Difference between revisions of "Limera1n"

From The iPhone Wiki
Jump to: navigation, search
(External Links)
(Deleted "Download" section. (It's not exactly necessary, as limera1n's page has the download link.))
Line 1: Line 1:
  +
On the 9th of October 2010 limera1n was released, delaying the release of [[greenpois0n]]. [[limera1n]] is now in Beta 2. It only supports Windows at the moment and a large number of devices have issues.
== Release ==
 
On the 9th of October 2010 [[Limera1n]] was released, delaying the release of [[SHAtter]]. [[Limera1n]] is now in Beta 2. It only supports Windows at the moment and a large number of devices have issues.
 
 
== Download ==
 
<!-- DO NOT CHANGE ANY LINKS! THESE ARE HERE FOR A REASON. ONLY CHANGE TO ADD YOUR OWN MIRROR LINKS! -->
 
{| border=3
 
|-
 
| RC1 BETA2 for Windows from the official website. <!-- DO NOT CHANGE THIS LINK UNLESS THE LINK ON LIMERA1N.com CHANGES! -->
 
| [http://limera1n.com/limera1n.exe HTTP]
 
<!-- A MIRROR IS NOT NEEDED. THIS ISN'T A PAGE MEANT TO ENCOURAGE LIMERA1N! -->
 
|}
 
   
 
== Background Information ==
 
== Background Information ==
Line 27: Line 17:
 
* This does not use [[SHAtter]].
 
* This does not use [[SHAtter]].
 
* This uses a [[bootrom]] exploit (different than the [[greenpois0n]] one) to achieve the tethered jailbreak and unsigned code execution
 
* This uses a [[bootrom]] exploit (different than the [[greenpois0n]] one) to achieve the tethered jailbreak and unsigned code execution
* This uses a userland exploit to provide untetheredness, which [[User:Geohot|geohot]] obtained under questionable circumstances from [[User:Comex|comex]].
+
* This uses a userland exploit to make the jailbreak [[Untethered jailbreak|untethered]], which [[User:Geohot|geohot]] obtained under questionable circumstances from [[User:Comex|comex]].
 
* [[Chronic Dev (team)|Chronic Dev]] knows about this exploit and has confirmed its legitimacy
 
* [[Chronic Dev (team)|Chronic Dev]] knows about this exploit and has confirmed its legitimacy
   
 
=== Exploits ===
 
=== Exploits ===
  +
limera1n uses an undisclosed [[bootrom]] exploit.
* The pwnage-type exploit appears to reside in DFU mode of the device.
 
  +
 
=== Process ===
 
=== Process ===
 
The jailbreak appears to execute something like the following:
 
The jailbreak appears to execute something like the following:
1) The tool has you boot into DFU mode, where the fun starts.
+
1) The tool has you boot into [[DFU Mode]], where the fun starts.
 
2) Limera1n.exe appears to upload a payload to your device and execute it at this time, to pwn out the signature checks.
 
2) Limera1n.exe appears to upload a payload to your device and execute it at this time, to pwn out the signature checks.
 
3) The device reboots and is now pwned. From here, it uploads an exploit and a ramdisk. The ramdisk installs limera1n.app and possibly the untethered part of the jailbreak.
 
3) The device reboots and is now pwned. From here, it uploads an exploit and a ramdisk. The ramdisk installs limera1n.app and possibly the untethered part of the jailbreak.

Revision as of 03:00, 10 October 2010

On the 9th of October 2010 limera1n was released, delaying the release of greenpois0n. limera1n is now in Beta 2. It only supports Windows at the moment and a large number of devices have issues.

Background Information

Limera1n is a jailbreak by geohot. It is untethered on all supported devices, which include the following (but aren't necessarily limited to):

It has been demonstrated multiple times by geohot, using blog posts on his now private blog. Geohot showed off a high-res picture of Cydia on an iPhone 4. Image He displayed an untethered jailbreak that met MuscleNerd's requirements for a good video on the iPod touch 3G: YouTube Video In addition, he demonstrated Cydia, blackra1n, and a verbose boot on an iPad (before Spirit was released): Image

Technical Information

Basics

  • This does not use SHAtter.
  • This uses a bootrom exploit (different than the greenpois0n one) to achieve the tethered jailbreak and unsigned code execution
  • This uses a userland exploit to make the jailbreak untethered, which geohot obtained under questionable circumstances from comex.
  • Chronic Dev knows about this exploit and has confirmed its legitimacy

Exploits

limera1n uses an undisclosed bootrom exploit.

Process

The jailbreak appears to execute something like the following: 1) The tool has you boot into DFU Mode, where the fun starts. 2) Limera1n.exe appears to upload a payload to your device and execute it at this time, to pwn out the signature checks. 3) The device reboots and is now pwned. From here, it uploads an exploit and a ramdisk. The ramdisk installs limera1n.app and possibly the untethered part of the jailbreak. 4) The device shuts down and upon reboot with no computer necessary, the device is jailbroken.

Controversy

The release of this jailbreak is specifically designed to pressure the Chronic Dev team into implementing the exploits in limera1n into greenpois0n. Now that geohot has released limera1n, SHAtter can't be released without major negative backlash from other hackers, as this would burn a bootrom exploit.

External Links

http://theiphonewiki.com/limera1n is possibly the real site and geohot used <!--#include FILE="http://www.theiphonewiki.com/limera1n.com"--> If this is true, then switch the actual site and mirror site text...