AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
![]() ![]() ![]() This source code pertains to a specific build of iOS 9 firmware (9.3.x). As far as the device-specific code goes, there are identifiers present for iPhone 6s/6s plus, and iPhone SE. ![]() How can this prove useful? Untethered jailbreak for iOS 9Īn iBoot exploit could potentially lead to an untethered jailbreak for the affected iOS 9 versions. This seems somewhat plausible because an iBoot exploit is relatively easier to build. Such a leak is of immense importance for professional security researchers and jailbreak developers alike.ĭowngrade without SHSHĪn untethered downgrade requires a BootROM exploit, which is very valuable and difficult to develop.Įven if a hacker releases such an exploit publicly, it will only be useful for 32-bit devices.Ħ4-bit devices require a much powerful exploit for downgrading because they have SEP firmware to take care of. Hackers can’t compile or test this code out because of missing tools. View the Project on GitHub rasa/scoop-directory Scoop buckets by number of apps Moreover, it can also prove useful for finding vulnerabilities for future versions and modern 64-bit devices.Īs you already know, a BootROM exploit allows users to downgrade without SHSH Blobs.A searchable directory of buckets for the scoop package manager for Windows They can, however, use it to find security vulnerabilities in iOS 9 and then develop exploits based on them. ScoopInstaller/Extras: □ The Extras bucket for Scoop. ScoopInstaller/Main: □ The default bucket for Scoop. ![]()
0 Comments
Read More
Leave a Reply. |