【iOS安全】iPhone X iOS 16.7.11 (20H360) Palera1n MacOS版 越狱教程

前言

之前分享了如何在Windows 平台上,使用palera1n 2.0.0 beta7/8 越狱iPhone X iOS 16.7.11

详见:https://blog.csdn.net/qq_39441603/article/details/148475198

本篇介绍如何在MacOS平台上,使用Palera1n越狱iPhone X iOS 16.7.11

安装Palera1n

参见:https://palera.in/download/?tab=macos

复制代码
sudo /bin/sh -c "$(curl -fsSL https://static.palera.in/scripts/install.sh)"

命令行使用Palera1n

iPhone通过USB连接至MacBook

复制代码
palera1n -l
c 复制代码
xxx@xxx ~ % palera1n -l
#
# palera1n: v2.2.1 
#
# ========  Made by  =======
# Made by: Nick Chan, Ploosh, Khcrysalis, Mineek, staturnz, kok3shidoll, HAHALOSAH 
# ======== Thanks to =======
# Thanks to: llsc12, Nebula, Lrdsnow, nikias (libimobiledevice),
# checkra1n team (Siguza, axi0mx, littlelailo et al.),
# Procursus Team (Hayden Seay, Cameron Katri, Keto et.al)
# ==========================

 - [10/02/25 19:58:42] <Info>: Waiting for devices
 - [10/02/25 19:58:42] <Info>: Entering recovery mode
 - [10/02/25 19:58:53] <Info>: Press Enter when ready for DFU mode

Hold volume down + side button (0)
Hold volume down button (2)
 - [10/02/25 19:59:21] <Info>: Device entered DFU mode successfully
 - [10/02/25 19:59:21] <Info>: About to execute checkra1n
#
# Checkra1n 0.1337.3
#
# Proudly written in nano
# (c) 2019-2023 Kim Jong Cracks
#
#========  Made by  =======
# argp, axi0mx, danyl931, jaywalker, kirb, littlelailo, nitoTV
# never_released, nullpixel, pimskeks, qwertyoruiop, sbingner, siguza
#======== Thanks to =======
# haifisch, jndok, jonseals, xerub, lilstevie, psychotea, sferrini
# Cellebrite (ih8sn0w, cjori, ronyrus et al.)
#==========================

 - [10/02/25 19:59:21] <Verbose>: Starting thread for Apple TV 4K Advanced board
 - [10/02/25 19:59:21] <Info>: Waiting for DFU mode devices
 - [10/02/25 19:59:21] <Verbose>: DFU mode device found
 - [10/02/25 19:59:21] <Info>: Checking if device is ready
 - [10/02/25 19:59:21] <Verbose>: Attempting to perform checkm8 on 8015 11
 - [10/02/25 19:59:21] <Info>: Setting up the exploit
 - [10/02/25 19:59:21] <Verbose>: == checkm8 setup stage ==
 - [10/02/25 19:59:21] <Verbose>: Entered initial checkm8 state after 1 steps
 - [10/02/25 19:59:21] <Verbose>: Stalled input endpoint after 9 steps
 - [10/02/25 19:59:21] <Verbose>: DFU mode device disconnected
 - [10/02/25 19:59:22] <Verbose>: DFU mode device found
 - [10/02/25 19:59:22] <Verbose>: == checkm8 trigger stage ==
 - [10/02/25 19:59:22] <Info>: Checkmate!
 - [10/02/25 19:59:22] <Verbose>: Device should now reconnect in download mode
 - [10/02/25 19:59:22] <Verbose>: DFU mode device disconnected
 - [10/02/25 19:59:29] <Info>: Entered download mode
 - [10/02/25 19:59:29] <Verbose>: Download mode device found
 - [10/02/25 19:59:29] <Info>: Booting PongoOS...
 - [10/02/25 19:59:31] <Info>: Found PongoOS USB Device
 - [10/02/25 19:59:32] <Info>: Booting Kernel...
xxx@xxx ~ %

越狱成功

相关推荐
todoitbo2 小时前
用虚拟局域网打通 Win/Mac/Linux 三端:跨设备协作的实用方案
linux·运维·macos
奶糖的次元空间8 小时前
iOS 学习笔记 - SwiftUI 和 简单布局
ios·swift
姓王名礼10 小时前
一份 Windows/macOS/Linux 完整安装 + 运行 + 对接 WebUI 的步骤
linux·windows·macos
zhensherlock13 小时前
Protocol Launcher 系列:App Store 精准引流与应用推广
javascript·macos·ios·typescript·iphone·mac·ipad
新缸中之脑15 小时前
mflux:Mac本地生图AI工具
人工智能·macos
小马过河R15 小时前
小白沉浸式本地Mac小龙虾OpenClaw部署安装教程
人工智能·macos·大模型·nlp·agent·openclaw·龙虾
承渊政道16 小时前
ToClaw是什么?一句话:装在云端的OpenClaw
windows·科技·学习·其他·macos·claw
不解不惑16 小时前
MacOS系统ssh和ftp,使用vscode实现
vscode·macos·ssh
for_ever_love__16 小时前
Objective-C学习 NSDictionary,NSMutableDictionary 功能详解
开发语言·学习·ios·objective-c
for_ever_love__16 小时前
Objective-C学习 协议和委托
开发语言·学习·ios·objective-c