Search results

Jump to: navigation, search
  • ...come into play here. We're running unsigned code, and convincing s-gold3 bootrom we deserve a downgrade. It happily complies. :::::::I was coding this for the 1.1.4 OOTB when Geohot found the exploit and unlocked it. So I gave up..but maybe it's time to look at it again. ~ D
    6 KB (1,115 words) - 20:07, 11 January 2011
  • ...rs to select certain behavior. So this only works with an iBoot or bootrom exploit. I understand that in earlier firmware versions there was simply an iBoot v
    26 KB (4,298 words) - 11:11, 14 September 2022
  • ...d the exploit first, you get credit. Credit is set in stone as soon as the exploit is revealed, and is given to as many people who discovered it independently ...bly worth splitting into a separate page for the implementation versus the exploit itself.
    6 KB (1,005 words) - 02:34, 26 August 2015
  • :No. This is in the bootrom to reinstall firmware even without any software installed. Without DFU Mode ...e into recovery and then, I think? DFU. I know that they used the limera1n exploit.--[[User:Dylan Laws|Dylan Laws]] 08:47, 23 January 2012 (MST)
    9 KB (1,442 words) - 11:31, 29 August 2013
  • I'm almost sure the DFU exploit is still there, because the DFU file is still 89001. Use [[Obtaining_IMG3_K Is the DFU exploit there? Test it using "iran", not iTunes. If not, then we are up against som
    3 KB (489 words) - 21:07, 6 October 2015
  • ...ication processor, and every step in between. hopefully we can look for an exploit down in unflashable space, like dfu ...ed the stack overflow, Apple would retaliate with burning the new WTF into bootrom of the new device (itouch 2g), so they probably just opted to go with the s
    3 KB (567 words) - 19:14, 15 October 2008
  • == Exploit == The exploit consists from 4 parts:
    27 KB (3,160 words) - 13:28, 17 September 2021
  • == [[Bootrom]] Exploits == * [[0x24000 Segment Overflow]] - only in [[Bootrom 240.4]] (old bootrom)
    1 KB (167 words) - 12:33, 23 March 2017
  • ...m]]. It is based off of WTF 2.0, and is much more secure than the previous bootrom. It boils down to 3 things: ...So you cannot just cheat by sending a 1.1.4 iBoot and then using the diags exploit to strap a patched one ;-)
    14 KB (2,533 words) - 18:42, 28 May 2017
  • ...ure speculation, so take it as it is, but it _might_ mean that there is an exploit in the s5l8720x rev that Apple found and is quitely trying to fixed. Again, ...look into it for the hell of it, but as far as I know, they use the Pwnage exploit. but hmmm...it would not be below RiP Dev to get an enterprise membership j
    4 KB (636 words) - 01:48, 25 January 2013
  • ...was the first exploit in the [[S5L8720]] that allowed people to bypass the bootrom signature checks on [[LLB]] and create what is known as an [[untethered jai == Exploit==
    11 KB (1,918 words) - 17:13, 22 October 2021
  • ...ks for the explanation, I think I understand it now. If I am correct, this exploit also hinges on the fact that the kernel does not sigcheck the stuff it writ Nice exploit and documentation. It always amazes me to see the stuff they forgot. --[[Us
    3 KB (593 words) - 22:12, 9 April 2011
  • ...iPhone 3G]] and [[N72AP|iPod touch (2nd generation)]] ([[Bootrom 240.4|old bootrom]]) with iOS 4.0 on Windows and Mac OS X. ...P|iPod touch]], [[N72AP|iPod touch (2nd generation)]] ([[Bootrom 240.4|old bootrom]])
    23 KB (3,037 words) - 10:20, 15 May 2021
  • * Find a new [[iBoot]] exploit every time a new firmware is out. * Use a bootrom exploit that allows unsigned code execution via USB.
    3 KB (399 words) - 09:52, 26 March 2017
  • ...firmware OOB, which ships with iBoot-6xx, so probably the segment overflow exploit is gone... --[[User:Pjakuszew|Pjakuszew]] 13:33, 13 June 2009 (UTC) 3.0 fw is iBoot-59x.xx, but anyway, the exploit is in bootrom, that is why it's likely to stay (hopefully) [[User:ChronicDev|ChronicDev]]
    5 KB (896 words) - 02:44, 7 May 2011
  • ===Bootrom=== ...vices that have [[Bootrom 359.3]] Units produced after 2009 week 40 have [[Bootrom 359.3.2]] and are not vulnerable to the [[0x24000 Segment Overflow]].
    3 KB (423 words) - 15:08, 2 March 2022
  • == [[Bootrom]] == '''Bootrom Version''': [[Bootrom 359.3]]
    1,003 bytes (136 words) - 07:36, 12 April 2017
  • ...ts: SHAtter (a [[bootrom]] [[exploit]]) as well as a userland [[kernel]] [[exploit]] provided by [[User:Comex|Comex]] to make the jailbreak [[untethered jailb ...09}}, which led to a delay in greenpois0n's release (to implement geohot's exploit, not SHAtter).
    4 KB (585 words) - 23:37, 16 September 2021
  • ...rable to the [[limera1n Exploit|limera1n]] and [[checkm8 Exploit|checkm8]] bootrom exploits.
    1 KB (187 words) - 16:03, 4 November 2022
  • ==Bootrom Exploits== * [[Checkm8 Exploit|checkm8]]
    546 bytes (74 words) - 08:10, 5 December 2020

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)