Skip to main content

Search

Items tagged with: linux


 
#Linux #Kernel 5.2-rc1 is out: lore.kernel.org/lkml/CAHk-=wgx…
"[…] Nothing particularly odd going on this merge window. […] […] Size-wise things look fairly normal. 12k+ Commits (plus another ~750 merge commits) is about normal for us by now. […] Go forth and test, Linus […] "


 


 

Download #Jami for #Android, #iPhone, #Windows, #Mac or #Linux - it seems it may be the most #secure and #flexible #communications #software yet


Visit jami.net

Image/Photo

It seems that the #software called Jami (previously called #ring) is a #decentralised solution to making #phonecalls, sending #sms #texts, #transferring #files and making #video #calls.

As it is #decentralised your #privatekey (used for #encryption of all your #traffic) is stored once and only on your #device.

It uses #GnuTLS (SSL) to make the #public #private #key transfer and then #communicate #securely. This is the same #technololgy as used when you access your #bank account.

There are also comments on the #development site suggesting that they upgrade to #NaCl #crypto lib - this will allow for the use of #elliptic #curve #encryption as well.

Of course it's also completely #open-source #foss unlike (for example) #telegram, #whatsapp, #skype and is very flexible as to what #platform it will run on.

If it does everything it says (and in my own tests, it seems to), whilst remaining #free and #opensource, it's the best example of #secure #communication I've ever seen.

Has anyone else tried it / fancy trying it / feeding back? It may be the #FOSS #communication app that will properly upset #facebook and #microsoft.


 

Download #Jami for #Android, #iPhone, #Windows, #Mac or #Linux - it seems it may be the most #secure and #flexible #communications #software yet


Visit jami.net

Image/Photo

It seems that the #software called Jami (previously called #ring) is a #decentralised solution to making #phonecalls, sending #sms #texts, #transferring #files and making #video #calls.

As it is #decentralised your #privatekey (used for #encryption of all your #traffic) is stored once and only on your #device.

It uses #GnuTLS (SSL) to make the #public #private #key transfer and then #communicate #securely. This is the same #technololgy as used when you access your #bank account.

There are also comments on the #development site suggesting that they upgrade to #NaCl #crypto lib - this will allow for the use of #elliptic #curve #encryption as well.

Of course it's also completely #open-source #foss unlike (for example) #telegram, #whatsapp, #skype and is very flexible as to what #platform it will run on.

If it does everything it says (and in my own tests, it seems to), whilst remaining #free and #opensource, it's the best example of #secure #communication I've ever seen.

Has anyone else tried it / fancy trying it / feeding back? It may be the #FOSS #communication app that will properly upset #facebook and #microsoft.


 
Xfce 4.14 für August geplant

#linux #linuxnews #opensource #xfce #mywork


 

South Korean Government to Switch from Windows to Linux


HN Discussion: https://news.ycombinator.com/item?id=19947515
Posted by jrepinc (karma: 2541)
Post stats: Points: 189 - Comments: 62 - 2019-05-18T14:20:52Z

#HackerNews #from #government #korean #linux #south #switch #windows
HackerNewsBot debug: Calculated post rank: 146 - Loop: 60 - Rank min: 100 - Author rank: 66


 

South Korean Government to Switch from Windows to Linux


HN Discussion: https://news.ycombinator.com/item?id=19947515
Posted by jrepinc (karma: 2541)
Post stats: Points: 189 - Comments: 62 - 2019-05-18T14:20:52Z

#HackerNews #from #government #korean #linux #south #switch #windows
HackerNewsBot debug: Calculated post rank: 146 - Loop: 60 - Rank min: 100 - Author rank: 66


 

Kernel


Kernel 5.1.3 installieren...

#Linux #Kernel


 
South Korean government announces switch to #Linux, citing costs for Windows.


 
Good news for #gnu #linux just keeps coming! https://betanews.com/2019/05/18/korea-linux/ more in http://www.tuxmachines.org/node/123991
South Korea will ditch Microsoft Windows for Linux


 
Good news for #gnu #linux just keeps coming! https://betanews.com/2019/05/18/korea-linux/ more in http://www.tuxmachines.org/node/123991
South Korea will ditch Microsoft Windows for Linux


 
Debian veranstaltet MiniDebConf im Juni in Hamburg
Vom 5. bis 9. Juni 2019 findet in Hamburg zum zweiten Mal eine MiniDebConf mit Vorträgen und gemeinsamem Entwickeln im Hackspace statt.

https://www.pro-linux.de/news/1/27060/debian-veranstaltet-minidebconf-im-juni-in-hamburg.html
#Linux #Debian #Gnu #Tux #Germany #Hamburg #OpenSource


 
Debian veranstaltet MiniDebConf im Juni in Hamburg
Vom 5. bis 9. Juni 2019 findet in Hamburg zum zweiten Mal eine MiniDebConf mit Vorträgen und gemeinsamem Entwickeln im Hackspace statt.

https://www.pro-linux.de/news/1/27060/debian-veranstaltet-minidebconf-im-juni-in-hamburg.html
#Linux #Debian #Gnu #Tux #Germany #Hamburg #OpenSource


 

GraphQL mental model


"GraphQL: A query language for your API"
https://graphql.github.io/

GraphQL was developed as an efficient way for backend servers to export data to a variety of clients that need different subsets of the full dataset, without the server needing to know ahead of time who needs what.

Discussion of the "graph" in GraphQL is available both as blog post https://blog.apollographql.com/the-concepts-of-graphql-bc68bd819be3 and as a video presentation

#linux #opensource #programming #graphql


 

Things you’re probably not using in Python 3 – but should


https://datawhatnow.com/things-you-are-probably-not-using-in-python-3-but-should/
Now we can use the lru_cache to optimize it (this optimization technique is called memoization). The execution time goes down from seconds to nanoseconds.
Whoa... did not know python could do that

#linux #opensource #python #programming
Things you’re probably not using in Python 3 – but should


 


 
»Librem One«-Crowdfunding erfolgreich

#linux #linuxnews #opensource #librem #purism #mywork


 


 
Public service reminder: You can easily install the latest mainline and stable #Linux versions on #Fedora with my #Kernel #Vanilla #Repositories: fedoraproject.org/wiki/Kernel_Va…

Right now it offers 5.0.17, 5.1.3, and a mainline snapshot that's close to what 5.2-rc1 will look like.


 
RT @mailbox_org@twitter.com

Spanndender und sinngebender Job im OpenSource-Umfeld gesucht? - Trefft uns heute auf der #connecticum2019 in Berlin und informiert euch über unsere #IT und #Development-Jobs. Ihr findet uns am Stand E10. #JobMesse #ITjobs #Linux #JoinUs

🐦🔗:


 

Hide-out for ubuntu debugging symbols


Sometimes you really could use debugging symbols for distro-built tools or applications
* trying to track down bugs, e.g. running under #gdb
* system profiling, e.g. with #perf

but most of the packages with debugging symbols lurk in a whole different repo than the one where the tool or application lives

https://wiki.ubuntu.com/Debug%20Symbol%20Packages

Image/Photo

#linux #opensource #ubuntu #debugging #profiling #tracing


 


 
ZombieLoad: neue Lücke bei Intel CPUs

#linux #linuxnews #opensource #Intel #mywork


 

function tracing hack using gdb


The first article of this two-part series is introductory and can be skimmed or skipped for those already proficient at using gdb

https://opensourceforu.com/2011/11/gdb-logging-function-parameters-part-1/
https://opensourceforu.com/2011/12/gdb-logging-function-parameters-part-2/

Image/Photo

#linux #opensource #gdb #programming
GDB: Logging Function Parameters, Part 1


 
#meingeschreibsel

Side note: Durch #MDS dürfte der neue #Linux-#Kernel-Parameter "mitigations=" schnell in mehr Distros auftauchen. Mit ihm kann man die Schutztechniken für alle jüngst bekannt gewordenen Prozessor-Sicherheitslücken lahmlegen und so die Performance steigern.


 
My favorite #linux #podcast @latenightlinux has a new episode out!
Late Night Linux – Episode 63


 
MiniDebConf in Hamburg, Dev Day in Berlin

#linux #linuxnews #opensource #debian #mywork


 
Smartphone mit vorinstallierter Google-Alternative

#linux #linuxnews #opensource #mywork


 
2019 status of jailbreak apple devices tools overview - trying to unlock ipad 3 and ipad 4

Image/Photo

to be straight: have not managed yet to unlock a pin locked ipad 3 and ipad 4 and/or recover the data.

it is easy to just overwrite the ipad with the latest firmware via itunes.

but i want to backup and extract all possible files before that.

if you want to jailbreak your Apple device, basically there are a lot of tools and you need to find the one that suits your hardware and firmware model.

not an easy task.

have an older ipad 3 to wich the PIN was lost (no it is not stolen, it’s from a relative who forgot it and also can not remember his itunes password (alzheimer is very comon these days)). (Model: A1430 iPad 3, Early 2012, +Wi-Fi + Cellular, 30-pin connecto) but latest redsn0w (redsn0w_win_0.9.15b2.zip) says „iPad 3 is not supported“ (probably it has a newer iOS installed than 5.1.1)

this site helps you find and download newer and older firmwares for your device: (GOOD JOB! 🙂

https://ipsw.me/device-finder

https://ipsw.me/iPad3,3

http://www.getios.com/ here you also can get a lot of firmware versions for your iDevice.

also interesting: https://nerdpol.ch/tags/jailbreak

theory:

  • pull an (encrypted) backup from the device
    • not possible via itunes with PIN locked ipad
    • most approaches use some exploit to load their own ramdisk and get access to the device
  • via brute force, find the decryption PIN
  • extract the data
  • reset the device
…. not so easy.

„Imagine a computer which is protected with an OS level password – we can still access the hard disk data by booting a live CD, or by removing the hard disk and connecting it to another machine. When we compare computers to the iPhone, it is an embedded device. So it is not easy to take out the chips (hard disk) and dump data into it. To perform iPhone forensics, we use the Live CD approach. As the iPhone has only one serial port, we are going to load custom OS over the USB to access the hard disk of the device. The problem here is: the iPhone only loads firmware designed by Apple.

In order to create and load the forensic toolkit, first we need to understand iPhone functions at the operating system level. iOS (previously known as iPhone OS) is the operating system that runs on all Apple devices like iPhone, iPod, Apple TV and iPad. iOS is a zip file (ships with .ipsw extension) that contains boot loaders, kernel, system software, shared libraries & built in applications.

When an iPhone boots up, it walks through a chain of trust, which is a series of RSA signature checks among the software components in a specific order as shown below:




The BootRom is Read-only memory (ROM) and it is the first stage of booting an iOS device. BootRom contains all the root certificates to signature check the next stage.

iPhone operates in 3 modes – Normal Mode, Recovery Mode, DFU mode

In Normal mode, BootRom start off some initialization stuff and loads the low level boot loader (LLB) by verifying its signature. LLB signature checks and loads the stage 2 boot loader (iBoot). iBoot signature checks the kernel and device tree, while the kernel signature checks all the user applications.

In DFU mode, iPhone follows the boot sequence with a series of signature checks as shown below. BootRom signature checks the second level boot loaders (iBSS, iBEC). Boot loader signature checks the kernel, and the kernel signature checks the Ramdisk.




During iOS update, the Ramdisk gets loaded into RAM and it loads all the other OS components.

In Forensics, we will create a custom Ramdisk with our complete forensic tool kit and load it into the iPhone’s volatile memory.

Signature checks implemented at various stages in the boot sequence do not allow us to load our custom Ramdisk. To load our custom Ramdisk, we have to bypass all these signature checks. In the chain of trust boot sequence, if we compromise one link, we can fully control all the links that follow. The hacker community has found several vulnerabilities in BootRom. By using these, we can flash our own boot loader and patch all other signature checks in all the subsequent stages. Apart from signature checks, every stage is also encrypted. These encryption keys can be grabbed from JailBreaking tools.“

src: https://resources.infosecinstitute.com/iphone-forensics/

another lengthy writeup: https://blog.elcomsoft.com/2017/11/the-art-of-ios-and-icloud-forensics/

unlocking iDevices: how ex-empoyees make business


„Cellebrite, through means currently unknown, provides these services at $5,000 per device,“

https://blog.malwarebytes.com/security-world/2018/03/graykey-iphone-unlocker-poses-serious-security-concerns/

Mysterious $15,000 ‚GrayKey‘ Promises To Unlock iPhone X For The Feds


https://youtu.be/gpzl11uPmyY

https://www.magnetforensics.com/
  • AXIOM has the most advanced parsing and carving techniques which finds more evidence than any other tool, including 25% more pictures.
  • Get more detailed information about what someone was doing at any given time and where, with artifacts like KnowledgeC, iOS Wallet, geolocation data, Screen Time, and more.
  • Analyze the full file system (including iTunes backup-style images) and decrypted Keychain from iOS devices and find evidence that other tools miss.
  • Memory images could contain valuable evidence like messages, call logs, and email. AXIOM natively supports the analysis of memory from GrayKey images without the need to install third-party conversions or plugins.
  • iOS images contain a lot of native files and raw data. Use AXIOM to cut through the noise of data and save time during your investigations by quickly surfacing only relevant evidence rather than unactionable data.
  • Discover new artifacts with Dynamic App Finder to automatically scan your file system and memory images for relevant chat, browser, geolocation, and identifier data.
  • AXIOM is a complete digital investigation platform that gives you the power to analyze evidence from GrayKey images alongside data from other computer, cloud, social media, and mobile evidentiary sources.
src: https://www.magnetforensics.com/graykey/




„can take up to three days or longer to (crack) for six-digit passcodes“ … and recover the data of the iDevice.




src: https://www.forbes.com/sites/thomasbrewster/2018/03/05/apple-iphone-x-graykey-hack/#566b2c9c2950

Jailbreak iPhone XS, iPhone XR on iOS 12 – iOS 12.1.2 Using Chimera Jailbreak [How to]


Image/Photo

Posted by Rajesh Pandey on Apr 30, 2019

The Electra team surprised everyone today by releasing Chimera, a new iOS 12 – iOS 12.1.2 jailbreak for A7-A12 devices including the iPhone XS and iPhone XR. Chimera has been built from the ground up and comes with Sileo as its default package manager.

the hardware hack: How to unlock iCloud locked Apple iPad 2, 3, 4, iPad Air and Air 2, iPad mini 1, 2, 3, 4, iPad 12.9 and 9.7 – WARNING!

This method works ONLY on iPads with 3G/4G/LTE and removes cellular from your iPad.

it will become wifi-only! (no 3G/4G/LTE no more!)


„This method will help you bypass iCloud on locked iPads.

This manual will help you with iCloud bypass on your iPad Cellular.
  • After bypass iCloud you will have iPad Wi-Fi Only.
  • Sim-slot (GSM, Mobile, SimCard) will not work.
  • GPS and Bluetooth will work.
At this moment it works with Apple iPad 2, iPad 3, iPad 4, iPad Air, iPad mini, iPad mini 2, iPad Air 2, iPad mini 3, iPad mini 4, iPad Pro 12.9, iPad Pro 9.7 which is locked by service iCloud. Include locked through “Lost and erased” mode.
  • On the iPad 2 3G Model A1396 (GSM) remove the resistor r1205. On the Model iPad 2 3G A1397 (CDMA) move resistor r1205 to position r1204.
  • iPad 2 3G will enter DFU mode.
  • Connect the iPad 2 3G to your PC or Mac.
  • After that you need to restore the iPad 2 3G through iTunes with firmware of Wi-Fi ONLY model and activate using the official method.
  • Turn off the automatic firmware update: Settings \ iTunes Store, App Store \ Automatic download \ Updates.
You can support this project through donations. „PayPal block my account with all money because I’m from Ukraine. “

After this you will can install any apps on your iCloud free iPad, make jailbreak, assign your own Apple ID account and do any other things.

Apple devices (for example iPads) have some part on logic board which called Board_id. Board_id is responsible for how device identifies itself. For iPad there are several possible configurations: Apple TV, Apple iPhone, Apple iPad Cellular, Apple iPad WiFi only.

When Apple’s iCloud servers bloсked iPads they do this in 2 ways:
  • iPad WiFi only will be blocked by it serial number.
  • iPad Cellular will be blocked by it serial number and IMEI.
To bypass iCloud on iPads Cellular you need disable it modem chip and change Board_id.

If you just only disable modem you will get error and not working device. Sometimes this happens when modem or cable modem is broken even on iPads which isn’t blocked in iCloud. My method can revive such devices.

When you disabled modem chip and changed Board_id device will stop work properly. Something inside will say: “Hey man, something wrong! My hardware is like for WiFi only model, but you use firmware for Cellular model. I go in DFU-mode and you should go in iTunes and restore me”.

When you connect your iPad to BigBrother OS will install driver for it.

At finish you will have iCloud unlocked iPad WiFi only. Now It can be registered on your own Apple ID through new clean serial number. Voila!

If you have some problem with recovering check USB cable and restore iPad manualy from file with firmware. You can download firmware from ipsw.me. Remember that now you have iPad WiFi only hardware and you should download WiFi only firmware. For example, if you have iCloud locked iPad Air Cellular A1475 you should download firmware for iPad Air WiFi only A1474.

And Yes. At any moment you can covert your iCloud freу iPad WiFi only with hardware method back to iPad Cellular. But iCloud blocking will back too.

Be careful and good luck!“

Here you can read manual to bypass iCloud on model of your iPad:If you are looking for a way to unlock the iCloud on iPad Wi-Fi Only, iPhone or iPod, then read this article: How to bypass iCloud on iPad WiFi, iPad Cellular, iPhone and iPod

src: https://pasha4ur.org.ua/

https://pasha4ur.org.ua/articles/difdevices/131-how-unlock-apple-ipad-2-3g-icloud-locked

unlock: A1430 (GSM) and A1403 (CDMA)








… respect! this border_id change thing needs further investiagion.

src: https://pasha4ur.org.ua/images/phocagallery/stories/portfolio/apple/ipad2unlock/ipad3-icloud-unlock-by-pasha4ur.png

how to open the thing:




warning!


all sort of weird things happening:

Hi can someone help me with ipad mini A1454 I have removed the resistor R1204 as stated in the instructions I need to now make a jumper on R1205 because itunes detects my ipad as a apple tv so a jumper going from R1205 but unsure where the other end of the jumper goes please help me I would be really grateful

„use good pencil (graphite) to make short (jumper) in R1205“

src: http://forum.gsmhosting.com/vbb/f631/bypass-icloud-ipad-2-3-4-air-mini-mini-retina-3g-hardware-method-1872271/index8.html

redsn0w is ooooold:


in this video DiplInf Sebastian Scheiber shows how to jailbreak an locked (!) iPad and recover the data.

