Tuesday 14 August 2012

iPhone Hacking (Gecko iPhone Toolkit)



[Image: cnAjO.jpg?1]

Intro
As all iDevice users know, they can keep their data secure, and their devices safe by locking their device with a passcode. The passcode can vary, from a 4 digit number pin, to a 64 digit num/letter combo. Whether it is your friend playing a joke on you, or you simply forgot your passcode, you can be at a lose without the passcode. Well the iPhone Dev Team, along with other developers has realized this. They created a tool called "The Gecko iPhone Toolkit".

Features
-Bypass iDevice's (A4) Lock Code
-Bypass iDevice's (A4) "iPhone Disabled" after failed attempts
-Fix stuck on Apple logo problems
-And more!

Bypassing the Lock Code
Whether it is a joke, forgetting your passcode, or finding a locked iPhone, lock codes can be a pain! This tool solves that problem for most iDevices!
Simply select the device, click boot. Select the predownlaoded firmware for the device (Can be downloaded Here.
The program will do it's job, then prompting you to click "Launch".
This will start the process of cracking the passcode!
Starting the Process
[Image: VGahW.png]

Process Results
[Image: z5IQx.png]

Bypassing the "iPhone Disabled" Function
After x number of failed passcode attempts, your iDevice will lock. The time locked, depends on how many failed attempts have been tried.
This toolkit, also solves this problem. Bypassing this restriction!
Simply select which device is being bypassed, then click "Bypass".
Bypassing "iPhone Disabled" 
[Image: 5uvSp.png]

Extra Features
Along with these 2 essential tools, this toolkit has a few more tools built in. The first, includes 2 options to fix the stuck on Apple Logo after adding a bad cydia package. The second, includes adding custom payloads to these processes, allowing users to test their own work.

[Image: MHPGx.png]

How This Works
The process used in all of these tools, requires that the iDevice MUST be an A4
Device.
(iPT1, iPT2, iPT3, iPT4, iPhone1, iPhone 2, iPhone 3, iPhone 3GS, iPhone 4, iPad 1)
The reasoning behind this is, because the program makes a custom RAMdisk for the device, copies the data to the new RAMdisk, and loads the new RAmdisk onto the device. This process is only possible on A4 devices, because there is no exploit like this available for A5 devices.

Download Link For Gecko Toolkit


Enjoy :)

No comments:

Post a Comment