https://www.theiphonewiki.com/w/api.php?action=feedcontributions&user=Dimitarnestorov&feedformat=atomThe iPhone Wiki - User contributions [en]2024-03-29T09:18:49ZUser contributionsMediaWiki 1.31.14https://www.theiphonewiki.com/w/index.php?title=Limera1n&diff=122765Limera1n2022-05-21T15:59:44Z<p>Dimitarnestorov: Mention that explanation is an archived version</p>
<hr />
<div>{{lowercase}}<br />
{{infobox software<br />
| name = limera1n<br />
| title = limera1n<br />
| logo = [[File:ra1ndrop.png|85px]]<br />
| author = [[User:geohot|George Hotz]]<br />
| developer = George Hotz<br />
| released = {{start date and age|2010|10|09}}<br />
| discontinued = <br />
| latest release version = RC1b<br />
| latest release date = {{start date and age|2010|10|11}}<br />
| programming language = C<br />
| operating system = [[wikipedia:Microsoft Windows|Windows]] / [[wikipedia:OS X|OS X]]<br />
| size = Windows:&nbsp;317.5&nbsp;KiB&nbsp;[EXE]<br />OS&nbsp;X:&nbsp;478.1&nbsp;KiB&nbsp;[ZIP]<!-- As of {{date|2015|03|13}}, 325,120 and 489,598 bytes respectively --><br />
| platform = <br />
| language = [[wikipedia:English|English]]<br />
| status = Deprecated<br />
| genre = Jailbreaking<br />
| license = [[wikipedia:Freeware|Freeware]]<br />
| website = [http://limera1n.com/ limera1n.com]<br />
}}<br />
'''limera1n''' is [[User:Geohot|geohot]]'s [[jailbreak]] utility. It uses a previously undisclosed bootrom exploit (the [[limera1n Exploit]]) and [[User:Comex|comex]]'s [[Packet Filter Kernel Exploit]] to achieve an [[untethered jailbreak]] on many devices. The following devices are supported:<br />
* [[N88AP|iPhone 3GS]]<br />
* [[N90AP|iPhone 4 (iPhone3,1)]]<br />
* [[N18AP|iPod touch (3rd generation)]]<br />
* [[N81AP|iPod touch (4th generation)]]<br />
* [[K48AP|iPad]]<br />
* [[K66AP|Apple TV (2nd generation)]] (creates a bare-bones jailbreak by mounting '/' as read/write in /etc/fstab)<br />
limera1n has been demonstrated multiple times by [[User:Geohot|geohot]], using blog posts on his now private blog. [[User:Geohot|Geohot]] showed off a high-res picture of [http://1.bp.blogspot.com/_NJ4JFBfr1tY/TDgkAsTQEmI/AAAAAAAAAcw/ZNHDxMNNL4Y/s1600/iphone4.png Cydia on an iPhone 4]. He displayed an [http://www.youtube.com/watch?v=__TR86PLiHw iPod touch (3rd generation) with an untethered jailbreak] that met [[User:MuscleNerd|MuscleNerd]]'s requirements for a good video. In addition, he took a picture of [http://4.bp.blogspot.com/_NJ4JFBfr1tY/S7_OvGMqJMI/AAAAAAAAAcE/R5WLrCizGw0/s1600/ipad_jb.jpg Cydia and blackra1n icons on an iPad].<br />
<br />
* '''Release Date:''' [[Timeline#October_11|{{date|2010|10|09}}]]<br />
* '''Supported OS's:''' Mac OS X, Windows<br />
* '''Supported Operations:''' [[hacktivation]], [[jailbreak]]ing<br />
* '''Supported iOS: 3.2.2-4.1<br />
<br />
<br />
== Release text ==<br />
<div style="text-align: center">limera1n, 6 months in the making<br /><br />
iPhone 3GS, iPod Touch (3rd generation), iPad, iPhone 4, iPod Touch (4th generation)<br /><br />
4.0-4.1 and beyond+++<br /><br />
limera1n is unpatchable<br /><br />
untethered thanks to jailbreakme star '''comex'''<br /><br />
brought to you by '''geohot'''<br /><br />
hacktivates<br /><br />
Mac coming in 7 years<br /><br />
donations keep support alive<br /><br />
zero pictures of my face</div><br />
<br />
== Credit ==<br />
* '''[[User:Geohot|geohot]]''' - The program itself, and the bootrom exploit.<br />
* '''[[User:Comex|comex]]''' - The userland exploit that allows limera1n to run [[untethered jailbreak|untethered]].<br />
<br />
== Changelog ==<br />
{| class="wikitable"<br />
|-<br />
! Version<br />
! Release Date<br />
! MD5 Hash<br />
! Changelog<br />
|-<br />
| Beta 1<br />
| {{date|2010|10|9}}<br />
| 2f2b09a6ed5c5613d5361d8a9d0696b6<br />
| First release<br />
|-<br />
| Beta 2<br />
| {{date|2010|10|10}}<br />
| a70dccb3dfc0e505687424184dc3d1ce<br />
| Fixed "kernel patching magic". Should be run over a beta 1 jailbreak<br />
|-<br />
| Beta 3<br />
| {{date|2010|10|10}}<br />
| 81730090f7de1576268ee8c2407c3d35<br />
| Fixed an issue with [[N88AP|iPhone 3GS]] ([[Bootrom 359.3.2|new bootrom]])<br />
|-<br />
| Beta 4<br />
| {{date|2010|10|10}}<br />
| d901c4b3a544983f095b0d03eb94e4db<br />
| Uninstall and respring bugs fixed<br />
|-<br />
| RC1<br />
