (such as [[evasi0n7]]), Geeksn0w does not need iTunes to be installed.&lt;br /&gt;
&lt;br /&gt;
==Versions and Updates==&lt;br /&gt;
Geeksn0w originally performed a [[tethered jailbreak]] on [[iOS]] 7.0 on the [[iPhone 4]] until [[evasi0n7]] was released. BlackGeek then updated Geeksn0w to use the same exploits as [[evasi0n7]] for all devices. Versions 2.5 and above perform a tethered jailbreak on iOS 7.1 for the iPhone 4. Version 2.9 performs a semi-tethered jailbreak on iOS 7.1 and 7.1.1.&lt;br /&gt;
On May 1, 2014, BlackGeek released the Mac beta cli for OS X.&lt;br /&gt;
&lt;br /&gt;
===Download===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center;&amp;quot;&lt;br /&gt;
! Version&lt;br /&gt;
! OS&lt;br /&gt;
! Download&lt;br /&gt;
! Changelog&lt;br /&gt;
|-&lt;br /&gt;
! 2.5&lt;br /&gt;
| class=&amp;quot;noborderplz&amp;quot; rowspan=&amp;quot;8&amp;quot; | [[wikipedia:Microsoft Windows|Windows]]&lt;br /&gt;
| [https://www.mega.co.nz/#!cA0nRQZA!khTx3YZ-Q5nZq2nYaB0dJtLrp16OLaTmi-TUEaBjk0s MEGA]&lt;br /&gt;
| First release that jailbreaks iOS 7.1&lt;br /&gt;
|-&lt;br /&gt;
! 2.6&lt;br /&gt;
| [https://www.mega.co.nz#!YBcCmKTL!ViKwyAzB8k30nly_LBTVnzlH_KK7LUyvTgQMcBOENXs MEGA]&lt;br /&gt;
| Bug fixes&lt;br /&gt;
|-&lt;br /&gt;
! 2.7&lt;br /&gt;
| [https://www.mediafire.com/download/1j4q76u9bm24wc0/geeksn0w_win_2.7_ea343bc6ca7b07ad662e2c4b3e0cefa.zip MediaFire]&lt;br /&gt;
| &lt;br /&gt;
* Added official Cydia 1.1.9 build&lt;br /&gt;
* Fixed Mail, Safari, Calculator and Weather crash after doing a tethered boot (SandBox fix)&lt;br /&gt;
* Added auto-Hacktivation for locked iPhones&lt;br /&gt;
* Fixed a bug in the Progress Bar&lt;br /&gt;
* Added iDevice arch finder: now GeekSn0w can auto-detect your iPhone model&lt;br /&gt;
* Improved speed of root_fs mount&lt;br /&gt;
* Fixed mount.sh error&lt;br /&gt;
* Reduced the .exe size&lt;br /&gt;
* Speeded up the Jailbreak process&lt;br /&gt;
* Added AFC2 protocol (iFunBox, iExplorer)&lt;br /&gt;
|-&lt;br /&gt;
! 2.8&lt;br /&gt;
| [http://www.geeksn0w.it/GeekSn0w/Releases/Windows/geeksn0w_win_2.8_7c148dc55660b4466dade25aa19bb.zip geeksn0w.it]&lt;br /&gt;
| &lt;br /&gt;
* Fixed a huge bug of GeekSn0w's dfuarch extension&lt;br /&gt;
|-&lt;br /&gt;
! 2.8.1&lt;br /&gt;
| [http://www.geeksn0w.it/GeekSn0w/Releases/Windows/geeksn0w_win_2.8.1_0b65917a7fd23e279ac97763338ecf.zip geeksn0w.it]&lt;br /&gt;
| &lt;br /&gt;
* Removed &amp;quot;dfuarch&amp;quot;, now GeekSn0w uses iRecovery to identify the iPhone model&lt;br /&gt;
* Fixed &amp;quot;New Curses&amp;quot; installation error&lt;br /&gt;
|-&lt;br /&gt;
! 2.8.2&lt;br /&gt;
| [http://www.geeksn0w.it/GeekSn0w/Releases/Windows/geeksn0w_2.8.2_win_c7e3b8f62934143a93e69042c9de96f.zip geeksn0w.it]&lt;br /&gt;
| &lt;br /&gt;
* Fixed an issue with iPhone 3,2 and 3,3 Jailbreak's process&lt;br /&gt;
|-&lt;br /&gt;
! 2.8.3&lt;br /&gt;
| [http://www.geeksn0w.it/GeekSn0w/Releases/Windows/geeksn0w_win_2.8.3_3f17cffb2b38bc34a5d3dae91da8c2b.zip geeksn0w.it]&lt;br /&gt;
| &lt;br /&gt;
* Fixed an issue with New Curses installation&lt;br /&gt;
|-&lt;br /&gt;
! 2.9&lt;br /&gt;
| [http://www.geeksn0w.it/GeekSn0w/Releases/Windows/geeksn0w_win_2.9_6322a7e8d3b4bfefe9f585beb7d6d4a5.zip geeksn0w.it]&lt;br /&gt;
|&lt;br /&gt;
* Updated Jailbreak payload: GeekSn0w now executes a [[Tethered jailbreak|Semi-Tethered Jailbreak]]&lt;br /&gt;
* Updated .NET Framework version of some resources&lt;br /&gt;
* Removed Respring after any reboot: now all the hack stuff is executed during Apple Logo stage&lt;br /&gt;
* Supports iOS 7.1.1&lt;br /&gt;
|-&lt;br /&gt;
! 1.0 beta (cli)&lt;br /&gt;
| [[wikipedia:OS X|OS X]]&lt;br /&gt;
| [http://www.geeksn0w.it/GeekSn0w/Releases/Mac_cli/geeksn0w_cli_mac_1.0_d4bdaea1f30d353297d3d4293491f741.zip geeksn0w.it]&lt;br /&gt;
| &lt;br /&gt;
* First version for OS X.&lt;br /&gt;
|-&lt;br /&gt;
! 2.9.1&lt;br /&gt;
| Windows&lt;br /&gt;
| [http://www.geeksn0w.it/GeekSn0w/Releases/Windows/geeksn0w_win_2.9.1_c2d308ebe982521ba066a7299598372e.zip geeksn0w.it]&lt;br /&gt;
|&lt;br /&gt;
* Bundled with Cydia 1.1.12.&lt;br /&gt;
* Minor bug fixes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==How it works==&lt;br /&gt;
Geeksn0w uses msftguy and DevBug's [[SSH Ramdisk]] tool which uses [[geohot]]'s [[limera1n exploit]] to obtain root access. It then installs Cydia and mounts the root filesystem. It then uses [[opensn0w]] to boot the [[iPhone 4]] tethered. Geeksn0w is technically a GUI of [[opensn0w]] and [[SSH Ramdisk|ssh_rd]].&lt;br /&gt;
===The Semi-Tether===&lt;br /&gt;
When the device is booted, it uses a LaunchDaemon to start a script in /gfix that reinstalls MobileSubstrate and PreferenceLoader from a local package and then kills the springboard and remounts the system partition as r/w. At installation time it sets the 'nvram' variable boot-args to true, which prevents [[Recovery Mode]]. However, it reinstalls MobileSubstrate and PreferenceLoader from a local package, which prevents [[saurik]] from updating it. It also kills the [[SpringBoard]] which adds additional boot time, and it remounts the fs after the first [[SpringBoard]]  launch, which may cause other LaunchDaemons that needs r/w at boot time to fail. This is why many people have made their own SemiTether packages that use the 'dirhelper' which is being executed during the boot, to remount the fs and looping through /etc/rc.d and execute every binary there, just like [[evasi0n7]] does, which directly injects MobileSubstrate. They then use 'auto-boot' to prevent [[Recovery Mode]]. This resulting package boots faster and is far more efficient than the way it is currently used by. The reason that Geeksn0w is not an [[untethered jailbreak]], is that there is no kernal exploit. (Also call Semi-Untethered).&lt;br /&gt;
&lt;br /&gt;
==The Semi-Tether==&lt;br /&gt;
*On April 21, 2014, BlackGeek announced on Twitter that he had achieved a [[Tethered_jailbreak#Using_a_tethered_(or_semi-tethered)_jailbreak|Semi-Tethered Jailbreak]] on the iPhone 4 on 7.1&amp;lt;ref&amp;gt;https://twitter.com/blackgeektuto/status/458283310100541441&amp;lt;/ref&amp;gt;. On April 25, BlackGeek updated Geeksn0w to version 2.9 which achieved a semi-tethered jailbreak for 7.1 or 7.1.1. He also added the semi-tether package to his repo (http://geekrepo.beiphone.it) for people who had already jailbroken tethered on 7.1 and wanted to upgrade to Semi-Tethered.&lt;br /&gt;
&lt;br /&gt;
==Exploits==&lt;br /&gt;
