Originally posted by gamer89117
ok. i have done a lot of research on finding vulnerabilites and then exploiting it. i just need verifaction on this. i have found that fuzzing is one of the easiest ways of finding vulnerabilities. so you need to ssh and send a code (like a variable that the kernal cant handle) then the device freaks out and sends a dump file and you will retrieve it and figure out what it was that it crashed and use it to your advantage to take over the devise. i know that tethered is getting control of /mobile/ and untethered is control over root. so now here are my questions. how do u enable yourself to send the device the code? how can you actually gain control over the root and how can you tell the difference between root and mobile stuff once you get the dump file? so then once you have contol you send it your own custom code and then you can install your own programs?
Alright, first of all, your research is correct. However, most exploits are kernel-based, and extremely hard to find. It's not a case of "plug iPhone in, fuzz random strings, find exploit and jailbreak". The whole process is much more complex. And you need at least professional knowledge of Linux before even attempting. The command "whoami" will tell you if you have root (uid 0) or not.
Anyway, like I said, you can't just plug in an iPhone and find an exploit. It takes a long time for the professionals, let alone newbs. And besides, even if you found an exploit, you have to package it into a usable frame otherwise you're stuck at the command line.
Trust me when I say this. It's all fair saying "I want to find an exploit!" but actually doing that is much easier said than done.