Exploit

Hacker Jake James gets time_waste tfp0 exploit working on iOS 12

Matrix code hacked iPhone.

It was only yesterday that talented hacker and iOS exploit tinkerer Jake James released time_waste, a reworked version of Brandon Azad’s oob_timestamp tfp0 exploit. Time_waste solves many of the memory leak issues that were present in the oob_timestamp exploit, and given the apparent enhancements, it’s not difficult to see why Pwn20wnd switched to using James’ exploit for the unc0ver jailbreak instead.

But while the aforementioned advantages are obvious, that didn’t stop James from taking things a step further. Just this afternoon, James announced via Twitter that he had managed to get the time_waste tfp0 exploit working on iOS 12; moreover, it even seems to play nicely with A8X-equipped devices:

Upcoming unc0ver update will support iOS 13.0-13.3 on A8X-A11 devices

Ever since the unc0ver jailbreak picked up support for iOS 13.0-13.3 with Brandon Azad’s oob_timestamp exploit (and more recently, Jake James’ time_waste exploit), this support has been limited to A12(X)-A13 devices. Pwn20wnd was rather noncommittal with regards to adding support for A8-A11 devices since they’re already supported by the bootrom exploit-based checkra1n jailbreak, but that could now be on the verge of changing.

According to Tweets shared just this morning by Pwn20wnd, it seems that support for A8X-A11 devices on iOS 13.0-13.3 is very near to becoming a reality:

Jake James rewrites oob_timestamp exploit as Pwn20wnd plans integration with unc0ver

Those who’ve been keeping close tabs on the jailbreak community as of late should be keenly aware of Brandon Azad’s oob_timestamp exploit, which made iOS 13.0-13.3 support for A12(X)-A13 devices via the unc0ver jailbreak possible. As wonderful as it is, the oob_timestamp exploit isn’t without its shortcomings, such as memory leaks.

Given the aforementioned circumstances, a series of Tweets shared early this morning by renowned hacker Jake James may be considered great news for the jailbreak community:

Unc0ver v4.0.2 released to address issues with jailbreaking iOS 13.0-13.2.3

The unc0ver jailbreak received official support for iOS 13.0-13.3 on A12(X)-A13 devices over the weekend thanks to Brandon Azad's OOB Timestamp tfp0 exploit, but from what we can gather, the release wasn’t without its initial flaws as a plethora of users reported issues when trying to jailbreak versions of iOS older than that of 13.3.

Fortunately for those affected by the aforementioned issues, Pwn20wnd has released yet another update for unc0ver to address them, this time bringing the jailbreak tool up to version 4.0.2. The hacker announced the update via Twitter just this afternoon:

Unc0ver v4.0.0 adds support for A12(X)-A13 devices on iOS 13.0-13.3

Those who’ve keenly waited for the unc0ver jailbreak to officially support A12-A13 devices running iOS 13.0-13.3 devices by way of Brandon Azad’s oob_timestamp tfp0 exploit will be happy to know that the wait is finally over.

In a Tweet shared just this afternoon, project lead developer Pwn20wnd launched unc0ver v4.0.0 with support for the aforementioned device types and firmware versions:

Unc0ver enters internal testing with support for A12(X)-A13 running iOS 13.0-13.3

Hot off the heels of a plethora of teasers that have been shared over the course of the past couple of weeks, Pwn20wnd has officially commenced an internal beta testing phase for the unc0ver jailbreak with iOS 13.0-13.3 support on A12(X)-A13 as of Wednesday afternoon – a feat made possible with Brandon Azad’s oob_timestamp tfp0 exploit.

The news surfaced by way of Pwn20wnd’s official Twitter account, which earlier this morning noted that unc0ver would soon move into the internal testing phase. A few short hours later, internal testing officially began:

Pwn20wnd touts notable progress on iOS 13.3 support in unc0ver jailbreak

If you’re avidly following the latest developments in the jailbreak community as of late, then you might be excited to learn that hacker and unc0ver lead developer Pwn20wnd has made swift and substantial progress on implementing Brandon Azad’s newly-released oob_timestamp tfp0 exploit for iOS 13.3 into the unc0ver jailbreak.

Throughout the past hour, Pwn20wnd has shared a plethora of status updates regarding his progress. Perhaps one of Pwn20wnd’s most notable Tweets was that he had successfully bypassed the mitigations in place by Apple to trump his codesigning bypass, which is claimed to be “the biggest part of the jailbreak on A12(X),” and apparently, on A13 too:

Brandon Azad officially releases OOB Timestamp exploit for iOS 13.0-13.3

Several days ago, hacker and iOS security researcher Brandon Azad took the jailbreak community by storm when he said he would soon be releasing a new kernel exploit proof-of-concept targeting the iPhone 11 on iOS 13.3. It didn’t take long after that for unc0ver jailbreak lead developer Pwn20wnd to add that unc0ver would likely receive an update incorporating the new exploit.

The teasers have awakened a brand-new audience in the jailbreak community, namely those handling Apple’s latest handsets like the iPhone 11 and variants of the iPhone 11 Pro. But all that hype aside, Azad officially released his new kernel exploit proof of concept Friday afternoon, and he’s calling it OOB Timestamp:

Pwn20wnd touts progress on PAC-less tweak injection on iOS 13

If you’ve been following the jailbreak community as of late, then you’ve undoubtedly caught wind of Pwn20wnd’s plethora of recent announcements regarding the potential synergy between the unc0ver jailbreak tool and Brandon Azad’s yet-to-be-released tfp0 exploit.

Azad’s exploit was initially revealed to work on the iPhone 11 running iOS 13.3, and according to Pwn20wnd, it should also be viable on A12(X) devices and with all firmware versions between iOS 13.0-13.3. At the same time, Pwn20wnd cited three notable hurdles that would need to be dealt with if tweak injection was to work in the PAC-less implementation on iOS 13 via unc0ver.

Last chance to downgrade to iOS 13.3 on A12/A13 for potential jailbreak eligibility

The news that hacker and iOS security researcher Brandon Azad would be releasing a tfp0 exploit POC for the iPhone 11 on iOS 13.3 took the jailbreak community by storm, and it didn’t take long before unc0ver lead developer Pwn20wnd responded with plans to update unc0ver when it gets released.

Many questions have been circulating about whether this exploit would work on older devices or whether it would support older versions of iOS. Fortunately, Pwn20wnd has taken to Twitter to answer many of these questions and to prepare the jailbreak community for great things to come.

Brandon Azad plans to release a new exploit for iPhone 11 on iOS 13.3

Avid jailbreakers sporting any of Apple’s latest A13-equipped handsets have yet to see any official jailbreak solutions for their particular devices. But could that change in the foreseeable future?

Hacker and iOS security researcher Brandon Azad took to Twitter Tuesday afternoon to announce an exceptional tidbit of news – namely that he would release a proof-of-concept exploit that can achieve read/write on an iPhone 11 running iOS 13.3: