66% or better

Kindle 3.1 Jailbreak

kindle_3_1_jailbreak

In the constant battle of manufacturers vs. jailbreakers, the turnaround time between a new software release and a new jailbreak seems to be getting shorter and shorter. [Yifan] noticed that a recent Kindle update broke a previous method of running unsigned code and started the search for a new workaround.

He eventually found a way to force the Kindle to run unsigned code based upon how the software update checked for digitally signed files. With that knowledge in hand, he discovered that he could trick the updater to run any file he wanted by exploiting the standard functionality found in the Unix ‘cat’ command.

On his site, [Yifan] provides more details, source code, and a compiled update file that performs the jailbreak for you. Much like the previous jailbreaks we have featured, it is perfectly legal to do, but you do risk voiding your warranty during the process.

[Picture via Amazon.com]

Nook Color gets honeycomb

[Deeper-blue] has released all the files necessary to get Android honeycomb working on your nook color. We had a chance to play with the nook color for a bit, but ours was only on Android version 2.1. It seems like they’ve come a long way with the capabilities of this simple e-reader since then.  While he’s built out the majority of the features, it is still lacking some fundamentals, like sound. As you can see in the video after the break, the scrolling is a tiny bit choppy but the applications themselves see to be fairly snappy. We can’t wait to see how this works after a little improvement.

 

[Read more...]

Permanent Root exploit found for g2

The g2 has finally been rooted. Even though a temporary root exploit was found shortly after the phones release, a NAND lock prevented modifying the non-volatile RAM for a permanent root. Some controversy surrounded the g2 when it was erroneously thought to have a rootkit protecting the OS.  Supposedly the rootkit would watch for changes to the file system and then reset the phone to default settings when any unauthorized changes were made.  On the other hand a NAND lock functions by fooling the operating system into thinking there isn’t any memory available, essentially “locking” the memory in key areas.  Once it was discovered to have the NAND lock it was only a matter of time before the g2 was permanently rooted.  NAND locks have become a popular (and unsuccessful) deterrent employed by device makers to stop the jailbreaking comunity.  While this exploit is nothing groundbreaking it is another notch in the belt for the jailbreaking community and a welcome benefit to g2 users.

PS3 Jailbreak – Now in Apple flavor!

Image courtesy of DanyL of psx-scene

The newest member of the PS3 jailbreaking tool crowd is the iPod family. More specifically, iPods running the open source media firmware Rockbox. Even better news, theoretically it should be possible to use this same method on any MP3 player running the Rockbox software. Right now the exploit package only works on select generations of the iPod Nano and iPod Classic line, but if the trend set by the PSX-scene forums continues, it would be worth checking back in the near future if your device is not already supported. Thanks to [shuffle2] for providing the hack, and [DanAdamKOF] for the heads up.

If Apple isn’t your device of choice, you can also check out some of your other jailbreaking options.

Make iPhone a penetration testing tool

[Nicholas Petty] has posted a guide to setting up your iPhone as a penetration tester. You already carry it around with you and, although not too beefy, it does have the hardware you need to get the job done. So if you’re not interested in building a drone or carrying around a boxy access point try this out. The first step is to jailbreak your device and setup OpenSSH so that you can tunnel in for the rest of the setup. From there the rest of the setup is just acquiring build tools and compiling pentesting programs like Aircrack-ng, Ettercap, Nikto2, and the Social Engineering Toolkit. You’ll be up to no good testing your wireless security in no time.

Jailbreak your Apple products

It’s finally here, after being declared completely legal to jailbreak your iPhone, JailbreakMe 2.0 is released.

Now, any and all iDevices can be jailbroken by simply visiting the URL above; however, before you start your devious adventure in the land of apps not approved by big brother Apple, there are a few issues.

The webpage is being slammed at the moment so you’ll have to wait. There is a chance the jailbreak will not work, and you could brick your phone. MMS and Facetime are having complications after jailbreaking. And finally, carrier unlock still needs to be done with ultrasn0w.

But beyond those small stepping stones, jailbreaking is just a touch away.

Extra extra: Now legal to jailbreak iPhone

For those living under a rock, the latest ‘greatest’ news to hit hacking front page is the the Copyright Office granting Six Exemptions Regarding the Circumvention of Access-Control Technologies. Of the six the one of the two regarding iPhones is as follows,

“(2) Computer programs that enable wireless telephone handsets to execute software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications, when they have been lawfully obtained, with computer programs on the telephone handset.”

Which (along with section 3) really just means that you can unlock and crack cellphones and companies can no longer fine you $2,500. Not that many ever have but the threat was there. Apple however, can and still will void your warranty if you jailbreak.

The 4 other areas not involving phones are the ability to circumvent DVDs for portions of video, video games in order to better the security of said game, computer programs that require dongles but dongles are no longer available, and literary works that prevent read-aloud or rendering to a specialized format.

One tidbit I keep hearing about in these exemptions is the ability to now break DRM on music, as much as I wish this were true, I can’t seem to find any sources on it, sorry pirates.

Regardless, now that the world is one step closer to an open framework, whats changed? For me, I’ve been jailbroken for years so sadly nothing. If you agree with the ruling, disagree, or just want to tell about your now legal jailbreaking joys, please leave a comment.

Additional Sources: FOXNews and CNNMoney thanks to [Voyagerfan99], [Ryan Knight], and [Steve S.] respectively.

[Image credit: Fr3d.org]