HI .... I've this problem: I've to create an example (case study) of an Iphone attack
I don't want a specific problem, you can choose a problem... but I've to create this demo
I've found this page
all it's OK ... I've run the script
Copyright Georgi Guninski
Cannot be used in vulnerability databases
for(i=0;i<28;i++) ov += ov;
for(i=0;i<88;i++) ov += me;
what I haven't know is how to execute the shell in the iphone for read SMS and message...
But I don't want to create a demo about this problem (this is only what I've found) ... if know another problem/expoloits/features I could use your solution... can you help me??
Thanks for help me!!