The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "JerrySIM"
MuscleNerd (talk | contribs) (I think the policy is not to copy and paste large chunks from other URLs) |
ChronicDev (talk | contribs) |
||
Line 1: | Line 1: | ||
+ | This was the dev teams approach to unlocking [[Bootloader 4.6]]. As noted during the CCC talk that the [[dev team]] gave, this exploit was actually never fixed in baseband [[1.45.00]], only in the next rev, so they were able to use it as an injection vector for some of the earlier hacks that they did on it (downgrading the baseband version to [[1.43.00]], backing up their seczone, etc.) |
||
− | This was the dev teams approach to unlocking [[Bootloader 4.6]] |
||
==Credit== |
==Credit== |
Revision as of 18:56, 3 January 2009
This was the dev teams approach to unlocking Bootloader 4.6. As noted during the CCC talk that the dev team gave, this exploit was actually never fixed in baseband 1.45.00, only in the next rev, so they were able to use it as an injection vector for some of the earlier hacks that they did on it (downgrading the baseband version to 1.43.00, backing up their seczone, etc.)
Credit
The dev team/elite team.
Exploit
This relied on a buffer overflow in the STK.
Resources
the elite wiki's page on the topic
Leaked Source
Note
Zibri removed it from the Google Code page, but the source is still easily available via google cache, or the fact that Google Code wiki pages are svn based and you can easily just look at an earlier rev :)
On the page before the source got deleted, Zibri referred to it as C source, although by the looks of it he may have failed to realize that it is a payload meant to be run off of a TurboSIM