*[[geohot]]'s [[Limera1n exploit]] - Tethered&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
*[[Tethered jailbreak]]&lt;br /&gt;
*[[limera1n exploit]]&lt;br /&gt;
*[[opensn0w]]&lt;br /&gt;
*[http://twitter.com/blackgeektuto BlackGeek] on Twitter&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Jailbreaks]]&lt;br /&gt;
[[Category:Jailbreaking]]&lt;/div&gt;</summary>
		<author><name>Xblkx</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=ITunes_Backup&amp;diff=54436</id>
		<title>ITunes Backup</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=ITunes_Backup&amp;diff=54436"/>
		<updated>2016-09-26T06:40:51Z</updated>

		<summary type="html">&lt;p&gt;Xblkx: /* Location BPList */ correct typo (dcit--&amp;gt;dict)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}&lt;br /&gt;
The following description is to describe the '''backup system of [[iTunes]]''', which is often used for forensic analysis of iDevices. This description is for the format used in iTunes 10.5.3 an newer - older versions are slightly different (see [[Understanding iPhone Backup Files]]). The description is for non-encrypted backups only.&lt;br /&gt;
&lt;br /&gt;
On the iDevice the file &amp;lt;code&amp;gt;/System/Library/Backup/Domains.plist&amp;lt;/code&amp;gt; determines what files to backup. There is a differentiation between &amp;quot;domains&amp;quot; and relative files.&lt;br /&gt;
&lt;br /&gt;
In the backup location (see below) there are all backups that iTunes has made so far. Every backup folder name corresponds to the [[UDID]] of the device for a full backup. A differential backup has the same folder name, but appened with a dash and the ISO date of the backup (8 digit yyyymmdd) and a dash and the time in 24-hour format with seconds.&lt;br /&gt;
&lt;br /&gt;
In each backup, there are four files with infos, which are described later:&lt;br /&gt;
*Info.plist&lt;br /&gt;
*Manifest.mdbd&lt;br /&gt;
*Manifest.plist&lt;br /&gt;
*Status.plist&lt;br /&gt;
There are also the files themselves, but with a new file name.&lt;br /&gt;
&lt;br /&gt;
The file names are made by a SHA-1 hash of their name, together with their path and domain. Between the domain and the path there is a dash. Example:&lt;br /&gt;
 SHA1('HomeDomain-Library/SMS/sms.db') = 3d0d7e5fb2ce288813306e4d4636395e047a3d28&lt;br /&gt;
It is not clear what would happen in case of hash collisions. Probably Apple assumes it won't happen.&lt;br /&gt;
&lt;br /&gt;
The data itself is encrypted with AES-256 CBC.&lt;br /&gt;
&lt;br /&gt;
===iTunes backup location===&lt;br /&gt;
*Windows XP: &amp;lt;code&amp;gt;%HOMEPATH%\Application Data\Apple Computer\MobileSync\Backup\{UDID}&amp;lt;/code&amp;gt;&lt;br /&gt;
*Windows Vista/7/8: &amp;lt;code&amp;gt;%HOMEPATH%\AppData\Roaming\Apple Computer\MobileSync\Backup\{UDID}&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;%APPDATA%\Apple Computer\MobileSync\Backup\{UDID}&amp;lt;/code&amp;gt;&lt;br /&gt;
*OS X: &amp;lt;code&amp;gt;~/Library/Application Support/MobileSync/Backup/{UDID}&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Info.plist ===&lt;br /&gt;
This is a plaintext plist that contains the following dict:&lt;br /&gt;
*Build Version (string): 9A406 (iOS build version of the device that was backed up)&lt;br /&gt;
