Difference between revisions of "Talk:JailbreakMe"

From The iPhone Wiki
Jump to: navigation, search
 
Line 1: Line 1:
==Source==
+
== HTML Source ==
  +
With the release of JailbreakMe, I began to decompile it. All credit goes to comex for the below.<br />
 
  +
Here's the source code of the website (only the bottom is useful): http://www.mediafire.com/?g8bepd6h1q44f04 {{unsigned|Petrol|06:56, August 3, 2010}}
With the release of Jailbreakme i have began decompiling it. All credits go to comex for the below.
 
 
The source code of the website(only bottom is useful)
 
 
Since with trouble pasting here i have uploaded it onto mediafire.com
 
 
Open the html file with a text editor
 
 
http://www.mediafire.com/?g8bepd6h1q44f04
 
 
{{unsigned|Petrol|06:56, August 3, 2010}}
 
 
 
:We appreciate the contribution, but anyone can easily obtain the page's source code by spoofing the user agent. The main thing everyone's interested in is how the exploit works (it's known to use a PDF vulnerability). --[[User:Dialexio|<span style="color:#C20; font-weight:normal;">Dialexio</span>]] 15:00, 3 August 2010 (UTC)
 
:We appreciate the contribution, but anyone can easily obtain the page's source code by spoofing the user agent. The main thing everyone's interested in is how the exploit works (it's known to use a PDF vulnerability). --[[User:Dialexio|<span style="color:#C20; font-weight:normal;">Dialexio</span>]] 15:00, 3 August 2010 (UTC)
 
 
::The vulnerability used to get unsigned code running is in FreeType. Which is used to exploit IOKit. JailbreakMe used a PDF file to exploit FreeType but it could have been implemented in other ways. --[[User:GreySyntax|GreySyntax]] 15:25, 3 August 2010 (UTC)
 
::The vulnerability used to get unsigned code running is in FreeType. Which is used to exploit IOKit. JailbreakMe used a PDF file to exploit FreeType but it could have been implemented in other ways. --[[User:GreySyntax|GreySyntax]] 15:25, 3 August 2010 (UTC)
 
 
==wad.bin==
 
Has anyone been able to decompile the wad.bin? Can you post the contents here or zip it and email it to me? --[[User:Balloonhead66|Balloonhead66]] 23:48, 22 October 2010 (UTC)
 
 
Umm, have you looked at this: https://github.com/emonti/star_reversing_tools --[[User:Srb21103|Srb21103]] 03:17, 4 April 2011 (UTC)
 

Latest revision as of 18:02, 3 March 2015

HTML Source

With the release of JailbreakMe, I began to decompile it. All credit goes to comex for the below.
Here's the source code of the website (only the bottom is useful): http://www.mediafire.com/?g8bepd6h1q44f04 --The preceding unsigned comment was added by Petrol (talk) 06:56, August 3, 2010. Please consult this page for more info on how to sign pages, and how to fix this.

We appreciate the contribution, but anyone can easily obtain the page's source code by spoofing the user agent. The main thing everyone's interested in is how the exploit works (it's known to use a PDF vulnerability). --Dialexio 15:00, 3 August 2010 (UTC)
The vulnerability used to get unsigned code running is in FreeType. Which is used to exploit IOKit. JailbreakMe used a PDF file to exploit FreeType but it could have been implemented in other ways. --GreySyntax 15:25, 3 August 2010 (UTC)