GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > GSM & CDMA Phones / Tablets Software & Hardware Area > iPhone ,iPod & iPad (Apple Inc. Products) > iPhone 4 / iPhone 4S


iPhone 4 / iPhone 4S iPhone 4 / 4S

Reply
 
LinkBack Thread Tools Display Modes
Old 02-22-2014, 14:25   #1 (permalink)
Cheater -Don't Deal with him-
 
Join Date: Dec 2013
Location: XK
Age: 26
Posts: 1,479
Member: 2089356
Status: Offline
Sonork: Threema: 3N5W6VV9
Thanks Meter: 520
Donate money to this user
Thumbs up ios 7.0.6 Safe to Hactivate


i just test it but you need to modify something cuase wont work
1)Download ispw of 7.0.6 if you have copy to this location
C:\Users\Usernamexx\AppData\Local\Temp\ssh_rd
2.delete all file and folder there just leave ispw there
3.open ssh_rd_rev04b.jar
4.connect to device to DFU
5.you will see this
Code:
 
 SSH ramdisk maker & loader, version 29-06-2013 git rev-04b
Made possible thanks to Camilo Rodrigues (@Allpluscomputer)
Including xpwn source code by the Dev Team and planetbeing
Including syringe source code by Chronic-Dev and posixninja
syringe exploits by pod2g, geohot & posixninja
Special thanks to iH8sn0w
device-infos source: iphone-dataprotection
Report bugs to msft.guy<[email protected]> (@msft_guy)
 
 
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\native\jsyringeapi.dll
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\native\mux_redux.dll

Connect a device in DFU mode
MobileDevice event: MuxConnect, 0, 0
MobileDevice event: MuxDisconnect, 0, 0
MobileDevice event: DfuConnect, 4cb1227, 8930
DFU device 'iPhone 4 (GSM)' connected
Building ramdisk for device 'iPhone 4 (GSM)'
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\all_keys.plist
Working dir set to C:\Users\Samiri\AppData\Local\Temp\ssh_rd
IPSW at http://appldnld.apple.com/iOS5.1.1/041-6051.2012.0525.Cvby7/iPhone3,1_5.1.1_9B208_Restore.ipsw
Downloading Restore.plist
Local file C:\Users\Samiri\AppData\Local\Temp\ssh_rd\iPhone3,1_5.1.1_9B208_Restore.ipsw not found; downloading from http://appldnld.apple.com/iOS5.1.1/041-6051.2012.0525.Cvby7/iPhone3,1_5.1.1_9B208_Restore.ipsw
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Restore.plist
Restore.plist downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Restore.plist
Parsing Restore.plist..
Kernel file: kernelcache.release.n90
Restore ramdisk file: 038-5512-003.dmg
Downloading Firmware/dfu/iBSS.n90ap.RELEASE.dfu
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\dfu\iBSS.n90ap.RELEASE.dfu.orig
Decrypted to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\dfu\iBSS.n90ap.RELEASE.dfu.dec
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\nor5.patch.json
Patched to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\dfu\iBSS.n90ap.RELEASE.dfu.dec.p
iBSS prepared at C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\dfu\iBSS.n90ap.RELEASE.dfu
Downloading Firmware/dfu/iBEC.n90ap.RELEASE.dfu
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\dfu\iBEC.n90ap.RELEASE.dfu.orig
Decrypted to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\dfu\iBEC.n90ap.RELEASE.dfu.dec
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\nor5.patch.json
Patched to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\dfu\iBEC.n90ap.RELEASE.dfu.dec.p
iBEC prepared at C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\dfu\iBEC.n90ap.RELEASE.dfu
Downloading Firmware/all_flash/all_flash.n90ap.production/DeviceTree.n90ap.img3
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\all_flash\all_flash.n90ap.production\DeviceTree.n90ap.img3
Device tree prepared at C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\all_flash\all_flash.n90ap.production\DeviceTree.n90ap.img3
Downloading Firmware/all_flash/all_flash.n90ap.production/manifest
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\all_flash\all_flash.n90ap.production\manifest
Downloading kernelcache.release.n90
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\kernelcache.release.n90.orig
Decrypted to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\kernelcache.release.n90.dec
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\kernel5.patch.json
Patched to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\kernelcache.release.n90.dec.p
Kernel prepared at C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\kernelcache.release.n90
Downloading 038-5512-003.dmg
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\038-5512-003.dmg.orig
Decrypted to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\038-5512-003.dmg.dec
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ssh.tar
Added ssh.tar to the ramdisk
Ramdisk prepared at C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\038-5512-003.dmg
Using syringe to exploit the bootrom..
Exploit sent!
Preparing to load the ramdisk..
Ramdisk load started!
MobileDevice event: DfuDisconnect, 4cb1227, 8930
MobileDevice event: DfuConnect, 4db1227, 8930
DFU device 'iPhone 4 (GSM)' connected
Ignoring same device iPhone 4 (GSM)
MobileDevice event: DfuDisconnect, 4db1227, 8930
MobileDevice event: RecoveryConnect, 4db1281, 8930
MobileDevice event: RecoveryDisconnect, 4db1281, 8930
Almost there..
MobileDevice event: MuxConnect, 0, 0

