The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Evasi0n"
m ("The program" -> "evasi0n"; internalized wikipedia link; added links (to non-existent technical articles to please George)) |
m (Whoops! (facepalm)) |
||
Line 47: | Line 47: | ||
evasi0n takes advantage of at least five distinct new vulnerabilities: |
evasi0n takes advantage of at least five distinct new vulnerabilities: |
||
* Use of symbolic links in [[:/usr/share/zoneinfo|time zone]] file to socket |
* Use of symbolic links in [[:/usr/share/zoneinfo|time zone]] file to socket |
||
− | * [[Shebang (Unix)|Unix "shebang" trick]] |
+ | * [[wikipedia:Shebang (Unix)|Unix "shebang" trick]] |
* Change of launchd.conf for untethering |
* Change of launchd.conf for untethering |
||
* AMFID code-signing kernel changes |
* AMFID code-signing kernel changes |
Revision as of 16:13, 6 February 2013
evasi0n is a jailbreak tool that can be used to jailbreak (untethered) iOS 6.0-6.1 on all supported devices, excluding the Apple TV 3G. It was releasd on 4 Feburary 2013 by its developers, evad3rs, and supports Windows, OS X, and Linux (x86 and x86_64).
Supported Devices
As of evasi0n's release, the only unsupported device is the Apple TV 3G, since the kernel is still missing a injector vector to run unsigned code. All other devices on iOS 6.0-6.1 are supported (as well as iOS 5.2 for the Apple TV 2G).
Version History
1.0
Version 1.0 was released on 4 February 2013. This version contains a bug that causes the Weather app to not work. The Notification Center widget is unaffected.
Changelog
- Initial release
Download
Version | Release Date | OS | SHA-1 Hash | Download | |||
---|---|---|---|---|---|---|---|
1.0 | 04 Feb 2013 | Linux | c9e4b15a161b89f0e412721f471c5f8559b6054f
|
Google Sites | Box | Mega | RapidShare |
OS X | 23f99a0d65e71fd79ff072b227f0ecb176f0ffa8
|
Google Sites | Box | Mega | RapidShare | ||
Windows | 2ff288e1798b4711020e9dd7f26480e57704d8b2
|
Google Sites | Box | Mega | RapidShare |
Exploits
evasi0n takes advantage of at least five distinct new vulnerabilities:
- Use of symbolic links in time zone file to socket
- Unix "shebang" trick
- Change of launchd.conf for untethering
- AMFID code-signing kernel changes
- ASLR circumvention by using ARM exception vectors
External Links
This jailbreaking article is a "stub", an incomplete page. Please add more content to this article and remove this tag. |