The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "T8012 checkm8"
Line 3: | Line 3: | ||
==Work== |
==Work== |
||
− | * Checkm8 port to the T2 processor [https://github.com/h0m3us3r/ipwndfu] |
+ | * [[Checkm8]] port to the T2 processor [https://github.com/h0m3us3r/ipwndfu] |
− | * T2 restore using '''libimobiledevice''' [https://gist.github.com/rickmark/9245ed3ef7f36d5a0421557f68c4681b] |
+ | * [[T2]] restore using '''libimobiledevice''' [https://gist.github.com/rickmark/9245ed3ef7f36d5a0421557f68c4681b] |
* [[USB Target Disk Mode]] |
* [[USB Target Disk Mode]] |
||
− | * Apple SMC Firmware Reverse Engineering |
+ | * Apple [[SMC]] Firmware Reverse Engineering |
− | * Analysis of FDR data in the SysCfg region of Flash, and it's potential for Malware |
+ | * Analysis of [[FDR]] data in the SysCfg region of Flash, and it's potential for Malware |
== Official Members == |
== Official Members == |
Revision as of 05:26, 17 May 2020
t8012 checkm8 is a team of who have applied the checkm8 vulnerability to the t8012 or "T2" security processor on modern Mac computers.
Work
- Checkm8 port to the T2 processor [1]
- T2 restore using libimobiledevice [2]
- USB Target Disk Mode
- Apple SMC Firmware Reverse Engineering
- Analysis of FDR data in the SysCfg region of Flash, and it's potential for Malware