The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Talk:Pangu8
Research
Pangu8 uses the same method as evasi0n7 did to run the kernel exploit. Here are some light details on the files in the untether package;
- libmis.dylib - Same as in evasi0n7, overrides symbols in amfid to make the signature check return 0, this is used in conjunction with the codesign hack.
- pangu_xpcd.dylib - handles codesigning hax???
- xpcd_cache.dylib - this dylib gets loaded by launchd on boot, this file is a new home for LaunchDaemons, Pangu8 replaces the old dylib with this patched version that includes an entry into the plist that gets returned that specifies xuanyuansword to be ran on boot (only once)
- xuanyuansword - this is the file that contains all the kernel exploit goodies that runs on every boot
- io.pangu.untether.plist - the launch daemon for the untether binary that gets used after the xpcd cache is rebuilt?