Jailbreak 5.1.1 Untethered For iPad 3, iPhone 4S, iPod Touch Using Absinthe 2.0 [Guide]

The unthethered jailbreak for iOS 5.1.1 is finally here and this guide will walk you through how to jailbreak your device using Absinthe 2.0.

Supported devices:

  • iPhone 3GS, iPhone 4, iPhone 4S
  • iPad 1, iPad 2, iPad 3 (except for the $399 iPad 2 with the tweaked A5 chip)
  • iPod Touch 3G, iPod Touch 4G

Follow the text guide below.

Step 1: Download and open Absinthe 2.0

Step 2: Connect your device to your computer via USB & Open Absinthe 2.0

Step 3: Click “Jailbreak” & this process will take your device through multiple stages necessary for jailbreaking the device. Do not touch your device or close Absinthe during this lengthy process.

Step 4: Once the restore is completed, unlock your device and look for the “Absinthe” icon on your Springboard. Tap the icon and it will launch the GreenPois0n website, and then causing your device to reboot. After the reboot is completed, the Absinthe icon will now be replaced by a brown Cydia icon.

You now have an untethered jailbreak on your 5.1.1 device!

If you have any questions or concerns, leave a comment and we will do our best to reply with help.

Update: Some are having issues with the Windows version, so here is a potential fix.

Error – “Recovery completed.If you want to retry jailbreaking, unplug your device and plug it back in” Fix:

1. Backup your device

2. Restore your device and DO NOT unlock your device after the restore

3. Set it up as a new iPhone/iPad/iPod

3. Let it finish syncing/setting up

4. Open Absinthe and jailbreak

5. Now you can also restore from backup


Semi Untethered iOS 5 Jailbreak Now Available Through Cydia

Repo owner BigBoss has just released a package into Cydia which allows the user to have a semi tethered jailbreak, removing some of the dangers of a tethered jailbreak. This means that if you run out of power, or if the device shuts down for any other reason, your device will be able to reboot with limited functionality. When you reboot semi-tethered, both Safari and Mail will be disabled, along with any other jailbreak apps or tweaks you have installed. Below is a tutorial on how to semi untether your iOS 5 device.

1. Jailbreak your iOS 5 device using Redsn0w’s tethered jailbreak and boot tethered.

2. Navigate to the Sources menu in Cydia, and add the source: “http://thebigboss.org/semitether”.

3. Open the source, and there should be one package titled “SemiTethered”.

4. Install the package and reboot your device.

5. Your device is now in a semi tethered state, and you will have to boot tethered using Redsn0w so use the disabled features.

Jailbreak 5.1.1 Semi Untethered On iPhone, iPod Touch & iPad (A4) With Redsn0w

With the release of iOS 5.1.1 today, there is already a jailbreak. The downside to this jailbreak is that it does not work on the iPad 2 or 3, and the iPhone. 4s. The Dev Team states to stay on 5.0.1 at all costs if you would like a jailbreak for one of those devices. This jailbreak is also semi tethered meaning you will need to follow the last steps every time your device turns fully off. If you use an unlock we highly recommend that you stay on iOS 5.0.1 (untethered).

How To Jailbreak 5.1.1


iOS 5.1 Firmware
Redsn0w 0.9.10b6 – HERE


1. Open redsn0w, click “Jailbreak”.

2. Plug in your device and put it into DFU mode as instructed to after pressing “Next”

Note: This will not work on iPhone 4S or iPad 2 for 5.1.1*

3. Wait for your device to jailbreak close Redsn0w and open it again.

Booting Tethered – Do steps below now and every time your device turns off –

4. Open Redsn0w again and click “Extras” and then “Just Boot”

5. Wait for your device to boot up and it will be jailbroken.

6. Semi Untethered 

If you would like to make your device semi untethered you can by following the directions we have here.

Unlock Your Jailbroken iPhone With SAM

A new unlock method for jailbroken iPhones has just been announced and released, for those of you still in contract that can’t yet take advantage of AT&T’s unlock offer. This method uses Sam Binger’s Subscriber Artificial Module (SAM) package in Cydia. By following the steps below, you can unlock your phone (as confirmed by Musclenerd).

1. Download and install Sam Bingner’s SAM (Subscriber Artificial Module). You should add the repo “repo.bingner.com”.

2. Locate the SAMPrefs icon on your Springboard and open it.

3. Enter utilities ad choose to “De-Activate iPhone”.

4. Go to the “Method” section, select “By Country and Carrier”, and choose your carrier.

5. Tap “More Information”, and taking note of your IMSI in the “SAM Details” section, continue to “Spoof Real SIM to SAM”.

6. Go back to the main screen and change the “Method” to manual. Then enter the IMSI from step 5.

7. Plug your phone into iTunes and double click on “Phone Number” to make sure that the ICCID matches that of your SIM card, then unplug your iPhone.

8. Disable SAM.

9. Plug your iPhone back in, and restart iTunes if it says your phone cannot be activated.

10. Thats it! If you have issues with push notifications just use the “Clear Push” utility in SAM and reconnect to iTunes.

Following those steps above, you should be able to unlock your phone to work on any GSM network. Leave a comment if it worked for you!

Mac Flashback malware: What it is and how to get rid of it

Apple’s Mac platform has long been promoted as safer than the competition, but as Mac sales and market share grow, it’s become a bigger target.

Nowhere is that clearer than with the Flashback Trojan, a gnarly piece of malware designed to steal personal information by masquerading as very mainstream browser plug-ins. Yesterday Russian antivirus company Dr. Web said that an estimated 600,000 Macs are now infected as a result of users unknowingly installing the software.

So here’s a quick FAQ on the Flashback Trojan, including information on what it is, how to tell if you have it, and steps you can take to get rid of it.

What exactly is Flashback?
Flashback is a form of malware designed to grab passwords and other information from users through their Web browser and other applications such as Skype. A user typically mistakes it for a legitimate browser plug-in while visiting a malicious Web site. At that point, the software installs code designed to gather personal information and send it back to remote servers. In its most recent incarnations, the software can install itself without user interaction.

An earlier version of the Flashback Trojan's installer.

An earlier version of the Flashback Trojan’s installer.

(Credit: Intego)

When did it first appear?
Flashback as we know it now appeared near the end of September last year, pretending to be an installer for Adobe’s Flash, a widely used plug-in for streaming video and interactive applications that Apple no longer ships on its computers. The malware evolved to target the Java runtime on OS X, where users visiting malicious sites would then be prompted to install it on their machine in order to view Web content. More advanced versions would install quietly in the background with no password needed.

How did it infect so many computers? 
The simple answer is that the software was designed to do exactly that. In its initial incarnation, the malware looked very similar to Adobe’s Flash installer. It didn’t help that Apple hasn’t shipped Flash on its computers for well over a year, arguably creating a pool of users more likely to run the installer in order to view popular Web sites that run on Flash. In its newer Java-related variants, the software could install itself without the user having to click on anything or provide it with a password.

What also didn’t help is the way that Apple deals with Java. Instead of simply using Java’s current public release, the company creates and maintains its own versions. As it turns out, the malware writers exploited one particular vulnerability that Oracle patched in February. Apple didn’t get around to fixing its own Java version until last week.

What has Apple done about it?
Apple has its own malware scanner built into OS X called XProtect. Since Flashback’s launch, the security tool has been updated — two times now — to identify and protect against a handful of Flashback variants.

A more recent version of the malware, however, got around XProtect by executing its files through Java. Apple closed off the malware’s main entry point with a Java update on April 3.

Of note, the Java security fixes are only available on Mac OS X 10.6.8 and later, so if you’re running OS X 10.5 or earlier, you will still be vulnerable. Apple has stopped supplying software updates for these operating systems.

How do I tell if I have it?
Right now the easiest way to tell if your computer has been infected is to go to Dr. Web’s online Web utility. It cross-checks your Mac’s unique hardware with its own database of machines that have been compromised. If it doesn’t find your machine, you’re in the clear.

Alternately, you can run a trio of commands in Terminal, a piece of software you’ll find in the Utilities folder in your Mac’s Applications folder. If you want to find it without digging, just do a Spotlight search for “Terminal.”

Once there, copy and paste each one of the code strings below into the terminal window. The command will run automatically:

defaults read /Applications/Safari.app/Contents/Info LSEnvironment
defaults read /Applications/Firefox.app/Contents/Info LSEnvironment
defaults read ~/.MacOSX/environment DYLD_INSERT_LIBRARIES

If your system is clean, the commands will tell you that those domain/default pairs “does not exist.” If you’re infected, it will spit up the patch for where that malware has installed itself on your system.

Uh oh, I have it. How do I remove it?
CNET’s Topher Kessler provides a step-by-step guide on how to remove Flashback from your Mac. This process also requires hopping into Terminal and running those commands, then tracking down where the infected files are stored, then manually deleting them.

Security firm F-Secure has also posted a similar Flashback-removal walkthrough. There are also likely be removal tools built into Mac antivirus/malware programs in the near future.

For good measure, it’s also a good idea to change your online passwords at financial institutions and other secure services that you may have used while your computer was compromised. It’s unclear if this data was being targeted, logged and sent as part of the attack, but it’s a smart preventative behavior that’s worth doing on a regular basis.

So now that fixes are here, am I safe?
In a word, no. The Flashback authors have already shown themselves inclined to keep altering the malware to sidestep new security fixes.

CNET’s advice is primarily to download any software only from trusted sources. That includes the sites of known and trusted software makers, as well secured repositories such as CNET’s Download.com. Also, as another rule of thumb, it’s a good idea to keep third-party add-ons as up to date as possible so as to stay current with any security updates. If you want to stay even safer, stay away from Java and other system add-ons unless they’re needed by trusted piece of software or a Web service.