CyberWolf-Security
  • Home
  • Getting Started in Cyber Security
  • Misc
    • Misc Items
      • Powershell commands
      • Reverse Shells
      • Web Shells
      • File Sharing
      • Useful Commands
      • Google Dorks
      • Proxy & Proxy Chains
      • Port Scanning
      • Intercept Linux CLI Traffic
      • Nessus
    • Frequency stuff
    • Random stuff - needs sorting
  • Services
    • Ports - Services
      • 21 - FTP
      • 22 - SSH
      • 25 - SMTP
      • 69 - TFTP
      • 79 - Finger
      • 88 - Kerberos
      • 123 - NTP
      • 137 - Netbios
      • 161 - SNMP
      • 363 - LDAP
      • 443 - HTTPS
        • IIS
      • 445 - SMB
      • 500 - IKE
      • 623 - IPMI
      • 873 - RSYNC
      • 1433 - MSSQL
      • 1521 - Oracle DB
      • 3389 - RDP
      • 3260 - iSCSI
      • 2049 - NFS
      • 5900 - VNC
      • 5985 - WinRM
      • 6000 - X11
      • 8080 - Jenkins
      • 11211 - Memcached
  • Password Cracking
    • Password attacks
    • Password Cracking
  • Tools
    • Tools
      • Crackmapexec
      • Metasploit
      • Bloodhound
      • Tcpdump
      • Logcat
  • Wireless testing
    • Wireless
      • Converting handshake to .hccapx for Hashcat
      • Cracking WPA/WPA2 hashes
      • Hacking Wireless
      • Get Wireless password from Windows CMD
      • Hotspot
  • Web Application
    • Web App
      • Directory Brute forcing
      • Subdomain brute forcing
      • JWT Tokens
      • GIT
      • Cross-Site Scripting (XSS)
        • Embedded images
        • Payloads
      • WPScan
      • Local File Inclusion (LFI)
      • SQLmap
      • Server Side Template Injection
      • SQL Injection
      • Using Hydra for web brute force
      • Remote Code Execution (RCE)
      • Uploads
      • Subdomain takeover
      • XLS/CSV Injection
      • XML Injection
  • Internals
    • Internals
      • Finding Domain Controllers and DHCP servers
      • Discovering hosts from the inside
      • Dumping domain hashes
      • Active Directory
      • Getting local hashes
      • service principle names (SPNs)
  • Mobile Application
    • Mob App
      • MobApp Testing VM
      • Jailbreaking IOS
      • Tools
        • Frida
        • MobSF
          • Installing MobSF
      • Mobile Application Testing
        • Android
          • Checklist and Methodology
          • ADB
        • IOS
          • Checklist and Methodology
  • Cloud
    • Microsoft Office 365 Security Review
      • Page 1
    • Kubernetes & Docker Review
  • Privilege escalation
    • Windows
      • Tools
      • Unquoted service paths
    • Service Execution
    • Linux
      • Tools
      • Perform a core dump
      • Useful commands
      • Spawn a TTY shell
  • CTF-stuff
    • .Git
  • Steganography
    • Tools
  • Labs / Resources
    • Mitre Caldera
    • Blue-Team
      • Labs
    • Red-Team
      • Vulnerable virtual machines
      • Vulnerable Sites
  • Training
    • Certifications
      • OSCP
      • CEH
      • Crest
        • Crest CPSA
        • Crest CRT
          • Syllabus
          • Appendix B: Core Technical Skills
            • B4 - Network Mapping & Target Identification
            • B5 - Interpreting Tool Output
            • B8 - OS Fingerprinting
            • B9 - Application Fingerprinting and Evaluating Unknown Services
            • B13 - File System Permissions
          • Appendix C: Background Information Gathering & Open Source
            • C2 - Domain Name Server (DNS)
          • Appendix D: Networking Equipment
            • D1 - Management Protocols
            • D3 - Networking Protocols
          • Appendix E: Microsoft Windows Security Assessment
            • E1 - Domain Reconnaissance
            • E2 - User Enumeration
            • E3 - Active Directory
            • E5 - Windows Vulnerabilities
            • E9 - Common Windows Applications
          • Appendix F: Unix Security Assessment
            • F1- User enumeration
            • F2 - Unix vulnerabilities
            • F3 - FTP
            • F4 - Sendmail / SMTP
            • F5 - Network File System (NFS)
            • F6 - R* services
            • F7 - X11
            • F8 - RPC services
            • F9 - SSH
          • Appendix G: Web Technologies
            • G1 - Web Server Operation
            • G2 - Web Servers & their Flaws
            • G4 - Web Protocols
            • G7 - Web Application Servers
          • Appendix I: Web Testing Techniques
            • I1 - Web Site Structure Discovery
            • I2 - Cross Site Scripting Attacks
            • I3 - SQL Injection
            • I6 - Parameter Manipulation
          • Appendix J: Databases
            • J1 - Microsoft SQL Server
            • J2 - Oracle RDBMS
            • J3 - Web / App / Database Connectivity
      • Study Material
        • Encryption
    • Terminology
      • NTLM & NTLM2
  • Vulnerabilities
    • Vulnerabilities
  • Exploits
    • ImageMagick
    • CVE-2021-3560 (PolKit)
  • Bug Bounty
    • Bug Bounty Programs
    • Sub Domain Finder
    • link dump
  • FAQ
    • Install ALFA AWUS1900 on Kali
    • Update and upgrade Linux
  • Build Review
    • Workstation
  • Hack the Box
    • Challenges
      • The Needle
Powered by GitBook
On this page
  • Tutorial: Jailbreaking iPhone on macOS
  • Prerequisites
  • Step 1: Download Palera1n
  • Step 2: Installation
  • Step 3: Jailbreaking
  • Step 4: Handling Issues for A9(X) and Earlier Devices
  • SSH to IPhone
  • Step 1: Install OpenSSH on your iPhone
  • Step 2: Find your iPhone's IP address
  • Step 3: SSH into your iPhone from macOS
  • Removing the Jailbreak

Was this helpful?

  1. Mobile Application
  2. Mob App

Jailbreaking IOS

PreviousMobApp Testing VMNextTools

Last updated 2 years ago

Was this helpful?

Tutorial: Jailbreaking iPhone on macOS

Jailbreaking your iPhone can give you additional control and customisation options beyond what is offered by Apple's official iOS. This tutorial will guide you through the process of jailbreaking your iPhone on macOS using the Palera1n tool.

Prerequisites

Before you begin, ensure that you meet the following requirements:

  • Your device is running iOS 15 to iOS 16.5

  • Your device model is one of the following: iPhone X, iPhone 8, iPhone 8 Plus, iPhone 7, iPhone 7 Plus, iPhone SE (1st), iPhone 6S, iPhone 6S Plus, iPhone 6, iPhone 6 Plus, iPad Mini 2, iPad Mini 3, iPad Mini 4, iPad 5th, iPad 6th, iPad 7th, iPad Air, iPad Air 2, iPad Pro 1st, iPad Pro 2nd, iPod Touches 6 & 7.

  • If you have an A11 device on iOS 16 with a passcode set, you will need to erase all content and settings before jailbreaking and ensure that no passcode is set.

Step 1: Download Palera1n

  1. Visit the Palera1n website at .

  2. Download the appropriate version of Palera1n for your macOS. For most macOS users, the recommended version is palera1n-macos-universal, which can be downloaded from .

Step 2: Installation

  1. Enable Full Disk Access for Terminal by following these steps:

    • For macOS Monterey and below: Go to System Preferences → Security & Privacy → Privacy → Full Disk Access.

    • For macOS Ventura and above: Go to System Settings → Privacy & Security → Full Disk Access.

    • If Terminal is not listed, click the plus icon, and select it from Applications → Utilities.

  2. Open a Terminal window.

  3. Change the directory to the location where Palera1n was downloaded. Use the command cd ~/Downloads if you downloaded it to the Downloads folder.

  4. Run the following commands in Terminal one by one:

    • sudo mkdir -p /usr/local/bin

    • sudo mv ./palera1n-macos-universal /usr/local/bin/palera1n (Replace ./palera1n-macos-universal with the version you downloaded)

    • sudo xattr -c /usr/local/bin/palera1n

    • sudo chmod +x /usr/local/bin/palera1n

Step 3: Jailbreaking

  1. Connect your device to your Mac using a USB cable.

  2. In the Terminal window, run the command palera1n. Make sure your device is plugged in before entering this command. Note, it is a full jailbreak that is semi-tethered (meaning you will need to re-jailbreak with a computer if you reboot)

  3. When prompted, press Enter and follow the on-screen instructions to enter DFU mode. The instructions will typically involve holding the power button and home button together for a specified number of seconds. Release the power button while keeping the home button pressed. The tool will notify you if the DFU mode entry was unsuccessful.

    • Note: Some USB-C to Lightning cables may not work reliably. It is recommended to use a USB-A to Lightning cable for a more stable connection.

Step 4: Handling Issues for A9(X) and Earlier Devices

A9(X) and earlier devices may encounter an issue where they get stuck midway through the jailbreaking process in pongoOS. Follow these steps to work around this issue:

  1. If your device gets stuck in pongoOS during the process, press Control + C on your keyboard in the Terminal window.

  2. Rerun the command palera1n that you ran previously.

  3. You'll need to repeat this step every time you rejailbreak your device.

SSH to IPhone

Once your iPhone is jailbroken, you can use SSH (Secure Shell) to connect to it from your macOS. Here's a step-by-step guide on how to SSH into your jailbroken iPhone:

Step 1: Install OpenSSH on your iPhone

  1. Launch the Sileo app on your jailbroken iPhone.

  2. Tap on the "Search" tab at the bottom and search for "OpenSSH".

  3. Select the "OpenSSH" package from the search results.

  4. Tap on "Install" and then "Confirm" to begin the installation process.

  5. Once the installation is complete, OpenSSH will be installed on your iPhone.

Step 2: Find your iPhone's IP address

  1. On your iPhone, go to the "Settings" app.

  2. Tap on "Wi-Fi" and make sure you are connected to the same Wi-Fi network as your Mac.

  3. Tap on the (i) icon next to your connected Wi-Fi network.

  4. Note down the IP address listed under the "IP Address" section. This is your iPhone's IP address on the local network.

Step 3: SSH into your iPhone from macOS

  1. Open the Terminal app on your macOS. You can find it in the "Utilities" folder within the "Applications" folder.

  2. In the Terminal, use the following command to connect to your iPhone via SSH:

    ssh mobile@<your_iPhone_IP_address>

    Note, the default password used to be 'alpine' but the new installer makes you set a new password when jailbreaking the device, so use that password instead.

  3. Then you can switch to the root user if needed:

    sudo su

Removing the Jailbreak

If you wish to remove the jailbreak from your device, you can follow these steps:

  • For Rootless Jailbreak: Run the command ./palera1n --force-revert in the Terminal.

  • For Rootful Jailbreak: Run the command ./palera1n --force-revert -f in the Terminal.

These commands will revert the jailbreak modifications and restore your device to the stock iOS state.

https://pangu8.com/jailbreak/palera1n/#palerain-download
https://cdn.nickchan.lol/palera1n/c-rewrite/releases/v2.0.0-beta.6/palera1n-macos-universal