November 21, 2024
Geohot Reverses iOS 7 Evasi0n Jailbreak, Posts Write-up [Read]

Geohot Reverses iOS 7 Evasi0n Jailbreak, Posts Write-up [Read]

Posted December 24, 2013 at 1:58am by iClarified
Geohot has reversed the iOS 7 evasi0n jailbreak and posted a write-up of his findings.

This writeup takes place from the perspective of evasi0n7. Fuck secrets. Note that this writeup doesn't help Apple, I got this by reversing the public evasi0n binary, which they can, and do do. Also note, I found nothing sketchy in my reversing, your phones most likely aren't being backdoored by Chinese. If I ever touch jailbreaking again, which is unlikely(until ARM128 comes out, I only touched the game again for the love of ARM64), no more secrets. Full disclosure time, I was working on a public, free of charge, china not involved, old school jailbreak with a few others. evad3rs released first. That jailbreak overlapped this one 80%, partly due to leaks, but mainly due to the exploits and methodology being the obvious choice(great minds, well you know), meaning the exploits won't be usable next time. No more jailbreaks ever?

The write-up takes you through each step the evasi0n jailbreak utility goes through.


As we noted in our jailbreak tutorials, the steps are as follows:
● Yay, you clicked on me
● Retrieving remote package
● Uploading jailbreak data
● Injecting evasi0n app (1/2)
● Injecting evasi0n app (2/2)
● Configuring system (1/2)
● Configuring system (2/2)
● Rebooting
● To continue, please unlock your device and tap the new 'evasi0n 7' icon.
● Rebooting
● Modifying rootfs...
● Rebooting
● Running /evasi0n7, as root, on the device

The full step details can be read at the link. We've also included them below just in case they disappear. Geohot had his own exploit for a jailbreak but the evad3rs beat him to it. You can listen to a leaked audio recording of Geohot negotiating the sale of the jailbreak for $350,000 here. However, due to recommendations from his lawyers, he decided not to go through with it.

Notably, as many are aware, creating a jailbreak is getting increasingly difficult. Even geohot wonders, "No more jailbreaks ever?". If you are new to the jailbreak scene, please follow iClarified on Twitter, Facebook, or RSS for the latest news and tutorials!

Read More



Geohot Reverses iOS 7 Evasi0n Jailbreak, Posts Write-up [Read]


GEOHOT REVERSAL OF EVASI0N IOS 7 JAILBREAK
-----
Hi, I'm on a plane from SFO to New York, and made something for you. Not even a rap song.

******* geohot(@tomcr00se) presents an evasi0n7 writeup *******

== Intro ==

I was bored, reversed, wrote this write-up, and wanted to do something with it. I tried to sell it to the Chinese for $7 and a trip to the Pizza Hut salad bar, but it turns out all the Pizza Huts in China don't have salad bars anymore, so the deal was called off.

This writeup takes place from the perspective of evasi0n7. Fuck secrets. Note that this writeup doesn't help Apple, I got this by reversing the public evasi0n binary, which they can, and do do. Also note, I found nothing sketchy in my reversing, your phones most likely aren't being backdoored by Chinese. If I ever touch jailbreaking again, which is unlikely(until ARM128 comes out, I only touched the game again for the love of ARM64), no more secrets. Full disclosure time, I was working on a public, free of charge, china not involved, old school jailbreak with a few others. evad3rs released first. That jailbreak overlapped this one 80%, partly due to leaks, but mainly due to the exploits and methodology being the obvious choice(great minds, well you know), meaning the exploits won't be usable next time. No more jailbreaks ever?

Also, for the hell of it, check out the sha hash of "http://geohot.com/mt.jpg" and @tomcr00se. Ok, let's begin, changing voice to ./evasi0n7

== Yay, you clicked on me ==

Hi, first I am going to check if you already jailbroke your device. I'm looking for the file ".evasi0n7_installed" using afc. Recall that afc runs in the "/var/mobile/Media" directory, so the full path is "/var/mobile/Media/.evasi0n7_installed"

Okay, please click "Jailbreak" to begin our journey to root. This journey stops at root for now, since the /evasi0n7 binary is supa obfuscated good.

== Retrieving remote package ==

I need a real codesigned app, for reasons that'll be apparent later. To figure out where to get one, let me grab "http://evasi0n.com/apple-ipa-info.plist", ahh nice, a URL and some cookies. To play at home, run:

curl -b "downloadKey=expires=1387947603~access=/us/r1000/098/Purple/v4/c3/4e/98/c34e989a-8522-fde0-db2d-884dd3b1302d/mzps6036043982514941651.D2.pd.ipa*~md5=dc91b9d5599eb2e135bddbec3ad5dbc2" http://a396.phobos.apple.com/us/r1000/098/Purple/v4/c3/4e/98/c34e989a-8522-fde0-db2d-884dd3b1302d/mzps6036043982514941651.D2.pd.ipa -o wwdc.ipa

This is an app for people at WWDC I assume, I don't know since I just do what the plist says. What I care about is that it's signed.

== Uploading jailbreak data ==

Well, I need something to install. Namely cydia, or, you know, that other app store. Let me push a few files through afc for untarring later. Remember still in "/var/mobile/Media"
"evasi0n-install/packagelist.tar"
"evasi0n-install/Cydia.tar"
"evasi0n-install/extras.tar"

== Injecting evasi0n app (1/2) ==

Okay, so I'm not really going to really install the app yet, but I will upload an unzipped copy to "/var/mobile/Media/Downloads/WWDC.app" through afc. Note that the main app("/var/mobile/Media/Downloads/WWDC.app/WWDC") is not chmodded +x, since afc creates new files 644.

== Injecting evasi0n app (2/2) ==

Let me modify the real app host side a little now, give Info.plist a new ExecutableFile "../../../../../../var/mobile/Media/Downloads/WWDC.app/WWDC". Get it? When the code signature is checked, it passes because that's a real copy of the app. Upload pkg.ipa, run com.apple.mobile.installation_proxy on the ipa, also change the picture to the official evad3rs logo thing. And yay, installd chmods the app +x, and makes a pretty icon appear.

Now the fun begins, I push two more files over afc.
"Downloads/WWDC.app/WWDC" with contents "#!/usr/libexec/afcd -S -d / -p 8888" (the chmod +x stays)
"Downloads/WWDC.app/gameover.dylib"

Get it, the app is just a shebang to run afcd. "-S" so I can access special files, "-d /" so afcd runs in the root, and "-p 8888" to run on port 8888.

Ahh, but afcd has a sandbox profile, how can it access anything cool? By injecting gameover.dylib of course

geohot@comet:~/iphone/evasi0n2/extract$ dyldinfo -export gameover.dylib
for arch armv7:
export information (from trie):
[re-export] _SANDBOX_CHECK_NO_REPORT (_kCFBooleanTrue from CoreFoundation)
[re-export] _sandbox_check (_sync from libSystem)
[re-export] _sandbox_extension_consume (_sync from libSystem)
[re-export] _sandbox_extension_issue_file (_sync from libSystem)
[re-export] _sandbox_free_error (_sync from libSystem)
[re-export] _sandbox_init (_sync from libSystem)
[re-export] _sandbox_init_with_parameters (_sync from libSystem)

Hmm, but who signed that dylib. Nobody, absolutely nobody. Exploit, if S_ATTR_LOC_RELOC is set on all the executable sections, the +x is removed from the sections after the header is +x checked, but before +x pages are mapped, triggering codesign.

afcd inits the sandbox from inside the binary, so by overriding the dylib (note that LC_ID_DYLIB of gameover is "/usr/lib/system/libsystem_sandbox.dylib"), the sandbox is never initted and afcd is free to write anywhere.

But how do I convince the dylib to load? Let us configure the system a little, together.

== Configuring system (1/2) ==

Ahh, the first of a needlessly burned exploit. But cute anyway. From afc, remember, this is still a sandboxed afc, I want to access "/tmp", so let's create a symlink. But you see, afc is clever enough to make sure I don't symlink out of it's directory. Never fear.

symlink("../../../../../tmp", "Downloads/a/a/a/a/a/link")

That's cool, right? Still in the sandbox, count the ../

rename("Downloads/a/a/a/a/a/link", "tmp")

Oh snap, it's a relative symlink, let me traverse from "/var/mobile/Media/tmp. "../(Media)../(mobile)../(var)../(private)../tmp"

So I can access "/tmp", ballin.

== Configuring system (2/2) ==

Let me grab all your cache files, one sec. I'll use "com.apple.mobile.file_relay" and request "Caches". It's a big ass cpio file.

To "/var/mobile/Library/Caches/com.apple.mobile.installation.plist" I'll add the "EnvironmentVariables" to the developer.apple.wwdc-Release app. You know, the most awesome one ever, "DYLD_INSERT_LIBRARIES -> /private/var/mobile/Media/Downloads/WWDC.app/gameover.dylib" Now when the afcd app shebang runs, gameover.dylib is injected.

And now for the second exploit that I could have used mobilebackup for. Apple, want to do a solid and not patch? Don't you think that's fair?

I need to push files elsewhere in /var, but I can't because afc is still in the sandbox. Good thing I have a race condition in installd, exploitable since I can modify "/tmp", as shown before.

For each file in "/var/mobile/Library/Caches/com.apple.mobile.installation.plist", "/var/mobile/Library/Caches/com.apple.LaunchServices-054.csstore" which I zero to force a rebuild, and "/var/mobile/Library/Preferences/com.apple.backboardd.plist", where I add "BKNoWatchdogs"="Yes" to remove the 30 second app startup timeout, I create a "pkg.zip", which I upload to "/var/mobile/Media" with afc.

Then I command installd to install it, which creates a "/tmp/install_staging.XXXXXX/foo_extracted" where I extract the zip. But now fast fast race condition fast fast

symlink("../../..//var/mobile/Library/Caches/", "tmp/install_staging.XXXXXX/foo_extracted.new")
move("tmp/install_staging.XXXXXX/foo_extracted", "tmp/install_staging.XXXXXX/foo_extracted.old")
move("tmp/install_staging.XXXXXX/foo_extracted.new", "tmp/install_staging.XXXXXX/foo_extracted")
installd_extract("/var/mobile/Media/pkg.zip", "tmp/install_staging.XXXXXX/foo_extracted")

Get it? Now when the extract happens to "tmp/install_staging.XXXXXX/foo_extracted", the files go in "/var/mobile/Library/Caches/". Which is cool since installd isn't sandboxed.

== Rebooting ==

Count the reboots, this is 1. Used to get com.apple.mobile.installation.plist to be reloaded.

== To continue, please unlock your device and tap the new 'evasi0n 7' icon. ==

Finally, when you click the app I run "#!/usr/libexec/afcd -S -d / -p 8888" with gameover.dylib killing the afc sandbox, but still as mobile. Let me just do two quick things in var, as mobile, outside the sandbox.

symlink("../../../../../dev/rdisk0s1s1", "/var/mobile/Library/Logs/AppleSupport")

Leaving "/var/mobile/Library/Logs/AppleSupport" -> "../../../../../dev/rdisk0s1s1". Exploit, this file is chowned mobile:mobile on reboot by CrashHousekeeping, and since chown goes through symlinks...

And tell "/var/mobile/Library/BackBoard/applicationState.plist" to restart the evasi0n app automatically on next reboot, which I'll do now.

== Rebooting ==

This is 2. "/dev/rdisk0s1s1" is being chowned to mobile:mobile as we speak.

== Modifying rootfs... ==

afc is running, outside the sandbox. "/dev/rdisk0s1s1" is mobile:mobile, time to write the block device.

Note that the kernel no longer allows the rootfs to be remounted rw. So I just write directly to the underlying block device. haxx. This is cool since afcd has the "-S" option.

Files written:
"/evasi0n7" -- the main binary which does the kernel exploit.
"/evasi0n7-installed" -- just a blank file
"/System/Library/LaunchDaemons/com.evad3rs.evasi0n7.untether.plist" -- touched to make launchd load this
"/System/Library/Caches/com.apple.xpcd/xpcd_cache.dylib" -- the new home of the LaunchDaemons, codesign haxx
"/System/Library/Caches/com.apple.dyld/enable-dylibs-to-override-cache" -- convinces the system to look on the filesystem before the dyld_cache
"/usr/lib/libmis.dylib" -- overrides the symbols in amfid to make the signature check return 0, with above codesign trick
You know, [re-export] _MISValidateSignature (_CFEqual from CoreFoundation)

"xpcd_cache.dylib" contains a plist with just two launchdaemons, com.apple.MobileFileIntegrity, which starts with the signature free libmis.dylib, and com.evad3rs.evasi0n7.untether, which is the unsigned untether.

Note that DYLD_INSERT_LIBRARIES won't work on amfid, since it has a "__RESTRICT" segment. Hence the above trick. Replacing the real library.

== Rebooting ==

This is 3. Need to flush the changes I made in the block device to the filesystem.

== Running /evasi0n7, as root, on the device ==

Now you see the splash screen. Away into obfuscation land of kernels and untarring. Who wants to write up that part?

