From b99c9f63097e7337250b7fd50492430a05634ae5 Mon Sep 17 00:00:00 2001 From: spv420 Date: Tue, 31 May 2022 20:02:20 -0400 Subject: lol --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'README.md') diff --git a/README.md b/README.md index e30ce51..68a798f 100644 --- a/README.md +++ b/README.md @@ -7,6 +7,6 @@ current offsets are included for `iPhone4,1` on `9.3.6 (13G37)`. it may work on clarification: the actual racoon exploit should work on any device/firmware with the same ipsec-tools version (and maybe build :P), but the JSC call portion is currently specific to one dyld_shared_cache, which is usually device & build unique. the underlying bug should work on any firmware before ~ iOS 12. my exploit is 32-bit only prolly, at least practically, due to less ASLR slides. the exploit to get arbitrary mem write should work on < iOS 12 as well (i think), but the ROP chain's gadget addresses are currently hardcoded to one build. -current need is just to get a better call primitive, from what i can tell the phoenix bugs can't be exploited with only 4 args to functions. not sure how to get that better primitive working tho, so we'll see. :P +~~current need is just to get a better call primitive, from what i can tell the phoenix bugs can't be exploited with only 4 args to functions. not sure how to get that better primitive working tho, so we'll see. :P~~ nevermind lol, 26 (and maybe more) should be enough, kek greetz to @tihmstar for help with 935csbypass \ No newline at end of file -- cgit v1.2.3