Difference between revisions of "Up to Speed"

From The iPhone Wiki
Jump to: navigation, search
(adding a bunch of links that may be useful to the beginner)
m (redirect link fix)
Line 3: Line 3:
 
Don't worry, this should bring you up to speed.
 
Don't worry, this should bring you up to speed.
   
* [[Activate]] - to bypass the required [[iTunes]] signup.
+
* [[Activation]] - to bypass the required [[iTunes]] signup.
 
* [[Jailbreak]] - to allow full write and execute privileges on the iPhone, iPod touch, iPhone 3G, iPhone 3GS, iPhone 4, iPhone 4S, iPad and iPad2.
 
* [[Jailbreak]] - to allow full write and execute privileges on the iPhone, iPod touch, iPhone 3G, iPhone 3GS, iPhone 4, iPhone 4S, iPad and iPad2.
 
* [[Unlock]] - to allow the use of any mobile phone carrier's SIM.
 
* [[Unlock]] - to allow the use of any mobile phone carrier's SIM.

Revision as of 19:23, 8 September 2013

So, all of this sounds intimidating. Jailbreak, sign, secpack, unlock, baseband, iBoot, seczone, JailbreakMe, pwnage.

Don't worry, this should bring you up to speed.

  • Activation - to bypass the required iTunes signup.
  • Jailbreak - to allow full write and execute privileges on the iPhone, iPod touch, iPhone 3G, iPhone 3GS, iPhone 4, iPhone 4S, iPad and iPad2.
  • Unlock - to allow the use of any mobile phone carrier's SIM.

Think of iPhone as a little computer, even though Apple doesn't want you to. It has a processor, RAM, a "hard drive", an operating system, and a cellular modem on the serial port.

Ways to get started

  • Read the how to reverse page when you realize most of those tasks require reversing and you have no idea how.
  • Learn assembler for ARM processors.
  • Read iOS Hacker's Handbook, published in May 2012: "The award-winning author team, experts in Mac and iOS security, examines the vulnerabilities and the internals of iOS to show how attacks can be mitigated. The book explains how the operating system works, its overall security architecture, and the security risks associated with it, as well as exploits, rootkits, and other payloads developed for it."

Now