Difference between revisions of "PwnPie"

From The iPhone Wiki
Jump to: navigation, search
(We now allow GUI Tools here (with limitations). Article needs more cleanup.)
Line 1: Line 1:
  +
PwnPie also is what [[iKeys]] should be, but [[iKeys]] isn't real.
{{delete|No Useful Info}}
 
 
PwnPie is another annoying app being disclosed on TheiPhoneWiki.
 
 
PwnPie also is what iKeys should be, but iKeys isn't real.
 
   
 
== What it does ==
 
== What it does ==
*Basically it takes an ipsw and parses every img3 inside.
+
*Basically it takes an [[ipsw]] and parses every [[img3]] inside.
*Using BASH, we launch GreenPois0n monitoring his output, and when it loads iBSS we kill it.
+
*Using [[BASH]], we launch [[Greenpois0n (toolkit)|greenpois0n]] monitoring its output, and when it loads [[iBSS]] we kill it.
We will have a iDevice in iBSS pwned.
+
We will have an iDevice in [[iBSS]] [[pwned]].
*Using teh "go aes dec" command we find keys/ivs and format them.
+
*Using the <pre>go aes dec</pre> command we find keys/IVs and format them.
*The tool will also decrypt for you the whole ipsw, so you can play w/ it easily.
+
*The tool will also decrypt for you the whole [[ipsw]], so you can play with it easily.
 
*A private beta version can produce a TheiPhoneWiki's page, allowing to add keys easily.
 
*A private beta version can produce a TheiPhoneWiki's page, allowing to add keys easily.
*If you are a scriptkiddie please go away and try to do that manually a lot of times, to learn how KBAG works.
 
*If you are too bored to get keys/ivs but you know how to do, use this.
 
 
*Latest version can be found here: https://github.com/qwertyoruiop/PwnPie/blob/master/PwnPie.sh
 
*Latest version can be found here: https://github.com/qwertyoruiop/PwnPie/blob/master/PwnPie.sh
 
   
 
'''This is ''OUTDATED'', use [[Sekrit]] instead.'''
 
'''This is ''OUTDATED'', use [[Sekrit]] instead.'''
   
 
== Requirements ==
 
== Requirements ==
  +
*[[XPwn]]: [http://www.megaupload.com/?d=J9A84LP7 megaupload]
{| border="1" class="wikitable"
 
  +
*[[IRecovery]]: [http://cl.ly/38TE cloud]
|-
 
  +
*LibPNG: [http://ethan.tira-thompson.org/Mac_OS_X_Ports_files/libpng%20%28universal%29.dmg download]
|[[XPwn]]
 
  +
*libusb1: [http://0wn-team.info/LibUSB%20Installer.zip download]
|[[IRecovery]]
 
  +
|LibPNG
 
  +
[[Category:GUI Tools]]
|libusb1
 
|-
 
|http://www.megaupload.com/?d=J9A84LP7
 
|http://cl.ly/38TE
 
|http://ethan.tira-thompson.org/Mac_OS_X_Ports_files/libpng%20%28universal%29.dmg
 
|http://0wn-team.info/LibUSB%20Installer.zip
 

Revision as of 05:39, 26 February 2011

PwnPie also is what iKeys should be, but iKeys isn't real.

What it does

  • Basically it takes an ipsw and parses every img3 inside.
  • Using BASH, we launch greenpois0n monitoring its output, and when it loads iBSS we kill it.

We will have an iDevice in iBSS pwned.

  • Using the
    go aes dec
    command we find keys/IVs and format them.
  • The tool will also decrypt for you the whole ipsw, so you can play with it easily.
  • A private beta version can produce a TheiPhoneWiki's page, allowing to add keys easily.
  • Latest version can be found here: https://github.com/qwertyoruiop/PwnPie/blob/master/PwnPie.sh

This is OUTDATED, use Sekrit instead.

Requirements