The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Ipwndfu"
(Added in some uses for ipwndfu. just examples.) |
m |
||
(2 intermediate revisions by 2 users not shown) | |||
Line 11: | Line 11: | ||
| status = Active |
| status = Active |
||
| genre = Jailbreaking |
| genre = Jailbreaking |
||
− | | license = [[wikipedia: |
+ | | license = [[wikipedia:GNU_General_Public_License#Version_3|GPLv3]] |
| website = [https://github.com/axi0mX/ipwndfu/ GitHub] |
| website = [https://github.com/axi0mX/ipwndfu/ GitHub] |
||
}} |
}} |
||
− | '''ipwndfu''' is a [[jailbreak]] utility from [[User:axi0mX|axi0mX]], released on April 11, 2017. It uses the [[alloc8 Exploit]] to achieve an [[untethered jailbreak]] or downgrade on both variants of the [[N88AP|iPhone 3GS]]. It also contains many useful, [[DFU]] interactions for researchers. The program is mainly used to put the device in pwned dfu mode since programs like [[redsn0w]] is not compatible with alloc8 and is currently unstable trying to jailbreak certain devices. |
||
+ | '''ipwndfu''' is a [[jailbreak]] utility from [[User:axi0mX|axi0mX]], released on {{date|2017|04|11}}. The [[bootrom]] exploit, [[alloc8 Exploit | alloc8]] enabled flashing custom ipsws, and thereby jailbreak or downgrade without [[SHSH]] blobs on both variants of the [[N88AP|iPhone 3GS]]. It now also uses a new bootrom exploit, [[Checkm8_Exploit | checkm8]] to support [[A5]] to [[A11]] devices. |
||
==Uses== |
==Uses== |
||
+ | * '' enter pwned [[DFU]] mode '' |
||
− | '''ipwndfu''' can not only be used to jailbreak your 3GS devices, It can also be utilized for the following purposes: |
||
+ | * '' untethered downgrade 3GS and below'' |
||
+ | * '' untethered downgrade [[A5]]-[[A11]] with [[SHSH]] blobs'' |
||
+ | * '' tethered downgrade [[A5]]-[[A11]] without [[SHSH]] blobs'' |
||
+ | * '' decrypt any [[IMG3_File_Format | img3]] or [[IMG4_File_Format | img4]] file with a [[KBAG]] using the [[GID Key]]'' |
||
+ | * '' dump [[bootrom]] |
||
+ | * '' verbose boot on the [[iPhone X]]'' |
||
− | * ''Untethered Downgrade on [[N88AP]](3GS) devices.'' |
||
− | |||
− | * ''Install [[Switchboard]] software'' |
||
− | |||
− | * ''Install Custom Firmwares (for example: [[PwnageTool]], [[Sn0wbreeze]], [[XPwn]]) |
||
− | |||
− | * ''Enter PWNED [[DFU_Mode]] on <=A4 devices'' |
||
==Dependencies== |
==Dependencies== |
||
* [[wikipedia:libusb|libusb]] |
* [[wikipedia:libusb|libusb]] |
||
Line 32: | Line 31: | ||
== Credit == |
== Credit == |
||
+ | |||
* [[User:pod2g|pod2g]] - [[usb_control_msg(0xA1, 1) Exploit|steaks4uce]] |
* [[User:pod2g|pod2g]] - [[usb_control_msg(0xA1, 1) Exploit|steaks4uce]] |
||
* [[iPhone Dev Team]] - [[0x24000 Segment Overflow|24Kpwn]] |
* [[iPhone Dev Team]] - [[0x24000 Segment Overflow|24Kpwn]] |
||
− | * [[User:axi0mX|axi0mX]] - [[Alloc8 Exploit]] |
+ | * [[User:axi0mX|axi0mX]] - [[Alloc8 Exploit|alloc8]], [[Checkm8_Exploit|checkm8]] |
− | * [[User:geohot|geohot]] - [[Limera1n Exploit]] |
+ | * [[User:geohot|geohot]] - [[Limera1n Exploit|limera1n]] |
* [[User:posixninja|posixninja]], [[User:pod2g|pod2g]] - [[SHA-1 Image Segment Overflow|SHAtter]] |
* [[User:posixninja|posixninja]], [[User:pod2g|pod2g]] - [[SHA-1 Image Segment Overflow|SHAtter]] |
||
Latest revision as of 12:57, 17 September 2021
Original author(s) | axi0mX |
---|---|
Developer(s) | axi0mX |
Initial release | 11 April 2017 |
Development status | Active |
Operating system | macOS / Linux |
Available in | English |
Type | Jailbreaking |
License | GPLv3 |
Website | GitHub |
ipwndfu is a jailbreak utility from axi0mX, released on 11 April 2017. The bootrom exploit, alloc8 enabled flashing custom ipsws, and thereby jailbreak or downgrade without SHSH blobs on both variants of the iPhone 3GS. It now also uses a new bootrom exploit, checkm8 to support A5 to A11 devices.
Contents
Uses
- enter pwned DFU mode
- untethered downgrade 3GS and below
- untethered downgrade A5-A11 with SHSH blobs
- tethered downgrade A5-A11 without SHSH blobs
- decrypt any img3 or img4 file with a KBAG using the GID Key
- dump bootrom
- verbose boot on the iPhone X
Dependencies
- libusb
- pyusb
Credit
- pod2g - steaks4uce
- iPhone Dev Team - 24Kpwn
- axi0mX - alloc8, checkm8
- geohot - limera1n
- posixninja, pod2g - SHAtter