Method used:problem: this probably only works with on older versions of the iPad / iPhone supported by Redsn0w and iOS 5.1 is rather old, most devices will have a newer version of iOS installed by now.

how to get into DFU (recovery) mode:

  • hold power button pressed for 3 seconds
  • now keep power button pressed while also holding home button pressed
  • after a few seconds screen goes dark, now RELEASE POWER BUTTON but still keep home button pressed
… screen should stay dark and PC you connect do should detect an iPad in DFU mode.

Stuck in DFU mode – How to Exit DFU Mode:


Press Home and Power/ Sleep buttons at the same time for 10s > Release the Home and Power/ Sleep buttons together.

iOS 9.2 – 9.3.3 64-bit devices only


iphone 5s iphone 6 iphone 6 plus iphone 6s iphone 6s plus iphone se ipod touch 6g ipad mini 2 ipad mini 3 ipad mini 4 ipad air ipad air 2 ipad pro

will need your apple id and password.

https://en.pangu.io/

Evasi0n (Evasi0n7) Jailbreak Tool:

for iOS 6.x – iOS 7.0.x


… this can not be used to unlock an iPad. Your iPad/iPhone will have to be unlocked (PIN) before jailbreaking.

http://www.ijailbreak.com/evasi0n/

evasi0n is an unconventional utility able to perform jailbreak operations on devices running iOS 6 and 7.

A consequence of the procedure is the removal of several limitations imposed by Apple, allowing users to install software that is not approved by the company and switch phone carriers seamlessly.

evasi0n became a success just days after its first release.

Supposedly, a few million copies have been downloaded in a very short period, which is not necessarily an indication of its efficiency, but sure says a lot. Statistics aside, the general opinion (as stated by most users on the Internet) is that evasi0n is a trustworthy jailbreak application, one that has to offer everything and asks for nothing in return.

evasi0n is special because it can perform an untethered jailbreak operation, which translates into the fact that the iOS device will be able to reboot without requiring a connection with an external device.

The principle it relies on involves a number of complicated steps, most of which are related to exploiting several vulnerabilities that were overlooked by Apple. However, the process is completed silently, without user intervention.

This is the main reason why evasi0n is considered one of the most easy-to-use and accessible applications of its type. It’s not pretentious as far as OS requirements are concerned, nor does it require advanced configurations.

In order for the jailbreak operation to be successful, you need to equip your system with iTunes and connect your iPhone, iPad or iPod to the computer via a USB cable.

It is also recommended that you backup the device in case something goes wrong.

Once you’ve completed these steps, you can proceed with the jailbreak operation, which, if free of errors, shouldn’t take more than five minutes. However, if the process fails, simply reboot the device and relaunch evasi0n.

On an ending note, this is a well-built jailbreak software, easy to use and user-friendly. Nevertheless, a backup operation is vital in case anything goes wrong.

windows versions:

https://www.softpedia.com/get/Mobile-Phone-Tools/IPhone/evasi0n.shtml

https://www.softpedia.com/downloadTag/jailbreak

linux version:

https://www.mediafire.com/file/21zlxh81cqtqqgb/evasi0n-linux-1.0-3c53ba10e2448d311b0f4157f2d7eb568f106c4f-release.tar+%281%29.lzma

phoenixpwn.com


jailbreak works only on 32-bit devices, which includes :
  • iPhone 4S, 5C and 5
  • iPad 2, 3, 4
  • iPad Mini 1
  • iPod Touch 5
https://phoenixpwn.com/ -> you will need an apple id associated with the device?

https://youtu.be/6I8V-BRx2hk

https://twitter.com/saurik/status/1119211957188345856

for older devices and firmwares (iOS 5.1.X)


„RedSn0w actually evolved from the Jailbreaking tool Quickpwn, which was an early Jailbreaking tool used to Jailbreak the 2nd generation of iOS. Nowadays RedSn0w can be used to Jailbreak a lot of versions of iPhone, iPod Touch and iPad.“ … but not all, iPad 4 seems not supported.

RedSn0w iPhone Support:


iPhone 6s Plus: Not Supported
iPhone 6s: Not Supported
iPhone 6 Plus: Not Supported
iPhone 6: Not Supported
iPhone 5s: Not Supported
iPhone 5c: Not Supported
iPhone 5: Not Supported
iPhone 4S: iOS 5 (iOS 5.1.1, iOS 5.0.1, iOS 5.0)
iPhone 4: iOS 6 (iOS 6.0,6.0.1) + iOS 5 (iOS 5.1.1, iOS 5.1, iOS 5.0.1, iOS 5.0) + iOS 4 (4.3.5, 4.3.4, 4.3.3, 4.3.2, 4.3.1, 4.3, 4.2.6, 4.2.1, 4.1, 4.0.2, 4.0.1, 4.0) + iOS 3 (iOS 3.1.3)
iPhone 3GS: iOS 6 (iOS 6.0, 6.0.1) + iOS 5 (iOS 5.1.1, iOS 5.1, iOS 5.0.1, iOS 5.0) + iOS 4 (4.3.5, 4.3.4, 4.3.3, 4.3.2, 4.3.1, 4.3, 4.2.6, 4.2.1, 4.1, 4.0.2, 4.0.1, 4.0) + iOS 3 (3.1.3)
iPhone 3G: iOS 4 (4.3.4, 4.2.1, 4.1, 4.0.2, 4.0.1, 4.0) + iOS 3 (3.1.3)

RedSn0w iPad Support:


iPad Pro: Not Supported
iPad Air 2: Not Supported
iPad Air: Not Supported
iPad Mini 4: Not Supported
iPad Mini 3: Not Supported iPad Mini 2: Not Supported
iPad Mini: Not Supported
iPad 4: Not Supported <- argh!
iPad 3: iOS 5 (iOS 5.1.1) <- RedSn0w told me „Ipad 3 is not supported“, probably it has a newer iOS installed than 5.1.1)
iPad 2: iOS 5 (iOS 5.1.1, 5.0.1)
iPad 1: iOS 5 (iOS 5.1.1, iOS 5.1, iOS 5.0.1, iOS 5.0) + iOS 4 (iOS 4.3.5, 4.3.4, 4.3.3, 4.3.2, 4.3.1, 4.3, 4.2.1) + iOS 3 (iOS 3.2.2)

src: http://www.ijailbreak.com/redsn0w/

PwnageTool 4.3 Info

http://public.stuff.hu/pwnagetool/PwnageTool_4.3.dmg

Method 2: Get Out of DFU Mode on iPhone/iPad/iPod touch with PhoneRescue


Click here to download PhoneRescue free version!

