Tag Archives: Kernel

Después del lanzamiento de la versión en pruebas el pasado mes de julio, la versión definitiva de iOS 11 estará disponible a partir de hoy mismo. Apple no acostumbra a fijar una hora exacta, pero si sigue el patrón habitual aparecerá una notificación en los dispositivos de los usuarios a partir de las 10 de la mañana en Cupertino y sobre las 19 horas en España.
¿Qué novedades presenta iOS 11?
Son numerosas y diversas, algunas exclusivas para el iPhone X y otras disponibles también para el resto de dispositivos. De algunas ya pudimos ver una pequeña muestra la semana pasada en la presentación de los nuevos terminales, como el Face ID, los animojis o la realidad aumentada en el modelo más caro. Otras, en cambio, deberemos esperarnos hasta tener el nuevo software para disfrutar de ellas.
Más allá de los emoticonos animados y de la posibilidad de desbloquear el teléfono con el rostro, con iOS 11 también dispondremos de un nuevo centro de control más personalizado y completo, podremos grabar lo que ocurre en nuestra pantalla y editar las imágenes y los vídeos obtenidos y gestionar nuestro contenido con la aplicación Archivos.
Continue reading
Like this:
Like Loading...
Leave a comment | tags: Android, apple, crack, Espana, evasi0n, facebook, freedom, hack, hacking, idevice, Internet, IOS, IOS8, ipad, iphone, ipod, jailbreak, Kernel, marketing, media, repo, social, SSH, update, web | posted in Hacks/IOS

About two months ago, Apple released iOS 7.1 with some new features and to patch the famous Evasi0n 7 jailbreak vulnerability. Ever since of the release iOS 7.1 we haven’t seen any public release of iOS 7.1 jailbreak. But we have seen some videos of Jailbreaking an iPhone 4 on iOS 7.1. Earlier today, a famous hacker i0n1c has posted a picture of Jailbroken iPhone 5C running Cydia and iOS 7.1.1.
Before you get excited, please stay calm because it is just an image of iPhone 5C jailbroken iOS 7.1.1 (showed above) and not the public release of the iOS 7.1 jailbreak and I think that the public version of iOS 7.1 Jailbreak will not be out until the release of the next big iOS 8.
I0n1c has been out of the jailbreak since the release of the iOS 4.3, he worked for the iOS 4.1.3 but after that he has only been criticizing the jailbreak hackers specially the Evad3rs team. So, you should not expect too much from this developer. So, this photo will probably be just a teaser from the hacker. On the other hand, he may release the public jailbreak for iOS 7.1.1 but it is highly unlikely. What do you think about this photo? Let me know in the comments section below.
Like this:
Like Loading...
1 Comment | tags: 7.1.1, crack, cydia, evad3rs, evasi0n, finally jailbroken, IOS, IOS7.1.1, iphone, jailbreak, Kernel, repo, saurik, upload | posted in Hacks/IOS

adv-cmds
Base structure
Core utilities Darwin tools
Diff utilities
Find utilities
GNU cryptography
Grep
iPhone Firmware Libnet
Libxslt
mDNSResponder
APT Berkeley DB
csu
Debian packager diskdev-cmds Gawk
GNU debugger
gzip
less
libpcap
Link identity editor
Metasploit
AutomaticSSH
Bourne again shell
Cydia installer Dev-Team dns2tcp gettext
GNU privacy guard
iBrowser libffi libutil Lynx
Mobile substrate
Backgrounder bzip2
Darwin CC Tools developer-cmds Docs
GNU C Compiler GNU PG errors
inetutils libgcc libxml2 Make
nano
Continue reading
Like this:
Like Loading...
Leave a comment | tags: crack, cydia, hack, hacker, idevice, ininja, install, IOS, ipad, iphone, ipod, Kernel, mobile, package, port, update | posted in Hacks/IOS

Vulnerability Identification
There are numerous commercial tools available to a professional penetration tester who conducts vulnerability identification analysis – unfortunately, none have been ported to the iPod touch.
The Nmap application has the ability to use scripts that interpret the Nmap findings and attempt to identify vulnerability; however, the development of Nmap as a vulnerability scanning application does not have the support that other programs do, like Nessus or Core IMPACT (to name a couple).
Perhaps a better alternative is to use the iPod touch as a pivot for more robust vulnerability scanners.
I would say that the use of the iPod touch as a platform to conduct a pivot attack seems to be the best option for conducting a vulnerability identification scan than trying to use Nmap or do the identification manually.
Vulnerability Exploitation
We can use an agent deployed on the iPod touch to conduct vulnerability exploita- tion, similar to the way an agent can be used to perform vulnerability identification. Again, Core IMPACT would be a good choice for such an attack. However, there is an application framework that can perform vulnerability exploitation, which can be installed using Cydia – the Metasploit 3.0
Similar to the traditional application installed on laptops or desktops, the Metasploit application can be run from the command line from the iPhone touch where we can launch exploits against servers with greater certainty of stability and accuracy.
Continue reading
Like this:
Like Loading...
Leave a comment | tags: 22, 80, attack, cracks, cydia, exploit, hacking, hacks, idevice, IOS, ipad, iphone, jailbreak, Kernel, metasploit, port, saurik, SSH, ssl, vector, vulnerability | posted in Hacks/IOS

Mobile Devices
Mobile phones and personal data assistant (PDA) appliances used to be limited in their functionality; however, today there are wireless devices that operate using advanced operating systems and support applications that are incredibly useful for conducting clandestine activities. As an example, Apple’s iPod touch runs on the UNIX-Darwin kernel, which is open source,2 POSIX compliant, and single UNIX specification version 3 (SUSv3) compliant. Because of this, advanced hacker appli- cations can be built and installed onto the device, making the iPod touch a powerful hacking platform.
Regardless, there are some interesting trends that we can examine and use to our advantage.
The first trend is the use of open-source operating systems. As already mentioned, the iPod touch and the iPhone, both products of Apple Inc., uses the Darwin operating system. Additional proprietary applications, including graphic interface software, have been added to these portable devices; however, the core system is undeniably UNIX based.
The second trend is the increase in computing power and memory. Although the iPod touch does not have the processing capabilities of desktops or even laptops, they are quite capable of processing large amounts of data rapidly. As a benchmark test, the iPod touch (first generation) was able to process 577 MD5 hashes per second using the password cracking tool “John the Ripper.” In comparison, the MacBook Pro with a 2.8GHz Intel Core Duo processor was able to process 7674 per second. Although about one-twelfth the capability of the MacBook Pro, the iPod touch results are still impressive for what many consider as simply a fancy MP3 player.
The method of obtaining applications needed for penetration testing or covert audio and video communication will vary, depending on the mobile platform. In the case of the Droid and Palm Pre, access to the underlying operating system is avail- able by design. However, in the case of the iPod touch, access to the operating system can only be achieved by “jailbreaking” the phone, which circumvents protection mechanisms installed by Apple.
The actual method of jailbreaking varies, depending on the generation of the iPod touch and the version of the installed software (HOW TO jailbreak is explained in another post -same hack section). Once jailbroken, we can place applications on our device through different repositories – the most notable is called “Cydia.” More information on Cydia can be found at http://cydia.saurik.com/.
Continue reading
Like this:
Like Loading...
2 Comments | tags: access, crack, cracking, cydia, hacking, idevice, IOS, IOS7, ipad, iphone, john the ripper, Kernel, nmap, repo, saurik, source, SSH, ssl, target, vulnerabilities | posted in Hacks/IOS