The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "PwnPie"
m |
m (→What it does) |
||
Line 3: | Line 3: | ||
== What it does == |
== What it does == |
||
* Basically it takes an [[IPSW]] and parses every [[Img3]] inside. |
* Basically it takes an [[IPSW]] and parses every [[Img3]] inside. |
||
− | * Using |
+ | * Using BASH, we launch [[Greenpois0n (toolkit)|greenpois0n]] monitoring its output, and when it loads [[iBSS]] we kill it. |
We will have an iDevice in [[pwned]] [[iBSS]] mode. |
We will have an iDevice in [[pwned]] [[iBSS]] mode. |
||
* Using the <code>go aes dec</code> command we find keys/IVs and format them. |
* Using the <code>go aes dec</code> command we find keys/IVs and format them. |
Latest revision as of 17:01, 16 July 2014
PwnPie is an outdated IV/Key decrypter for OS X and is designed to be what the nonexistent iKeys is supposed to be.
What it does
- Basically it takes an IPSW and parses every Img3 inside.
- Using BASH, we launch greenpois0n monitoring its output, and when it loads iBSS we kill it.
We will have an iDevice in pwned iBSS mode.
- Using the
go aes dec
command we find keys/IVs and format them. - The tool will also decrypt for you the rootfs inside of the IPSW, so you can play with it easily.
Requirements
Notes
- This app is outdated, PyPie is recommended.