0:00
what's going on youtube geosnowright
0:02
here so in today's video i have great
0:03
news for those of you waiting for a
0:05
jailbreak on 14.6 and newer especially
0:08
for the a12 a13 and a14 devices but not
0:11
only a brand new kernel exploit seems to
0:13
have been achieved and has been
0:14
demonstrated this video is brought to
0:16
you by start soft and they have a
0:18
program called keep pass which allows
0:19
you to unlock the iphone lock screen and
0:21
activation if you forgot your apple id
0:23
or of course if you forgot your passcode
0:25
definitely check it out in the link
0:26
below and there will be a 30 off coupon
0:29
in the description below for you to
0:30
check out so yesterday brady posted here
0:33
quote much more stable now and they
0:35
posted this picture here now this is the
0:37
important part it seems to show a kernel
0:39
exploit working so it says in here that
0:41
the machine is iphone 13.4 which is
0:43
definitely post a12 and that the ios
0:45
version is 15.1 which is actually great
0:48
because 15.1 is currently the latest
0:50
version available which makes this
0:52
basically zero day now they also seem to
0:54
call a couple of things in here that i'm
0:56
going to explain wk64 and rk64 are
0:59
important bits in here especially for
1:01
jailbreak purposes wk64 is a common name
1:04
for right kernel 64 which is basically a
1:07
function that is being used in
1:09
jailbreaks to write to a kernel memory
1:12
address anything so you can write for
1:13
example this value here to this kernel
1:16
address this pointer which is basically
1:18
an address inside the kernel memory
1:20
space if you can do that it means that
1:22
your exploit runs successfully and of
1:24
course you get access to the kernel
1:25
memory which at that point you can use
1:27
in order to apply patches for jailbreak
1:29
purposes that's for writing and the rk64
1:31
is read kernel 64 which means basically
1:34
reading at a specific pointer so what
1:37
they do here is to run the exploit and
1:39
then check if the exploit works by
1:41
writing a bogus value hex 42 at this
1:44
kernel pointer here then in order to
1:46
check that they do a read with a
1:48
different function at the same pointer
1:50
and of course the result is hex 4242-42
1:53
which proves the fact that they have
1:55
kernel memory written right which means
1:57
that the kernel has been exploited and a
1:59
jailbreak can be made with that then
2:00
they of course list the k object here in
2:02
the kernel slide and by knowing the
2:04
slide you then know where to apply your
2:07
patches for jailbreak purposes so a
2:09
single image shows a lot in this case it
2:12
shows a proper exploit working on 15.1
2:15
shows proper read and write on the
2:16
kernel memory and of course bypass for
2:18
kslr which although not exactly a full
2:21
jailbreak in itself is exactly what we
2:23
would need in order to update uncover or
2:26
taurine in order to basically support
2:28
ios 14.6 14.7 14.7.1 14.8 15.0 15.0.1
2:35
15.0.2 and possibly even 15.1 since this
2:39
is zero day and it works on 15.1 as well
2:42
now will this be released now i have no
2:44
idea whether brideyapp will be releasing
2:46
this they did not say anything about
2:48
releasing they are a developer in our
2:50
community but did not say anything about
2:52
releasing however if they do decide to
2:54
release that will probably be after it
2:56
gets patched which means after ios 15.1
2:59
gets unsigned and that's only the case
3:01
if they decide to report this to apple
3:04
if they don't it may stay unpatched for
3:06
a longer time so right now since this
3:08
isn't patched yet and it's still zero
3:10
day i wouldn't expect it for the next
3:12
couple of months because 15.1 is signed
3:14
and until this gets patched they will
3:16
probably not release it is very valuable
3:18
in its current state as being unpatched
3:20
and working for the currently signed
3:22
version but once it gets released if it
3:24
does it would be useful for updating
3:26
uncover and taurine now for those of you
3:28
who are of course running ios 14.8 or
3:31
lower you can jailbreak with chick rain
3:33
if your device is an iphone 10 or older
3:36
but for those of you on a12 a13 or a14
3:38
it's unfortunately not possible
3:40
currently so you will have to wait for
3:42
uncover now recently uncover has been
3:44
updated to support 14.5.1 14.5 and of
3:47
course 14.4.2 and 14.4.1 and also 14.4
3:51
but unfortunately that's that currently
3:53
we don't have a 14.6 jailbreak for
3:55
iphone 12 or 11 or iphone tennis packs
3:57
and so on so yeah i will keep you
3:59
updated if that gets released but yeah
4:01
it's actually pretty nice and pretty
4:02
interesting thank you for watching i am
4:04
just now till the next time subscribe to
4:06
stay updated and peace out