A method to Jailbreak the new 3.1.3 iPhone rom is here and it does away with tethering. Tethering is the problem that arose from the blackra1n exploit requiring a computer to reboot the iPhone. Although we saw a hardware workaround for that, it’s much nicer to do away with the issue completely. The new exploit is called Spirit and we found the site was getting hammered earlier so you should check out the writeup over at Redmond Pie if you can’t get through with the link at the top.
[Thanks Xb0xGuru via iPhone Hacks]
This device can jailbreak an iPhone. It doesn’t require a computer and it can either reboot a phone that was one-time-boot jailbroken using the blackra1n exploit, or jailbreak a factory fresh unit. We wouldn’t say this solves the tethering problem caused by blackra1n (needing to return to a computer to reboot the phone), but it certainly does ease the pain. We saw some info about the board layout but no parts list or firmware. See the demo after the break and leave a comment if you have more information on the parts or code.
Continue reading “Hardware jailbreak eases reboot pains”
[ZodTTD] has released a Nintendo 64 emulator for iPhone. It is available (for a price) at the Cydia store and can be installed on jailbroken iPhones. The video shows Wii Remote support as a control interface that uses both buttons and the accelerometer, an addition since we last looked at his work. There is no word about nunchuck functionality, a must if you’re going to try to 100% Mario64.
Here’s further proof that you should understand what it is you’re doing when you go to hack your handheld. Jailbreaking an iPhone has been made quite easy to the point that a lot of folks do it without reading any of the accompanying documentation. Those who didn’t heed the warning to change the default SSH password on a Jailbroken phone might get a bit of a surprise. A worm has been unleashed that finds Jailbroken iPhones and changes the background image to a picture of [Rick Astley]. That’s right, they’ve been Rickrolled.
It’s a clever little devil that propagates by grabbing the IP address of the iPhone it is currently on, then testing all of the IP address in that family to find other devices using the default password. Luckily this worm’s activities are not what we’d call malicious. It doesn’t format the root or create a cell based bot-net (that we know of). This would be akin to the antics of searching Google for unprotected installations of MythWeb and setting some poor schmuck’s MythTV to record every infomercial ever. The point is, this could have been a lot worse, but the attack is predicated on stupidity. In our digital age, why are people leaving default passwords in place?
The iPhone dev-team has released an updated version of PwnageTool. It supports jailbreaking iPhones using the 3.0 firmware. This update does not include the much easier to use QuickPwn, but it should be coming soon. The release also doesn’t include the UltraSn0w unlock which will be coming via Cydia.
The iPod Touch 2G jailbreak was first shown in January. It had to be applied every time the iPod was booted. The iphone-dev team just released the 24kpwn LLB patch to allow for a persistent jailbreak. The team had been hanging on to this patch because there was the possibility the exploit could be used on future iPhone versions. Unfortunately, a group started selling the code, so the team was forced to release it for free. iPod owners are certainly happy though. There is a tutorial available for updating a factory reset iPod (backup link). The team will include the patch in future official tools.
UPDATE: [cptfalcon] pointed out a post that covers the technical details of the exploit.
Now that the iphone-dev team has unlocked the iPhone 3G they’re moving onto jailbreaking the iPod Touch 2G. While they have a fully working jailbreak, it’s not yet in a user friendly format. [MuscleNerd] did a live video demo this afternoon to show what progress they had made. It starts with him showing the iPod on but not booting. He’s already patched the kernel, but it’s failing the signature check in iboot. He then uses the team’s recoverytool to exploit a hole in iboot and patch out the signature check. The ipod then boots normally and he shows non-App Store software like Mobile Terminal, Cydia, and an NES Emulator (which makes use of the iPod’s internal speaker).
The redsn0w jailbreak works, but it has to be applied via tether every time the iPod boots. The team won’t release anything until they’ve found a way around this problem. For more insight into the boot process, check out our coverage of their Hacking the iPhone talk at 25C3.