The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Ipwndfu"
WikiEditor01 (talk | contribs) m |
m |
||
(13 intermediate revisions by 7 users not shown) | |||
Line 3: | Line 3: | ||
| name = ipwndfu |
| name = ipwndfu |
||
| title = ipwndfu |
| title = ipwndfu |
||
− | | author = axi0mX |
+ | | author = [[User:axi0mX|axi0mX]] |
− | | developer = axi0mX |
+ | | developer = [[User:axi0mX|axi0mX]] |
+ | | discontinued = |
||
| released = {{start date and age|2017|04|11}} |
| released = {{start date and age|2017|04|11}} |
||
− | | operating system = [[wikipedia: |
+ | | operating system = [[wikipedia:macOS|macOS]] / [[wikipedia:Linux|Linux]] |
| language = [[wikipedia:English|English]] |
| language = [[wikipedia:English|English]] |
||
+ | | status = Active |
||
| genre = Jailbreaking |
| genre = Jailbreaking |
||
− | | license = [[wikipedia: |
+ | | license = [[wikipedia:GNU_General_Public_License#Version_3|GPLv3]] |
| website = [https://github.com/axi0mX/ipwndfu/ GitHub] |
| website = [https://github.com/axi0mX/ipwndfu/ GitHub] |
||
}} |
}} |
||
+ | |||
− | '''ipwndfu''' is '''axi0mX''''s [[jailbreak]] utility. It uses the [[alloc8 Exploit]] to achieve an [[untethered jailbreak]] or downgrade on all variants of the [[N88AP|iPhone 3GS]]. |
||
+ | '''ipwndfu''' is a [[jailbreak]] utility from [[User:axi0mX|axi0mX]], released on {{date|2017|04|11}}. The [[bootrom]] exploit, [[alloc8 Exploit | alloc8]] enabled flashing custom ipsws, and thereby jailbreak or downgrade without [[SHSH]] blobs on both variants of the [[N88AP|iPhone 3GS]]. It now also uses a new bootrom exploit, [[Checkm8_Exploit | checkm8]] to support [[A5]] to [[A11]] devices. |
||
+ | |||
+ | ==Uses== |
||
+ | * '' enter pwned [[DFU]] mode '' |
||
+ | * '' untethered downgrade 3GS and below'' |
||
+ | * '' untethered downgrade [[A5]]-[[A11]] with [[SHSH]] blobs'' |
||
+ | * '' tethered downgrade [[A5]]-[[A11]] without [[SHSH]] blobs'' |
||
+ | * '' decrypt any [[IMG3_File_Format | img3]] or [[IMG4_File_Format | img4]] file with a [[KBAG]] using the [[GID Key]]'' |
||
+ | * '' dump [[bootrom]] |
||
+ | * '' verbose boot on the [[iPhone X]]'' |
||
==Dependencies== |
==Dependencies== |
||
− | * libusb |
+ | * [[wikipedia:libusb|libusb]] |
* pyusb |
* pyusb |
||
− | ==Credit== |
+ | == Credit == |
− | * '''[[User:Geohot|geohot]]''' - [[limera1n exploit]]. |
||
+ | * [[User:pod2g|pod2g]] - [[usb_control_msg(0xA1, 1) Exploit|steaks4uce]] |
||
+ | * [[iPhone Dev Team]] - [[0x24000 Segment Overflow|24Kpwn]] |
||
+ | * [[User:axi0mX|axi0mX]] - [[Alloc8 Exploit|alloc8]], [[Checkm8_Exploit|checkm8]] |
||
+ | * [[User:geohot|geohot]] - [[Limera1n Exploit|limera1n]] |
||
+ | * [[User:posixninja|posixninja]], [[User:pod2g|pod2g]] - [[SHA-1 Image Segment Overflow|SHAtter]] |
||
== External Links == |
== External Links == |
||
Line 28: | Line 44: | ||
[[Category:Jailbreaks]] |
[[Category:Jailbreaks]] |
||
[[Category:Jailbreaking]] |
[[Category:Jailbreaking]] |
||
− | [[Category: |
+ | [[Category:Downgrading]] |
Latest revision as of 12:57, 17 September 2021
Original author(s) | axi0mX |
---|---|
Developer(s) | axi0mX |
Initial release | 11 April 2017 |
Development status | Active |
Operating system | macOS / Linux |
Available in | English |
Type | Jailbreaking |
License | GPLv3 |
Website | GitHub |
ipwndfu is a jailbreak utility from axi0mX, released on 11 April 2017. The bootrom exploit, alloc8 enabled flashing custom ipsws, and thereby jailbreak or downgrade without SHSH blobs on both variants of the iPhone 3GS. It now also uses a new bootrom exploit, checkm8 to support A5 to A11 devices.
Contents
Uses
- enter pwned DFU mode
- untethered downgrade 3GS and below
- untethered downgrade A5-A11 with SHSH blobs
- tethered downgrade A5-A11 without SHSH blobs
- decrypt any img3 or img4 file with a KBAG using the GID Key
- dump bootrom
- verbose boot on the iPhone X
Dependencies
- libusb
- pyusb
Credit
- pod2g - steaks4uce
- iPhone Dev Team - 24Kpwn
- axi0mX - alloc8, checkm8
- geohot - limera1n
- posixninja, pod2g - SHAtter