spelisa14 / iphonetunnel-usbmuxconnectbyport

Automatically exported from code.google.com/p/iphonetunnel-usbmuxconnectbyport
0 stars 0 forks source link

where can i get the payload #7

Closed GoogleCodeExporter closed 8 years ago

GoogleCodeExporter commented 8 years ago
I notice that iphone_tunnel has a optional that "--exploit <iBSS USB exploit 
payload>". I want to upload my ssh ramdisk, so maybe it will useful for the 
process. 

It will be appreciated of someone tell me where can if find the payload.

Original issue reported on code.google.com by ann...@gmail.com on 20 Mar 2012 at 1:55

GoogleCodeExporter commented 8 years ago
It's an old option for the USB Message 0x21,2 exploit 
("http://theiphonewiki.com/wiki/index.php?title=Usb_control_msg(0x21,_2)_Exploit
"). Not relevant since 3.1.2 - just use syringe/tetheredboot to exploit newer 
devices.

Original comment by msft....@gmail.com on 21 Mar 2012 at 6:55