The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Talk:JailbreakMe"
m (Talk:Jailbreakme moved to Talk:JailbreakMe: Reflect capitalization properly.) |
|||
(2 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
+ | == HTML Source == |
||
− | With the release of Jailbreakme i have began decompiling it. All credits go to comex for the below. |
||
+ | With the release of JailbreakMe, I began to decompile it. All credit goes to comex for the below.<br /> |
||
− | |||
− | + | Here's the source code of the website (only the bottom is useful): http://www.mediafire.com/?g8bepd6h1q44f04 {{unsigned|Petrol|06:56, August 3, 2010}} |
|
− | |||
− | Since with trouble pasting here i have uploaded it onto mediafire.com |
||
− | |||
− | Open the html file with a text editor |
||
− | |||
− | http://www.mediafire.com/?g8bepd6h1q44f04 |
||
− | |||
− | {{unsigned|Petrol|06:56, August 3, 2010}} |
||
− | |||
:We appreciate the contribution, but anyone can easily obtain the page's source code by spoofing the user agent. The main thing everyone's interested in is how the exploit works (it's known to use a PDF vulnerability). --[[User:Dialexio|<span style="color:#C20; font-weight:normal;">Dialexio</span>]] 15:00, 3 August 2010 (UTC) |
:We appreciate the contribution, but anyone can easily obtain the page's source code by spoofing the user agent. The main thing everyone's interested in is how the exploit works (it's known to use a PDF vulnerability). --[[User:Dialexio|<span style="color:#C20; font-weight:normal;">Dialexio</span>]] 15:00, 3 August 2010 (UTC) |
||
− | |||
::The vulnerability used to get unsigned code running is in FreeType. Which is used to exploit IOKit. JailbreakMe used a PDF file to exploit FreeType but it could have been implemented in other ways. --[[User:GreySyntax|GreySyntax]] 15:25, 3 August 2010 (UTC) |
::The vulnerability used to get unsigned code running is in FreeType. Which is used to exploit IOKit. JailbreakMe used a PDF file to exploit FreeType but it could have been implemented in other ways. --[[User:GreySyntax|GreySyntax]] 15:25, 3 August 2010 (UTC) |
Latest revision as of 18:02, 3 March 2015
HTML Source
With the release of JailbreakMe, I began to decompile it. All credit goes to comex for the below.
Here's the source code of the website (only the bottom is useful): http://www.mediafire.com/?g8bepd6h1q44f04 --The preceding unsigned comment was added by Petrol (talk) 06:56, August 3, 2010. Please consult this page for more info on how to sign pages, and how to fix this.
- We appreciate the contribution, but anyone can easily obtain the page's source code by spoofing the user agent. The main thing everyone's interested in is how the exploit works (it's known to use a PDF vulnerability). --Dialexio 15:00, 3 August 2010 (UTC)
- The vulnerability used to get unsigned code running is in FreeType. Which is used to exploit IOKit. JailbreakMe used a PDF file to exploit FreeType but it could have been implemented in other ways. --GreySyntax 15:25, 3 August 2010 (UTC)