Open ajsacco opened 6 years ago
Hi how you running exploit ?
I added the files to yalu102 as Luca suggested, triggering main() when the app opens. I feel like ziVA might be running in the sandbox but I'm not completely sure. (I'm pretty new to iOS exploitation; I'm just playing around with it and I don't really know much.)
P.S. I've also created a project with triple_fetch and ziVA; I have gotten triple_fetch to work but I'm not 100% sure how to implement ziVA.
ziVA requires a sandbox escape, and I’m fairly sure Yalu doesn’t contain one. You would need triple_fetch, ziVA, and Yalu’s KPP bypass.
Do you have any ideas on how I should implement Yalu? Again, I don't have any experience in iOS exploits, so I will take any advice.
Neither do I. I’m just going off of what people like S1guza have said.
I got the absolute same problem with my triple_fetch combined ziVA exploit. I posted my issue 9 days ago but @doadam has a job and doesn't have time for explaining dummies to fix dummy problems lol. Anyway I saw you are asking how to use ziVa exploit with triple_fetch. Here is how I made it work: First my device is iPhone7,1 (6+) so it is not supported by official ziVA, so I've downloaded @Mila432's offsets.m commit. Then I downloaded the project, unzipped to my MacOS Sierra's desktop then replaced the offsets.m file. After that I easily build it with terminal app by cd
Do you know exactly what ziVA does? It says kernel exploit but what does that do? Gain root access?
Actually I don't know because I didn't get it to work.
I was trying to enable tfp0 to downgrade don't care about jailbreak for 10.3 it is slower than 10.2
Doesn't triple_fetch get tfp0? If so, you might be able to modify nonceenabler and run it as a poc.
How did you get the ziVA poc to output in the xcode debugger? I'm not getting any output from ziVA itself, just the nsxpc2pc app.
Oh sorry I forgot to mention about that. I got debug process in only @Mila432's ziVA exploit fork. But don't forget to change the offsets, because Mila closed his pull request so it is not included in his/her fork.
And no triple_fetch has nothing to do with tfp0. In order to enable tfp0 on 10.3 siguza has wrote an article about it. Because there is some changes in tfp0 in 10.3 than 10.2
Run ziVA with a sandbox bypass: http://github.com/coffeebreakerz/CheekiJailbreeki (not jailbreak)
Coffeebreakerz are fake i won't use any tools created by them.
Plus if this project was working why nobody posted it in r/jailbreak?
Can you send me the ziva binary that you used? I can't seem to get the debug log.
I'm on a trip sorry. You should do it on your own, this is the best way to learn, experience by yourself!
I don't think the 5s has an AppleAVEDriver kext. I don't see it in iOS 10.1.1 or 10.2.
@arinc9 "Coffeebreakerz are fake i won't use any tools created by them."
You're a complete idiot. triple_fetch needs to be modified to run ziVA correctly. And CheekiJailbreeki is the ONLY project which does that right now. Try it yourself, everything is open-source
There are posts in /r/jailbreak but they get downvoted by idiots like you
Does anyone know where in the filesystem AppleAVEDriver is stored? I've opened the ipsw for both ip5s and ip6s on 10.2.1 but cant seem to find it.
It is a kernel extension (driver), you have to extract it from the kernel cache.
You can use img4tool to decompress the kernelcache and then user joker to extract kexts from it.
When running the exploit on my iPhone 5S 10.2.1, I get stuck at: