The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "GeekGrade"
m |
m (→Exploitable Devices and Compatible Firmware) |
||
Line 15: | Line 15: | ||
== Exploitable Devices and Compatible Firmware == |
== Exploitable Devices and Compatible Firmware == |
||
− | iPhone 4 ( |
+ | iPhone 4 (iPhone3,1) |
- iOS 6.1.2 |
- iOS 6.1.2 |
||
- iOS 6.1 |
- iOS 6.1 |
||
Line 28: | Line 28: | ||
- iOS 4.0.2 |
- iOS 4.0.2 |
||
− | iPhone 4 ( |
+ | iPhone 4 (iPhone3,2) |
- iOS 6.1.3 |
- iOS 6.1.3 |
||
− | iPhone 4 ( |
+ | iPhone 4 (iPhone3,3) |
- iOS 6.1.3 |
- iOS 6.1.3 |
||
- iOS 5.1.1 |
- iOS 5.1.1 |
||
Line 46: | Line 46: | ||
- iOS 4.1 |
- iOS 4.1 |
||
− | iPad 1 ( |
+ | iPad 1 (iPad1,1) |
- iOS 3.2 |
- iOS 3.2 |
||
Revision as of 18:06, 9 October 2016
Geekgrade Downgrade is currently the only way to downgrade idevices without SHSH blobs. It only works on devices with the S5L8930 and S5L8920 chips. It is a tethered downgrade. Found at [1].
Exploits used
Geekgrade Downgrade uses many exploits together to create a tethered downgrade without SHSH blobs.They happen in this order:
1.Limera1n- the bootrom exploit that allows pwned dfu mode. Pwned dfu mode puts the device in a state where custom firmware files can be falsely checked as legit when itunes restores to a custom firmware
2.Custom firmware- This only works because iTunes originally only asked the idevice if the firmware was legitimitley from apple. Apple firmware has specific img3 hashes, and itunes asks the idevice if it will accept them. Well, pwned dfu just tells it yes. The custom firmware uses SHSH blobs "donated for the project" and although they dont match the device, limera1n bypasses ios's verification for legit blobs.
3.iTunes 11.0-All itunes versions below 11.1 can be exploited with pwned dfu to restore to a custom firmware. This is because itunes previously only asked the idevice if the hashes were correct. All versions above 11.0.5 will recalculate the hash and check it again before restoring.
4.Limera1n-everytime the device is boot tethered, the exploit bypasses SHSH blobs verification, allowing it to boot.
Exploitable Devices and Compatible Firmware
iPhone 4 (iPhone3,1) - iOS 6.1.2 - iOS 6.1 - iOS 5.1.1 - iOS 5.1 - iOS 5.0.1 - iOS 4.3.5 - iOS 4.3.4 - iOS 4.3.3 - iOS 4.3.1 - iOS 4.1 - iOS 4.0.2
iPhone 4 (iPhone3,2) - iOS 6.1.3
iPhone 4 (iPhone3,3) - iOS 6.1.3 - iOS 5.1.1
iPod Touch 4G (iPod4,1) - iOS 6.1.3 - iOS 6.1 1 - iOS 6.0 - iOS 5.1.1 - iOS 5.1 - iOS 5.0.1 - iOS 4.3.5 - iOS 4.3.3 - iOS 4.1
iPad 1 (iPad1,1) - iOS 3.2
iPhone 3GS- the old bootrom on the 3GS is exploitable with the 0x24000 Segment Overflow. This can be used to load limera1n and bypass SHSH blob verification completley, meaning an untethered downgrade. The new bootrom is only exploitable to limera1n meaning like all other limera1n devices it must be loaded by redsnow each and every time to boot. As of 2016, no 3GS ispws have been created for geekgrade, although they could be.