Search results

Jump to: navigation, search
  • === [[:Category:Exploits|Vulnerabilities and Exploits]] === * [[Userland]]
    10 KB (1,218 words) - 18:16, 24 January 2023
  • ...ring (iDevice type) for the restore." (Get the device [[Recovery Mode|from userland to iBoot]] or from [[DFU Mode]] to [[iBSS]]) == Exploits ==
    2 KB (342 words) - 00:58, 25 February 2020
  • ...is of the boot firmware for vulnerabilities, and development of associated exploits across the entire A4-based product-line, which includes the iPhone 4, the i ...ly deploy across an entire product line of device. With a private cache of exploits and/or cooked boot loader firmware, CIA could potentially infect millions o
    10 KB (1,556 words) - 12:50, 17 September 2021
  • ...ailbreaks that allowed /dev/disk0s1 to symlinked and patched via different exploits available at the type (toc2rta tiff exploit in 1.1.1, soft symlink hack in ===A Userland Exploit===
    14 KB (2,533 words) - 18:42, 28 May 2017
  • ...itten using two exploits: SHAtter (a [[bootrom]] [[exploit]]) as well as a userland [[kernel]] [[exploit]] provided by [[User:Comex|Comex]] to make the jailbre
    4 KB (585 words) - 23:37, 16 September 2021
  • ...Spirit also requires [[iTunes]] 9.0 or greater to be installed. It is a [[userland]] exploit, unique in that it does not rely on an [[iBoot]]/[[bootrom]] expl ==Exploits==
    2 KB (292 words) - 13:14, 17 September 2021
  • ...ft|C05]] The [[iOS|iPhone OS]] primarily runs on a [[NAND]] flash disk. To userland it appears as a normal [[wikipedia:Device file#Block devices|block device]] ...ikipedia:Superuser|root]]. So even if you got a code execution [[:Category:Exploits|exploit]], you still need a privilege escalation exploit as well in order t
    49 KB (8,611 words) - 13:26, 17 September 2021
  • ...upposedly patched in 3.2.2 and 4.0.2, but comex stated that the one of the exploits used for the jailbreak existed until iOS 4.3 as Apple did not patch the bug
    4 KB (682 words) - 18:57, 12 December 2017
  • ...tion can be performed by most jailbreak tools that break the boot chain. [[Userland]] jailbreaks such as [[Spirit]] and [[Star]] cannot hacktivate, as they req ...o hacktivate an iPhone Xs/Xʀ or later iPhone, as they do not have bootrom exploits available.
    4 KB (724 words) - 21:59, 22 March 2022
  • * '''[[User:Comex|comex]]''' - The userland exploit that allows limera1n to run [[untethered jailbreak|untethered]]. * limera1n uses a [[userland]] exploit to make it [[untethered]], which was developed by [[User:Comex|co
    8 KB (1,143 words) - 15:59, 21 May 2022
  • ...n article for each exploit. Tools are something else, which just use these exploits. I fully agree with the rest, like that we need a description, about unteth ...ake another untethered jailbreak, but it's better to leave the lower level exploits until later, after all, either way, it produces the same affect. To impleme
    14 KB (2,319 words) - 09:32, 30 March 2017
  • *If a [[userland]] exploit was discovered in an [[App Store]] app, the [[CodeResources]] wou == Exploits ==
    1 KB (158 words) - 20:31, 19 September 2014
  • ...ght it was the [https://github.com/Chronic-Dev/syringe/blob/master/syringe/exploits/steaks4uce/steaks4uce.S#L30 usb wait for image offset] from syringe. --[[Us ...exploits in the bootrom for later jailbreaks. Jailbreaks based on bootrom exploits can only be fixed with new hardware.--[[User:M2m|M2m]] 15:28, 2 January 201
    9 KB (1,366 words) - 09:53, 29 March 2017
  • ...ointer won't be initialized properly and will retain the value passed from userland. When the rule is removed, the pf_rm_rule function calls pfr_detach_table w [[Category:Exploits]]
    4 KB (549 words) - 09:31, 9 July 2011
  • ...e the [[MobileBackup Copy Exploit]] used in Spirit, or one of the DFU mode exploits [[Pwnage 2.0]]/[[Steaks4uce]]/[[Limera1n]]). ...use existing (signed) code fragments (gadgets). The endgame is to have the userland code trigger and exploit a kernel vulnerability to achieve the jailbroken s
    13 KB (1,971 words) - 22:19, 9 March 2012
  • ...ailbroken by [[comex]], using [[JailbreakMe]] 3.0 "[[Saffron]]" which is a userland jailbreak. Apple released iOS 4.3.4 to address the exploited vulnerabilitie ...1 with Absinthe 2.0, based on [[Rocky Racoon]] and the original Absinthe's exploits. [[Absinthe]] 2.0.4 was released which is the latest version and supports t
    3 KB (376 words) - 02:19, 5 November 2021
  • '''Saffron''' (also known as '''JailbreakMe 3.0''') is a [[userland]] untethered [[jailbreak]] from [[User:comex|comex]] that utilizes [[Jailbr == Exploits Used ==
    3 KB (410 words) - 01:07, 17 September 2021
  • *[[Jailbreak]] page says [[Ndrv setspec() Integer Overflow]] is a userland exploit, while [[S5L8930]] says it's a kernel exploit. *Both jbm3 and i0n1c jailbreaks need each two exploits. Do they share the same kernel exploit?
    2 KB (396 words) - 08:42, 16 July 2011
  • ...[[:Category:Kernel Patches|Kernel Patches]]) and all [[:Category:Exploits|Exploits]] on the main page? If these ~20 entries are too much, then maybe just the :::Yea, perhaps not on the main page, but an overview of exploits, most importantly which version they work on, is needed. Perhaps just group
    11 KB (1,774 words) - 20:12, 24 March 2017
  • ...o presented it at [[HiTB]] 2012 in Kuala Lumpur. This vulnerability allows userland processes access to the first page of the kernel, because the <code>copyin< [[Category:Exploits]]
    2 KB (373 words) - 15:43, 18 August 2013

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)