Step 1: Launch PhoneRescue on your computer > Connect your iOS device to your computer with a USB cable > Wait for PhoneRescue to recognize your iOS device.

Step 2: Click on „Exit Ramdisk Mode“ at the bottom of the Homepage.

other jailbreaking tools:

links:


https://www.antid0te.com/

https://www.sektioneins.de/

http://www.ijailbreak.com/jailbreak-software/

https://www.theiphonewiki.com/wiki/I0n1c

tweets:


https://twitter.com/angelXwind

#linux #gnu #gnulinux #opensource #administration #sysops #apple #ipad #phone #jailbreak
Quelle: https://dwaves.org/2019/05/12/2019-status-of-jailbreak-apple-devices-tools-overview-trying-to-unlock-ipad-3-and-ipad-4/
2019 status of jailbreak apple devices tools overview – trying to unlock ipad 3 and ipad 4


 
2019 status of jailbreak apple devices tools overview - trying to unlock ipad 3 and ipad 4

Image/Photo

to be straight: have not managed yet to unlock a pin locked ipad 3 and ipad 4 and/or recover the data.

it is easy to just overwrite the ipad with the latest firmware via itunes.

but i want to backup and extract all possible files before that.

if you want to jailbreak your Apple device, basically there are a lot of tools and you need to find the one that suits your hardware and firmware model.

not an easy task.

have an older ipad 3 to wich the PIN was lost (no it is not stolen, it’s from a relative who forgot it and also can not remember his itunes password (alzheimer is very comon these days)). (Model: A1430 iPad 3, Early 2012, +Wi-Fi + Cellular, 30-pin connecto) but latest redsn0w (redsn0w_win_0.9.15b2.zip) says „iPad 3 is not supported“ (probably it has a newer iOS installed than 5.1.1)

this site helps you find and download newer and older firmwares for your device: (GOOD JOB! 🙂

https://ipsw.me/device-finder

https://ipsw.me/iPad3,3

http://www.getios.com/ here you also can get a lot of firmware versions for your iDevice.

also interesting: https://nerdpol.ch/tags/jailbreak

theory:

  • pull an (encrypted) backup from the device
    • not possible via itunes with PIN locked ipad
    • most approaches use some exploit to load their own ramdisk and get access to the device
  • via brute force, find the decryption PIN
  • extract the data
  • reset the device
…. not so easy.

„Imagine a computer which is protected with an OS level password – we can still access the hard disk data by booting a live CD, or by removing the hard disk and connecting it to another machine. When we compare computers to the iPhone, it is an embedded device. So it is not easy to take out the chips (hard disk) and dump data into it. To perform iPhone forensics, we use the Live CD approach. As the iPhone has only one serial port, we are going to load custom OS over the USB to access the hard disk of the device. The problem here is: the iPhone only loads firmware designed by Apple.

In order to create and load the forensic toolkit, first we need to understand iPhone functions at the operating system level. iOS (previously known as iPhone OS) is the operating system that runs on all Apple devices like iPhone, iPod, Apple TV and iPad. iOS is a zip file (ships with .ipsw extension) that contains boot loaders, kernel, system software, shared libraries & built in applications.

When an iPhone boots up, it walks through a chain of trust, which is a series of RSA signature checks among the software components in a specific order as shown below:




The BootRom is Read-only memory (ROM) and it is the first stage of booting an iOS device. BootRom contains all the root certificates to signature check the next stage.

iPhone operates in 3 modes – Normal Mode, Recovery Mode, DFU mode

In Normal mode, BootRom start off some initialization stuff and loads the low level boot loader (LLB) by verifying its signature. LLB signature checks and loads the stage 2 boot loader (iBoot). iBoot signature checks the kernel and device tree, while the kernel signature checks all the user applications.

In DFU mode, iPhone follows the boot sequence with a series of signature checks as shown below. BootRom signature checks the second level boot loaders (iBSS, iBEC). Boot loader signature checks the kernel, and the kernel signature checks the Ramdisk.




During iOS update, the Ramdisk gets loaded into RAM and it loads all the other OS components.

In Forensics, we will create a custom Ramdisk with our complete forensic tool kit and load it into the iPhone’s volatile memory.

Signature checks implemented at various stages in the boot sequence do not allow us to load our custom Ramdisk. To load our custom Ramdisk, we have to bypass all these signature checks. In the chain of trust boot sequence, if we compromise one link, we can fully control all the links that follow. The hacker community has found several vulnerabilities in BootRom. By using these, we can flash our own boot loader and patch all other signature checks in all the subsequent stages. Apart from signature checks, every stage is also encrypted. These encryption keys can be grabbed from JailBreaking tools.“

src: https://resources.infosecinstitute.com/iphone-forensics/

another lengthy writeup: https://blog.elcomsoft.com/2017/11/the-art-of-ios-and-icloud-forensics/

unlocking iDevices: how ex-empoyees make business


„Cellebrite, through means currently unknown, provides these services at $5,000 per device,“

https://blog.malwarebytes.com/security-world/2018/03/graykey-iphone-unlocker-poses-serious-security-concerns/

Mysterious $15,000 ‚GrayKey‘ Promises To Unlock iPhone X For The Feds


https://youtu.be/gpzl11uPmyY

https://www.magnetforensics.com/
  • AXIOM has the most advanced parsing and carving techniques which finds more evidence than any other tool, including 25% more pictures.
  • Get more detailed information about what someone was doing at any given time and where, with artifacts like KnowledgeC, iOS Wallet, geolocation data, Screen Time, and more.
  • Analyze the full file system (including iTunes backup-style images) and decrypted Keychain from iOS devices and find evidence that other tools miss.
  • Memory images could contain valuable evidence like messages, call logs, and email. AXIOM natively supports the analysis of memory from GrayKey images without the need to install third-party conversions or plugins.
  • iOS images contain a lot of native files and raw data. Use AXIOM to cut through the noise of data and save time during your investigations by quickly surfacing only relevant evidence rather than unactionable data.
  • Discover new artifacts with Dynamic App Finder to automatically scan your file system and memory images for relevant chat, browser, geolocation, and identifier data.
  • AXIOM is a complete digital investigation platform that gives you the power to analyze evidence from GrayKey images alongside data from other computer, cloud, social media, and mobile evidentiary sources.
src: https://www.magnetforensics.com/graykey/




