The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Main Page"
(iOS 5.1.1.) |
(Outdated table is outdated.) |
||
Line 20: | Line 20: | ||
| 4.2.1 (Build 8C148) |
| 4.2.1 (Build 8C148) |
||
| 5.1.1 (Build 9B206) |
| 5.1.1 (Build 9B206) |
||
− | | 5.0 (Build |
+ | | 5.0.1 (Build 9B206f) |
| 5.1.1 (Build 9B206) |
| 5.1.1 (Build 9B206) |
||
| 5.1.1 (Build 9B206) |
| 5.1.1 (Build 9B206) |
||
Line 28: | Line 28: | ||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
+ | | {{partial|The [[k66ap|Apple TV 2G]] has a [[tethered jailbreak]].}} |
||
| {{no}} |
| {{no}} |
||
+ | | {{partial|Yes, but [[tethered jailbreak|tethered]].}} |
||
− | | {{no}} |
||
− | | {{no}} |
||
|- |
|- |
||
! If the device is carrier-locked, is there a software-based [[unlock]]? |
! If the device is carrier-locked, is there a software-based [[unlock]]? |
Revision as of 08:09, 20 May 2012
Template:Heading More information is available on the Firmware and Jailbreak pages.
Device | iPhone & iPod touch | iPhone 3G & iPod touch 2G | iPhone 3GS (old bootrom) | Apple TV 2G, Apple TV 3G | iPad 2, iPad 3, and iPhone 4S | Everything else |
---|---|---|---|---|---|---|
Latest Firmware | 3.1.3 (Build 7E18) | 4.2.1 (Build 8C148) | 5.1.1 (Build 9B206) | 5.0.1 (Build 9B206f) | 5.1.1 (Build 9B206) | 5.1.1 (Build 9B206) |
Is there a jailbreak available? | Yes | Yes | Yes | The Apple TV 2G has a tethered jailbreak. | No | Yes, but tethered. |
If the device is carrier-locked, is there a software-based unlock? | Yes | Requires a preserved baseband, or baseband 06.15.00 | N/A | No | iPhone 3GS, Japanese iPad: Requires a preserved baseband, or baseband 06.15.00
iPhone 4 GSM model: Requires baseband 01.59.00 |
Template:Col-begin Template:Col-2 Template:Heading
Jailbreak Software
Patches
Vulnerabilities and Exploits
- 0x24000 Segment Overflow (24kpwn)
- BPF STX Kernel Write Exploit
- HFS Heap Overflow
- HFS Legacy Volume Name Stack Buffer Overflow (feedface)
- Incomplete Codesign Exploit
- IOSurface Kernel Exploit
- Limera1n Exploit
- Malformed CFF Vulnerability
- MobileBackup Copy Exploit
- ndrv_setspec() Integer Overflow
- Packet Filter Kernel Exploit
- Racoon String Format Overflow Exploit
- SHA-1 Image Segment Overflow (SHAtter)
- usb_control_msg(0x21, 2) Exploit
- usb_control_msg(0xA1, 1) Exploit (steaks4uce)
Template:Col-2 Template:HeadingB
Devices (see also Models)
Application Processors
- S5L8900 (iPhone, iPod touch, iPhone 3G)
- S5L8720 (iPod touch 2G)
- S5L8920 (iPhone 3GS)
- S5L8922 (iPod touch 3G)
- S5L8930 (iPad, iPhone 4 GSM, iPod touch 4G, Apple TV 2G, iPhone 4 CDMA)
- S5L8940 (iPad 2, iPhone 4S)
- S5L8942 (Apple TV 3G, iPad2 R2)
- S5L8945 (iPad 3)
Baseband Devices
- PMB8876 or S-Gold 2 (iPhone)
- PMB8878 or X-Gold 608 (iPhone 3G, iPhone 3GS, iPad)
- XMM6180 or X-Gold 618 (iPhone 4 GSM, iPad 2 GSM)
- MDM6600 (iPhone 4 CDMA, iPad 2 CDMA)
- MDM6610 (iPhone 4S)
- MDM9x00 (iPad 3)
Other
Template:Col-begin Template:Col-2 Template:Heading
iPhone Hackers
iPhone Hacker Teams
Application Development
- Apple Certification Process
- Bypassing iPhone Code Signatures
- Distribution Methods
- Frameworks
- MobileDevice Library
- Toolchain (Includes tutorials)
- Toolchain 2.0 (Includes tutorials)
Application Copy Protection
- Application Structure and Signatures
- Bugging Debuggers
- Copy Protection Overview
- Defeating Cracks
- Mach-O Loading Process
Template:Col-2 Template:HeadingB
Guides
Definitions
- Activation
- ASLR
- Baseband
- Bootloader
- Bootchain
- Bootrom / VROM
- CHIPID
- CPID
- DFU Mode
- ECID
- iBEC
- iBoot
- iBSS
- Jailbreak
- Kernel
- launchd
- LLB
- NAND
- NOR
- NORID
- SHSH
- Unlock
Disclaimer |