https://www.theiphonewiki.com/w/api.php?action=feedcontributions&user=B-mac+39&feedformat=atomThe iPhone Wiki - User contributions [en]2024-03-28T20:19:02ZUser contributionsMediaWiki 1.31.14https://www.theiphonewiki.com/w/index.php?title=Limera1n&diff=16813Limera1n2011-03-14T13:00:25Z<p>B-mac 39: /* Controversy */</p>
<hr />
<div>{{lowercase}}<br />
[[Image:Ra1ndrop.png|right]]<br />
This is [[User:Geohot|geohot]]'s [[jailbreak]] utility. It uses an [[Limera1n Exploit|undisclosed bootrom exploit]] and [[User:Comex|comex]]'s [[Packet Filter Kernel Exploit]] to achieve an [[untethered jailbreak]] on newer devices. The following devices are technically supported:<br />
* [[n88ap|iPhone 3GS]]<br />
* [[n90ap|iPhone 4]]<br />
* [[n18ap|iPod touch 3G]]<br />
* [[n81ap|iPod touch 4G]]<br />
* [[k48ap|iPad]]<br />
* [[k66ap|AppleTV 2G]] (creates a bare-bones jailbreak by mounting '/' as read/write in /etc/fstab)<br />
limera1n has been demonstrated multiple times by [[User:Geohot|geohot]], using blog posts on his now private blog. [[User:Geohot|Geohot]] [http://1.bp.blogspot.com/_NJ4JFBfr1tY/TDgkAsTQEmI/AAAAAAAAAcw/ZNHDxMNNL4Y/s1600/iphone4.png showed off a high-res picture of Cydia on an iPhone 4]. He [http://www.youtube.com/watch?v=__TR86PLiHw displayed an iPod touch 3G with an untethered jailbreak] that met MuscleNerd's requirements for a good video. In addition, he took a [http://4.bp.blogspot.com/_NJ4JFBfr1tY/S7_OvGMqJMI/AAAAAAAAAcE/R5WLrCizGw0/s1600/ipad_jb.jpg picture of Cydia and blackra1n icons on his iPad's SpringBoard].<br />
<br />
'''Release Date:''' [[Timeline#October|October 9, 2010]]<br />
<br />
'''Supported OS's:''' Mac OS X, Windows<br />
<br />
'''Supported Operations:''' [[hacktivation]], [[jailbreak]]ing<br />
<br />
<br />
==Release text==<br />
<div style="text-align: center">limera1n, 6 months in the making<br /><br />
iPhone 3GS, iPod Touch 3G, iPad, iPhone 4, iPod Touch 4G<br /><br />
4.0-4.1 and beyond+++<br /><br />
limera1n is unpatchable<br /><br />
untethered thanks to jailbreakme star '''comex'''<br /><br />
brought to you by '''geohot'''<br /><br />
hacktivates<br /><br />
Mac coming in 7 years<br /><br />
donations keep support alive<br /><br />
zero pictures of my face</div><br />
<br />
==Credit==<br />
* '''[[User:Geohot|geohot]]''' - The program itself, and the bootrom exploit.<br />
* '''[[User:Comex|comex]]''' - The userland exploit that allows limera1n to run [[untethered jailbreak|untethered]].<br />
<br />
==Changelog==<br />
{| class="wikitable" style="border-collapse:collapse;" border="1"<br />
|-<br />
|<center>'''Version'''</center><br />
|<center>'''Release time'''</center><br />
|<center>'''MD5 Hash'''</center><br />
|<center>'''Change comment'''</center><br />
|-<br />
|BETA 1<br />
|9 Oct 2010 XX:XX GMT<br />
|2f2b09a6ed5c5613d5361d8a9d0696b6<br />
|First release.<br />
|-<br />
|BETA 2<br />
|10 Oct 2010 XX:XX GMT<br />
|a70dccb3dfc0e505687424184dc3d1ce<br />
|Fixed kernel patching magic. Rerun BETA2+ over BETA1.<br />
|-<br />
|BETA 3<br />
|10 Oct 2010 XX:XX GMT<br />
|81730090f7de1576268ee8c2407c3d35<br />
|Fixed an issue with [[N88ap|iPhone 3GS]] ([[iBoot-359.3.2|new bootrom]])<br />
|-<br />
|BETA 4<br />
|10 Oct 2010 XX:XX GMT<br />
|d901c4b3a544983f095b0d03eb94e4db<br />
|Uninstall fixed, respring fixed<br />
|-<br />
|RC1<br />
|11 Oct 2010 XX:XX GMT<br />
