Luca Todesco releases browser-based Pangu 9.3.3 exploit, paves way for untethered jailbreak

Luca Todesco has just released mobile Safari based Pangu exploit for iOS 9.3.3 jailbreak.

Pangu 9.3.3 jailbreak
Luca Todesco releases browser-based Pangu 9.3.3 exploit, paves way for untethered jailbreak

Renowned iOS jailbreak developer and hacker, Luca Todesco, has just released a browser-based exploit aka loader for the latest Pangu 9.3.3 jailbreak, which is reminiscent of the original JailbreakMe exploits for iOS 1 and iOS 4. Such a Webkit or browser-based exploit can be activated by following a web URL in mobile Safari and then unlocking the device with the press of a button.

The catch here is that the new browser-based Pangu exploit works without the use of any developer certificate, which has become a major constraint with the existing iOS 9.3.3 jailbreak via Pangu.

Such a feat is achieved by exploiting a known vulnerability in mobile Safari that allows the user to execute an arbitrary code on the device for re-activating the Pangu 9.2-9.3.3 jailbreak.

Folks at iDownloadblog have shared a brief checklist on what the new Pangu loader tool can accomplish and things that it can't do:

Supported features

  • Re-activate the Pangu semi-(un)tether functionality on jailbreak devices.
  • Work without the certificate restrictions which have until now been a major hitch of this jailbreak.
  • Work without an app, directly from your browser.

Unsupported features

  • Jailbreak devices on firmwares not supported by the Pangu team.
  • Install Cydia (it is only a solution for re-activation of payload).
  • Work on any 32-bit device (iPhone 5 or older).
  • Make your jailbreak permanently untethered.

To be precise, the new exploit for Pangu 9.3.3 jailbreak is just a simple substitute for the Pangu re-jailbreaking apps on iOS 9.3.x. Besides, it works directly within the Safari browser and thereby eliminates the use of app for re-activation of jailbreak.

Another prolific tipster and iOS hacker, qwertyoruiop, has shared an interesting tutorial to help the beginners in using this exploit seamlessly on their jailbroken iOS 9.3.3 device. Curious users may head over to the developer portal for the complete step-by-step guide posted here: https://jbme.qwertyoruiop.com.

Todesco has also suggested that an untethered version of Pangu 9.3.3 jailbreak could be achieved with this exploit some time later. However, there is no word on whether the developer intends to release a public version of this jailbreak in the future.

READ MORE