• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

JailBreaking AppleTV Running on iOS 4.1 – iPad/iPhone 4 Jailbreak Soon?

September 29, 2010

Views: 7,690

Posts about the latest Jailbreak exploit/software for the new Apple devices are always pretty popular and this looks like it might turn out to be pretty interesting.

It seems like at the moment the latest iOS update has been cracked for iPod Touch and earlier iPhones (3GS) but there’s no working Jailbreak at the moment for the newly released iPhone 4 – something to do with the baseband I think. I’m not super familiar with Apple stuff though so do correct me if I’m wrong.

The note about this exploit comes at the bottom of this post:

SHAttered iPod touch 4G

The latest Apple TV isn’t even in people’s hands and its already close to being jailbroken, according to members of a hacker group that has a track record of successfully freeing iDevices from the artificial shackles of Steve Jobs & Co.

According to a post on Monday on the iPhone Dev Team Blog, members were able to crack the customized iOS firmware shortly after its release on Monday on an Apple download site. The release came the same day Apple began shipping the $99 device.

The download, which allows users to restore Apple TVs to their original factory settings, confirms rumors that Jobs’s “hobby” does in fact run iOS. More importantly, it gave iPhone Dev Team members an opportunity to run it through an in-development iOS 4.1 hacking tool they developed called SHAtter. They quickly extracted the cryptographic key used to lock down the Apple TV firmware, which is the first step in finding a reliable jailbreak.

The funny thing is AppleTV device hasn’t even shipped out yet and it’s already been jailbroken, they have also confirmed that it’s running on a version of iOS. This might be interesting for development of an iPhone 4 jailbreak.

Jailbreaks are a pretty hot topic at the moment with the iPhone 4 slowly releasing around the World after having been out commercially in the US for a couple of months now. It could set things up for a whole new slew of applications to come out too, imagine a hacked AppleTV with a custom iOS firmware or something else running on it (Android/MeeGo) hooked up via HDMI to your LCD/Plasma TV – now that’d be sweet!

It’s unclear exactly what could be done with a jailbroken Apple TV. Compared with other iDevices, it has a paltry amount of storage space. And, of course, there’s still the prospect that Apple will make last-minute changes to Apple TVs that patch the vulnerability SHatter exploits.

But as we’ve reckoned before, the mini USB port included with the Apple TV opens the door to running unauthorized code loaded on a patchstick. That in turn might allow users to run iPhone and iPad apps or add amenities such as SSH access, a USB-supported hard drive or even the ability to stream shows from Hulu.

All of that is in the future. With Monday’s commencement of Apple TV shipments, it won’t take long for us to find out.

The shipping starts next week and I’m pretty sure Apple is going to be doing something about this, so we’ll find out about the future of this neat hack pretty soon. We’ll also see if a spin-off iPhone 4 jailbreak comes out of this.

You can find direct download links for the AppleTV firmware files here:

AppleTV Firmware Download Locations

Source: The Register

Share
Tweet6
Share
Buffer
WhatsApp
Email
6 Shares

Filed Under: Apple, Exploits/Vulnerabilities, Hardware Hacking Tagged With: apple, jail break, jailbreak



Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

SUDO_KILLER - Auditing Sudo Configurations for Privilege Escalation Paths

SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Views: 136

sudo is a powerful utility in Unix-like systems that allows permitted users to execute commands with … ...More about SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Bantam - Advanced PHP Backdoor Management Tool For Post Exploitation

Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

Views: 322

Bantam is a lightweight post-exploitation utility written in C# that includes advanced payload … ...More about Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

AI-Powered Cybercrime in 2025 - The Dark Web’s New Arms Race

AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Views: 518

In 2025, the dark web isn't just a marketplace for illicit goods—it's a development lab. … ...More about AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Upload_Bypass - Bypass Upload Restrictions During Penetration Testing

Upload_Bypass – Bypass Upload Restrictions During Penetration Testing

Views: 507

Upload_Bypass is a command-line tool that automates discovering and exploiting weak file upload … ...More about Upload_Bypass – Bypass Upload Restrictions During Penetration Testing

Shell3r - Powerful Shellcode Obfuscator for Offensive Security

Shell3r – Powerful Shellcode Obfuscator for Offensive Security

Views: 698

If antivirus and EDR vendors are getting smarter, so are the tools that red teamers and penetration … ...More about Shell3r – Powerful Shellcode Obfuscator for Offensive Security

Understanding the Deep Web, Dark Web, and Darknet (2025 Guide)

Understanding the Deep Web, Dark Web, and Darknet (2025 Guide)

Views: 8,736

Introduction: How Much of the Internet Can You See? You're only scratching the surface when you … ...More about Understanding the Deep Web, Dark Web, and Darknet (2025 Guide)

Topics

  • Advertorial (28)
  • Apple (46)
  • Countermeasures (227)
  • Cryptography (82)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (431)
  • Forensics (65)
  • GenAI (3)
  • Hacker Culture (8)
  • Hacking News (229)
  • Hacking Tools (684)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (238)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (104)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (118)
  • Security Software (233)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (169)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker – Download brutus-aet2.zip AET2 (2,292,020)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,072)
  • Top 15 Security Utilities & Download Hacking Tools (2,096,614)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,199,675)
  • Password List Download Best Word List – Most Common Passwords (933,464)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (776,130)
  • Hack Tools/Exploits (673,287)
  • Wep0ff – Wireless WEP Key Cracker Tool (530,144)

Search

Recent Posts

  • SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths May 12, 2025
  • Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation May 9, 2025
  • AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race May 7, 2025
  • Upload_Bypass – Bypass Upload Restrictions During Penetration Testing May 5, 2025
  • Shell3r – Powerful Shellcode Obfuscator for Offensive Security May 2, 2025
  • Understanding the Deep Web, Dark Web, and Darknet (2025 Guide) April 30, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy