diff options
| author | spv420 <unomilliono@gmail.com> | 2022-05-31 19:51:28 -0400 |
|---|---|---|
| committer | spv420 <unomilliono@gmail.com> | 2022-05-31 19:51:28 -0400 |
| commit | faee2212875b92440f87be7b16e60c87d7415eae (patch) | |
| tree | 084a0612d3e546a18b202f015adf39095b34086a /README.md | |
| parent | b040db45dfc9ef9a902e48bc2718a94cd099f505 (diff) | |
I live in a constant state of fear and misery
Do you miss me anymore?
And I don't even notice
When it hurts anymore
Anymore
Anymore
Anymore
Diffstat (limited to 'README.md')
| -rw-r--r-- | README.md | 4 |
1 files changed, 3 insertions, 1 deletions
@@ -7,4 +7,6 @@ current offsets are included for `iPhone4,1` on `9.3.6 (13G37)`. it may work on clarification: the actual racoon exploit should work on any device/firmware with the same ipsec-tools version (and maybe build :P), but the JSC call portion is currently specific to one dyld_shared_cache, which is usually device & build unique. the underlying bug should work on any firmware before ~ iOS 12. my exploit is 32-bit only prolly, at least practically, due to less ASLR slides. the exploit to get arbitrary mem write should work on < iOS 12 as well (i think), but the ROP chain's gadget addresses are currently hardcoded to one build.
-current need is just to get a better call primitive, from what i can tell the phoenix bugs can't be exploited with only 4 args to functions. not sure how to get that better primitive working tho, so we'll see. :P
\ No newline at end of file +current need is just to get a better call primitive, from what i can tell the phoenix bugs can't be exploited with only 4 args to functions. not sure how to get that better primitive working tho, so we'll see. :P
+
+greetz to @tihmstar for help with 935csbypass
\ No newline at end of file |