*Device Name (string): (name of the device that was backed up)&lt;br /&gt;
*Display Name (string): (name of the device that was backed up)&lt;br /&gt;
*GUID (string): unknown 16-byte GUID without any dashes&lt;br /&gt;
*ICCID (string)&lt;br /&gt;
*IMEI (string)&lt;br /&gt;
*Last Backup Date (date): format &amp;quot;yyyy-mm-ddThh:mm:ssZ&amp;quot;&lt;br /&gt;
*Phone Number (string)&lt;br /&gt;
*Product Type (string): iPhone4,1&lt;br /&gt;
*Product Version (string): 5.0.1&lt;br /&gt;
*Serial Number (string)&lt;br /&gt;
*Sync Settings (dict):&lt;br /&gt;
**Calendar Day Limit (integer): 30&lt;br /&gt;
**Calendars Collections: (array of dict, 1 element):&lt;br /&gt;
***AMSCollectionDisplayName (string): Calendar&lt;br /&gt;
***AMSCollectionFiltered (bool): false&lt;br /&gt;
***AMSCollectionName (string): Calendar&lt;br /&gt;
***AMSCollectionReadOnly (bool): false&lt;br /&gt;
**Data Class Info: (array of dict, 5 elements)&lt;br /&gt;
***[0] dict:&lt;br /&gt;
****kAMSDataClassEnabled (bool): false&lt;br /&gt;
****kAMSDataClassName (string): com.apple.Bookmarks&lt;br /&gt;
****kAMSDataClassReset (bool): false&lt;br /&gt;
***[1] dict:&lt;br /&gt;
****kAMSDataClassEnabled (bool): false&lt;br /&gt;
****kAMSDataClassName (string): com.apple.Calendars&lt;br /&gt;
****kAMSDataClassReset (bool): false&lt;br /&gt;
***[2] dict:&lt;br /&gt;
****kAMSDataClassEnabled (bool): false&lt;br /&gt;
****kAMSDataClassName (string): com.apple.Accounts&lt;br /&gt;
****kAMSDataClassReset (bool): false&lt;br /&gt;
***[3] dict:&lt;br /&gt;
****kAMSDataClassEnabled (bool): false&lt;br /&gt;
****kAMSDataClassName (string): com.apple.MailAccounts&lt;br /&gt;
****kAMSDataClassReset (bool): false&lt;br /&gt;
***[4] dict:&lt;br /&gt;
****kAMSDataClassEnabled (bool): true&lt;br /&gt;
****kAMSDataClassName (string): com.apple.Notes&lt;br /&gt;
****kAMSDataClassReset (bool): false&lt;br /&gt;
**New Record Calendar Name (string): Home&lt;br /&gt;
**iTunes User ID (string): (8-byte hex code)&lt;br /&gt;
*Target Identifier (string): 20-byte hex code&lt;br /&gt;
*Terget Type (string): Device&lt;br /&gt;
*Unique Identifier (string): same 20-byte hex code&lt;br /&gt;
*iBooks Data 2 (data): (base-64 encoded blob, see below)&lt;br /&gt;
*iTunes Files (dict):&lt;br /&gt;
**IC-Info.siv (data): (base-64 encoded blob, see below)&lt;br /&gt;
**PhotosFolderAlbums (data): (base-64 encoded blob, see below)&lt;br /&gt;
**PhotosFolderName (data): (base-64 encoded blob, see below)&lt;br /&gt;
**PhotosFolderPrefs (data): (base-64 encoded blob, see below)&lt;br /&gt;
**ShowMarketing (data): (empty)&lt;br /&gt;
**iTunesPrefs (data): (base-64 encoded blob, see below)&lt;br /&gt;
**iTunesPrefs.plist (data): (base-64 encoded blob, see below)&lt;br /&gt;
*iTunes Settings (dict):&lt;br /&gt;
**LibraryApplications (array of string): The array of string contains the identification string of each application, for example &amp;lt;code&amp;gt;com.apple.store.caseprogram&amp;lt;/code&amp;gt;&lt;br /&gt;
*iTunes Version (string): 10.5.3&lt;br /&gt;
&lt;br /&gt;
==== iBooks Data 2 ====&lt;br /&gt;
This blob is actually another plist (dict):&lt;br /&gt;
*1.2 (dict):&lt;br /&gt;
