exploit-development / iOS-Hacktivation-Toolkit

iOS Hacktivation Toolkit
449 stars 138 forks source link

ipad 4 no work help #16

Open giotihax opened 3 years ago

giotihax commented 3 years ago

DEBUG: WAITING FOR CONNECTION, PLEASE DISCONNECT AND RE-CONNECT USB CABLE Incoming connection to 2222 Waiting for devices... Connecting to device <MuxDevice: ID 1 ProdID 0x12ab Serial '5fb27e58697182273c96412c4044012136008022' Location 0x2001e>

Exception happened during processing of request from ('127.0.0.1', 47726) Traceback (most recent call last): File "/usr/lib/python2.7/SocketServer.py", line 599, in process_request_thread self.finish_request(request, client_address) File "/usr/lib/python2.7/SocketServer.py", line 334, in finish_request self.RequestHandlerClass(request, client_address, self) File "/usr/lib/python2.7/SocketServer.py", line 655, in init self.handle() File "iphonessh/python-client/tcprelay.py", line 82, in handle dsock = mux.connect(dev, self.server.rport) File "/home/kali/iOS-Hacktivation-Toolkit/iphonessh/python-client/usbmux.py", line 235, in connect return connector.connect(device, port)

Hacktivation commented 2 years ago

Which ipad 4 is it? Please make sure your device is supported in the list.

davbren commented 2 years ago

I also have an ipad4 unfortunately it is on an earlier ios version and I can't get in to update it. Is there a way to update the ios version before using the exploit?