The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Evasi0n"
m (→External Links: no need to mention Forbes a second time) |
m |
||
Line 2: | Line 2: | ||
[[File:Evasi0n.png|165px|thumb|right|evasi0n's icon]] |
[[File:Evasi0n.png|165px|thumb|right|evasi0n's icon]] |
||
<!-- Do not change this to something like "used to make an untethered jailbreak" - it doesn't make a jailbreak - what makes a jailbreak is the developers who put the exploits together --> |
<!-- Do not change this to something like "used to make an untethered jailbreak" - it doesn't make a jailbreak - what makes a jailbreak is the developers who put the exploits together --> |
||
− | '''evasi0n''' is a [[jailbreak]] tool that can be used to jailbreak ([[untethered jailbreak|untethered]]) [[iOS]] 6.0-6.1 on all [[#Supported Devices|supported devices]], excluding |
+ | '''evasi0n''' is a [[jailbreak]] tool that can be used to jailbreak ([[untethered jailbreak|untethered]]) [[iOS]] 6.0-6.1 on all [[#Supported Devices|supported devices]], excluding both [[Apple TV 3G]]. It was first released on 4 February 2013 by [[evad3rs]], and is available for Windows, OS X, and Linux (x86 and x86_64). There is also a [[Cydia.app|Cydia]] package called "evasi0n [[iOS]] 6.0-6.1.1 [[untethered jailbreak|untether]]" which can [[untethered jailbreak|untether]] an existing [[tethered jailbreak]] without the need to restore and use the desktop tool. |
== Supported Devices == |
== Supported Devices == |
||
− | As of evasi0n's release, the only unsupported devices are the [[Apple TV 3G]] revisions, since the [[kernel]]s on these devices |
+ | As of evasi0n's release, the only unsupported devices are the [[Apple TV 3G]] revisions, since the [[kernel]]s on these devices lack an [[injection vector]] to run unsigned code. All other devices running [[iOS]] 6.0-6.1.1 are supported (including iOS 5.2 for the [[k66ap|Apple TV 2G]]). |
== Version History == |
== Version History == |
||
Line 45: | Line 45: | ||
== Download == |
== Download == |
||
− | {| class="wikitable" style="text-align:center;" |
+ | {| class="wikitable" style="text-align:center; white-space:nowrap;" |
! Version |
! Version |
||
! OS |
! OS |
||
Line 52: | Line 52: | ||
|- |
|- |
||
! rowspan="3" | 1.0 |
! rowspan="3" | 1.0 |
||
− | | Linux |
+ | | [[wikipedia:Linux|GNU/Linux]] |
| <code>c9e4b15a161b89f0e412721f471c5f8559b6054f</code> |
| <code>c9e4b15a161b89f0e412721f471c5f8559b6054f</code> |
||
| style="text-decoration: line-through;" | [https://sites.google.com/site/evad3rs/evasi0n-linux-1.0-3c53ba10e2448d311b0f4157f2d7eb568f106c4f-release.tar.lzma Google Sites] |
| style="text-decoration: line-through;" | [https://sites.google.com/site/evad3rs/evasi0n-linux-1.0-3c53ba10e2448d311b0f4157f2d7eb568f106c4f-release.tar.lzma Google Sites] |
||
Line 58: | Line 58: | ||
| [https://mega.co.nz/#!0kUkXBLC!Q8e53kQZpLbGL7PquHWgQFhMU9Ru3WJWxBuzEdkiMJo Mega] |
| [https://mega.co.nz/#!0kUkXBLC!Q8e53kQZpLbGL7PquHWgQFhMU9Ru3WJWxBuzEdkiMJo Mega] |
||
|- |
|- |
||
+ | | [[wikipedia:OS X|OS X]] |
||
− | | OS X |
||
| <code>23f99a0d65e71fd79ff072b227f0ecb176f0ffa8</code> |
| <code>23f99a0d65e71fd79ff072b227f0ecb176f0ffa8</code> |
||
| style="text-decoration: line-through;" | [https://sites.google.com/site/evad3rs/evasi0n-mac-1.0-3c53ba10e2448d311b0f4157f2d7eb568f106c4f-release.dmg Google Sites] |
| style="text-decoration: line-through;" | [https://sites.google.com/site/evad3rs/evasi0n-mac-1.0-3c53ba10e2448d311b0f4157f2d7eb568f106c4f-release.dmg Google Sites] |
||
Line 64: | Line 64: | ||
| [https://mega.co.nz/#!5h0BwQoa!KdRLFwNJ3OjMS-7Zs2YGQnsvPxAKEsaAjabY__8pNtY Mega] |
