The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "SSH Ramdisk"
m |
|||
Line 1: | Line 1: | ||
{{DISPLAYTITLE:SSH Ramdisk}} |
{{DISPLAYTITLE:SSH Ramdisk}} |
||
− | Also known as a Forensics Ramdisk, an SSH Ramdisk is versatile tool in iPhone research. Publicly available methods work on all devices vulnerable to [[limera1n]] |
+ | Also known as a Forensics Ramdisk, an '''SSH [[Ramdisk|ramdisk]]''' is a versatile tool in iPhone research. Publicly available methods work on all devices vulnerable to the [[limera1n Exploit|limera1n]] and [[checkm8 Exploit|checkm8]] bootrom exploits. |
==Uses== |
==Uses== |
||
− | * |
+ | * Retrieving data from a device |
− | * |
+ | * Setting up a bare-bones [[Jailbreak|jailbreak]], with [[AFC#AFC2|AFC2]] access |
− | * |
+ | * Or even installing a full jailbreak, as [http://twitter.com/blackgeektuto BlackGeek] demonstrated with [[Geeksn0w]] |
==See also== |
==See also== |
||
[[File System Crypto]] |
[[File System Crypto]] |
||
− | ==External |
+ | ==External links== |
* [https://code.google.com/archive/p/iphone-dataprotection/ iPhone-dataprotection page on Google Code] |
* [https://code.google.com/archive/p/iphone-dataprotection/ iPhone-dataprotection page on Google Code] |
||
* [https://github.com/nabla-c0d3/iphone-dataprotection iPhone-dataprotection source code mirror on Github] |
* [https://github.com/nabla-c0d3/iphone-dataprotection iPhone-dataprotection source code mirror on Github] |
||
− | * [http://msftguy.blogspot.ca/2012/01/automatic-ssh-ramdisk-creation-and.html#more msftguy's blog on SSH |
+ | * [http://msftguy.blogspot.ca/2012/01/automatic-ssh-ramdisk-creation-and.html#more msftguy's blog on SSH ramdisk creation] |
− | * [https://github.com/msftguy/ssh-rd msftguy's SSH |
+ | * [https://github.com/msftguy/ssh-rd msftguy's SSH ramdisk source code on Github] |
− | * [https://sites.google.com/site/msftguy/file/ssh_rd_rev04b.jar msftguy's SSH |
+ | * [https://sites.google.com/site/msftguy/file/ssh_rd_rev04b.jar msftguy's SSH ramdisk JAR] |
− | * [https://github.com/Ralph0045/SSH-Ramdisk-Maker-and-Loader Ralph0045's newer SSH |
+ | * [https://github.com/Ralph0045/SSH-Ramdisk-Maker-and-Loader Ralph0045's newer SSH ramdisk tool] |
− | * [http://appadvice.com/appnn/2013/06/no-jailbreak-required-how-to-gain-full-root-access-on-iphone-4-running-ios-7-beta Guide to achieve bare-bones |
+ | * [http://appadvice.com/appnn/2013/06/no-jailbreak-required-how-to-gain-full-root-access-on-iphone-4-running-ios-7-beta Guide to achieve bare-bones jailbreak] |
[[Category:Jailbreaks]] |
[[Category:Jailbreaks]] |
Revision as of 17:27, 16 June 2022
Also known as a Forensics Ramdisk, an SSH ramdisk is a versatile tool in iPhone research. Publicly available methods work on all devices vulnerable to the limera1n and checkm8 bootrom exploits.
Uses
- Retrieving data from a device
- Setting up a bare-bones jailbreak, with AFC2 access
- Or even installing a full jailbreak, as BlackGeek demonstrated with Geeksn0w