Talk:Pangu8

From The iPhone Wiki
Revision as of 07:54, 2 November 2014 by Haifisch (talk | contribs) (Research: new section)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Research

Pangu8 uses the same method as evasi0n7 did to run the kernel exploit. Here are some light details on the files in the untether package;

  • libmis.dylib - Same as in evasi0n7, overrides symbols in amfid to make the signature check return 0, this is used in conjunction with the codesign hack.
  • pangu_xpcd.dylib - handles codesigning hax???
  • xpcd_cache.dylib - this dylib gets loaded by launchd on boot, this file is a new home for LaunchDaemons, Pangu8 replaces the old dylib with this patched version that includes an entry into the plist that gets returned that specifies xuanyuansword to be ran on boot (only once)
  • xuanyuansword - this is the file that contains all the kernel exploit goodies that runs on every boot
  • io.pangu.untether.plist - the launch daemon for the untether binary that gets used after the xpcd cache is rebuilt?

--Haifisch (talk) 07:54, 2 November 2014 (UTC)