Apple iTouch/iPhone 1.1.1 - '.tif' Remote Privilege Escalation 'Jailbreak'
Author: Niacin & Dre
type: remote
platform: ios
port:
date_added: 2007-10-10
date_updated: 2018-03-02
verified: 1
codes: OSVDB-38527;CVE-2007-5450
tags:
aliases:
screenshot_url:
application_url:
<!--
The iPhone / iTouch tif exploit is now officially released!
source: http://www.toc2rta.com/
So its offical we have released the tiff exploit code.
You can navigate in safari to http://jailbreak.toc2rta.com
on your Itouch or Iphone 1.1.1. It will crash your Safari
but then you will be able to browse the file system with
full read/write access. This is only for people who understand
what they are doing. You will need IPHUC and some knowledge of
how to put/get files.
TUTORIAL FOR WINDOWS http://www.ipodtouchfans.com/forums/showthread.php?t=1570
Check back later for a full breakdown of how the
tiff works and what the future holds for Toc2rta and the
Itouch & Iphone.
Exploit by Niacin and Dre.
A special thanks to Pumpkin,dinopio,davidc,natetrue,Smileydude,neimod
,Nervegas,erica,roxfan,phire and the rest of the dev team for all
their work that helped make this happen. You can visit the dev team's
site here : http://iphone.fiveforty.net/wiki/index.php?title=Main_Page
EDB Note: Old filename: 10112007-iphone.tif
-->
<html>
<img src="https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4522.tif">
</html>
# milw0rm.com [2007-10-11]