Remember, today at 7pm CEST (6pm UTC) join me for a SANS @ Mic 1-hour webcast on jailbreaking iOS for security professionals, researchers & analysts @SANSInstitute @SANSEMEA #SEC575
This Feb 21 Edition adds new demos & talks about potential future iOS software 14.3 jailbreaks…
1/5 This past week during the @SANSInstitute “Jailbreaking iOS for Mobile Security Assessments” (February 2021 Edition) I commented on potentially upcoming software jailbreaks for iOS 14.x (up to 14.3) thanks to ‘cicuta_virosa' (an iOS 14.3 kernel LPE)…
github.com/ModernPwner/ci…
2/5 Four days later, @Pwn20wnd has released #unc0ver v6.0.0 adding support for OS 11.0-14.3: unc0ver.dev
Previously, you could only #jailbreak iOS 14 devices using #checkra1n up to A10[X] (iPhone 7) or A11 (iPhone 8 & X) with limitations…
checkra.in/news/2020/09/i…
3/5 #checkra1n on A11 devices (iPhone 8 & X) forces you to skip the BPR (Boot Progress Register) checks to be able to jailbreak iOS 14, which also requires disabling the passcode (therefore, lack of biometry, Apple Pay…)
checkra.in
#unc0ver v6.0.0 brings back…
4/5 #unc0ver v6.0.0 brings back iOS 14 software jailbreaks for multiple iOS/iPadOS devices without constraints up to iOS 14.3, as iOS 14.4 fixes the CVE-2021-1782 kernel vulnerability (support.apple.com/en-us/HT212146)
Test @dinosec!
Interested on seeing #unc0ver for iOS 14 in action…?
5/5 [end] If you want to learn more on the current jailbreak state-of-the-art, join me next month for a new SANS @ Mic “Jailbreaking iOS for Mobile Security Assessments” (March 2021 Edition) practical session on March 16 @SANSInstitute @SANSEMEA #SEC575
sans.org/webcasts/jailb…
Share this Scrolly Tale with your friends.
A Scrolly Tale is a new way to read Twitter threads with a more visually immersive experience.
Discover more beautiful Scrolly Tales like this.