TaiG 2.1.3 para el Jailbreak iOS 8.3
Hace un par de dias TaiG ha puesto a disposición de todos los que quieren JailBreak, la versión 2.1.3 de su herremienta para hacer JailBreak a iOS 8.3. Con esta nueva versión han corregido problemas, el principal es el problema que muchos tenian bastabtes usuarios, que se quedaba atascado el proceso de instalar el jailbreak en el 20% o el 60% dependiendo la versión de iTunes que estuviera instalada en vuestro ordenador.
Esta nueva versión ademas es compatible con la actualización de Cydia substrate, así que ya tendrás menos problemas a la hora de instalar Tweaks en tu dispositivo y tendrás un Jailbreak mucho más estable, cosa que se agradece.
Haciendo un pequeño resumen estas serian todas las mejoras introducidas en esta actualización:
– Soluciona los errores de atasque en el 20% o 60% del proceso de instalación del Jailbreak en las versiones más modernas de iTunes.
– Compatible con la actualización de Cydia Substrate
– Corrige el problema del menú en blanco si emparejabas un Apple Watch con el iPhone
– Solucionas los problemas con la caché
Descargar TaiG 2.1.3 AQUÍ
It has been a few weeks since the Chinese team Pangu surprised us with an iOS 7.1.1 untethered jailbreak, and the dust is finally starting to settle. After learning that the jailbreak is safe to use, I am updating the list of a secure to use tweaks and apps on IOS
iOS 7.1 – 7.1.1 compatible jailbreak tweaks
2×2 Folder Icons
3G Unrestrictor 5 (iOS 7 & 6)
Ah! Ah! Ah!
Animate fix for iOS 7.x.x
Apex 2 (iOS 7)
Apple File Conduit “2″
Australian BOM Siri Weather
AutoTouch for iOS 7
BTC Mouse & Trackpad
Call on GV Pro
A few days ago, Stefan Esser, better known in jailbreak circles as i0n1c, revealed that he’d successfully performed an iOS 7.1.1 untethered jailbreak on his very yellow iPhone 5c. Following this exciting inroad, he then went on to explain how the single kernel exploit was achieved, and now, finally, he’s shown off a demo clip of his device booting up and running Cydia on iOS 7.1.1.
i0n1c’s revelation over the weekend served as the latest in a line of encouraging post-iOS 7.1 jailbreak progress. Winocm, who will be joining Apple later on this year in a move that will probably see the hacker retire from the Cydia community for good, demonstrated that a jailbreak on an iPhone 4 was possible.
But i0n1c certainly raised the bar by showcasing an iPhone 5c jailbreak, especially given that newer processors are almost always more difficult to hack, and did so by effectively re-implementing a single kernel exploit found inside many iOS apps.
Given that i0n1c is a veteran of the scene and one of the most talented security experts around, we never doubted the legitimacy of his claims, but to dispel any misconceptions or ambiguity, the hacker has thrown out a video of the jailbreak in action. He’s calling it Cyberelevat0r. Embedded at the bottom of this post, you see the iPhone 5c run through the Settings to reveal the version number, fire up Cydia, and then finally reboot, to prove its untethered nature.
Avid fans of iOS jailbreaking have been eagerly anticipating the release of iOS 7.1/7.1.1 jailbreak, as the advent of iOS 7.1 update killed all existing exploits used in evasi0n7 jailbreak and thereby rendering it useless.
Those who have already updated their devices to iOS 7.1 can no longer enjoy the privilege of installing jailbreak tweaks and apps, as they lose jailbreak status soon after installing this update.
Furthermore, Apple has stopped signing firmware older than iOS 7.0 as it intends to withdraw all technical support for jailbroken iOS devices. As a result, you will no longer be able to downgrade your device from iOS 7.1 to iOS 7 or earlier iOS 6 firmware builds.
If there’s one thing that we have learned over the last few years, it’s that, rightly or wrongly, the jailbreak community expects a lot. The majority of the complexities involved in researching vulnerabilities, exploiting those bugs and then tying it all nicely together into a jailbreak package capable of mass distribution are abstracted away from the end-user. This is undoubtedly how it should be, but the trade-off is that users become impatient and irritable due to a lack of understanding of the process and how much work is actually involved in effectively producing a jailbreak from scratch once Apple have slammed the security door in our faces.
First and foremost we expect to see a first glimpse of iOS 8 at this year’s Worldwide Developer Conference (WWDC) in June. We also expect to see a first developer seed going live to registered developers during the course of WWDC week. A public version of iOS 8 will likely ship with the iPhone 6 sometime in September or October. That’s approximately six or seven months in the future, so we of course expect to see an untethered 7.1 solution made available before then – all going well. However, if the first seed of iOS 8 is found to have exploitable vulnerabilities in then the Evad3rs could potentially make the call to hold off on iOS 7 and focus attention on liberating iOS 8 with the hope that any vulnerabilities are not patched as part of the process of going from beta to public.
iOS 7.1 Jailbreak with Evasi0n?
If the Evad3rs team are involved in the research or production of an iOS 7.1 untether, which we expect them to be, then it’s highly likely that we will see an updated version of Evasi0n7 shipping. The distributed tools and software that makes jailbreaking possible on a mass scale has improved exponentially over the years. What used to be a laborious and overly technical process has now been condensed into a single one click solution (where possible).
New UnTethered iOS 7.1.1 Jailbreak Scams Propagate, How to Spot Them – Ensuing Apple’s somewhat recent release of the UnTethered evasion jailbreak-patching 7.1 firmware, and especially the company’s infinitely more recent 7.1.1 update, a countless number of jailbreakers have become stuck. Frantically scouring for an UnTethered 7.1.1 jailbreak solution, a sizable portion of these jailbreakers have regrettably fallen victim of despicable jailbreak scams that now clutter the web. Today, a new set of fraudulent sites claiming to jailbreak 7.1.1 Untethered on devices like the iPhone 5s, iPad mini, Air, and even the iPhone 4s caught the attention of Jailbreak Evasion Info’s staff members.
UnTethered Jailbreak 7.1.1 Scams Propagate
First, before delving into the dangers shrouding falsified jailbreak utilities, it’s important to realize that the tool capable of Jailbreaking iOS 7.1.1 exclusively supports the iPhone 4 (due to the 4 year old exploit it implements)
Users on a jailbreak subreddit have discovered a new kind of malicious software on iOS phones. The malware, which comes as a library called unfold.dylib, was uncovered after a Reddit user complained of crashes in Google Hangout and Snapchat.
The threat, which has been nicknamed “unflod baby panda,” is rumored to be of Chinese origin. There are several factors that support this theory. According to German mobile security firm SektionEins, the infection is digitally signed with an iPhone developer certificate under the name Wang Xin. Also, the malware, which steals the Apple ID and password of users, sends the information in plain text to 22.214.171.124, which appears to be a Chinese website from the error message it displays. However, these could all be fake. SektionEins even raised the possibility of certificate theft. So for now, no one knows where the malware came from and how it got into iOS devices.
Core utilities Darwin tools
iPhone Firmware Libnet
APT Berkeley DB
Debian packager diskdev-cmds Gawk
Link identity editor
Bourne again shell
Cydia installer Dev-Team dns2tcp gettext
GNU privacy guard
iBrowser libffi libutil Lynx
Darwin CC Tools developer-cmds Docs
GNU C Compiler GNU PG errors
inetutils libgcc libxml2 Make
Although we cannot get more robust applications loaded onto the iPod touch, such as Core IMPACT or HP WebInspect, there are still some good applications available. For example Nikto open-source (GPL) Web server scanner version information; Nikto is a Perl application available for download at http://cirt .net/nikto2.
Ranked #12 of the top 100 network security tools by Insecure.org, Nikto will scan a server for configuration files, cgi applications, outdated version information, and a multitude of other bits of data that can be useful in a penetration test. Although most of the work done by Nikto focuses on information gathering, it does a pretty good job of identifying potential vulnerabilities when found.
Unfortunately, the iPod touch’s wireless chip cannot be placed into promiscuous or monitor mode, meaning we cannot obtain wireless data necessary to conduct brute force attacks against wireless access points using encryption. There are other mobile devices that can be set for promiscuous or monitor mode, so if a brute force attack is an absolute necessity, there are options available. However, there is an application that can intercept traffic on a wireless network called “Pirni,” written by Axel Moller also available through Cydia.
The program is configured to intercept all traffic intended for the default router (192.168.1.1 in this particular network) through ARP spoofing. Based on the Berkley Packet Filter (BPF) values, the only traffic that will be collected is TCP segments leaving the network, destined for port 80. The BPF can be modified to capture whatever type of traffic we are after. The Regex Options are used to immediately capture interesting packets, such as usernames and passwords.