The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Blackbird Exploit"
(created the blackbird exploit page, marking as stub because the exploit could be explained in more detail.) |
m (Source: Clarity#0625 on Discord (https://discord.com/channels/624739448927682611/740700630376775793/1019371653681123338). Also fixed the stub template.) |
||
Line 1: | Line 1: | ||
{{lowercase}} |
{{lowercase}} |
||
− | The '''blackbird exploit''' is a [[Secure Enclave Processor|SEP]] [[bootrom]] exploit |
+ | The '''blackbird exploit''' is a [[Secure Enclave Processor|SEP]] [[bootrom]] exploit that is currently known to be capable of executing unsigned code on the SEP's of devices with [[A8]], [[A9]], [[A10]], or [[T2]] chips. This exploit can only function in combination with [[checkm8 Exploit|checkm8]] or an [[iBoot (Bootloader)|iBoot]] exploit. |
− | |||
− | The blackbird exploit is known to be able to load an arbitrary SEP OS on the [[A8]] and [[A9]] processors, and perform a replay attack on the [[A10]] and [[T2]] processors. |
||
[[checkra1n]] is currently the only known tool capable of using the blackbird exploit, and only for the [[A10]] and [[T2]] processors. |
[[checkra1n]] is currently the only known tool capable of using the blackbird exploit, and only for the [[A10]] and [[T2]] processors. |
||
Line 12: | Line 10: | ||
[[Category:Bootrom Exploits]] |
[[Category:Bootrom Exploits]] |
||
− | {{stub}} |
+ | {{stub|exploit}} |
Revision as of 00:43, 14 September 2022
The blackbird exploit is a SEP bootrom exploit that is currently known to be capable of executing unsigned code on the SEP's of devices with A8, A9, A10, or T2 chips. This exploit can only function in combination with checkm8 or an iBoot exploit.
checkra1n is currently the only known tool capable of using the blackbird exploit, and only for the A10 and T2 processors.
References
This exploit article is a "stub", an incomplete page. Please add more content to this article and remove this tag. |