Difference between revisions of "Jailbreak (S5L8920+)"

From The iPhone Wiki
Jump to: navigation, search
(Edited geohot exploit section. Wording was terrible and didn't make sense.)
(:))
Line 1: Line 1:
Because of the date the [[0x24000 Segment Overflow]] was leaked by [[NitroKey]], Apple may or may not have had the time to fix the bug in the [[S5L8920 (Bootrom)|iPhone 3G[s] Bootrom]]. If not, the following needs to be done:
+
Apple did not have the time to fix the [[24kpwn]] hole in the [[S5L8920 (Bootrom)|iPhone 3G[s] Bootrom]]. Thus, the following needs to be done:
* '''Find a new iBoot exploit''' - This will allow us to decrypt the platform iBoot and other firmware files in it's IPSW, as well as dump the bootrom to examine.
+
* '''Make use of the [[24kpwn]] exploit''' - In order to run our patched [[LLB]] and to pass the ECID checks.
* '''Find a new bootrom exploit''' - After we have the bootrom dumped, we must look for a way to make SecureROM run our patched [[LLB]].
 
   
 
==ECID==
 
==ECID==

Revision as of 10:22, 26 June 2009

Apple did not have the time to fix the 24kpwn hole in the iPhone 3G[s] Bootrom. Thus, the following needs to be done:

  • Make use of the 24kpwn exploit - In order to run our patched LLB and to pass the ECID checks.

ECID

Apple added a new tag to the img3 format called ECID. The ECID is unique to each phone, and is being sigchecked. So no downgrades unless you have a dump of your unique old firmware's img3. Therefore, iBoot exploits won't be so useful for tethered JBs, because such exploits will be closed in new FWs. [1]

Geohot's iBoot Exploit

An undisclosed exploit has been discovered by geohot in the 7A341 firmware. [2] With the help of this exploit, the hardware AES engine has been used to decrypt the the KBAG sections of each of the iPhone2,1 7A341 images. The exploit has also been used to dump the S5L8920 Bootrom.