binaries for 4-digit passcode bruteforce
includes kernel binaries with aes accelerator uid patch applied:
- iPhone4,1 6.1.0 (10B142)
- iPhone5,1 7.1.2 (11D257)
- iPhone5,1 9.0.2 (13A452)
- iPhone5,2 9.0.2 (13A452)
- iPod5,1 9.0.2 (13A452)
see the linked gist for a guide to offline kernel patching
includes userspace binaries built for armv7 ios w/ minimum ios version 6.0
use the appropriate patched kernel instead of the stock kernel when booting your device. for example, hardcode this line in legacy ios kit to point to where you downloaded this kernel instead of the file in the ramdisk dir.
once the ramdisk is booted, scp these binaries to your device (to e.g. /mnt2/tmp) then add executable flag (chmod +x)
try executing /mnt2/tmp/hello to ensure the toolchain works
then try running /mnt2/tmp/bruteforce -u
the -u flag is important (at least for A5 iOS 9)
if it outputs any errors before starting to print numbers, it will not work. kill with ctrl+c and share the output with me.
if it runs successfully, nice.
Can you help me patch the 3 kernels?
iphone 5,2 ios 6
iphone 4,1 ios 9
ipod 5.1 ios 6