„can take up to three days or longer to (crack) for six-digit passcodes“ … and recover the data of the iDevice.




src: https://www.forbes.com/sites/thomasbrewster/2018/03/05/apple-iphone-x-graykey-hack/#566b2c9c2950

Jailbreak iPhone XS, iPhone XR on iOS 12 – iOS 12.1.2 Using Chimera Jailbreak [How to]


Image/Photo

Posted by Rajesh Pandey on Apr 30, 2019

The Electra team surprised everyone today by releasing Chimera, a new iOS 12 – iOS 12.1.2 jailbreak for A7-A12 devices including the iPhone XS and iPhone XR. Chimera has been built from the ground up and comes with Sileo as its default package manager.

the hardware hack: How to unlock iCloud locked Apple iPad 2, 3, 4, iPad Air and Air 2, iPad mini 1, 2, 3, 4, iPad 12.9 and 9.7 – WARNING!

This method works ONLY on iPads with 3G/4G/LTE and removes cellular from your iPad.

it will become wifi-only! (no 3G/4G/LTE no more!)


„This method will help you bypass iCloud on locked iPads.

This manual will help you with iCloud bypass on your iPad Cellular.
  • After bypass iCloud you will have iPad Wi-Fi Only.
  • Sim-slot (GSM, Mobile, SimCard) will not work.
  • GPS and Bluetooth will work.
At this moment it works with Apple iPad 2, iPad 3, iPad 4, iPad Air, iPad mini, iPad mini 2, iPad Air 2, iPad mini 3, iPad mini 4, iPad Pro 12.9, iPad Pro 9.7 which is locked by service iCloud. Include locked through “Lost and erased” mode.
  • On the iPad 2 3G Model A1396 (GSM) remove the resistor r1205. On the Model iPad 2 3G A1397 (CDMA) move resistor r1205 to position r1204.
  • iPad 2 3G will enter DFU mode.
  • Connect the iPad 2 3G to your PC or Mac.
  • After that you need to restore the iPad 2 3G through iTunes with firmware of Wi-Fi ONLY model and activate using the official method.
  • Turn off the automatic firmware update: Settings \ iTunes Store, App Store \ Automatic download \ Updates.
You can support this project through donations. „PayPal block my account with all money because I’m from Ukraine. “

After this you will can install any apps on your iCloud free iPad, make jailbreak, assign your own Apple ID account and do any other things.

Apple devices (for example iPads) have some part on logic board which called Board_id. Board_id is responsible for how device identifies itself. For iPad there are several possible configurations: Apple TV, Apple iPhone, Apple iPad Cellular, Apple iPad WiFi only.

When Apple’s iCloud servers bloсked iPads they do this in 2 ways:
  • iPad WiFi only will be blocked by it serial number.
  • iPad Cellular will be blocked by it serial number and IMEI.
To bypass iCloud on iPads Cellular you need disable it modem chip and change Board_id.

If you just only disable modem you will get error and not working device. Sometimes this happens when modem or cable modem is broken even on iPads which isn’t blocked in iCloud. My method can revive such devices.

When you disabled modem chip and changed Board_id device will stop work properly. Something inside will say: “Hey man, something wrong! My hardware is like for WiFi only model, but you use firmware for Cellular model. I go in DFU-mode and you should go in iTunes and restore me”.

When you connect your iPad to BigBrother OS will install driver for it.

At finish you will have iCloud unlocked iPad WiFi only. Now It can be registered on your own Apple ID through new clean serial number. Voila!

If you have some problem with recovering check USB cable and restore iPad manualy from file with firmware. You can download firmware from ipsw.me. Remember that now you have iPad WiFi only hardware and you should download WiFi only firmware. For example, if you have iCloud locked iPad Air Cellular A1475 you should download firmware for iPad Air WiFi only A1474.

And Yes. At any moment you can covert your iCloud freу iPad WiFi only with hardware method back to iPad Cellular. But iCloud blocking will back too.

Be careful and good luck!“

Here you can read manual to bypass iCloud on model of your iPad:If you are looking for a way to unlock the iCloud on iPad Wi-Fi Only, iPhone or iPod, then read this article: How to bypass iCloud on iPad WiFi, iPad Cellular, iPhone and iPod

src: https://pasha4ur.org.ua/

https://pasha4ur.org.ua/articles/difdevices/131-how-unlock-apple-ipad-2-3g-icloud-locked

unlock: A1430 (GSM) and A1403 (CDMA)








… respect! this border_id change thing needs further investiagion.

src: https://pasha4ur.org.ua/images/phocagallery/stories/portfolio/apple/ipad2unlock/ipad3-icloud-unlock-by-pasha4ur.png

how to open the thing:




warning!


all sort of weird things happening:

Hi can someone help me with ipad mini A1454 I have removed the resistor R1204 as stated in the instructions I need to now make a jumper on R1205 because itunes detects my ipad as a apple tv so a jumper going from R1205 but unsure where the other end of the jumper goes please help me I would be really grateful

„use good pencil (graphite) to make short (jumper) in R1205“

src: http://forum.gsmhosting.com/vbb/f631/bypass-icloud-ipad-2-3-4-air-mini-mini-retina-3g-hardware-method-1872271/index8.html

redsn0w is ooooold:


in this video DiplInf Sebastian Scheiber shows how to jailbreak an locked (!) iPad and recover the data.

Method used:problem: this probably only works with on older versions of the iPad / iPhone supported by Redsn0w and iOS 5.1 is rather old, most devices will have a newer version of iOS installed by now.

how to get into DFU (recovery) mode:

  • hold power button pressed for 3 seconds
  • now keep power button pressed while also holding home button pressed
  • after a few seconds screen goes dark, now RELEASE POWER BUTTON but still keep home button pressed
… screen should stay dark and PC you connect do should detect an iPad in DFU mode.

