Earlier today a Chinese hacker called Min Zheng has made a video showing Flying JB for iOS 9.2.1. This jailbreak is for 32-bit devices running on iOS 9.2.1 or lower. As you can see in below video, iPhone 5c going through the jailbreak process as well as Mobile Terminal running on the device once it is jailbroken.

Check the jailbreak in action:

As Min Zheng explained in a tweet, Flying JB is based off inpuTbag, a fifteen year old kernel HeapOverFlow vulnerability that has been fixed by Apple in iOS 9.3.2, hence the reason this is released now. Because the exploit has been fixed, there is no reason to keep it under wrap any longer.

Number one on the list of limitations of this tool is the fact that it supports 32-bit devices only, meaning it could potentially work on iPhone 5 and lower only. These devices also have to run iOS 9.2.1 or lower. These two requirements alone make Flying JB much less interesting right off the bat.
If you are lucky enough to pass the first round of limitations, the real kicker is that Flying JB is not really a working jailbreak. First, it doesn’t come with a GUI or a proper tool to facilitate the jailbreak process, but more importantly, Flying JB apparently lacks a sandbox escape, meaning that despite gaining root access, the jailbreak is still confined behind the security walls Apple built into iOS.

If all this still sounds good to you and you want to take Flying JB for a spin, the developer has made the source code available on GitHub. We doubt many of you will be adventurous enough to try this, but if you do, please share your experience with us in the comments section below.

CONTACT US

We're not around right now. But you can send us an email and we'll get back to you, asap.

Sending

Log in with your credentials

Forgot your details?