| {{date|2010|10|11}}<br />
| 0622d99ffe4c25f75c720a689853845f<br />
| [[AFC#AFC2|afc2]], reliability improvements, reboot no longer needed for Cydia; Also ~2&nbsp;KB smaller<br />
|-<br />
| RC1b<br />
| {{date|2010|10|11|}}<br />
| fc6f7d696a57c3baede49bdff8a7f43f<!-- Still the same as of {{date|2015|03|13}} --><br />
| Addresses an installation issue that mainly affected [[List of iPads|iPads]]<br />
|}<br />
<br />
== Technical Information ==<br />
=== Basics ===<br />
* limera1n has nothing to do with [[SHA-1 Image Segment Overflow|SHAtter]] at all.<br />
* limera1n uses a [[bootrom]] exploit to achieve the [[tethered jailbreak]] and unsigned code execution.<br />
* limera1n uses a [[userland]] exploit to make it [[untethered]], which was developed by [[User:Comex|comex]].<br />
* limera1n uses a hacktivation dylib to perform [[hacktivation]].<br />
<br />
=== Exploits ===<br />
limera1n reuses the [[Usb_control_msg(0x21,_2)_Exploit|usb_control_msg(0x21,2)]] but exploits a different vulnerability (see [[Limera1n Exploit]]).<br />
<br />
=== Process ===<br />
The jailbreak appears to execute something like the following (in no particular order):<br />
* In recovery1,<br />
"setenv debug-uarts 1<br />
setenv auto-boot false<br />
saveenv"<br />
* In [[DFU Mode]], it uploads a [[payload]].<br />
* In recovery2, it uploads another [[payload]] and its [[ramdisk]].<br />
"setenv auto-boot true<br />
reset<br />
geohot done"<br />
<br />
=== Interesting Messages ===<br />
"geohot black is the new purple"<br />
<br />
"blackra1n start: %d current IRQ mask is %8.8X<br />
usb irq disabled...shhh<br />
fxns found @ %8.8X %8.8X<br />
found iBoot @ %8.8X<br />
i'm back from IRQland...<br />
3g detected, kicking nor<br />
nor kicked<br />
memcpy done<br />
iBoot restored!!!<br />
found command table @ %8.8X<br />
cmd_geohot added<br />
time to pray...%8.8X"<br />
<br />
"2.2X send command(%d): %s<br />
send exploit!!!<br />
sent data to copy: %X<br />
sent shellcode: %X has real length %X<br />
never freed: %X<br />
sent fake data to timeout: %X<br />
sent exploit to heap overflow: %X<br />
sending file with length: 0x%X Mingw runtime failure:<br />
VirtualQuery failed for %d bytes at address %p Unknown pseudo relocation protocol version %d.<br />
Unknown pseudo relocation bit size %d."<br />
<br />
== Controversy ==<br />
The release of this jailbreak was specifically designed to pressure the [[Chronic Dev (team)|Chronic Dev Team]] into not releasing [[SHA-1 Image Segment Overflow|SHAtter]], and instead implement the limera1n exploit into [[Greenpois0n (jailbreak)|greenpois0n]]; after releasing limera1n, releasing [[SHA-1 Image Segment Overflow|SHAtter]] would uselessly disclose another bootrom exploit to Apple.<br />
<br />
[[User:Geohot|Geohot]]'s rationale was that Apple already discovered, through internal testing, the limera1n exploit, making it very likely that it will be fixed in the next bootrom revision. Because [[iBoot]] code is present both in the bootrom and firmware, and because firmware is refreshed much more often than bootrom code, any fix in this code branch would appear first in firmware. [[User:Geohot|Geohot]] observed his limera1n exploit was closed in firmware and concluded that it would almost certainly be fixed in the next bootrom revision, whereas [[SHA-1 Image Segment Overflow|SHAtter]] still has a chance of remaining useful for an indefinite amount of time. Both vulnerabilities ended up being patched in the [[iPad 2]]. It was fixed before the release of limera1n according to the build number. This has been confirmed by [[User:posixninja|p0sixninja]].<br />
<br />
limera1n's [[Untethered jailbreak|untethered]] userland exploit for iOS 4.0 and 4.1 was obtained by [[User:Geohot|geohot]] under questionable circumstances from [[User:Comex|comex]]. [[User:Comex|Comex]] did end up fixing the kernel patching code by beta2, so as to not break users' devices.<br />
<br />
== Hacktivation ==<br />
limera1n will copy hacktivation.dylib to [[:/usr/lib]] and change entries to com.apple.mobile.lockdown.plist, whether it has been activated using iTunes or not. This, while helpful to many, can also be harmful to legitimate activators. For a guide on how to remove this hacktivation on iTunes activated devices, see the link below.<br />
<br />
== External Links ==<br />
* [http://limera1n.com/ Official domain] <br />
* [https://web.archive.org/web/20141026000127/http://www.pastie.org/1210054 (Archive) Veeence's explanation for release]<br />
* [https://web.archive.org/web/20140226135748/http://www.hackint0sh.org/blackra1n-3g-s-jailbreak-220/how-removing-blackra1n-limera1n-hacktivation-130992.htm (Archive) Hacktivation removal guide]<br />
<br />
[[Category:Hacking Software]]<br />
[[Category:Jailbreaks]]<br />
[[Category:Jailbreaking]]</div>Dimitarnestorovhttps://www.theiphonewiki.com/w/index.php?title=Limera1n&diff=122764Limera1n2022-05-21T15:59:07Z<p>Dimitarnestorov: Use web.archive.org link for explanation</p>
<hr />
<div>{{lowercase}}<br />
{{infobox software<br />
| name = limera1n<br />
| title = limera1n<br />
| logo = [[File:ra1ndrop.png|85px]]<br />
| author = [[User:geohot|George Hotz]]<br />
| developer = George Hotz<br />
| released = {{start date and age|2010|10|09}}<br />
| discontinued = <br />
| latest release version = RC1b<br />
| latest release date = {{start date and age|2010|10|11}}<br />
| programming language = C<br />
| operating system = [[wikipedia:Microsoft Windows|Windows]] / [[wikipedia:OS X|OS X]]<br />
| size = Windows:&nbsp;317.5&nbsp;KiB&nbsp;[EXE]<br />OS&nbsp;X:&nbsp;478.1&nbsp;KiB&nbsp;[ZIP]<!-- As of {{date|2015|03|13}}, 325,120 and 489,598 bytes respectively --><br />
| platform = <br />
| language = [[wikipedia:English|English]]<br />
| status = Deprecated<br />
| genre = Jailbreaking<br />
| license = [[wikipedia:Freeware|Freeware]]<br />
| website = [http://limera1n.com/ limera1n.com]<br />
}}<br />
'''limera1n''' is [[User:Geohot|geohot]]'s [[jailbreak]] utility. It uses a previously undisclosed bootrom exploit (the [[limera1n Exploit]]) and [[User:Comex|comex]]'s [[Packet Filter Kernel Exploit]] to achieve an [[untethered jailbreak]] on many devices. The following devices are supported:<br />
* [[N88AP|iPhone 3GS]]<br />
* [[N90AP|iPhone 4 (iPhone3,1)]]<br />
* [[N18AP|iPod touch (3rd generation)]]<br />
* [[N81AP|iPod touch (4th generation)]]<br />
* [[K48AP|iPad]]<br />
* [[K66AP|Apple TV (2nd generation)]] (creates a bare-bones jailbreak by mounting '/' as read/write in /etc/fstab)<br />
limera1n has been demonstrated multiple times by [[User:Geohot|geohot]], using blog posts on his now private blog. [[User:Geohot|Geohot]] showed off a high-res picture of [http://1.bp.blogspot.com/_NJ4JFBfr1tY/TDgkAsTQEmI/AAAAAAAAAcw/ZNHDxMNNL4Y/s1600/iphone4.png Cydia on an iPhone 4]. He displayed an [http://www.youtube.com/watch?v=__TR86PLiHw iPod touch (3rd generation) with an untethered jailbreak] that met [[User:MuscleNerd|MuscleNerd]]'s requirements for a good video. In addition, he took a picture of [http://4.bp.blogspot.com/_NJ4JFBfr1tY/S7_OvGMqJMI/AAAAAAAAAcE/R5WLrCizGw0/s1600/ipad_jb.jpg Cydia and blackra1n icons on an iPad].<br />
<br />
* '''Release Date:''' [[Timeline#October_11|{{date|2010|10|09}}]]<br />
* '''Supported OS's:''' Mac OS X, Windows<br />
* '''Supported Operations:''' [[hacktivation]], [[jailbreak]]ing<br />
* '''Supported iOS: 3.2.2-4.1<br />
<br />
<br />
== Release text ==<br />
<div style="text-align: center">limera1n, 6 months in the making<br /><br />
iPhone 3GS, iPod Touch (3rd generation), iPad, iPhone 4, iPod Touch (4th generation)<br /><br />
4.0-4.1 and beyond+++<br /><br />
limera1n is unpatchable<br /><br />
untethered thanks to jailbreakme star '''comex'''<br /><br />
brought to you by '''geohot'''<br /><br />
hacktivates<br /><br />
Mac coming in 7 years<br /><br />
donations keep support alive<br /><br />
zero pictures of my face</div><br />
<br />
== Credit ==<br />
* '''[[User:Geohot|geohot]]''' - The program itself, and the bootrom exploit.<br />
* '''[[User:Comex|comex]]''' - The userland exploit that allows limera1n to run [[untethered jailbreak|untethered]].<br />
<br />
== Changelog ==<br />
{| class="wikitable"<br />
|-<br />
! Version<br />
! Release Date<br />
! MD5 Hash<br />
! Changelog<br />
|-<br />
| Beta 1<br />
| {{date|2010|10|9}}<br />
| 2f2b09a6ed5c5613d5361d8a9d0696b6<br />
| First release<br />
|-<br />
| Beta 2<br />
| {{date|2010|10|10}}<br />
| a70dccb3dfc0e505687424184dc3d1ce<br />
| Fixed "kernel patching magic". Should be run over a beta 1 jailbreak<br />
