|
The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "PwnPie"
m (→What it does) |
|||
| (16 intermediate revisions by 5 users not shown) | |||
| Line 1: | Line 1: | ||
| + | '''PwnPie''' is an outdated IV/Key decrypter for [[wikipedia:OS X|OS X]] and is designed to be what the nonexistent [[iKeys]] is supposed to be. |
||
| − | {{delete|joke page / no useful information}} |
||
| − | PwnPie is another annoying app being disclosed on TheiPhoneWiki. |
||
| − | |||
| − | PwnPie also is what iKeys should be, but iKeys isn't real. |
||
== What it does == |
== What it does == |
||
| − | Basically it takes an |
+ | * Basically it takes an [[IPSW]] and parses every [[Img3]] inside. |
| + | * Using BASH, we launch [[Greenpois0n (toolkit)|greenpois0n]] monitoring its output, and when it loads [[iBSS]] we kill it. |
||
| − | |||
| + | We will have an iDevice in [[pwned]] [[iBSS]] mode. |
||
| − | Using BASH, we launch GreenPois0n monitoring his output, and when it loads iBSS we kill it. |
||
| + | * Using the <code>go aes dec</code> command we find keys/IVs and format them. |
||
| − | We will have a iDevice in iBSS pwned. |
||
| + | * The tool will also decrypt for you the rootfs inside of the [[IPSW]], so you can play with it easily. |
||
| − | |||
| − | Using teh "go aes dec" command we find keys/ivs and format them. |
||
| − | |||
| − | The tool will also decrypt for you the whole ipsw, so you can play w/ it easily. |
||
| − | |||
| − | A private beta version can produce a TheiPhoneWiki's page, allowing to add keys easily. |
||
| − | |||
| − | If u r a scriptkiddie please go away (eg. liamchat) and try to do that manually a lot of times, to learn how KBAG works. |
||
| − | |||
| − | If u r too bored to get keys/ivs but you know how to do, use this. |
||
| − | |||
| − | Latest version can be found here: |
||
| − | https://github.com/qwertyoruiop/PwnPie/blob/master/PwnPie.sh |
||
| + | == Requirements == |
||
| − | ~qwertyoruiop |
||
| + | * [[XPwn]]: [https://github.com/planetbeing/xpwn GitHub] |
||
| + | * [[IRecovery]]: [http://cl.ly/38TE CloudApp] |
||
| + | * [[wikipedia:libpng|libpng]]: [http://www.libpng.org/pub/png/libpng.html libpng.org] |
||
| + | * [[wikipedia:libusb|libusb]]: [http://www.libusb.org/ libusb.org] |
||
| − | == |
+ | == Notes == |
| + | * This app is outdated, [[PyPie]] is recommended. |
||
| + | [[Category:GUI Tools]] |
||
| − | {| border="1" class="wikitable" |
||
| − | |- |
||
| − | |[[XPwn]] |
||
| − | |[[IRecovery]] |
||
| − | |LibPNG |
||
| − | |libusb1 |
||
| − | |- |
||
| − | |http://www.megaupload.com/?d=J9A84LP7 |
||
| − | |http://cl.ly/38TE |
||
| − | |http://ethan.tira-thompson.org/Mac_OS_X_Ports_files/libpng%20%28universal%29.dmg |
||
| − | |http://0wn-team.info/LibUSB%20Installer.zip |
||
Latest revision as of 17:01, 16 July 2014
PwnPie is an outdated IV/Key decrypter for OS X and is designed to be what the nonexistent iKeys is supposed to be.
What it does
- Basically it takes an IPSW and parses every Img3 inside.
- Using BASH, we launch greenpois0n monitoring its output, and when it loads iBSS we kill it.
We will have an iDevice in pwned iBSS mode.
- Using the
go aes deccommand we find keys/IVs and format them. - The tool will also decrypt for you the rootfs inside of the IPSW, so you can play with it easily.
Requirements
Notes
- This app is outdated, PyPie is recommended.