archive-org.com » ORG » P » POD2G.ORG

Total: 61

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • pod2g's iOS blog: February 2012
    a working gdb running on your iOS device use the one from the Apple SDK Prerequisites a jailbroken iOS 4 3 device OpenSSH should be installed on the iOS device and should listen for connections an OSX machine with the iOS SDK 4 3 installed How to remove the gdb package from Cydia do the following in the OSX terminal cd tmp cp Developer Platforms iPhoneOS platform Developer usr libexec gdb gdb arm apple darwin lipo thin armv7 gdb arm apple darwin output gdb nano entitlements xml paste the following to the OSX terminal DOCTYPE plist PUBLIC Apple DTD PLIST 1 0 EN http www apple com DTDs PropertyList 1 0 dtd plist version 1 0 dict key com apple springboard debugapplications key true key get task allow key true key task for pid allow key true dict plist save the file by doing CTRL X then Y then ENTER now do the following in the OSX terminal ldid Sentitlements xml gdb scp gdb root iOS Device IP Address usr bin GDB is now installed to your iOS device Happy debugging pod2g Publié par pod2g à l adresse 12 04 AM Email This BlogThis Share to Twitter Share to Facebook

    Original URL path: http://www.pod2g.org/2012_02_01_archive.html (2016-02-17)
    Open archived version from archive


  • pod2g's iOS blog: January 2012
    patches into the Corona GIT Expect a Corona update soon in Cydia that ll fix iBooks and other softwares having sandbox issues I ll update the blog when this is released Publié par pod2g à l adresse 7 46 PM Email This BlogThis Share to Twitter Share to Facebook Share to Pinterest Sandox broken Here are some news about the current work on the A5 research planetbeing escaped from the sandbox with the help of saurik Thanks to their awesome work there should be nothing left blocking for the A5 jailbreak Now it should be a matter of days Still no precise ETA of course We all want this to be finished ASAP we re getting tired Publié par pod2g à l adresse 10 06 AM Email This BlogThis Share to Twitter Share to Facebook Share to Pinterest Friday January 6 2012 Sandbox difficulties planetbeing the legendary hacker behind iPhone Linux and lot of jailbreaks see the iPhone wiki has joined the A5 research The famous MuscleNerd the iPhone wiki the leader of the iPhone Dev Team who did a lot of tests for Corona and whom integrated it and made it simple in redsn0w is willing to help also And last but not least p0sixninja the iPhone wiki the leader of the Chronic Dev Team and my partner for years on iPhone security research has started to code and fuzz the Apple sandbox We now have a dream team to find a path for a public release of the A5 jailbreak Cross your fingers Publié par pod2g à l adresse 12 29 PM Email This BlogThis Share to Twitter Share to Facebook Share to Pinterest Thursday January 5 2012 A5 FAQ How could pod2g have an untethered 4S and dev teams still haven t released tools to achieve this at home The exploit I used to inject the untethering files to the 4S relies on having a developer account and can t be released publicly It s the same reason why MuscleNerd has an iPad 2 tethered jailbreak but couldn t distribute it So we need to find a distributable exploit to remount the system partition read write and to set Corona files at the correct places Why A4 version of Corona was easier to release Because a tethered jailbreak is a good way to install Corona Why don t you do a tethered jailbreak then A tethered jailbreak also relies on an exploitable vulnerability that we still haven t found yet pod2g release this stuff quick your insult here I ve waited enough now If I could I would Publié par pod2g à l adresse 10 00 AM Email This BlogThis Share to Twitter Share to Facebook Share to Pinterest Monday January 2 2012 Details on Corona Now that Corona was released by the iPhone Dev Team and the Chronic Dev Team I can give details about how it works 1 the user land exploit Apple has fixed all previous known ways of executing unsigned binaries in iOS

    Original URL path: http://www.pod2g.org/2012_01_01_archive.html (2016-02-17)
    Open archived version from archive

  • pod2g's iOS blog: December 2011
    saurik today about the launchd boot process and he s found one missing piece of the puzzle I needed to have a perfectly stable jailbreak He s definitly one of the best iOS gurus out there Thank you saurik Publié par pod2g à l adresse 2 02 AM Email This BlogThis Share to Twitter Share to Facebook Share to Pinterest Monday December 19 2011 News Hello Here are the news of the 4S week end The untether fails right now because I m having processor cache issues I m close but I can t figure out what happens It certainly has something to do with the Cortex A9 cache management I could sort it out quick it s a matter of chance I ll report you my progress tomorrow BTW I removed sorry the greetings messages so that only articles related to the jailbreak remain in the main page AFAIK Blogger don t have the option to move or fusion messages while keeping the comments Ciao Publié par pod2g à l adresse 2 17 PM Email This BlogThis Share to Twitter Share to Facebook Share to Pinterest Friday December 16 2011 4S 5 0 1 Build 9A406 fail MuscleNerd tweeted something really interesting today The latest ipsw released by Apple for the 4S contains an unencrypted ramdisk with the vfdecrypt key in plain text Everybody can decrypt the filesystem with it Is it a Christmas gift from Apple Weird isn t it Publié par pod2g à l adresse 12 11 AM Email This BlogThis Share to Twitter Share to Facebook Share to Pinterest Thursday December 15 2011 Tested IPhone 3Gs 5 0 1 jb worked Remaining to test iPod 4G iPhone 4 CDMA running 5 0 1 Publié par pod2g à l adresse 2 06 PM Email This BlogThis Share to Twitter Share to Facebook Share to Pinterest Progress Hello my friends I know that I ve been silent yesterday and that it was annoying Sorry for this but I had to organize things for the release Also I ve tested iPad 1 and it worked Today I hope I can test a 3Gs BTW please don t propose to be a beta tester because I m too paranoid fearing leaks Now the time to finalize the jailbreak for old devices fix some stability issues and package the whole That will take some days In the meanwhile I m starting the research for iPad 2 and 4S I ll take you informed of my progress Finally I want to thank all who donated I now can buy both devices I don t know what to say Thank you very much my friends Have a good day See ya Publié par pod2g à l adresse 8 54 AM Email This BlogThis Share to Twitter Share to Facebook Share to Pinterest Wednesday December 14 2011 Apple TV 2 4 4 3 untethered Done also Rush mode off for today Will be able to test in some days thanks to firecore that d

    Original URL path: http://www.pod2g.org/2011_12_01_archive.html (2016-02-17)
    Open archived version from archive

  • pod2g's iOS blog: 2G Lab
    creation of my company 2G Lab focusing on 2 different areas development and security research Now that our first application named podDJ is out to the AppStore we will focus on both subjects If you have a project that you would like 2G Lab to work on contact us contact at 2g lab dot com Best wishes to you all Cyril pod2g Publié par pod2g à l adresse 12 24

    Original URL path: http://www.pod2g.org/2013/01/2g-lab.html (2016-02-17)
    Open archived version from archive

  • pod2g's iOS blog: WWJC 2012 slides
    Heinelt ih8sn0w NitoTV Ryan Petrich Jay Freeman Dustin Howett pimskeks I met some of my fans also Thanks to them for their support I am looking forward for the next WWJC event that should happen next year in New York Here are the slides of my talk Jailbreak Techniques WWJC 2012 Next con on my agenda HITB 2012 in Malaysia from the 10th to the 11th of october Publié par

    Original URL path: http://www.pod2g.org/2012/09/wwjc-2012-slides.html (2016-02-17)
    Open archived version from archive

  • pod2g's iOS blog: sendrawpdu: send raw SMS PDU data to the iPhone 4 baseband
    comments around saying that SMS spoofing is not new that one can modify the origin address of a SMS in the protocol and such Now tell me how can you do this without paying a dedicated service which is in fact a gateway talking to the carrier at a lower layer than the PDU data In a SMS SUBMIT message you can t change the origin address Publié par pod2g

    Original URL path: http://www.pod2g.org/2012/08/sendrawpdu-send-raw-sms-pdu-data-to.html (2016-02-17)
    Open archived version from archive

  • pod2g's iOS blog: Never trust SMS: iOS text spoofing
    to PDU Protocol Description Unit by the mobile and passed to the baseband for delivery PDU is a protocol that is pretty dense allowing different types of messages to be emitted Some examples SMS Flash SMS Voice mail alerts EMS The specification is large and pretty complex As an example just to code the data there are multiple possible choices 7bit 8bit UCS2 16bit compressed or not If you either own a smartphone or a modem and an account in a SMS gateway you can send texts in raw PDU format some services also exist to send a text with an HTTP request in raw PDU format For the easiest smartphone option there are different tools available online I made one for the iPhone 4 that I will publicize soon In the text payload a section called UDH User Data Header is optional but defines lot of advanced features not all mobiles are compatible with One of these options enables the user to change the reply address of the text If the destination mobile is compatible with it and if the receiver tries to answer to the text he will not respond to the original number but to the specified one Most carriers don t check this part of the message which means one can write whatever he wants in this section a special number like 911 or the number of somebody else In a good implementation of this feature the receiver would see the original phone number and the reply to one On iPhone when you see the message it seems to come from the reply to number and you loose track of the origin Why is it an issue pirates could send a message that seems to come from the bank of the receiver asking for some private

    Original URL path: http://www.pod2g.org/2012/08/never-trust-sms-ios-text-spoofing.html (2016-02-17)
    Open archived version from archive

  • pod2g's iOS blog: Pwnie Awards 2012
    Catalog File Integer Underflow CVE 2012 0642 Credit pod2g This exploit was used for the Absinthe iOS 5 0 5 0 1 untether It massaged the kernel heap into submission copying over the syscall table and giving pod2g as well as jailbreak users everywhere a happy ending And who doesn t love happy endings I can t wait for the results It will happen the 25th of july at the

    Original URL path: http://www.pod2g.org/2012/07/pwnie-awards-2012.html (2016-02-17)
    Open archived version from archive



  •