Main Page: Difference between revisions

From freemyipod
Jump to navigation Jump to search
Jdkjkjj (talk | contribs)
m Add iPod nano 2g demo image
Jdkjkjj (talk | contribs)
m remove sysfetch and add albafetch image
 
(One intermediate revision by one other user not shown)
Line 1: Line 1:
__NOTOC__
__NOTOC__
[[File:Sysfetch on iPod Nano 2G.jpg|thumb|right|sysfetch on the [[Nano 2G]] running [[Linux]] 6.10]]
[[File:Albafetchdemo.png|thumb|right|albafetch on the [[Nano 2G]] running [[Linux]] 6.10]]
[[File:Photo 2025-12-27 20-36-24.jpg|280px|thumb|right|[[Linux]] 6.14.0 on [[Nano 7G]]]]
[[File:Photo 2025-12-27 20-36-24.jpg|280px|thumb|right|[[Linux]] 6.14.0 on [[Nano 7G]]]]
[[File:EmCORE_Nano2G_Nano4G_Classic.jpg|280px|thumb|right|[[emCORE]] r779 on [[Nano 2G]], [[Nano 4G]] and [[Classic 2G]]]]
[[File:EmCORE_Nano2G_Nano4G_Classic.jpg|280px|thumb|right|[[emCORE]] r779 on [[Nano 2G]], [[Nano 4G]] and [[Classic 2G]]]]
Line 15: Line 15:
Not much (yet) unless you're an embedded developer :).
Not much (yet) unless you're an embedded developer :).


On the [[Nano 3G]], [[Nano 4G]] and [[Nano 5G]], we have a stable tethered exploit ([[wInd3x]]) which allows early, untethered and safe (no permanent modification) code execution. This in turn allows you to run [[U-Boot]] and an early [[Linux|Linux port]] or experiment with reverse-engineering/modifying the original firmware, [[retailOS]].
Here's the current progress, by iPod model:


On the [[Nano 6G]], [[Nano 7G]] and iPod shuffle (4th generation), a vulnerability in DFU_DNLOAD packet parsing code can be exploited with [[S5Late]]. It allows tethered code execution.
[[Nano 3G]] and [[Nano 4G]]
* [[wInd3x]] allows untethered and safe code execution (no permanent modification).
* Rockbox bootloader has been published, but [https://isthererockboxonipodnano3g.freemyipod.org/ the Rockbox port is not yet completed].


On the [[Nano 6G]] and [[Nano 7G]], a font parsing vulnerability (CVE-2010-1797) can be exploited with [[ipod_sun]]. It allows untethered code execution.
[[Nano 5G]]
* [[wInd3x]] allows untethered and safe code execution (no permanent modification).
* There's a [[U-Boot]] port, and [[Linux|Linux]] boots with an initramfs.
 
[[Nano 6G]] and [[Nano 7G]]
* Tethered code execution using [[S5Late]] (a vulnerability in DFU_DNLOAD packet parsing code) (also for iPod shuffle (4th generation))
* Untethered code execution using [[ipod_sun]] (CVE-2010-1797)
 
[[Nano 7G]]
* There's a [[U-Boot]] port, and [[Linux|Linux]] boots with an initramfs.


There's a set of earlier tooling ([[emCORE]]/[[emBIOS]]/[[iBugger]]) which was exploiting other vulnerabilities and was a lead-up to a port of Rockbox, but it's mostly abandoned.
There's a set of earlier tooling ([[emCORE]]/[[emBIOS]]/[[iBugger]]) which was exploiting other vulnerabilities and was a lead-up to a port of Rockbox, but it's mostly abandoned.

Latest revision as of 18:10, 10 May 2026

albafetch on the iPod nano (2nd generation) running Linux 6.10
Linux 6.14.0 on iPod nano (7th generation)
emCORE r779 on iPod nano (2nd generation), iPod nano (4th generation) and iPod classic (6th generation)

This is the wiki for the freemyipod project. Freemyipod is a project aimed at reverse-engineering non-iOS iPods (all models other than the Touch) and creating tools and documentation so that other people can port alternative firmwares to them such as Rockbox or Linux. Freemyipod is a relaunch of Linux4nano.

FAQ

What can I do with my iPod nano (2nd generation), iPod classic (6th generation) or older iPods?

There's an upstream Rockbox port for these devices. Go use that.

What can I do with my iPod nano (3rd generation) or newer?

Not much (yet) unless you're an embedded developer :).

Here's the current progress, by iPod model:

iPod nano (3rd generation) and iPod nano (4th generation)

iPod nano (5th generation)

  • wInd3x allows untethered and safe code execution (no permanent modification).
  • There's a U-Boot port, and Linux boots with an initramfs.

iPod nano (6th generation) and iPod nano (7th generation)

  • Tethered code execution using S5Late (a vulnerability in DFU_DNLOAD packet parsing code) (also for iPod shuffle (4th generation))
  • Untethered code execution using ipod_sun (CVE-2010-1797)

iPod nano (7th generation)

  • There's a U-Boot port, and Linux boots with an initramfs.

There's a set of earlier tooling (emCORE/emBIOS/iBugger) which was exploiting other vulnerabilities and was a lead-up to a port of Rockbox, but it's mostly abandoned.

Getting an account

Due to spambots, registration is closed. For an account contact User890104 or q3k.

Updates

Follow our X feed to get status updates automatically. See the Status page for more detailed information. Check our GitHub repositories for the latest changes to our source code.

Project info

Released Software

Basic skills

Reverse engineering results

Hardware

Exploiting