Stuck in DFU mode – How to Exit DFU Mode:


Press Home and Power/ Sleep buttons at the same time for 10s > Release the Home and Power/ Sleep buttons together.

iOS 9.2 – 9.3.3 64-bit devices only


iphone 5s iphone 6 iphone 6 plus iphone 6s iphone 6s plus iphone se ipod touch 6g ipad mini 2 ipad mini 3 ipad mini 4 ipad air ipad air 2 ipad pro

will need your apple id and password.

https://en.pangu.io/

Evasi0n (Evasi0n7) Jailbreak Tool:

for iOS 6.x – iOS 7.0.x


… this can not be used to unlock an iPad. Your iPad/iPhone will have to be unlocked (PIN) before jailbreaking.

http://www.ijailbreak.com/evasi0n/

evasi0n is an unconventional utility able to perform jailbreak operations on devices running iOS 6 and 7.

A consequence of the procedure is the removal of several limitations imposed by Apple, allowing users to install software that is not approved by the company and switch phone carriers seamlessly.

evasi0n became a success just days after its first release.

Supposedly, a few million copies have been downloaded in a very short period, which is not necessarily an indication of its efficiency, but sure says a lot. Statistics aside, the general opinion (as stated by most users on the Internet) is that evasi0n is a trustworthy jailbreak application, one that has to offer everything and asks for nothing in return.

evasi0n is special because it can perform an untethered jailbreak operation, which translates into the fact that the iOS device will be able to reboot without requiring a connection with an external device.

The principle it relies on involves a number of complicated steps, most of which are related to exploiting several vulnerabilities that were overlooked by Apple. However, the process is completed silently, without user intervention.

This is the main reason why evasi0n is considered one of the most easy-to-use and accessible applications of its type. It’s not pretentious as far as OS requirements are concerned, nor does it require advanced configurations.

In order for the jailbreak operation to be successful, you need to equip your system with iTunes and connect your iPhone, iPad or iPod to the computer via a USB cable.

It is also recommended that you backup the device in case something goes wrong.

Once you’ve completed these steps, you can proceed with the jailbreak operation, which, if free of errors, shouldn’t take more than five minutes. However, if the process fails, simply reboot the device and relaunch evasi0n.

On an ending note, this is a well-built jailbreak software, easy to use and user-friendly. Nevertheless, a backup operation is vital in case anything goes wrong.

windows versions:

https://www.softpedia.com/get/Mobile-Phone-Tools/IPhone/evasi0n.shtml

https://www.softpedia.com/downloadTag/jailbreak

linux version:

https://www.mediafire.com/file/21zlxh81cqtqqgb/evasi0n-linux-1.0-3c53ba10e2448d311b0f4157f2d7eb568f106c4f-release.tar+%281%29.lzma

phoenixpwn.com


jailbreak works only on 32-bit devices, which includes :
  • iPhone 4S, 5C and 5
  • iPad 2, 3, 4
  • iPad Mini 1
  • iPod Touch 5
https://phoenixpwn.com/ -> you will need an apple id associated with the device?

https://youtu.be/6I8V-BRx2hk

https://twitter.com/saurik/status/1119211957188345856

for older devices and firmwares (iOS 5.1.X)


„RedSn0w actually evolved from the Jailbreaking tool Quickpwn, which was an early Jailbreaking tool used to Jailbreak the 2nd generation of iOS. Nowadays RedSn0w can be used to Jailbreak a lot of versions of iPhone, iPod Touch and iPad.“ … but not all, iPad 4 seems not supported.

RedSn0w iPhone Support:


iPhone 6s Plus: Not Supported
iPhone 6s: Not Supported
iPhone 6 Plus: Not Supported
iPhone 6: Not Supported
iPhone 5s: Not Supported
iPhone 5c: Not Supported
iPhone 5: Not Supported
iPhone 4S: iOS 5 (iOS 5.1.1, iOS 5.0.1, iOS 5.0)
iPhone 4: iOS 6 (iOS 6.0,6.0.1) + iOS 5 (iOS 5.1.1, iOS 5.1, iOS 5.0.1, iOS 5.0) + iOS 4 (4.3.5, 4.3.4, 4.3.3, 4.3.2, 4.3.1, 4.3, 4.2.6, 4.2.1, 4.1, 4.0.2, 4.0.1, 4.0) + iOS 3 (iOS 3.1.3)
iPhone 3GS: iOS 6 (iOS 6.0, 6.0.1) + iOS 5 (iOS 5.1.1, iOS 5.1, iOS 5.0.1, iOS 5.0) + iOS 4 (4.3.5, 4.3.4, 4.3.3, 4.3.2, 4.3.1, 4.3, 4.2.6, 4.2.1, 4.1, 4.0.2, 4.0.1, 4.0) + iOS 3 (3.1.3)
iPhone 3G: iOS 4 (4.3.4, 4.2.1, 4.1, 4.0.2, 4.0.1, 4.0) + iOS 3 (3.1.3)

RedSn0w iPad Support:


iPad Pro: Not Supported
iPad Air 2: Not Supported
iPad Air: Not Supported
iPad Mini 4: Not Supported
iPad Mini 3: Not Supported iPad Mini 2: Not Supported
iPad Mini: Not Supported
iPad 4: Not Supported <- argh!
iPad 3: iOS 5 (iOS 5.1.1) <- RedSn0w told me „Ipad 3 is not supported“, probably it has a newer iOS installed than 5.1.1)
iPad 2: iOS 5 (iOS 5.1.1, 5.0.1)
iPad 1: iOS 5 (iOS 5.1.1, iOS 5.1, iOS 5.0.1, iOS 5.0) + iOS 4 (iOS 4.3.5, 4.3.4, 4.3.3, 4.3.2, 4.3.1, 4.3, 4.2.1) + iOS 3 (iOS 3.2.2)

src: http://www.ijailbreak.com/redsn0w/

PwnageTool 4.3 Info

http://public.stuff.hu/pwnagetool/PwnageTool_4.3.dmg

Method 2: Get Out of DFU Mode on iPhone/iPad/iPod touch with PhoneRescue


Click here to download PhoneRescue free version!