|-<br />
| Beta 3<br />
| {{date|2010|10|10}}<br />
| 81730090f7de1576268ee8c2407c3d35<br />
| Fixed an issue with [[N88AP|iPhone 3GS]] ([[Bootrom 359.3.2|new bootrom]])<br />
|-<br />
| Beta 4<br />
| {{date|2010|10|10}}<br />
| d901c4b3a544983f095b0d03eb94e4db<br />
| Uninstall and respring bugs fixed<br />
|-<br />
| RC1<br />
| {{date|2010|10|11}}<br />
| 0622d99ffe4c25f75c720a689853845f<br />
| [[AFC#AFC2|afc2]], reliability improvements, reboot no longer needed for Cydia; Also ~2&nbsp;KB smaller<br />
|-<br />
| RC1b<br />
| {{date|2010|10|11|}}<br />
| fc6f7d696a57c3baede49bdff8a7f43f<!-- Still the same as of {{date|2015|03|13}} --><br />
| Addresses an installation issue that mainly affected [[List of iPads|iPads]]<br />
|}<br />
<br />
== Technical Information ==<br />
=== Basics ===<br />
* limera1n has nothing to do with [[SHA-1 Image Segment Overflow|SHAtter]] at all.<br />
* limera1n uses a [[bootrom]] exploit to achieve the [[tethered jailbreak]] and unsigned code execution.<br />
* limera1n uses a [[userland]] exploit to make it [[untethered]], which was developed by [[User:Comex|comex]].<br />
* limera1n uses a hacktivation dylib to perform [[hacktivation]].<br />
<br />
=== Exploits ===<br />
limera1n reuses the [[Usb_control_msg(0x21,_2)_Exploit|usb_control_msg(0x21,2)]] but exploits a different vulnerability (see [[Limera1n Exploit]]).<br />
<br />
=== Process ===<br />
The jailbreak appears to execute something like the following (in no particular order):<br />
* In recovery1,<br />
"setenv debug-uarts 1<br />
setenv auto-boot false<br />
saveenv"<br />
* In [[DFU Mode]], it uploads a [[payload]].<br />
* In recovery2, it uploads another [[payload]] and its [[ramdisk]].<br />
"setenv auto-boot true<br />
reset<br />
geohot done"<br />
<br />
=== Interesting Messages ===<br />
"geohot black is the new purple"<br />
<br />
"blackra1n start: %d current IRQ mask is %8.8X<br />
usb irq disabled...shhh<br />
fxns found @ %8.8X %8.8X<br />
found iBoot @ %8.8X<br />
i'm back from IRQland...<br />
3g detected, kicking nor<br />
nor kicked<br />
memcpy done<br />
iBoot restored!!!<br />
found command table @ %8.8X<br />
cmd_geohot added<br />
time to pray...%8.8X"<br />
<br />
"2.2X send command(%d): %s<br />
send exploit!!!<br />
sent data to copy: %X<br />
sent shellcode: %X has real length %X<br />
never freed: %X<br />
sent fake data to timeout: %X<br />
sent exploit to heap overflow: %X<br />
sending file with length: 0x%X Mingw runtime failure:<br />
VirtualQuery failed for %d bytes at address %p Unknown pseudo relocation protocol version %d.<br />
Unknown pseudo relocation bit size %d."<br />
<br />
== Controversy ==<br />
The release of this jailbreak was specifically designed to pressure the [[Chronic Dev (team)|Chronic Dev Team]] into not releasing [[SHA-1 Image Segment Overflow|SHAtter]], and instead implement the limera1n exploit into [[Greenpois0n (jailbreak)|greenpois0n]]; after releasing limera1n, releasing [[SHA-1 Image Segment Overflow|SHAtter]] would uselessly disclose another bootrom exploit to Apple.<br />
<br />
[[User:Geohot|Geohot]]'s rationale was that Apple already discovered, through internal testing, the limera1n exploit, making it very likely that it will be fixed in the next bootrom revision. Because [[iBoot]] code is present both in the bootrom and firmware, and because firmware is refreshed much more often than bootrom code, any fix in this code branch would appear first in firmware. [[User:Geohot|Geohot]] observed his limera1n exploit was closed in firmware and concluded that it would almost certainly be fixed in the next bootrom revision, whereas [[SHA-1 Image Segment Overflow|SHAtter]] still has a chance of remaining useful for an indefinite amount of time. Both vulnerabilities ended up being patched in the [[iPad 2]]. It was fixed before the release of limera1n according to the build number. This has been confirmed by [[User:posixninja|p0sixninja]].<br />
<br />
limera1n's [[Untethered jailbreak|untethered]] userland exploit for iOS 4.0 and 4.1 was obtained by [[User:Geohot|geohot]] under questionable circumstances from [[User:Comex|comex]]. [[User:Comex|Comex]] did end up fixing the kernel patching code by beta2, so as to not break users' devices.<br />
<br />
== Hacktivation ==<br />
