GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > GSM & CDMA Phones / Tablets Software & Hardware Area > iPhone ,iPod & iPad (Apple Inc. Products) > iPhone 4 / iPhone 4S


iPhone 4 / iPhone 4S iPhone 4 / 4S

Reply
 
LinkBack Thread Tools Display Modes
Old 02-25-2014, 04:46   #16 (permalink)
No Life Poster
 
ppdavisito's Avatar
 
Join Date: Nov 2012
Location: Cuba
Posts: 505
Member: 1840836
Status: Offline
Sonork: 100.1659703
Thanks Meter: 135

This commond (mount.sh) mount the directory file ,after that you cant see in the folder mnt1 folder and files and you have access to the directory Applications for deleted Setupp.app.
Check this:
Run ssh.jar wait until it says successful
Open winSCP
Open a new connection
Host name: 127.0.0.1
Port: 2022
Login: root
Password: alpine
Press the terminal button in winSCP and type: mount.sh
Go to /mnt1/var/Applications and right click and delete setup.app
To activate your device and have it work with your mobile carrier, iTunes and Evasi0n copy the supplied files into the specified folders in the video.
Reboot your device
Your device will now be in recovery mode, Use Tiny Umbrella to kick it out of recovery as specified .
the certificates could not be manipulated WELL HERE IT IS.
  Reply With Quote
The Following User Says Thank You to ppdavisito For This Useful Post:
Old 02-25-2014, 05:37   #17 (permalink)
No Life Poster
 
Join Date: Jan 2004
Location: india
Posts: 1,450
Member: 50772
Status: Offline
Sonork: 100.1590990
Thanks Meter: 318
Quote:
Originally Posted by ppdavisito View Post
This commond (mount.sh) mount the directory file ,after that you cant see in the folder mnt1 folder and files and you have access to the directory Applications for deleted Setupp.app.
Check this:
Run ssh.jar wait until it says successful
Open winSCP
Open a new connection
Host name: 127.0.0.1
Port: 2022
Login: root
Password: alpine
Press the terminal button in winSCP and type: mount.sh
Go to /mnt1/var/Applications and right click and delete setup.app
To activate your device and have it work with your mobile carrier, iTunes and Evasi0n copy the supplied files into the specified folders in the video.
Reboot your device
Your device will now be in recovery mode, Use Tiny Umbrella to kick it out of recovery as specified .
the certificates could not be manipulated WELL HERE IT IS.

iCloud Activation Successfully Bypassed.... but NOSERVICE
  Reply With Quote
The Following User Says Thank You to aashir For This Useful Post:
Old 02-25-2014, 09:44   #18 (permalink)
No Life Poster
 
Zaheer123e's Avatar
 
Join Date: Jan 2012
Location: Online Imeis Codes Unlockings
Posts: 577
Member: 1715845
Status: Offline
Sonork: 100.1596500
Thanks Meter: 195
Quote:
Originally Posted by BesfortShalaTec View Post
i just test it but you need to modify something cuase wont work
1)Download ispw of 7.0.6 if you have copy to this location
C:\Users\Usernamexx\AppData\Local\Temp\ssh_rd
2.delete all file and folder there just leave ispw there
3.open ssh_rd_rev04b.jar
4.connect to device to DFU
5.you will see this
Code:
 
 SSH ramdisk maker & loader, version 29-06-2013 git rev-04b
Made possible thanks to Camilo Rodrigues (@Allpluscomputer)
Including xpwn source code by the Dev Team and planetbeing
Including syringe source code by Chronic-Dev and posixninja
syringe exploits by pod2g, geohot & posixninja
Special thanks to iH8sn0w
device-infos source: iphone-dataprotection
Report bugs to msft.guy<[email protected]> (@msft_guy)
 
 
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\native\jsyringeapi.dll
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\native\mux_redux.dll

