The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "PwnPie"
m |
m |
||
Line 5: | Line 5: | ||
* Using [[BASH]], we launch [[Greenpois0n (toolkit)|greenpois0n]] monitoring its output, and when it loads [[iBSS]] we kill it. |
* Using [[BASH]], we launch [[Greenpois0n (toolkit)|greenpois0n]] monitoring its output, and when it loads [[iBSS]] we kill it. |
||
We will have an iDevice in [[iBSS]] [[pwned]]. |
We will have an iDevice in [[iBSS]] [[pwned]]. |
||
− | * Using the < |
+ | * Using the <code>go aes dec</code> command we find keys/IVs and format them. |
* The tool will also decrypt for you the whole [[IPSW]], so you can play with it easily. |
* The tool will also decrypt for you the whole [[IPSW]], so you can play with it easily. |
||
* A private beta version can produce a page, allowing to add keys easily. |
* A private beta version can produce a page, allowing to add keys easily. |
Revision as of 18:14, 4 July 2011
PwnPie also is what iKeys should be, but iKeys isn't real.
What it does
- Basically it takes an IPSW and parses every img3 inside.
- Using BASH, we launch greenpois0n monitoring its output, and when it loads iBSS we kill it.
We will have an iDevice in iBSS pwned.
- Using the
go aes dec
command we find keys/IVs and format them. - The tool will also decrypt for you the whole IPSW, so you can play with it easily.
- A private beta version can produce a page, allowing to add keys easily.