The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Evasi0n"
m |
m (excessive links is excessive; also, iOS devices are computers, so use desktop) |
||
Line 2: | Line 2: | ||
[[File:Evasi0n.png|165px|thumb|right|evasi0n's icon]] |
[[File:Evasi0n.png|165px|thumb|right|evasi0n's icon]] |
||
<!-- Do not change this to something like "used to make an untethered jailbreak" - it doesn't make a jailbreak - what makes a jailbreak is the developers who put the exploits together --> |
<!-- Do not change this to something like "used to make an untethered jailbreak" - it doesn't make a jailbreak - what makes a jailbreak is the developers who put the exploits together --> |
||
− | '''evasi0n''' is a [[jailbreak]] tool that can be used to |
+ | '''evasi0n''' is a [[jailbreak]] tool that can be used to jailbreak ([[untethered jailbreak|untethered]]) [[iOS]] 6.0-6.1 on all [[#Supported Devices|supported devices]], excluding the revisions of the [[Apple TV 3G]]. It was released on 4 February 2013 by the [[evad3rs]], and is available for Windows, OS X, and Linux (x86 and x86_64). There is also a [[cydia]] package called "evasi0n iOS 6.0-6.1 [[untethered jailbreak|untether]]" which can untether an existing [[tethered jailbreak]] without the need to restore and use the desktop tool. |
== Supported Devices == |
== Supported Devices == |
||
Line 24: | Line 24: | ||
* Mitigated the long reboot issue |
* Mitigated the long reboot issue |
||
* Fixed freezing issue with after connecting multiple devices |
* Fixed freezing issue with after connecting multiple devices |
||
− | * Fixed blinking of the jailbreak instructions on |
+ | * Fixed blinking of the jailbreak instructions on OS X. |
− | * |
+ | * OS X app is now codesigned. |
|- |
|- |
||
! 1.2 |
! 1.2 |
||
Line 125: | Line 125: | ||
| style="text-decoration: line-through;" | [http://rapidshare.com/files/2098837020/evasi0n-linux-1.3-1cb32faf1e4f4f6c890e6fcbeb004cb694c386f5-release.tar.lzma RapidShare] |
| style="text-decoration: line-through;" | [http://rapidshare.com/files/2098837020/evasi0n-linux-1.3-1cb32faf1e4f4f6c890e6fcbeb004cb694c386f5-release.tar.lzma RapidShare] |
||
|- |
|- |
||
− | | |
+ | | OS X |
| <code>c239da3fd4e312c8468cdca967c86962b2cbd3f9</code> |
| <code>c239da3fd4e312c8468cdca967c86962b2cbd3f9</code> |
||
| [https://sites.google.com/site/evad3rs/evasi0n-mac-1.3-1cb32faf1e4f4f6c890e6fcbeb004cb694c386f5-release.dmg?attredirects=0&d=1 Google Sites] |
| [https://sites.google.com/site/evad3rs/evasi0n-mac-1.3-1cb32faf1e4f4f6c890e6fcbeb004cb694c386f5-release.dmg?attredirects=0&d=1 Google Sites] |
||
Line 143: | Line 143: | ||
evasi0n takes advantage of at least five distinct new vulnerabilities: |
evasi0n takes advantage of at least five distinct new vulnerabilities: |
||
* Use of symbolic links in [[:/usr/share/zoneinfo|time zone]] file to socket |
* Use of symbolic links in [[:/usr/share/zoneinfo|time zone]] file to socket |
||
− | * [[wikipedia:Shebang (Unix)|Unix "shebang" |
+ | * [[wikipedia:Shebang (Unix)|Unix "shebang"]] trick |
* Change of launchd.conf for untethering |
* Change of launchd.conf for untethering |
||
* AMFID code-signing kernel changes |
* AMFID code-signing kernel changes |
||
Line 161: | Line 161: | ||
* [http://www.evasi0n.com/ Official Website] |
* [http://www.evasi0n.com/ Official Website] |
||
* [http://blog.accuvantlabs.com/blog/bthomas/evasi0n-jailbreaks-userland-component Accuvant Labs analysis] |
* [http://blog.accuvantlabs.com/blog/bthomas/evasi0n-jailbreaks-userland-component Accuvant Labs analysis] |
||
− | * [http://www.forbes.com/sites/andygreenberg/2013/02/05/inside-evasi0n-the-most-elaborate-jailbreak-to-ever-hack-your-iphone/ |
+ | * [http://www.forbes.com Forbes news] with an [http://www.forbes.com/sites/andygreenberg/2013/02/05/inside-evasi0n-the-most-elaborate-jailbreak-to-ever-hack-your-iphone/ explanation by planetbeing] |
{{stub|jailbreaking}} |
{{stub|jailbreaking}} |
Revision as of 23:29, 12 February 2013
evasi0n is a jailbreak tool that can be used to jailbreak (untethered) iOS 6.0-6.1 on all supported devices, excluding the revisions of the Apple TV 3G. It was released on 4 February 2013 by the evad3rs, and is available for Windows, OS X, and Linux (x86 and x86_64). There is also a cydia package called "evasi0n iOS 6.0-6.1 untether" which can untether an existing tethered jailbreak without the need to restore and use the desktop tool.
