Difference between revisions of "Unthredera1n"

From The iPhone Wiki
Jump to: navigation, search
m (OCD)
(updating with more specifics from reddit)
Line 1: Line 1:
 
'''[http://unthreadedjb.com UnthreadedJB]''' is an [[untethered jailbreak]] for [[n92ap|iPhone 4 CDMA]] running iOS 5.1. This only works on Linux. Not much is currently known about this tool.
 
'''[http://unthreadedjb.com UnthreadedJB]''' is an [[untethered jailbreak]] for [[n92ap|iPhone 4 CDMA]] running iOS 5.1. This only works on Linux. Not much is currently known about this tool.
   
On Reddit, [http://www.reddit.com/r/jailbreak/comments/1j4u02/we_hav_releese_isounthreadedjb_redy_4_dl/cbbapvp planetbeing commented]:
+
On Reddit, where [http://www.reddit.com/r/jailbreak/comments/1j4u02/we_hav_releese_isounthreadedjb_redy_4_dl/cbbapvp planetbeing and saurik discussed the tool], saurik said:
   
  +
<blockquote>
<blockquote>Evasi0n could probably have been used as-is on many OS versions. The userland side only depends on the presence of the bug, not any OS-specific offsets or implementations. The kernel exploit was designed to automatically figure out any OS version specific offsets it needs. Due to the testing nightmare that would've resulted if we claimed it would work on every iOS version, we only enabled it for a few tested versions. So this may very well simply be a rebranded evasi0n. See if the binary it runs after it loads amfi.dylib is similar or identical to the one evasi0n uses. amfi.dylib is probably binary identical to the one I made for evasi0n.</blockquote>
 
  +
The program is custom; it is using the Rocky Racoon packet filter kernel exploit, but the evasi0n amfid bypass. I verified this somewhat by glancing at the binary (opens /dev/pf, etc.), but they also say this explicitly in some strings inside of the binary (which might be output when it runs or something) and in a hidden readme file.
  +
From .REAL_USAGE:
  +
<blockquote>Thanks to @Chronic-Dev/@planetbeing/@posixninja for the original rocky-raccon pf kernel exploit. Thanks to @evad3rs for their awesome MobileBackup2 stuff. It worked really well on this.</blockquote>
  +
From jb binary:
  +
<blockquote>WE R NOT #FAKR, UNTHREADEDJB IS REEL tanks 2 @planetbeing n @posixninja n @chronicdev for #explot code in rkcy raccon :) :) :) krnl patchs from #opensn0w ))</blockquote>
  +
</blockquote>
   
 
{{stub|Jailbreaking}}
 
{{stub|Jailbreaking}}

Revision as of 00:12, 28 July 2013

UnthreadedJB is an untethered jailbreak for iPhone 4 CDMA running iOS 5.1. This only works on Linux. Not much is currently known about this tool.

On Reddit, where planetbeing and saurik discussed the tool, saurik said:

The program is custom; it is using the Rocky Racoon packet filter kernel exploit, but the evasi0n amfid bypass. I verified this somewhat by glancing at the binary (opens /dev/pf, etc.), but they also say this explicitly in some strings inside of the binary (which might be output when it runs or something) and in a hidden readme file. From .REAL_USAGE:

Thanks to @Chronic-Dev/@planetbeing/@posixninja for the original rocky-raccon pf kernel exploit. Thanks to @evad3rs for their awesome MobileBackup2 stuff. It worked really well on this.

From jb binary:

WE R NOT #FAKR, UNTHREADEDJB IS REEL tanks 2 @planetbeing n @posixninja n @chronicdev for #explot code in rkcy raccon :) :) :) krnl patchs from #opensn0w ))

[[File:|30px]] This Jailbreaking article is a "stub", an incomplete page. Please add more content to this article and remove this tag.