|0622d99ffe4c25f75c720a689853845f<br />
|out of beta! afc2, reliability improvements, no reboot for cydia, 2kb smaller<br />
|-<br />
|RC1b<br />
|11 Oct 2010 XX:XX GMT<br />
|fc6f7d696a57c3baede49bdff8a7f43f<br />
|addresses an install issue, mainly with iPads<br />
|-<br />
|Final<br />
|11 Oct 2010 23:XX GMT<br />
|fc6f7d696a57c3baede49bdff8a7f43f<br />
|(same as RC1b)<br />
|}<br />
<br />
==Technical Information==<br />
=== Basics ===<br />
* limera1n has nothing to do with SHAtter at all.<br />
* limera1n uses a bootrom exploit to achieve the [[tethered jailbreak]] and unsigned code execution.<br />
* limera1n uses a userland exploit to make it untethered, which was developed by [[User:Comex|comex]].<br />
* limera1n uses a hacktivation dylib to perform hacktivation.<br />
=== Exploits ===<br />
limera1n reuses the usb_control_msg(0x21,2) but exploits a different vulnerability.<br />
=== Process ===<br />
The jailbreak appears to execute something like the following (in no particular order):<br />
* In recovery1,<br />
"setenv debug-uarts 1<br />
setenv auto-boot false<br />
saveenv"<br />
* In [[DFU Mode]], it uploads a [[payload]].<br />
* In recovery2, it uploads another [[payload]] and its [[ramdisk]].<br />
"setenv auto-boot true<br />
reset<br />
geohot done"<br />
<br />
=== Interesting Messages ===<br />
"geohot black is the new purple"<br />
<br />
"blackra1n start: %d current IRQ mask is %8.8X<br />
usb irq disabled...shhh<br />
fxns found @ %8.8X %8.8X<br />
found iBoot @ %8.8X<br />
i'm back from IRQland...<br />
3g detected, kicking nor<br />
nor kicked<br />
memcpy done<br />
iBoot restored!!!<br />
found command table @ %8.8X<br />
cmd_geohot added<br />
time to pray...%8.8X"<br />
<br />
"2.2X send command(%d): %s<br />
send exploit!!!<br />
sent data to copy: %X<br />
sent shellcode: %X has real length %X<br />
never freed: %X<br />
sent fake data to timeout: %X<br />
sent exploit to heap overflow: %X<br />
sending file with length: 0x%X Mingw runtime failure:<br />
VirtualQuery failed for %d bytes at address %p Unknown pseudo relocation protocol version %d.<br />
Unknown pseudo relocation bit size %d."<br />
<br />
==Controversy==<br />
The release of this jailbreak was specifically designed to pressure [[Chronic Dev (team)]] into not releasing SHAtter, but to instead implement the limera1n exploit into [[Greenpois0n (jailbreak)|greenpois0n]]; after releasing limera1n, releasing SHAtter would uselessly disclose another bootrom exploit to Apple.<br />
<br />
[[User:Geohot|Geohot]]'s rationale is that Apple already discovered, through internal testing, the limera1n exploit, making it very likely that it will be fixed in the next bootrom revision. Because [[iBoot]] code is present both in the bootrom and firmware, and because firmware is refreshed much more often that bootrom code, any fix in this code branch would appear first in firmware. [[User:Geohot|Geohot]] observed his limera1n exploit was closed in firmware and concluded that it would almost certainly be fixed in the next bootrom revision, whereas SHAtter still has a chance of remaining useful for an indefinite amount of time. In the iPad 2, the exploit is indeed fixed, and the limera1n exploit is not present. Confirmed by p0sixninja.<br />
<br />
