Open giotihax opened 3 years ago
Which ipad 4 is it? Please make sure your device is supported in the list.
I also have an ipad4 unfortunately it is on an earlier ios version and I can't get in to update it. Is there a way to update the ios version before using the exploit?
DEBUG: WAITING FOR CONNECTION, PLEASE DISCONNECT AND RE-CONNECT USB CABLE Incoming connection to 2222 Waiting for devices... Connecting to device <MuxDevice: ID 1 ProdID 0x12ab Serial '5fb27e58697182273c96412c4044012136008022' Location 0x2001e>
Exception happened during processing of request from ('127.0.0.1', 47726) Traceback (most recent call last): File "/usr/lib/python2.7/SocketServer.py", line 599, in process_request_thread self.finish_request(request, client_address) File "/usr/lib/python2.7/SocketServer.py", line 334, in finish_request self.RequestHandlerClass(request, client_address, self) File "/usr/lib/python2.7/SocketServer.py", line 655, in init self.handle() File "iphonessh/python-client/tcprelay.py", line 82, in handle dsock = mux.connect(dev, self.server.rport) File "/home/kali/iOS-Hacktivation-Toolkit/iphonessh/python-client/usbmux.py", line 235, in connect return connector.connect(device, port)