Difference between revisions of "HoodooYabuli 9B3176n"

From The iPhone Wiki
Jump to: navigation, search
(Background)
(Fixed up grammar, added more info.)
Line 1: Line 1:
This is a 5.1 version based internal firmware. It is known to run on iPhone 3Gs, iPhone 4 and iPod Touch 4G. Due to the fact that it contains kernels for other devices (something which is common for most SwitchBoard filesystems) it can possibly be installed onto other devices.
+
HoodooYabuli is a factory firmware based on iOS 5.1. It is able to run on iPhone 3Gs, iPhone 4 and the iPod Touch 4G. Due to the fact that it contains kernels for other devices (something which is common for most SwitchBoard filesystems) it can possibly be installed onto other devices.
   
   
 
== Background ==
 
== Background ==
   
This firmware was leaked most likely as a root filesystem dump.IPSWs for iPhone 3Gs, iPhone 4 and iPod Touch 4G have since appeared and can be restored to these devices via bootrom exploits. The Firmware has also appeared as an Encrypted restore bundle for the iPhone 4, which keys were eventually found for.
+
This firmware was leaked most likely as a root filesystem dump. IPSWs for the iPhone 3Gs, iPhone 4 and iPod Touch 4G have since appeared and can be restored to these devices via bootrom exploits, such as [[limera1n]]. The firmware also appeared as an encrypted restore bundle for the iPhone 4, which keys were eventually found for.
   
 
== SwitchBoard Applications ==
 
== SwitchBoard Applications ==
Line 12: Line 12:
   
 
* [[ATCommand]]
 
* [[ATCommand]]
  +
* [[CameraFA]] - Causes SwitchBoard to enter a loop; only way to exit this is by hard resetting.
* [[CameraFA]]
 
 
* [[GrapeCal]]
 
* [[GrapeCal]]
 
* [[LDCMura]]
 
* [[LDCMura]]

Revision as of 05:47, 9 September 2017

HoodooYabuli is a factory firmware based on iOS 5.1. It is able to run on iPhone 3Gs, iPhone 4 and the iPod Touch 4G. Due to the fact that it contains kernels for other devices (something which is common for most SwitchBoard filesystems) it can possibly be installed onto other devices.


Background

This firmware was leaked most likely as a root filesystem dump. IPSWs for the iPhone 3Gs, iPhone 4 and iPod Touch 4G have since appeared and can be restored to these devices via bootrom exploits, such as limera1n. The firmware also appeared as an encrypted restore bundle for the iPhone 4, which keys were eventually found for.

SwitchBoard Applications

This build contains the following applications applications launched through SwitchBoard.app: