The device is afterwards redirected to the Apple default Albert activation server. This time I am using a very different kind of server for the "Man in the Middle" (MITM) attack, provided by "doulCi Kitchen", see line 3 of this section. doulCi Kitchen uses an iDevice as a target with a proxy as go between (whether it be a user computer with regular iTunes or any other software used to activate iDevices). You won't even have to patch fairplayd binary because if you understand the logic, you can do whatever you want. PROXY: Could be by wifi, OTA, itunes or other idevice-management software.ĭoulCi KITCHEN: This is the actual 0 day exploit for all iDevices, including a patched lockwdown binary. The following illustration should help explain: As I said before, I am not going to release the tool, but I will briefly outline the concept. doulCi Kitchen uses a very nice and easy idea that provides a better iCloud Activation Lock Bypass that can even be longer, depending on how well it is implemented (I am not going to release the tool, but I'll give you the concept write up explaining how it works ). It follows along the same lines as the first doulCi idea (doulCi Server), but this time a different logic and tools are used. doulCi Kitchen is the new version of doulCi, i.e., doulCi 2.0, and it's a new level of iOS hacking concept.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |