The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Jailbreak"
(7.0 and the new devices!) |
Guyutongxue (talk | contribs) m (→Versions: add 16.x) |
||
(724 intermediate revisions by 28 users not shown) | |||
Line 1: | Line 1: | ||
{{float toc|right}} |
{{float toc|right}} |
||
− | + | The term "'''jailbreak'''" is the process by which full execute and write access is obtained on all the partitions of iOS, iPadOS, tvOS and watchOS. It used to be done by patching [[/private/etc/fstab]] to mount the System partition as 'read-write'. This is entirely different from an [[unlock]]. Jailbreaking is the first action that must be taken before things like unofficial [[activation]] (hacktivation), and unofficial [[unlock]]ing can be applied. |
|
− | + | Older jailbreaks also included modifying the [[AFC]] service (used by [[iTunes]] to access the filesystem) to give full filesystem access from root. This was later updated to create a new service ([[AFC]]2) that allows access to the full filesystem. |
|
− | Modern jailbreaks |
+ | Modern jailbreaks now include patching the kernel to get around code signing and other restrictions. These are called [[Kernel Patches]]. |
− | + | '''Note''': The legality of jailbreaking your device varies with each country/region. [[wikipedia:iOS jailbreaking#Legality|Wikipedia has a summary of legality for some countries]]. |
|
+ | == Types of Jailbreaks == |
||
− | Version numbers are the first to jailbreak and last is the last supported version. Last will only be listed if a newer version is out that does not support the device and iOS. |
||
+ | When a device is booting, it loads Apple's own [[kernel]] initially, so a jailbroken device must be exploited and have the kernel patched each time it is booted up. |
||
+ | An [[untethered jailbreak|'''untethered''' jailbreak]] uses exploits that are powerful enough to allow the user to turn their device off and back on at will, with the device starting up completely, and the kernel will be patched without the help of a computer – in other words, it will be jailbroken even after each reboot. |
||
− | ==See Also== |
||
− | * [[failbreak]] |
||
+ | However, some jailbreaks are [[tethered jailbreak|'''tethered''']]. A tethered jailbreak is only able to temporarily jailbreak the device during a single boot. If the user turns the device off and then boots it back up without the help of a jailbreak tool, the device will no longer be running a patched kernel, and it may get stuck in a partially started state, such as [[Recovery Mode]]. In order for the device to start completely and with a patched kernel, it must be "re-jailbroken" with a computer (using the "boot tethered" feature of a tool) each time it is turned on. All changes to the files on the device (such as installed package files or edited system files) will persist between reboots, including changes that can only function if the device is jailbroken (such as installed package files). |
||
− | == Exploits which were used in order to jailbreak 1.x == |
||
− | === 1.0.2 === |
||
− | * [[Restore Mode]] ([[iBoot (Bootloader)|iBoot]] had a command named cp, which had access to the whole filesystem) |
||
− | === 1.1.1 === |
||
− | * [[Symlinks]] (an upgrade jailbreak) |
||
− | * [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) |
||
− | === 1.1.2 === |
||
− | * [[Mknod]] (an upgrade jailbreak) |
||
− | === 1.1.3 / 1.1.4 / 1.1.5 === |
||
− | * [[Soft Upgrade]] (an upgrade jailbreak) |
||
− | * [[Ramdisk Hack]] |
||
− | * [[Dual Boot Exploit]] - Works up to [[iOS]] 2.0 beta 3 |
||
− | * [[diags]] - Works up to [[iOS]] 2.0 beta 5 |
||
+ | In more recent years, two other solutions have been created - '''semi-tethered''' and '''semi-''un''tethered'''. |
||
− | == Exploits which are used in order to jailbreak 2.x == |
||
− | === 2.0 / 2.0.1 / 2.0.2 / 2.1 === |
||
− | * [[Pwnage]] + [[Pwnage 2.0]] |
||
− | === 2.1.1 === |
||
− | * [[ARM7 Go]] ([[tethered jailbreak]]) |
||
− | === 2.2 === |
||
− | * [[Pwnage]] + [[Pwnage 2.0]] ([[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]]) |
||
− | === 2.2.1 === |
||
− | * [[Pwnage]] + [[Pwnage 2.0]] ([[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]]) |
||
− | * [[0x24000 Segment Overflow]] + [[ARM7 Go]] (from iOS 2.1.1) ([[n72ap|iPod touch 2G]]) |
||
+ | A [[semi-tethered jailbreak|'''semi-tethered''']] solution is one where the device is able to start up on its own, but it will no longer have a patched kernel, and therefore will not be able to run modified code. It will, however, still be usable for normal functions, just like stock iOS. To start with a patched kernel, the user must start the device with the help of the jailbreak tool. |
||
− | == Exploits which are used in order to jailbreak 3.x == |
||
− | === 3.0 / 3.0.1 === |
||
− | * [[Pwnage]] + [[Pwnage 2.0]] ([[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]]) |
||
− | * [[ARM7 Go]] (from iOS 2.1.1) + [[0x24000 Segment Overflow]] ( [[n72ap|iPod touch 2G]]) |
||
− | * [[Pwnage]] + [[iBoot Environment Variable Overflow]] ([[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]]) |
||
− | * [[0x24000 Segment Overflow]] + [[iBoot Environment Variable Overflow]] ([[n72ap|iPod touch 2G]] and [[n88ap|iPhone 3GS]]) |
||
− | === 3.1 / 3.1.1 === |
||
− | * [[Pwnage]] + [[Pwnage 2.0]] (together for [[untethered jailbreak]] on [[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]]) |
||
− | * [[usb_control_msg(0x21, 2) Exploit]] ([[tethered jailbreak]] on [[n72ap|iPod touch 2G]] [[Bootrom 240.5.1|new bootrom]], [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], and [[n18ap|iPod touch 3G]]) |
||
− | * [[0x24000 Segment Overflow]] + [[usb_control_msg(0x21, 2) Exploit]] ([[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]] and [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]]) |
||
− | === 3.1.2 === |
||
− | * [[Pwnage]] + [[Pwnage 2.0]] (together for [[untethered jailbreak]] on [[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]]) |
||
− | * [[usb_control_msg(0x21, 2) Exploit]] ([[tethered jailbreak]] on [[n72ap|iPod touch 2G]] [[Bootrom 240.5.1|new bootrom]], [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], and [[n18ap|iPod touch 3G]]) |
||
− | * [[0x24000 Segment Overflow]] + [[usb_control_msg(0x21, 2) Exploit]] ([[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]] and [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]]) |
||
− | * [[MobileBackup Copy Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] (all devices, used in [[Spirit]]) |
||
− | * [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] (all devices, used in [[Star]]) |
||
− | === 3.1.3 === |
||
− | * [[Pwnage]] + [[Pwnage 2.0]] (together for [[untethered jailbreak]] on [[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]]) |
||
− | * [[0x24000 Segment Overflow]] (for [[n72ap|iPod touch 2G]] and [[n88ap|iPhone 3GS]] devices with older bootroms) |
||
− | ** + [[Limera1n Exploit]] ([[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]], used in [[sn0wbreeze]]) |
||
− | ** + [[usb_control_msg(0xA1, 1) Exploit]] ([[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]], used in [[sn0wbreeze]]) |
||
− | * [[usb_control_msg(0xA1, 1) Exploit]]+ [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] ([[n72ap|iPod touch 2G]] [[Bootrom 240.5.1|new bootrom]], used in [[sn0wbreeze]]) |
||
− | * [[Limera1n Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] ([[N18ap|iPod touch 3G]] and [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], used in [[sn0wbreeze]]) |
||
− | * [[MobileBackup Copy Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] (all devices, used in [[Spirit]]) |
||
− | * [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] (all devices, used in [[Star]]) |
||
+ | A [[semi-untethered jailbreak|'''semi-''un''tethered''']] jailbreak gives the ability to start the device on it's own. On first boot, the device will not be running a patched kernel. However, rather than having to run a tool from a computer to apply the kernel patches, the user is able to re-jailbreak their device with the help of an app (usually sideloaded using [[Cydia Impactor]]) running on their device. In the case of the iOS 9.2-9.3.3 jailbreak, a Safari-based exploit was available, thereby meaning a website could be used to rejailbreak. |
||
− | === 3.2 === |
||
− | * [[MobileBackup Copy Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] (all devices, used in [[Spirit]]) |
||
− | * [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] ([[k48ap|iPad]], used in [[Star]]) |
||
− | * [[Limera1n Exploit]] + [[Incomplete Codesign Exploit]] + [[BPF_STX Kernel Write Exploit]] ([[K48ap|iPad]] used in [[sn0wbreeze]] 2.9.x) |
||
− | === 3.2.1 === |
||
− | * [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] ([[k48ap|iPad]], used in [[Star]]) |
||
− | * [[Limera1n Exploit]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] ([[k48ap|iPad]], used in [[sn0wbreeze]] 2.9.x) |
||
− | === 3.2.2 === |
||
− | * [[Limera1n Exploit]] + [[Packet Filter Kernel Exploit]] ([[k48ap|iPad]]) |
||
+ | In more detail: Each iOS device has a [[bootchain]] that tries to make sure only trusted/signed code is loaded. A device with a tethered jailbreak is able to boot up with the help of a jailbreaking tool because the tool executes exploits via USB that bypass parts of that "chain of trust", bootstrapping to a [[pwned]] (no [[Signature Check Patch|signature check]]) [[iBSS]], [[iBEC]], or [[iBoot (Bootloader)|iBoot]] to finish the boot process. |
||
− | == Exploits which are used in order to jailbreak 4.x == |
||
− | === 4.0 / 4.0.1 === |
||
− | * [[Pwnage]] + [[Pwnage 2.0]] ([[n82ap|iPhone 3G]]) |
||
− | * [[0x24000 Segment Overflow]] ([[n72ap|iPod touch 2G]] and [[n88ap|iPhone 3GS]] devices with older bootroms) |
||
− | * [[Malformed CFF Vulnerability]] + [[Incomplete Codesign Exploit]] + [[IOSurface Kernel Exploit]] (all devices, used in [[Star]]) |
||
− | * [[Limera1n Exploit]] + [[Packet Filter Kernel Exploit]] ([[n88ap|iPhone 3GS]] New bootrom, [[N18ap|iPod touch 3G]], [[n90ap|iPhone 4 GSM model]]) |
||
− | |||
− | === 4.0.2 === |
||
− | * [[Pwnage]] + [[Pwnage 2.0]] ([[n82ap|iPhone 3G]]) |
||
− | * [[ARM7 Go]] (from iOS 2.1.1) + [[0x24000 Segment Overflow]] ([[n72ap|iPod touch 2G]]) |
||
− | * [[0x24000 Segment Overflow]] ([[n88ap|iPhone 3GS]]) |
||
− | * [[limera1n]]'s bootrom exploit + [[Packet Filter Kernel Exploit]] ([[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[n90ap|iPhone 4 GSM model]], and [[n81ap|iPod touch 4G]]) |
||
− | |||
− | === 4.1 === |
||
− | * [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[n82ap|iPhone 3G]]) |
||
− | * [[ARM7 Go]] (from iOS 2.1.1) + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]]) |
||
− | * [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]]) |
||
− | * [[limera1n]]'s bootrom exploit + [[Packet Filter Kernel Exploit]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[n90ap|iPhone 4 GSM model]], [[n81ap|iPod touch 4G]], and [[k66ap|Apple TV 2G]])) |
||
− | * [[usb_control_msg(0xA1, 1) Exploit]] + [[Packet Filter Kernel Exploit]] (together for [[untethered jailbreak]] on [[n72ap|iPod touch 2G]]) |
||
− | |||
− | === 4.2.1 === |
||
− | * [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[n82ap|iPhone 3G]]) |
||
− | * [[ARM7 Go]] (from iOS 2.1.1) + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n72ap|iPod touch 2G]] [[Bootrom 240.4|old bootrom]]) |
||
− | * [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]]) |
||
− | * [[limera1n]]'s bootrom exploit + [[HFS Legacy Volume Name Stack Buffer Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[n90ap|iPhone 4 GSM model]], [[n81ap|iPod touch 4G]], and [[k66ap|Apple TV 2G]]) |
||
− | * [[usb_control_msg(0xA1, 1) Exploit]] + [[HFS Legacy Volume Name Stack Buffer Overflow]] (together for [[untethered jailbreak]] on [[n72ap|iPod touch 2G]]) |
||
− | |||
− | === 4.2.6 / 4.2.7 / 4.2.8 === |
||
− | * [[limera1n]]'s bootrom exploit + [[HFS Legacy Volume Name Stack Buffer Overflow]] (together for [[untethered jailbreak]] on [[n92ap|iPhone 4 CDMA model]]) |
||
− | * [[T1 Font Integer Overflow]] (used for [[Saffron]]) |
||
− | |||
− | === 4.2.9 / 4.2.10 === |
||
− | * [[limera1n]]'s bootrom exploit (Tethered jailbreak on [[n92ap|iPhone 4 CDMA model]]) |
||
− | |||
− | === 4.3 === |
||
− | * [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]]) |
||
− | * [[limera1n]]'s bootrom exploit ([[tethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[n90ap|iPhone 4 GSM model]], [[n81ap|iPod touch 4G]], and [[k66ap|Apple TV 2G]]) |
||
− | * [[T1 Font Integer Overflow]] (used for [[Saffron]]) |
||
− | |||
− | === 4.3.1 / 4.3.2 / 4.3.3 === |
||
− | * [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3|old bootrom]]) |
||
− | * [[limera1n]]'s bootrom exploit + [[ndrv_setspec() Integer Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[n90ap|iPhone 4 GSM model]], and [[n81ap|iPod touch 4G]]) |
||
− | * [[T1 Font Integer Overflow]] (used for [[Saffron]]) |
||
− | |||
− | === 4.3.4 / 4.3.5 === |
||
− | * [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]]) |
||
− | * [[limera1n]]'s bootrom exploit (Tethered jailbreak) on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[n90ap|iPhone 4 GSM model]], and [[n81ap|iPod touch 4G]]) |
||
− | |||
− | == Exploits which are used in order to jailbreak 5.x == |
||
− | === 5.0 === |
||
− | * [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]]) |
||
− | * [[limera1n]]'s bootrom exploit (Tethered jailbreak) on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], and [[n81ap|iPod touch 4G]]) |
||
− | * [[Racoon String Format Overflow Exploit]] (used both for payload injection and untether)+[[HFS Heap Overflow]]- [[n94ap|iPhone 4S]] only |
||
− | |||
− | ===5.0.1=== |
||
− | * [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]]) |
||
− | * [[limera1n]]'s bootrom exploit + [[Racoon String Format Overflow Exploit]]+[[HFS Heap Overflow]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], and [[n81ap|iPod touch 4G]]) |
||
− | * [[Racoon String Format Overflow Exploit]] (used both for payload injection and untether)+[[HFS Heap Overflow]] - [[iPad 2]] and [[iPhone 4S]] with [[Absinthe]] |
||
− | |||
− | ===5.1=== |
||
− | * [[limera1n]]'s bootrom exploit (Tethered jailbreak) on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], and [[n81ap|iPod touch 4G]]) |
||
− | * [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]]) |
||
− | |||
− | ===5.1.1=== |
||
− | * [[limera1n Exploit]] + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]]) |
||
− | * [[limera1n Exploit]] + [[Rocky Racoon]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[iPhone 4]], [[n18ap|iPod touch 3G]], and [[n81ap|iPod touch 4G]]) |
||
− | |||
− | == Exploits which are used in order to jailbreak 6.x == |
||
− | === 6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2 === |
||
− | * [[limera1n]]'s bootrom exploit (Tethered jailbreak) on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3.2|new bootrom]], [[iPhone 4]], and [[n81ap|iPod touch 4G]]) |
||
− | * [[limera1n]]'s bootrom exploit + [[0x24000 Segment Overflow]] (together for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]]) |
||
− | * [[Symbolic Link Vulnerability]] |
||
− | * [[Timezone Vulnerability]] |
||
− | * [[Shebang Trick]] |
||
− | * [[AMFID code signing evasion]] |
||
− | * [[launchd.conf untether]] |
||
− | * [[IOUSBDeviceFamily Vulnerability]] |
||
− | * [[ARM Exception Vector Info Leak]] |
||
− | * [[dynamic memmove() locating]] |
||
− | * [[vm_map_copy_t corruption for arbitrary memory disclosure]] |
||
− | * [[kernel memory write via ROP gadget]] |
||
− | |||
− | == Exploits which are used in order to jailbreak 7.x == |
||
− | *None |
||
== Jailbreak Tools == |
== Jailbreak Tools == |
||
+ | Untethered or semi-untethered jailbreaks are shown with a green 'yes'. Tethered or semi-tethered jailbreaks will be stated in a yellow box. [[Beta Firmware]]s are not listed. |
||
− | ==== [[k66ap|Apple TV 2G]] ==== |
||
− | {| class="wikitable" style="font-size: smaller; text-align: center;" |
||
− | |- |
||
− | ! rowspan="2" | [[Jailbreak]] Tool |
||
− | ! colspan="20" | Works with [[firmware]]... |
||
− | |- |
||
− | | [[Mojave 8M89 (Apple TV 2G)|4.1/4.0]] |
||
− | | [[Jasper 8C150 (Apple TV 2G)|4.2/4.1]] |
||
− | | [[Jasper 8C154 (Apple TV 2G)|4.2.1/4.1.1]] |
||
− | | [[Durango 8F191m (Apple TV 2G)|4.3/4.2]] |
||
− | | [[DurangoTide 8F202 (Apple TV 2G)|4.3/4.2.1]] |
||
− | | [[DurangoTide 8F305 (Apple TV 2G)|4.3/4.2.2]] |
||
− | | [[DurangoTideCuba 8F455 (Apple TV 2G)|4.3]] |
||
− | | [[Telluride 9A334v (Apple TV 2G)|4.4/5.0]] |
||
− | | [[Telluride 9A335a (Apple TV 2G)|4.4.1/5.0]] |
||
− | | [[Telluride 9A336a (Apple TV 2G)|4.4.2/5.0]] |
||
− | | [[Telluride 9A405l (Apple TV 2G)|4.4.3/5.0.1]] |
||
− | | [[Telluride 9A406a (Apple TV 2G)|4.4.4/5.0.1]] |
||
− | | [[Hoodoo 9B179b (Apple TV 2G)|5.0/5.1]] |
||
− | | [[Hoodoo 9B206f (Apple TV 2G)|5.0.1/5.1.1]] |
||
− | | [[HoodooTide 9B830 (Apple TV 2G)|5.0.2/5.1.1]] |
||
− | | [[Sundance 10A406e (Apple TV 2G)|5.1/6.0]] |
||
− | | [[SundanceTide 10A801 (Apple TV 2G)|5.1.1/6.0.1]] |
||
− | | [[Brighton 10B144b (Apple TV 2G)|5.2/6.1]] |
||
− | | [[BrightonMaps 10B329a (Apple TV 2G)|5.2.1/6.1.3]] |
||
− | | [[BrightonTide 10B809 (Apple TV 2G)|5.3/6.1.4]] |
||
− | |- |
||
− | | [[evasi0n]] |
||
− | | colspan="15" {{no}} |
||
− | | colspan="3" {{yes|1.0}} |
||
− | | colspan="2" {{no}} |
||
− | |- |
||
− | | [[Greenpois0n (jailbreak)|greenpois0n]] |
||
− | | {{partial|no package management GUI}} |
||
− | | {{no}} |
||
− | | {{yes|RC6-RC6.1}} |
||
− | | colspan="17" {{no}} |
||
− | |- |
||
− | | [[limera1n]] |
||
− | | {{partial|no package management GUI}} |
||
− | | colspan="19" {{no}} |
||
− | |- |
||
− | | [[PwnageTool]] |
||
− | | {{partial|no package management GUI}} |
||
− | | {{partial|Restore from a custom firmware with unofficial bundle<sup>1</sup>}} |
||
− | | {{yes|4.2}} |
||
− | | {{no}} |
||
− | | {{yes|4.3-4.3.3.1}} |
||
− | | {{yes|4.3-4.3.3.1<sup>2</sup>}} |
||
− | | colspan="7" {{no}} |
||
− | | {{partial|5.1.1 (no package management GUI)}} |
||
− | | colspan="6" {{no}} |
||
− | |- |
||
− | | [[redsn0w]] |
||
− | | colspan="4" {{no}} |
||
− | | {{yes|0.9.6rc16}} |
||
− | | colspan="10" {{no}} |
||
− | | {{yes|0.9.15b1<sup>1</sup>}} |
||
− | | colspan="4" {{yes|0.9.15b3<sup>3</sup>}} |
||
− | |- |
||
− | | [[Seas0nPass]] (Mac) |
||
− | | colspan="2" {{no}} |
||
− | | {{yes|0.6.7<sup>1</sup> - 0.7.1}} |
||
− | | {{yes|0.7.2<sup>1</sup>}} |
||
− | | {{yes|0.7.3<sup>1</sup> - 0.7.5}} |
||
− | | {{yes|0.7.6.??? - 0.7.7.???}} |
||
− | | {{yes|0.7.8.???}} |
||
− | | {{yes|0.7.9.???<sup>1</sup>}} |
||
− | | {{yes|0.7.9.210<sup>1</sup>}} |
||
− | | {{yes|0.7.9.230<sup>1</sup>}} |
||
− | | {{yes|0.7.9.270<sup>1</sup>}} |
||
− | | {{yes|0.7.9.290<sup>1</sup> - 0.8.0.320}} |
||
− | | {{yes|0.8.3.470<sup>1</sup>}} |
||
− | | {{yes|0.8.4.518<sup>1</sup> - 0.8.5.555}} |
||
− | | {{yes|0.8.6.565}} |
||
− | | colspan="2" {{no}} |
||
− | | {{yes|0.8.9.655}} |
||
− | | colspan="2" {{no}} |
||
− | |- |
||
− | | [[Seas0nPass]] (Windows) |
||
− | | colspan="4" {{no}} |
||
− | | {{yes|0.3.7.????}} |
||
− | | {{yes|0.3.13.????}} |
||
− | | {{yes|0.3.29.???? - 0.3.45.4035}} |
||
− | | colspan="2" {{yes|0.3.37.????<sup>1</sup>}} |
||
− | | {{yes|0.3.42.3335<sup>1</sup>}} |
||
− | | {{yes|0.3.44.????<sup>1</sup>}} |
||
− | | {{yes|0.3.45.4035<sup>1</sup> - 0.8.3.5592}} |
||
− | | {{yes|0.8.3.5592<sup>1</sup>}} |
||
− | | {{yes|0.8.4.6306<sup>1</sup> - 0.8.5.6546}} |
||
− | | {{yes|0.8.6.7558}} |
||
− | | colspan="2" {{no}} |
||
− | | {{yes|0.8.9.11241}} |
||
− | | colspan="2" {{no}} |
||
− | |- |
||
− | | [[sn0wbreeze]] |
||
− | | {{partial|no package management GUI}} |
||
− | | colspan="3" {{no}} |
||
− | | {{yes|2.5-2.7.1}} |
||
− | | colspan="10" {{no}} |
||
− | | colspan="3" {{yes|2.9.8}} |
||
− | | colspan="2" {{no}} |
||
− | |- |
||
− | | [[unthredera1n]] |
||
− | | {{partial|no package management GUI}} |
||
− | | colspan="14" {{yes}} |
||
− | | colspan="5" {{no}} |
||
− | |} |
||
− | <sup>1</sup> [[Tethered jailbreak]].<br /> |
||
− | <sup>2</sup> User needs to manually add [[PwnageTool]] firmware bundle into application. <br /> |
||
− | <sup>3</sup> Point at 6.0 IPSW. Also [[Tethered jailbreak]]. |
||
+ | ===Versions=== |
||
− | ==== [[j33ap|Apple TV 3G]] ==== |
||
+ | * [[Jailbreak/1.x|1.x]] |
||
− | {| class="wikitable" style="font-size: smaller; text-align: center;" |
||
+ | * [[Jailbreak/2.x|2.x]] |
||
− | |- |
||
− | + | * [[Jailbreak/3.x|3.x]] |
|
+ | * [[Jailbreak/4.x|4.x]] |
||
− | ! colspan="8" | Works with [[firmware]]... |
||
+ | * [[Jailbreak/5.x|5.x]] |
||
− | |- |
||
+ | * [[Jailbreak/6.x|6.x]] |
||
− | | [[Hoodoo 9B179b (Apple TV 3G)|5.0/5.1]] |
||
+ | * [[Jailbreak/7.x|7.x]] |
||
− | | [[Hoodoo 9B206f (Apple TV 3G)|5.0.1/5.1]] |
||
+ | * [[Jailbreak/8.x|8.x]] |
||