Limera1n's [[Untethered jailbreak|untethered]] userland exploit for iOS 4.0 and 4.1 was obtained by [[User:Geohot|geohot]] under questionable circumstances from [[User:Comex|comex]]. [[User:Comex|Comex]] did end up fixing the kernel patching code by beta2, so as to not break users' devices.<br />
<br />
== Hacktivation ==<br />
Limera1n will copy hacktivation.dylib to /usr/lib and change entries to com.apple.mobile.lockdown.plist, whether it has been activated using iTunes or not. This, while helpful to many, can also be harmful to legitimate activators. For a guide on how to remove this hacktivation on iTunes activated devices, see the link below.<br />
<br />
==External Links==<br />
* [http://limera1n.com/ Official domain] <br />
* [http://theiphonewiki.com/limera1n The iPhone Wiki Mirror]<br />
* [http://www.mediafire.com/?5sovoo41rbcdspw Limera1n RC Beta2 Dump on Mediafire provided by iH8sn0w.]<br />
* [http://www.pastie.org/1210054 Veence's explanation for release]<br />
* [http://www.cmdshft.ipwn.me/blog/?p=555 Hacktivation removal guide.]<br />
<br />
[[Category:Hacking Software]]</div>B-mac 39https://www.theiphonewiki.com/w/index.php?title=Limera1n&diff=16812Limera1n2011-03-14T13:00:06Z<p>B-mac 39: /* Controversy */</p>
<hr />
<div>{{lowercase}}<br />
[[Image:Ra1ndrop.png|right]]<br />
This is [[User:Geohot|geohot]]'s [[jailbreak]] utility. It uses an [[Limera1n Exploit|undisclosed bootrom exploit]] and [[User:Comex|comex]]'s [[Packet Filter Kernel Exploit]] to achieve an [[untethered jailbreak]] on newer devices. The following devices are technically supported:<br />
* [[n88ap|iPhone 3GS]]<br />
* [[n90ap|iPhone 4]]<br />
* [[n18ap|iPod touch 3G]]<br />
* [[n81ap|iPod touch 4G]]<br />
* [[k48ap|iPad]]<br />
* [[k66ap|AppleTV 2G]] (creates a bare-bones jailbreak by mounting '/' as read/write in /etc/fstab)<br />
limera1n has been demonstrated multiple times by [[User:Geohot|geohot]], using blog posts on his now private blog. [[User:Geohot|Geohot]] [http://1.bp.blogspot.com/_NJ4JFBfr1tY/TDgkAsTQEmI/AAAAAAAAAcw/ZNHDxMNNL4Y/s1600/iphone4.png showed off a high-res picture of Cydia on an iPhone 4]. He [http://www.youtube.com/watch?v=__TR86PLiHw displayed an iPod touch 3G with an untethered jailbreak] that met MuscleNerd's requirements for a good video. In addition, he took a [http://4.bp.blogspot.com/_NJ4JFBfr1tY/S7_OvGMqJMI/AAAAAAAAAcE/R5WLrCizGw0/s1600/ipad_jb.jpg picture of Cydia and blackra1n icons on his iPad's SpringBoard].<br />
<br />
'''Release Date:''' [[Timeline#October|October 9, 2010]]<br />
<br />
'''Supported OS's:''' Mac OS X, Windows<br />
<br />
'''Supported Operations:''' [[hacktivation]], [[jailbreak]]ing<br />
<br />
<br />
==Release text==<br />
<div style="text-align: center">limera1n, 6 months in the making<br /><br />
iPhone 3GS, iPod Touch 3G, iPad, iPhone 4, iPod Touch 4G<br /><br />
4.0-4.1 and beyond+++<br /><br />
limera1n is unpatchable<br /><br />
untethered thanks to jailbreakme star '''comex'''<br /><br />
brought to you by '''geohot'''<br /><br />
hacktivates<br /><br />
Mac coming in 7 years<br /><br />
donations keep support alive<br /><br />
zero pictures of my face</div><br />
<br />
==Credit==<br />
* '''[[User:Geohot|geohot]]''' - The program itself, and the bootrom exploit.<br />
* '''[[User:Comex|comex]]''' - The userland exploit that allows limera1n to run [[untethered jailbreak|untethered]].<br />
<br />
==Changelog==<br />
{| class="wikitable" style="border-collapse:collapse;" border="1"<br />
|-<br />
|<center>'''Version'''</center><br />
|<center>'''Release time'''</center><br />
|<center>'''MD5 Hash'''</center><br />
|<center>'''Change comment'''</center><br />
|-<br />
|BETA 1<br />
|9 Oct 2010 XX:XX GMT<br />
|2f2b09a6ed5c5613d5361d8a9d0696b6<br />
|First release.<br />
|-<br />
|BETA 2<br />
|10 Oct 2010 XX:XX GMT<br />
|a70dccb3dfc0e505687424184dc3d1ce<br />
|Fixed kernel patching magic. Rerun BETA2+ over BETA1.<br />
|-<br />
|BETA 3<br />
|10 Oct 2010 XX:XX GMT<br />
|81730090f7de1576268ee8c2407c3d35<br />
|Fixed an issue with [[N88ap|iPhone 3GS]] ([[iBoot-359.3.2|new bootrom]])<br />
|-<br />
|BETA 4<br />
|10 Oct 2010 XX:XX GMT<br />
|d901c4b3a544983f095b0d03eb94e4db<br />
|Uninstall fixed, respring fixed<br />
|-<br />
|RC1<br />
|11 Oct 2010 XX:XX GMT<br />
|0622d99ffe4c25f75c720a689853845f<br />
|out of beta! afc2, reliability improvements, no reboot for cydia, 2kb smaller<br />
|-<br />
|RC1b<br />
|11 Oct 2010 XX:XX GMT<br />
|fc6f7d696a57c3baede49bdff8a7f43f<br />
|addresses an install issue, mainly with iPads<br />
|-<br />
|Final<br />
|11 Oct 2010 23:XX GMT<br />
|fc6f7d696a57c3baede49bdff8a7f43f<br />
|(same as RC1b)<br />
|}<br />
<br />
==Technical Information==<br />
=== Basics ===<br />
* limera1n has nothing to do with SHAtter at all.<br />
* limera1n uses a bootrom exploit to achieve the [[tethered jailbreak]] and unsigned code execution.<br />
* limera1n uses a userland exploit to make it untethered, which was developed by [[User:Comex|comex]].<br />
* limera1n uses a hacktivation dylib to perform hacktivation.<br />
=== Exploits ===<br />
limera1n reuses the usb_control_msg(0x21,2) but exploits a different vulnerability.<br />
=== Process ===<br />
The jailbreak appears to execute something like the following (in no particular order):<br />
* In recovery1,<br />
"setenv debug-uarts 1<br />
setenv auto-boot false<br />
saveenv"<br />
* In [[DFU Mode]], it uploads a [[payload]].<br />
* In recovery2, it uploads another [[payload]] and its [[ramdisk]].<br />
"setenv auto-boot true<br />
reset<br />
geohot done"<br />
<br />
=== Interesting Messages ===<br />
"geohot black is the new purple"<br />
<br />
"blackra1n start: %d current IRQ mask is %8.8X<br />
usb irq disabled...shhh<br />
fxns found @ %8.8X %8.8X<br />
found iBoot @ %8.8X<br />
i'm back from IRQland...<br />
3g detected, kicking nor<br />
nor kicked<br />
memcpy done<br />
iBoot restored!!!<br />
found command table @ %8.8X<br />
cmd_geohot added<br />
time to pray...%8.8X"<br />
<br />
"2.2X send command(%d): %s<br />
send exploit!!!<br />
sent data to copy: %X<br />
sent shellcode: %X has real length %X<br />
never freed: %X<br />
sent fake data to timeout: %X<br />
sent exploit to heap overflow: %X<br />
sending file with length: 0x%X Mingw runtime failure:<br />
VirtualQuery failed for %d bytes at address %p Unknown pseudo relocation protocol version %d.<br />
Unknown pseudo relocation bit size %d."<br />
<br />
==Controversy==<br />
The release of this jailbreak was specifically designed to pressure [[Chronic Dev (team)]] into not releasing SHAtter, but to instead implement the limera1n exploit into [[Greenpois0n (jailbreak)|greenpois0n]]; after releasing limera1n, releasing SHAtter would uselessly disclose another bootrom exploit to Apple.<br />
<br />
