The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Absinthe"
Line 4: | Line 4: | ||
*A future integration with [[redsn0w]] |
*A future integration with [[redsn0w]] |
||
− | == |
+ | ==Installation== |
− | The jailbreak packs [[Corona]] for the [[S5L8940]] and the rest of the firmware patches in a regular [[iTunes]] backup and then restores this backup on to the device, which injects the required files. It is then completed by opening a web clip added to the [[SpringBoard|home screen]] by Absinthe that uses an exploit in [[/Applications/MobileSafari.app|Safari]] to install [[Cydia]]. |
+ | The jailbreak packs [[Corona]] for the [[S5L8940]] and the rest of the firmware patches in a regular [[iTunes]] backup and then restores this backup on to the device, which injects the required files. It is then completed by opening a web clip added to the [[SpringBoard|home screen]] by Absinthe that uses an exploit in [[/Applications/MobileSafari.app|Safari]] to install [[Cydia]]. If this doesn't work, for example, because the [[greenpois0n]] website is down due to the number of people attempting to jailbreak, an alternative is to enable a specially crafted VPN connection in the [[/Applications/Preferences.app|Settings]] app. |
− | == |
+ | ==Exploit== |
{{main|Corona}} |
{{main|Corona}} |
||
+ | The exact exploit to jailbreak the two devices is not known yet, but it is assumed that the web clip loads a page that requires an IPsec VPN connection, which causes the [http://ipsec-tools.sourceforge.net racoon] daemon to start and run the jailbreak payload. |
||
This jailbreak uses the [[Racoon String Format Overflow Exploit]] and [[HFS Heap Overflow]] from [[Corona]] for untether. |
This jailbreak uses the [[Racoon String Format Overflow Exploit]] and [[HFS Heap Overflow]] from [[Corona]] for untether. |
Revision as of 19:36, 20 January 2012
Absinthe is the S5L8940 userland jailbreak tool for iPhone 4S and iPad 2 on iOS 5.0 (iPhone 4S only), 5.0.1 (9A405) and iOS 5.0.1 build 9A406 on iPhone 4S. This tool was released on January 20, 2012, and is available in three incarnations:
- A GUI tool with the same name, released by the Chronic Dev Team
- A command-line version by the iPhone Dev Team, in case troubleshooting is required
- A future integration with redsn0w
Installation
The jailbreak packs Corona for the S5L8940 and the rest of the firmware patches in a regular iTunes backup and then restores this backup on to the device, which injects the required files. It is then completed by opening a web clip added to the home screen by Absinthe that uses an exploit in Safari to install Cydia. If this doesn't work, for example, because the greenpois0n website is down due to the number of people attempting to jailbreak, an alternative is to enable a specially crafted VPN connection in the Settings app.
Exploit
- Main article: Corona
The exact exploit to jailbreak the two devices is not known yet, but it is assumed that the web clip loads a page that requires an IPsec VPN connection, which causes the racoon daemon to start and run the jailbreak payload.
This jailbreak uses the Racoon String Format Overflow Exploit and HFS Heap Overflow from Corona for untether.