The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Alloc8 Exploit"
(No longer the last bootrom exploit) |
m (fix typo) |
||
Line 1: | Line 1: | ||
{{lowercase}} |
{{lowercase}} |
||
− | The '''alloc8 exploit''' is a [[bootrom]] exploit used to run unsigned code on |
+ | The '''alloc8 exploit''' is a [[bootrom]] exploit used to run unsigned code on both the [[Bootrom 359.3.2|new bootrom]] and the [[Bootrom 359.3|old bootrom]] [[N88AP|iPhone 3GS]] (and thereby [[jailbreak]] it). It is the first public [[Untethered jailbreak|untethered]] [[bootrom]] exploit for the [[Bootrom 359.3.2|new bootrom]] iPhone 3GS. |
[[User:axi0mX|axi0mX]] published a detailed analysis of alloc8 at [https://github.com/axi0mX/alloc8/blob/master/README GitHub] following his discovery of the exploit. |
[[User:axi0mX|axi0mX]] published a detailed analysis of alloc8 at [https://github.com/axi0mX/alloc8/blob/master/README GitHub] following his discovery of the exploit. |
Revision as of 08:30, 1 January 2020
The alloc8 exploit is a bootrom exploit used to run unsigned code on both the new bootrom and the old bootrom iPhone 3GS (and thereby jailbreak it). It is the first public untethered bootrom exploit for the new bootrom iPhone 3GS.
axi0mX published a detailed analysis of alloc8 at GitHub following his discovery of the exploit.
ipwndfu is currently the primary and most simple way of using the alloc8 exploit.