| 
 The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information.  | 
Difference between revisions of "PwnStrap"
 (I'll update this - too tried to do it right tonight/this morning)  | 
				m (oops)  | 
				||
| Line 1: | Line 1: | ||
[http://www.bingner.com/pwnstrap.html Link to original info and some binaries]  | 
  [http://www.bingner.com/pwnstrap.html Link to original info and some binaries]  | 
||
| − | This is the procedure to use greenpois0n to bootstrap the   | 
  + | This is the procedure to use greenpois0n to bootstrap the loading of a new limera1n exploit-based pwnagetool image via windows or other irecovery and a supported device:  | 
# irecovery -c  | 
  # irecovery -c  | 
||
# setenv boot-args 2  | 
  # setenv boot-args 2  | 
||
| Line 15: | Line 15: | ||
# go jump 0x41000040  | 
  # go jump 0x41000040  | 
||
# restore your CFW from itunes  | 
  # restore your CFW from itunes  | 
||
| + | |||
| + | |||
| + | You will need one of the new binaries posted above if you have an AppleTV2  | 
||
Revision as of 18:27, 23 October 2010
Link to original info and some binaries
This is the procedure to use greenpois0n to bootstrap the loading of a new limera1n exploit-based pwnagetool image via windows or other irecovery and a supported device:
- irecovery -c
 - setenv boot-args 2
 - setenv auto-boot false
 - saveenv
 - run greenpois0n - it will stop on a white screen.
 - extract iBSS from your custom pwnagetool image
 - irecovery -f iBSS
 - irecovery -c
 - setenv boot-args 0
 - saveenv
 - go image decrypt 0x41000000
 - go jump 0x41000040
 - restore your CFW from itunes
 
You will need one of the new binaries posted above if you have an AppleTV2