Another week and, after a long break from jailbreaks, yet another one has appeared. This time, the iOS 9.2.1 jailbreak was demonstrated via a video on YouTube. Called “Flying JB”, the video demonstrates an iPhone 5C successfully jailbroken and also shows the installation of an unsigned Mobile Terminal app which, as any jailbreaker knows, allows you to run commands as root.
Image : Flying Jailbreak Update
The jailbreak comes courtesy of a Chinese hacker by the name of Min Zheng, otherwise known as @SparkZheng [ext link – Twitter], who also credits @Eakerqiu and @Cererdlong for help with it. Zheng has said that the jailbreak is based around InpuTbag, which is named after a popular character in Prison Break. This is a HeapOverFlow vulnerability that is 15 years old and that Apple has finally patched in iOS 9.3.2 [ Download iOS 9.2.1 – ext link ], which mean it won’t work on any of the latest iOS versions. Zheng says that to be able to exploit the kernel before iOS 9.3.2, the vulnerability is incredibly powerful but he also says that, due to the additions that Apple has added into the iOS, it is getting much harder to find a way to jailbreak.
Image : Flying Jailbreak Code Running on iOS 9.2.1
Don’t get your hope up too much, though; the jailbreak is only fit for 32-bit devices and is not a full jailbreak because the sandbox escape has not yet been made public. And, unlike the jailbreaks we have been able to use in recent times, it is not a GUI-based tool and that mean it won’t be easy to use in jailbreaking your iOS device. If you fancy a look at it, head over to GitHub and check out the source code; full instructions are given so have a go and see if you can jailbreak your 32-bit device with it. We would recommend that you only do this on a spare device, not the one you use every day because we can’t be certain that it is stable enough or safe enough to use.
Video : Flying Jailbreak for iOS 9.2.1
This isn’t the first jailbreak of its kind; in the last couple of weeks, we have seen no less than two hackers demonstrate jailbreaks. The first was Luca Todesco and following proof that he had managed to produce an iOS 9.3.3 jailbreak, he followed up with one for iOS 9.3.3 and then promptly pasted the code for the exploit, named GasGauge onto GhostBin. The reason for this was because he said Apple had patched the exploit in iOS 10 and, as far as he could see, producing an iOS 10 jailbreak was going to be very difficult. He says that the GasGauge code can be used by anyone to try and build an iOS 9.3.3 jailbreak if they can.
Just a few days ago, another prominent hacker by the name of iH8sn0w released a video showing an iPhone 5 running an iOS 10 jailbreak but, similar to Flying JB, this one also only works on 32-bit devices. So it seems that, from what the developers are saying, iOS 10 is not going to be a walkover in terms of jailbreaking an, right now, all we can do is wait and see what Taig and Pangu Teams turn up.