Difference between revisions of "Blackbird Exploit"

From The iPhone Wiki
Jump to: navigation, search
m (Source: Clarity#0625 on Discord (https://discord.com/channels/624739448927682611/740700630376775793/1019371653681123338). Also fixed the stub template.)
m (Fixed links to A10 and T2; "chips")
Line 1: Line 1:
 
{{lowercase}}
 
{{lowercase}}
The '''blackbird exploit''' is a [[Secure Enclave Processor|SEP]] [[bootrom]] exploit that is currently known to be capable of executing unsigned code on the SEP's of devices with [[A8]], [[A9]], [[A10]], or [[T2]] chips. This exploit can only function in combination with [[checkm8 Exploit|checkm8]] or an [[iBoot (Bootloader)|iBoot]] exploit.
+
The '''blackbird exploit''' is a [[Secure Enclave Processor|SEP]] [[bootrom]] exploit that is currently known to be capable of executing unsigned code on the SEP's of devices with [[A8]], [[A9]], [[T8010|A10]], or [[T8012|T2]] chips. This exploit can only function in combination with [[checkm8 Exploit|checkm8]] or an [[iBoot (Bootloader)|iBoot]] exploit.
   
[[checkra1n]] is currently the only known tool capable of using the blackbird exploit, and only for the [[A10]] and [[T2]] processors.
+
[[checkra1n]] is currently the only known tool capable of using the blackbird exploit, and only for the [[T8010|A10]] and [[T8012|T2]] chips.
   
 
== References ==
 
== References ==

Revision as of 00:45, 14 September 2022

The blackbird exploit is a SEP bootrom exploit that is currently known to be capable of executing unsigned code on the SEP's of devices with A8, A9, A10, or T2 chips. This exploit can only function in combination with checkm8 or an iBoot exploit.

checkra1n is currently the only known tool capable of using the blackbird exploit, and only for the A10 and T2 chips.

References

Tango Utilities-terminal.png This exploit article is a "stub", an incomplete page. Please add more content to this article and remove this tag.