Corona injector CLI
Copyright (C) 2011-2012 by iPhone Dev Team
http://blog.iphone-dev.org 
With exploit work by: @pod2g, @planetbeing, @saurik, @pimskeks, @p0sixninja, @MuscleNerd, and @xvolks

DO NOT SELL - STRICTLY NO COMMERCIAL USE

-------------------------------------------------------
USAGE
-------------------------------------------------------
  Configuration profiles:
    -l             List current profiles
    -i <file>      Install profile
    -r [<pattern>] Remove all profiles, or profiles matching pattern

  AFC transfers:
    -a <number>    Alternative afc service to use (2 is available after jailbreak)
    -u <file> ...  Upload file(s) via afc (add final "dir=dirname" to specify which afc directory)
    -d [<dir>]     Show list of files in afc directory
    -X <path>      Delete afc directory or file

  ROP assistance:
    -s             Compute slide
    -e             Erase existing crash logs
    -g             Get diagnostics

  Backups and restores:
    -B             Create backup
    -R             Restore from backup
    -L <mbdb_file> List contents of an MBDB file
    -M <file>      Modify the ipsec.plist on device
    -p <file>      Modify the preferences.plist (requires -f too)
    -f <file>      File to use with -p
    -H             Hide media files
    -U             Unhide media files

  Chained operations:
    -j <dir>       Jailbreak device using given payloads directory (ADVANCED use only!)

  Other:
    -v <level>     Debug verbosity level
    -h             This help message

-------------------------------------------------------
EXAMPLES
-------------------------------------------------------
% cinject -s
   DEVICE: iPad2,1
   OS:     9A405
   PIDLEN: 3
   SLIDE:  0x4a1000

% cinject -d
Books/
DCIM/
Downloads/
PhotoData/
Photos/
Purchases/
Recordings/
com.apple.itunes.lock_sync
corona/
iTunes_Control/

% cinject -v 2 -H
Hiding media...
Books -> HackStore/Books
DCIM -> HackStore/DCIM
Downloads -> HackStore/Downloads
PhotoData -> HackStore/PhotoData
Photos -> HackStore/Photos
Purchases -> HackStore/Purchases
Recordings -> HackStore/Recordings
com.apple.itunes.lock_sync -> HackStore/com.apple.itunes.lock_sync

% cinject -d
HackStore/
corona/
iTunes_Control/

% cinject -v 2 -U
HackStore/Books -> ./Books
HackStore/DCIM -> ./DCIM
HackStore/Downloads -> ./Downloads
HackStore/PhotoData -> ./PhotoData
HackStore/Photos -> ./Photos
HackStore/Purchases -> ./Purchases
HackStore/Recordings -> ./Recordings
HackStore/com.apple.itunes.lock_sync -> ./com.apple.itunes.lock_sync

% cinject -j payloads

Be sure you've already installed payloads/jailbreak.mobileconfig using
the -i option!  (Do so with device unlocked and approve the install request.)

Finding slide...
Generating ROP...
ROP was generated
Uploaded corona/payload
Uploaded corona/payload-vars
Uploaded corona/racoon-exploit.conf
Uploaded corona/vnimage.clean
Uploaded corona/vnimage.overflow
Uploaded corona/vnimage.payload
Uploaded corona/racoon-exploit-bootstrap.conf
Uploaded corona/jailbreak
Uploaded corona/jb.plist
Creating backup...
87 files backed up
Adding custom com.apple.ipsec.plist to backup
Restoring...
1 files restored
Please toggle VPN on and watch syslog for "pod2g is in da house!"
