The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "PwnPie"
m |
m |
||
Line 8: | Line 8: | ||
* The tool will also decrypt for you the whole [[IPSW]], so you can play with it easily. |
* The tool will also decrypt for you the whole [[IPSW]], so you can play with it easily. |
||
* A private beta version can produce a page, allowing to add keys easily. |
* A private beta version can produce a page, allowing to add keys easily. |
||
− | * Latest version can be found on [https://github.com/qwertyoruiop/PwnPie/blob/master/PwnPie.sh GitHub] |
||
== Requirements == |
== Requirements == |
Revision as of 18:14, 4 July 2011
PwnPie also is what iKeys should be, but iKeys isn't real.
What it does
- Basically it takes an IPSW and parses every img3 inside.
- Using BASH, we launch greenpois0n monitoring its output, and when it loads iBSS we kill it.
We will have an iDevice in iBSS pwned.
- Using the
go aes dec
command we find keys/IVs and format them. - The tool will also decrypt for you the whole IPSW, so you can play with it easily.
- A private beta version can produce a page, allowing to add keys easily.