Step 1: Launch PhoneRescue on your computer > Connect your iOS device to your computer with a USB cable > Wait for PhoneRescue to recognize your iOS device.

Step 2: Click on „Exit Ramdisk Mode“ at the bottom of the Homepage.

other jailbreaking tools:

links:


https://www.antid0te.com/

https://www.sektioneins.de/

http://www.ijailbreak.com/jailbreak-software/

https://www.theiphonewiki.com/wiki/I0n1c

tweets:


https://twitter.com/angelXwind

#linux #gnu #gnulinux #opensource #administration #sysops #apple #ipad #phone #jailbreak
Quelle: https://dwaves.org/2019/05/12/2019-status-of-jailbreak-apple-devices-tools-overview-trying-to-unlock-ipad-3-and-ipad-4/
2019 status of jailbreak apple devices tools overview – trying to unlock ipad 3 and ipad 4


 

Debian 9, WLan-Verbindung


Hallo, ich habe auf einem Rechner Debian installiert, aber ich kann keine WLan-Verbindung aufbauen.
Unter Netzwerke ist unser WLan aufgeführt, aber wenn ich "Verbinden" anklicke, kommt die Meldung "WiFi-Netzwerk wurde nicht gefunden" und "Die Verbindung WLan wurde deaktiviert".
Ich denke, ich muss den WLan-Schlüssel irgendwo eingeben, ich weiss leider nicht, wo.
Kann mir jemand weiterhelfen?
#linux


 

Debian 9, WLan-Verbindung


Hallo, ich habe auf einem Rechner Debian installiert, aber ich kann keine WLan-Verbindung aufbauen.
Unter Netzwerke ist unser WLan aufgeführt, aber wenn ich "Verbinden" anklicke, kommt die Meldung "WiFi-Netzwerk wurde nicht gefunden" und "Die Verbindung WLan wurde deaktiviert".
Ich denke, ich muss den WLan-Schlüssel irgendwo eingeben, ich weiss leider nicht, wo.
Kann mir jemand weiterhelfen?
#linux


 

Debian 9, WLan-Verbindung


Hallo, ich habe auf einem Rechner Debian installiert, aber ich kann keine WLan-Verbindung aufbauen.
Unter Netzwerke ist unser WLan aufgeführt, aber wenn ich "Verbinden" anklicke, kommt die Meldung "WiFi-Netzwerk wurde nicht gefunden" und "Die Verbindung WLan wurde deaktiviert".
Ich denke, ich muss den WLan-Schlüssel irgendwo eingeben, ich weiss leider nicht, wo.
Kann mir jemand weiterhelfen?
#linux


 
#Linux #Kernel 5.1.1 is out.

IOW: Prepare for headlines like ```5.1 Gets Its First Point Release, It's Now Ready for Mass Adoption``` or ```5.1 is stable now```, which IMHO give quite a misleading impression of how the Linux development process and its versions numbers work.


 
Debian 10 »Buster« und Wayland

#linux #linuxnews #opensource #debian #wayland #mywork


 
ich möchte folgendes machen:
ls -laRSh --full-iso > listing.txt 2> listing_err.txt
also ein rekursives files/folder listing, am liebsten auch noch eingerückt ;)

aber listin.txt wird dabei vermutlich sehr schnell sehr groß (der ordner um den es geht hat ZIEMLICH viele unterordner), wie kann ich das genialerweise splitten / komprimieren? Achso und Ausführungszeit wäre auch gut, wenn's nicht Tage dauern würde ;)
Bin für schön lesbare/parsebare Ergebnisse offen ;)

bedingung: kann keine weiteren programme installieren, kann aber ein shellscript sein, muss also alles mit Hausmitteln erfolgen.

#hilfe #shellnerds #linux


 
"[…] In this session, they’ll be showing off how the new WSL architecture will improve your development environment with: faster file performance speed, #Linux file access from Windows, better support for Linux applications, and more. […]"
# #Linux


 
Linux auf neuen Chromebooks lauffähig

#linux #linuxnews #opensource #chromebooks #mywork


 
Mozilla entschuldigt sich

#linux #linuxnews #opensource #mozilla #firefox #mywork


 
"[…] In this session, they’ll be showing off how the new WSL architecture will improve your development environment with: faster file performance speed, #Linux file access from Windows, better support for Linux applications, and more. […]"


 

We Need to Save What Made Linux and FOSS Possible | Linux Journal


#linux #libre #freesoftware #freedom

If we take freedom and openness for granted, we'll lose both. That's already happening, and we need to fight back. The question is how.

I am haunted by this passage in a letter we got from reader Alan E. Davis (the full text is in our Letters section):
...the real reason for this letter comes from my realization—in seeking online help—that the Linux Documentation Project is dead, and that the Linuxprinting.org project—now taken over by open printing, I think, is far from functioning well. Linux has been transformed into containers, and embedded systems. These and other such projects were the heart and soul of the Free Software movement, and I do not want for them to be gone!

This is the kind of thing Bradley Kuhn (of the Software Freedom Conservancy) lamented in his talk at Freenode.live last year. So did Kyle Rankin in his talk at the same event (video, slides and later, an LJ article). In an earlier conversation on the same stage (it was a helluva show), Simon Phipps (of the Open Source Initiative) and I had our own lamentations.


 

We Need to Save What Made Linux and FOSS Possible | Linux Journal


#linux #libre #freesoftware #freedom

If we take freedom and openness for granted, we'll lose both. That's already happening, and we need to fight back. The question is how.

I am haunted by this passage in a letter we got from reader Alan E. Davis (the full text is in our Letters section):
...the real reason for this letter comes from my realization—in seeking online help—that the Linux Documentation Project is dead, and that the Linuxprinting.org project—now taken over by open printing, I think, is far from functioning well. Linux has been transformed into containers, and embedded systems. These and other such projects were the heart and soul of the Free Software movement, and I do not want for them to be gone!

This is the kind of thing Bradley Kuhn (of the Software Freedom Conservancy) lamented in his talk at Freenode.live last year. So did Kyle Rankin in his talk at the same event (video, slides and later, an LJ article). In an earlier conversation on the same stage (it was a helluva show), Simon Phipps (of the Open Source Initiative) and I had our own lamentations.


 
Pinebook Pro auf gutem Weg

#linux #linuxnews #opensource #pine64 #mywork