Root

Brandon Plank says rootlessJB for iOS 14.0-14.3 may launch within two weeks

Matrix code hacked iPhone.

Shortly after the unveiling of the brand-new cicuta_verosa kernel exploit for all devices running up to and including iOS 14.3, renowned jailbreak developers and hackers began investigating its viability.

While much of the initial spotlight shined on Odyssey lead developer CoolStar to create an iOS 14-compatible jailbreak with the novel cicuta_verosa exploit, it seems that even Brandon Plank, another name that resonates positively with the jailbreak community, will be going hands-on with it.

Redditor demos Android device being used to run the checkra1n jailbreak

The bootrom exploit-based checkra1n jailbreak initially started out as a macOS-only utility for pwning compatible iOS devices, but it soon picked up official Linux support in a later update.

While the circumstances still aren’t ideal for Windows users, it is both possible and somewhat easy to dual-boot Linux on a Windows PC. But that may not be entirely necessary if you have certain Android devices laying around…

New concept reimagines the process of changing a jailbroken handset’s root password

Anytime you jailbreak an iOS device, one of the first things you’re ever advised to do is change your handset’s root password, which is commonly used to access elevated privileges in mobile terminal when entering complex commands. The password is always “alpine” out of the box, but users can change this to almost anything they want to increase their handset's security from a commonly-known password.

As imperative as changing the root password may be, many jailbreakers either forget to do so or shrug off its importance. For that reason, we’re particularly fond of a sleek concept that was shared to /r/jailbreak over the weekend that rethinks the way jailbreakers will interact with their root password after jailbreaking their handset for the first time.

Pwn20wnd achieves rootfs remount with read/write privileges on A12(X)

Hacker and unc0ver lead developer Pwn20wnd hasn’t made any significant revisions to the unc0ver v3.0.0 pre-release for a few days now, and as you might come to expect, that’s because he’s been busy attempting to pwn A12(X) devices.

If you fall under the category of ‘currently waiting for A12(X) support,’ then you’ll be excited to hear that Pwn20wnd has made some progress. A Tweet shared Monday afternoon reveals that the hacker has officially achieved a rootfs remount with read and write privileges on his A12 test device:

Unc0ver v3.0.0 pre-release revised with rootfs remount support on iOS 12 & more

Hacker and unc0ver lead developer Pwn20wnd appears to have been busy this weekend, revising the unc0ver v3.0.0 pre-release jailbreak tool at least five more times since Saturday afternoon. Betas 22-26 include the brand-new rootfs remount that surfaced yesterday afternoon compliments of hacker and software tinkerer @MiscMisty.

Pwn20wnd took to Twitter this morning to announce the bulk of those revisions and elucidate what they represent:

Attach root filesystem files to any iMessage or SMS on a jailbroken device with MessageFile

Your iPhone’s native Messages app incorporates a button for attaching photos and videos from your Photo Library, but wouldn’t it be nice if you could also attach general filetypes from your jailbroken handset’s filesystem much like you already can on macOS?

If you answered yes to the aforementioned question, then you’ll be ecstatic to learn about a free jailbreak tweak called MessageFile by iOS developer Julio Verne. Just as the name implies, MesseageFile lets you choose and send any file from your iPhone or iPad’s root filesystem over iMessage or SMS directly from the native Messages app.

Dangerous macOS High Sierra bug allows full admin access, here is how to protect your Mac

A potentially serious bug has been discovered by developer Lemi Orhan Ergin‏ that allows anyone to gain root access to your machine by attempting to login with the username "root" and leaving the password blank. The vulnerability can easily be replicated, but fortunately, there is a simple workaround to fix the problem on your Mac until Apple releases a patch.

About OS X System Integrity Protection aka ‘Rootless’ and how to disable it

All Macs with OS X El Capitan installed on them have a new layer of security known as System Integrity Protection, which has been given the nickname 'Rootless' because it closes off a lot of system files to user access to prevent malicious programs and code from causing harmful changes to the core of OS X.

For some, the added security feels like a must for protection of your personal information, but for more advanced users who poke their noses into system files quite often, the feature can get in the way and prevent user modifications to the operating system. In this tutorial, we'll give you an overview of System Integrity Protection and show you a way to disable it.