Sunday, June 29, 2014

Pangu team moves away from i0n1c's exploit for iOS 7.1.x jailbreak

pangu featured image

The Chinese developer team behind Pangu today released a new version of their jailbreak tool that adds Mac support, an English interface and also swaps out i0n1c’s vulnerability in favor of a new exploit.

Pangu v1.0 used exploits found by Stefan Esser aka i0n1c that were disclosed to students of his iOS hacking training course, which he understandably wasn’t pleased about.

Pangu v1.1 swaps out i0n1c’s exploit in favor of a new one that lets you do an untethered jailbreak on devices running iOS 7.1 and iOS 7.1.1. The new vulnerability however means that the Pangu team unnecessarily burned two exploits, as i0n1c tweeted:

i0n1c alleges that the Pangu team bought these exploits after releasing v1.0, and hence v1.1 came out a week later that moved away from i0n1c’s vulnerability:

It’s quite strange that the Pangu team chose to swap exploits for the same iOS version, when they could have saved these vulnerabilities for iOS 7.1.2 or iOS 8. This is of course, assuming that the new vulnerabilities wouldn’t have been patched by Apple in future releases.

Apart from using new exploits, Pangu v1.1 adds Mac support, an English interface and removes the Chinese pirated App Store that was earlier bundled with the tool. Head to this post for step-by-step instructions .

What do you think about Pangu using new exploits for the same iOS version? Let us know in the comments below.

Like this post? Share it!

No comments:

Post a Comment

Search This Blog