Difference between revisions of "PwnPie"

From The iPhone Wiki
Jump to: navigation, search
m
m (What it does)
 
Line 3: Line 3:
 
== What it does ==
 
== What it does ==
 
* Basically it takes an [[IPSW]] and parses every [[Img3]] inside.
 
* Basically it takes an [[IPSW]] and parses every [[Img3]] inside.
* Using [[BASH]], we launch [[Greenpois0n (toolkit)|greenpois0n]] monitoring its output, and when it loads [[iBSS]] we kill it.
+
* Using BASH, we launch [[Greenpois0n (toolkit)|greenpois0n]] monitoring its output, and when it loads [[iBSS]] we kill it.
 
We will have an iDevice in [[pwned]] [[iBSS]] mode.
 
We will have an iDevice in [[pwned]] [[iBSS]] mode.
 
* Using the <code>go aes dec</code> command we find keys/IVs and format them.
 
* Using the <code>go aes dec</code> command we find keys/IVs and format them.

Latest revision as of 17:01, 16 July 2014

PwnPie is an outdated IV/Key decrypter for OS X and is designed to be what the nonexistent iKeys is supposed to be.

What it does

  • Basically it takes an IPSW and parses every Img3 inside.
  • Using BASH, we launch greenpois0n monitoring its output, and when it loads iBSS we kill it.

We will have an iDevice in pwned iBSS mode.

  • Using the go aes dec command we find keys/IVs and format them.
  • The tool will also decrypt for you the rootfs inside of the IPSW, so you can play with it easily.

Requirements

Notes

  • This app is outdated, PyPie is recommended.