Results 1 to 3 of 3
Discuss Looking for clarification on PWNAGETOOL documentation and implementation. at the PwnageTool - Hackint0sh.org; Hi All, There are way to many threads covering way too much of the HOW ...
  1. #1
    Newbie Array

    Join Date
    Jun 2010
    Posts
    2
    Post Thanks / Like
    Downloads
    0
    Uploads
    0
    Rep Power
    0

    Default Looking for clarification on PWNAGETOOL documentation and implementation.

    Hi All,

    There are way to many threads covering way too much of the HOW without explicitly going back and explaining WHY things are/aren't can/cannot be. Would someone please clarify the language used in the PWNAGETOOL documentation regarding the need to have PWNed it before? What if one has never jailbroken their phone ever? What if one originally used BlackRa1n but now wants iOS4 jailbroken? What prevents the DEVTEAM from creating a "ground up" breaker for all new versions? Thanks in advance.

    Best.



  2. #2
    Super Moderator Array Olethros's Avatar

    Join Date
    Sep 2007
    Location
    Norway
    Posts
    8,360
    Post Thanks / Like
    Downloads
    0
    Uploads
    0
    Rep Power
    439

    Default

    Quote Originally Posted by simplecoder View Post
    What prevents the DEVTEAM from creating a "ground up" breaker for all new versions?
    Strategy with Apple. the iPhone Dev Team, geohot and chronic dev team all have new unreleased exploits that can jailbreak all currently released devices (including we hope the iPhone 4).

    Some of these exploits can be fixed via software updates (this is how blackra1n and purplera1n were blocked for example)

    Some require new hardware to block the exploits (new bootrom 3GS is the perfect example of this)

    Apple has a predictable timing for releasing new hardware: June/July new iPhone, September new iPod touch (iPad is too new to predict - my guess is it will eventually slot into a September release schedule). Smart buyers use this schedule to plan their upgrades.

    By holding onto exploits until just after Apple has released new OS or hardware - the exploit will be available for longer before Apple can block it.

    With the 3GS (and later devices), Apple has got much more aggressive about preventing downgrades of the OS. This has previously been also a way that exploits can last for longer. Downgrade to an OS version where the exploit still works, pwn the device and then use custom IPSW to upgrade again - keeping the pwn intact.

    This is why TinyUmbrella and Saurik's SHSH cache are so important for 3GS and 3rd gen iPod touch owners.

    Quote Originally Posted by simplecoder View Post
    What if one has never jailbroken their phone ever? What if one originally used BlackRa1n but now wants iOS4 jailbroken?
    if you fit one of the scenarios below - you should be okay:

    3GS - (old bootrom only)
    can restore to original 3.1.2 (via cached SHSH)
    or
    currently running custom IPSW (any OS version)
    or
    currently jailbroken using redsn0w or blackra1n on OS 3.1.2 or lower
    or
    never jailbroken and currently running OS 3.1.2 or lower

    Quote Originally Posted by simplecoder View Post
    There are way to many threads covering way too much of the HOW without explicitly going back and explaining WHY things are/aren't can/cannot be. Would someone please clarify the language used in the PWNAGETOOL documentation regarding the need to have PWNed it before?
    If you really want to understand more - go read Main Page - The iPhone Wiki everything is explained in technical detail there.

    Pwning the device refers to modifying the firmware on the iPhone to bypass the security checks that normally prevent loading of non apple signed code. Depending on the model iPhone, different techniques (exploits) are required to pwn the device. Once pwned, the device will accept non apple signed code until you restore an official unmodified Apple OS, this will also restore the built in security checks for signed code and updates.

    The need to have pwned the device before (which is really only important on an old bootrom 3GS) is that the devteam don't want to reveal any new exploits just yet and Apple has closed all public exploits in OS 3.1.3 and blocked downgrades to OS 3.1.2. These two factors mean that you need to either be already pwned or you need to still be on OS 3.1.2 or lower.
    Please read the stickies & search forum before posting!
    How to report an iTunes restore/update fail in a useful manner
    -

    iPad 3G 64GB (4.3.3, Redsn0w) oldest SHSH 3.2.2
    iPhone 4 32GB (4.2.1, Redsn0w JB-monte) oldest SHSH 4.1
    iPhone 3GS 32GB (4.3.3; Pwnagetool) factory unlocked oldest SHSH 3.1
    iPhone 8GB (3.1.3; Pwnagetool) AT&T Locked - Unlocked with bootneuter

    -
    Did we solve your problem? Got a dollar or two spare ? Donate!

  3. #3
    Newbie Array

    Join Date
    Jun 2010
    Posts
    2
    Post Thanks / Like
    Downloads
    0
    Uploads
    0
    Rep Power
    0

    Default

    Thank you for that post. If you wouldn't mind, could you tell me what SHSH actually stands for? I hate knowing what something is without knowing *WHAT* something is. Also, if you still have an old bootrom, why does it matter what tool you have previously hacked with?

 

 

Similar Threads

  1. documentation for netstat from network-cmds
    By shlomicthailand in forum Tools
    Replies: 0
    Last Post: 02-16-2011, 11:13 PM
  2. Replies: 0
    Last Post: 01-10-2011, 08:40 PM
  3. Replies: 0
    Last Post: 11-12-2010, 03:40 PM
  4. Replies: 0
    Last Post: 04-13-2010, 10:30 PM
  5. MacNN: Boxee releases API and documentation for developers
    By hackint0sh in forum Latest Headlines
    Replies: 0
    Last Post: 04-08-2009, 03:30 AM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Powered by vBulletin®
Copyright © 2014 vBulletin Solutions, Inc. All rights reserved.
Search Engine Friendly URLs by vBSEO
(c) 2006-2012 Hackint0sh.org
All times are GMT +2. The time now is 08:31 PM.
twitter, follow us!