0:00
What's going on YouTube? Giotr right here
0:02
In today's video we have an update for those of you on iOS 15.5 all the way up to iOS 16.5
0:07
If you want a jailbreak on the newer devices like iPhone 14, 13, 12 and stuff like that, not the check crane stuff, the newer stuff
0:14
We're going to get into that in a second. This video is brought to you by any unlock a software that allows to unlock the screen passcode, bypass MDM and remove SIM lock
0:20
Definitely check the program out in the link below. So as you probably know, two kernel exploits were released for these devices
0:26
on iOS 15.0 all the way up to iOS 16.5.5.1. And of course, iOS 16.6 and iOS 16.5.1, these over here that are currently signed do patch the vulnerability
0:36
However, iOS 16.5-1, which happens to be signed at the moment, doesn't
0:40
So you can use the vulnerability if you upgrade or downgrade the iOS 16.6 beta 1
0:45
I do have a full article about how to do that and where to find the IPSW to do that here on idivicecentral.com
0:51
So definitely check that out. But the exploit itself is part of the KFD or kernel file descriptor project
0:56
and unfortunately this one is not compiled. But if you want the compiled version of this project
1:01
I did make an IPA file. For those of you who want to test it on your device
1:05
and see what it is and how it works and stuff like that, there is now an IPA file provided by my website over here on IDivacentral.com
1:12
The link will be below. The project itself is actually quite interesting. If you open it, it's this one over here
1:17
And you can actually open this in Xcode and you can see exactly in here everything that is part of the project
1:22
including the offset. Now, these may not be correct in the IPA file because these are hard-coded, for example, for iPhone 14 Pro Mac
1:29
So depending on the circumstance you may need to change this if you planning to work on a jailbreak or if you planning to create your own tool like Kaobanga and stuff like that based on this But with this exploit we might be able to see Kawabanga the Magdirty Cow version the one that was pretty powerful we might be able to see it updated before a gel break drops
1:47
But we can even create a Jill brick with this. This is quite powerful. It's a ridiculously powerful exploit and it was released out of the blue
1:53
So as I said, if you want to check out this exploit, if you want to check out the project, the KFD compiled, I made it available in an IPA format for those of you who need it over here
2:02
Now I did not carry any other modifications to the project. I did not add any offsets or modify any of the code
2:07
I just compiled it into IPA. So depending on your device, it may or may not work
2:12
Now of course when you use it, it looks like this. Once you side load it with your favorite tool, the application looks like this
2:17
This is the testing application that the developer released. You can select in here the POF pages
2:22
You can select the method or the exploit because this one contains two exploits, which is the
2:25
Phiz Puppet and the Smith. This one is probably the one you want, the Smith
2:29
And then you have in here the kernel read method, which is this one over here. And of course the kernel write method there are two over here as well
2:35
You press K open, but you would probably have to monitor it in a console
2:39
Mac OS comes with a console, but if you don't have macOS, there is one for Windows as well, part of Lib iMobile device
2:45
You can see what's going on with the device. But yeah, this is mostly a release for those of you who want to mess with the exploit and see what you can build with it and how it works and whatever
2:53
but you don't necessarily have a macOS computer to compile it. What I have released in here is not a full chill break, is just the IPA file of the KFD project, because the original project
3:02
here does not have any releases, doesn't have an IPA file. So that's basically it, but if you need it
3:06
definitely check it out. Thank you for watching, I'm GSI now. Peace out