Success!
Connect to localhost on port 2022 with your favorite SSH client!

 login: root
 password: alpine
5.open putty connect to "localhost" port 2022 root alpine
6.mount.sh
7.delete setup.app in putty reboot_bak
8.use ireb or tinyumbrella to exit recovery mode

  Reply With Quote
The Following 8 Users Say Thank You to BesfortShalaTec For This Useful Post:
Show/Hide list of the thanked
Old 02-22-2014, 14:33   #2 (permalink)
No Life Poster
 
Join Date: Nov 2005
Location: Sindhu Desh
Age: 36
Posts: 8,135
Member: 199814
Status: Offline
Thanks Meter: 1,960
You tested this on what module?
  Reply With Quote
The Following User Says Thank You to asadnow2k For This Useful Post:
Old 02-22-2014, 14:52   #3 (permalink)
Cheater -Don't Deal with him-
 
Join Date: Dec 2013
Location: XK
Age: 26
Posts: 1,479
Member: 2089356
Status: Offline
Sonork: Threema: 3N5W6VV9
Thanks Meter: 520
Donate money to this user
Quote:
Originally Posted by asadnow2k View Post
You tested this on what module?
just iphone 4 GSM others won't work
  Reply With Quote
The Following 2 Users Say Thank You to BesfortShalaTec For This Useful Post:
Old 02-22-2014, 16:10   #4 (permalink)
Insane Poster
 
Join Date: Apr 2004
Location: Kuwait
Age: 47
Posts: 72
Member: 63751
Status: Offline
Thanks Meter: 9
after hacktivation, phone does have signal?
  Reply With Quote
The Following User Says Thank You to rathbone For This Useful Post:
Old 02-22-2014, 17:22   #5 (permalink)
Freak Poster
 
Join Date: Nov 2013
Location: Canada
Age: 55
Posts: 159
Member: 2074110
Status: Offline
Sonork: 92458589.7230895
Thanks Meter: 10
hope it works cuz i like my phone

sag
  Reply With Quote
The Following User Says Thank You to SC400slide For This Useful Post:
Old 02-22-2014, 18:51   #6 (permalink)
Cheater -Don't Deal with him-
 
Join Date: Dec 2013
Location: XK
Age: 26
Posts: 1,479
Member: 2089356
Status: Offline
Sonork: Threema: 3N5W6VV9
Thanks Meter: 520
Donate money to this user
Quote:
Originally Posted by rathbone View Post
after hacktivation, phone does have signal?
Sure it won't have this just delete setup.app nothing more
  Reply With Quote
Old 02-22-2014, 19:08   #7 (permalink)
No Life Poster
 
