| 
 The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information.  | 
Difference between revisions of "PwnPie"
 (→Requirements)  | 
				m (→What it does)  | 
				||
| (2 intermediate revisions by one other user not shown) | |||
| Line 1: | Line 1: | ||
| − | '''PwnPie''' is an outdated IV/Key decrypter for   | 
  + | '''PwnPie''' is an outdated IV/Key decrypter for [[wikipedia:OS X|OS X]] and is designed to be what the nonexistent [[iKeys]] is supposed to be.  | 
== What it does ==  | 
  == What it does ==  | 
||
* Basically it takes an [[IPSW]] and parses every [[Img3]] inside.   | 
  * Basically it takes an [[IPSW]] and parses every [[Img3]] inside.   | 
||
| − | * Using   | 
  + | * Using BASH, we launch [[Greenpois0n (toolkit)|greenpois0n]] monitoring its output, and when it loads [[iBSS]] we kill it.  | 
We will have an iDevice in [[pwned]] [[iBSS]] mode.  | 
  We will have an iDevice in [[pwned]] [[iBSS]] mode.  | 
||
* Using the <code>go aes dec</code> command we find keys/IVs and format them.  | 
  * Using the <code>go aes dec</code> command we find keys/IVs and format them.  | 
||
| Line 11: | Line 11: | ||
* [[XPwn]]: [https://github.com/planetbeing/xpwn GitHub]  | 
  * [[XPwn]]: [https://github.com/planetbeing/xpwn GitHub]  | 
||
* [[IRecovery]]: [http://cl.ly/38TE CloudApp]  | 
  * [[IRecovery]]: [http://cl.ly/38TE CloudApp]  | 
||
| − | * [[  | 
  + | * [[wikipedia:libpng|libpng]]: [http://www.libpng.org/pub/png/libpng.html libpng.org]  | 
| + | * [[wikipedia:libusb|libusb]]: [http://www.libusb.org/ libusb.org]  | 
||
| − | * [[LibUSB]]  | 
  ||
== Notes ==  | 
  == Notes ==  | 
||
Latest revision as of 17:01, 16 July 2014
PwnPie is an outdated IV/Key decrypter for OS X and is designed to be what the nonexistent iKeys is supposed to be.
What it does
- Basically it takes an IPSW and parses every Img3 inside.
 - Using BASH, we launch greenpois0n monitoring its output, and when it loads iBSS we kill it.
 
We will have an iDevice in pwned iBSS mode.
- Using the 
go aes deccommand we find keys/IVs and format them. - The tool will also decrypt for you the rootfs inside of the IPSW, so you can play with it easily.
 
Requirements
Notes
- This app is outdated, PyPie is recommended.