SlideShare una empresa de Scribd logo
1 de 28
ANDROID AND IOS
CRACKING
TWO POPULAR OS
1
‘IOS’ VS ‘ANDROID’
2
Development Platform
 Android OS:
 open platform, allowing the use of 3rd party
tools
 Key to OS success
 can reach core components
 iOS:
 Restrictive guidelines
 Fixed set of tools, nothing outside, nothing deep
 No Flash!
Multitasking Abilities
 Android OS:
 Very versatile  dynamic
 Highly fragmented  challenging
 In USA: 80 Android models vs. 9 iOS models
 Poor battery performance
 Best notification system (e.g. emails)
 iOS:
 Stable and exclusive platform
 Fixed set of tools, with clear potential and
boundaries  easier
IOS AND ANDROID
IOS
 IOS comprises the operating system
and technologies that you use to run
applications natively on devices , such
as ipad, iphone and ipod touch.
 IOS even ensures that performance and
battery space life don‟t suffer even if
you are multitasking.
IOS Software Specs
 Programmed in :C, C++, Objective-C
 OS family :OS X, UNIX
 Initial release :June 29,2007
 Kernel type :Hybrid (XNU)
 Default user :Cocoa touch
interface (multi-touch,GUI)
Devices
IOS ARCHITECTURE
 At the highest level, iOS acts as an intermediary
between the underlying hardware and the apps
that appear on the screen. The apps you create
rarely talk to the underlying hardware directly.
Instead, apps communicate with the hardware
through a set of well-defined system interfaces
that protect your app from hardware changes.
 The Kernel in IOS is based on same variant of the
basic mach Kernel that is found in MAC OSX
IOS Layers
 In IOS, there are four abstraction layers:-
ANDROID
 Android is a Linux based Operating System.
 Android is open source and Google releases the
code under the Apache License.
 This open source code and permissive licensing
allows the software to be freely modified and
distributed by device manufacturers, wireless
carriers and enthusiast developers.
ANDROID Specs
 Programmed in :C, C++, JAVA
 OS Family :UNIX-LIKE
 Initial release :September 23,2008
 Kernel type :Monolithic (Modified
Linux Kernel)
ANDROID Versions
Rooting Android
 What is Rooting?
• Rooting allows a user to gain
administrative access or root access.
• By default phones do not allow users root
access because the average consumer will
not need it. You are not average consumers.
• Root access allows you to
overclock/underclock the
CPU, install/uninstall whatever apps you
want. Install custom ROMs.
ANDROID: Roms and Rooting
• Read-only memory (ROM) is a class of storage
medium used in computers and other
electronic devices. Data stored in ROM cannot
be modified, or can be modified only slowly or
with difficulty, so it is mainly used to
distribute firmware (software that is very
closely tied to specific hardware, and unlikely
to need frequent updates).
• When people talk about ROM's on their phone
they're talking about ROM images
Benefits to Rooting
• Custom ROMS
 Stock ROM is based on the OS the
phone is shipped with
 AOSP (Android Open Source Project)
ROMs are based off the source code
released by Google and are typically
"vanilla" Android experience (No fancy
UI like HTC Sense or Motoblur)
• Enhanced performance
o e.g ext3 vs ext4
• Overclocking
• Unlocking features
Side Effects of Rooting
• Flashing will void your warranty!
• It's possible to "brick" your phone!
o When used in reference to consumer
electronics, "brick" describes a
device that cannot function in any
capacity (such as a device with
damaged firmware) OTA updates can
break root or brick the phone.
• Read ALL the instructions first and
multiple times if need be.
How to Root :
1. Before doing anything - Make a backup!
