Difference between revisions of "Jailbreak (S5L8920+)"

From The iPhone Wiki
Jump to: navigation, search
Line 1: Line 1:
Because of the date the [[0x24000 Segment Overflow]] was leaked by [[NitroKey]], Apple may or may not have had the time to fix the bug. If not, the following needs to be done:
+
Because of the date the [[0x24000 Segment Overflow]] was leaked by [[NitroKey]], Apple may or may not have had the time to fix the bug in the [[S5L8920 (Bootrom)|iPhone 3G[s] Bootrom]]. If not, the following needs to be done:
 
* '''Find a new iBoot exploit''' - This will allow us to decrypt the platform iBoot and other firmware files in it's IPSW, as well as dump the bootrom to examine.
 
* '''Find a new iBoot exploit''' - This will allow us to decrypt the platform iBoot and other firmware files in it's IPSW, as well as dump the bootrom to examine.
 
* '''Find a new bootrom exploit''' - After we have the bootrom dumped, we must look for a way to make SecureROM run our patched [[LLB]].
 
* '''Find a new bootrom exploit''' - After we have the bootrom dumped, we must look for a way to make SecureROM run our patched [[LLB]].
 
== How to check for [[0x24000 Segment Overflow]] exploitability (Mac) ==
 
As the device has not been released yet, and we only know of it's existance because of various references to "iPhone2,1", this might not work for it. But for previous devices, and hopefully this one too, you can do this:
 
# Put the device in [[DFU]]
 
# Open Applications/Utilities/System Profiler
 
# Go to "USB" on the left sidebar
 
# Click on "Apple Mobile Device (DFU Mode)"
 
# Look under "USB Serial Number". Among things like the Chip ID, there should be "iBoot Version"
 
# If "iBoot Version" is "iBoot-240.4", then that means it is most likely still vulnerable
 
 
== iPhone2,1 ==
 
 
Apple Mobile Device (DFU Mode):
 
 
Product ID: 0x1227
 
Vendor ID: 0x05ac (Apple Inc.)
 
Version: 0.00
 
Serial Number: CPID:8920 CPRV:14 CPFM:03 SCEP:01 BDID:00 ECID:000002DBCA0C6D0E SRTG:['''iBoot-359.3''']
 
Speed: Up to 480 Mb/sec
 
Manufacturer: Apple Inc.
 
Location ID: 0xfd100000
 
Current Available (mA): 500
 
Current Required (mA): 100"
 

Revision as of 09:19, 22 June 2009

Because of the date the 0x24000 Segment Overflow was leaked by NitroKey, Apple may or may not have had the time to fix the bug in the iPhone 3G[s] Bootrom. If not, the following needs to be done:

  • Find a new iBoot exploit - This will allow us to decrypt the platform iBoot and other firmware files in it's IPSW, as well as dump the bootrom to examine.
  • Find a new bootrom exploit - After we have the bootrom dumped, we must look for a way to make SecureROM run our patched LLB.