This is a guest post by Shyam Sam. If you want to guest post on this blog, check out the guidelines here.
Note: Absinthe tool for Windows is Officially released, Jailbreak your iDevice in Single Click, but Below Steps are for Geek users. Even every one can Try this method too. Try and Be a Geek
A5 jailbreak Absinthe now officially released for windows but still some geek users likes to Jailbreak their devices using Command Line Interface (CLI) method. Even i Jailbroke my iPad 2 by this method yesterday midnight when Jailbreak for Windows is not released here i give you step by step instructions to jailbreak A5 devices using CLI Method. Jailbreaking using CLI method is easy but not as easy comparing with Absinthe for windows. Dev. Team recommend it only for advanced users but it’s not that much dangerous as you think.
So here you go. Advanced users go to the end of the post for quick list of commands used!!
Step 1:
Make sure your iDevice is backed up using iTunes & Passcode is deactivated
Step 2:
Download Absinthe CLI files (Cinject) from here
Step 3:
Connect your iDevice to your PC
Step 4:
Extract the downloaded zip file to any folder.
(I extracted it to my user folder C:\users\yourusername & renamed that folder to cinject for easy typing)
Step 5:
Launch Command line (CMD) on your windows machine.
Press Win key + R & type “CMD” & press enter
Step 6:
Now CD Command line to “cinject” folder
Type
CD C:\users\yourusername\cinject
And press enter
Step 7:
Now type cinject & press enter to make sure that “cinject” is in the selected folder and working
Step 8:
Your command line will look like this
C:\Users\Shyam\cinject>cinject
Usage: cinject [ options ]Corona injector CLI v0.4.3
Copyright (C) 2011-2012 by iPhone Dev. Team
With exploit work by: @pod2g, @planetbeing, @saurik, @pimskeks, @p0sixninja, @Mu
scleNerd, and @xvolksOptions:
Configuration profiles:
-l List current profiles
-i <file> Install profile
-r [<pattern>] Remove all profiles, or profiles matching patternAFC transfers:
-a <number> Alternative afc service to use (2 is available after jailbreak)
-u <file> … Upload file(s) via afc (add final “dir=dirname” to specify which afc directory)
-d [<dir>] Show list of files in afc directory
-X <path> Delete afc directory or fileROP assistance:
-s Compute slide
-e Erase existing crash logs
-g Get diagnosticsBackups and restores:
-B Create backup
-R Restore from backup
-L <mbdb_file> List contents of an MBDB file
-M <file> Modify the ipsec.plist on device
-p <file> Modify the preferences.plist (requires -f too)
-f <file> File to use with -p
-H Hide media files
-U Unhide media filesChained operations:
-j <dir> Jailbreak device using given payloads directory (ADVANCED use only!)Other:
-w Watch syslog
-v <level> Debug verbosity level
-h This help messageC:\Users\Shyam\cinject>
Step 8:
Now type the following command without quotes & press enter
“cinject -i payloads/jailbreak.mobileconfig”
This will install an profile in your iDevice.
Step 9:
Now you will see dialog like this in your iDevice.
Now select “Install”
Now select “Install Now” and Install the Profile.
Step 10:
Now select next without entering any password.
now VPN profile for jailbreak will be installed & you can close settings & return to command line
Step 11:
Now enter the following command without quotes in CMD
“cinject -j payloads”
Your CMD will look like this
C:\Users\Shyam\cinject>cinject -j payloads
Finding slide…
Generating ROP…
ROP was generated
Uploaded corona/payload
Uploaded corona/payload-vars
Uploaded corona/racoon-exploit.conf
Uploaded corona/vnimage.clean
Uploaded corona/vnimage.overflow
Uploaded corona/vnimage.payload
Uploaded corona/corona.tgz
Uploaded corona/cleanup
Uploaded corona/com.apple.ipsec.plist
Uploaded corona/Cydia.tgz
Uploaded corona/filemover
Uploaded corona/filemover.plist
Uploaded corona/gzip
Uploaded corona/jailbreak
Uploaded corona/jailbreak.mobileconfig
Uploaded corona/jb.plist
Uploaded corona/racoon-exploit-bootstrap.conf
Uploaded corona/tar
Creating backup…
72 files backed up
Adding custom com.apple.ipsec.plist to backup
Restoring…
1 files restored
Now use “cinject -w” to start watching the syslog.
Then toggle VPN on and look for the “pod2g is in da house!” syslog message.
This actually takes an backup of your .plist files and modify some values and restore it plus inject some files for jailbreak.
Some users will stuck in backup those users “Erase All Content and Settings” setup like new iPad & after jailbreak restore backup with iTunes
Step 12:
Now enter following code in command line without quotes
“cinject -w”
Now your command line will look like matrix wallpaper, ignore everything.
Step 13:
At the end when it stops, Go to VPN Settings in your iDevice and toggle VPN ON and look for syslog message “pod2g is in da house!“. After that your iDevice will restart and you will see cydia on screen. Launch Cydia and enjoy your Jailbroken iPhone 4S &and iPad 2.
