The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
evasi0n
evasi0n is a jailbreak tool that can be used to jailbreak (untethered) iOS 6.0-6.1 on all supported devices, excluding the Apple TV 3G. It was releasd on 4 Feburary 2013 by its developers, evad3rs, and supports Windows, OS X, and Linux (x86 and x86_64).
Supported Devices
As of evasi0n's release, the only unsupported device is the Apple TV 3G, since the kernel is still missing a injector vector to run unsigned code. All other devices on iOS 6.0-6.1 are supported (as well as iOS 5.2 for the Apple TV 2G).
Version History
Version | Release Date | Changes |
---|---|---|
1.0 | 04 Feb 2013 |
|
1.1 | 06 Feb 2013 |
|
1.2 | 08 Feb 2013 |
|
Download
Version | Release Date | OS | SHA-1 Hash | Download | |||
---|---|---|---|---|---|---|---|
1.0 | 04 Feb 2013 | Linux | c9e4b15a161b89f0e412721f471c5f8559b6054f
|
Mega | |||
Mac OS X | 23f99a0d65e71fd79ff072b227f0ecb176f0ffa8
|
Mega | |||||
Windows | 2ff288e1798b4711020e9dd7f26480e57704d8b2
|
Mega | |||||
1.1 | 06 Feb 2013 | Linux | 6c06a6be87e003eee470eb749b42ffbaafcc9e62
|
Google Sites | Box | Mega | RapidShare |
Mac OS X | ae9d20bc927976a1f55089cd80afca48de0f7a2e
|
Google Sites | Box | Mega | RapidShare | ||
Windows | 4225b01afd4a4fd1277565954964bd3310ad8b5f
|
Google Sites | Box | Mega | RapidShare | ||
1.2 | 08 Feb 2013 | Linux | 2e1d1f6c7e6ca775860df03298dce3b0d798658a
|
Google Sites | Box | Mega | RapidShare |
Mac OS X | 8f91aba478ad28bda800dc5c303be1699fcfb800
|
Google Sites | Box | Mega | RapidShare | ||
Windows | 9942559caf779da6526b9fd0e207d21554a8a9cf
|
Google Sites | Box | Mega | RapidShare |
Exploits
evasi0n takes advantage of at least five distinct new vulnerabilities:
- Use of symbolic links in time zone file to socket
- Unix "shebang" trick
- Change of launchd.conf for untethering
- AMFID code-signing kernel changes
- ASLR circumvention by using ARM exception vectors
Code
launchd.conf
bsexec .. /sbin/mount -u -o rw,suid,dev / setenv DYLD_INSERT_LIBRARIES /private/var/evasi0n/amfi.dylib load /System/Library/LaunchDaemons/com.apple.MobileFileIntegrity.plist bsexec .. /private/var/evasi0n/evasi0n unsetenv DYLD_INSERT_LIBRARIES bsexec .. /bin/rm -f /private/var/evasi0n/sock bsexec .. /bin/ln -f /var/tmp/launchd/sock /private/var/evasi0n/sock
External Links
This jailbreaking article is a "stub", an incomplete page. Please add more content to this article and remove this tag. |