− | | [[HoodooTide 9B830 (Apple TV 3G)|5.0.2/5.1.1]] |
||
+ | * [[Jailbreak/9.x|9.x]] |
||
− | | [[Sundance 10A406e (Apple TV 3G)|5.1/6.0]] |
||
+ | * [[Jailbreak/10.x|10.x]] |
||
− | | [[SundanceTide 10A831 (Apple TV 3G)|5.1.1/6.0.1]] |
||
+ | * [[Jailbreak/11.x|11.x]] |
||
− | | [[Brighton 10B144b (Apple TV 3G)|5.2/6.1]] |
||
+ | * [[Jailbreak/12.x|12.x]] |
||
− | | [[BrightonMaps 10B329a (Apple TV 3G)|5.2.1/6.1.3]] |
||
+ | * [[Jailbreak/13.x|13.x]] |
||
− | | [[BrightonTide 10B809 (Apple TV 3G)|5.3/6.1.4]] |
||
+ | * [[Jailbreak/14.x|14.x]] |
||
− | |- |
||
+ | * [[Jailbreak/15.x|15.x]] |
||
− | | [[Absinthe]] |
||
+ | * [[Jailbreak/16.x|16.x]] |
||
− | | colspan="8" {{no}} |
||
− | |- |
||
− | | [[evasi0n]] |
||
− | | colspan="8" {{no}} |
||
− | |- |
||
− | | [[redsn0w]] |
||
− | | colspan="8" {{no}} |
||
− | |- |
||
− | | [[Seas0npass]] |
||
− | | colspan="8" {{no}} |
||
− | |- |
||
− | | [[Sn0wbreeze]] |
||
− | | colspan="8" {{no}} |
||
− | |} |
||
+ | ==See Also== |
||
− | ==== [[j33iap|Apple TV 3G Rev A]] ==== |
||
+ | * [[Failbreak]] |
||
− | {| class="wikitable" style="font-size: smaller; text-align: center;" |
||
+ | * [[Jailbreak Exploits]] |
||
− | |- |
||
+ | * [[Kernel Patches]] |
||
− | ! rowspan="2" | [[Jailbreak]] Tool |
||
− | ! colspan="3" | Works with [[firmware]]... |
||
− | |- |
||
− | | [[Brighton 10B144b (Apple TV 3G Rev A)|5.2/6.1]] |
||
− | | [[BrightonMaps 10B329a (Apple TV 3G Rev A)|5.2.1/6.1.3]] |
||
− | | [[BrightonTide 10B809 (Apple TV 3G Rev A)|5.3/6.1.4]] |
||
− | |- |
||
− | | [[Absinthe]] |
||
− | | colspan="3" {{no}} |
||
− | |- |
||
− | | [[evasi0n]] |
||
− | | colspan="3" {{no}} |
||
− | |- |
||
− | | [[redsn0w]] |
||
− | | colspan="3" {{no}} |
||
− | |- |
||
− | | [[Seas0npass]] |
||
− | | colspan="3" {{no}} |
||
− | |- |
||
− | | [[Sn0wbreeze]] |
||
− | | colspan="3" {{no}} |
||
− | |} |
||
− | |||
− | {{:Jailbreak/Deprecated iPads}} |
||
− | |||
− | === [[iPad 2]] === |
||
− | {| class="wikitable" style="font-size: smaller; text-align: center;" |
||
− | |- |
||
− | ! rowspan="2" | [[Jailbreak]] Tool |
||
− | ! colspan="16" | Works with [[firmware]]... |
||
− | |- |
||
− | | 4.3 |
||
− | | 4.3.1 |
||
− | | 4.3.2 |
||
− | | 4.3.3 |
||
− | | 4.3.4 |
||
− | | 4.3.5 |
||
− | | 5.0 |
||
− | | 5.0.1 |
||
− | | 5.1 |
||
− | | 5.1.1 |
||
− | | 6.0 |
||
− | | 6.0.1 |
||
− | | 6.1 |
||
− | | 6.1.2 |
||
− | | 6.1.3 |
||
− | | 7.0 |
||
− | |- |
||
− | | [[Absinthe]] |
||
− | | colspan="7" {{no}} |
||
− | | {{yes|0.2-0.4}} |
||
− | | {{no}} |
||
− | | {{yes|2.0<sup>1</sup>-2.0.4}} |
||
− | | colspan="6" {{no}} |
||
− | |- |
||
− | | [[evasi0n]] |
||
− | | colspan="10" {{no}} |
||
− | | colspan="3" {{yes|1.0}} |
||
− | | {{yes|1.4}} |
||
− | | colspan="2" {{no}} |
||
− | |- |
||
− | | [[redsn0w]] |
||
− | | colspan="7" {{no}} |
||
− | | {{yes|0.9.10b7-0.9.11b4}} |
||
− | | {{no}} |
||
− | | {{yes|0.9.12b1}} |
||
− | | colspan="6" {{no}} |
||
− | |- |
||
− | | [[Saffron]] |
||
− | | colspan="3" {{no}} |
||
− | | {{yes}} |
||
− | | colspan="12" {{no}} |
||
− | |} |
||
− | <sup>1</sup> Not compatible with [[k93aap|iPad 2 (Wi-Fi) Rev A]] |
||
− | |||
− | === [[iPad 3]] === |
||
− | {| class="wikitable" style="font-size: smaller; text-align: center;" |
||
− | |- |
||
− | ! rowspan="2" | [[Jailbreak]] Tool |
||
− | ! colspan="8" | Works with [[firmware]]... |
||
− | |- |
||
− | | 5.1 |
||
− | | 5.1.1 |
||
− | | 6.0 |
||
− | | 6.0.1 |
||
− | | 6.1 |
||
− | | 6.1.2 |
||
− | | 6.1.3 |
||
− | | 7.0 |
||
− | |- |
||
− | | [[Absinthe]] |
||
− | | {{no}} |
||
− | | {{yes|2.0-2.0.4}} |
||
− | | colspan="6" {{no}} |
||
− | |- |
||
− | | [[evasi0n]] |
||
− | | colspan="2" {{no}} |
||
− | | colspan="3" {{yes|1.0}} |
||
− | | {{yes|1.4}} |
||
− | | colspan="2" {{no}} |
||
− | |- |
||
− | | [[redsn0w]] |
||
− | | {{no}} |
||
− | | {{yes|0.9.12b1}} |
||
− | | colspan="6" {{no}} |
||
− | |} |
||
− | |||
− | === [[iPad 4]] === |
||
− | {| class="wikitable" style="font-size: smaller; text-align: center;" |
||
− | |- |
||
− | ! rowspan="2" | [[Jailbreak]] Tool |
||
− | ! colspan="6" | Works with [[firmware]]... |
||
− | |- |
||
− | | 6.0 |
||
− | | 6.0.1 |
||
− | | 6.1 |
||
− | | 6.1.2 |
||
− | | 6.1.3 |
||
− | | 7.0 |
||
− | |- |
||
− | | [[evasi0n]] |
||
− | | colspan="3" {{yes|1.0}} |
||
− | | {{yes|1.4}} |
||
− | | colspan="2" {{no}} |
||
− | |} |
||
− | |||
− | === [[iPad mini 1G]] === |
||
− | {| class="wikitable" style="font-size: smaller; text-align: center;" |
||
− | |- |
||
− | ! rowspan="2" | [[Jailbreak]] Tool |
||
− | ! colspan="7" | Works with [[firmware]]... |
||
− | |- |
||
− | | 6.0 |
||
− | | 6.0.1 |
||
− | | 6.0.2 |
||
− | | 6.1 |
||
− | | 6.1.2 |
||
− | | 6.1.3 |
||
− | | 7.0 |
||
− | |- |
||
− | | [[evasi0n]] |
||
− | | colspan="4" {{yes|1.0}} |
||
− | | {{yes|1.4}} |
||
− | | colspan="2" {{no}} |
||
− | |} |
||
− | |||
− | {{:Jailbreak/Deprecated iPhones}} |
||
− | |||
− | === [[N90ap|iPhone 4 (GSM model)]] === |
||
− | {| class="wikitable" style="font-size: smaller; text-align: center; table-layout: fixed; border-collapse: collapse;" border="1" |
||
− | |- |
||
− | ! rowspan="2" | [[Jailbreak]] Tool |
||
− | ! colspan="22" | Works with [[firmware]]... |
||
− | |- |
||
− | | [[Apex 8A293 (iPhone 4 GSM)|4.0]] |
||
− | | [[Apex 8A306 (iPhone 4 GSM)|4.0.1]] |
||
− | | [[Apex 8A400 (iPhone 4 GSM)|4.0.2]] |
||
− | | [[Baker 8B117 (iPhone 4 GSM)|4.1]] |
||
− | | [[Jasper 8C148 (iPhone 4 GSM)|4.2.1]] |
||
− | | [[Durango 8F190 (iPhone 4 GSM)|4.3]] |
||
− | | [[Durango 8G4 (iPhone 4 GSM)|4.3.1]] |
||
− | | [[Durango 8H7 (iPhone 4 GSM)|4.3.2]] |
||
− | | [[Durango 8J2 (iPhone 4 GSM)|4.3.3]] |
||
− | | [[Durango 8K2 (iPhone 4 GSM)|4.3.4]] |
||
− | | [[Durango 8L1 (iPhone 4 GSM)|4.3.5]] |
||
− | | [[Telluride 9A334 (iPhone 4 GSM)|5.0]] |
||
− | | [[Telluride 9A405 (iPhone 4 GSM)|5.0.1]] |
||
− | | [[Hoodoo 9B176 (iPhone 4 GSM)|5.1]] |
||
− | | [[Hoodoo 9B206 (iPhone 4 GSM)|5.1.1 (9B206)]] |
||
− | | [[Hoodoo 9B208 (iPhone 4 GSM)|5.1.1 (9B208)]] |
||
− | | [[Sundance 10A403 (iPhone 4 GSM)|6.0]] |
||
− | | [[Sundance 10A523 (iPhone 4 GSM)|6.0.1]] |
||
− | | [[Brighton 10B144 (iPhone 4 GSM)|6.1]] |
||
− | | [[Brighton 10B146 (iPhone 4 GSM)|6.1.2]] |
||
− | | [[BrightonMaps 10B329 (iPhone 4 GSM)|6.1.3]] |
||
− | | [[Innsbruck 11A465 (iPhone 4 GSM)|7.0]] |
||
− | |- |
||
− | | [[Absinthe]] |
||
− | | colspan="14" {{no}} |
||
− | | {{yes|2.0}} |
||
− | | {{yes|2.0.2}} |
||
− | | colspan="6" {{no}} |
||
− | |- |
||
− | | [[evasi0n]] |
||
− | | colspan="16" {{no}} |
||
− | | colspan="3" {{yes|1.0}} |
||
− | | {{yes|1.4}} |
||
− | | colspan="2" {{no}} |
||
− | |- |
||
− | | [[Greenpois0n (jailbreak)|greenpois0n]] |
||
− | | colspan="3" {{no}} |
||
− | | {{yes|RC4}} |
||
− | | {{yes|RC5-RC6.1}} |
||
− | | colspan="17" {{no}} |
||
− | |- |
||
− | | [[limera1n]] |
||
− | | colspan="4" {{yes}} |
||
− | | colspan="18" {{no}} |
||
− | |- |
||
− | | [[PwnageTool]] |
||
− | | colspan="3" {{no}} |
||
− | | {{yes|4.1-4.1.3}} |
||
− | | {{yes|4.2}} |
||
− | | {{partial|4.2<sup>1 3</sup>}} |
||
− | | {{yes|4.3}} |
||
− | | {{yes|4.3.2}} |
||
− | | {{yes|4.3.3-4.3.3.1}} |
||
− | | colspan="3" {{partial|4.3.3<sup>1 3</sup>}} |
||
− | | {{yes|5.0.1}} |
||
− | | {{no}} |
||
− | | colspan="2" {{yes|5.1.1}} |
||
− | | colspan="6" {{no}} |
||
− | |- |
||
− | | [[redsn0w]] |
||
− | | colspan="3" {{no}} |
||
− | | {{yes|0.9.6b2-0.9.6rc16}} |
||
− | | {{partial|0.9.6b4<sup>1</sup>-0.9.6rc16<br />or 0.9.7b6<sup>1 2</sup>}} |
||
− | | {{partial|0.9.6rc9<sup>1</sup>-0.9.6rc16<sup>1</sup>}} |
||
− | | {{partial|0.9.6rc9<sup>1</sup>-0.9.6rc16}} |
||
− | | {{partial|0.9.6rc13<sup>1</sup>-0.9.6rc16}} |
||
− | | {{yes|0.9.6rc16}} |
||
− | | {{partial|0.9.8b3<sup>1</sup>}} |
||
− | | {{partial|0.9.8b7<sup>1</sup>}} |
||
− | | {{partial|0.9.9b3<sup>1</sup>}} |
||
− | | {{yes|0.9.10b6}} |
||
− | | {{partial|0.9.10b6<sup>1</sup>}} |
||
− | | colspan="2" {{yes|0.9.12b1-0.9.14b2}} |
||
− | | {{partial|0.9.15b1<sup>1</sup>}} |
||
− | | colspan="4" {{partial|0.9.15b1<sup>4</sup>}} |
||
− | | {{no}} |
||
− | |- |
||
− | | [[Saffron]] |
||
− | | colspan="5" {{no}} |
||
− | | colspan="4" {{yes}} |
||
− | | colspan="13" {{no}} |
||
− | |- |
||
− | | [[sn0wbreeze]] |
||
− | | colspan="3" {{no}} |
||
− | | {{yes|2.1}} |
||
− | | {{yes|2.2}} |
||
− | | {{partial|2.3b4<sup>1</sup>}} |
||
− | | {{yes|2.5}} |
||
− | | {{yes|2.6-2.6.1}} |
||
− | | {{yes|2.7-2.7.1}} |
||
− | | colspan="2" {{no}} |
||
− | | {{partial|2.8b8<sup>1</sup>}} |
||
− | | {{yes|2.9.1}} |
||
− | | {{no}} |
||
− | | colspan="2" {{yes|2.9.6}} |
||
− | | colspan="3" {{yes|2.9.8}} |
||
− | | {{yes|2.9.10}} |
||
− | | {{partial|2.9.14<sup>1</sup>}} |
||
− | | {{no}} |
||
− | |- |
||
− | | [[Star]] |
||
− | | colspan="2" {{yes}} |
||
− | | colspan="20" {{no}} |
||
− | |- |
||
− | | [[unthredera1n]] |
||
− | | colspan="5" {{no}} |
||
− | | colspan="11" {{yes}} |
||
− | | colspan="6" {{no}} |
||
− | |} |
||
− | <sup>1</sup> [[Tethered jailbreak]].<br /> |
||
− | <sup>2</sup> If [[SHSH]]s were saved for iOS 4.2b3 and if you have a developer access to its IPSW, [[Jailbreak Monte]] can be used.<br /> |
||
− | <sup>3</sup> Requires an unofficial firmware bundle.<br /> |
||
− | <sup>4</sup> Requires pointing [[redsn0w]] at 6.0 [[IPSW File Format|IPSW]]. Also [[Tethered jailbreak]]. |
||
− | |||
− | === [[N90bap|iPhone 4 (GSM Rev A model)]] === |
||
− | {| class="wikitable" style="font-size: smaller; text-align: center; table-layout: fixed; border-collapse: collapse;" border="1" |
||
− | |- |
||
− | ! rowspan="2" | [[Jailbreak]] Tool |
||
− | ! colspan="6" | Works with [[firmware]]... |
||
− | |- |
||
− | | [[Sundance 10A403 (iPhone 4 (Rev A) GSM)|6.0]] |
||
− | | [[Sundance 10A523 (iPhone 4 (Rev A) GSM)|6.0.1]] |
||
− | | [[Brighton 10B144 (iPhone 4 (Rev A) GSM)|6.1]] |
||
− | | [[Brighton 10B146 (iPhone 4 (Rev A) GSM)|6.1.2]] |
||
− | | [[BrightonMaps 10B329 (iPhone 4 GSM Rev A)|6.1.3]] |
||
− | | [[Innsbruck 11A465 (iPhone 4 GSM Rev A)|7.0]] |
||
− | |- |
||
− | | [[evasi0n]] |
||
− | | colspan="3" {{yes|1.0}} |
||
− | | {{yes|1.4}} |
||
− | | colspan="2" {{no}} |
||
− | |- |
||
− | | [[redsn0w]] |
||
− | | colspan="5" {{partial|0.9.15b3}} |
||
− | | {{no}} |
||
− | |- |
||
− | | [[sn0wbreeze]] |
||
− | | colspan="3" {{yes|2.9.8}} |
||
− | | {{yes|2.9.10}} |
||
− | | {{partial|2.9.14<sup>1</sup>}} |
||
− | | {{no}} |
||
− | |} |
||
− | |||
− | Must point [[redsn0w]] at the 6.0 IPSW. Tethered. |
||
− | |||
− | === [[N92ap|iPhone 4 (CDMA model)]] === |
||
− | {| class="wikitable" style="font-size: smaller; text-align: center; table-layout: fixed; border-collapse: collapse;" border="1" |
||
− | |- |
||
− | ! rowspan="2" | [[Jailbreak]] Tool |
||
− | ! colspan="16" | Works with [[firmware]]... |
||
− | |- |
||
− | | [[Phoenix 8E128 (iPhone 4 CDMA)|4.2.5]] |
||
− | | [[Phoenix 8E200 (iPhone 4 CDMA)|4.2.6]] |
||
− | | [[Phoenix 8E303 (iPhone 4 CDMA)|4.2.7]] |
||
− | | [[Phoenix 8E401 (iPhone 4 CDMA)|4.2.8]] |
||
− | | [[Phoenix 8E501 (iPhone 4 CDMA)|4.2.9]] |
||
− | | [[Phoenix 8E600 (iPhone 4 CDMA)|4.2.10]] |
||
− | | [[Telluride 9A334 (iPhone 4 CDMA)|5.0]] |
||
− | | [[Telluride 9A405 (iPhone 4 CDMA)|5.0.1]] |
||
− | | [[Hoodoo 9B176 (iPhone 4 CDMA)|5.1]] |
||
− | | [[Hoodoo 9B206 (iPhone 4 CDMA)|5.1.1]] |
||
− | | [[Sundance 10A403 (iPhone 4 CDMA)|6.0]] |
||
− | | [[Sundance 10A523 (iPhone 4 CDMA)|6.0.1]] |
||
− | | [[Brighton 10B141 (iPhone 4 CDMA)|6.1]] |
||
− | | [[Brighton 10B146 (iPhone 4 CDMA)|6.1.2]] |
||
− | | [[BrightonMaps 10B329 (iPhone 4 CDMA)|6.1.3]] |
||
− | | [[Innsbruck 11A465 (iPhone 4 CDMA)|7.0]] |
||
− | |- |
||
− | | [[Absinthe]] |
||
− | | colspan="7" {{no}} |
||
− | | {{yes|2.0}} |
||
− | | {{no}} |
||
− | | {{yes|2.0}} |
||
− | | colspan="6" {{no}} |
||
− | |- |
||
− | | [[evasi0n]] |
||
− | | colspan="10" {{no}} |
||
− | | colspan="3" {{yes|1.0}} |
||
− | | {{yes|1.4}} |
||
− | | colspan="2" {{no}} |
||
− | |- |
||
− | | [[Greenpois0n (jailbreak)|greenpois0n]] |
||
− | | {{no}} |
||
− | | {{yes|RC5 b4-RC6.1}} |
||
− | | colspan="14" {{no}} |
||
− | |- |
||
− | | [[PwnageTool]] |
||
− | | {{no}} |
||
− | | {{yes|4.2}} |
||
− | | {{no}} |
||
− | | {{yes|4.2<sup>2</sup>}} |
||
− | | colspan="3" {{no}} |
||
− | | {{yes|5.0.1}} |
||
− | | colspan="8" {{no}} |
||
− | |- |
||
− | | [[redsn0w]] |
||
− | | {{no}} |
||
− | | {{yes|0.9.6rc9-0.9.10b8b}} |
||
− | | {{yes|0.9.8b2-0.9.10b8b}} |
||
− | | {{yes|0.9.6rc18-0.9.10b8b}} |
||
− | | {{partial|0.9.8b3<sup>1</sup>-0.9.10b8b<sup>1</sup>}} |
||
− | | {{partial|0.9.8b7<sup>1</sup>-0.9.10b8b<sup>1</sup>}} |
||
− | | {{partial|0.9.9b3<sup>1</sup>-0.9.10b8b<sup>1</sup>}} |
||
− | | {{partial|0.9.9b9<sup>1</sup>-0.9.10b8b}} |
||
− | | {{partial|0.9.10b6<sup>1</sup>-0.9.10b8b<sup>1</sup>}} |
||
− | | {{yes|0.9.12b1}} |
||
− | | {{partial|0.9.14b1<sup>1</sup>}} |
||
− | | colspan="4" {{partial|0.9.15b3<sup>3</sup>}} |
||
− | | {{no}} |
||
− | |- |
||
− | | [[Saffron]] |
||
− | | {{no}} |
||
− | | colspan="3" {{yes}} |
||
− | | colspan="12" {{no}} |
||
− | |- |
||
− | | [[sn0wbreeze]] |
||
− | | {{no}} |
||
− | | {{yes|2.2-2.9.3}} |
||
− | | {{yes|2.6-2.9.3}} |
||
− | | {{yes|2.7-2.9.3}} |
||
− | | colspan="2" {{no}} |
||
− | | {{partial|2.8b9<sup>1</sup>-2.9.3<sup>1</sup>}} |
||
− | | {{partial|2.8b11<sup>1</sup>-2.9.3}} |
||
− | | {{partial|2.9.2<sup>1</sup>-2.9.3<sup>1</sup>}} |
||
− | | {{yes|2.9.7}} |
||
− | | colspan="3" {{yes|2.9.8}} |
||
− | | {{yes|2.9.10}} |
||
− | | {{partial|2.9.14<sup>1</sup>}} |
||
− | | {{no}} |
||
− | |- |
||
− | | [[unthredera1n]] |
||
− | | colspan="1" {{no}} |
||
− | | colspan="9" {{yes}} |
||
− | | colspan="6" {{no}} |
||
− | |} |
||
− | <sup>1</sup> [[Tethered jailbreak]].<br /> |
||
− | <sup>2</sup> Requires unofficial bundle.<br /> |
||
− | <sup>3</sup> Requires pointing [[redsn0w]] at 6.0 [[IPSW File Format|IPSW]]. Also [[Tethered jailbreak]]. |
||
− | |||
− | === [[N94ap|iPhone 4S]] === |
||
− | {| class="wikitable" style="font-size: smaller; text-align: center; table-layout: fixed; border-collapse: collapse;" border="1" |
||
− | |- |
||
− | ! rowspan="2" | [[Jailbreak]] Tool |
||
− | ! colspan="12" | Works with [[firmware]]... |
||
− | |- |
||
− | | [[Telluride 9A334 (iPhone 4S)|5.0]] |
||
− | | [[Telluride 9A405 (iPhone 4S)|5.0.1 (9A405)]] |
||
− | | [[Telluride 9A406 (iPhone 4S)|5.0.1 (9A406)]] |
||
− | | [[Hoodoo 9B179 (iPhone 4S)|5.1]] |
||
− | | [[Hoodoo 9B206 (iPhone 4S)|5.1.1]] |
||
− | | [[Sudance 10A405 (iPhone 4S)|6.0]] |
||
− | | [[Sudance 10A523 (iPhone 4S)|6.0.1]] |
||
− | | [[Brighton 10B142 (iPhone 4S)|6.1]] |
||
− | | [[Brighton 10B145 (iPhone 4S)|6.1.1]] |
||
− | | [[Brighton 10B146 (iPhone 4S)|6.1.2]] |
||
− | | [[BrightonMaps 10B329 (iPhone 4S)|6.1.3]] |
||
− | | [[Innsbruck 11A465 (iPhone 4S)|7.0]] |
||
− | |- |
||
− | | [[Absinthe]] |
||
− | | colspan="3" {{yes|0.1.2-1}} |
||
− | | {{no}} |
||
− | | {{yes|2.0}} |
||
− | | colspan="7" {{no}} |
||
− | |- |
||
− | | [[evasi0n]] |
||
− | | colspan="5" {{no}} |
||
− | | colspan="3" {{yes|1.0}} |
||
− | | {{yes|1.3}} |
||
− | | {{yes|1.4}} |
||
− | | colspan="2" {{no}} |
||
− | |- |
||
− | | [[redsn0w]] |
||
− | | {{no}} |
||
− | | {{yes|0.9.10b7}} |
||
− | | {{yes|0.9.11b2}} |
||
− | | {{no}} |
||
− | | {{yes|0.9.12b1}} |
||
− | | colspan="7" {{no}} |
||
− | |} |
||
− | |||
− | === [[iPhone 5]] === |
||
− | {| class="wikitable" style="font-size: smaller; text-align: center;" |
||
− | |- |
||
− | ! rowspan="2" | [[Jailbreak]] Tool |
||
− | ! colspan="8" | Works with [[firmware]]... |
||
− | |- |
||
− | | 6.0 |
||
− | | 6.0.1 |
||
− | | 6.0.2 |
||
− | | 6.1 |
||
− | | 6.1.2 |
||
− | | 6.1.3 |
||
− | | 6.1.4 |
||
− | | 7.0 |
||
− | |- |
||
− | | [[evasi0n]] |
||
− | | colspan="4" {{yes|1.0}} |
||
− | | {{yes|1.4}} |
||
− | | colspan="3" {{no}} |
||
− | |} |
||
− | |||
− | === [[iPhone 5c]] === |
||
− | {| class="wikitable" style="font-size: smaller; text-align: center;" |
||
− | |- |
||
− | ! rowspan="2" | [[Jailbreak]] Tool |
||
− | ! Works with [[firmware]]... |
||
− | |- |
||
− | | 7.0.1 |
||
− | |- |
||
− | | [[evasi0n]] |
||
− | | {{no}} |
||
− | |- |
||
− | | [[redsn0w]] |
||
− | | {{no}} |
||
− | |} |
||
− | |||
− | === [[iPhone 5s]] === |
||
− | {| class="wikitable" style="font-size: smaller; text-align: center;" |
||
− | |- |
||
− | ! rowspan="2" | [[Jailbreak]] Tool |
||
− | ! Works with [[firmware]]... |
||
− | |- |
||
− | | 7.0.1 |
||
− | |- |
||
− | | [[evasi0n]] |
||
− | | {{no}} |
||
− | |- |
||
− | | [[redsn0w]] |
||
− | | {{no}} |
||
− | |} |
||
− | |||
− | {{:Jailbreak/Deprecated iPod touches}} |
||
+ | [[Category:Jailbreaking]] |
||
− | === [[iPod touch 5G]] === |
||
− | {| class="wikitable" style="font-size: smaller; text-align: center;" |
||
− | |- |
||
− | ! rowspan="2" | [[Jailbreak]] Tool |
||
− | ! colspan="6" | Works with [[firmware]]... |
||
− | |- |
||
− | | [[Sundance 10A506 (iPod touch 5G)|6.0]] |
||
− | | [[Sundance 10A523 (iPod touch 5G)|6.0.1]] |
||
− | | [[Brighton 10B141 (iPod touch 5G)|6.1]] |
||
− | | [[Brighton 10B146 (iPod touch 5G)|6.1.2]] |
||
− | | [[Brighton 10B329 (iPod touch 5G)|6.1.3]] |
||
− | | [[Innsbruck 11A465 (iPod touch 5G)|7.0]] |
||
− | |- |
||
− | | [[evasi0n]] |
||
− | | colspan="3" {{yes|1.0}} |
||
− | | {{yes|1.4}} |
||
− | | colspan="2" {{no}} |
||
− | |} |
Latest revision as of 10:55, 13 February 2023
The term "jailbreak" is the process by which full execute and write access is obtained on all the partitions of iOS, iPadOS, tvOS and watchOS. It used to be done by patching /private/etc/fstab to mount the System partition as 'read-write'. This is entirely different from an unlock. Jailbreaking is the first action that must be taken before things like unofficial activation (hacktivation), and unofficial unlocking can be applied.
Older jailbreaks also included modifying the AFC service (used by iTunes to access the filesystem) to give full filesystem access from root. This was later updated to create a new service (AFC2) that allows access to the full filesystem.
Modern jailbreaks now include patching the kernel to get around code signing and other restrictions. These are called Kernel Patches.
Note: The legality of jailbreaking your device varies with each country/region. Wikipedia has a summary of legality for some countries.
Types of Jailbreaks
When a device is booting, it loads Apple's own kernel initially, so a jailbroken device must be exploited and have the kernel patched each time it is booted up.
An untethered jailbreak uses exploits that are powerful enough to allow the user to turn their device off and back on at will, with the device starting up completely, and the kernel will be patched without the help of a computer – in other words, it will be jailbroken even after each reboot.
However, some jailbreaks are tethered. A tethered jailbreak is only able to temporarily jailbreak the device during a single boot. If the user turns the device off and then boots it back up without the help of a jailbreak tool, the device will no longer be running a patched kernel, and it may get stuck in a partially started state, such as Recovery Mode. In order for the device to start completely and with a patched kernel, it must be "re-jailbroken" with a computer (using the "boot tethered" feature of a tool) each time it is turned on. All changes to the files on the device (such as installed package files or edited system files) will persist between reboots, including changes that can only function if the device is jailbroken (such as installed package files).
In more recent years, two other solutions have been created - semi-tethered and semi-untethered.
A semi-tethered solution is one where the device is able to start up on its own, but it will no longer have a patched kernel, and therefore will not be able to run modified code. It will, however, still be usable for normal functions, just like stock iOS. To start with a patched kernel, the user must start the device with the help of the jailbreak tool.
A semi-untethered jailbreak gives the ability to start the device on it's own. On first boot, the device will not be running a patched kernel. However, rather than having to run a tool from a computer to apply the kernel patches, the user is able to re-jailbreak their device with the help of an app (usually sideloaded using Cydia Impactor) running on their device. In the case of the iOS 9.2-9.3.3 jailbreak, a Safari-based exploit was available, thereby meaning a website could be used to rejailbreak.
In more detail: Each iOS device has a bootchain that tries to make sure only trusted/signed code is loaded. A device with a tethered jailbreak is able to boot up with the help of a jailbreaking tool because the tool executes exploits via USB that bypass parts of that "chain of trust", bootstrapping to a pwned (no signature check) iBSS, iBEC, or iBoot to finish the boot process.
Jailbreak Tools
Untethered or semi-untethered jailbreaks are shown with a green 'yes'. Tethered or semi-tethered jailbreaks will be stated in a yellow box. Beta Firmwares are not listed.