Supported Devices
As of evasi0n's release, the only unsupported devices are the Apple TV 3G revisions, since the kernels on these devices are still missing an injection vector to run unsigned code. All other devices on iOS 6.0-6.1.1 are supported (as well as iOS 5.2 for the Apple TV 2G).
Version History
Version | Release Date | Changes |
---|---|---|
1.0 | 04 Feb 2013 |
|
1.1 | 06 Feb 2013 | |
1.2 | 08 Feb 2013 |
|
1.3 | 11 Feb 2013 |
|
Download
Version | Release Date | OS | SHA-1 Hash | Download | |||
---|---|---|---|---|---|---|---|
1.0 | 04 Feb 2013 | Linux | c9e4b15a161b89f0e412721f471c5f8559b6054f
|
Google Sites | Box | Mega | RapidShare |
Mac OS X | 23f99a0d65e71fd79ff072b227f0ecb176f0ffa8
|
Google Sites | Box | Mega | RapidShare | ||
Windows | 2ff288e1798b4711020e9dd7f26480e57704d8b2
|
Google Sites | Box | Mega | RapidShare | ||
1.1 | 06 Feb 2013 | Linux | 6c06a6be87e003eee470eb749b42ffbaafcc9e62
|
Google Sites | Box | Mega | RapidShare |
Mac OS X | ae9d20bc927976a1f55089cd80afca48de0f7a2e
|
Google Sites | Box | Mega | RapidShare | ||
Windows | 4225b01afd4a4fd1277565954964bd3310ad8b5f
|
Google Sites | Box | Mega | RapidShare | ||
1.2 | 08 Feb 2013 | Linux | 2e1d1f6c7e6ca775860df03298dce3b0d798658a
|
Google Sites | Box | Mega | RapidShare |
Mac OS X | 8f91aba478ad28bda800dc5c303be1699fcfb800
|
Google Sites | Box | Mega | RapidShare | ||
Windows | 9942559caf779da6526b9fd0e207d21554a8a9cf
|
Google Sites | Box | Mega | RapidShare | ||
1.3 | 08 Feb 2013 | Linux | d93bc45653345e62a315e0a0aaa1b709aacd26c4
|
Google Sites | Box | Mega | RapidShare |
OS X | c239da3fd4e312c8468cdca967c86962b2cbd3f9
|
Google Sites | Box | Mega | RapidShare | ||
Windows | 92bbe23f125f3b0155334f1925943624e24ce130
|
Google Sites | Box | Mega | RapidShare |
Exploits
evasi0n takes advantage of at least five distinct new vulnerabilities:
- Use of symbolic links in time zone file to socket
- Unix "shebang" trick
- Change of launchd.conf for untethering
- AMFID code-signing kernel changes
- ASLR circumvention by using ARM exception vectors
Code
launchd.conf
bsexec .. /sbin/mount -u -o rw,suid,dev / setenv DYLD_INSERT_LIBRARIES /private/var/evasi0n/amfi.dylib load /System/Library/LaunchDaemons/com.apple.MobileFileIntegrity.plist bsexec .. /private/var/evasi0n/evasi0n unsetenv DYLD_INSERT_LIBRARIES bsexec .. /bin/rm -f /private/var/evasi0n/sock bsexec .. /bin/ln -f /var/tmp/launchd/sock /private/var/evasi0n/sock
External Links
This jailbreaking article is a "stub", an incomplete page. Please add more content to this article and remove this tag. |