Difference between revisions of "PwnPie"

From The iPhone Wiki
Jump to: navigation, search
(Requirements)
Line 13: Line 13:
 
* [[IRecovery]]: [http://cl.ly/38TE CloudApp]
 
* [[IRecovery]]: [http://cl.ly/38TE CloudApp]
 
* [[LibPNG]]: [http://ethan.tira-thompson.org/Mac_OS_X_Ports_files/libpng%20%28universal%29.dmg Ethan.Tira-Thompson.org]
 
* [[LibPNG]]: [http://ethan.tira-thompson.org/Mac_OS_X_Ports_files/libpng%20%28universal%29.dmg Ethan.Tira-Thompson.org]
* [[LibUSB]]: [http://0wn-team.info/LibUSB%20Installer.zip 0wn-team.info]
+
* [[LibUSB]]: [http://0wn-team.info/LibUSB%20Installer.zip 0wn-team.info] [down since that domain expired. google it or something]
   
 
== Notes ==
 
== Notes ==

Revision as of 01:03, 5 July 2011

Old and outdated iOS key grabber.

What it does

  • Basically it takes an IPSW and parses every img3 inside.
  • Using BASH, we launch greenpois0n monitoring its output, and when it loads iBSS we kill it.

We will have an iDevice in iBSS pwned.

  • Using the go aes dec command we find keys/IVs and format them.
  • The tool will also decrypt for you the whole IPSW, so you can play with it easily.
  • A private beta version can produce a page, allowing to add keys easily.

Requirements

Notes

  • This app is outdated, or PyPie is recommended.