limera1n will copy hacktivation.dylib to [[:/usr/lib]] and change entries to com.apple.mobile.lockdown.plist, whether it has been activated using iTunes or not. This, while helpful to many, can also be harmful to legitimate activators. For a guide on how to remove this hacktivation on iTunes activated devices, see the link below.<br />
<br />
== External Links ==<br />
* [http://limera1n.com/ Official domain] <br />
* [https://web.archive.org/web/20141026000127/http://www.pastie.org/1210054 Veeence's explanation for release]<br />
* [https://web.archive.org/web/20140226135748/http://www.hackint0sh.org/blackra1n-3g-s-jailbreak-220/how-removing-blackra1n-limera1n-hacktivation-130992.htm (Archive) Hacktivation removal guide]<br />
<br />
[[Category:Hacking Software]]<br />
[[Category:Jailbreaks]]<br />
[[Category:Jailbreaking]]</div>Dimitarnestorovhttps://www.theiphonewiki.com/w/index.php?title=Limera1n&diff=122763Limera1n2022-05-21T15:57:20Z<p>Dimitarnestorov: Replace hackint0sh.org link with a web.archive.org link</p>
<hr />
<div>{{lowercase}}<br />
{{infobox software<br />
| name = limera1n<br />
| title = limera1n<br />
| logo = [[File:ra1ndrop.png|85px]]<br />
| author = [[User:geohot|George Hotz]]<br />
| developer = George Hotz<br />
| released = {{start date and age|2010|10|09}}<br />
| discontinued = <br />
| latest release version = RC1b<br />
| latest release date = {{start date and age|2010|10|11}}<br />
| programming language = C<br />
| operating system = [[wikipedia:Microsoft Windows|Windows]] / [[wikipedia:OS X|OS X]]<br />
| size = Windows:&nbsp;317.5&nbsp;KiB&nbsp;[EXE]<br />OS&nbsp;X:&nbsp;478.1&nbsp;KiB&nbsp;[ZIP]<!-- As of {{date|2015|03|13}}, 325,120 and 489,598 bytes respectively --><br />
| platform = <br />
| language = [[wikipedia:English|English]]<br />
| status = Deprecated<br />
| genre = Jailbreaking<br />
| license = [[wikipedia:Freeware|Freeware]]<br />
| website = [http://limera1n.com/ limera1n.com]<br />
}}<br />
'''limera1n''' is [[User:Geohot|geohot]]'s [[jailbreak]] utility. It uses a previously undisclosed bootrom exploit (the [[limera1n Exploit]]) and [[User:Comex|comex]]'s [[Packet Filter Kernel Exploit]] to achieve an [[untethered jailbreak]] on many devices. The following devices are supported:<br />
* [[N88AP|iPhone 3GS]]<br />
* [[N90AP|iPhone 4 (iPhone3,1)]]<br />
* [[N18AP|iPod touch (3rd generation)]]<br />
* [[N81AP|iPod touch (4th generation)]]<br />
* [[K48AP|iPad]]<br />
* [[K66AP|Apple TV (2nd generation)]] (creates a bare-bones jailbreak by mounting '/' as read/write in /etc/fstab)<br />
limera1n has been demonstrated multiple times by [[User:Geohot|geohot]], using blog posts on his now private blog. [[User:Geohot|Geohot]] showed off a high-res picture of [http://1.bp.blogspot.com/_NJ4JFBfr1tY/TDgkAsTQEmI/AAAAAAAAAcw/ZNHDxMNNL4Y/s1600/iphone4.png Cydia on an iPhone 4]. He displayed an [http://www.youtube.com/watch?v=__TR86PLiHw iPod touch (3rd generation) with an untethered jailbreak] that met [[User:MuscleNerd|MuscleNerd]]'s requirements for a good video. In addition, he took a picture of [http://4.bp.blogspot.com/_NJ4JFBfr1tY/S7_OvGMqJMI/AAAAAAAAAcE/R5WLrCizGw0/s1600/ipad_jb.jpg Cydia and blackra1n icons on an iPad].<br />
<br />
* '''Release Date:''' [[Timeline#October_11|{{date|2010|10|09}}]]<br />
* '''Supported OS's:''' Mac OS X, Windows<br />
* '''Supported Operations:''' [[hacktivation]], [[jailbreak]]ing<br />
* '''Supported iOS: 3.2.2-4.1<br />
<br />
<br />
== Release text ==<br />
<div style="text-align: center">limera1n, 6 months in the making<br /><br />
iPhone 3GS, iPod Touch (3rd generation), iPad, iPhone 4, iPod Touch (4th generation)<br /><br />
4.0-4.1 and beyond+++<br /><br />
limera1n is unpatchable<br /><br />
untethered thanks to jailbreakme star '''comex'''<br /><br />
brought to you by '''geohot'''<br /><br />
hacktivates<br /><br />
Mac coming in 7 years<br /><br />
donations keep support alive<br /><br />
zero pictures of my face</div><br />
<br />
== Credit ==<br />
* '''[[User:Geohot|geohot]]''' - The program itself, and the bootrom exploit.<br />
* '''[[User:Comex|comex]]''' - The userland exploit that allows limera1n to run [[untethered jailbreak|untethered]].<br />
<br />
== Changelog ==<br />
{| class="wikitable"<br />
|-<br />
! Version<br />
