Showing posts with label iphone 5c. Show all posts
Showing posts with label iphone 5c. Show all posts

Thursday, March 20, 2014

How to Jailbreak APPLE IOS 7.1 for Ipads iphones step by step




How to Jailbreak APPLE IOS 7.1 for Ipads iphones step by step 



- Download and install iOS Soft Dev Pack 

- Click on Tethered Jailbreak iOS 7.1 iPhone 4 ONLY!!!

- Click 1 to run the ssh_rd tool

- Put your iPhone 4 into DFU mode

- Wait until ssh_rd tool is done (when you see Successful in GREEN letters)

- Click number 2 to mount your device filesystem (if not mounted the first time, just close the window, 
and click number 2 again)

- Click number 3 to copy the needed files over to tether jailbreak your iPhone 4

- Your device will reboot and look like its in restore mode.

- Click Tethered Boot iOS 7.1 iPhone 4 button (depending on your device you will need to choose the 
correct tether boot option they are as follows: AT&T-3,1 Sprint-3,2 Verizon- 3,3).

- Once its done you wont see Cydia just yet, this is a tethered Jailbreak.

- Now you need to boot tether your device again by following step 10 again (Click tethered boot iOS 
7.1 iPhone 4 button depending on your device you will need to choose the correct tether boot option 
they are as follows: AT&T-3,1 Sprint-3,2 Verizon-3,3).


- This time when your device turns on, scroll to the side, and you'll find Cydia!

Sunday, March 16, 2014

How to Flash Sprint Iphone 5c to pageplus ( video )



How to flash sprint Iphone 5c to pageplus 
every step must be followed exactly
please share if you have the time



Subscribe to our youtube: https://www.youtube.com/channel/UC5_Pc9pv4XUgDey47kQ1V0g
Follow us on twitter: https://twitter.com/CDMA_GSM_GURU

We Are Giving away a free Ipad mini: http://cdmaflashingguide.blogspot.com/2014/03/we-are-giving-away-ipad-mini-for-you.html


JAILBREAK!!!! http://evasi0n.com/
links to tools you will need !!!!
FUNBOX 2014
http://www.i-funbox.com/

CYDIA SOURCES
- itiaprepo.com/frankerebus GET COMMCENTER PATCH IOS7
- cydia.myrepospace.com/cdma PAGEPLUSCARRIERBUNDLE
cydia programs to download FREE
do a search in cydia and get
afc2add , tetherize, fakecarrier "to change name of carrier by signal"
PRL SOURCES
http://www.cricketize.com/ztahoez/PP5...
paste the prl with ifunbox into USR folder yes it's called " USR "
carrier bundles to rename
located in ifunbox under classic "click on your phone model at bottom then click fun classic" the goto RAW / SYSTEM / LIBRARY / IPHONE / CARRIER BUNDLES
Rename Sprint_CSIM_LTE_US.bundle to sprintBackup.bundle
Rename Tracfone_US.bundle to Sprint_CSIM_LTE_US.bundle
ALSO PUT THE PP PRL IN THE OLD TRACFONE BUNDLE WHEN YU PASTE IT IN FOLDER RENAME CARRIER.PRL TO CARRIERBACKUP.PRL THEN RENAME PAGEPLUSPRL TO carrier.prl pull sim card out then put sime back in if it doesn't say TFC yet don't worry now goto the sources you added and add the commcnterpatch & pp carrier bundle reboot and now it should say TFC by signal ! 

How to flash iphone 5s to pageplus easy guide




How to Flash Iphone 5s to pageplus 



Subscribe to our youtube: https://www.youtube.com/channel/UC5_Pc9pv4XUgDey47kQ1V0g
Follow us on twitter: https://twitter.com/CDMA_GSM_GURU

We Are Giving away a free Ipad mini: http://cdmaflashingguide.blogspot.com/2014/03/we-are-giving-away-ipad-mini-for-you.html


Please comment if you need help


JAILBREAK!!!! http://evasi0n.com/
links to tools you will need !!!!
FUNBOX 2014
http://www.i-funbox.com/

CYDIA SOURCES
- itiaprepo.com/frankerebus GET COMMCENTER PATCH IOS7
- cydia.myrepospace.com/cdma PAGEPLUSCARRIERBUNDLE
cydia programs to download FREE
do a search in cydia and get
afc2add , tetherize, fakecarrier "to change name of carrier by signal"
PRL SOURCES
http://www.cricketize.com/ztahoez/PP5...
paste the prl with ifunbox into USR folder yes it's called " USR "
carrier bundles to rename
located in ifunbox under classic "click on your phone model at bottom then click fun classic" the goto RAW / SYSTEM / LIBRARY / IPHONE / CARRIER BUNDLES
Rename Sprint_CSIM_LTE_US.bundle to sprintBackup.bundle
Rename Tracfone_US.bundle to Sprint_CSIM_LTE_US.bundle
ALSO PUT THE PP PRL IN THE OLD TRACFONE BUNDLE WHEN YU PASTE IT IN FOLDER RENAME CARRIER.PRL TO CARRIERBACKUP.PRL THEN RENAME PAGEPLUSPRL TO carrier.prl pull sim card out then put sime back in if it doesn't say TFC yet don't worry now goto the sources you added and add the commcnterpatch & pp carrier bundle reboot and now it should say TFC by signal ! 

Icloud Activation Bypass 7.1 For Apple Ipad Iphones




What to be aware of
Uadate:http://cdmaflashingguide.blogspot.com/2014/03/icloud-activation-bypass-71-for-apple_19.html

Subscribe to our youtube: https://www.youtube.com/channel/UC5_Pc9pv4XUgDey47kQ1V0g
Follow us on twitter: https://twitter.com/CDMA_GSM_GURU


There have been a load of reports coming in of a new bypass for Icloud activation lock 7.1 for the Ipad and Iphones. Well i can honestly say that all of these reports have been false. There has been a lot of work put into the project of this bypass but currently the is no way around it. So if a Survey is required then probably it is a fake. If anything comes to pass we will post here for free. We have been putting in a lot of work for this project but we have nothing solid yet.


Please Comment Any Tutorial request you may have. 
and have a great day.

También hablamos español por lo que si usted tiene alguna pregunta no dude en preguntar.


Monday, March 10, 2014

Apple credits iOS 7.1 security changes to evad3rs and other jailbreak community members

iOs 7.1 (teaser 001)

Following the release of the first major iOS 7.1 software update earlier today, Apple has now updated contents of the support document which outlines security updates for its products with a link to this newly created document describing iOS 7.1 security improvements.
In it, Apple credits prominent members of the jailbreak community such as evad3rs, the team behind the evasi0n jailbreak, as well as Google and others who reported issues and helped contribute toward the security changes within iOS 7.1…
Speaking of evad3rs, the team has been credited with contributing to four different changes in iOS 7.1.
One deals with a bug allowing a maliciously crafted backup to alter the iOS filesystem, the other details a crash reporting issue that could allow a local user to change permissions on arbitrary files and the remaining two concern a kernel issue that could allow arbitrary code execution in the kernel itself (the stuff of which jailbreaks are made) and a bug that could enable an attacker to bypass code signing requirements.
Screen Shot 2014-03-10 at 18.29.56
Apple also credits other members of the jailbreak community such as Springtomize 3 developer Filippo Bigarella and talented iOS hacker Stefan Esser.
Filippo was mentioned in regard to an exploit allowing a malicious app to cause an unexpected system termination and Stefan got thumbs up for turning Apple’s attention to a dangerous bug that enabled a man-in-the-middle attacker to entice a user into downloading a malicious app via Enterprise App Download.
This isn’t the first time Apple thanked prominent hackers for their discoveries. In 2012, for instance, the company credited the 2012 iOS Jailbreak Dream Team with finding a kernel exploit that got patched in iOS 5.1. Likewise, following the release of iOS 6.1.3 in March 2013, Apple in this security note credited the discovery of four of the six bugs fixed to evad3rs.
All in all, the document details two dozen security-related issues in iOS 7 and a total of 41 vulnerabilities that have been fixed or mitigated in iOS 7.1. In addition to prominent hackers, Google’s Chrome Security Team and ordinary users have contributed as well.
Of the whopping nineteen vulnerabilities discovered in Safari’s Webkit browser engine, nine were reported to Apple by Google’s Chrome Security Team. WebKit was previously used in Google’s Chrome web browser.
Signing off, have you ever wondered why Apple stubbornly refuses to publicly acknowledge dangerous security exploits in its software, over which it gets chastised a lot by less-informed media outlets?
“Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available,” states the document.
See, this is for your own protection.
As a friendly reminder, jailbreakers should absolutely stay away from iOS 7.1 unless they want to lose their jailbreak because once you upgrade to iOS 7.1, you won’t be able to downgrade again – even with SHSH blobs.

Saturday, March 8, 2014

How to Bypass iPhone 5s 5c Apple ID Activation Lock iOS 7 0 1 6 Updated March 2014


Video How to Bypass iPhone 5s 5c Apple ID Activation Lock iOS 7 0 1 6 Updated March 2014 



How to Flash From T-Mobile to Verizon Wireless

  • Overview

    T-Mobile wireless devices come "locked," meaning they will only work with SIM cards from T-Mobile, and you will be unable to use a SIM card from a different provider, such as Verizon Wireless. Unlocking your T-Mobile device will allow you to use it on theVerizon Wireless network, using a Verizon service plan instead of a T-Mobile plan. Flashing from T-Mobile to Verizon Wireless may not sound like an easy task at first, but it is relatively simple. T-Mobile actually supports the unlocking of its phones for various reasons, and by using a simple unlock code, you can free your phone to work on not just the Verizon Wireless network, but any network out there.

    • Step 1

      Call T-Mobile's customer service line at (800) T-MOBILE and explain your desire to use a different SIM card with your phone. Usually this must be submitted as a "request," but a representative contacts you back via phone or email with a unique unlock code. You can also purchase these unlock codes through online sites, such as eBay, where sellers auction off these codes for $10 to $20 each.
    • Step 2

      Start by plugging your phone in to a wall outlet, or simply making sure it is fully charged. If the phone were to shutdown or try to restart during the unlocking process, it could cause damage to the phone. With the phone off, remove the existing SIM card (if applicable), and insert your Verizon Wireless SIM card. Now power the phone on, and you should be greeted with a different screen than usual, saying that the phone does not recognize the SIM card.
    • Step 3
    • Type in your unlock code once the screen says "Enter Special Code." If this screen does not appear automatically, you can make it show up manually. Hold the * key until an entry box appears. Type in *#32# and select "OK." You will now be able to enter your unlock code to unlock the phone. When completed, you should be shown a message that says either "Completed" or "Deleted." You can now use your T-Mobile phone on the Verizon Wireless network.

    • Skill: Moderately Easy
    • Ingredients:
    • T-Mobile wireless device
    • Verizon Wireless SIM card
    • Phone

    How to turn off Find My iPhone remotely and bypass Activation Lock

    How to turn of Find My iPhone remotely and bypass Activation Lock
    If you're running iOS 7 or higher on your iPhone or iPad, Find My iPhone now comes with a feature called Activation Lock that prevents someone from wiping and using your device without your authorization. While it's a great theft deterrent, we see lots of people having issues due to forgetting to turn off Find My iPhone. Most commonly the problem comes up with second hand iPhones that have been bought, sold, or traded. Luckily, the previous owner can deactivate Find My iPhone remotely which should then, in turn, allow you to bypass Activation Lock. Here's how:

    What you need to know first

    Before beginning, please note that the original owner of the device will need to know the iCloud email address and password that is currently tied to the device. Without that, there is no way to bypass Activation Lock or Find My iPhone. The original owner will need to perform one of the following options, unless you know their iCloud info and can do it yourself.
    Also, not all methods work for all people. You may have to try all three before you find one that works for you. So if the first method you try doesn't work, make sure you try the other one.

