Difference between revisions of "Blackbird Exploit"

From The iPhone Wiki
Jump to: navigation, search
(created the blackbird exploit page, marking as stub because the exploit could be explained in more detail.)
 
m (Source: Clarity#0625 on Discord (https://discord.com/channels/624739448927682611/740700630376775793/1019371653681123338). Also fixed the stub template.)
Line 1: Line 1:
 
{{lowercase}}
 
{{lowercase}}
The '''blackbird exploit''' is a [[Secure Enclave Processor|SEP]] [[bootrom]] exploit, which is currently known to be able to run unsigned code on the SEP of devices with processors running either a [[A8]], [[A9]], [[A10]], or [[T2]]. This is a tethered exploit, and can only function in combination with [[checkm8 Exploit|checkm8]].
+
The '''blackbird exploit''' is a [[Secure Enclave Processor|SEP]] [[bootrom]] exploit that is currently known to be capable of executing unsigned code on the SEP's of devices with [[A8]], [[A9]], [[A10]], or [[T2]] chips. This exploit can only function in combination with [[checkm8 Exploit|checkm8]] or an [[iBoot (Bootloader)|iBoot]] exploit.
 
The blackbird exploit is known to be able to load an arbitrary SEP OS on the [[A8]] and [[A9]] processors, and perform a replay attack on the [[A10]] and [[T2]] processors.
 
   
 
[[checkra1n]] is currently the only known tool capable of using the blackbird exploit, and only for the [[A10]] and [[T2]] processors.
 
[[checkra1n]] is currently the only known tool capable of using the blackbird exploit, and only for the [[A10]] and [[T2]] processors.
Line 12: Line 10:
 
[[Category:Bootrom Exploits]]
 
[[Category:Bootrom Exploits]]
   
{{stub}}
+
{{stub|exploit}}

Revision as of 00:43, 14 September 2022

The blackbird exploit is a SEP bootrom exploit that is currently known to be capable of executing unsigned code on the SEP's of devices with A8, A9, A10, or T2 chips. This exploit can only function in combination with checkm8 or an iBoot exploit.

checkra1n is currently the only known tool capable of using the blackbird exploit, and only for the A10 and T2 processors.

References

Tango Utilities-terminal.png This exploit article is a "stub", an incomplete page. Please add more content to this article and remove this tag.