Difference between revisions of "Talk:JailbreakMe"

From The iPhone Wiki
Jump to: navigation, search
Line 20: Line 20:
 
==wad.bin==
 
==wad.bin==
 
Has anyone been able to decompile the wad.bin? Can you post the contents here or zip it and email it to me? --[[User:Balloonhead66|Balloonhead66]] 23:48, 22 October 2010 (UTC)
 
Has anyone been able to decompile the wad.bin? Can you post the contents here or zip it and email it to me? --[[User:Balloonhead66|Balloonhead66]] 23:48, 22 October 2010 (UTC)
  +
  +
Umm, have you looked at this: https://github.com/emonti/star_reversing_tools --[[User:Srb21103|Srb21103]] 03:17, 4 April 2011 (UTC)

Revision as of 03:17, 4 April 2011

Source

With the release of Jailbreakme i have began decompiling it. All credits go to comex for the below.

The source code of the website(only bottom is useful)

Since with trouble pasting here i have uploaded it onto mediafire.com

Open the html file with a text editor

http://www.mediafire.com/?g8bepd6h1q44f04

--The preceding unsigned comment was added by Petrol (talk) 06:56, August 3, 2010. Please consult this page for more info on how to sign pages, and how to fix this.

We appreciate the contribution, but anyone can easily obtain the page's source code by spoofing the user agent. The main thing everyone's interested in is how the exploit works (it's known to use a PDF vulnerability). --Dialexio 15:00, 3 August 2010 (UTC)
The vulnerability used to get unsigned code running is in FreeType. Which is used to exploit IOKit. JailbreakMe used a PDF file to exploit FreeType but it could have been implemented in other ways. --GreySyntax 15:25, 3 August 2010 (UTC)


wad.bin

Has anyone been able to decompile the wad.bin? Can you post the contents here or zip it and email it to me? --Balloonhead66 23:48, 22 October 2010 (UTC)

Umm, have you looked at this: https://github.com/emonti/star_reversing_tools --Srb21103 03:17, 4 April 2011 (UTC)