**BKBookmark (array of dict):&lt;br /&gt;
***[0] dict:&lt;br /&gt;
****bookDatabaseKey (string)&lt;br /&gt;
****date (integer)&lt;br /&gt;
****deletedFlag (bool)&lt;br /&gt;
****highlightColor (integer)&lt;br /&gt;
****lastModification (integer)&lt;br /&gt;
****locationBPlist (data): (base-64 encoded blob, see below)&lt;br /&gt;
****ordinal (integer)&lt;br /&gt;
****serverSyncUniqueId (string): Reading Location&lt;br /&gt;
****type (integer): 1&lt;br /&gt;
*CollectionsData-1.2 (dict):&lt;br /&gt;
**BKCollection (array of 2 dict):&lt;br /&gt;
***[0] dict:&lt;br /&gt;
****databaseKeys (array): (empty)&lt;br /&gt;
****lastModification_Since1970 (integer)&lt;br /&gt;
****ServerSyncUniqueId (string): Pdfs_Collenction_ID&lt;br /&gt;
****sortKey (integer): -2&lt;br /&gt;
****title (string): PDFs&lt;br /&gt;
***[1] dict:&lt;br /&gt;
****databaseKeys (array): (empty)&lt;br /&gt;
****lastModification_Since1970 (integer)&lt;br /&gt;
****ServerSyncUniqueId (string): Pdfs_Collenction_ID&lt;br /&gt;
****sortKey (integer): -1&lt;br /&gt;
****title (string): Books&lt;br /&gt;
**rolling_version (integer): 17&lt;br /&gt;
&lt;br /&gt;
===== Location BPList =====&lt;br /&gt;
This is actually a binary plist with the following content (dict): (example):&lt;br /&gt;
*class (string): BKEpubLocation&lt;br /&gt;
*endOffset (real): 0,0&lt;br /&gt;
*endPath (array of dict):&lt;br /&gt;
**[0] dict&lt;br /&gt;
***id (string): seeAlsoSection&lt;br /&gt;
***index (integer): 32&lt;br /&gt;
***tagName (string): div&lt;br /&gt;
**[1] dict&lt;br /&gt;
***index (integer): 3&lt;br /&gt;
***tagName (string): p&lt;br /&gt;
*startOffset (real): 0.0&lt;br /&gt;
*startPath (array of dict):&lt;br /&gt;
**[0] dict:&lt;br /&gt;
***id (string): seeAlsoSection&lt;br /&gt;
***index (integer): 32&lt;br /&gt;
***tagName (string): div&lt;br /&gt;
**[1] dict:&lt;br /&gt;
***index (integer): 3&lt;br /&gt;
***tagName (string): p&lt;br /&gt;
*super (dict):&lt;br /&gt;
**class (string): BKLocation&lt;br /&gt;
**ordinal (integer): 3&lt;br /&gt;
&lt;br /&gt;
==== IC-Info.siv ====&lt;br /&gt;
binary file, content unknown&lt;br /&gt;
&lt;br /&gt;
==== PhotosFolderAlbums ====&lt;br /&gt;
[[frpd]] binary file. Starts with 0x66 0x72 0x70 0x64 ('frpd'). Then only very few bytes and the content is mostly zero. Then at 0x68 and 0x26C, 0x470, 0x674, etc. there are folder names (in unicode, starting with the name length).&lt;br /&gt;
&lt;br /&gt;
==== PhotosFolderName ====&lt;br /&gt;
A 0x200 byte long file, starting with the text &amp;quot;Pictures&amp;quot; (in unicode) and the name length before it. Rest filled with zeroes.&lt;br /&gt;
&lt;br /&gt;
==== iTunesPrefs ====&lt;br /&gt;
This is another [[frpd]] file. It contains names of computers found on the network, like iPodPrefs below.&lt;br /&gt;
&lt;br /&gt;
==== iTunesPrefs.plist ====&lt;br /&gt;
plist with this content (dict):&lt;br /&gt;
*ApplicationIDs (array of string): list of applications (like &amp;lt;code&amp;gt;com.apple.iBooks&amp;lt;/code&amp;gt;&lt;br /&gt;
*AudiobookPlaylistIDs (array): (empty)&lt;br /&gt;
*AudioTrackIDs (array): (empty)&lt;br /&gt;
*BookTrackIDs (array of integer): (signed long integer values)&lt;br /&gt;
*LibraryBookTrackIDs (array of integer): (signed long integer values)&lt;br /&gt;
*MoviePlaylistIDs (array): (empty)&lt;br /&gt;