! Release Date<br />
! MD5 Hash<br />
! Changelog<br />
|-<br />
| Beta 1<br />
| {{date|2010|10|9}}<br />
| 2f2b09a6ed5c5613d5361d8a9d0696b6<br />
| First release<br />
|-<br />
| Beta 2<br />
| {{date|2010|10|10}}<br />
| a70dccb3dfc0e505687424184dc3d1ce<br />
| Fixed "kernel patching magic". Should be run over a beta 1 jailbreak<br />
|-<br />
| Beta 3<br />
| {{date|2010|10|10}}<br />
| 81730090f7de1576268ee8c2407c3d35<br />
| Fixed an issue with [[N88AP|iPhone 3GS]] ([[Bootrom 359.3.2|new bootrom]])<br />
|-<br />
| Beta 4<br />
| {{date|2010|10|10}}<br />
| d901c4b3a544983f095b0d03eb94e4db<br />
| Uninstall and respring bugs fixed<br />
|-<br />
| RC1<br />
| {{date|2010|10|11}}<br />
| 0622d99ffe4c25f75c720a689853845f<br />
| [[AFC#AFC2|afc2]], reliability improvements, reboot no longer needed for Cydia; Also ~2&nbsp;KB smaller<br />
|-<br />
| RC1b<br />
| {{date|2010|10|11|}}<br />
| fc6f7d696a57c3baede49bdff8a7f43f<!-- Still the same as of {{date|2015|03|13}} --><br />
| Addresses an installation issue that mainly affected [[List of iPads|iPads]]<br />
|}<br />
<br />
== Technical Information ==<br />
=== Basics ===<br />
* limera1n has nothing to do with [[SHA-1 Image Segment Overflow|SHAtter]] at all.<br />
* limera1n uses a [[bootrom]] exploit to achieve the [[tethered jailbreak]] and unsigned code execution.<br />
* limera1n uses a [[userland]] exploit to make it [[untethered]], which was developed by [[User:Comex|comex]].<br />
* limera1n uses a hacktivation dylib to perform [[hacktivation]].<br />
<br />
=== Exploits ===<br />
limera1n reuses the [[Usb_control_msg(0x21,_2)_Exploit|usb_control_msg(0x21,2)]] but exploits a different vulnerability (see [[Limera1n Exploit]]).<br />
<br />
=== Process ===<br />
The jailbreak appears to execute something like the following (in no particular order):<br />
* In recovery1,<br />
"setenv debug-uarts 1<br />
setenv auto-boot false<br />
saveenv"<br />
* In [[DFU Mode]], it uploads a [[payload]].<br />
* In recovery2, it uploads another [[payload]] and its [[ramdisk]].<br />
"setenv auto-boot true<br />
reset<br />
geohot done"<br />
<br />
=== Interesting Messages ===<br />
"geohot black is the new purple"<br />
<br />
"blackra1n start: %d current IRQ mask is %8.8X<br />
usb irq disabled...shhh<br />
fxns found @ %8.8X %8.8X<br />
found iBoot @ %8.8X<br />
i'm back from IRQland...<br />
3g detected, kicking nor<br />
nor kicked<br />
memcpy done<br />
iBoot restored!!!<br />
found command table @ %8.8X<br />
cmd_geohot added<br />
time to pray...%8.8X"<br />
<br />
"2.2X send command(%d): %s<br />
send exploit!!!<br />
sent data to copy: %X<br />
sent shellcode: %X has real length %X<br />
never freed: %X<br />
sent fake data to timeout: %X<br />
sent exploit to heap overflow: %X<br />
sending file with length: 0x%X Mingw runtime failure:<br />
VirtualQuery failed for %d bytes at address %p Unknown pseudo relocation protocol version %d.<br />
Unknown pseudo relocation bit size %d."<br />
<br />
== Controversy ==<br />
The release of this jailbreak was specifically designed to pressure the [[Chronic Dev (team)|Chronic Dev Team]] into not releasing [[SHA-1 Image Segment Overflow|SHAtter]], and instead implement the limera1n exploit into [[Greenpois0n (jailbreak)|greenpois0n]]; after releasing limera1n, releasing [[SHA-1 Image Segment Overflow|SHAtter]] would uselessly disclose another bootrom exploit to Apple.<br />
<br />
[[User:Geohot|Geohot]]'s rationale was that Apple already discovered, through internal testing, the limera1n exploit, making it very likely that it will be fixed in the next bootrom revision. Because [[iBoot]] code is present both in the bootrom and firmware, and because firmware is refreshed much more often than bootrom code, any fix in this code branch would appear first in firmware. [[User:Geohot|Geohot]] observed his limera1n exploit was closed in firmware and concluded that it would almost certainly be fixed in the next bootrom revision, whereas [[SHA-1 Image Segment Overflow|SHAtter]] still has a chance of remaining useful for an indefinite amount of time. Both vulnerabilities ended up being patched in the [[iPad 2]]. It was fixed before the release of limera1n according to the build number. This has been confirmed by [[User:posixninja|p0sixninja]].<br />
