Difference between revisions of "T8012 checkm8"

From The iPhone Wiki
Jump to: navigation, search
(Work)
Line 5: Line 5:
   
 
==Work==
 
==Work==
  +
* PlugNPwn auto DFU for the T2 [https://blog.t8012.dev/plug-n-pwn/]
 
* [[Checkm8]] port to the T2 processor [https://github.com/h0m3us3r/ipwndfu]
 
* [[Checkm8]] port to the T2 processor [https://github.com/h0m3us3r/ipwndfu]
 
* [[T2]] restore using '''libimobiledevice''' [https://gist.github.com/rickmark/9245ed3ef7f36d5a0421557f68c4681b]
 
* [[T2]] restore using '''libimobiledevice''' [https://gist.github.com/rickmark/9245ed3ef7f36d5a0421557f68c4681b]

Revision as of 17:59, 14 October 2020

The least imaginative team name...

t8012 checkm8 is a team of who have applied the checkm8 vulnerability to the t8012 or "T2" security processor on modern Mac computers.

Work

  • PlugNPwn auto DFU for the T2 [1]
  • Checkm8 port to the T2 processor [2]
  • T2 restore using libimobiledevice [3]
  • USB Target Disk Mode
  • Apple SMC Firmware Reverse Engineering
  • Analysis of FDR data in the SysCfg region of Flash, and it's potential for Malware

Official Members

Links