找回密码
 加入我们

QQ登录

只需一步,快速开始

搜索
查看: 4016|回复: 4

[破解] 1.1.1终于搞定控制权限罗,解锁在望

[复制链接]
发表于 2007-10-10 22:25 | 显示全部楼层 |阅读模式
iPhone and iPod touch v1.1.1 full jailbreak tested, confirmed!Posted Oct 10th 2007 3:09AM by Ryan Block
4 s2 g3 }. c* p7 fFiled under: Cellphones, Portable Audio, Portable Video3 _9 O1 f$ C, i/ p. B* n9 s

6 v8 R! _5 O5 m
; ^& E/ v7 d* B9 F" z
We were invited by iPhone / iPod touch file system hacker Niacin (who you might also know for his PSP and MSN TV Linux clusterhacks, etc.) and Dre to test out their new v1.1.1 file system hack. Weknow the whole v1.1.1 hacking thing has been massively confusing evento folks like us, so here's a quick n' dirty timeline to bring you upto date.* u: x/ U5 c2 M, \  B
  • Apple releases iPhone, which was obviously cracked six ways from Sunday.
  • Through firmwares 1.0.1 and 1.0.2 Apple does not block these hacks in any way.
  • Firmwarev1.1.1 is released for iPhone and iPod touch, which completely locksout file system access (and thus 3rd party software).
  • Awkward silence from Apple fans and the dev community as everyone ponders how to crack the new file system protections.
  • Hackers dinopio, edgan discover the symlink hack,which takes v1.0.2 iPhones up to v1.1.1 with read / write file systemaccess. In other words, the hack only works on v1.0.2 iPhones (not theiPod touch) when being upgraded to v1.1.1, and still doesn't grant theability to execute loaded programs.
  • The next version of dinopio & co.'s symlink hack(which hasn't yet been released to the public) grants the covetedexecute privilege (so you can run those 3rd party apps), and enablesanother hack (by pumpkin) to make the new SpringBoard (the applicationlauncher) recognize the freshly recompiled iPhone apps.
  • Hacker Niacin (aka toc2rta) and Dre claimthey've managed to combine the symlink hack with a TIFF vulnerabilityfound in the v1.1.1 firmware's mobile Safari, which grants access tothe file system. This is the hack we're testing here.0 c& m6 u+ I# X* G: H5 B
    Note:Due to the nature of this hack, it's to be considered ephemeral. Appleneeds only to patch the TIFF vulnerability and file system access onv1.1.1 is out, with the touch and iPhone back to their previouslynot-too-hackable state.
And the result thus far? We've tested the solution, and we can confirm file system read+write accessvia the TIFF exploit on an iPod touch, meaning loading a simple imagefile on your v1.1.1 device gives full root file system access!9 ]1 _1 O6 {* u2 a% h

4 O. r) ?! h+ l2 V  q0 _' D' ?2 A5 Q2 zCaveats:* C, i$ a* s; ?3 |; @
  • The release has not at this time been released to thepublic. Niacin claims that will happen in the near future, possiblylater this morning.
  • Thus far the hack isn't entirelywithout issues. We're still trying to determine exactly what's what,but we've lost read and write access unexpectedly. This may or may notbe a problem with our machine or device, though, and not necessarilythe hack.
  • We did not test this method on an iPhone, buttechnically there should be no difference in the effect. Side note:your v1.1.1 iPhone would, at this time, need to be activated to loadthe TIFF. (How else are you gonna load it?) This is supposedly beingworked on.
Quick terminal log using iPHUC on the iPod touch confirming write ability to root FS after the break.
) U: b) O0 m- @- d5 b* |
- d" w7 \2 W* A==Terminal==
2 D0 U- f: N: w0 f0 c, Fiphuc 0.6.1 with tab completion.
0 R* g' ^8 F" c4 }3 K1 c1 f5 Y>> By The iPhoneDev Team: nightwatch geohot ixtli warren nall mjc operator* h4 ?% h0 c; T7 I
CFRunLoop: Waiting for iPhone.
/ f2 f- m$ O7 |. S# H0 f. snotification: iPhone attached.
* D# c; [: v2 d4 i8 n  |' B' I8 ^AMDeviceStartService 'com.apple.afc': 0
7 O" P' E/ t! j* q7 D+ |, K9 L(iPHUC) /: ls
; K4 s7 r7 U- w) d.
2 G# m. w/ k: G, w% o..
/ x* q7 O5 k7 h/ eApplications% w+ A/ B" i! R' u8 A9 K
Library
' V8 s% e1 i" P2 i* n# `9 HSystem
, ^* ?7 Y8 q& T8 tbin
$ p  m/ p, j8 [; ?, U' _! acores& U% q# S1 p( y4 J$ s; j
dev
# s' M9 |) M9 x: n5 wetc) Y1 W3 m. I1 n
mach- E1 D( P4 N0 o6 }4 O
private# Z' H- c3 a5 A7 x. W& i$ q3 e
sbin
" ?- {# H: V% ^, |& ftmp
: l3 e  m: R! a* j+ xusr
/ |9 \, z4 i2 y& U+ I; c: @* @var
4 Y; p9 X0 j; D' B# u) ?' \(iPHUC) /: putfile ./fstab /etc/fstab [That's the money line! No errors.]
6 t. S6 h" ~/ A! L: }(iPHUC) /: exit7 L; ]2 g- K" M0 Z
==/Terminal==
, b3 Z8 s- u( @. |/ s$ a/ K/ Z% u& F
Can confirm by way of getfile that the uploaded version sticks.
ipod-touch-iphone-jailbreak.jpg
 楼主| 发表于 2007-10-10 22:29 | 显示全部楼层
根据目前的消息..通过前几天的方法.,目前确认已经可以读写iPhone里原来被锁定的部分..6 X& ?2 C: j1 O, G  |- l- X
8 M1 v" q; n8 P* Z) i" l
这样的话.就可以解决1.1.1的解锁问题) x5 Q1 F* [5 U! ?7 b
# {7 Y# L+ y# K; b. ~( c1 x
目前主关键的一部分软件仍未对公众放出,.
 楼主| 发表于 2007-10-10 22:29 | 显示全部楼层
发表于 2007-10-10 23:10 | 显示全部楼层
发表于 2010-11-18 15:54 | 显示全部楼层
没米不折腾
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 加入我们

本版积分规则

QQ|Archiver|手机版|小黑屋|吹友吧 ( 京ICP备05078561号 )

GMT+8, 2024-12-22 16:43 , Processed in 0.314774 second(s), 18 queries .

Powered by Discuz! X3.5 Licensed

© 2001-2024 Discuz! Team.

快速回复 返回顶部 返回列表