Difference between revisions of "Alloc8 Exploit"

From The iPhone Wiki
Jump to: navigation, search
(No longer the last bootrom exploit)
m (fix typo)
Line 1: Line 1:
 
{{lowercase}}
 
{{lowercase}}
The '''alloc8 exploit''' is a [[bootrom]] exploit used to run unsigned code on the both the [[Bootrom 359.3.2|new bootrom]] and the [[Bootrom 359.3|old bootrom]] [[N88AP|iPhone 3GS]] (and thereby [[jailbreak]] it). It is the first public [[Untethered jailbreak|untethered]] [[bootrom]] exploit for the [[Bootrom 359.3.2|new bootrom]] iPhone 3GS.
+
The '''alloc8 exploit''' is a [[bootrom]] exploit used to run unsigned code on both the [[Bootrom 359.3.2|new bootrom]] and the [[Bootrom 359.3|old bootrom]] [[N88AP|iPhone 3GS]] (and thereby [[jailbreak]] it). It is the first public [[Untethered jailbreak|untethered]] [[bootrom]] exploit for the [[Bootrom 359.3.2|new bootrom]] iPhone 3GS.
   
 
[[User:axi0mX|axi0mX]] published a detailed analysis of alloc8 at [https://github.com/axi0mX/alloc8/blob/master/README GitHub] following his discovery of the exploit.
 
[[User:axi0mX|axi0mX]] published a detailed analysis of alloc8 at [https://github.com/axi0mX/alloc8/blob/master/README GitHub] following his discovery of the exploit.

Revision as of 08:30, 1 January 2020

The alloc8 exploit is a bootrom exploit used to run unsigned code on both the new bootrom and the old bootrom iPhone 3GS (and thereby jailbreak it). It is the first public untethered bootrom exploit for the new bootrom iPhone 3GS.

axi0mX published a detailed analysis of alloc8 at GitHub following his discovery of the exploit.

ipwndfu is currently the primary and most simple way of using the alloc8 exploit.