The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "User:Windows Helpdesk"
m (→My Devices) |
m (link fixes) |
||
(2 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
+ | I own the website http://www.windowshelpdesk.co.uk and I also created the blackthund3r Dev Team. See http://www.blackthund3r.co.uk. I create tools for assisting the jailbreaking community as well as having fun with arbitrary code execution on my [[N72AP|iPod touch 2G]] (MC Model) and learning how to create / boot custom ramdisks etc. I also want to one day understand how exploits such as the 0xA1 on (CBA to get full name :D) work and how I can send / implement them manually etc. I know loads but I'm fully aware there's loads more to come! I hope to at some point (when I can be asked!) learn ARM assembly and use IDA for something useful [http://www.lol.com LOL]. My real name is Christopher and I live in the UK |
||
− | == Who I am and what I do == |
||
− | I own the website http://www.windowshelpdesk.co.uk and I also created the blackthund3r Dev Team. See http://www.blackthund3r.co.uk. I create tools for assisting the jailbreaking community as well as having fun with arbitrary code execution on my [[iPod touch 2G]] (MC Model) and learning how to create / boot custom ramdisks etc. I also want to one day understand how exploits such as the 0xA1 on (CBA to get full name :D) work and how I can send / implement them manually etc. I know loads but I'm fully aware there's loads more to come! I hope to at some point (when I can be asked!) learn ARM assembly and use IDA for something useful [http://www.lol.com LOL]. My real name is Christopher and I live in the UK |
||
I created the semi-tethered jailbreak called Snowst0rm Cloud (Windows port) but it is unfortunately broken due to kernel issues. I hope to release at some point open source to demonstrate how unsigned code execution can be gained on the ipt2G MC w/o [[0x24000 Segment Overflow]] Exploit / [[usb_control_msg(0xA1, 1) Exploit]] / [[limera1n]] exploit (also used in [[Greenpois0n (jailbreak)|greenpois0n]]) |
I created the semi-tethered jailbreak called Snowst0rm Cloud (Windows port) but it is unfortunately broken due to kernel issues. I hope to release at some point open source to demonstrate how unsigned code execution can be gained on the ipt2G MC w/o [[0x24000 Segment Overflow]] Exploit / [[usb_control_msg(0xA1, 1) Exploit]] / [[limera1n]] exploit (also used in [[Greenpois0n (jailbreak)|greenpois0n]]) |
||
Line 6: | Line 5: | ||
I also wrote a few GUI tools in the hope they will help the lives of jailbreak devs everywhere. By far the most popular is [[Recovery Mode Controller]]. All can be downloaded from http://www.blackthund3r.co.uk |
I also wrote a few GUI tools in the hope they will help the lives of jailbreak devs everywhere. By far the most popular is [[Recovery Mode Controller]]. All can be downloaded from http://www.blackthund3r.co.uk |
||
[[Recovery Mode Controller]] - Easy putting into / getting out of recovery mode for all iDevices. It uses iPHUCWIN32 for entering and iTunnel for exiting unless you tell it to use libUSB. It was inspired by [[User:iH8sn0w|iH8sn0w's]] controller he depicts in his videos |
[[Recovery Mode Controller]] - Easy putting into / getting out of recovery mode for all iDevices. It uses iPHUCWIN32 for entering and iTunnel for exiting unless you tell it to use libUSB. It was inspired by [[User:iH8sn0w|iH8sn0w's]] controller he depicts in his videos |
||
− | + | thund3rCrypt - GUI-based decryption of both [[IMG3 File Format|IMG3s]] (including Ramdisks) with [[xpwntool]] and Root Filesystems with [[VFDecrypt]] |
|
− | + | iRecovery Controller - GUI for [[iRecovery]] |
|
− | + | iDisco - An application for making the screen of an iDevice flash random colours. Worked on 3.1.2 and below before the bgcolor command was removed in [[iOS]] 4.0. It basically just needs to upload an [[iBSS]] from an in-putted [[IPSW]] then it should work again. It is open source at http://www.github.com/blackthund3r/iDisco |
|
[[Multi-Hashing Hasher]] was a bit of VB fun. It can take any file - or a block of text - and create the MD5 and SHA1 hash of it with ease! |
[[Multi-Hashing Hasher]] was a bit of VB fun. It can take any file - or a block of text - and create the MD5 and SHA1 hash of it with ease! |
||
== My Devices == |
== My Devices == |
||
− | A jailbroken [[iPod touch 2G]] 8GB MC model (I used [[Greenpois0n (jailbreak)|greenpois0n]] FTW and it's currently on [[iOS]] 4.2.1) |
+ | A jailbroken [[N72AP|iPod touch 2G]] 8GB MC model (I used [[Greenpois0n (jailbreak)|greenpois0n]] FTW and it's currently on [[iOS]] 4.2.1) |
− | A jailbroken [[iPhone 3GS]] 16GB black running iOS 5.0.1 ([[Corona]] / [[redsn0w]]'d) |
+ | A jailbroken [[N88AP|iPhone 3GS]] 16GB black running iOS 5.0.1 ([[Corona]] / [[redsn0w]]'d) |
− | A jailbroken [[iPod touch 4G]] 8GB running iOS 5.0.1 ([[Corona]] / [[redsn0w]]'d) |
+ | A jailbroken [[N81AP|iPod touch 4G]] 8GB running iOS 5.0.1 ([[Corona]] / [[redsn0w]]'d) |
== Contact == |
== Contact == |
Latest revision as of 14:23, 29 March 2017
I own the website http://www.windowshelpdesk.co.uk and I also created the blackthund3r Dev Team. See http://www.blackthund3r.co.uk. I create tools for assisting the jailbreaking community as well as having fun with arbitrary code execution on my iPod touch 2G (MC Model) and learning how to create / boot custom ramdisks etc. I also want to one day understand how exploits such as the 0xA1 on (CBA to get full name :D) work and how I can send / implement them manually etc. I know loads but I'm fully aware there's loads more to come! I hope to at some point (when I can be asked!) learn ARM assembly and use IDA for something useful LOL. My real name is Christopher and I live in the UK
I created the semi-tethered jailbreak called Snowst0rm Cloud (Windows port) but it is unfortunately broken due to kernel issues. I hope to release at some point open source to demonstrate how unsigned code execution can be gained on the ipt2G MC w/o 0x24000 Segment Overflow Exploit / usb_control_msg(0xA1, 1) Exploit / limera1n exploit (also used in greenpois0n)
I also wrote a few GUI tools in the hope they will help the lives of jailbreak devs everywhere. By far the most popular is Recovery Mode Controller. All can be downloaded from http://www.blackthund3r.co.uk
Recovery Mode Controller - Easy putting into / getting out of recovery mode for all iDevices. It uses iPHUCWIN32 for entering and iTunnel for exiting unless you tell it to use libUSB. It was inspired by iH8sn0w's controller he depicts in his videos thund3rCrypt - GUI-based decryption of both IMG3s (including Ramdisks) with xpwntool and Root Filesystems with VFDecrypt iRecovery Controller - GUI for iRecovery iDisco - An application for making the screen of an iDevice flash random colours. Worked on 3.1.2 and below before the bgcolor command was removed in iOS 4.0. It basically just needs to upload an iBSS from an in-putted IPSW then it should work again. It is open source at http://www.github.com/blackthund3r/iDisco Multi-Hashing Hasher was a bit of VB fun. It can take any file - or a block of text - and create the MD5 and SHA1 hash of it with ease!
My Devices
A jailbroken iPod touch 2G 8GB MC model (I used greenpois0n FTW and it's currently on iOS 4.2.1) A jailbroken iPhone 3GS 16GB black running iOS 5.0.1 (Corona / redsn0w'd) A jailbroken iPod touch 4G 8GB running iOS 5.0.1 (Corona / redsn0w'd)
Contact
You can find me at:
blackthund3rjailbreak [AT] gmail.com blackthund3rtesting [AT] gmail.com for product testing / feedback / beta feedback only christopher [AT] blackthund3r.co.uk http://www.blackthund3r.co.uk Twitter: @blackthund3r
Hope that's enough!