*MovieTrackIDs (array): (empty)&lt;br /&gt;
*MusicAlbumIDs (array): (empty)&lt;br /&gt;
*MusicArtistIDs (array): (empty)&lt;br /&gt;
*MusicGenreNames (array): (empty)&lt;br /&gt;
*MusicPlaylistIDs (array of integer): (signed long integer values)&lt;br /&gt;
*MusicTrackIDs (array): (empty)&lt;br /&gt;
*PodcastChannelIDs (array): (empty)&lt;br /&gt;
*PodcastPlaylistIDs (array): (empty)&lt;br /&gt;
*PodcastTrackIDs (array of integer): (signed long integer values)&lt;br /&gt;
*RingtoneTrackIDs (array): (empty)&lt;br /&gt;
*TVShowAlbumIDs (array): (empty)&lt;br /&gt;
*TVShowNames (array): (empty)&lt;br /&gt;
*TVShowPlaylistIDs (array): (empty)&lt;br /&gt;
*TVShowTrackIDs (array): (empty)&lt;br /&gt;
*iPodPrefs (data): (base-64 encoded blob, see below)&lt;br /&gt;
*iTunesUChannelIDs (array): (empty)&lt;br /&gt;
*iTunesUPlaylistIDs (array): (empty)&lt;br /&gt;
*iTunesUTrackIDs (array): (empty)&lt;br /&gt;
&lt;br /&gt;
===== iPodPrefs =====&lt;br /&gt;
[[frpd]] file, content unknown, but it contains server names on the network it was sync'd to, like iTunesPrefs above.&lt;br /&gt;
&lt;br /&gt;
=== Manifest.mbdb ===&lt;br /&gt;
Binary file containing many text strings. Probably a database of file names in the backup. Format (from [http://code.google.com/p/iphonebackupbrowser/wiki/MbdbMbdxFormat here]):&lt;br /&gt;
==== Header ====&lt;br /&gt;
 6 bytes: 'mbdb\5\0'&lt;br /&gt;
==== Record (variable size) ====&lt;br /&gt;
 string Domain        Backup domain (one of&lt;br /&gt;
                        &amp;quot;AppDomain-com.some.user.installed.app&amp;quot;,&lt;br /&gt;
                        &amp;quot;CameraRollDomain&amp;quot;,&lt;br /&gt;
                        &amp;quot;DatabaseDomain&amp;quot;&lt;br /&gt;
                        &amp;quot;HomeDomain&amp;quot;,&lt;br /&gt;
                        &amp;quot;KeychainDomain&amp;quot;,&lt;br /&gt;
                        &amp;quot;ManagedPreferencesDomain&amp;quot;,&lt;br /&gt;
                        &amp;quot;MediaDomain&amp;quot;,&lt;br /&gt;
                        &amp;quot;MobileDeviceDomain&amp;quot;,&lt;br /&gt;
                        &amp;quot;RootDomain&amp;quot;,&lt;br /&gt;
                        &amp;quot;SystemPreferencesDomain&amp;quot;,&lt;br /&gt;
                        &amp;quot;WirelessDomain&amp;quot;,&lt;br /&gt;
                        ... others?&lt;br /&gt;
 string Path              &lt;br /&gt;
 string LinkTarget    absolute path&lt;br /&gt;
 string DataHash      SHA-1 of file contents, actual file objects only&lt;br /&gt;
 string encryptionKey      Encryption key for encrypted backups&lt;br /&gt;
 uint16 Mode           Unix file permissions. See /usr/include/stat.h  and stat(2)&lt;br /&gt;
                                file mode: 0xAxxx symbolic link (aka S_IFLNK or 00120000)&lt;br /&gt;
                                 0x4xxx directory (aka S_IFDIR or 0040000)&lt;br /&gt;
                                 0x8xxx regular file (aka S_IFREG or 0100000)&lt;br /&gt;
                                Mask out ~ 0xf000 (aka S_IFMT) for file permissions&lt;br /&gt;
 uint32 inode         inode number&lt;br /&gt;
 uint32 uid             owner    &lt;br /&gt;
 uint32 gid             group&lt;br /&gt;
