The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "SSH Ramdisk"
(created initial short article with links to source code and info) |
(→External links) |
||
(2 intermediate revisions by one other user not shown) | |||
Line 1: | Line 1: | ||
{{DISPLAYTITLE:SSH Ramdisk}} |
{{DISPLAYTITLE:SSH Ramdisk}} |
||
− | Also known as a Forensics Ramdisk, an SSH Ramdisk is versatile tool in iPhone research. Publicly available methods work on all devices vulnerable to [[limera1n]] |
+ | Also known as a Forensics Ramdisk, an '''SSH [[Ramdisk|ramdisk]]''' is a versatile tool in iPhone research. Publicly available methods work on all devices vulnerable to the [[limera1n Exploit|limera1n]] and [[checkm8 Exploit|checkm8]] bootrom exploits. |
==Uses== |
==Uses== |
||
− | * |
+ | * Retrieving data from a device |
− | * |
+ | * Setting up a bare-bones [[Jailbreak|jailbreak]], with [[AFC#AFC2|AFC2]] access |
− | * |
+ | * Or even installing a full jailbreak, as [http://twitter.com/blackgeektuto BlackGeek] demonstrated with [[Geeksn0w]] |
==See also== |
==See also== |
||
[[File System Crypto]] |
[[File System Crypto]] |
||
− | ==External |
+ | ==External links== |
* [https://code.google.com/archive/p/iphone-dataprotection/ iPhone-dataprotection page on Google Code] |
* [https://code.google.com/archive/p/iphone-dataprotection/ iPhone-dataprotection page on Google Code] |
||
* [https://github.com/nabla-c0d3/iphone-dataprotection iPhone-dataprotection source code mirror on Github] |
* [https://github.com/nabla-c0d3/iphone-dataprotection iPhone-dataprotection source code mirror on Github] |
||
− | * [http://msftguy.blogspot.ca/2012/01/automatic-ssh-ramdisk-creation-and.html#more msftguy's blog on SSH |
+ | * [http://msftguy.blogspot.ca/2012/01/automatic-ssh-ramdisk-creation-and.html#more msftguy's blog on SSH ramdisk creation] |
− | * [https://github.com/msftguy/ssh-rd msftguy's SSH |
+ | * [https://github.com/msftguy/ssh-rd msftguy's SSH ramdisk source code on Github] |
− | * [https://sites.google.com/site/msftguy/file/ssh_rd_rev04b.jar msftguy's SSH |
+ | * [https://sites.google.com/site/msftguy/file/ssh_rd_rev04b.jar msftguy's SSH ramdisk JAR] |
+ | * [https://github.com/Ralph0045/SSH-Ramdisk-Maker-and-Loader Ralph0045's newer SSH ramdisk tool] |
||
− | * [http://appadvice.com/appnn/2013/06/no-jailbreak-required-how-to-gain-full-root-access-on-iphone-4-running-ios-7-beta Guide to achieve bare-bones Jailbreak] |
||
+ | * [http://appadvice.com/appnn/2013/06/no-jailbreak-required-how-to-gain-full-root-access-on-iphone-4-running-ios-7-beta Guide to achieve bare-bones jailbreak] |
||
+ | * [https://github.com/verygenericname/SSHRD_Script verygenericname's SSH Ramdisk Script for A7-A11] |
||
[[Category:Jailbreaks]] |
[[Category:Jailbreaks]] |
Latest revision as of 16:03, 4 November 2022
Also known as a Forensics Ramdisk, an SSH ramdisk is a versatile tool in iPhone research. Publicly available methods work on all devices vulnerable to the limera1n and checkm8 bootrom exploits.
Uses
- Retrieving data from a device
- Setting up a bare-bones jailbreak, with AFC2 access
- Or even installing a full jailbreak, as BlackGeek demonstrated with Geeksn0w
See also
External links
- iPhone-dataprotection page on Google Code
- iPhone-dataprotection source code mirror on Github
- msftguy's blog on SSH ramdisk creation
- msftguy's SSH ramdisk source code on Github
- msftguy's SSH ramdisk JAR
- Ralph0045's newer SSH ramdisk tool
- Guide to achieve bare-bones jailbreak
- verygenericname's SSH Ramdisk Script for A7-A11