Update on iOS 4.1 GreenPois0n Jailbreak
The hackers
from Chronic Dev-Team have posted a rather miniscule update on their official blog on the GreenPois0n tool. GreenPois0n is the tool that was initially going to jailbreak iOS 3.1.3 (iPhone) and iOS 3.2 (iPad) and is now expected to jailbreak iOS 4.1 soon.
Chronic Dev-Team posted:
= Citat =:
Many people in the comments are asking for a progress update. Any kind of update that we could actually give would be too technical for anyone to understand anyway, not to mention potentially reveal the exploit. Just know that things are going swimmingly and we are working as hard as we can.
The update can’t really be called an “update” per-se. People (for example: our fans on FB) keep posting/emailing/tweeting asking for news on the jailbreak. It’s a simple post where they are simply telling everyone anxiously waiting for iOS 4.1 jailbreak to calm the heck down.
Well there’s your answer: the jailbreak will come when it is complete. Chronic Dev Team isn’t giving proper progress details so that the exploit doesn’t get revealed (and then subsequently get patched by Apple). And besides, even if they post any progress updates for now, they will be far too technical for the average Joe to understand.
So yea be patient, and you’ll get your iOS 4.1 Jailbreak soon enough.
--------------------------------------
Al ga i ovaj Dev-Team zna bas zasrat...
iPod touch 2G (MC Model) is Now Pwned for life!
Ex-Chronic Dev Team member pod2g has just discovered another exploit (his fourth) that will pwn iPod touch 2G for life! It’s called the usb_control_msg(0xA1, 1) Exploit. The exploit is different from the SHAtter exploit which is expected to jailbreak iOS 4.1 on the newer iPhone 4 / iPod touch 4G and iPad. It is a buffer overflow that is triggered when a USB control message of the type 0xA1.. oh screw it, if you’re the techy type, you can just read the quote below to see how it works.
All I know is: it will pwn iPod touch 2G (MC Model) for here on till eternity, just like iPhone 3G and iPod touch 2G (Non-MC Model).
From The iPhone Wiki:
= Citat =:
A heap overflow exists in the iPod touch 2G (both old and new) bootrom’s DFU Mode when sending a USB control message of request type 0xA1, request 0×1.
On newer devices, the same USB message triggers a double free() when the image upload
is marked as finished, also rebooting the device (but that’s not exploitable because the double free() happens in a row). posixninja analyzed and explained this one.
Oh and the good news is that upcoming Sn0wbreeze 2.0 will be using this exploit to jailbreak iPod touch 2G (MC Models) for life!
= Citat =:
Looks like sb2 will have otb support for ipt2g MC models too! :) thx @pod2g
@jonnyboywashere this exploit is only in the ipt2g, thats why pod2g published it on the wiki.
GreenPois0n iOS 4.1 Jailbreak Release Seems Closer than Ever Before!
With the low-level SHAtter exploit scheduled to pwn all iOS devices for life soon, it wouldn’t be wrong to say that the iOS 4.1 jailbreak will go down in history as one of the most anticipated jailbreak tool releases ever. And it is now “seems” only a matter of days, not weeks, till GreenPois0n tool is released.
Days? How can we say that?
Well, today when @asendari asked SHAtter discoverer pod2g about how soon we should expect GreenPois0n, pod2g replied with a tweet that left us very excited:
= Citat =:
@asendari I would say days.
Yes. Only a few days to go before we all get to jailbreak iPhone 4 / iPod touch 4G (and all previous iOS devices ever released).
However, hacker ClaytonBraasch then tweeted the following in reply to pod2g’s tweet:
= Citat =:
Just because @pod2g said he thinks the release is more likely to be in days than weeks does NOT guarantee it will be. Still, be optimistic.
Chronic Dev Team hacker p0sixninja posted a link to an all-new entry on The iPhone Wiki titled “SHAtter”. The article, without revealing too much, details how the SHAtter exploit works (with loads of technical jargon like fuzzer, AES engine, heap overflow, memory dumps and the like), who discovered it and who is actively working on it.
From The iPhone Wiki:
= Citat =:
This is an unsigned code execution vulnerability that resides in DFU mode of the S5L8930 bootrom.
Uses of this exploit have already involved uploading a pwned iBSS/iBEC to provide access to the AES engine and to run custom ramdisks.
FaceTime Video Pozivi sa iPhona na Android preko 3G-ja