The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Search results
- === [[:Category:Exploits|Vulnerabilities and Exploits]] === * [[Userland]]10 KB (1,218 words) - 18:16, 24 January 2023
- ...ring (iDevice type) for the restore." (Get the device [[Recovery Mode|from userland to iBoot]] or from [[DFU Mode]] to [[iBSS]]) == Exploits ==2 KB (342 words) - 00:58, 25 February 2020
- ...is of the boot firmware for vulnerabilities, and development of associated exploits across the entire A4-based product-line, which includes the iPhone 4, the i ...ly deploy across an entire product line of device. With a private cache of exploits and/or cooked boot loader firmware, CIA could potentially infect millions o10 KB (1,556 words) - 12:50, 17 September 2021
- ...ailbreaks that allowed /dev/disk0s1 to symlinked and patched via different exploits available at the type (toc2rta tiff exploit in 1.1.1, soft symlink hack in ===A Userland Exploit===14 KB (2,533 words) - 18:42, 28 May 2017
- ...itten using two exploits: SHAtter (a [[bootrom]] [[exploit]]) as well as a userland [[kernel]] [[exploit]] provided by [[User:Comex|Comex]] to make the jailbre4 KB (585 words) - 23:37, 16 September 2021
- ...Spirit also requires [[iTunes]] 9.0 or greater to be installed. It is a [[userland]] exploit, unique in that it does not rely on an [[iBoot]]/[[bootrom]] expl ==Exploits==2 KB (292 words) - 13:14, 17 September 2021
- ...ft|C05]] The [[iOS|iPhone OS]] primarily runs on a [[NAND]] flash disk. To userland it appears as a normal [[wikipedia:Device file#Block devices|block device]] ...ikipedia:Superuser|root]]. So even if you got a code execution [[:Category:Exploits|exploit]], you still need a privilege escalation exploit as well in order t49 KB (8,611 words) - 13:26, 17 September 2021
- ...upposedly patched in 3.2.2 and 4.0.2, but comex stated that the one of the exploits used for the jailbreak existed until iOS 4.3 as Apple did not patch the bug4 KB (682 words) - 18:57, 12 December 2017
- ...tion can be performed by most jailbreak tools that break the boot chain. [[Userland]] jailbreaks such as [[Spirit]] and [[Star]] cannot hacktivate, as they req ...o hacktivate an iPhone Xs/Xʀ or later iPhone, as they do not have bootrom exploits available.4 KB (724 words) - 21:59, 22 March 2022
- * '''[[User:Comex|comex]]''' - The userland exploit that allows limera1n to run [[untethered jailbreak|untethered]]. * limera1n uses a [[userland]] exploit to make it [[untethered]], which was developed by [[User:Comex|co8 KB (1,143 words) - 15:59, 21 May 2022
- *If a [[userland]] exploit was discovered in an [[App Store]] app, the [[CodeResources]] wou == Exploits ==1 KB (158 words) - 20:31, 19 September 2014
- ...ointer won't be initialized properly and will retain the value passed from userland. When the rule is removed, the pf_rm_rule function calls pfr_detach_table w [[Category:Exploits]]4 KB (549 words) - 09:31, 9 July 2011
- ...e the [[MobileBackup Copy Exploit]] used in Spirit, or one of the DFU mode exploits [[Pwnage 2.0]]/[[Steaks4uce]]/[[Limera1n]]). ...use existing (signed) code fragments (gadgets). The endgame is to have the userland code trigger and exploit a kernel vulnerability to achieve the jailbroken s13 KB (1,971 words) - 22:19, 9 March 2012
- ...ailbroken by [[comex]], using [[JailbreakMe]] 3.0 "[[Saffron]]" which is a userland jailbreak. Apple released iOS 4.3.4 to address the exploited vulnerabilitie ...1 with Absinthe 2.0, based on [[Rocky Racoon]] and the original Absinthe's exploits. [[Absinthe]] 2.0.4 was released which is the latest version and supports t3 KB (376 words) - 02:19, 5 November 2021
- '''Saffron''' (also known as '''JailbreakMe 3.0''') is a [[userland]] untethered [[jailbreak]] from [[User:comex|comex]] that utilizes [[Jailbr == Exploits Used ==3 KB (410 words) - 01:07, 17 September 2021
- ...o presented it at [[HiTB]] 2012 in Kuala Lumpur. This vulnerability allows userland processes access to the first page of the kernel, because the <code>copyin< [[Category:Exploits]]2 KB (373 words) - 15:43, 18 August 2013
- ...ailbreak]] without the need to restore and use the desktop tool. It is a [[userland]] [[jailbreak]]. [[User:posixninja|P0sixninja]] released the [https://githu == Exploits and Vulnerabilities ==21 KB (3,060 words) - 23:12, 16 September 2021