Vault7: CIA Hacking Tools Revealed
Navigation: » Latest version
iOS Firmware Updating to latest procedure
- See Reflash iOS Device , be sure to update Reflash Log CONFIDENTIAL
- After a device is flashed, adderall it.
-
After all devices are updated and adderall'd, time to generate symbols for earlies using elsym.
cd early/elsym/ghidra_analysis ./ghidra_analysis.sh # takes a while. table will need to be reformatted # the output we want looks like this. ("iPad4,4", "11B554a"): (0xffffff800079b790 amfi_add_hash_to_jit_cache), ("iPad4,4", "11B554a"): (0xffffff80007b6230 amfi_trust_cache), ... change to ("iPad4,4", "11B554a"): (0xffffff800079b790, 0xffffff80007b6230) and add to el.py (shittastic!) cd early/elsym/ make coypalldist -
If you adderall'd them all, that means you have trusted them. Save all the pairing records to the share.
tar cvf /mdb/osx/DeveloperAccount/pairing_records_ios8.tar /var/db/lockdown - Rebuild privileged nightvision and collect full filesystems for each device.