0:00
what's going on youtube gsn right here
0:02
today we're discussing about a new
0:03
safari based jailbreak that has been
0:06
currently developed this video is
0:07
brought to you by any unlock a software
0:08
that allows you to unlock the screen
0:10
passcode unlock apple id bypass mdm on
0:12
your device and even remove the itunes
0:14
backup encryption if you forgot your
0:16
backup password it happens to me quite a
0:18
lot check the program out in the link
0:20
below so a couple of days ago a member
0:22
of my discord server called kanji tagged
0:25
me into this quote obtaining the object
0:27
capable of performing arbitrary reading
0:29
right on 14.6 through safari so as you
0:32
can see they're demonstrating here the
0:34
beginning of a safari based jailbreak
0:36
and it actually uses a webkit exploit
0:38
which is actually quite nice now
0:40
according to kanji this is basically
0:42
going to be pawn my but continued since
0:44
our pawn age and the manticore stopped
0:46
being a thing so they are not working on
0:49
it anymore they stopped working on pawn
0:51
my which was supposed to be an ios 14.5
0:53
webkit or sapphire-based jailbreak kanji
0:56
decided to take the project over in a
0:58
couple of days later they posted this
1:00
quote full read and write primitives for
1:02
safari sandbox needs a lot more to tie
1:04
in a kernel exploit and they posted this
1:07
a picture of their current log where
1:09
they set up the exploit the webkit
1:11
exploit and basically have it run now
1:13
later they posted this to clear this up
1:15
it's still very work in progress it's
1:17
only safari sandbox and we don't have
1:19
arbitrary code execution yet and the
1:21
last bit of information we got about
1:22
this is this quote as for now it looks
1:25
like a12 plus doesn't natively have
1:27
support for adc due to pointer
1:29
authentication codes we would need to
1:31
either find a zero day or a pointer
1:33
authentication code bypass now pointer
1:35
authentication code bypasses have been a
1:37
thing and are a thing people do develop
1:39
them quite a lot because they are
1:41
required for jailbreak purposes nowadays
1:43
particularly on iphone 12 and iphone 11
1:46
and tennis tennis max and so on the a12
1:48
plus devices those have pack and
1:50
therefore neat pack bypasses so that
1:52
wouldn't necessarily be something that
1:54
they cannot get since a lot of these are
1:56
developed but let's see exactly what
1:58
kanji's intentions are they sitting here
2:00
quote an announcement for my current
2:02
project i am working on a jailbreak more
2:04
specifically getting into the scene and
2:06
learning since manticore is dead i
2:08
wanted to take upon my and work on it
2:11
myself and use it to gain knowledge so
2:13
this is a new jailbreak developer
2:15
they're trying to understand how things
2:17
work jailbreak development is not easy
2:19
it's actually tremendously difficult and
2:21
not very well explained not very well
2:23
documented so to get into jailbreak
2:26
development is not exactly easy what
2:28
they're trying to do is to create an ios
2:30
14.5 14.6 and someone safari based
2:33
jailbreak based on the initial pawn my
2:36
but of course using newer exploits and
2:38
so on and it appears that they got some
2:40
sort of initial demo working over here
2:42
obtaining the object capable of
2:44
performing arbitrary reading right on
2:46
14.6 that's great so if you want to you
2:48
can definitely follow kanji here this is
2:50
their account and if you want to see
2:52
their progress definitely do follow them
2:54
for now it's very work in progress but
2:56
if they do succeed that would definitely
2:58
be very cool granted it's for 14.6 and
3:01
14.5 and so on but nothing stops them
3:04
from expanding it in the future to ios
3:06
15. because webkit exploits do tend to
3:08
be released from time to time thank you
3:10
for watching imgsnow till the next time
3:12
subscribe to stay updated and peace out