The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "PwnPie"
m |
(→Requirements) |
||
Line 9: | Line 9: | ||
== Requirements == |
== Requirements == |
||
− | * [[XPwn]]: [ |
+ | * [[XPwn]]: [https://github.com/planetbeing/xpwn GitHub] |
* [[IRecovery]]: [http://cl.ly/38TE CloudApp] |
* [[IRecovery]]: [http://cl.ly/38TE CloudApp] |
||
* [[LibPNG]]: [http://ethan.tira-thompson.org/Mac_OS_X_Ports_files/libpng%20%28universal%29.dmg Ethan.Tira-Thompson.org] |
* [[LibPNG]]: [http://ethan.tira-thompson.org/Mac_OS_X_Ports_files/libpng%20%28universal%29.dmg Ethan.Tira-Thompson.org] |
Revision as of 04:59, 12 April 2012
PwnPie is an outdated IV/Key decrypter for Template:Wp and is designed to be what the nonexistent iKeys is supposed to be.
What it does
- Basically it takes an IPSW and parses every Img3 inside.
- Using BASH, we launch greenpois0n monitoring its output, and when it loads iBSS we kill it.
We will have an iDevice in pwned iBSS mode.
- Using the
go aes dec
command we find keys/IVs and format them. - The tool will also decrypt for you the rootfs inside of the IPSW, so you can play with it easily.
Requirements
Notes
- This app is outdated, PyPie is recommended.