| [https://mega.co.nz/#!5h0BwQoa!KdRLFwNJ3OjMS-7Zs2YGQnsvPxAKEsaAjabY__8pNtY Mega] |
||
|- |
|- |
||
− | | Windows |
+ | | [[wikipedia:Microsoft Windows|Windows]] |
| <code>2ff288e1798b4711020e9dd7f26480e57704d8b2</code> |
| <code>2ff288e1798b4711020e9dd7f26480e57704d8b2</code> |
||
| style="text-decoration: line-through;" | [https://sites.google.com/site/evad3rs/evasi0n-win-1.0-3c53ba10e2448d311b0f4157f2d7eb568f106c4f-release.zip Google Sites] |
| style="text-decoration: line-through;" | [https://sites.google.com/site/evad3rs/evasi0n-win-1.0-3c53ba10e2448d311b0f4157f2d7eb568f106c4f-release.zip Google Sites] |
||
Line 129: | Line 129: | ||
== Exploits == |
== Exploits == |
||
− | + | evasi0n takes advantage of several vulnerabilities: |
|
* [[Symbolic Link Vulnerability]] |
* [[Symbolic Link Vulnerability]] |
||
* [[Malformed PairRequest]] |
* [[Malformed PairRequest]] |
||
Line 140: | Line 140: | ||
* [[vm_map_copy_t corruption for arbitrary memory disclosure]] |
* [[vm_map_copy_t corruption for arbitrary memory disclosure]] |
||
* [[kernel memory write via ROP gadget]] |
* [[kernel memory write via ROP gadget]] |
||
+ | |||
+ | == See Also == |
||
+ | * [[evad3rs]] |
||
== External Links == |
== External Links == |
Revision as of 23:59, 17 February 2013
evasi0n is a jailbreak tool that can be used to jailbreak (untethered) iOS 6.0-6.1 on all supported devices, excluding both Apple TV 3G. It was first released on 4 February 2013 by evad3rs, and is available for Windows, OS X, and Linux (x86 and x86_64). There is also a Cydia package called "evasi0n iOS 6.0-6.1.1 untether" which can untether an existing tethered jailbreak without the need to restore and use the desktop tool.
Supported Devices
As of evasi0n's release, the only unsupported devices are the Apple TV 3G revisions, since the kernels on these devices lack an injection vector to run unsigned code. All other devices running iOS 6.0-6.1.1 are supported (including iOS 5.2 for the Apple TV 2G).
Version History
Version | Cydia Package Version | Release Date | Changes |
---|---|---|---|
1.0 | 0.1-1 | 04 Feb 2013 |
|
1.1 | 0.2-3 | 06 Feb 2013 | |
1.2 | 0.3-1 | 08 Feb 2013 |
|
1.3 | 0.3-2 | 11 Feb 2013 |
Download
Version | OS | SHA-1 Hash | Download | |||
---|---|---|---|---|---|---|
1.0 | GNU/Linux | c9e4b15a161b89f0e412721f471c5f8559b6054f
|
Google Sites | Box | Mega | |
OS X | 23f99a0d65e71fd79ff072b227f0ecb176f0ffa8
|
Google Sites | Box | Mega | ||
Windows | 2ff288e1798b4711020e9dd7f26480e57704d8b2
|
Google Sites | Box | Mega | ||
1.1 | Linux | 6c06a6be87e003eee470eb749b42ffbaafcc9e62
|
Google Sites | Box | Mega | |
OS X | ae9d20bc927976a1f55089cd80afca48de0f7a2e
|
Google Sites | Box | Mega | ||
Windows | 4225b01afd4a4fd1277565954964bd3310ad8b5f
|
Google Sites | Box | Mega | ||
1.2 | Linux | 2e1d1f6c7e6ca775860df03298dce3b0d798658a
|
Google Sites | Box | Mega | |
OS X | 8f91aba478ad28bda800dc5c303be1699fcfb800
|
Google Sites | Box | Mega | ||
Windows | 9942559caf779da6526b9fd0e207d21554a8a9cf
|
Google Sites | Box | Mega | ||
1.3 | Linux | d93bc45653345e62a315e0a0aaa1b709aacd26c4
|
Google Sites | Box | Mega | |
OS X | c239da3fd4e312c8468cdca967c86962b2cbd3f9
|
Google Sites | Box | Mega | ||
Windows | 92bbe23f125f3b0155334f1925943624e24ce130
|
Google Sites | Box | Mega |
Exploits
evasi0n takes advantage of several vulnerabilities:
- Symbolic Link Vulnerability
- Malformed PairRequest
- Shebang Trick
- AMFID code signing evasion
- launchd.conf untether
- IOUSBDeviceFamily Vulnerability
- ARM Exception Vector Info Leak
- dynamic memmove() locating
- vm_map_copy_t corruption for arbitrary memory disclosure
- kernel memory write via ROP gadget