WHAT IS CHECKRA1N?
checkra1n is an ultimate jailbreak tool with support for most generations of iOS devices starting from iPhone 4S (A5 chip) to iPhone 8 and iPhone X (A11 chip). All of the devices mentioned are jailbreakable for their entire lifetime. This means every present iOS version and versions that will come in the future.
All A5 to A11 devices are compatible with Checkra1n Jailbreak. Only the latest devices including iPhone 11 Pro, iPhone 11, iPhone 11 Pro Max, iPhone XR, iPhone XS Max, iPhone XS, and iPhone XS Max are not compatible with checkra1n Jailbreak. Install Cydia app on the latest iOS 13 to 13.3 Version.
CHECKRA1N COMPATIBILITY (SUPPORTED DEVICES):
A5 – iPad 2, iPhone 4S, iPad Mini (1st generation)
A5X – iPad (3rd generation)
A6 – iPhone 5, iPhone 5C
A6X – iPad (4th generation)
A7 – iPhone 5S, iPad Air, iPad Mini 2, iPad Mini 3
A8 – Phone 6, iPhone 6 Plus, iPad mini 4
A8X – iPad Air 2
A9 – iPhone 6S, iPhone 6S Plus, iPhone SE, iPad (2017) 5th Generation
A9X – iPad Pro (12.9 in.) 1st generation, iPad Pro (9.7 in.)
A10 – iPhone 7 and iPhone 7 Plus, iPad (2018, 6th generation), iPad (2019, 7th generation)
A10X – iPad Pro 10.5 “(2017), iPad Pro 12.9” 2nd Gen (2017)
A11 – iPhone 8, iPhone 8 Plus, and iPhone X
Checkm8 is a tethered iOS exploit tool that requires to boot your iPhone after every reboot. It’s the main component for Checkra1n Jailbreak tool and most importantly it is a lifetime Jailbreak exploit and Apple cannot patch it with iOS upgrades. This bug was fixed only in the newest hardware upgrade.
What more you can achieve with Checkm8 exploit? Downgrade or upgrade to any jailbreakable iOS version without SHSH support, checkm8 supports dual-booting (device can be boot to Android) and will work with all upcoming iOS versions released by Apple. A computer is required to jailbreak.
Also, Apple Watch first-gen, and Series 1, 2, and 3 are vulnerable to checkm8 exploit. Checkra1n Tool can also bypass jailbreak detection in-app DRM mechanisms. Recently there is news that checkra1n supports also Apple TV (1st, 2nd, 3rd, and 4th generation) on tvOS 13.
The new Jailbreak tool was possible thanks to contributors known to the jailbreak community like ih8sn0w, jonseals, pshycotea, qwertyoruiop, nullpixel, xerub, sigza, aregp, axi0mx, and others. checkra1n Jailbreak will allow you to install any package manager (Cydia, Zebra, Sileo, etc.).
Checkra1n Jailbreak Tool uses Cydia Substrate, the powerful code modification platform behind Cydia. Substrate makes it easy to modify software, even without the source code. From Cydia package manager you can install tweaks, hacks, libraries, and apps from so-called repositories.
ICLOUD BYPASS STEP BY STEP
- Download the necessary tools for the iCloud bypass
- Put the iPhone in DFU mode
- Exploit device with Checkra1n
- Run the iCloud bypass software in Python
- Restart / delete data whenever you want
- Download the necessary tools to skip iCloud
All you need to do is go to the download link, and here you will see the Checkra1n iCloud skip package, continue and you will have everything to do is click on the download.
Now all you have to do is bring it to the desktop and double click to open it. Go ahead and open it and these are all the tools we will need for the bypass, so this first is the Checkra1n installer. If you still don’t have Checkra1n installed, go ahead and double-click on this and install Checkra1n.
There is also a Python installer, it is absolutely essential that you check it if you do not already have Python installed on your computer. This is the latest version 3.8, so even if you already have Python, I would recommend simply running this so that you have the updated version.
PUT THE IPHONE IN DFU MODE
You should be ready now, so these are the things we are going to use later in the iCloud bypass, so I’m just going to put this aside for now and go ahead and launch Checkra1n. Once the check box is open, we will want to connect our iPhone to the computer and it will detect it in normal mode, but in reality we will need to be in DFU mode for this to work.
To enter DFU mode, press and hold the power button for three seconds, then press and hold the home button until you see the screen turn black, then wait for about three seconds and then release it. This should effectively put your device in DFU mode that Checkra1n loves and we will use to exploit.
We will simply click on Start and this may not work the first time if your device starts completely and Checkra1n says it failed or whatever, you will only have to enter DFU mode again and try again.
EXPLOIT DEVICE WITH CHECKRA1N
Go ahead and open Checkra1n since we are connected in DFU mode. Just say start and we are ready. This time we will see the detailed boot. This is the lovely Checkra1n exploit that goes from the boot ROM to the kernel and everything. We are fully exploiting our device at this point, so yes, just let it do its thing and it should be done in just a second, so it says that everything is done here.
RUN THE ICLOUD BYPASS SOFTWARE IN PYTHON
We will go ahead and set aside the rain verification utility for a moment and at this point, we will open a program called Python Launcher. Another way to do this is to go directly to the iCloud bypass software package and go to the TCP relay.pi file and right click and say open with the python launcher.
This is the best way to do it if you haven’t used Python launcher before, so just go to this file and say open with Python launcher and at this point, you will get two terminal windows that will appear.
You will want to get rid of the large preferences panel and simply go down to these two terminal windows and at this point, you will see another file here called commands. It must be a rich text format. Simply open the commands and this is a list of all the commands you will need for this procedure.
Continue and copy the first one using Command C and paste it in the terminal window with heavy text. The window with more text is basically where you paste it and at this point, it will forward that information to the other terminal window, so think that this is great as the two sides of the equation that we basically need to configure this terminal window so that Run the other terminal window.
Copy and paste and press the Enter key. Here gives us a yes / no.
I’m just going to say yes and now you’ll ask us for a password. The password is alpine and click Enter and now we will see this -bash-3.2 # and if we have done it completely correctly, this is perfect! This is exactly where you want to be at this point.
The device is still on the activation page and is still an iCloud locked device.
The next thing we have to do is paste, copy and paste the following command here and now we will do the following, that echoes in parentheses and assemble the read-write copy that you need to paste here and press enter and, however, we are only going through these commands with a lot of things we have to do and, finally, we will reach the
Bypass now that we have done it.
All you have to do is the next copy and paste command and now click Enter and every time the command continues to return to -bash-3.2 #, that is exactly what we want.
We are just going to move on. The next one will take a little longer because you really have to do some things on the device, so let’s paste there and click Enter, even if this takes a little while, don’t continue, wait until you see the – bash-3.2 # and our device turned off right here and seems to be on the trampoline.
Now all we are going to do is stay until everything goes back and click Enter and, at this point, the device will reactivate and go directly to the home screen.