Search results

Jump to: navigation, search
  • | Device = iPhone3,2
    4 KB (565 words) - 19:09, 10 November 2019
  • = Method 2 = mw 0x900000C 0xE3A02001 //1=gid-key 2=uid-key
    7 KB (1,062 words) - 10:01, 12 October 2015
  • ...2 files can only be parsed by an [[iBoot]] in firmwares prior to iPhone OS 2.0 beta 3, or the [[S5L8900]] [[VROM]]. The [[S5L8720]] and newer [[bootrom] ...]] file. It can only be parsed by an iBoot in a firmware version less than 2.0 beta 3, or the [[S5L8900]] [[VROM]]. The [[S5L8720]] and newer have no su
    4 KB (641 words) - 17:01, 12 July 2017
  • * [[DFU 0x1227|0x1227]] ([[DFU Mode]]/[[WTF]] Mode 2.0) ===DFU 2.0 (0x1227)===
    4 KB (569 words) - 14:05, 17 September 2021
  • ...e signature of the 8900 files? Would it be possible to replace it on a 1.0.2 fw, and then sign our own modified iBEC to dump the decrypted kernelcache, MOV R2, #2 ; Mode.
    37 KB (6,324 words) - 21:12, 20 March 2015
  • '''bit 2''': No ...off_FF0BD70 DCD iBoot_flags ; DATA XREF: Set_Up_Allowed_Range+2�r
    16 KB (2,016 words) - 08:46, 14 March 2017
  • ...he DFU is the [[DFU 0x1227]], and therefore not vulnerable to the [[Pwnage 2.0]] attack. ===DFU 2.0===
    14 KB (2,533 words) - 18:42, 28 May 2017
  • ...3 was released for Windows and Mac OS X, and it allows iOS 3.0 through 3.1.2 to be jailbroken. It includes support for all devices except the [[N18AP|iP ...pports jailbreaking of all iDevices (at the time) with iOS 3.0 through 3.1.2 on Windows and Mac OS X, as well as 3.1.3 on [[S5L8900]] devices. Version 0
    23 KB (3,037 words) - 10:20, 15 May 2021
  • ...ted. So, in order to use them, all you need to do is remove the 2048 byte (2 KiB) [[8900 File Format|8900 header]] from the file. You can do this w === 1.1.x - 2.0b3 ===
    8 KB (1,342 words) - 08:42, 7 February 2022
  • ...s a meta-project, finish this and all your reversing tasks will be sped up 2-20x
    3 KB (594 words) - 13:07, 17 September 2021
  • ...gned code execution over USB. Even newer devices, starting with the [[iPad 2]], have no bootrom exploits to run unsigned code ''at all''.
    3 KB (399 words) - 09:52, 26 March 2017
  • ...e [[Bootrom 359.3]] Units produced after 2009 week 40 have [[Bootrom 359.3.2]] and are not vulnerable to the [[0x24000 Segment Overflow]]. ...ntethered exploit available for both of the bootroms, both [[Bootrom 359.3.2|new]] and [[Bootrom 359.3|old]].
    3 KB (423 words) - 15:08, 2 March 2022
  • | Device = iPhone1,2
    3 KB (429 words) - 19:11, 10 November 2019
  • | Version = 4.2 beta 2
    3 KB (436 words) - 16:30, 10 November 2019
  • [[S5L8920]] using THUMB-2 instruction set as well as ARM and THUMB ones. Binaries included in iOS are Units produced after 2009 week 40 have [[Bootrom 359.3.2]] and not vulnerable to the [[0x24000 Segment Overflow]].
    1,003 bytes (136 words) - 07:36, 12 April 2017
  • ...n {{date|2011|02|03}}, which performs an [[untethered jailbreak]] on iOS 4.2.1 for most devices that support it. Instead of using the [[Packet Filter Ke ...Atter]] and patched it in the [[S5L8940|A5]] chip released with the [[iPad 2]].
    4 KB (585 words) - 23:37, 16 September 2021
  • | colspan="2" | <b>Base</b>: 0xBF500000 * '''Bit 2 (1bit)''': Security Domain
    970 bytes (116 words) - 16:03, 19 September 2016
  • | Device = iPhone1,2
    3 KB (421 words) - 19:11, 10 November 2019
  • | Version = 3.1 beta 2
    3 KB (405 words) - 18:40, 10 November 2019
  • * BuildManifest.plist (first appeared in [[iOS|iPhone OS]] 3.0 beta 2) | Savage/Savage.B[0/2]-[Dev/Prod].[vt.]fw
    5 KB (677 words) - 00:44, 21 March 2022

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)