Results 1 to 3 of 3
Discuss iPhone hacking, initial info at the General - Hackint0sh.org; I've got my iPhone, it's activated, and I've been doing some rudimentary analysis of what's ...
  1. #1
    Newbie Array

    Join Date
    May 2007
    Posts
    5
    Post Thanks / Like
    Downloads
    0
    Uploads
    0
    Rep Power
    0

    Default iPhone hacking, initial info

    I've got my iPhone, it's activated, and I've been doing some rudimentary analysis of what's going on with it. I doubt I'll be able to accomplish the Holy Grail myself - loading 3rd party apps to do whatever you want (portable gaming platform ahoy!) But I bought my iPhone in the hopes that it'll eventually happen, and I'd like to help the hacking community get to that point however I can.

    Here's what I've found so far.

    When you update iTunes to 7.3, a PrivateFramework called MobileDevice.framework gets installed in /System/Library/PrivateFrameworks. Four applications are inside it, aside from the library binary itself: AppleMobileDeviceHelper.app, AppleMobileSync.app, reenumerate, and usbmuxd. These applications, from a cursory analysis (i.e. strings ), seem to have tons of debugging info left in them.

    When I sync my iPhone, iTunes throws this into the Console:

    Created child with pid 788...
    Starting child at /System/Library/PrivateFrameworks/MobileDevice.framework/Resources/ AppleMobileDeviceHelper.app/Contents/MacOS/AppleMobileDeviceHelper, setting input fd to 27, output fd to 33 and closing all other pipes
    Created args array of size 5
    Child /System/Library/PrivateFrameworks/MobileDevice.framework/Resources/ AppleMobileDeviceHelper.app/Contents/MacOS/AppleMobileDeviceHelper starting up, argc is 4...
    arg[0] = /System/Library/PrivateFrameworks/MobileDevice.framework/Resources/ AppleMobileDeviceHelper.app/Contents/MacOS/AppleMobileDeviceHelper
    arg[1] = --pipe
    arg[2] = 27
    arg[3] = 33
    Created child to sync device with pid 789...
    Waiter has started running...
    Created unique process name from name AppleMobileSync, process name AppleMobileSync: AppleMobileSync.FD62FB24-08FA-4FD6-B7FC-6566D9F5229D

    So in order to mess with the iPhone, iTunes calls "AppleMobileDeviceHelper --pipe [input pipe] [output pipe]", which I assume to just be plain old unix file descriptors. Someone should sniff the data running over those pipes to get started.
    Last edited by Nightwatch; 06-30-2007 at 08:48 AM. Reason: code makes the page a million miles wide



  2. #2
    sam
    sam is offline
    Chief of Administration
    iPhone Dev Team
    Array sam's Avatar

    Join Date
    Jun 2007
    Posts
    1,852
    Post Thanks / Like
    Downloads
    35
    Uploads
    277
    Rep Power
    10

    Default

    Thnaks, I will review the helper App later on to see what it does and how

  3. #3
    Guest Array

    Join Date
    Jun 2007
    Posts
    4
    Post Thanks / Like
    Downloads
    0
    Uploads
    0
    Rep Power
    0

    Default

    I'm more of a windows guy, so I'm assuming instead of programs these calls are actually DLL calls. I'm looking now for that dll.

 

 

Similar Threads

  1. MacRumors: Apple Sells Out of Initial iPhone 4 Shipment
    By hackint0sh in forum Latest Headlines
    Replies: 0
    Last Post: 06-16-2010, 05:50 AM
  2. MacNN: CAZE launches Initial crystal case for iPhone 3G, 3GS
    By hackint0sh in forum Latest Headlines
    Replies: 0
    Last Post: 12-29-2009, 07:20 PM
  3. Replies: 0
    Last Post: 06-13-2009, 07:40 PM
  4. MacNN: iPhone 2.1 initial impressions
    By hackint0sh in forum Latest Headlines
    Replies: 0
    Last Post: 09-12-2008, 10:10 PM
  5. Replies: 0
    Last Post: 07-23-2008, 06:50 PM

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Powered by vBulletin®
Copyright © 2014 vBulletin Solutions, Inc. All rights reserved.
Search Engine Friendly URLs by vBSEO
(c) 2006-2012 Hackint0sh.org
All times are GMT +2. The time now is 08:27 PM.
twitter, follow us!