Also known as a Forensics Ramdisk, an SSH ramdisk is a versatile tool in iPhone research. Publicly available methods work on all devices vulnerable to the limera1n and checkm8 bootrom exploits.
Uses[edit]
- Retrieving data from a device
- Setting up a bare-bones jailbreak, with AFC2 access
- Or even installing a full jailbreak, as BlackGeek demonstrated with Geeksn0w or with 1.x versions of palera1n
See also[edit]
External links[edit]
- iPhone-dataprotection page on Google Code
- iPhone-dataprotection source code mirror on Github
- msftguy's blog on SSH ramdisk creation
- msftguy's SSH ramdisk source code on Github
- msftguy's SSH ramdisk JAR
- Ralph0045's newer SSH ramdisk tool
- Guide to achieve bare-bones jailbreak [Archived 2016-09-18 at the Wayback Machine]
- verygenericname's SSH Ramdisk Script for A7-A11