This Repo is forked from LinusHenze/Fugu14. I modified some so that it can use codemagic to online build and you dont need to install local XCODE.
- A mac (Yes yes I know. Though most of the processes are done online, this tutorial still require a mac environment to install. So please use VM or Hackintosh if you are Windows/Linux)
- VNC client
- Download ipsw, it should match your device and ios version
- extract ipsw, extract the largest dmg, obtain the [dmg_root]/Applications/Spotlight.app/Spotlight, upload it to [your_forked_repo]/tools/
- You may use ssh to manually build. After the building, you will get two .ipa, run ideviceinstaller -i [Fugu14_setup.ipa] on a mac first, run the jailbreak and then ideviceinstaller -i [Fugu14_pwn.ipa] again
- Fork this repo.
- Login https://codemagic.io/start/ with your github account, you can bind the forked repo to the apps for quick start.
- Start a build, it will be halted up until you mkdir DONE under ~/clone. Before continue, you should config everything properly.
- VNC to the Remote server.
- Open Finder, navigate to ~/clone/arm/iOS/Fugu14App/, open Fugu14App.xcodeproj
- In Xcode, click Fugu14 on the left-side panel(top-most item of the tree view). In the middle pannel, click Signing & Capabilities. You will notice there are errors about signing.
- Click team, add team, login with your Apple id.
- Xcode will ask for password to unlock keychain, leave it blank and enter.
- Change the bundle name with a random one(you better note it down so that you dont waste an APP ID), Xcode will automatically generate a free provision.
- If no warnings or errors, close xcode. Make a dir called DONE in ~/clone.
- Then cross your finger, one the compile is done, there will be two .ipa file.
Fugu14 is an (incomplete) iOS 14 Jailbreak, including an untether (persistence), kernel exploit, kernel PAC bypass and PPL bypass. The CVE numbers of the vulnerabilities are: CVE-2021-30740, CVE-2021-30768, CVE-2021-30769, CVE-2021-30770 and CVE-2021-30773.
Fugu14 should support all arm64e devices (iPhone XS and newer) on iOS 14.3 - 14.5.1.
Support for lower versions (down to 14.2) can be added by editing arm/shared/ClosurePwn/Sources/ClosurePwn/PwnClosure.swift
and arm/shared/KernelExploit/Sources/KernelExploit/offsets.swift
.
arm64 devices are not supported because the exploit to install the Fugu14 App does not work on these devices.
However, it is in theory possible to install the untether on them (e.g. via checkra1n).
Note that all of this code was written specifically for arm64e, so some changes are required to add arm64 support to the untether.
- The kernel exploit is extremely reliable (it will never trigger a kernel panic)
- A simple TCP shell is available on port 1337
- Trustcaches put in
/.Fugu14Untether/trustcaches/
will be loaded automatically - Executables put in
/.Fugu14Untether/autorun/
will be launched during boot (make sure to also create a trust cache for your executable!) - Supports Siguza's libkrw library (load
/usr/lib/libkrw/libFugu14Krw.dylib
and callkrw_initializer
) - (Jailbreak Developers: You can make your jailbreak untethered just by creating a CLI version that supports libkrw, copying it to
/.Fugu14Untether/autorun/
and writing a trust cache to/.Fugu14Untether/trustcaches/
)
- Messing around with the untether may BOOTLOOP your device
- The fast untether (disabled unless you edit the source code) HAS NOT BEEN TESTED ON A REAL DEVICE -- DO NOT USE IT
- Additionally, the fast untether (in case it actually works) is more UNSAFE than the "slow" untether
- Developers: PLEASE TEST ANY CHANGES YOU MAKE TO THE UNTETHER ON A VIRTUAL DEVICE FIRST
Requirements:
- You need a supported device running a supported iOS version (see above)
- The device must be connected via USB
- You need the IPSW for your device, unzipped
- You need to have Xcode installed
- You need to have iproxy and ideviceinstaller installed (brew install usbmuxd ideviceinstaller)
To build and run the iOS Jailbreak, all you have to do is run the ios_install.py
script and follow the instructions.
In case you get a code signing error, open arm/iOS/Fugu14App/Fugu14App.xcodeproj
and edit the code signing options.
So you didn't read the warning section and your device is now in a bootloop. Let's hope you didn't enable the fast untether.
Anyway, before updating your device to the latest iOS version, try the following first:
- Install irecovery on your computer
- Connect your device via USB and boot into the recovery mode
- Run
irecovery -s
on your computer, then enter the following commands:
- setenv boot-args no_untether
- saveenv
- reboot
- Your device should now boot again. If it doesn't, repeat step two again, run
irecovery -s
and then enter these commands:
- setenv boot-args untether_force_restore
- saveenv
- reboot
- Device still won't boot? Then you'll have to update it to the latest version unfortunately :/
Like most software, Fugu14 contains (derived) code which was written by others.
I would therefore like to thank the people below for open-sourcing their code:
- Samuel Groß: SLOP technique (as used in the dyld exploit) and the JavaScript Int64 library (+ utils)
Currently, the remount patch has copyright issues which I'm trying to resolve ASAP. Apparently, multiple parties think the code is theirs so I don't know what to do right now. I just write this here and hope no one DMCA's me.
Fugu14 also includes various header files from Apple.
For more information, please see credits.txt.
Fugu14 is released under the MIT license. Please see the LICENSE
file for more information.