iBoot and tethered jailbreak
Many users no longer present their devices without jailbreaking, and owners of locked devices can’t do without it, because Unlinking from the operator is carried out only by hacking the device. To do this, you need to modify the kernel of the system - this is the very essence of the jailbreak. The process of modifying the kernel is possible only when the iPhone operating system is not loaded, namely when it is in DFU mode. However, even in this mode, the bootloader (bootloader) checks the digital signatures of the launched modules. But, an error was found in the program code of the loader, which allowed to load into the device and execute arbitrary code to bypass the signature verification by the loader. The 24kpwn exploit contains code that can make a kernel modification and disable signature verification, as was the case with the iPhone 2G, 3G and iPod Touch models.
In the newer models of iPhone 3GS and iPod Touch 2G / 3G, Apple decided to add protection and introduced another check, now the bootloader checks the digital signature of the kernel itself, and if it turns out to be modified, the device simply does not load. Moreover, the code signature verification system has become more complicated, now Apple itself can control this process, since verification of the signature is carried out by the company's server via the Internet. Thus, Apple can easily control and prevent the installation of old or modified firmware, which actually does.
On firmware 3.0 and 3.1, this problem was successfully solved, since the firmware itself contains a signed iBoot module with a vulnerability that allows you to execute hacker code for modifying the kernel in DFU mode. Another vulnerability was found in the ROM bootloader itself, which allowed to load the already modified kernel. Thus, even releasing the next version of the firmware, where the iBoot module vulnerability is sure to be closed, we can launch the phone thanks to the cached signature verification response codes made earlier on firmware 3.0 and 3.1. It is thanks to these signatures that we can hack the system, and thanks to the vulnerability in ROM, no matter what new firmware is released, successfully download it.
Naturally with the bootloader, on devices already released, Apple will not be able to do anything, they will always run. However, this did not end there, starting from week 43 of 2009, they updated the ROM bootloader version to version 359.3.2, thereby closing all previously found holes.
The problem is solved, now a full jailbreak can be done using [ iSpirit utility! ]
Now how to find out what your iBoot is. There are several ways:
- The easiest way is to find out by serial number - the 4th and 5th digits is the week number of its production. For example, if the serial number starts at 879 31 , this indicates that it was produced at week 31 of 2009 (3rd digit). So on it you can make a full jail, and if you have 43 or higher there, then alas, so far only tied.
- Using the utility f0recast . Just connect the device, run the utility:
The following information will be available to you:
- Serial # : Device Serial Number
- Baseband: Modem firmware version
- Bootloader: Bootloader Version
- Model: Device Model
- Unlockable ?: Locked or not (If Yes, then it will be prompted than to unlock)
- Tethered ?: Tethered Jail or Not (This is what we need)