The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "PwnPie"
(No hate against each other here please. And removed the slang.) |
Qwertyoruiop (talk | contribs) |
||
Line 23: | Line 23: | ||
https://github.com/qwertyoruiop/PwnPie/blob/master/PwnPie.sh |
https://github.com/qwertyoruiop/PwnPie/blob/master/PwnPie.sh |
||
+ | |||
+ | '''This is ''OUTDATED'', use Sekrit instead.''' |
||
~qwertyoruiop |
~qwertyoruiop |
||
Revision as of 18:39, 25 November 2010
This page was marked for deletion. |
Reason: joke page / no useful information
If you disagree with the reason for deletion, please discuss this deletion request this page's talk page. |
PwnPie is another annoying app being disclosed on TheiPhoneWiki.
PwnPie also is what iKeys should be, but iKeys isn't real.
What it does
Basically it takes an ipsw and parses every img3 inside.
Using BASH, we launch GreenPois0n monitoring his output, and when it loads iBSS we kill it. We will have a iDevice in iBSS pwned.
Using teh "go aes dec" command we find keys/ivs and format them.
The tool will also decrypt for you the whole ipsw, so you can play w/ it easily.
A private beta version can produce a TheiPhoneWiki's page, allowing to add keys easily.
If you are a scriptkiddie please go away and try to do that manually a lot of times, to learn how KBAG works.
If you are too bored to get keys/ivs but you know how to do, use this.
Latest version can be found here: https://github.com/qwertyoruiop/PwnPie/blob/master/PwnPie.sh
This is OUTDATED, use Sekrit instead.
~qwertyoruiop