Skip to content

Thoughts on Jailbreak

Published: at 12:00 AM

Why Need to Jailbreak

Apple’s App Sandbox

On iOS, every app operates within its own sandbox, ensuring it can only access data stored in its unique home directory. If an app needs to access data outside its directory - like files in iCloud or photos - it must use specific iOS services. This sandboxing means that other apps can’t read or alter your app’s data, keeping it secure and isolated. app-sandbox

Apple’s App Sandbox leverages UNIX user permissions to ensure apps run with the less privileged “mobile” user. Anything outside the app’s home directory is mounted as read-only. iOS includes robust measures to prevent memory-related security vulnerabilities. One key method is Address Space Layout Randomization (ASLR), which randomizes the memory regions assigned to each app every time it starts. This makes it much harder for attackers to exploit memory corruption bugs. Additionally, memory pages are marked as non-executable using ARM’s Execute Never (XN) feature, which prevents malicious code from being executed

Benefits of Jailbreak

Jailbreaking is about breaking free from the constraints imposed by Apple’s App Sandbox and security features. It removes these limitations, allowing users to control their devices fully. This includes:

Drawback

Warning: Jailbreaking your iDevice greatly compromises its security. It is not advisable to perform this on your primary device. A jailbroken device is for penetration testing only, not for regular use.

Run on a Real Device

Unlike Android, which offers a range of options like Android Virtual Device (AVD) and other emulators that replicate actual hardware, iOS only provides Xcode’s Simulator. This tool mimics the software environment but not the hardware, and it uses x86 code for emulator binaries instead of ARM code. As a result, apps compiled for real devices won’t run on the simulator, making it ineffective for black box analysis and reverse engineering. XCode Simulator

Is there an iOS emulator? Yes, Corellium is an option. However, it’s an enterprise SaaS solution with a per-user license model and does not offer a trial version. Therefore, for effective iOS app penetration testing, using a real iOS device is necessary to accurately identify and address vulnerabilities.

Here is a useful article which will explain the differences between a real device and the iOS simulator. In short, here’s a summary of the key differences between testing an iOS app on the simulator versus a real device:

Types of Jailbreak

Not all jailbreaks work in the same way. This page will take you through each type of jailbreak and explain how they work. (This section is copied from ios.cfw.guide)

1. Untethered Jailbreaks

Untethered jailbreaks can be considered the holy grail of all jailbreaks. They only require the exploit to be ran once either via a website, an app or a computer. untethe

After that, your device is fully jailbroken and won’t require any further action. The exploit will stay on a device even after you reboot it. Unfortunately, there hasn’t been a new untethered jailbreak for end users in a very long time, and it’s likely we won’t see one for even longer. The only downside to an untethered jailbreak is that if something goes wrong, it could very well result in a bootloop requiring you to restore your device via iTunes or Finder (macOS Catalina or newer). The likelihood of this happening is low, but is indeed possible. A few examples of untethered jailbreaks are p0sixspwn and Pangu9.

2. Semi-Untethered Jailbreaks

Semi-untethered jailbreaks have been the most popular type of jailbreak in recent years. This type of jailbreak requires an exploit to be executed every time you reboot or turn off your device. semi-unte

This jailbreak works by running the exploit through an app or website on the device itself. Due to the nature of how the exploit is ran, however, these jailbreaks are easily removable through their respective app. A few examples of semi-untethered jailbreaks include Taurine, Dopamine, and Odyssey.

3. Semi-Tethered Jailbreaks

Semi-tethered jailbreaks are very similar to semi-untethered jailbreaks, however the exploit must be ran using a computer rather than using a sideloaded app. semi-te

Due to requiring a computer to rejailbreak after every reboot, most choose to use a semi-untethered jailbreak instead. A few examples of a semi-tethered jailbreak include palera1n and Odysseyra1n.

4. Tethered Jailbreaks

Tethered jailbreaks are not meant to be used by the general public. These exploits modify the device in a way that it requires a PC to even boot at all, even without a jailbreak. Because of this, these tend to only be used by jailbreak developers getting ready for a newer version of iOS.

References: