- 找到对应版本的命令
- 打开终端(terminal) 或者 iterm2
- 关闭软件
- 执行命令
- 重新打开软件
| 版本 | 命令 |
// iOS 11 moves OFVariables to const | |
// https://twitter.com/s1guza/status/908790514178301952 | |
// however, if we: | |
// 1) Can find IODTNVRAM service | |
// 2) Have tfp0 / kernel read|write|alloc | |
// 3) Can leak kernel address of mach port | |
// then we can fake vtable on IODTNVRAM object | |
// async_wake satisfies those requirements | |
// however, I wasn't able to actually set or get ANY nvram variable | |
// not even userread/userwrite |
void inject_trusts(int pathc, const char *paths[]) | |
{ | |
printf("[+] injecting into trust cache...\n"); | |
extern uint64_t g_kern_base; | |
static uint64_t tc = 0; | |
if (tc == 0) { | |
// loaded_trust_caches: 0xFFFFFFF008F702C8 | |
tc = g_kern_base + (0xFFFFFFF008F702C8 - 0xFFFFFFF007004000); |
♥<央卫>♥,#genre# | |
CCTV1,http://39.134.115.163:8080/PLTV/88888910/224/3221225642/index.m3u8 | |
CCTV2,http://39.134.115.163:8080/PLTV/88888910/224/3221225619/index.m3u8 | |
CCTV3,http://39.134.115.163:8080/PLTV/88888910/224/3221225647/index.m3u8 | |
CCTV4,http://39.134.115.163:8080/PLTV/88888910/224/3221225621/index.m3u8 | |
CCTV5,http://39.134.115.163:8080/PLTV/88888910/224/3221225633/index.m3u8 | |
CCTV5+,http://39.134.115.163:8080/PLTV/88888910/224/3221225649/index.m3u8 | |
CCTV6,http://39.134.115.163:8080/PLTV/88888910/224/3221225650/index.m3u8 | |
CCTV7,http://39.134.115.163:8080/PLTV/88888910/224/3221225624/index.m3u8 | |
CCTV8,http://39.134.115.163:8080/PLTV/88888910/224/3221225635/index.m3u8 |
vSphere 6 Enterprise Plus: | |
1C20K-4Z214-H84U1-T92EP-92838 | |
1A2JU-DEH12-48460-CT956-AC84D | |
MC28R-4L006-484D1-VV8NK-C7R58 | |
5C6TK-4C39J-48E00-PH0XH-828Q4 | |
4A4X0-69HE3-M8548-6L1QK-1Y240 | |
vSphere with Operations Management 6 Enterprise: | |
4Y2NU-4Z301-085C8-M18EP-2K8M8 | |
1Y48R-0EJEK-084R0-GK9XM-23R52 |