Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

0x06b - Upgrade Jailbreak section #1943

Merged
merged 8 commits into from
Jan 25, 2022
Merged

0x06b - Upgrade Jailbreak section #1943

merged 8 commits into from
Jan 25, 2022

Conversation

cpholguera
Copy link
Collaborator

  • update basic testing setup
  • upgrade the jailbreak section to make it more up-to-date and at the same time timeless (include most complete sources for jailbreakable devices/versions)
  • include links to other relevant chapters

…it more up-to-date and at the same time timeless. Include links to other relevant chapters.
Copy link
Collaborator

@TheDauntless TheDauntless left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

A few small changes and it's good to go :)

Document/0x06b-Basic-Security-Testing.md Outdated Show resolved Hide resolved
@@ -103,31 +66,77 @@ There are *tethered*, *semi-tethered*, *semi-untethered*, and *untethered* jailb

- Semi-untethered jailbreaks allow the device to boot on its own, but the kernel patches (or user-land modifications) for disabling code signing aren't applied automatically. The user must re-jailbreak the device by starting an app or visiting a website (not requiring a connection to a computer, hence the term untethered).

- Untethered jailbreaks are the most popular choice for end users because they need to be applied only once, after which the device will be permanently jailbroken.
- Untethered jailbreaks are the most popular choice for end users because they need to be applied only once, after which the device will be permanently jailbroken. They are very rare and usually benefit from hardware-based vulnerabilities, such as the [limera1n exploit](https://www.theiphonewiki.com/wiki/Limera1n "limera1n exploit") which directly affected the BootROM of the iPhone 4 and iPad 1.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Isn't the fact that it's untethered because there are additional vulnerabilities that allow you to write persistent code somewhere that is not part of the secure boot chain? (rather than the fact that the vulnerability itself is in HW, because Checkra1n is also in bootrom, but non persistent)

Document/0x06b-Basic-Security-Testing.md Outdated Show resolved Hide resolved
Document/0x06b-Basic-Security-Testing.md Outdated Show resolved Hide resolved
Document/0x06b-Basic-Security-Testing.md Outdated Show resolved Hide resolved
Document/0x06b-Basic-Security-Testing.md Outdated Show resolved Hide resolved
cpholguera and others added 5 commits January 23, 2022 15:56
Co-authored-by: Jeroen Beckers <info@dauntless.be>
Co-authored-by: Jeroen Beckers <info@dauntless.be>
Co-authored-by: Jeroen Beckers <info@dauntless.be>
Co-authored-by: Jeroen Beckers <info@dauntless.be>
Co-authored-by: Jeroen Beckers <info@dauntless.be>
Copy link
Collaborator

@TheDauntless TheDauntless left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM! 🍀

@cpholguera cpholguera merged commit f22e7db into master Jan 25, 2022
@cpholguera cpholguera deleted the 6b-update-jailbreak branch January 25, 2022 17:38
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants