Difference between revisions of "Greenpois0n (jailbreak)"

From The iPhone Wiki
Jump to: navigation, search
(Jailbreak, added output for N90ap)
Line 26: Line 26:
   
 
The reason for this is [[bootrom]] [[exploit]]s are not patchable with software updates. It requires new hardware to fix the security hole. Since the [[limera1n]] hole was already discovered and patched Apple, it benefits the community if [[SHAtter]] is saved in hopes of using it with new hardware, like the 5th Generation iPhone/iPod Touch and the 2nd Generation iPad.
 
The reason for this is [[bootrom]] [[exploit]]s are not patchable with software updates. It requires new hardware to fix the security hole. Since the [[limera1n]] hole was already discovered and patched Apple, it benefits the community if [[SHAtter]] is saved in hopes of using it with new hardware, like the 5th Generation iPhone/iPod Touch and the 2nd Generation iPad.
  +
  +
=== Output ===
  +
  +
[[iPhone 4]] with [[greenpois0n]] output (via [[irecovery]]):
  +
  +
Attempting to initialize greenpois0n
  +
Initializing commands
  +
Searching for cmd_ramdisk
  +
Found cmd_ramdisk string at 0x8401c7ac
  +
Found cmd_ramdisk reference at 0x84000d64
  +
Found cmd_ramdisk function at 0x84000cd1
  +
Initializing patches
  +
Initializing memory
  +
Initializing aes
  +
Searching for aes_crypto_cmd
  +
Found aes_crypto_cmd string at 0x84021a8c
  +
Found aes_crypto_cmd reference at 0x84017bb8
  +
Found aes_crypto_cmd fnction at 0x84017b51
  +
Initializing bdev
  +
Initializing image
  +
Initializing nvram
  +
Initializing kernel
  +
Greenpois0n initialized

Revision as of 15:03, 12 October 2010

Greenpois0n is both a cross-platform hacker toolkit (that helps users to find their own exploits for jailbreaks, write custom ramdisks, and create custom firmwares) as well as jailbreak tool for iDevices written by the Chronic Dev Team.

Current Toolset

  • GreenPois0n Dioxin: MobileDevice toolkit designed to help developers design awesome userland jailbreaks, like how Spirit works.

Jailbreak

Greenpois0n was originally written using two exploits; the SHAtter bootrom exploit as well as a userland exploit provided by Comex to make the jailbreak untethered. A release date of 10/10/10 10:10:10 AM (GMT) was announced, as well as the list of supported devices. Due to the nature of the SHAtter exploit, only iDevices using the Apple A4 Processor were supported. geohot later released another jailbreak (limera1n using a different bootrom exploit) on 9 October 2010, delaying the release of Greenpois0n together with the SHAtter exploit.

Greenpois0n has now been released at greenpois0n.com although apparantly it does not work (according to people at ipodtouchfans.com and discussions on IRC (irc.osx86.hu) today) Greenpois0n is very similar to limera1n, not only do they both use Geohots bootrom exploit and comexs userland exploit (to untether) they both have no customization options

Controversy

There was much controversy surrounding the sudden release of limera1n and the motives behind it. The main reasons for the limera1n release were:

  1. Use an exploit that Apple already knew about (newer iBoots shows the exploit patched)
  2. Supports more iDevices than SHAtter
  3. Hopefully save the SHAtter bootrom exploit for future iDevices

The reason for this is bootrom exploits are not patchable with software updates. It requires new hardware to fix the security hole. Since the limera1n hole was already discovered and patched Apple, it benefits the community if SHAtter is saved in hopes of using it with new hardware, like the 5th Generation iPhone/iPod Touch and the 2nd Generation iPad.

Output

iPhone 4 with greenpois0n output (via irecovery):

Attempting to initialize greenpois0n
Initializing commands
Searching for cmd_ramdisk
Found cmd_ramdisk string at 0x8401c7ac
Found cmd_ramdisk reference at 0x84000d64
Found cmd_ramdisk function at 0x84000cd1
Initializing patches
Initializing memory
Initializing aes
Searching for aes_crypto_cmd
Found aes_crypto_cmd string at 0x84021a8c
Found aes_crypto_cmd reference at 0x84017bb8
Found aes_crypto_cmd fnction at 0x84017b51
Initializing bdev
Initializing image
Initializing nvram
Initializing kernel
Greenpois0n initialized