For Advanced Users:
- cinject -i payloads/jailbreak.mobileconfig
- cinject -j payloads
- cinject -w
- toggle VPN on
Author Info:
Guest post by @rajaspidey follow me on twitter
If you like this post, Share it to your friends. Dont forget to Subscribe our Feeds, Follow us on Twitter and Facebook.
toute etape ok sauf 12:
le VPN ne s’ouvre pas sur mon ipad 2 :
Jan 23 06:00:55 iPad configd[14] : IPSec connecting to server 127.0.0.1
Jan 23 06:00:55 iPad configd[14] : IPSec Phase1 starting.
Jan 23 06:00:55 iPad configd[14] : SCNC: start, triggered by Preferences, type IPSec, status 0
Jan 23 06:00:55 iPad racoon[224] : __SCPreferencesAccess CFPropertyListCreateWithData(): The operation couldn’t be completed. (Cocoa error 3840.)
Jan 23 06:00:56 iPad kernel[0] : launchd[224] Builtin profile: racoon (sandbox)
Jan 23 06:00:59 iPad Preferences[158] : -[WiFiManager(Private) _scanCompletedWithResults:]: Had to add our current network(bratscrew) back into our network cache
Jan 23 06:01:00 iPad racoon[224] : Entering racoon ROP.
Jan 23 06:01:00 iPad racoon[224] : shmBaseAddress: 1abf00
Jan 23 06:01:00 iPad racoon[224] : notifyd pid: 221
Jan 23 06:01:00 iPad racoon[224] : Looked up notification center: 0x1203
Jan 23 06:01:00 iPad racoon[224] : attached to notifyd
Jan 23 06:01:00 iPad racoon[224] : sleeping…
Jan 23 06:01:01 iPad racoon[224] : continuing…
Jan 23 06:01:01 iPad racoon[224] : detached!!!
Jan 23 06:01:01 iPad racoon[224] : sleeping…
Jan 23 06:01:02 iPad racoon[224] : Local port: 0x1703
Jan 23 06:01:02 iPad racoon[224] : attached to notifyd
Jan 23 06:01:02 iPad racoon[224] : sleeping…
Jan 23 06:01:03 iPad racoon[224] : continuing…
Jan 23 06:01:03 iPad racoon[224] : detached!!!
Jan 23 06:01:03 iPad racoon[224] : sleeping…
Jan 23 06:01:04 iPad racoon.log[226] : __SCPreferencesAccess CFPropertyListCreateWithData(): The operation couldn’t be completed. (Cocoa error 3840.)
Jan 23 06:01:04 iPad kernel[0] : missing or invalid entitlement hash
Jan 23 06:01:04 iPad racoon[224] : Racoon ROP ended.
Jan 23 06:01:04 iPad com.apple.launchd[1] (com.apple.racoon) : (com.apple.racoon) Throttling respawn: Will start in 1 seconds
Jan 23 06:01:05 iPad configd[14] : IPSec disconnecting from server 127.0.0.1
Jan 23 06:01:06 iPad racoon[228] : __SCPreferencesAccess CFPropertyListCreateWithData(): The operation couldn’t be completed. (Cocoa error 3840.)
Jan 23 06:01:06 iPad racoon[228] : IPSec disconnecting from server 127.0.0.1
Jan 23 06:01:06 iPad racoon[228] : IPSec disconnecting from server 127.0.0.1
Jan 23 06:01:06 iPad kernel[0] : launchd[228] Builtin profile: racoon (sandbox)
Jan 23 06:01:06 iPad racoon.log[226] : * Remounting root read-write…
Jan 23 06:01:06 iPad racoon.log[226] : * mount returned: -1
Jan 23 06:01:06 iPad racoon.log[226] : * Starting kernel exploit…
Jan 23 06:01:06 iPad racoon.log[226] : * Finished. Executing hello.
Jan 23 06:01:06 iPad amfid[219] : /private/var/mobile/Media/corona/jailbreak not valid: 0xe800801c: No code signature found.
Jan 23 06:01:06 iPad com.apple.launchd[1] (jb[226]) : (jb) Exited: Killed: 9
Jan 23 06:01:07 iPad kernel[0] : Sandbox: hook..execve() killing pid 226: outside of container && !i_can_has_debugger
Jan 23 06:01:12 iPad Preferences[158] : -[WiFiManager(Private) _scanCompletedWithResults:]: Had to add our current network(bratscrew) back into our network cache
Jan 23 06:01:16 iPad profiled[215] : (Note ) profiled: Idled.
Jan 23 06:01:16 iPad profiled[215] : (Note ) profiled: Service stopping.
Jan 23 06:01:25 iPad Preferences[158] : -[WiFiManager(Private) _scanCompletedWithResults:]: Had to add our current network(bratscrew) back into our network cache
profil installation: ok
ipad vide: ok
ios 5.0.1: ok
complement:
l’erreur semble apparaitre ici >
Jan 23 06:09:29 iPad racoon.log[246] : * Remounting root read-write…
Jan 23 06:09:29 iPad racoon.log[246] : * mount returned: -1
Jan 23 06:09:29 iPad racoon.log[246] : * Starting kernel exploit…
Jan 23 06:09:29 iPad racoon.log[246] : * Finished. Executing hello.
Jan 23 06:09:29 iPad amfid[244] : /private/var/mobile/Media/corona/jailbreak not valid: 0xe800801c: No code signature found.
Jan 23 06:09:29 iPad com.apple.launchd[1] (jb[246]) : (jb) Exited: Killed: 9
amazing and useful steps that are effective to use…nice info
when i install the profile it give me error : the profile “jailbreak” could not be installed
plz help