0:00
what's going on youtube gsm right here
0:02
so in today's video i have super great
0:04
news for those of you waiting for
0:05
jailbreak on ios 15.1 15.0 and so on so
0:09
brand new kernel vulnerability has been
0:12
released by ian beer this video is
0:13
brought to you by startsoft and their
0:15
software starts off keep pass which
0:17
allows you to unlock iphone lock screen
0:19
and activation lock directly from your
0:21
computer it works if you forgot your
0:23
apple id and password and you're unable
0:25
to activate a device or if your device
0:26
is unable to activate due to any other
0:29
reason like you know you don't have a
0:30
proper sim card from the counter you
0:32
bought your device from and stuff like
0:34
that definitely check it out in the link
0:35
below so just a day ago ian beer a
0:38
security researcher from google project
0:39
zero posted all this in here now it may
0:42
look like a lot of text in here that
0:44
doesn't make any sense it's code and
0:46
text and stuff a lot of technical stuff
0:48
that you may not be able to understand
0:50
but i'm going to try to make it clear
0:51
for you what this is in here it's a next
0:53
new kernel use after free it says in mac
0:56
message now the xnew kernel is the
0:58
kernel behind ios and you know dvos
1:01
macos and stuff but ios for what we care
1:03
about and of course a use after free is
1:05
a type of vulnerability pretty common in
1:08
the industry but still a great
1:09
vulnerability now if you have a
1:11
vulnerability in the kernel you're able
1:13
to run basically arbitrary data and you
1:16
know change the stuff in the kernel so
1:18
that you can achieve your other goals
1:20
like code execution and then a jailbreak
1:22
so this has been released with all the
1:24
code you need and stuff like that in
1:26
here including the proof of concept and
1:28
stuff so a lot of information has been
1:30
added in here including information
1:32
about the mitigations in the
1:34
exploitation technique for ios now
1:36
according to ember this has been patched
1:38
in ios 15.2 so it would have been a bad
1:41
idea to update the 15.2 just like i said
1:43
in my other videos avoid 15.2 now 15.2
1:47
it stopped being signed a couple of days
1:49
ago and probably this is the reason we
1:50
got this vulnerability released by
1:52
google project zero however anything
1:54
below it like fifteen point zero fifteen
1:56
point zero point x and of course fifteen
1:58
point one those can benefit from this
2:00
vulnerability that was released so can
2:02
it be used to update uncover or touring
2:04
jailbreak the answer is very likely yes
2:07
now this is still a proof of concept
2:09
vulnerability it's not an exploit you
2:10
just can copy and plug into your
2:12
jailbreak and be done with it you still
2:14
need to create a proper exploit around
2:16
it but the uncovered team particularly
2:18
has been known to do that quite a lot to
2:20
basically take exploits from other
2:22
security researchers and integrate them
2:24
in the uncover of course with permission
2:26
and that without any wart to the general
2:28
public until the day of release so do
2:30
not be very surprised if one day you're
2:32
going to see another version of uncover
2:34
pop out of the blue just like the 14.8
2:37
version and the 14.31 did so that's
2:40
quite interesting and it does mean that
2:42
the vulnerability has a lot of potential
2:44
i'm not going to get into the details
2:45
about the vulnerability itself what it
2:47
does and stuff like that because the
2:49
apple page has it pretty good in here if
2:51
you search for it as this one here
2:52
kernel it says impact the malicious
2:54
application may be able to execute
2:56
arbitrary code with kernel privileges
2:58
pretty much what you would need for a
2:59
jailbreak if you don't have kernel
3:01
memory read and write access then it's
3:02
not possible for you to apply the
3:04
jailbreak patches and what this
3:06
vulnerability would allow you to do is
3:07
exactly that if you exploit it properly
3:09
now it's been found by ember of google
3:11
project zero ian beer has been known to
3:13
release a ton of vulnerabilities in the
3:15
past for jailbreak community and of
3:17
course this one is indeed another one of
3:19
them but aside from this one there are
3:21
many other kernel vulnerabilities in
3:23
this log just waiting to be released so
3:25
i do believe we will get a jailbreak for
3:27
ios 15 sooner than later but they still
3:30
have to figure out one important thing
3:32
the thing about rudefest being basically
3:34
sealed now there are options around on
3:37
how to tackle that but of course it will
3:39
require some changes to the uncover and
3:41
even to the taurine because right now
3:43
they apply the remount in a certain way
3:45
which of course would not work on ios
3:47
15. so i guess that's a hurdle they have
3:49
to overcome however in terms of kernel
3:51
vulnerability this one would probably be
3:53
something that they want so that's
3:55
basically it a brand new kernel
3:57
vulnerability released definitely useful
3:59
for uncover in taurine so definitely
4:01
stay tuned do not update your device to
4:04
whatever is currently signed like 15.2
4:06
point x and stuff like that do not
4:08
update because if you do you will indeed
4:10
lose your ability to jailbreak by the
4:12
way guys i now have a gaming channel on
4:15
which i'm basically posting gaming
4:16
guides and you know trophy guides and
4:18
stuff like that so if you could
4:19
subscribe to this channel too i would
4:21
definitely be very thankful for that
4:23
because i'm trying to grow it a little
4:25
bit and definitely thanks to everybody
4:26
who did subscribe already we are already
4:28
at 115 subscribers so yeah you can check
4:31
it out in the link below definitely
4:33
check it out if you want to and thank
4:34
you if you do so that's basically it
4:36
thank you for watching imgs now till the
4:38
next time subscribe to stay updated and