The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
blackbird Exploit
Revision as of 08:37, 7 February 2022 by Ilikeiphone123 (talk | contribs) (created the blackbird exploit page, marking as stub because the exploit could be explained in more detail.)
The blackbird exploit is a SEP bootrom exploit, which is currently known to be able to run unsigned code on the SEP of devices with processors running either a A8, A9, A10, or T2. This is a tethered exploit, and can only function in combination with checkm8.
The blackbird exploit is known to be able to load an arbitrary SEP OS on the A8 and A9 processors, and perform a replay attack on the A10 and T2 processors.
checkra1n is currently the only known tool capable of using the blackbird exploit, and only for the A10 and T2 processors.
References
This article is a "stub", an incomplete page. Please add more content to this article and remove this tag. |