Difference between revisions of "Talk:Usb control msg(0xA1, 1) Exploit"

From The iPhone Wiki
Jump to: navigation, search
Line 12: Line 12:
 
:I don't completely understand your question, but no, this exploit will work on nothing other than the 2nd generation iPod touch (and is not particularly big news, since we can already run unsigned code on the second gen touch). [[User:AriX|AriX]] 18:01, 21 September 2010 (UTC)
 
:I don't completely understand your question, but no, this exploit will work on nothing other than the 2nd generation iPod touch (and is not particularly big news, since we can already run unsigned code on the second gen touch). [[User:AriX|AriX]] 18:01, 21 September 2010 (UTC)
   
[[User:Pod2g]] : I released this one because it's old devices only (Apple engineers already found and fixed it).
+
[[User:Pod2g|Pod2g]] : I released this one because it's old devices only (Apple engineers already found and fixed it).
 
The good thing about it, is that it's a way to execute unsigned assembly code easily ''in the context of the bootrom''.
 
The good thing about it, is that it's a way to execute unsigned assembly code easily ''in the context of the bootrom''.
 
Researchers can use it to explore the bootrom, try things, etc. Also, maybe it could be useful for iDroid ?
 
Researchers can use it to explore the bootrom, try things, etc. Also, maybe it could be useful for iDroid ?

Revision as of 20:01, 21 September 2010

Is this even suppose to be here? :S

iH8sn0w 00:31, 21 September 2010 (UTC)

Pod2g posted it himself so I don't see much of a problem for it as it doesn't sound like it will work on new devices. --OMEGA_RAZER

So would this exploit lead to a tethered jailbreak or would it be untethered? --JacobVengeance 01:50, 21 September 2010 (UTC)

Tethered. This just allows unsigned code execution to be performed regardless of SHSH or model revision at the DFU/bootrom level. This is useful for redsn0w or blackra1n type hacks as they provide a quick and unclosable exploit to perform the actual jailbreak. Functionally, this replaces the need for sending 2.1.1 iBSS + iBEC to use Arm7Go or the 3.1.2 iBSS/iBEC (if that can even be done?) for that other USB control msg exploit in 3.1.2 iBoot. Iemit737 02:37, 21 September 2010 (UTC)

the new bootrom ipod touch 2g where ipod touch 3g so will this exploit work on ipod3g and iphone 3gs --liamchat 14:51, 21 September 2010 (UTC)

I don't completely understand your question, but no, this exploit will work on nothing other than the 2nd generation iPod touch (and is not particularly big news, since we can already run unsigned code on the second gen touch). AriX 18:01, 21 September 2010 (UTC)

Pod2g : I released this one because it's old devices only (Apple engineers already found and fixed it). The good thing about it, is that it's a way to execute unsigned assembly code easily in the context of the bootrom. Researchers can use it to explore the bootrom, try things, etc. Also, maybe it could be useful for iDroid ?