Vault7: CIA Hacking Tools Revealed
Navigation: » Latest version
iOS Firmware Updating to latest procedure / Adding Exploit Support For New Devices
- See Reflash iOS Device , be sure to update Reflash Log CONFIDENTIAL
- After a device is flashed, adderall it.
- cd adderall repo sync -d make dist Dist/Release-MacOSX/adderall-dist ~/iosfilescd earlypython symdra full -k ~/iosfiles
- After all devices are updated and adderall'd, time to generate symbols for earlies using elsym.
cd early/elsym/ghidra_analysis
./ghidra_analysis.sh
# takes a while. table will need to be reformatted
# the output we want looks like this.
# ("iPad4,4", "11B554a"): (0xffffff800079b790 amfi_add_hash_to_jit_cache),
# ("iPad4,4", "11B554a"): (0xffffff80007b6230 amfi_trust_cache),
# ...
# change to
# ("iPad4,4", "11B554a"): (0xffffff800079b790, 0xffffff80007b6230)
# and add to el.py (shittastic!)
cd early/elsym/
make coypalldist
-
If you adderall'd them all, that means you have trusted them. Save all the pairing records to the share.
tar cvf /mdb/osx/DeveloperAccount/pairing_records_ios8.tar /var/db/lockdown -
Rebuild privileged nightvision and collect full filesystems for each device.
cd nightvision make dist cd Dist/Release-iPhoneOS ./nv -c ../../elsym-dist get