<br />
limera1n's [[Untethered jailbreak|untethered]] userland exploit for iOS 4.0 and 4.1 was obtained by [[User:Geohot|geohot]] under questionable circumstances from [[User:Comex|comex]]. [[User:Comex|Comex]] did end up fixing the kernel patching code by beta2, so as to not break users' devices.<br />
<br />
== Hacktivation ==<br />
limera1n will copy hacktivation.dylib to [[:/usr/lib]] and change entries to com.apple.mobile.lockdown.plist, whether it has been activated using iTunes or not. This, while helpful to many, can also be harmful to legitimate activators. For a guide on how to remove this hacktivation on iTunes activated devices, see the link below.<br />
<br />
== External Links ==<br />
* [http://limera1n.com/ Official domain] <br />
* [http://www.pastie.org/1210054 Veeence's explanation for release]<br />
* [https://web.archive.org/web/20140226135748/http://www.hackint0sh.org/blackra1n-3g-s-jailbreak-220/how-removing-blackra1n-limera1n-hacktivation-130992.htm (Archive) Hacktivation removal guide]<br />
<br />
[[Category:Hacking Software]]<br />
[[Category:Jailbreaks]]<br />
[[Category:Jailbreaking]]</div>Dimitarnestorovhttps://www.theiphonewiki.com/w/index.php?title=Pangu9&diff=114098Pangu92021-06-14T12:04:20Z<p>Dimitarnestorov: Updating the latest Windows version link to archive.org</p>
<hr />
<div>{{Infobox software<br />
| name = Pangu9<br />
| title = Pangu9<br />
| screenshot = [[File:Pangu9.png|355px]]<br />
| caption = Pangu9 v1.0.0 on Windows<br />
| author = Pangu Team<br />
| developer = Pangu Team<br />
| released = {{Start date|2015|10|14|df=yes}}<br />
| discontinued = <br />
| latest release version = 1.3.2&nbsp;(Windows)&nbsp;/&nbsp;{{Start date and age|2016|08|18|df=yes}}<br />1.1.1&nbsp;(OS&nbsp;X)&nbsp;/&nbsp;{{Start date and age|2016|03|16|df=yes}}<br />1.0.0&nbsp;(Apple&nbsp;TV&nbsp;4)&nbsp;/&nbsp;{{Start date and age|2016|03|23|df=yes}}<br />
| latest release date = <br />
| latest preview version = <br />
| latest preview date = <br />
| programming language = [[wikipedia:C (programming language)|C]]<br />
| operating system = [[wikipedia:Microsoft Windows|Windows]] / [[wikipedia:OS X|OS X]] / [[wikipedia:TvOS|tvOS]]<br />
| size = <br />
| platform = [[wikipedia:Microsoft Windows|Windows]] / [[wikipedia:OS X|OS X]] / [[wikipedia:TvOS|tvOS]]<br />
| language = [[wikipedia:English language|English]]<br />
| status = Active<br />
| genre = Jailbreaking<br />
| license = [[wikipedia:Freeware|Freeware]]<br />
| website = [http://en.pangu.io en.pangu.io] (English)<br />
}}<br />
<br />
'''Pangu9''' is the name for a series of [[jailbreak]]s for all devices on iOS 9.0 through 9.1 ([[untethered jailbreak|untethered]]), 9.2 through 9.3.3 on 64-bit devices ([[semi-untethered jailbreak|semi-untethered]]) and [[J42dAP|Apple TV HD]] running tvOS 9.0 - 9.0.1 ([[untethered jailbreak|untethered]]).<br />
<br />
The initial version was released on 14 October 2015 and supported iOS 9.0 through 9.0.2, [[untethered jailbreak|untethered]]. On 11 March 2016, Pangu9 1.3.0 (Windows)/1.1.0 (Mac) was released to jailbreak iOS 9.1 [[untethered jailbreak|untethered]] on 64-bit devices. <br />
<br />
On 23 March 2016, Pangu released an [[untethered jailbreak]] for [[tvOS]] 9.0 through 9.0.1.<br />
<br />
On 24 July 2016, a new version which jailbreaks [[semi-untethered jailbreak|semi-untethered]] iOS 9.2 through 9.3.3 was released on [http://www.pangu.io/?flag=cn Pangu's Chinese site]. An English version was released on [http://en.pangu.io Pangu's English site] a few days later on July 29.<br />
<br />
On 19 August 2016, an [http://www.iphonehacks.com/2016/08/install-ios-9-3-3-pangu-jailbreak-using-safari.html on-device jailbreak] was released.<br />
<br />
== Download ==<br />
=== Pangu9 for iOS 9.0-9.1 ===<br />
==== Windows ====<br />
{| class="wikitable"<br />
! Version<br />
! SHA-1 Hash<br />
! Download<br />
! Changes<br />
|-<br />
| 1.0.0<br />
| <code>c48e1c1f84c1d5ff6046cc4eb7344335b314ba4b</code><br />
| [http://dl.pangu.25pp.com/jb/Pangu9_v1.0.0.exe 25PP]<br />
|<br />
*Initial release<br />
|-<br />
| 1.0.1<br />
| <code>05a0727085de1dd60eb4ec3a7bc343dd317d55d5</code><br />
| [http://dl.pangu.25pp.com/jb/Pangu9_v1.0.1.exe 25PP]<br />
| <br />
* Fixed a bug that leads to 0A error code.<br />
