The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Evasi0n"
(Table for version.) |
(NEVER use ambiguous date formats - we have people from the us, europe, and australia that use this site. those dates mean different things in different parts of the world) |
||
Line 16: | Line 16: | ||
|- |
|- |
||
! 1.0 |
! 1.0 |
||
+ | | 04 Feb 2013 |
||
− | | style="white-space: nowrap;" | 04/02/2013 |
||
| |
| |
||
* Initial Release |
* Initial Release |
||
|- |
|- |
||
! 1.1 |
! 1.1 |
||
+ | | 06 Feb 2013 |
||
− | | style="white-space: nowrap;" | 06/02/2013 |
||
| |
| |
||
* Prevent [[:/Applications/Weather.app|Weather]] app from appearing on [[iPad]]s |
* Prevent [[:/Applications/Weather.app|Weather]] app from appearing on [[iPad]]s |
||
Line 30: | Line 30: | ||
|- |
|- |
||
! 1.2 |
! 1.2 |
||
+ | | 08 Feb 2013 |
||
− | | style="white-space: nowrap;" | 08/02/2013 |
||
| |
| |
||
* Disabled OTA Update. |
* Disabled OTA Update. |
Revision as of 01:21, 9 February 2013
evasi0n is a jailbreak tool that can be used to jailbreak (untethered) iOS 6.0-6.1 on all supported devices, excluding the Apple TV 3G. It was releasd on 4 Feburary 2013 by its developers, evad3rs, and supports Windows, OS X, and Linux (x86 and x86_64).
Supported Devices
As of evasi0n's release, the only unsupported device is the Apple TV 3G, since the kernel is still missing a injector vector to run unsigned code. All other devices on iOS 6.0-6.1 are supported (as well as iOS 5.2 for the Apple TV 2G).
Version History
Version | Release Date | Changes |
---|---|---|
1.0 | 04 Feb 2013 |
|
1.1 | 06 Feb 2013 |
|
1.2 | 08 Feb 2013 |
|
Download
Version | Release Date | OS | SHA-1 Hash | Download | |||
---|---|---|---|---|---|---|---|
1.0 | 04 Feb 2013 | Linux | c9e4b15a161b89f0e412721f471c5f8559b6054f
|
Mega | |||
Mac OS X | 23f99a0d65e71fd79ff072b227f0ecb176f0ffa8
|
Mega | |||||
Windows | 2ff288e1798b4711020e9dd7f26480e57704d8b2
|
Mega | |||||
1.1 | 06 Feb 2013 | Linux | 6c06a6be87e003eee470eb749b42ffbaafcc9e62
|
Google Sites | Box | Mega | RapidShare |
Mac OS X | ae9d20bc927976a1f55089cd80afca48de0f7a2e
|
Google Sites | Box | Mega | RapidShare | ||
Windows | 4225b01afd4a4fd1277565954964bd3310ad8b5f
|
Google Sites | Box | Mega | RapidShare |
Exploits
evasi0n takes advantage of at least five distinct new vulnerabilities:
- Use of symbolic links in time zone file to socket
- Unix "shebang" trick
- Change of launchd.conf for untethering
- AMFID code-signing kernel changes
- ASLR circumvention by using ARM exception vectors
Code
launchd.conf
bsexec .. /sbin/mount -u -o rw,suid,dev / setenv DYLD_INSERT_LIBRARIES /private/var/evasi0n/amfi.dylib load /System/Library/LaunchDaemons/com.apple.MobileFileIntegrity.plist bsexec .. /private/var/evasi0n/evasi0n unsetenv DYLD_INSERT_LIBRARIES bsexec .. /bin/rm -f /private/var/evasi0n/sock bsexec .. /bin/ln -f /var/tmp/launchd/sock /private/var/evasi0n/sock
External Links
This jailbreaking article is a "stub", an incomplete page. Please add more content to this article and remove this tag. |