-
#Jtool2 (CAI) is becoming future proof: Not only does it support all Code signing algorithms (SHA1 through SHA-512!), but also#joker - the#kernelcache#symbolication module - now uses an external argument pattern matching file, to easily edit and add any pattern you like!pic.twitter.com/XDgK1IYje6
-
Happy new decade!
#jtool (v1) is officially decommissioned for good as#jtool2 (LXR) gets new & improved codesign capabilities, leaving ldid in dust! --stripsig, +ent=(comma separated ents or filename), JENTS=(ents to add to any signature) and more! http://newosxbook.com/forum/viewtopic.php?f=3&t=19577&p=24167#p24167 … -
Just after achieving 100% MIG is_iokit_subsystem coverage in
#MOXiI2, AAPL pulls a surprise move of adding two new MIG calls (2888/2889) in iOS 13.2 *Sigh*. Detected by#Jtool2's#joker (--analyze). BVX2 format I mentioned yesterday is now supported. http://newosxbook.com/forum/viewtopic.php?f=3&t=19577&p=24136#p24136 …pic.twitter.com/aFCNz4uvNM
-
Some iOS 13.2 kernelcaches are apparently BVX2 compressed (and others still have other surprises ;-)
#jtool2 final release (which I still owe the world, before I can put Darwin behind me) will extend native less/lzvn compressed kernelcache handling for this too. Stay tuned. -
#Jtool2 (BDA) update: bug fixes, more iOS13 symbols. And - finding references to addresses in a hard-fused kernelcache, even if the pointer is tagged. Can your non-free disassembler do that? Maybe. Maybe not. Or maybe in its next version it will ;-) http://newosxbook.com/forum/viewtopic.php?f=3&t=19577&p=24122#p24122 …pic.twitter.com/fh5Qxla6CR
-
-
La Casa de PaPeL: A detailed write up and tutorial on reverse engineering Apple's Page Protection Layer (
#PPL) in#iOS12 and#A12 chips, with just#jtool2 and any Kernelcache.release.iphone11 of your choice: http://ow.ly/t6rl30nUhGZ Vía@Morpheus______ -
Just Pinned to Smartphone & Tablette: VideoTuto - iOS 12 / iOS 11.4.1 / iOS 11.4 JAILBREAK UPDATE / NEWS & JTOOL2
#jailbreak#jtool2#update https://ift.tt/2Gv0vAM https://ift.tt/2R5xfo3 pic.twitter.com/gk8uZjdqMb
-
It can extract "pull" any file from a DMG. The demo version will continue to support that. You'll need a full version to do so from a live filesystem. And with
@Morpheus______ 's#jtool2 you can analyze the dylibs/frameworks directly in the cache, rather than suffer decaching. -
#Jtool2 now has new "--tbd" feature, to produce TBDv3 files (needed for linking with private frameworks which AAPL foolishly thinks they'll prevent by removing from the SDK..). You can generate them by working directly off of the shared library cache. http://newosxbook.com/forum/viewtopic.php?f=3&t=19577#p23696 …pic.twitter.com/9Rn6l0MgVK
-
#jtool2(α3) supports ARMv8.3 instructions and PAC registers, and integrates#joker so you can symoblicate close to 1,000 important functions in 1469 stripped kernelcaches with new —analyze option http://newosxbook.com/forum/viewtopic.php?f=3&t=19577&p=23662 …pic.twitter.com/YeVrBFf2cI
-
#JTool2 (α) now works directly on *compressed* kernel caches, and getting functionality of#Joker, including symbolication & disassembly. Kextraction - soon (< iphone11,x), but#jtool2 will work on kexts directly in cache. Please try http://NewOSXBook.com/tools/jtool2.tgz … - feedback welcomepic.twitter.com/jAzUXSRl8I
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
I'll still sel…