Hacker Crack Into iOS Device

Security company FireEye claims that hackers have found a way to crack into iOS devices through the help of malicious apps.


It wasn’t too long ago when people who owned Apple devices could feel relatively safe from the prying eyes of hackers, but times have changed.
Until recently, most hackers focused on Windows machines because they constituted the biggest target. However, researchers have been finding more security holes in machines containing Apple operating systems as of late, making them prime for hacks.
Security company FireEye issued a report this week that claims that hackers have found a way to break into iOS devices with the help of legitimate-looking but malicious apps downloaded to one’s phone.
FireEye learned of the hacks by examining roughly 400 GB of corporate data that was leaked when hackers breached the cybersecurity firm Hacking Team. That data breach was notable because the security firm worked with several governments, including Uzbekistan, Egypt and, Sudan’s intelligence service.
While FireEye warned of the possibility of these so-called masque attacks before, the company claims that it’s recent discovery is the first time that the attacks have actually occurred outside of a test lab environment. Masque attacks happen when an unwitting person downloads a malicious app to her Apple

iPone 7 iCLoud Bypass Over Serial Port

Automatic SSH Ramdisk

SSH Ramdisk Chip A5

Automatic SSH Ramdisk make loader never update for A5.
SSH Ramdisk just work under iPhone 4. But we get any idea how to forward tcp port or serial port for ssh that worked for a5 as iPhone 4s and iPad 2.

Sometime i tried how to ssh locked iPhone using serial. What do u need to this,,

Download Nmap to grab Usb serial port from iPhone and Filezilla. After Nmap installed, Open Terminal 

1. Plug your idevice to the mac
2. Open the terminal and type sudo nmap -Pn (your Idevice IP)



3. You need usbmuxd and itunlmux to forward port for shh


4. After Device connectd for port forwarding, now start filezila

Host is your idevice IP , username "root" and password "alpine" port 2222



5. go to application and delete setup.app

Hacker Realesed Untether Jailbreak Ios 8.4.1

Hacker realesed full jailbreak iOS 8.4.1

Jailbreak users, as you might know by now, Apple has released iOS 8.4.1 for supported iPhone, iPad and iPod touch devices. If you’re a jailbreaker and have your device already jailbroken on either iOS 8.4, 8.3, 8.2 or 8.1.3, here’s what you need to know.
During the beta stages of iOS 8.4.1, there were rumors flying around regarding TaiG jailbreak exploits being patched by Apple in the latest 8.4.1 release. While neither has TaiG or any of the prominent jailbreak developers have confirmed this till date, it is best to sit tight for now on older version of iOS and DO NOT update to 8.4.1 until there’s any confirmation for it on jailbreak front. It’s better to be safe than sorry. You’ve been warned.

Existing jailbroken users may also want to give Cydia Impactor a try which basically lets a jailbroken device unjailbreak and return to stock-like state without having to restore using iTunes. You can find our guide on Cydia Impactor here: How To Unjailbreak iOS To Stock Without Updating To Latest Version With Cydia Impactor.
Update x1: It is now confirmed. Apple has patched eight exploits in iOS 8.4.1 used by TaiG iOS 8.4 jailbreak along with forty other security bugs. You can read more this here: Apple Has Patched TaiG Jailbreak Exploits In iOS 8.4.1.

Zerodium Exploit

Zerodium Exploit
The market for unpatched vulnerabilities has grown so much that an exploit reseller is willing to pay $1 million dollars for an attack that can compromise iOS 9 devices.
Zerodium, an exploit acquisition company, promises to pay $1 million to researchers who can provide it with an “exclusive, browser-based, and untethered jailbreak for the latest Apple iOS 9 operating system and devices.”
In the context of iOS devices, jailbreaking refers to bypassing the security restrictions enforced by the mobile operating system in order to install applications that haven’t been authorized by Apple and are not distributed through the official app store.
The process involves chaining together exploits for different vulnerabilities in the OS and its components in order to gain the highest possible privilege on the system—root access.

New Jailbreak Realesed For Ios 9.0.1 - 9.1

The first jailbreak for iOS 9 has been released within four months of Apple making beta versions of its mobile operating system available to the general public. The jailbreaking process gives iPhone users the ability to gain control over aspects of the device which are otherwise locked down by Apple, including the ability to install apps from sources other than the official App Store.
Popular Chinese hacker team Pangu is claiming to have developed the first publicly available'untethered jailbreak tool' for iOS 9 which it says can work on devices running all iOS 9 release to date: iOS 9.0, iOS 9.0.1, and iOS 9.0.2. The supported device list includes the new iPhone 6s and iPhone 6s Plus apart from older iPhones, iPads, and iPad touch models. The jailbreak tool is only available for Windows at the moment, though a version of OS X for Mac users is expected to be released soon. Developers have already started using the new jailbreak tool to tweak their devices. Steve Troughton Smith posted on Twitter that he has developed a jailbreak tweak to enable the split-screen feature of iOS 9 on the iPad Air.

New 2015 DNS Bypass iCloud

Cloud Activation Lock Bypass Server is very useful method for those who have iCloud Activation Locked device.

Many people has iCloud Activation Lock because they bought locked devices or because they accidentally activated the lock.When an iPhone (or other iDevice) is locked you’ll see a message like the one in the image, requesting Apple ID and Password.


This method will permit you to unlock some of the main iOS device features (it will not unlock all the iOS features, only the main features).
It will work on iOS 7.0 up to iOS 8.4.1. 
iCloud Activation Lock Bypass Server Method


To iCloud Lock Bypass using a Server, follow these steps to get back the main functionalities of your iDevice:
  1. Reset you device.
  2. “> Slide to set up” under “Hello screen”.
  3. Select your language and country.
  4. Choose you local Wifi network; Tap Next.
  5. When you get the “Activate iPhone Screen” tap Home Button once.
  6. Tap Wifi settings (check Image 1).
  7. Tap the “i” icon corresponding to your Wifi network (check Image 1).
  8. Tap DNS Server field > Select All > Delete the IP you have in this field > Paste the IP from one of the iCloud Activation Servers you see bellow. For example: “104.155.220.58“.
  9. Tap Back > Done.
  10. Tap Activation Hello.
  11. Tap “Menu“.

New iCloud Bypass IOS 9.0.2

Bypass iOS 9.0.2 iCloud And Built custom Root
As long as we know, asr doesn't verify a copy iOS ramdisk, so i have some trick how to built root ramdisk with asr verification. 
1. Decrypt root file system key from ipsw. 

2. Mount the filesystem and delete setup.app
3. Copy the Trek-5.5.00.Release.plist and Trek-5.5.00.Release.bbfw form Firmware folder inside IPSW to Volume/usr/standlone/update/ramdisk
4. Go to Volume/Filesystem/CoreService and Modify System.Version.plist 
5. Format all DMG as read only or UDZO
6. to verify asr image scan 

6. To bypass ramdisk asr verification you should run this command

7. Now crack the ipsw with this command line 
zip -r iPhone4.1_8.3_12H321_Restore.ipsw Firmware 058-24033-023.dmg 058-24104-023.dmg 058-24341-023.dmg BuildManifest.plist kernelcache.release.n94 Restore.plist