1. SMS, call logs text messages etc. can be erased so don't
take chances!
2. Every device is different but the basic premise is you need to
• unlock bootloader
• flash a custom recovery which will allow you to
• install Superuser APK
3. Before flashing a new ROM, make a backup of your current
ROM.
1. If anything goes wrong you'll be able to reflash a ROM
you know works.
IOS: Jailbreak
• One of the main reasons for jailbreaking is to
 expand the feature set limited by Apple and its
App Store and get paid apps for free.
• Users install these programs for purposes
including personalization and customization of
the interface, adding desired features and fixing
annoyances,and making development work
easier.
Jailbreak Process
• Jailbreak itself is getting control over the root
and media partition of your iDevice; where all
the iOS‟s files are stored at.
• To do so /private/etc/fstab must be patched.
• fstab is the switch room of your
iDevice, controlling the permission of the root
and media partition. The default is „read-
only‟, allowing eyes and no hands.
• The main problem is not getting the files in, but
getting them trough various checkpoints. These
checkpoints were put by Apple to verify if the file
is indeed legit, or a third-party.
Chain Of Trust
 Runs Bootrom: “SecureROM”
 Runs Bootloader
 Loads Kernel
 Loads iOS
 patch the checks or simply bypass
Exploit categories
 Bootrom exploit: Exploit done during the bootrom.
It can‟t be patched by conventional firmware
update, and must be patched by new hardware.
• the malicious code is injected before everything
 Userland exploit: Exploit done during or after the
kernel has loaded and can easily be patched by
Apple with a software update.
• injects the malicious code directly into the
openings back into the kernel
Types Of Jailbreak
• Tethered:
 With a tethered jailbreak, if the device starts
back up on its own, it will no longer have a
patched kernel, and it may get stuck in a
partially started state.
• Untethered:
 An untethered jailbreak has the property that
if the user turns the device off and back
on, the device will start up completely.
Cydia
 Developed by Jay Freeman (also called "saurik")
and his company, SaurikIT.
 Cydia is a graphical front end to Advanced
Packaging Tool (APT) and the dpkg package
management system, which means packages
available in Cydia are provided by a
decentralized system of repositories (also called
sources) that list these packages.
Cydia tweaks
1. Byta Font
2. SB Settings
3. Barrel
4. Zephyr
5. Call Bar
6. Activator
7. Swipe Selection
8. Bigify+
9. Springtomize
10. Bite SMS
Hackintosh
System requirements:
 -Processor: Intel Core 2 Duo, Core 2 Quad, Core i3, Core
i5, Core i7
 -Motherboard: Intel chipset with AHCI enabled
 -At least 2GB of memory (4GB or more strongly
recommended).
 -Most Nvidia 8xxx 9xxx 2xx 3xx 4xx 5xx 6xx graphics
cards
 -Most ATI HD 5xxx/6xxx series graphics cards
 -HD3000/HD4000 Integrated Graphics
 -USB Keyboard and Mouse. (Apple keyboard
recommended)
 -At least 40GB of internal hard disk space attached to
Intel SATA controller running in AHCI mode.
How to:
 Create a bootable pendrive from a mackintosh
computer or from a virtual machine with OSX
10.7 or 10.8 with MYHACK
 We should format the pendrive with HFS+ and
MBR or GPT partition table
 Then install the OS on pendrive with MYHACK
 Some BIOS settings should be altered for the OS
to run its bootloader ( Chameleon )
 Then install it on the HFS+ partition created on
HDD
 To install drivers we have to install KEXTS for
the specific hardware devise to work
Thank You
Bharat Veduruparthy
Nithin Kumar

