Difference between revisions of "User:Gr0unded"

From The iPhone Wiki
Jump to: navigation, search
(New page: Hi! I'm Chase Reid!. I have been programming for two years in Objective-C and assembly language. I started programming with 32-bit and I can now write payloads to exploit vulnerable device...)
 
(remove jailbreak claim)
 
Line 1: Line 1:
 
Hi! I'm Chase Reid!. I have been programming for two years in Objective-C and assembly language.
 
Hi! I'm Chase Reid!. I have been programming for two years in Objective-C and assembly language.
 
I started programming with 32-bit and I can now write payloads to exploit vulnerable devices.
 
I started programming with 32-bit and I can now write payloads to exploit vulnerable devices.
  +
I'm part of @PwnDevTeam.
I'm part of @PwnDevTeam, and we are releasing a new 4.3 jailbreak called ZSummer. I will be handling the restore ramdisk.
 
 
I started with microcontrollers, then BASIC, then C++. I know how to jailbreak, and have a
 
I started with microcontrollers, then BASIC, then C++. I know how to jailbreak, and have a
 
very extensive knowledge of overflows, and how they are achieved. I can hack computers.
 
very extensive knowledge of overflows, and how they are achieved. I can hack computers.

Latest revision as of 11:48, 16 May 2012

Hi! I'm Chase Reid!. I have been programming for two years in Objective-C and assembly language. I started programming with 32-bit and I can now write payloads to exploit vulnerable devices. I'm part of @PwnDevTeam. I started with microcontrollers, then BASIC, then C++. I know how to jailbreak, and have a very extensive knowledge of overflows, and how they are achieved. I can hack computers. I also am experienced with disassembling binaries. Im an IDA Pro expert, and have found an exploit in iBoot at 0x0e handler. Also a now patched image exploit which contains code which overflows mail.app and gains arbitary code over it.