The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Main Page"
(forgot two important exploits) |
m (fix link and changed title to be more generic) |
||
Line 85: | Line 85: | ||
*[[:Category:Ramdisk Patches|Ramdisk]]: [[ASR]] |
*[[:Category:Ramdisk Patches|Ramdisk]]: [[ASR]] |
||
− | ====[[:Category:Exploits|Exploits]]==== |
+ | ====[[:Category:Exploits|Vulnerabilities and Exploits]]==== |
*[[0x24000 Segment Overflow]] |
*[[0x24000 Segment Overflow]] |
||
*[[BPF STX Kernel Write Exploit]] |
*[[BPF STX Kernel Write Exploit]] |
||
Line 98: | Line 98: | ||
*[[Packet Filter Kernel Exploit]] |
*[[Packet Filter Kernel Exploit]] |
||
*[[Racoon String Format Overflow Exploit]] |
*[[Racoon String Format Overflow Exploit]] |
||
− | *[[SHAtter]] |
+ | *[[SHA-1 Image Segment Overflow|SHAtter]] |
*[[Usb control msg(0x21, 2) Exploit]] |
*[[Usb control msg(0x21, 2) Exploit]] |
||
*[[Usb control msg(0xA1, 1) Exploit]] (steaks4uce) |
*[[Usb control msg(0xA1, 1) Exploit]] (steaks4uce) |
Revision as of 20:10, 30 January 2012
Template:Heading More information is available on the Firmware and Jailbreak pages.
Device | iPhone & iPod touch | iPhone 3G & iPod touch 2G | Apple TV 2G | iPad 2 and iPhone 4S | Everything else |
---|---|---|---|---|---|
Latest Firmware | 3.1.3 (Build 7E18) | 4.2.1 (Build 8C148) | 4.4.4 (Build 9A406a) | 5.0.1 (Build 9A405)
(Build 9A406 for iPhone 4S) |
5.0.1 (Build 9A405) |
Can you jailbreak it right now? | Yes | Yes | Yes | Yes | Yes |
Can your device be unlocked via software? | Yes | Requires a preserved baseband, or baseband 06.15.00 | N/A | GSM iPad 2s sold everywhere but Japan are factory-unlocked.
All other cellular devices are locked. |
iPhone 3GS, Japanese iPad: Requires a preserved baseband, or baseband 06.15.00
iPhone 4 GSM model: Requires baseband 01.59.00 |
Template:Col-begin Template:Col-2 Template:Heading
Jailbreak Software
Patches
Vulnerabilities and Exploits
- 0x24000 Segment Overflow
- BPF STX Kernel Write Exploit
- HFS Heap Overflow
- HFS Legacy Volume Name Stack Buffer Overflow
- Incomplete Codesign Exploit
- IOSurface_Kernel_Exploit
- Limera1n Exploit
- Malformed CFF Vulnerability
- MobileBackup Copy Exploit
- Ndrv setspec() Integer Overflow
- Packet Filter Kernel Exploit
- Racoon String Format Overflow Exploit
- SHAtter
- Usb control msg(0x21, 2) Exploit
- Usb control msg(0xA1, 1) Exploit (steaks4uce)
Template:Col-2 Template:HeadingB
Devices (see also Models)
Application Processors
- S5L8900 (iPhone, iPod touch, iPhone 3G)
- S5L8720 (iPod touch 2G)
- S5L8920 (iPhone 3GS)
- S5L8922 (iPod touch 3G)
- S5L8930 (iPad, iPhone 4 GSM, iPod touch 4G, Apple TV 2G, iPhone 4 CDMA)
- S5L8940 (iPad 2, iPhone 4S)
Baseband Devices
- PMB8876 or S-Gold 2 (iPhone)
- PMB8878 or X-Gold 608 (iPhone 3G, iPhone 3GS, iPad)
- XMM6180 or X-Gold 618 (iPhone 4 GSM, iPad 2 GSM)
- MDM6600 (iPhone 4 CDMA, iPad 2 CDMA)
- MDM6610 (iPhone 4S)
Other
Template:Col-begin Template:Col-2 Template:Heading
iPhone Hackers
iPhone Hacker Teams
Application Development
- Apple Certification Process
- Bypassing iPhone Code Signatures
- Distribution Methods
- Frameworks
- MobileDevice Library
- Toolchain (Includes tutorials)
- Toolchain 2.0 (Includes tutorials)
Application Copy Protection
- Application Structure and Signatures
- Bugging Debuggers
- Copy Protection Overview
- Defeating Cracks
- Mach-O Loading Process
Template:Col-2 Template:HeadingB
Guides
Definitions
- Activation
- ASLR
- Baseband
- Bootloader
- Bootchain
- Bootrom / VROM
- CHIPID
- CPID
- DFU Mode
- ECID
- iBEC
- iBoot
- iBSS
- Jailbreak
- Kernel
- launchd
- LLB
- NAND
- NOR
- NORID
- SHSH
- Unlock
Disclaimer |