Search results

Jump to: navigation, search
  • | Version = 2.1 beta | Device = iPod1,1
    2 KB (176 words) - 16:27, 10 November 2019
  • = Method 1 = * Pwned [[M68AP|iPhone]] on [[iOS]] 1.1.4
    7 KB (1,062 words) - 10:01, 12 October 2015
  • The name used in firmware is iPod2,1.
    816 bytes (116 words) - 21:10, 21 March 2017
  • | Version = 4.2.1 [[Golden Master|GM]] and 4.2.1 | Device = iPad1,1
    4 KB (553 words) - 19:14, 10 November 2019
  • ...e the signature of the 8900 files? Would it be possible to replace it on a 1.0.2 fw, and then sign our own modified iBEC to dump the decrypted kernelcac I found this interesting site: [1] (scroll to bottom for iPhone). It seems the iPhone uses a proprietary Sams
    37 KB (6,324 words) - 21:12, 20 March 2015
  • '''bit 1''': No ...; if 'option' is not set to 0, then set mimimum address to -1 and maximum address to 0. then return. wtf?
    16 KB (2,016 words) - 08:46, 14 March 2017
  • * [[usb_control_msg(0xA1, 1) Exploit]]
    1 KB (167 words) - 12:33, 23 March 2017
  • ...support for 8900 files any longer. So you cannot just cheat by sending a 1.1.4 iBoot and then using the diags exploit to strap a patched one ;-) In the 1.1.x days, we can all agree that Apple probably did not expect people to be pu
    14 KB (2,533 words) - 18:42, 28 May 2017
  • ...sn0w-lite") for the [[N72AP|iPod touch (2nd generation)]] on iPhone OS 2.1.1. It is their payload for the [[ARM7 Go]] backdoor. It's analagous to how [[ ROM:00000008 ; went OK, versus -1, saying there was an error
    3 KB (385 words) - 04:31, 17 March 2018
  • | Version = 3.1.2 | Device = iPod2,1
    3 KB (453 words) - 16:30, 10 November 2019
  • ...the [[IMG3 File Format|IMG3]] DER so that the second invocation of the SHA-1 hardware was not performed without affecting the first, allowing better con The final SHA-1 register address was chosen so that the first dword of the DATA tag of the
    11 KB (1,918 words) - 17:13, 22 October 2021
  • | Device = iPod1,1
    3 KB (396 words) - 16:27, 10 November 2019
  • ...9b3 was released for Windows and Mac OS X, and it allows iOS 3.0 through 3.1.2 to be jailbroken. It includes support for all devices except the [[N18AP| ...ows jailbreaking of early [[N72AP|iPod touch (2nd generation)]] with iOS 3.1.3.
    23 KB (3,037 words) - 10:20, 15 May 2021
  • === 1.0.x === ...hex editor, or open up a console and run <code>dd(1)</code><sup>[{{man|dd|1}}]</sup>:
    8 KB (1,342 words) - 08:42, 7 February 2022
  • ...U, increased RAM, Nike+ support, etc. The name used in firmware is iPhone2,1. ...exploit that allows executing unsigned code over USB; fixed in iPhone OS 3.1 beta 3.
    3 KB (423 words) - 15:08, 2 March 2022
  • | Device = iPhone2,1
    4 KB (618 words) - 19:11, 10 November 2019
  • | Device = iPod2,1
    3 KB (419 words) - 16:30, 10 November 2019
  • | Device = iPod2,1
    3 KB (436 words) - 16:30, 10 November 2019
  • ...{{date|2011|02|03}}, which performs an [[untethered jailbreak]] on iOS 4.2.1 for most devices that support it. Instead of using the [[Packet Filter Kern * Supports more iDevices than [[SHA-1 Image Segment Overflow|SHAtter]]
    4 KB (585 words) - 23:37, 16 September 2021
  • * '''Bit 1 (1bit)''': Chip Firmware
    970 bytes (116 words) - 16:03, 19 September 2016

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)