Your favorite Apple, iPhone, iPad, iOS, Jailbreak, and Cydia site.
Thread: 6.0.2 evas1on help
06-19-2013, 11:07 AM #16.0.2 evas1on help
So I jalbreaked an iphone 4s using evas1on. Everything was good before i decided to whipe all the iphone data using the erase option ...
Now I have cydia on my screen but it just opens and then closes immediately. I tried to rejailbreak it , but evas1on says the phone is already semi-jailbreaked and that i should install the evas1on addon from cydia but i can't use cydia.
What are my option beside upgrading to 6.1.3. Does it exist any way to remove the jailbreak, or to override the jailbreak?
06-19-2013, 01:04 PM #2
Never use the erase option on a JB iPhone, it will mess it up. If you can't open Cydia or ssh into your file system, your only option is to restore again.
06-19-2013, 01:23 PM #3
06-19-2013, 01:23 PM #4
You can try getting ahold of the evasion deb package and using ifunbox to put it in cydia's auto install folder located here:
Then just reboot twice to see if that installs it.
Or you can wait for something like this to be released: Semi-Restore for iOS 5.0-6.1.2
The Following User Says Thank You to Simon For This Useful Post:
06-19-2013, 01:28 PM #5
06-19-2013, 01:30 PM #6
06-19-2013, 01:32 PM #7
Never mind, I see it not available yet. Nice though.
06-19-2013, 01:51 PM #8
thanks for the support guys, i found the evad3rs dba here: Index of /debs/ i copied the last version to the autoinstall folder but sadly the application after 2x shut down/power on has not been installed.
any ideas? on how i can convince the evad3rs program that the phone is still stock ) ?
06-19-2013, 05:27 PM #9
However, you have full filesystem access, yes? Do you have root user access (via SSH) and can run a privileged process (such as "apt-get update" or "reboot")?
06-20-2013, 12:40 AM #10
06-20-2013, 02:25 PM #11
Perhaps we can install openssh's binaries on the device with our filesystem access, but I have no idea how (or even if) we'll be able to get it to run...
I seriously doubt we have unsigned code execution on the kernel right now, which is our chief problem. While we can copy over the raw .deb and/or its composite binary files (the deb is here BTW), if we can't get launchd to accept the necessary .plist and sshd control daemon, we won't be able to get our shell.
Unfortunately, I don't know of any arguments that we could pass to evasi0n to instruct it to attempt its unsigned code exploit in spite of the (correctly) perceived "semi-jailbroken" status... let me tweet Pod2G and Co. and see what, if anything they come up with (or even if they'll answer me... I'm not popular so no guarantees).
06-20-2013, 03:08 PM #12