[[User:Geohot|Geohot]]'s rationale is that Apple already discovered, through internal testing, the limera1n exploit, making it very likely that it will be fixed in the next bootrom revision. Because [[iBoot]] code is present both in the bootrom and firmware, and because firmware is refreshed much more often that bootrom code, any fix in this code branch would appear first in firmware. [[User:Geohot|Geohot]] observed his limera1n exploit was closed in firmware and concluded that it would almost certainly be fixed in the next bootrom revision, whereas SHAtter still has a chance of remaining useful for an indefinite amount of time. In the iPad 2, the exploit indeed fixed, and the limera1n exploit is not present. Confirmed by p0sixninja.<br />
<br />
Limera1n's [[Untethered jailbreak|untethered]] userland exploit for iOS 4.0 and 4.1 was obtained by [[User:Geohot|geohot]] under questionable circumstances from [[User:Comex|comex]]. [[User:Comex|Comex]] did end up fixing the kernel patching code by beta2, so as to not break users' devices.<br />
<br />
== Hacktivation ==<br />
Limera1n will copy hacktivation.dylib to /usr/lib and change entries to com.apple.mobile.lockdown.plist, whether it has been activated using iTunes or not. This, while helpful to many, can also be harmful to legitimate activators. For a guide on how to remove this hacktivation on iTunes activated devices, see the link below.<br />
<br />
==External Links==<br />
* [http://limera1n.com/ Official domain] <br />
* [http://theiphonewiki.com/limera1n The iPhone Wiki Mirror]<br />
* [http://www.mediafire.com/?5sovoo41rbcdspw Limera1n RC Beta2 Dump on Mediafire provided by iH8sn0w.]<br />
* [http://www.pastie.org/1210054 Veence's explanation for release]<br />
* [http://www.cmdshft.ipwn.me/blog/?p=555 Hacktivation removal guide.]<br />
<br />
[[Category:Hacking Software]]</div>B-mac 39https://www.theiphonewiki.com/w/index.php?title=Untethered_jailbreak&diff=10523Untethered jailbreak2010-10-12T20:57:38Z<p>B-mac 39: /* Device support */</p>
<hr />
<div>An untethered jailbreak is a type of [[jailbreak]] where your device does not require you to reboot with a connection to an external device capable of executing commands on the device. <br />
<br />
== Device support ==<br />
Many device/firmware combinations can use an untethered jailbreak. [[Firmware]]s 3.1.2 through 4.0.1 (except 3.2.2) on compatible iDevices ([[N90ap|iPhone 4]] and earlier) can be jailbroken via [[Star]].<br />
<br />
The most current versions of iOS (3.2.2 and 4.1), as well as the [[N81ap|iPod touch 4G]], can be jailbroken already with [[limera1n]].<br />
<br />
Devices as old as (or older than) the [[N88ap|iPhone 3GS]] with the [[iBoot-359.3|old bootrom]] have known [[bootrom]] exploits, so [[PwnageTool]] can be leveraged to break the device's chain of trust. Newer devices, which include some [[N88ap|iPhone 3GS]] units, as well as all "MC" model [[N72ap|iPod touch 2G]] units, [[N18ap|iPod touch 3G]] units and any subsequently released devices, contain [[bootrom]]s that close the [[0x24000 Segment Overflow|utilized exploit]]. limera1n has a bootroom exploit that can jailbreak iPhone 3GS and iPod Touch 3G MC models.<br />
<br />
== Operating System ==<br />
[[Star]] runs on the device itself (not a computer program), so it is completely independent from a computer's operating system.<br />
<br />
[[PwnageTool]] can only be used on Mac OS X.</div>B-mac 39