Skip to content

A very basic App for testing Siguza's v0rtex kernel exploit.

Notifications You must be signed in to change notification settings

talanov/v0rtex-S

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

43 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

v0rtex-S

A work in progress jailbreak, using Siguza's v0rtex kernel exploit.

Currently, we have:

  • r/w kernel access
  • r/w on '/' (root dir, aka disks1s1)
  • AMFI/codesigning patch, hence the ability to run unsigned code
  • SSH access (with included binaries)

Fat creds to stek on the r/w stuff, and originally xerub too.

Offsets

Offsets are currently WIP. We will be updating with new offsets for as many devices as possible ASAP.

The offsets used are for iPhone 7 on iOS 10.3.1 and must be changed if that's not what you're using.

Offsets for iPhone 6S (iPhone8,1) 10.3.2 are also included, however you will have to be a big boy and switch them out yourself in the v0rtex.m file.

To find your own offsets read this guide.

There are a few new offsets you will need to find:

OFFSET_ROOT_MOUNT_V_NODE: nm <kernelcache> | grep -E " _rootvnode$"

OFFSET_CHGPROCCNT: This offset references the string "chgproccnt: lost user"

OFFSET_ROP_LDR_X0_X0_0x10: Simply search for 000840f9c0035fd6 in hex.

OFFSET_KAUTH_CRED_REF: This can be found in the symbols table nm <kernelcache> | grep kauth_cred_ref

Requirements

Xcode and a device running iOS 10.3.x.

About

A very basic App for testing Siguza's v0rtex kernel exploit.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Objective-C 65.6%
  • C 34.0%
  • Shell 0.4%