***************

With transparency, love, and rap songs from
~geohot
-----
Add Comment
Would you like to be notified when someone replies or adds a new comment?
Yes (All Threads)
Yes (This Thread Only)
No
iClarified Icon
Notifications
Would you like to be notified when we post a new Apple news article or tutorial?
Yes
No
Comments (17)
You must login or register to add a comment...
yellowstone
yellowstone - December 26, 2013 at 3:56pm
Here's my 2 cents. The main reason I and many others JB their iphone's is out of pure curiosity, to compare what's on the apple store to what's on the JB stores and experience what's a JB about (many non-developers and many c# / ruby / java developers like tinkering with JB since it's something new). Lets be honest, how did a feature like blocking calls (settings, phone, blocked) get added to iOS7 ? This was added to iOS5.1.1 via JB. There are so many great apps on JB which is not on apple store, so its another reason to JB. Oh yes, off course you will always get those who JB for free apps, but how of those non-paid apps do they use daily (perhaps 5 ?). Unless you are referring to games, i'd say most people don't JB for free apps.
dark_destroyer
dark_destroyer - December 24, 2013 at 2:22pm
It's not all about piracy, I dont jb my ishit for piracy but more for the tweaks basic stuff that apple forget to include, I don't blame hackers for being greedy who wouldn't be tempted by 350k and more but some people will always do it because it can't be done and that's the challenge
gamerscul9870
gamerscul9870 - December 24, 2013 at 3:04pm
You mean iSuperiors, not iShit.
Kornmehl
Kornmehl - December 24, 2013 at 3:45pm
I believe that you have a fundamental misunderstanding of the jailbreak process. The developers do the initial jailbreak for the challenge. There are hundreds, possibly even thousands, who can perform this first step. There is then a select few who create an automated jailbreak for those millions who are less skilled. This is the part that usually takes the most time. It also involves significant coordination with others and some significant copyright issues. It is the latter step which is at risk of disappearing as these folks realize that piracy is the main reason that the millions applaud their work.
Kornmehl
Kornmehl - December 24, 2013 at 12:53pm
True. And true hackers are generally so socially inept that they do no realize the larger impact of their actions. However, this latest event made the secondary effects of their hacking too obvious to be missed. Even the nerdiest of them will realize that they are not admired for their skills; they are simply appreciated for making piracy possible on a grand scale.
George nooks
George nooks - December 24, 2013 at 4:24am
Thank god I switched to android so I don't need to worry about this shot anymore.
gamerscul9870
gamerscul9870 - December 24, 2013 at 4:54am
You did this why? If you don't want jb don't do it.
Kornmehl
Kornmehl - December 24, 2013 at 3:40am
Now that people (belatedly) realize that most of the hunger for jailbreaking is due to piracy, I doubt anyone else is going to aggressively pursue looking for a jailbreak. The pirates can play with their Androids.
odedoo1
odedoo1 - December 24, 2013 at 3:18am
Sorry I meant to type breach.
odedoo1
odedoo1 - December 24, 2013 at 3:14am
After I heard the messed up story I was talking to Jay ( Zaurik ) and I totally agree that greed messed everything up, I'll be surprised if there will be more jailbreaks which is totally messed up because if it wasn't for greed this jailbreak would have worked on 7.1, the story about the birch being blocked by 7.1 is bull the fact is that it this jailbreak works on 7.1 Beta 2, like I said greed greed greed! And if we ever see another jailbreak it's only because iOS 7 is new and there are many new birches to be found, I only don't know who will do it after this mess.
Albert
Albert - December 24, 2013 at 2:52am
Damn this kid is Smart! Jailbreak is getting easier!! Why? How many hackers had it? 1-Evad3rs, 2-Geohot, 3-Even Saudik was working on it, why because IOS 7 is so buggy that there are so many errors in the code that made it easy for them to crack it!!
gamerscul9870
gamerscul9870 - December 24, 2013 at 3:09am
Steve jobs like maybe born for this?
RayBob
RayBob - December 24, 2013 at 2:52am
Well there will always be others people... History has taught us this over and over again!
tzvifiller
tzvifiller - December 24, 2013 at 2:05am
Download link?
iH85CH001
iH85CH001 - December 24, 2013 at 2:04am
There will come a day when jailbreaking will just become obsolete and impossible. That day becomes sooner and sooner as time goes on.
gamerscul9870
gamerscul9870 - December 24, 2013 at 2:07am
Another reason why jbing an iDevice is like asking for more aka I don't need it to enjoy it.
Russell
Russell - December 24, 2013 at 2:35am
The only way that will happen is if Geohot and others decide to stop doing it.
Recent. Read the latest Apple News.
RECENT
Tutorials. Help is here.
TUTORIALS
Where to Download macOS Ventura
Where to Download macOS Sequoia
AppleTV Firmware Download Locations
Where To Download iPad Firmware Files From
Where To Download iPhone Firmware Files From
Deals. Save on Apple devices and accessories.
DEALS