    How to remove a device from an iCloud account using the Find My iPhone app

      1. Turn the iPhone or iPad in question Off or put it in airplane mode. If the device is on and Find My iPhone has an active location, it will not allow you to delete it.
    1. Launch the Find My iPhone app from a different iPhone, iPad, or iPod touch and sign in to the account that is currently tied to the iOS device in question.
    2. Find the device in the list and tap on it.
    3. In the top right hand corner, tap on Remove.
    That's all there is to it. If for some reason you don't see a Remove option, which some people won't, you'll need to try the method below using iCloud.com instead.

    How to remove a device from an iCloud account using iCloud.com

    1. Turn the iPhone or iPad in question Off or put it in airplane mode. If the device is on and Find My iPhone has an active location, it will not allow you to delete it.
    2. From a computer, go to www.icloud.com and sign in using the iCloud ID that is currently tied to the iPhone or iPad in question.
    3. Now click on Find My iPhone.
    4. Click on All Devices at the top of the Find My iPhone screen.
    5. Find the device in question in the list and click on it.
    6. On the next screen, click on Remove from Account. You may get a popup over the map instead, if that's the case, refer to below.
    7. One more popup will come up asking you to confirm. Click on Remove.
    If you got a popup with device information on the map instead of the device information screen like shown in the steps above, verify the device is Off and Find My iPhone isn't finding a location for it. If that's the case, follow these steps:
    1. Click on All Devices at the top of the Find My iPhone screen one more time.
    2. Find the device in the list again and this time you should see a gray x appear to the right of it. Click it.
    3. A popup will appear asking you if you're sure you want to remove the device. Click Remove.
    That's it. No matter what method you followed above, the iPhone, iPad, or iPod touch in question should now be removed from the iCloud account it was associated with. Try restoring it again and this time, Activation Lock shouldn't be an issue.

    Apple's iCloud security feature in OSX is bypassed in just 70 lines of code

    If there is anything the tech world has learned about security, its that four-digit PINs are fundamentally unsafe. Align that against a poorly managed security foundation, and what you have is an open invitation for brute-force attacks. Unfortunately, this is what Apple has done with their iCloud implementation. If an Apple computer is remotely locked by an iOS device, the user would need to enter a 4-digit PIN on the Find My Mac app in order to unlock the machine.
    A Github user by the name of knoy has uploaded iCloudHacker: its only about 70 or so lines of Arduino code that doesn't just make it ridiculously straightforward to brute-force your way through the Find My Mac lockout, but it also dances around the surprisingly lackluster security controls that Apple had tried to implement. The coder reports that it has been successfully tried and tested on 2010 & 2012 13" MacBooks.
    The code in this program isn't doing anything fancy or special, nor is it exploiting something behind the scenes. It merely simulates a mouse and keyboard via USB and proceeds to enter passwords similar to how any normal user would. Don't get comfortable however-- this is worse than if it was utilizing some obscure exploit. What this means is that the same method can be repeated with anyone just entering passwords over and over again, and more importantly, it means they're being allowed to do so without the OS preventing them.
    Rather than waiting for the 5 minute lock-out to expire before having another attempt, its quicker to just reboot
    The first thing the program does upon boot is wait 5 seconds for the WiFi pop-up, and it would then move the mouse cursor over to the pop-up and close it. It then starts looping through the possible PIN combinations until it eventually hits a one minute security lockout, which makes the user wait before being able to guess again. At this point the program would, just like a normal user, wait for one minute before continuing the process. Again, it eventually hits another security lockout-- this time for five minutes. Rather than wasting time and waiting, the program simply moves the mouse cursor over to the restart button, restarts thecomputer, and does everything all over again. Rebooting results in the computer starting from a completely clean state as if the brute-forcing just a moment ago had never taken place.
    The coder suggests that the maximum time it would take to brute-force any machine would be 60 hours. When its finally done, it starts flashing the LED's to tell the user that it has successfully brute-forced its way in.
    This implementation however is fairly simple and doesn't account for the many years of research put into combination theory and analysis. For example, if we look to the research undertaken by Datagenetics, we learn some very startling facts about 4-digit pins:
    • 26.83% of all 4-digit PINs account for only 20 combinations. 
    • The most popular PIN number is 1234 which accounts for 10% of all combinations, which means that 10% of all machines could be cracked in a single guess
    • 20% of PINs are just 5 combinations, meaning that 20% of machines could be cracked in just 5 guesses. 
    • 50% can be cracked in 426 guesses.
    • Repeated-pair couplets of numbers in a format such as XYXY (ie 1212, 2323, 5454, 0808) account for 17.8% of all observed pin numbers.
    The code can be easily modified to account for the above and more, and there are hundreds if not thousands of text files out in the wild which have already listed 4-digit PINs in order of likeliness.
    When looking at this issue we have to keep in mind that what is happening here is in fact significant, no matter how insignificant or time consuming it might appear. The significance isn't in the type of attack itself, or what the attack does, but in that there is a false sense of security for users regarding their Apple MacBooks and desktop computers.
    So how can this be fixed? Easy. Among others, the first improvements that come to mind are:
    • Increase the minimum number of digits to six. An increase to just five digits increases the number of possible combinations ten times, and an increase to six digits increases the number of possible combinations by 100 times.
    • Require the use of symbols and letters, with the ability for both lower and uppercase letters
    • Introduce persistent records of previous unsuccessful attempts
    • Require MacBook-initiated two factor validation
    Although this method isn't new or revolutionary, it comes at a very bad time for Apple, as just over a week ago there was a disastrous vulnerability in iOS and OSX regarding SSL, which was followed with a discovery of an iOS vulnerability that allowed full background monitoring.

