Search results

Jump to: navigation, search
  • ...e signature of the 8900 files? Would it be possible to replace it on a 1.0.2 fw, and then sign our own modified iBEC to dump the decrypted kernelcache, MOV R2, #2 ; Mode.
    37 KB (6,324 words) - 21:12, 20 March 2015
  • '''bit 2''': No ...off_FF0BD70 DCD iBoot_flags ; DATA XREF: Set_Up_Allowed_Range+2�r
    16 KB (2,016 words) - 08:46, 14 March 2017
  • ...he DFU is the [[DFU 0x1227]], and therefore not vulnerable to the [[Pwnage 2.0]] attack. ===DFU 2.0===
    14 KB (2,533 words) - 18:42, 28 May 2017
  • ...plies that (1) Apple is making yet ANOTHER revision, for some reason, and (2) this is pure speculation, so take it as it is, but it _might_ mean that th ...6 instead of the currently used aes-128. It also has a second KBAG with a "2" in the space that would normally have "1" (meaning IV / Key pair is encryp
    4 KB (636 words) - 01:48, 25 January 2013
  • ...3 was released for Windows and Mac OS X, and it allows iOS 3.0 through 3.1.2 to be jailbroken. It includes support for all devices except the [[N18AP|iP ...pports jailbreaking of all iDevices (at the time) with iOS 3.0 through 3.1.2 on Windows and Mac OS X, as well as 3.1.3 on [[S5L8900]] devices. Version 0
    23 KB (3,037 words) - 10:20, 15 May 2021
  • ...ted. So, in order to use them, all you need to do is remove the 2048 byte (2 KiB) [[8900 File Format|8900 header]] from the file. You can do this w === 1.1.x - 2.0b3 ===
    8 KB (1,342 words) - 08:42, 7 February 2022
  • ...s a meta-project, finish this and all your reversing tasks will be sped up 2-20x
    3 KB (594 words) - 13:07, 17 September 2021
  • ...gned code execution over USB. Even newer devices, starting with the [[iPad 2]], have no bootrom exploits to run unsigned code ''at all''.
    3 KB (399 words) - 09:52, 26 March 2017
  • ...e [[Bootrom 359.3]] Units produced after 2009 week 40 have [[Bootrom 359.3.2]] and are not vulnerable to the [[0x24000 Segment Overflow]]. ...ntethered exploit available for both of the bootroms, both [[Bootrom 359.3.2|new]] and [[Bootrom 359.3|old]].
    3 KB (423 words) - 15:08, 2 March 2022
  • | Device = iPhone1,2
    3 KB (429 words) - 19:11, 10 November 2019
  • | Version = 4.2 beta 2
    3 KB (436 words) - 16:30, 10 November 2019
  • [[S5L8920]] using THUMB-2 instruction set as well as ARM and THUMB ones. Binaries included in iOS are Units produced after 2009 week 40 have [[Bootrom 359.3.2]] and not vulnerable to the [[0x24000 Segment Overflow]].
    1,003 bytes (136 words) - 07:36, 12 April 2017
  • ...n {{date|2011|02|03}}, which performs an [[untethered jailbreak]] on iOS 4.2.1 for most devices that support it. Instead of using the [[Packet Filter Ke ...Atter]] and patched it in the [[S5L8940|A5]] chip released with the [[iPad 2]].
    4 KB (585 words) - 23:37, 16 September 2021
  • | colspan="2" | <b>Base</b>: 0xBF500000 * '''Bit 2 (1bit)''': Security Domain
    970 bytes (116 words) - 16:03, 19 September 2016
  • ....0.1 issue or have I missed something? --[[User:CleanAir|CleanAir]] 09:49, 2 August 2009 (UTC) ...es that allow AES GID/UID key usage. --[[User:Cool name|Cool name]] 14:28, 2 August 2009 (UTC)
    3 KB (440 words) - 16:16, 28 March 2017
  • | Device = iPhone1,2
    3 KB (421 words) - 19:11, 10 November 2019
  • | Version = 3.1 beta 2
    3 KB (405 words) - 18:40, 10 November 2019
  • * BuildManifest.plist (first appeared in [[iOS|iPhone OS]] 3.0 beta 2) | Savage/Savage.B[0/2]-[Dev/Prod].[vt.]fw
    5 KB (677 words) - 00:44, 21 March 2022
  • 2. Using a hardware test point, pull an address line high, so it thinks it's and 1.1.2 comes along, patching the tiff vuln, things start to get more complex:
    6 KB (948 words) - 13:38, 17 September 2021
  • | Version = 3.1 beta 2 | Device = iPhone1,2
    3 KB (404 words) - 19:11, 10 November 2019

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)