iPhoneRoot.com       

News tagged ‘exploit’


Apple released iOS 4.3.4 that blocks JailbreakMe exploit





ios_4_3_4

Apple has released iOS 4.3.4 to block the PDF exploit used by comex in JailbreakMe utility. JailbreakMe can wireless jailbreak all devices on iOS 4.3.3.

iOS 4.3.4 Software Update
Fixes security vulnerability associated with viewing malicious PDF files.

Products compatible with this software update:
• iPhone 4 (GSM model)
• iPhone 3GS
• iPad 2
• iPad
• iPod touch (4th generation)
• iPod touch (3rd generation)

For iPhone 4 Verizon Apple released iOS 4.2.9.

The official information is available here: http://support.apple.com/kb/HT1222




|
   

Leave a comment

Sn0wBreeze updated to jailbreak iOS 5.0 beta 3



sn0wbreeze-28b4

iH8Sn0w has released a new version of Sn0wBreeze 2.8 b4 with iOS 5.0 beta 3 jailbreak support. Sn0wBreeze is a so-called PwnageTool for Windows, an application that creates a custom ipsw with jailbreak preserving old baseband.

The jailbreak is tethered for iPhone 4, iPhone 3GS (new bootrom), iPad, iPod Touch 3G and iPod Touch 4G. Jailbreak is untethered for iPhone 3GS with old bootrom.

You can download Sn0wBreeze 2.8 b4 here.

sn0wbreeze v2.8 BETA 4 Release Notes:

Read the rest of this entry »




|
   

Leave a comment

How to secure your iPhone or iPad and fix PDF vulnerability



As you might know hacker Comex has found a new PDF vulnerability and released JailBreakMe tool that uses it. These were great news. The bad ones is that your iPhone and iPad and iPod Touch is at risk. Bad guys can use the same vulnerability to take control of your device and do whatever they want with it.

Apple will fix it in iOS 4.3.4 firmware some day. Fortunately Comex has already released a patch for his JailbreakMe 3.0 exploit to protect already jailbroken devices from any malicious use of the exploit.

The package called 'PDF Patcher 2' can be downloaded and installed from Cydia. To jailbreak please use our step-by-step instructions.

pdf-patch




|
   

Leave a comment

The new JailbreakMe for iOS 4.3.3 has officially been released



JailbreakMe2

Today Comex has officially released the new web-based jailbreak for iOS 4.3.3. It supports all devices including iPad 2.

The jailbreak uses a PDF exploit similar to old JailbreakMe and does not require your device to be connected to the computer.

To jailbreak, navigate to http://www.jailbreakme.com on your iOS device after updating to iOS 4.3.3 (if you do not need unlock). We will be posting detailed instructions shortly.

Here is the list of devices and iOS versions that are supported:

  • iPad 1: iOS 4.3 - 4.3.3
  • iPad 2: iOS 4.3.3
  • iPhone 3GS: iOS 4.3 - 4.3.3
  • iPhone 4 GSM: iOS 4.3 - 4.3.3
  • iPhone 4 CDMA: iOS 4.2.6 - 4.2.8
  • iPod Touch 3G: iOS 4.3, 4.3.2, 4.3.3
  • iPod Touch 4G: iOS 4.3 - 4.3.3

Step by step JailbreakMe tutorials:




|
   

Leave a comment

New jailbreak will be released soon on Jailbreakme.com



jailbreakme

Comex's jailbreak based on new PDF exploit was unofficially leaked recently. It looks like it will be released quite soon. Currently Jailbreakme.com shows the "coming soon" yellow sticky, that looks like the sticky Apple puts on its store right before new products hit the virtual shelves.

The new jailbreak is mostly for Apple iPad 2 users, because all other devices can be jailbroken with existing tools.




|
   

Leave a comment

iPad 2 jailbreak has been stolen and published



ipad_2_jailbreak

Comex's jailbreak for the iPad 2 has been stolen from secret website and later published on different sites. The jailbreak uses a PDF exploit similar to how JailbreakMe worked in the past.

User AppReviewerWill even posted a video showing working iPad 2 jailbreak on iOS 4.3. The video is currently unavailable.

This is quite sad, because now Apple is aware of the vulnerability and will probably release the fixed iOS 4.3.4. If now this will be fixed in iOS 5 for sure.

We strongly suggest that you wait for official release by Comex. Now you should just save your SHSH blobs using tinyumbrella utility.




|
   

Leave a comment

How to upgrade to iOS 5 without developer account



update-ios5

Before you even start thinking about it -

  • you do it at your own risk
  • you will probably loose warranty
  • you cant go back to iOS 4.x once you go to iOS 5
  • Apple will probably fix this soon.

The exploit uses a combination of Voiceover and the pull down notifications to activate the phone. The user that found this exploit says the device continues to work after restarts (so you won’t need to activate it every time you restart). The steps are:


Read the rest of this entry »




|
   

Leave a comment

iOS 5 is already jailbroken



ios5-jail-3 ios5-jail-2

MuscleNerd has announced in Twitter that iOS 5 has been successfully jailbroken using old good LimeRa1n exploit. Cydia and SSH is working without any problems.

iOS5 jailbroken on ipt4g: http://is.gd/7GxIcK http://is.gd/BwPvfh via limera1n + tethered boot..not too many surprises :)

Cydia works fine too from quick testing (I installed SSH) http://is.gd/oADWEo

It is currently tethered, that means jailbreak is gone after reboot. Hopefully i0n1c will be able to port his untether to iOS 5. Anyway great news for all jailbreakers!


Read the rest of this entry »




|
   

Leave a comment

Written by admin

Wednesday, June 8th, 2011. 0:09

Untethered jailbreak for iOS 4.3.2 will be available soon



pwned

I0n1c has confirmed that his untethered jailbreak exploit is still working for iOS 4.3.2. This is good news for all jailbreakers.

Here are his recent tweets:

Apple has been nice. I just verified that the untether vulnerability is not fixed in iOS 4.3.2 - my Ipad 1 is running untethered jailbroken

Of course the public untether binaries will not work with iOS 4.3.2 - I have to generate new untether binaries with new dyld/kernel offsets

I won't be able to create all the untether binaries before sunday, because I will be on planes, ...

The dev-team cannot produce the untether binaries on their own, because they don't have the source code to the untether exploit.

Well from what I hear lots of the problems people had with 4.3.1 (like wifi, 3g, ...) are gone in 4.3.2

The new version of iOS 4.3.2 jailbreak tools RedSn0w and PwnageTool will be released by the iPhone Dev-Team quite soon.




|
   

Leave a comment

Untethered jailbreak for iOS 4.3.1 is almost ready



Hacker I0nic has given his untether exploit for the iOS 4.3.1 jailbreak to the iPhone Dev-Team. They will perform testing and integrate it into their jailbreak utilities - redsn0w and pwnagetool. This untethered jailbreak will probably work for iPhone 3GS, iPhone 4, iPod Touch 3G, iPod Touch 4G and iPad.

The iphone-dev-team is already beta-testing the untether. So it is up to them to give you your tool of choice.

Please don't bother the dev-team now. The deal is: if the beta test is successfull, they are free to do whatever they want with it.

I0nic recently demonstrated his jailbreak on iPod Touch 4G. I hope to get iOS 4.3.1 jailbreak soon.




|
   

Leave a comment

iOS 4.3.1 jailbreak news: Apple closed comex kernel exploit



Comex, famous iPhone hacker, tweeted today that the kernel exploit for jailbreak he had found long ago was closed by Apple in recent iOS 4.3.1. This exploit could be used to jailbreak iPad 2.

As noticed by @0naj, my kernel exploit was fixed in 4.3.1.

I try not to be paranoid, but it is really hard to explain this as anything but a leak.

The funny thing is that my "new" kernel exploit is actually the kernel exploit used by JailbreakMe 2.0. It was never properly fixed.

It stayed there from 4.0.2 through 4.3, but was magically found in time for 4.3.1. well, go go @MuscleNerd and @i0n1c I guess

This is not good news. However we have recently seen working untethered jailbreak video. There are other vulnerabilities in iOS 4.3.1.




|
   

Leave a comment

iPod Touch 4G iOS 4.3.1 untethered jailbreak video



Here is a nice video for all jailbreakers. Hacker used sn0wbreeze to tether jailbreak iPod Touch 4G. Than he installed new untether exploit using SSH. Watch the result:




|
   

Leave a comment, read comments [1]

Safari 5.0.4 pwned at hacking contest in five seconds



SAfari pwned

As far as we know, the Apple’s browser Safari was always the subject of intense criticism for its various security weaknesses.  A couple of days ago Safari got pwned again at the hacking challenge pwn2own. It took the French team consists of specialists of security firm Vupen just a few seconds to exploit an unpatched Safari vulnerability. “We pwned Apple Safari on Mac OS X (x64) at pwn2own in 5 seconds,” they tweeted. Just a few minutes before the contest, Apple released Safari 5.0.4 alongside iOS 4.3. Vupen said that the update 62 vulnerabilities, breaking “some exploits but not all.”  The winners were awarded $15,000 and a MacBook Air. In addition to Safari, Microsoft’s Internet Explorer 8 was also hacked pretty quickly.




|
   

Leave a comment

Written by Svetlana Osipova

Friday, March 11th, 2011. 10:51

GreenPois0n RC5 released: untethered jailbreak for iOS 4.2.1



greenpois0n-rc5

The Chronic Dev-Team has finally released the new version of Greenpois0n, which features a full untethered jailbreak for iOS 4.2.1. No SHSH blobs needed. The exploit used has already been patched in iOS 4.3, so it not work on future iOS 4.3.

You can jailbreak iPhone 4, iPhone 3GS, iPod Touch 2G, iPod Touch 3G, iPod Touch 4G, iPad. Unlike redsn0w 0.9.6 this is untethered, so there is no need to connect iOS device to a computer after restart.

There is only Mac OS X version available. Chronic Dev-Team will release Windows and probably Linux version soon.

Unlockers: do not update to stock iOS 4.2.1. You should keep your baseband version. Wait for new version of PwnageTool.

You can download GreenPois0n RC5 from here.

UPDATE: Step-by-step tutorial

UPDATE: Please, consider reading our Jailbreak & Unlock FAQ, especially if you have questions or troubles.




|
   

Leave a comment, read comments [5]

Apple disabled jailbreak detection API in iOS 4.2



jailbreak API

Apple has reportedly disabled its jailbreak detection API through iOS 4.2 software update. The API helped third-party mobile device management (MDM) applications to check for unauthorized modifications of system files. Apple's jailbreak detection API provided MDM applications direct access to iOS system information and was able to ask the operating system directly if it had been jailbroken. Jailbreak exploits typically change a number of operating system files, and exploit one or another low-level OS features to let users directly load their own or third-party applications.


Read the rest of this entry »




|
   

Leave a comment