* Fixed failure of launching on some PCs.<br />
* Improved success rate.<br />
* Ensure the removal of the Pangu app.<br />
|-<br />
| 1.1.0<br />
| <code>1467a5a792186f157e11ed4d3b243aea80d95a40</code><br />
| [http://dl.pangu.25pp.com/jb/Pangu9_v1.1.0.exe 25PP]<br />
| <br />
* Improve the success rate and reliability of jailbreak program for 64bit devices<br />
* Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to jailbreak due to low disk space in Windows.<br />
* Fix a bug that leads to an exit of the jailbreak tool due to abnormal network status.<br />
* Add the re-jailbreak function (only for some devices that were upgraded via iTunes but were detected as jailbroken)<br />
* Fix a bug that leads to fail to use the instrument function in Xcode.<br />
|-<br />
| 1.2.0<br />
| <code>2f5fae088e7c1b1058ab4dda826d9cab21d6f57d</code><br />
| [http://dl.pangu.25pp.com/jb/Pangu9_v1.2.0.exe 25PP]<br />
| <br />
* Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari<br />
* Fixed the bug that “preferences -> Storage&iCloud Usage -> Manage Storage” keeps spinning<br />
|-<br />
| 1.3.0<br />
| <code>de1eee0d34fea80f6f798e722614a55b74590b4d</code><br />
| [http://dl.pangu.25pp.com/jb/Pangu9_v1.3.0.exe 25PP]<br />
| <br />
* Add support for iOS 9.1 devices (64bit only)<br />
|-<br />
| 1.3.1<br />
| <code>c1af8b5ff94b28007b8b1523bf297423413659fe</code><br />
| [http://dl.pangu.25pp.com/jb/Pangu9_v1.3.1.exe 25PP]<br />
| <br />
* Make untether of iOS 9.1 more stable<br />
|-<br />
| 1.3.2<br />
| <code>9a88b81c92eebccf8b059eafb5c2bacb169024bc</code><br />
| [http://web.archive.org/web/20170628022716/http://dl.pangu.25pp.com/jb/Pangu9_v1.3.2.exe Archive of 25PP]<br />
| <br />
* ?<br />
|}<br />
<br />
==== Mac ====<br />
{| class="wikitable"<br />
! Version<br />
! SHA-1 Hash<br />
! Download<br />
! Changes<br />
|-<br />
| 1.0.0<br />
| <code>3ab73c9c9b91b0dab97f071f1ac179d198ca90f6</code><br />
| [http://dl.pangu.25pp.com/jb/pangu9_mac_v1.0.0.dmg 25PP]<br />
| Initial version<br />
|-<br />
| 1.1.0<br />
| <code>6291c1906f80b9e655ebaf5bbddc388e0636509a</code><br />
| [http://dl.pangu.25pp.com/jb/pangu9_mac_v1.1.0.dmg 25PP]<br />
| Add support for iOS 9.1 devices (64-bit devices only)<br />
|-<br />
| 1.1.1<br />
| <code>9b2d03542383b5b4686c8593143eb15ddd4bc740</code><br />
| [https://web.archive.org/web/20180826065722/http://dl.pangu.25pp.com/jb/pangu9_mac_v1.1.1.dmg Archive of 25PP]<br />
| Make the iOS 9.1 untether more stable<br />
|}<br />
<br />
=== Pangu9 for tvOS 9.0 - 9.1 (Apple TV) ===<br />
{| class="wikitable"<br />
! Version<br />
! SHA-1 Hash<br />
! Download<br />
! Changes<br />
|-<br />
| 1.0.0<br />
| <code>e87b4afaee4a91cb8e300b8976a03f414ed788da</code><br />
| [http://dl.pangu.25pp.com/jb/Pangu9_ATV_v1.0.zip 25PP]<br />
| Initial version<br />
|}<br />
<br />
=== Pangu9 for iOS 9.2 - 9.3.3 ===<br />
==== IPA ====<br />
{| class="wikitable"<br />
! Version<br />
! MD5 Hash<br />
! SHA-1 Hash<br />
! Download<br />
! Changes<br />
|-<br />
| 1.0<br />
| <code>fe77f02db26b9d3d142ee1f343a6fdbb</code><br />
| <code>ab334937cd7bb7077eac25b223bd3784e8dcd7b7</code><br />
| [http://dl.pangu.25pp.com/jb/NvwaStone_1.0.ipa 25PP]<br />
| Initial version<br />
|-<br />
| 1.1<br />
| <code>34c6b2ff4d21b6bf29f16d1793db8fd5 </code><br />
| <code>e12cda775b8b8764e100eb7e6217b8ed7637ef20</code><br />
| [http://dl.pangu.25pp.com/jb/NvwaStone_1.1.ipa 25PP]<br />
| Ability to use Pangu's expired Enterprise certificate, which lasts until April 2017<br />
|}<br />
<br />
== Name ==<br />
"Pangu" is the name of the "[[wikipedia:Pangu|the first living being and the creator of all in some versions of Chinese mythology]]".<br />
<br />
The 9.0-9.1 untether is nicknamed "Fuxi Qin". This continues the tradition of Chinese mythology from the previous jailbreaks (Pangu Axe, XuanYuan Sword), by referring to the instrument (琴) carried by the legendary emperor [[wikipedia:Fuxi|Fuxi]] (伏羲).<br />
<br />
Similarly, the 9.2-9.3.3 untether is nicknamed "[[wikipedia:Nüwa|Nüwa]] Stone" (seen in the file name, where v is used instead of ü), referring to the stones that Nüwa used to patch the sky.<br />
<br />
== See Also ==<br />
*[[jbme|JailbreakMe for iOS 9.2-9.3.3]]<br />
<br />
[[Category:Jailbreaks]]<br />
[[Category:Jailbreaking]]</div>Dimitarnestorov