    Thursday, March 6, 2014

    Verizon Iphone 5 7.0.4 flashing to page plus Successfully done with 3G.

    What you need:
    Iphone 5 verizon version running 7.0.4
    ifile and tetherme
    Evad3rs jailbreak.
    page plus prl file.
    verizon sim card without service


    Step 0. Put your verizon non-active sim card on the phone.
    Step 1. Jailbreak your iphone. I use evad3rs jailbreak since my iphone is running 7.0.4.
    Step 2. Install ifile and tetherme on your phone, you can buy them from cydia.
    Step 3. Download the page plus prl file
    Step 4. If you download the file(prl file) to your computer you need to put in your phone, if that is the case you need to install afc2add and a iphone browser. You can put it anywhere in your phone, I put mine in usr>downloads.
    Step 5. Go here System/library/carrier bundles/iphone/
    Step 6. rename Verizon_LTE_US.bundle to VerizonBackup.bundle
    Step 7. rename Tracfone_US.bundle to Verizon_LTE_US.bundle.
    Step 8. Copy pageplus.prl to Verizon_LTE_US.bundle(the tracfone bundle renamed) and renamecarrier.prl to carrierbackup.prl, finally rename pageplus.prl to carrier.prl.
    Step 9. Remove and reinsert the sim card without rebooting. Carrier should say TFW. Activate the phone with pageplus using your phone meid.
    Step 10. Dial *22890, let the phone program. You should get the programming successfully message on the screen.

    that's it, I am getting 3G on the phone. Will post a youtube video with the instructions later.

    How to Update Iphone iphone 5s, iphone 5c, ipad air


  • 1
  • Plug your iPhone into your computer.
  • 2
    Open iTunes.
  • 3
    Click on the name of your iPhone.
  • 4
    Click "Check for Updates." If any firmware updates are available for your iPhone, an indication as such will appear on screen. If no updates are available, you will not be able to flash your iPhone at this time.
  • 5
    Click "Download and Install" on the "Updates Available" screen in iTunes. Do not attempt to use your iPhone during this process. Do not unplug your iPhone from your computer during this process. iTunes will download the necessary firmware updates to your computer's hard drive, at which point it will then flash your iPhone. Your existing iPhone firmware will be uninstalled and your new firmware will be put in its place. All of your personal files and data will then be synced back to the device once the flashing has taken place.