Search results

Jump to: navigation, search
  • ...talk to [[iBoot (Bootloader)|iBoot]] and [[iBSS]] and [[iBEC]] via USB. It's completely open source; the source code is released under the terms of the ./iRecovery -s
    4 KB (569 words) - 14:05, 17 September 2021
  • This is an empty folder. It's usage is unknown.
    170 bytes (20 words) - 00:50, 4 January 2013
  • ...wikipedia:Filesystem Hierarchy System|HFS]] 2.3 as /var/lib, but per Apple's naming scheme, they decided to place it here. To work around this issue, th * {{ipfw|apt}} (file lists of installed [[wikipedia:deb (file format)|deb]]s)
    1 KB (182 words) - 17:17, 1 February 2015
  • * {{ipfw|archives}} (where the actual <code>deb</code>s are)
    990 bytes (154 words) - 10:38, 27 August 2013
  • ...by default). The default configuration of bash will also change the prompt's <code>$</code> to a <code>#</code>.
    2 KB (380 words) - 12:16, 27 August 2015
  • | {{ipfw|What's New?.app}} | {{ipfw|What's New?.app}}
    33 KB (3,712 words) - 20:10, 4 February 2021
  • printf("Can't open file %s\n", input);
    3 KB (462 words) - 18:25, 9 March 2017
  • ...ard|FHS]] as a place that "contains configuration files" (i.e. "local file[s] used to control the operation of a program"). Most of the folders here are
    1 KB (165 words) - 23:57, 22 July 2020
  • .../disk0s1s2</code> on modern iOS versions), which is the [[iDevice|device]]'s user/data partition. This deviates from the [[wikipedia:Filesystem Hierarch
    2 KB (313 words) - 19:21, 31 August 2020
  • metadata-whitening was found and it's set to 1 default-ftl-version was found and it's set to 1
    31 KB (3,832 words) - 04:45, 25 June 2019
  • ==FULL information about iBoot's handling of crypted 8900 images== ...ion. However, if you look at the encrypted applelogo.img2 from 1.1.1, that's not the case (the unencrypted applelogo.img2 from 1.0.2 has a whole bunch o
    37 KB (6,324 words) - 21:12, 20 March 2015
  • ROM:0FF0BD38 ; =============== S U B R O U T I N E ======================================= ROM:0FF0BD04 ; =============== S U B R O U T I N E =======================================
    16 KB (2,016 words) - 08:46, 14 March 2017
  • ...be ran on. It allows Apple to make sure you are not running another device's firmware files on an incompatible device, probably to prevent using old exp
    661 bytes (96 words) - 23:39, 21 April 2020
  • The actual unlock works by a daemon patching the baseband's RAM on-the-fly, overriding the carrier lock code. It is not permanent becau ROM:00000000 ; =============== S U B R O U T I N E =======================================
    27 KB (3,160 words) - 13:28, 17 September 2021
  • Apple's [[IMG3 File Format|IMG3]] and [[IMG4 File Format|IMG4]] security scheme use
    4 KB (546 words) - 18:55, 29 March 2022
  • ...e Format|IMG3]] containers, and the [[bootrom]] can properly check [[LLB]]'s signature. That being said, unsigned images can still be run using the [[0x ...h/DDI0301H_arm1176jzfs_r0p7_trm.pdf Technical Reference Manual: ARM1176JZF-S]
    1 KB (167 words) - 12:33, 23 March 2017
  • So lets post whats been tried and what doesn't work. It's only a matter of time before the 3G has this DFU. Apple revved the silicon ...in the summer of 2008 that called iBoot's AES function to decrypt [[KBAG]]s. This way, we could examine iBoot for any other vulnerabilities, the kernel
    14 KB (2,533 words) - 18:42, 28 May 2017
  • ...to the [[N72AP|iPod touch (2nd generation)]]. It is present in the device's 2.1.1 firmware, as well as the [[iBEC]]/[[iBSS]] if you choose to upload it
    2 KB (305 words) - 06:24, 11 February 2021
  • ...] on iPhone OS 2.1.1. It is their payload for the [[ARM7 Go]] backdoor. It's analagous to how [[yellowsn0w]] is the actual unlocking payload injected by
    3 KB (385 words) - 04:31, 17 March 2018
  • ...e decrypted ramdisk messes with the structure of the image rending GenPass's keys false.
    713 bytes (106 words) - 23:02, 4 January 2016

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)