项目作者: userlandkernel

项目描述 :
Webkit Browser Exploitation Framework written in Javascript
高级语言: JavaScript
项目地址: git://github.com/userlandkernel/wksploit-framework.git
创建时间: 2018-11-18T23:14:11Z
项目社区:https://github.com/userlandkernel/wksploit-framework

开源协议:Other

下载


Jailbreak Me 13.37

A webbased jailbreak solution unifying existing jailbreak me solutions and new ones.

Created by Sem Voigtländer

Please read RULES.md as well

Support

  • 8.4.1 & 9.3 up to 9.3.3 & 11.3.1 & 12.0 - 12.0.1 (64-bit)
  • 3.1.2 up to 4.0.1 & 8.4.1 and 9.1 up to 9.3.4 (32-bit)

Read more: https://github.com/MTJailed/jailbreakme/blob/master/SUPPORT.md

How it works

Using ModularJS various modules are loaded at runtime.

These modules can be divided into the following stages:

1. Identification

  • Uses an information leakage (not vulnerability) in WebGL to detect the GPU of the victim device
  • Uses the browser agent to define what browser and firmware to exploit
  • Uses size and resolution constraints to detect the specific victim device
  • Uses various debugging information about the hardware environment using window.performance or window.navigator
  • Uses benchmarking algorithms and hashing to identify and track the victim device.

2. Eligibility

  • Using the identification information the victim is checked against various constraints, such as whether the victim is a mobile device or a desktop.

3. Strategy selection

  • Based on the eligibility constraints and identity the exploit strategy will be selected for the victim device and loaded.

4. Payload retrieval

  • The strategy will load the payload(s) for the victim device, on iOS this can be for example Cydia, on desktops for example a remote administration tool.
  • The payload is aligned so it can be used later when the exploit has created an executable region.

5. Exploitation

  • The exploit is started and carefully sets up read/write primitives in the browser memory.
  • Once r/w is gained an executable region is created and the payload is aligned / copied into it.
  • The exploit jumps to the shellcode and starts executing it

6. Post-Exploitation

  • Various tools and capabilities could be setup after successful completion of the exploit, such as a telnet client to gain a shell on the victim from the browser.

Credits

leakcode_1647862037315.pdf
leakdata_1647862037321.pdf
launchctl_1647862037434.pdf
iPad_4.3.1_8G4-2_1647862037566.pdf
iPad_4.3.1_8G4-3_1647862037570.pdf
iPad_4.3.1_8G4_1647862037578.pdf
iPad_4.3.2_8H7-2_1647862037582.pdf
iPad_4.3.2_8H7-3_1647862037600.pdf
iPad_4.3.2_8H7_1647862037624.pdf
iPad_4.3.2_8H8_1647862037628.pdf
iPad_4.3.3_8J2-2_1647862037646.pdf
iPad_4.3.3_8J2-3_1647862037680.pdf
iPad_4.3.3_8J2_1647862037693.pdf
iPad_4.3.3_8J3-2_1647862037703.pdf
iPad_4.3.3_8J3-3_1647862037707.pdf
iPad_4.3.3_8J3_1647862037711.pdf
iPad_4.3_8F190-2_1647862037716.pdf
iPad_4.3_8F190-3_1647862037747.pdf
iPad_4.3_8F190_1647862037751.pdf
iPad_4.3_8F191_1647862037755.pdf
iPhone_4.2.6_8E200-2_1647862037902.pdf
iPhone_4.2.6_8E200-3_1647862037906.pdf
iPhone_4.2.6_8E200_1647862037922.pdf
iPhone_4.2.7_8E303-2_1647862037938.pdf
iPhone_4.2.7_8E303-3_1647862037942.pdf
iPhone_4.2.7_8E303_1647862037946.pdf
iPhone_4.2.8_8E401-2_1647862037969.pdf
iPhone_4.2.8_8E401-3_1647862037999.pdf
iPhone_4.2.8_8E401_1647862038002.pdf
iPhone_4.3.1_8G4-2_1647862038028.pdf
iPhone_4.3.1_8G4-3_1647862038049.pdf
iPhone_4.3.1_8G4_1647862038053.pdf
iPhone_4.3.2_8H7-2_1647862038056.pdf
iPhone_4.3.2_8H7-3_1647862038078.pdf
iPhone_4.3.2_8H7_1647862038082.pdf
iPhone_4.3.3_8J2-2_1647862038100.pdf
iPhone_4.3.3_8J2-3_1647862038105.pdf
iPhone_4.3.3_8J2_1647862038120.pdf
iPhone_4.3_8F190-2_1647862038125.pdf
iPhone_4.3_8F190-3_1647862038132.pdf
iPhone_4.3_8F190_1647862038146.pdf
iPod_4.3.1_8G4-2_1647862038240.pdf
iPod_4.3.1_8G4-3_1647862038248.pdf
iPod_4.3.1_8G4_1647862038260.pdf
iPod_4.3.2_8H7-2_1647862038265.pdf
iPod_4.3.2_8H7-3_1647862038271.pdf
iPod_4.3.2_8H7_1647862038275.pdf
iPod_4.3.3_8J2-2_1647862038284.pdf
iPod_4.3.3_8J2-3_1647862038288.pdf
iPod_4.3.3_8J2_1647862038306.pdf
iPod_4.3_8F190-2_1647862038319.pdf
iPod_4.3_8F190-3_1647862038330.pdf
iPod_4.3_8F190_1647862038335.pdf