 uint32 mtime        time of last modification&lt;br /&gt;
 uint32 atime         time of last access&lt;br /&gt;
 uint32 ctime         time of last change of status&lt;br /&gt;
 uint64 length        file size (always 0 for link or directory)&lt;br /&gt;
 uint8  protectionclass         unknown&lt;br /&gt;
 uint8  PropertyCount number of properties following&lt;br /&gt;
Property is a couple of strings:&lt;br /&gt;
 string name&lt;br /&gt;
 string value         can be a string or aa binary content&lt;br /&gt;
All values are big endian, strings are composed of a uint16 that contains the length or 0xffff for NULL, then the characters in UTF-8 with canonical decomposition (Unicode normalization form D).&lt;br /&gt;
&lt;br /&gt;
To determine the actual filename corresponding to a record (this will be the actual file in the mobile backup directory), calculate a sha-1 checksum of the Domain and Path seperated by '-' as follows:&lt;br /&gt;
        SHA1(&amp;lt;Domain&amp;gt;-&amp;lt;Path&amp;gt;)&lt;br /&gt;
&lt;br /&gt;
It is possible to modify files in a mobile backup by understanding this structure as well. If you change the file contents, update the DataHash and length&lt;br /&gt;
&lt;br /&gt;
=== Manifest.plist ===&lt;br /&gt;
Binary plist with the following content (dict):&lt;br /&gt;
*Applications (dict):&lt;br /&gt;
**com.apple.iBooks (dict)&lt;br /&gt;
***CFBundleIdentifier (string): com.apple.iBooks&lt;br /&gt;
***CFBundleVersion (string): 804&lt;br /&gt;
***Path (string): /private/var/mobile/Applications/[GUID]/iBooks.app&lt;br /&gt;
**etc. for other apps&lt;br /&gt;
*BackupKeyBag (data): (base-64 encoded blob, see below)&lt;br /&gt;
*Date (date): yyyy-mm-ddThh:mm:ssZ&lt;br /&gt;
*IsEncrypted (bool): false&lt;br /&gt;
*Lockdown (dict):&lt;br /&gt;
**BuildVersion (string): 9A406&lt;br /&gt;
**DeviceName (string)&lt;br /&gt;
**ProductType (string): iPhone4,1&lt;br /&gt;
**ProductVersion (string): 5.0.1&lt;br /&gt;
**SerialNumber (string)&lt;br /&gt;
**UniqueDeviceID (string): 20-byte hex&lt;br /&gt;
**com.apple.Accessibility (dict):&lt;br /&gt;
***InvertDisplayEnabledByiTunes (bool): false&lt;br /&gt;
***MonoAudioEnabledByiTunes (bool): false&lt;br /&gt;
***VoiceOverTouchEnabledByiTunes (bool): false&lt;br /&gt;
***ZoomTouchEnabledByiTunes (bool): false&lt;br /&gt;
**com.apple.MobileDeviceCrashCopy (dict):&lt;br /&gt;
***ShouldPrompt (bool): false&lt;br /&gt;
***ShouldSubmit (bool): false&lt;br /&gt;
**com.apple.TerminalFlashr (dict): (empty)&lt;br /&gt;
**com.apple.iTunes.backup (dict):&lt;br /&gt;
***LastBackupComputerName (string)&lt;br /&gt;
***LastBackupComputerType (string): PC&lt;br /&gt;
**com.apple.itunesstored (dict):&lt;br /&gt;
***AccountAvailableServiceTypes (integer): 0&lt;br /&gt;
***AccountKind (integer): 0&lt;br /&gt;
***AccountServiceTypes (integer): 0&lt;br /&gt;
***AccountSocialEnabled (bool): false&lt;br /&gt;
***AccountStoreFront (string): (unknown text string)&lt;br /&gt;
***AccountURLBagType (string): production&lt;br /&gt;
***AppleID (string)&lt;br /&gt;
***CreditDisplayString (string): (empty string)&lt;br /&gt;
***DSPersonID (integer)&lt;br /&gt;
***TempStorefront (string): (unknown text string)&lt;br /&gt;
**com.apple.mobile.data_sync (dict):&lt;br /&gt;
***Bookmarks (dict):&lt;br /&gt;
****AccountNames (array of string, 1 element): iCloud&lt;br /&gt;
****Sources (array of string, 1 element): iCloud&lt;br /&gt;
***Calendars (dict):&lt;br /&gt;
****AccountNames (array of string, 1 element): iCloud&lt;br /&gt;
****Sources (array of string, 1 element): iCloud&lt;br /&gt;
***Contacts (dict):&lt;br /&gt;
****AccountNames (array of string, 1 element): iCloud&lt;br /&gt;
****Sources (array of string, 1 element): iCloud&lt;br /&gt;
**com.apple.mobile.iTunes.accessories (dict): (empty)&lt;br /&gt;
**com.apple.mobile.wireless_lockdown (dict): (empty)&lt;br /&gt;
*SystemDomainsVersion (string): 12.0&lt;br /&gt;
*Version (string): 9.0&lt;br /&gt;
*WasPasscodeSet (bool): false&lt;br /&gt;
&lt;br /&gt;
==== BackupKeyBag ====&lt;br /&gt;
Binary file in the following format:&lt;br /&gt;
*4-byte block identifier&lt;br /&gt;
*4-byte block length (most significant byte first), length 4 means total block length of 0xC bytes.&lt;br /&gt;
*data&lt;br /&gt;
First block is &amp;quot;VERS&amp;quot; with a version number of 3. There are a lot of block types: VERS, TYPE, UUID, HMCK, WRAP, SALT, ITER, UUID, CLAS, WRAP, KTYP, WPKY, etc.&lt;br /&gt;
&lt;br /&gt;
=== Status.plist ===&lt;br /&gt;
Binary plist with the following content (dict):&lt;br /&gt;
*BackupState (string): new&lt;br /&gt;
*Date (date): &amp;quot;yyyy-mm-ddThh:mm:ssZ&amp;quot;&lt;br /&gt;
*IsFullBackup (bool): false&lt;br /&gt;
*SnapshotState (string): finished&lt;br /&gt;
*UUID (string)&lt;br /&gt;
*Version (string): 2.4&lt;br /&gt;
&lt;br /&gt;
== Files ==&lt;br /&gt;
Here is a list of commonly used files:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;font-size: small; text-align: center; table-layout: fixed; border-collapse: collapse;&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
!domain&lt;br /&gt;
!path and file name&lt;br /&gt;
!SHA-1 backup file name&lt;br /&gt;
|-&lt;br /&gt;
|HomeDomain&lt;br /&gt;
|[[Messages#Serialization|Library/SMS/sms.db]]&lt;br /&gt;
|3d0d7e5fb2ce288813306e4d4636395e047a3d28&lt;br /&gt;
|-&lt;br /&gt;
|HomeDomain&lt;br /&gt;
|Library/AddressBook/AddressBook.sqlitedb&lt;br /&gt;
|31bb7ba8914766d4ba40d6dfb6113c8b614be442&lt;br /&gt;
|-&lt;br /&gt;
|HomeDomain&lt;br /&gt;
|[[Notes|Library/Notes/notes.sqlite]]&lt;br /&gt;
|ca3bc056d4da0bbf88b5fb3be254f3b7147e639c&lt;br /&gt;
|-&lt;br /&gt;
|WirelessDomain&lt;br /&gt;
|[[Call History Database|Library/CallHistory/call_history.db]]&lt;br /&gt;
|2b2b0084a1bc3a5ac8c27afdf14afb42c61a19ca&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
*[[:/System/Library/Backup]]&lt;br /&gt;
*[[Understanding iPhone Backup Files]]&lt;br /&gt;
*[http://www.ssddfj.org/papers/SSDDFJ_V4_1_Bader_Bagilli.pdf iPhone 3GS Forensics]&lt;br /&gt;
*[http://www.scip.ch/?labs.20110512 SCIP backup infos (german only)]&lt;br /&gt;
*[http://stackoverflow.com/questions/6569004/how-to-parse-the-manifest-mbdb-file-in-an-ios-5-0-beta-2-without-manifest-mbdx SHA-1 hash generation]&lt;br /&gt;
*[http://code.google.com/p/iphonebackupbrowser/wiki/MbdbMbdxFormat description of mbdx and mbdb files]&lt;br /&gt;
&lt;br /&gt;
[[Category:File Formats]]&lt;/div&gt;</summary>
		<author><name>Xblkx</name></author>
		
	</entry>
</feed>