|
The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "PwnPie"
(We now allow GUI Tools here (with limitations). Article needs more cleanup.) |
|||
| Line 1: | Line 1: | ||
| + | PwnPie also is what [[iKeys]] should be, but [[iKeys]] isn't real. |
||
| − | {{delete|No Useful Info}} |
||
| − | |||
| − | PwnPie is another annoying app being disclosed on TheiPhoneWiki. |
||
| − | |||
| − | PwnPie also is what iKeys should be, but iKeys isn't real. |
||
== What it does == |
== What it does == |
||
| − | *Basically it takes an ipsw and parses every img3 inside. |
+ | *Basically it takes an [[ipsw]] and parses every [[img3]] inside. |
| − | *Using BASH, we launch |
+ | *Using [[BASH]], we launch [[Greenpois0n (toolkit)|greenpois0n]] monitoring its output, and when it loads [[iBSS]] we kill it. |
| − | We will have |
+ | We will have an iDevice in [[iBSS]] [[pwned]]. |
| − | *Using |
+ | *Using the <pre>go aes dec</pre> command we find keys/IVs and format them. |
| − | *The tool will also decrypt for you the whole ipsw, so you can play |
+ | *The tool will also decrypt for you the whole [[ipsw]], so you can play with it easily. |
*A private beta version can produce a TheiPhoneWiki's page, allowing to add keys easily. |
*A private beta version can produce a TheiPhoneWiki's page, allowing to add keys easily. |
||
| − | *If you are a scriptkiddie please go away and try to do that manually a lot of times, to learn how KBAG works. |
||
| − | *If you are too bored to get keys/ivs but you know how to do, use this. |
||
*Latest version can be found here: https://github.com/qwertyoruiop/PwnPie/blob/master/PwnPie.sh |
*Latest version can be found here: https://github.com/qwertyoruiop/PwnPie/blob/master/PwnPie.sh |
||
| − | |||
'''This is ''OUTDATED'', use [[Sekrit]] instead.''' |
'''This is ''OUTDATED'', use [[Sekrit]] instead.''' |
||
== Requirements == |
== Requirements == |
||
| + | *[[XPwn]]: [http://www.megaupload.com/?d=J9A84LP7 megaupload] |
||
| − | {| border="1" class="wikitable" |
||
| + | *[[IRecovery]]: [http://cl.ly/38TE cloud] |
||
| − | |- |
||
| + | *LibPNG: [http://ethan.tira-thompson.org/Mac_OS_X_Ports_files/libpng%20%28universal%29.dmg download] |
||
| − | |[[XPwn]] |
||
| + | *libusb1: [http://0wn-team.info/LibUSB%20Installer.zip download] |
||
| − | |[[IRecovery]] |
||
| + | |||
| − | |LibPNG |
||
| + | [[Category:GUI Tools]] |
||
| − | |libusb1 |
||
| − | |- |
||
| − | |http://www.megaupload.com/?d=J9A84LP7 |
||
| − | |http://cl.ly/38TE |
||
| − | |http://ethan.tira-thompson.org/Mac_OS_X_Ports_files/libpng%20%28universal%29.dmg |
||
| − | |http://0wn-team.info/LibUSB%20Installer.zip |
||
Revision as of 05:39, 26 February 2011
PwnPie also is what iKeys should be, but iKeys isn't real.
What it does
- Basically it takes an ipsw and parses every img3 inside.
- Using BASH, we launch greenpois0n monitoring its output, and when it loads iBSS we kill it.
We will have an iDevice in iBSS pwned.
- Using the
go aes dec
command we find keys/IVs and format them. - The tool will also decrypt for you the whole ipsw, so you can play with it easily.
- A private beta version can produce a TheiPhoneWiki's page, allowing to add keys easily.
- Latest version can be found here: https://github.com/qwertyoruiop/PwnPie/blob/master/PwnPie.sh
This is OUTDATED, use Sekrit instead.