The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "AMFID code signing evasion"
(initial page) |
m (add reference) |
||
Line 10: | Line 10: | ||
== Usage == |
== Usage == |
||
* [[evasi0n]] jailbreak |
* [[evasi0n]] jailbreak |
||
+ | |||
+ | == See Also == |
||
+ | * [[Overlapping Segment Attack]] |
||
== Credit == |
== Credit == |
Revision as of 22:27, 25 February 2013
By creating a dylib without code, just redefining the signed code verification function with a "return ok" method from another signed library and using lazy binding, the entire code signing requirement gets circumvented. This method has been used by developers for a long time now.
In evasi0n, the amfi.dylib redefines these functions:
- _kMISValidationOptionValidateSignatureOnly (_kCFUserNotificationTokenKey from CoreFoundation)
- _kMISValidationOptionExpectedHash (_kCFUserNotificationTimeoutKey from CoreFoundation)
- _MISValidateSignature (_CFEqual from CoreFoundation)
TODO: some more detailed description missing here.
Contents
Usage
- evasi0n jailbreak
See Also
Credit
- KennyTM~
- maybe others too