Jump to content

Evasi0n: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
m Reverting possible vandalism by 197.253.186.162 to version by Spydar007. False positive? Report it. Thanks, ClueBot NG. (1808649) (Bot)
No edit summary
Line 21: Line 21:
}}
}}


'''Evasi0n''', stylized as '''evasi0n''' and spelt with a zero, refers to a [[iOS jailbreaking|jailbreak]] program for iOS 6.0 - 6.1.2 and for iOS 7.0 - 7.0.6. It is known for a portable code base and minimal use of [[arbitrary code execution]]. More than seven million copies of Evasi0n were downloaded and presumably installed in the first four days after release.<ref name="AI DLs 1">{{cite web|url=http://appleinsider.com/articles/13/02/12/evasi0n-jailbreaks-over-7m-ios-devices-update-already-available-for-ios-611|title=Evasi0n 'jailbreaks' 7M iOS devices, update already available for iOS 6.1.1|publisher=[[AppleInsider]]|date=12 February 2013|accessdate=13 February 2013}}</ref> It was released on 4 February 2013. Four of the six exploits used were patched by [[Apple]] on 18 March 2013 with the release of iOS 6.1.3. This meant the end of the original version of Evasi0n. On 22 December 2013, the Evad3rs released a new version of Evasi0n that supports jailbreaking iOS 7.x, known as '''Evasi0n7'''. One major exploit used by this jailbreak was patched by Apple with iOS 7.1 Beta 4, with two more exploits patched with iOS 7.1 Beta 5. Apple's iOS 7.1 fixed all the exploits used by Evasi0n7. <ref name="TW 7.1b5 1">https://twitter.com/iH8sn0w/statuses/425683996664926208</ref><ref name="TW 7.1b5 2">https://twitter.com/iH8sn0w/statuses/430764851405668352</ref><ref name="TW 7.1b5 3">https://twitter.com/iH8sn0w/statuses/430780572093255680</ref>
'''Evasi0n''', stylized as '''evasi0n''' and spelled with a zero, refers to a [[iOS jailbreaking|jailbreak]] program for iOS 6.0 - 6.1.2 and for iOS 7.0 - 7.0.6. It is known for a portable code base and minimal use of [[arbitrary code execution]]. More than seven million copies of Evasi0n were downloaded and presumably installed in the first four days after release.<ref name="AI DLs 1">{{cite web|url=http://appleinsider.com/articles/13/02/12/evasi0n-jailbreaks-over-7m-ios-devices-update-already-available-for-ios-611|title=Evasi0n 'jailbreaks' 7M iOS devices, update already available for iOS 6.1.1|publisher=[[AppleInsider]]|date=12 February 2013|accessdate=13 February 2013}}</ref> It was released on 4 February 2013. Four of the six exploits used were patched by [[Apple]] on 18 March 2013 with the release of iOS 6.1.3. This meant the end of the original version of Evasi0n. On 22 December 2013, the Evad3rs released a new version of Evasi0n that supports jailbreaking iOS 7.x, known as '''Evasi0n7'''. One major exploit used by this jailbreak was patched by Apple with iOS 7.1 Beta 4, with two more exploits patched with iOS 7.1 Beta 5. Apple's iOS 7.1 fixed all the exploits used by Evasi0n7. <ref name="TW 7.1b5 1">https://twitter.com/iH8sn0w/statuses/425683996664926208</ref><ref name="TW 7.1b5 2">https://twitter.com/iH8sn0w/statuses/430764851405668352</ref><ref name="TW 7.1b5 3">https://twitter.com/iH8sn0w/statuses/430780572093255680</ref>


The Evasi0n jailbreak specifically breaches modern security features such as [[address space layout randomization]] for [[kernel space]] and a version of [[launchd]] with a [[hard-coded]] list of exclusive services, which serve device stability as well as [[vendor lock-in]] on iOS - where Evasi0n reads fixed [[data vector]]s to locate the random address of the kernel space and utilizes the /etc/launchd.conf file which launchd processes regardless of the list of exclusive services.<ref name="forbes evasion 1">{{cite web|url=http://www.forbes.com/sites/andygreenberg/2013/02/05/inside-evasi0n-the-most-elaborate-jailbreak-to-ever-hack-your-iphone|title=Inside Evasi0n, The Most Elaborate Jailbreak To Ever Hack Your iPhone|publisher=[[Forbes]]|first=Andy|last=Greenberg|accessdate=23 December 2013}}</ref>
The Evasi0n jailbreak specifically breaches modern security features such as [[address space layout randomization]] for [[kernel space]] and a version of [[launchd]] with a [[hard-coded]] list of exclusive services, which serve device stability as well as [[vendor lock-in]] on iOS - where Evasi0n reads fixed [[data vector]]s to locate the random address of the kernel space and utilizes the /etc/launchd.conf file which launchd processes regardless of the list of exclusive services.<ref name="forbes evasion 1">{{cite web|url=http://www.forbes.com/sites/andygreenberg/2013/02/05/inside-evasi0n-the-most-elaborate-jailbreak-to-ever-hack-your-iphone|title=Inside Evasi0n, The Most Elaborate Jailbreak To Ever Hack Your iPhone|publisher=[[Forbes]]|first=Andy|last=Greenberg|accessdate=23 December 2013}}</ref>

Revision as of 00:44, 27 April 2014

Evasi0n
Developer(s)Evad3rs (pod2g, MuscleNerd, planetbeing, pimskeks)
Stable release
1.5.3
Operating systemMicrosoft Windows, OS X and Linux
Websiteevasi0n.com/iOS6
Evasi0n7
Developer(s)Evad3rs (pod2g, MuscleNerd, planetbeing, pimskeks)
Stable release
1.0.8
Operating systemMicrosoft Windows, and OS X
Websiteevasi0n.com

Evasi0n, stylized as evasi0n and spelled with a zero, refers to a jailbreak program for iOS 6.0 - 6.1.2 and for iOS 7.0 - 7.0.6. It is known for a portable code base and minimal use of arbitrary code execution. More than seven million copies of Evasi0n were downloaded and presumably installed in the first four days after release.[1] It was released on 4 February 2013. Four of the six exploits used were patched by Apple on 18 March 2013 with the release of iOS 6.1.3. This meant the end of the original version of Evasi0n. On 22 December 2013, the Evad3rs released a new version of Evasi0n that supports jailbreaking iOS 7.x, known as Evasi0n7. One major exploit used by this jailbreak was patched by Apple with iOS 7.1 Beta 4, with two more exploits patched with iOS 7.1 Beta 5. Apple's iOS 7.1 fixed all the exploits used by Evasi0n7. [2][3][4]

The Evasi0n jailbreak specifically breaches modern security features such as address space layout randomization for kernel space and a version of launchd with a hard-coded list of exclusive services, which serve device stability as well as vendor lock-in on iOS - where Evasi0n reads fixed data vectors to locate the random address of the kernel space and utilizes the /etc/launchd.conf file which launchd processes regardless of the list of exclusive services.[5]

References

  1. ^ "Evasi0n 'jailbreaks' 7M iOS devices, update already available for iOS 6.1.1". AppleInsider. 12 February 2013. Retrieved 13 February 2013.
  2. ^ https://twitter.com/iH8sn0w/statuses/425683996664926208
  3. ^ https://twitter.com/iH8sn0w/statuses/430764851405668352
  4. ^ https://twitter.com/iH8sn0w/statuses/430780572093255680
  5. ^ Greenberg, Andy. "Inside Evasi0n, The Most Elaborate Jailbreak To Ever Hack Your iPhone". Forbes. Retrieved 23 December 2013.