Exploit

KeenLab teases jailbroken iPhone XS Max on iOS 12.1

Every time Apple releases a major new software update for its iOS device lineup, it seems like the talented security researchers over at KeenLab are the first to jailbreak it.

KeenLab was the first to demonstrate a proof-of-concept jailbreak on iOS 12.0 in June and iOS 11.3.1 in April, but now it seems the security firm has found a backdoor into Apple’s iOS 12.1 update, which was only released last week.

Pwn20wnd releases unc0ver V1.1.2 to improve exploit success rates

Pwn20wnd’s unc0ver jailbreak tool for iOS 11.0-11.4 beta 3 received a notable update on Sunday with improved success rates for both the Empty_List (VFS) and Multi_Path (MPTCP) exploits that it utilizes to pwn Apple handsets.

Pwn20wnd announced the updated version of unc0ver via his Twitter account, which came just hours after unc0ver V1.1.1:

How to use Ignition to install the unc0ver jailbreak without a computer

Pwn20wnd’s unc0ver jailbreak tool has been receiving lots of updates lately, and if you’re like me, then you’re not always at a computer to download them. Fortunately, a handy online tool called Ignition can help you sidestep Cydia Impactor when you’re nowhere near your computer.

In this tutorial, we’ll walk you through how to use the online Ignition utility to install the unc0ver jailbreak on your iOS 11.0-12.4.1 iPhone or iPad [up to A12(X)] without a computer.

Apple is no longer signing iOS 12.0

On Monday, Apple stopped signing iOS 12.0, making it impossible to downgrade from iOS 12.0.1 to iOS 12.0. The move also compels those on iOS 12.0 to upgrade to iOS 12.0.1 when attempting a restore via iTunes.

The news shouldn’t come as much of a surprise since the Cupertino-based tech company released iOS 12.0.1 to the public just over two weeks ago. Apple typically stops signing firmware approximately 14 days after releasing a new version to facilitate software upgrades among its user base.

Unc0ver V1.0.2 released with fix for RootFS Restore issues on iOS 11.0-11.2.6 devices

Over the weekend, Pwn20wnd released unc0ver V1.0.1 to disable the integrated RootFS Restore feature because of a problem that appeared to impact certain handsets running firmware versions between iOS 11.0 and 11.2.6. But as it would seem, the clever hacker found a way to circumvent it.

In a bevy of Tweets shared Monday afternoon, Pwn20wnd denoted how the problem appeared impact handsets with pending OTA updates downloaded on them. Upon discerning the cause of the issue, the hacker responded by releasing unc0ver V1.0.2.

Unc0ver V1.0.1 released to address an issue with the integrated RootFS Restore feature

It was only yesterday that Pwn20wnd’s unc0ver jailbreak for iOS 11.0-11.4 beta 3 was officially brought out of its beta stages, but the tool has since received its first update following the release of V1.

Sunday’s update, dubbed unc0ver V1.0.1, aims to prevent known problems with the RootFS Restore feature on iOS 11.0-11.1.2 handsets. As it would seem, it was implemented in an unsafe manner that compelled some users to restore via iTunes and lose their jailbreak.

Unc0ver jailbreak officially ‘out of beta’ following release of V1

It’s only been about a week since iOS hacker Pwn20wnd first launched the unc0ver jailbreak tool for iOS 11.0-11.4 beta 3; nevertheless, it has already received a bevy of incremental updates from RC1 to RC9.

As of Saturday afternoon, however, it appears we’re officially out of the beta-esque RC stages. Pwn20wned officially launched what’s being dubbed unc0ver V1, and it apparently ties up many of the tool’s known loose ends.

As promised, Ian Beer publicizes iOS 11.4-11.4.1-centric exploits

Matrix code hacked iPhone.

About a month ago, renowned security researcher Ian Beer announced plans to publicly release iOS 11.4-11.4.1-centric exploits as hacking focus shifted over to Apple’s newer iOS 12 release. It’s been near-radio silence since then, but as of today, those exploits are officially public.

As it would seem, Beer’s latest batch of iOS security exploits encompass the following: