blackbird Exploit

From The iPhone Wiki
Revision as of 08:37, 7 February 2022 by Ilikeiphone123 (talk | contribs) (created the blackbird exploit page, marking as stub because the exploit could be explained in more detail.)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

The blackbird exploit is a SEP bootrom exploit, which is currently known to be able to run unsigned code on the SEP of devices with processors running either a A8, A9, A10, or T2. This is a tethered exploit, and can only function in combination with checkm8.

The blackbird exploit is known to be able to load an arbitrary SEP OS on the A8 and A9 processors, and perform a replay attack on the A10 and T2 processors.

checkra1n is currently the only known tool capable of using the blackbird exploit, and only for the A10 and T2 processors.

References

Apple-logo.png This article is a "stub", an incomplete page. Please add more content to this article and remove this tag.