0:00
what's going on YouTube GS right here if
0:02
you're interested in jailbreaking your
0:04
iOS device if it's a newer device like
0:06
an iPhone 14 13 12 15 and stuff like
0:09
that on iOS 17 we're going to talk about
0:11
this today we're going to talk about the
0:12
best iOS versions and what you should do
0:15
what versions you should stay on and so
0:16
on so you probably know iOS 17.6 point1
0:19
is currently the latest version both iOS
0:21
17.6 point1 and 17.6 which are currently
0:24
signed are the worst versions you could
0:26
be on at the moment and there's an
0:28
important reason why the versions
0:30
backport some changes from IOS 18 which
0:32
is currently in beta that prevents
0:34
applications from spawning root programs
0:37
if they're not root as well on iOS 17.5
0:40
point1 and older things are a little bit
0:42
better and if you think about it if you
0:44
go here for example on the security
0:46
content of iOS 17.5 Apple does have a
0:49
huge list of security patches these bugs
0:52
are all available on previous versions
0:54
so if you're running iOS 17.4.55
1:00
here for example on core media it says
1:02
an application may be able to execute
1:04
arbitrary code with Cal privileges from
1:06
pattern F pattern F has indeed released
1:09
V abilities and exploits before that
1:11
have been used in jailbreak and this one
1:13
seems to be pretty important it says an
1:15
application may be able to execute
1:16
arbitrary code with kernel privileges
1:18
privilege escalation is a big deal to
1:20
begin with kernel privilege escalation
1:22
that's a whole different story much
1:24
better this could potentially be
1:25
exploited for jailbreak purposes very
1:27
much like many other vulnerabilities
1:29
we've used in the past and then you have
1:31
a lot of things in here including some
1:33
kernel vulnerabilities it says in here
1:34
an attacker may cause unexpected up
1:36
termination or arbitrary code execution
1:38
you have another one which says it can
1:40
bypass kernel memory protections which
1:43
again pretty pretty good then you have
1:45
other in here again with execution of
1:47
arbitary code with Kel privileges all of
1:49
this could possibly be used for
1:51
jailbreak purposes very well so if
1:53
you're running I 17.4.55
2:00
a white paper a PC that could be
2:02
exploited you know a proof of concept
2:03
and stuff like that for the security
2:05
content of iOS 17.6 interesting we have
2:07
d yld d and it says a malicious attacker
2:10
with arbitrary read and Riot capability
2:12
may be able to bypass Point
2:13
authentication this is Pac or Point
2:16
authentication code but it's not the
2:17
kernel Pac it's user space Pac Michael
2:20
puts it very clearly here they say some
2:22
information I missed originally dld is
2:24
commonly associated with user space not
2:26
kernel Pac bypasses operation
2:28
triangulation PAC bypass was a user
2:31
space Pac bypass this isn't 100% useless
2:34
but it isn't helpful in a full-fledged
2:36
jailbreak so you could potentially use
2:38
this for other things you may want a
2:40
great fully completed jailbreak but
2:42
failing that we might get other kind of
2:45
tools remember the MC diral tool the MC
2:47
diral exploit was a very weak exploit
2:50
compared to others but it still rendered
2:53
very interesting tools like cow bang
2:55
like wdb remove three up limit files
2:58
that escaped wdb font override sender
3:01
Escape troll tools troll box and even
3:03
misaka at some point so you can still
3:06
get customization tools even from weaker
3:08
exploits in some cases so a full
3:11
jailbreak would be nice Definitely but
3:13
once any of these vulnerabilities get
3:15
released we might be able to put it to
3:16
good use before we can create a full
3:18
jailbreak that's why I definitely advise
3:20
you to stay below iOS 17.5 if you can't
3:24
if you already updated at 17.5 point1 or
3:26
17.5 at least stay there 17.6 and newer
3:30
are pretty bad both for jailbreak
3:31
purposes and for troll store ideally you
3:34
would stay on iOS 16 or 17.0 up to say
3:37
17.2 but if you can't just stay below
3:41
17.6 so that's basically it quite a lot
3:43
of vulnerabilities have been patched
3:45
lately some of them look pretty
3:46
interesting thank you for watching I