Más contenido relacionado

La actualidad más candente

Android Rooting and Flashing
Android Rooting and FlashingAndroid Rooting and Flashing
Android Rooting and FlashingMuhammad Ehsan
 
Secret of Intel Management Engine by Igor Skochinsky
Secret of Intel Management Engine  by Igor SkochinskySecret of Intel Management Engine  by Igor Skochinsky
Secret of Intel Management Engine by Igor SkochinskyCODE BLUE
 
What is Rooting in Anndroid, Benefit and Risk of Android Rooting
What is Rooting in Anndroid, Benefit and Risk of Android RootingWhat is Rooting in Anndroid, Benefit and Risk of Android Rooting
What is Rooting in Anndroid, Benefit and Risk of Android Rootingkalaivanan97
 
Custom rom
Custom romCustom rom
Custom romMADRAG
 
from Realtime Operating systems to unlocking iPhones in less than 30 slides
from Realtime Operating systems to unlocking iPhones in less than 30 slidesfrom Realtime Operating systems to unlocking iPhones in less than 30 slides
from Realtime Operating systems to unlocking iPhones in less than 30 slidesKai Aras
 
Controlling USB Flash Drive Controllers: Expose of Hidden Features
Controlling USB Flash Drive Controllers: Expose of Hidden FeaturesControlling USB Flash Drive Controllers: Expose of Hidden Features
Controlling USB Flash Drive Controllers: Expose of Hidden Featuresxabean
 
Rooting of an android phone
Rooting of an android phoneRooting of an android phone
Rooting of an android phoneAbhishek Mahajan
 
Halvar Flake: Why Johnny can’t tell if he is compromised
Halvar Flake: Why Johnny can’t tell if he is compromisedHalvar Flake: Why Johnny can’t tell if he is compromised
Halvar Flake: Why Johnny can’t tell if he is compromisedArea41
 
CODE BLUE 2014 : BadXNU, A rotten apple! by PEDRO VILAÇA
CODE BLUE 2014 : BadXNU, A rotten apple! by PEDRO VILAÇACODE BLUE 2014 : BadXNU, A rotten apple! by PEDRO VILAÇA
CODE BLUE 2014 : BadXNU, A rotten apple! by PEDRO VILAÇACODE BLUE
 
Android Forensics: Exploring Android Internals and Android Apps
Android Forensics: Exploring Android Internals and Android AppsAndroid Forensics: Exploring Android Internals and Android Apps
Android Forensics: Exploring Android Internals and Android AppsMoe Tanabian
 
Mobile Security Assessment: 101
Mobile Security Assessment: 101Mobile Security Assessment: 101
Mobile Security Assessment: 101wireharbor
 
i Operating system
i Operating systemi Operating system
i Operating systemAkhil Kumar
 
インテルMEの秘密 - チップセットに隠されたコードと、それが一体何をするかを見出す方法 - by イゴール・スコチンスキー - Igor Skochinsky
インテルMEの秘密 - チップセットに隠されたコードと、それが一体何をするかを見出す方法 - by イゴール・スコチンスキー - Igor SkochinskyインテルMEの秘密 - チップセットに隠されたコードと、それが一体何をするかを見出す方法 - by イゴール・スコチンスキー - Igor Skochinsky
インテルMEの秘密 - チップセットに隠されたコードと、それが一体何をするかを見出す方法 - by イゴール・スコチンスキー - Igor SkochinskyCODE BLUE
 
Android introduction and rooting technology
Android introduction and rooting technologyAndroid introduction and rooting technology
Android introduction and rooting technologyGagandeep Nanda
 
iOS Platform & Architecture
iOS Platform & ArchitectureiOS Platform & Architecture
iOS Platform & Architecturekrishguttha
 

La actualidad más candente (20)

Android Rooting and Flashing
Android Rooting and FlashingAndroid Rooting and Flashing
Android Rooting and Flashing
 
Secret of Intel Management Engine by Igor Skochinsky
Secret of Intel Management Engine  by Igor SkochinskySecret of Intel Management Engine  by Igor Skochinsky
Secret of Intel Management Engine by Igor Skochinsky
 
Rooting android
Rooting androidRooting android
Rooting android
 
Android Rooting
Android RootingAndroid Rooting
Android Rooting
 
What is Rooting in Anndroid, Benefit and Risk of Android Rooting
What is Rooting in Anndroid, Benefit and Risk of Android RootingWhat is Rooting in Anndroid, Benefit and Risk of Android Rooting
What is Rooting in Anndroid, Benefit and Risk of Android Rooting
 