Join Date: Feb 2014
Location: gsm
Posts: 635
Member: 2131081
Status: Offline
Sonork: 76543322223
Thanks Meter: 92
is it tested by anyone?
  Reply With Quote
Old 02-22-2014, 19:10   #8 (permalink)
Junior Member
 
Join Date: Jan 2014
Location: HEX
Posts: 12
Member: 2108292
Status: Offline
Thanks Meter: 2
bro hw of iphone 4 is old
so till exist exploit botroom
always iphone 3gs/4
can hactivated and never patched
  Reply With Quote
Old 02-23-2014, 09:16   #9 (permalink)
Freak Poster
 
osfloca's Avatar
 
Join Date: Jan 2014
Location: monterrey nuevo leon mexico
Posts: 137
Member: 2109406
Status: Offline
Sonork: 100.1657612
Thanks Meter: 37
Donate money to this user
will work on 3,2 3,3 also?
  Reply With Quote
Old 02-24-2014, 12:10   #10 (permalink)
Junior Member
 
Join Date: May 2009
Posts: 4
Member: 1041037
Status: Offline
Thanks Meter: 1
BesfortShalaTec, 1)Download ispw of 7.0.6 if you have copy to this location
C:\Users\Usernamexx\AppData\Local\Temp\ssh_rd... just as I said...worked like charm right?
  Reply With Quote
Old 02-24-2014, 16:38   #11 (permalink)
Freak Poster
 
Join Date: Nov 2013
Location: Canada
Age: 55
Posts: 159
Member: 2074110
Status: Offline
Sonork: 92458589.7230895
Thanks Meter: 10
Quote:
Originally Posted by BesfortShalaTec View Post
i just test it but you need to modify something cuase wont work
1)Download ispw of 7.0.6 if you have copy to this location
C:\Users\Usernamexx\AppData\Local\Temp\ssh_rd
2.delete all file and folder there just leave ispw there
3.open ssh_rd_rev04b.jar
4.connect to device to DFU
5.you will see this
Code:
 
 SSH ramdisk maker & loader, version 29-06-2013 git rev-04b
Made possible thanks to Camilo Rodrigues (@Allpluscomputer)
Including xpwn source code by the Dev Team and planetbeing
Including syringe source code by Chronic-Dev and posixninja
syringe exploits by pod2g, geohot & posixninja
Special thanks to iH8sn0w
device-infos source: iphone-dataprotection
Report bugs to msft.guy<[email protected]> (@msft_guy)
 
 
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\native\jsyringeapi.dll
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\native\mux_redux.dll

Connect a device in DFU mode
MobileDevice event: MuxConnect, 0, 0
MobileDevice event: MuxDisconnect, 0, 0
MobileDevice event: DfuConnect, 4cb1227, 8930
DFU device 'iPhone 4 (GSM)' connected
Building ramdisk for device 'iPhone 4 (GSM)'
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\all_keys.plist
Working dir set to C:\Users\Samiri\AppData\Local\Temp\ssh_rd
IPSW at http://appldnld.apple.com/iOS5.1.1/041-6051.2012.0525.Cvby7/iPhone3,1_5.1.1_9B208_Restore.ipsw
Downloading Restore.plist
Local file C:\Users\Samiri\AppData\Local\Temp\ssh_rd\iPhone3,1_5.1.1_9B208_Restore.ipsw not found; downloading from http://appldnld.apple.com/iOS5.1.1/041-6051.2012.0525.Cvby7/iPhone3,1_5.1.1_9B208_Restore.ipsw
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Restore.plist
Restore.plist downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Restore.plist
Parsing Restore.plist..
Kernel file: kernelcache.release.n90
Restore ramdisk file: 038-5512-003.dmg
Downloading Firmware/dfu/iBSS.n90ap.RELEASE.dfu
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\dfu\iBSS.n90ap.RELEASE.dfu.orig
Decrypted to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\dfu\iBSS.n90ap.RELEASE.dfu.dec
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\nor5.patch.json
Patched to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\dfu\iBSS.n90ap.RELEASE.dfu.dec.p
iBSS prepared at C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\dfu\iBSS.n90ap.RELEASE.dfu
Downloading Firmware/dfu/iBEC.n90ap.RELEASE.dfu
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\dfu\iBEC.n90ap.RELEASE.dfu.orig
Decrypted to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\dfu\iBEC.n90ap.RELEASE.dfu.dec
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\nor5.patch.json
Patched to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\dfu\iBEC.n90ap.RELEASE.dfu.dec.p
iBEC prepared at C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\dfu\iBEC.n90ap.RELEASE.dfu
Downloading Firmware/all_flash/all_flash.n90ap.production/DeviceTree.n90ap.img3
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\all_flash\all_flash.n90ap.production\DeviceTree.n90ap.img3
Device tree prepared at C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\all_flash\all_flash.n90ap.production\DeviceTree.n90ap.img3
Downloading Firmware/all_flash/all_flash.n90ap.production/manifest
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\all_flash\all_flash.n90ap.production\manifest
Downloading kernelcache.release.n90
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\kernelcache.release.n90.orig
Decrypted to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\kernelcache.release.n90.dec
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\kernel5.patch.json
Patched to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\kernelcache.release.n90.dec.p
Kernel prepared at C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\kernelcache.release.n90
Downloading 038-5512-003.dmg
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\038-5512-003.dmg.orig
Decrypted to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\038-5512-003.dmg.dec
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ssh.tar
Added ssh.tar to the ramdisk
Ramdisk prepared at C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\038-5512-003.dmg
Using syringe to exploit the bootrom..
Exploit sent!
Preparing to load the ramdisk..
Ramdisk load started!
MobileDevice event: DfuDisconnect, 4cb1227, 8930
MobileDevice event: DfuConnect, 4db1227, 8930
DFU device 'iPhone 4 (GSM)' connected
Ignoring same device iPhone 4 (GSM)
MobileDevice event: DfuDisconnect, 4db1227, 8930
MobileDevice event: RecoveryConnect, 4db1281, 8930
MobileDevice event: RecoveryDisconnect, 4db1281, 8930
Almost there..
MobileDevice event: MuxConnect, 0, 0

Success!
Connect to localhost on port 2022 with your favorite SSH client!

 login: root
 password: alpine
5.open putty connect to "localhost" port 2022 root alpine
6.mount.sh
7.delete setup.app in putty reboot_bak
8.use ireb or tinyumbrella to exit recovery mode

Thanks muches! I dont know how to mount.sh? please help anybody with mac?
  Reply With Quote
Old 02-24-2014, 18:50   #12 (permalink)
No Life Poster
 
ppdavisito's Avatar
 
Join Date: Nov 2012
Location: Cuba
Posts: 505
Member: 1840836
Status: Offline
Sonork: 100.1659703
Thanks Meter: 135
With the software WinSCP after of connect,search the button Console and then put the commond mount.sh
  Reply With Quote
Old 02-24-2014, 22:47   #13 (permalink)
Freak Poster
 
Join Date: Apr 2006
Location: Beach
Posts: 118
Member: 257734
Status: Offline
Thanks Meter: 10
what this command can do??
  Reply With Quote
Old 02-25-2014, 02:42   #14 (permalink)
Freak Poster
 
Join Date: Jan 2009
Location: ibadan...
Posts: 110
Member: 943462
Status: Offline
Thanks Meter: 9
Donate money to this user
nice information to be updated by you bro...
  Reply With Quote
Old 02-25-2014, 02:48   #15 (permalink)
Junior Member
 
Join Date: Mar 2011
Location: korea
Posts: 13
Member: 1545773
Status: Offline
Sonork: 1964321
Thanks Meter: 2
nice idea but for junior member its not enough can you post full details like youtube video or screenshoot it helps us more anyway thanks your post
  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On



All times are GMT +1. The time now is 00:33.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.24988 seconds with 8 queries

SEO by vBSEO