0:00
what's going on youtube jsnorwright here
0:02
so in today's video i do have some great
0:04
news for those of you waiting for a
0:05
jailbreak one has been demonstrated by a
0:08
security researcher this video is
0:10
brought to you by enemy trans a software
0:11
that allows you to manage the photos
0:13
music videos and apps and so on on your
0:16
device you can also drag and drop files
0:17
to your device directly from your
0:19
computer check it out in the link below
0:21
so as you probably know a couple of days
0:23
ago sargamar posted one of their
0:24
vulnerabilities and a complete write up
0:26
on how to use it how to trigger it and
0:29
so on and of course this is actually
0:31
compatible with ios 15.0.1 and lower it
0:34
has been patched on 15.0.2 as it says in
0:37
here now a couple of hours ago pattern f
0:40
another security researcher whose
0:41
vulnerabilities we have used in the past
0:43
in various jailbreaks posted quote write
0:46
a jailback demo for cve 2021 30883
0:49
1615.0.2 by tsar amar on iphone 11 on
0:52
ios 14.0 why 14.0 i just want to verify
0:56
if the vulnerability is exploitable the
0:58
code is based on the old ipc kmsg hack
1:01
the exploit has better speed than
1:03
securavarosa so if you go ahead in here
1:05
and check it out they do actually show
1:07
how they attempt to jailbreak that
1:09
device the video isn't exactly very
1:11
clear you can see the video has a very
1:13
poor resolution but they do use this
1:15
vulnerability released by sar amar and
1:17
they are actually able to exploit it in
1:20
order to create a jailbreak demo now
1:22
granted it works on 14.0 in here because
1:25
15.0 is a whole different can of worms
1:28
but it does prove that the vulnerability
1:30
is indeed exploitable now what suramar
1:32
released in here was a proof of concept
1:34
so basically the vulnerability itself
1:37
and how to use it how to trigger it in
1:38
order to panic the device and make it
1:40
reboot but not an exploit that would be
1:42
usable for jailbreak what pattern f did
1:45
was to take that and create an exploit
1:47
for it in order to be able to access
1:50
some files and of course semi-jailbreak
1:52
the device and get access to ssh and so
1:55
on so that's a completely different
1:56
animal in there so theoretically you can
1:59
make this work on 15.0.1 and lower so if
2:02
you do that that would support 15.0.1
2:05
15.0 14.8 14.7.1 14.7 and all the way
2:09
down to 14.0 now in the light of these
2:12
events people ask me if they should
2:14
actually update ios 15.0 for an upcoming
2:17
jailbreak and my answer remains the same
2:20
don't if you're running 14.8 state there
2:23
14.7.1 14.7 anything stay on 14 point
2:27
something do not update the 15.0 because
2:29
even though this vulnerability works on
2:31
15.0.1 and 15.0 as i mentioned in my
2:35
other videos there are more hurdles to
2:37
pass on 15.0 for example the jailbreak
2:39
cannot touch the root fs so we cannot
2:41
remount we have to go rootless because
2:44
otherwise the device will panic and
2:45
reboot in dfu mode and it will require a
2:48
restore before you can use it again so
2:50
ios 15 has multiple other things that
2:52
need to be patched we don't only need
2:54
this exploit here so i would definitely
2:56
recommend it to stay on 14.8 or lower
2:58
because those do not have that rule fs
3:00
protection so we can remount properly
3:03
and we can create a proper jailbreak
3:05
like uncover or taurine on ios 14.8 and
3:08
lower for 15.0 and 15.0.1 i'm sure there
3:12
will be a jailbreak eventually and it
3:13
will very likely use this vulnerability
3:15
here but for now it's much better to
3:17
stay on 14.8 or lower so that's
3:20
basically it a quick news flash for you
3:22
guys it has been demonstrated basically
3:24
a jailbreak with ssh and so on so that's
3:26
actually great but still we need to wait
3:28
a bit more thank you for watching imgs
3:30
now till the next time subscribe to stay
3:32
updated and peace out