Custom rom
Custom romCustom rom
Custom rom
 
Rooting android
Rooting androidRooting android
Rooting android
 
from Realtime Operating systems to unlocking iPhones in less than 30 slides
from Realtime Operating systems to unlocking iPhones in less than 30 slidesfrom Realtime Operating systems to unlocking iPhones in less than 30 slides
from Realtime Operating systems to unlocking iPhones in less than 30 slides
 
Controlling USB Flash Drive Controllers: Expose of Hidden Features
Controlling USB Flash Drive Controllers: Expose of Hidden FeaturesControlling USB Flash Drive Controllers: Expose of Hidden Features
Controlling USB Flash Drive Controllers: Expose of Hidden Features
 
Rooting of an android phone
Rooting of an android phoneRooting of an android phone
Rooting of an android phone
 
Halvar Flake: Why Johnny can’t tell if he is compromised
Halvar Flake: Why Johnny can’t tell if he is compromisedHalvar Flake: Why Johnny can’t tell if he is compromised
Halvar Flake: Why Johnny can’t tell if he is compromised
 
Android Rooting
Android RootingAndroid Rooting
Android Rooting
 
Quiz part 2
Quiz part  2Quiz part  2
Quiz part 2
 
CODE BLUE 2014 : BadXNU, A rotten apple! by PEDRO VILAÇA
CODE BLUE 2014 : BadXNU, A rotten apple! by PEDRO VILAÇACODE BLUE 2014 : BadXNU, A rotten apple! by PEDRO VILAÇA
CODE BLUE 2014 : BadXNU, A rotten apple! by PEDRO VILAÇA
 
Android Forensics: Exploring Android Internals and Android Apps
Android Forensics: Exploring Android Internals and Android AppsAndroid Forensics: Exploring Android Internals and Android Apps
Android Forensics: Exploring Android Internals and Android Apps
 
Mobile Security Assessment: 101
Mobile Security Assessment: 101Mobile Security Assessment: 101
Mobile Security Assessment: 101
 
i Operating system
i Operating systemi Operating system
i Operating system
 
インテルMEの秘密 - チップセットに隠されたコードと、それが一体何をするかを見出す方法 - by イゴール・スコチンスキー - Igor Skochinsky
インテルMEの秘密 - チップセットに隠されたコードと、それが一体何をするかを見出す方法 - by イゴール・スコチンスキー - Igor SkochinskyインテルMEの秘密 - チップセットに隠されたコードと、それが一体何をするかを見出す方法 - by イゴール・スコチンスキー - Igor Skochinsky
インテルMEの秘密 - チップセットに隠されたコードと、それが一体何をするかを見出す方法 - by イゴール・スコチンスキー - Igor Skochinsky
 
Android introduction and rooting technology
Android introduction and rooting technologyAndroid introduction and rooting technology
Android introduction and rooting technology
 
iOS Platform & Architecture
iOS Platform & ArchitectureiOS Platform & Architecture
iOS Platform & Architecture
 

Destacado

Psd conversion-services
Psd conversion-servicesPsd conversion-services
Psd conversion-servicesMarkupCloud
 
Uu nomor 8 tahun 1985 tentang organisasi kemasyarakatan
Uu nomor 8 tahun 1985 tentang organisasi kemasyarakatanUu nomor 8 tahun 1985 tentang organisasi kemasyarakatan
Uu nomor 8 tahun 1985 tentang organisasi kemasyarakatanJamhur Ilmi
 
The treadstone updates 26 july 2014
The treadstone updates 26 july 2014The treadstone updates 26 july 2014
The treadstone updates 26 july 2014aiesechyderabad
 
Remember everything.key
Remember everything.keyRemember everything.key
Remember everything.keypolodesignca
 
Expansions '13 april lc day review
Expansions '13 april lc day reviewExpansions '13 april lc day review
Expansions '13 april lc day reviewaiesechyderabad
 
Big Data Public-Private Forum_European Data Forum 2012
Big Data Public-Private Forum_European Data Forum 2012Big Data Public-Private Forum_European Data Forum 2012
Big Data Public-Private Forum_European Data Forum 2012BIG Project
 
Struktur dan fungsi sel
Struktur dan fungsi selStruktur dan fungsi sel
Struktur dan fungsi seldwi_alam
 
Evolusi microsoft
Evolusi microsoftEvolusi microsoft
Evolusi microsoftlabiebm
 
ICPC 2012 - Mining Source Code Descriptions
ICPC 2012 - Mining Source Code DescriptionsICPC 2012 - Mining Source Code Descriptions
ICPC 2012 - Mining Source Code DescriptionsSebastiano Panichella
 
The dragons '13 april lc day review
The dragons '13 april lc day reviewThe dragons '13 april lc day review
The dragons '13 april lc day reviewaiesechyderabad
 

Destacado (20)

Psd conversion-services
Psd conversion-servicesPsd conversion-services
Psd conversion-services
 
Calendar elements
Calendar elementsCalendar elements
Calendar elements
 
Uu nomor 8 tahun 1985 tentang organisasi kemasyarakatan
Uu nomor 8 tahun 1985 tentang organisasi kemasyarakatanUu nomor 8 tahun 1985 tentang organisasi kemasyarakatan
Uu nomor 8 tahun 1985 tentang organisasi kemasyarakatan
 
Vistaar Updates
Vistaar UpdatesVistaar Updates
Vistaar Updates
 
Palladium
PalladiumPalladium
Palladium
 
Esprit july updates
Esprit july updatesEsprit july updates
Esprit july updates
 
The treadstone updates 26 july 2014
The treadstone updates 26 july 2014The treadstone updates 26 july 2014
The treadstone updates 26 july 2014
 
Chair pdf
Chair pdfChair pdf
Chair pdf
 
Remember everything.key
Remember everything.keyRemember everything.key
Remember everything.key
 
Monitor
MonitorMonitor
Monitor
 
Presentation1
Presentation1Presentation1
Presentation1
 
Expansions '13 april lc day review
Expansions '13 april lc day reviewExpansions '13 april lc day review
Expansions '13 april lc day review
 
Big Data Public-Private Forum_European Data Forum 2012
Big Data Public-Private Forum_European Data Forum 2012Big Data Public-Private Forum_European Data Forum 2012
Big Data Public-Private Forum_European Data Forum 2012
 
The origin
The originThe origin
The origin
 
Xd sona
Xd sonaXd sona
Xd sona
 
Struktur dan fungsi sel
Struktur dan fungsi selStruktur dan fungsi sel
Struktur dan fungsi sel
 
Nps education
Nps educationNps education
Nps education
 
Evolusi microsoft
Evolusi microsoftEvolusi microsoft
Evolusi microsoft
 
ICPC 2012 - Mining Source Code Descriptions
ICPC 2012 - Mining Source Code DescriptionsICPC 2012 - Mining Source Code Descriptions
ICPC 2012 - Mining Source Code Descriptions
 
The dragons '13 april lc day review
The dragons '13 april lc day reviewThe dragons '13 april lc day review
The dragons '13 april lc day review
 

Similar a Android and ios cracking, hackintosh included !

An IO sub system comprises of IO devices and their corresponding d.pdf
An IO sub system comprises of IO devices and their corresponding d.pdfAn IO sub system comprises of IO devices and their corresponding d.pdf
An IO sub system comprises of IO devices and their corresponding d.pdfsooryasalini
 
Taking Control of Your Mobile Device - Rooting-n-Roms
Taking Control of Your Mobile Device - Rooting-n-RomsTaking Control of Your Mobile Device - Rooting-n-Roms
Taking Control of Your Mobile Device - Rooting-n-Romsjimboks
 
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)FFRI, Inc.
 
Android vs ios System Architecture in OS perspective
Android vs ios System Architecture in OS perspectiveAndroid vs ios System Architecture in OS perspective
Android vs ios System Architecture in OS perspectiveRaj Pratim Bhattacharya
 
Forensics WS Consolidated
Forensics WS ConsolidatedForensics WS Consolidated
Forensics WS ConsolidatedKarter Rohrer
 
Pwning Windows Mobile applications by Ankit Giri
Pwning Windows Mobile applications by Ankit GiriPwning Windows Mobile applications by Ankit Giri
Pwning Windows Mobile applications by Ankit GiriOWASP Delhi
 
Android Mobile forensics with custom recoveries
Android Mobile forensics with custom recoveriesAndroid Mobile forensics with custom recoveries
Android Mobile forensics with custom recoveriesIbrahim Mosaad
 
8 NOT-So known operating systems
8 NOT-So known operating systems8 NOT-So known operating systems
8 NOT-So known operating systemsHuma Tariq
 
IOS vs Android presentation by Saikrishna
IOS vs Android presentation by SaikrishnaIOS vs Android presentation by Saikrishna
IOS vs Android presentation by SaikrishnaSaikrishna Tanguturu
 
Smart homes using android
Smart homes using androidSmart homes using android
Smart homes using androidDroidcon Berlin
 
ANDROID ROOTING
ANDROID ROOTINGANDROID ROOTING
ANDROID ROOTINGVishal Ash
 
Android word or phrases
Android word or phrasesAndroid word or phrases
Android word or phraseschael_boy
 
IRJET - Development of Embedded Linux System from Bare Board
IRJET - Development of Embedded Linux System from Bare BoardIRJET - Development of Embedded Linux System from Bare Board
IRJET - Development of Embedded Linux System from Bare BoardIRJET Journal
 
Ruxmon April 2014 - Introduction to iOS Penetration Testing
Ruxmon April 2014 - Introduction to iOS Penetration TestingRuxmon April 2014 - Introduction to iOS Penetration Testing
Ruxmon April 2014 - Introduction to iOS Penetration Testingeightbit
 

Similar a Android and ios cracking, hackintosh included ! (20)

Mobile operating system
Mobile operating systemMobile operating system
Mobile operating system
 
An IO sub system comprises of IO devices and their corresponding d.pdf
An IO sub system comprises of IO devices and their corresponding d.pdfAn IO sub system comprises of IO devices and their corresponding d.pdf
An IO sub system comprises of IO devices and their corresponding d.pdf
 
Taking Control of Your Mobile Device - Rooting-n-Roms
Taking Control of Your Mobile Device - Rooting-n-RomsTaking Control of Your Mobile Device - Rooting-n-Roms
Taking Control of Your Mobile Device - Rooting-n-Roms
 
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
 
Android vs ios System Architecture in OS perspective
Android vs ios System Architecture in OS perspectiveAndroid vs ios System Architecture in OS perspective
Android vs ios System Architecture in OS perspective
 
Android vs iOS
Android vs iOSAndroid vs iOS
Android vs iOS
 
Forensics WS Consolidated
Forensics WS ConsolidatedForensics WS Consolidated
Forensics WS Consolidated
 
Android architechture
Android architechtureAndroid architechture
Android architechture
 
Pwning Windows Mobile applications by Ankit Giri
Pwning Windows Mobile applications by Ankit GiriPwning Windows Mobile applications by Ankit Giri
Pwning Windows Mobile applications by Ankit Giri
 
Android Mobile forensics with custom recoveries
Android Mobile forensics with custom recoveriesAndroid Mobile forensics with custom recoveries
Android Mobile forensics with custom recoveries
 
8 NOT-So known operating systems
8 NOT-So known operating systems8 NOT-So known operating systems
8 NOT-So known operating systems
 
IOS vs Android presentation by Saikrishna
IOS vs Android presentation by SaikrishnaIOS vs Android presentation by Saikrishna
IOS vs Android presentation by Saikrishna
 
Android & IOS
Android & IOSAndroid & IOS
Android & IOS
 
Smart homes using android
Smart homes using androidSmart homes using android
Smart homes using android
 
ANDROID ROOTING
ANDROID ROOTINGANDROID ROOTING
ANDROID ROOTING
 
Android word or phrases
Android word or phrasesAndroid word or phrases
Android word or phrases
 
IRJET - Development of Embedded Linux System from Bare Board
IRJET - Development of Embedded Linux System from Bare BoardIRJET - Development of Embedded Linux System from Bare Board
IRJET - Development of Embedded Linux System from Bare Board
 
Beagle board101 esc-boston-2009b
Beagle board101 esc-boston-2009bBeagle board101 esc-boston-2009b
Beagle board101 esc-boston-2009b
 
Main notes (1)
Main notes (1)Main notes (1)
Main notes (1)
 
Ruxmon April 2014 - Introduction to iOS Penetration Testing
Ruxmon April 2014 - Introduction to iOS Penetration TestingRuxmon April 2014 - Introduction to iOS Penetration Testing
Ruxmon April 2014 - Introduction to iOS Penetration Testing
 

Último

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Último (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Android and ios cracking, hackintosh included !

  • 3. Development Platform  Android OS:  open platform, allowing the use of 3rd party tools  Key to OS success  can reach core components  iOS:  Restrictive guidelines  Fixed set of tools, nothing outside, nothing deep  No Flash!
  • 4. Multitasking Abilities  Android OS:  Very versatile  dynamic  Highly fragmented  challenging  In USA: 80 Android models vs. 9 iOS models  Poor battery performance  Best notification system (e.g. emails)  iOS:  Stable and exclusive platform  Fixed set of tools, with clear potential and boundaries  easier
  • 5. IOS AND ANDROID IOS  IOS comprises the operating system and technologies that you use to run applications natively on devices , such as ipad, iphone and ipod touch.  IOS even ensures that performance and battery space life don‟t suffer even if you are multitasking.
  • 6. IOS Software Specs  Programmed in :C, C++, Objective-C  OS family :OS X, UNIX  Initial release :June 29,2007  Kernel type :Hybrid (XNU)  Default user :Cocoa touch interface (multi-touch,GUI)
  • 8. IOS ARCHITECTURE  At the highest level, iOS acts as an intermediary between the underlying hardware and the apps that appear on the screen. The apps you create rarely talk to the underlying hardware directly. Instead, apps communicate with the hardware through a set of well-defined system interfaces that protect your app from hardware changes.  The Kernel in IOS is based on same variant of the basic mach Kernel that is found in MAC OSX
  • 9. IOS Layers  In IOS, there are four abstraction layers:-
  • 10. ANDROID  Android is a Linux based Operating System.  Android is open source and Google releases the code under the Apache License.  This open source code and permissive licensing allows the software to be freely modified and distributed by device manufacturers, wireless carriers and enthusiast developers.
  • 11. ANDROID Specs  Programmed in :C, C++, JAVA  OS Family :UNIX-LIKE  Initial release :September 23,2008  Kernel type :Monolithic (Modified Linux Kernel)
  • 13. Rooting Android  What is Rooting? • Rooting allows a user to gain administrative access or root access. • By default phones do not allow users root access because the average consumer will not need it. You are not average consumers. • Root access allows you to overclock/underclock the CPU, install/uninstall whatever apps you want. Install custom ROMs.
  • 14. ANDROID: Roms and Rooting • Read-only memory (ROM) is a class of storage medium used in computers and other electronic devices. Data stored in ROM cannot be modified, or can be modified only slowly or with difficulty, so it is mainly used to distribute firmware (software that is very closely tied to specific hardware, and unlikely to need frequent updates). • When people talk about ROM's on their phone they're talking about ROM images
  • 15. Benefits to Rooting • Custom ROMS  Stock ROM is based on the OS the phone is shipped with  AOSP (Android Open Source Project) ROMs are based off the source code released by Google and are typically "vanilla" Android experience (No fancy UI like HTC Sense or Motoblur) • Enhanced performance o e.g ext3 vs ext4 • Overclocking • Unlocking features
  • 16. Side Effects of Rooting • Flashing will void your warranty! • It's possible to "brick" your phone! o When used in reference to consumer electronics, "brick" describes a device that cannot function in any capacity (such as a device with damaged firmware) OTA updates can break root or brick the phone. • Read ALL the instructions first and multiple times if need be.
  • 17. How to Root : 1. Before doing anything - Make a backup! 1. SMS, call logs text messages etc. can be erased so don't take chances! 2. Every device is different but the basic premise is you need to • unlock bootloader • flash a custom recovery which will allow you to • install Superuser APK 3. Before flashing a new ROM, make a backup of your current ROM. 1. If anything goes wrong you'll be able to reflash a ROM you know works.
  • 18. IOS: Jailbreak • One of the main reasons for jailbreaking is to  expand the feature set limited by Apple and its App Store and get paid apps for free. • Users install these programs for purposes including personalization and customization of the interface, adding desired features and fixing annoyances,and making development work easier.
  • 19. Jailbreak Process • Jailbreak itself is getting control over the root and media partition of your iDevice; where all the iOS‟s files are stored at. • To do so /private/etc/fstab must be patched. • fstab is the switch room of your iDevice, controlling the permission of the root and media partition. The default is „read- only‟, allowing eyes and no hands. • The main problem is not getting the files in, but getting them trough various checkpoints. These checkpoints were put by Apple to verify if the file is indeed legit, or a third-party.
  • 20. Chain Of Trust  Runs Bootrom: “SecureROM”  Runs Bootloader  Loads Kernel  Loads iOS  patch the checks or simply bypass
  • 21. Exploit categories  Bootrom exploit: Exploit done during the bootrom. It can‟t be patched by conventional firmware update, and must be patched by new hardware. • the malicious code is injected before everything  Userland exploit: Exploit done during or after the kernel has loaded and can easily be patched by Apple with a software update. • injects the malicious code directly into the openings back into the kernel
  • 22. Types Of Jailbreak • Tethered:  With a tethered jailbreak, if the device starts back up on its own, it will no longer have a patched kernel, and it may get stuck in a partially started state. • Untethered:  An untethered jailbreak has the property that if the user turns the device off and back on, the device will start up completely.
  • 23. Cydia  Developed by Jay Freeman (also called "saurik") and his company, SaurikIT.  Cydia is a graphical front end to Advanced Packaging Tool (APT) and the dpkg package management system, which means packages available in Cydia are provided by a decentralized system of repositories (also called sources) that list these packages.
  • 24. Cydia tweaks 1. Byta Font 2. SB Settings 3. Barrel 4. Zephyr 5. Call Bar 6. Activator 7. Swipe Selection 8. Bigify+ 9. Springtomize 10. Bite SMS
  • 26. System requirements:  -Processor: Intel Core 2 Duo, Core 2 Quad, Core i3, Core i5, Core i7  -Motherboard: Intel chipset with AHCI enabled  -At least 2GB of memory (4GB or more strongly recommended).  -Most Nvidia 8xxx 9xxx 2xx 3xx 4xx 5xx 6xx graphics cards  -Most ATI HD 5xxx/6xxx series graphics cards  -HD3000/HD4000 Integrated Graphics  -USB Keyboard and Mouse. (Apple keyboard recommended)  -At least 40GB of internal hard disk space attached to Intel SATA controller running in AHCI mode.
  • 27. How to:  Create a bootable pendrive from a mackintosh computer or from a virtual machine with OSX 10.7 or 10.8 with MYHACK  We should format the pendrive with HFS+ and MBR or GPT partition table  Then install the OS on pendrive with MYHACK  Some BIOS settings should be altered for the OS to run its bootloader ( Chameleon )  Then install it on the HFS+ partition created on HDD  To install drivers we have to install KEXTS for the specific hardware devise to work