Connect a device in DFU mode
MobileDevice event: MuxConnect, 0, 0
MobileDevice event: MuxDisconnect, 0, 0
MobileDevice event: DfuConnect, 4cb1227, 8930
DFU device 'iPhone 4 (GSM)' connected
Building ramdisk for device 'iPhone 4 (GSM)'
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\all_keys.plist
Working dir set to C:\Users\Samiri\AppData\Local\Temp\ssh_rd
IPSW at http://appldnld.apple.com/iOS5.1.1/041-6051.2012.0525.Cvby7/iPhone3,1_5.1.1_9B208_Restore.ipsw
Downloading Restore.plist
Local file C:\Users\Samiri\AppData\Local\Temp\ssh_rd\iPhone3,1_5.1.1_9B208_Restore.ipsw not found; downloading from http://appldnld.apple.com/iOS5.1.1/041-6051.2012.0525.Cvby7/iPhone3,1_5.1.1_9B208_Restore.ipsw
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Restore.plist
Restore.plist downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Restore.plist
Parsing Restore.plist..
Kernel file: kernelcache.release.n90
Restore ramdisk file: 038-5512-003.dmg
Downloading Firmware/dfu/iBSS.n90ap.RELEASE.dfu
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\dfu\iBSS.n90ap.RELEASE.dfu.orig
Decrypted to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\dfu\iBSS.n90ap.RELEASE.dfu.dec
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\nor5.patch.json
Patched to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\dfu\iBSS.n90ap.RELEASE.dfu.dec.p
iBSS prepared at C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\dfu\iBSS.n90ap.RELEASE.dfu
Downloading Firmware/dfu/iBEC.n90ap.RELEASE.dfu
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\dfu\iBEC.n90ap.RELEASE.dfu.orig
Decrypted to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\dfu\iBEC.n90ap.RELEASE.dfu.dec
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\nor5.patch.json
Patched to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\dfu\iBEC.n90ap.RELEASE.dfu.dec.p
iBEC prepared at C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\dfu\iBEC.n90ap.RELEASE.dfu
Downloading Firmware/all_flash/all_flash.n90ap.production/DeviceTree.n90ap.img3
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\all_flash\all_flash.n90ap.production\DeviceTree.n90ap.img3
Device tree prepared at C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\all_flash\all_flash.n90ap.production\DeviceTree.n90ap.img3
Downloading Firmware/all_flash/all_flash.n90ap.production/manifest
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\all_flash\all_flash.n90ap.production\manifest
Downloading kernelcache.release.n90
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\kernelcache.release.n90.orig
Decrypted to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\kernelcache.release.n90.dec
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\kernel5.patch.json
Patched to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\kernelcache.release.n90.dec.p
Kernel prepared at C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\kernelcache.release.n90
Downloading 038-5512-003.dmg
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\038-5512-003.dmg.orig
Decrypted to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\038-5512-003.dmg.dec
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ssh.tar
Added ssh.tar to the ramdisk
Ramdisk prepared at C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\038-5512-003.dmg
Using syringe to exploit the bootrom..
Exploit sent!
Preparing to load the ramdisk..
Ramdisk load started!
MobileDevice event: DfuDisconnect, 4cb1227, 8930
MobileDevice event: DfuConnect, 4db1227, 8930
DFU device 'iPhone 4 (GSM)' connected
Ignoring same device iPhone 4 (GSM)
MobileDevice event: DfuDisconnect, 4db1227, 8930
MobileDevice event: RecoveryConnect, 4db1281, 8930
MobileDevice event: RecoveryDisconnect, 4db1281, 8930
Almost there..
MobileDevice event: MuxConnect, 0, 0

Success!
Connect to localhost on port 2022 with your favorite SSH client!

 login: root
 password: alpine
5.open putty connect to "localhost" port 2022 root alpine
6.mount.sh
7.delete setup.app in putty reboot_bak
8.use ireb or tinyumbrella to exit recovery mode

iCloud Activation Bypassed Network SERVICE ok ? i have i phone 4 iCloud Activation idd ................
  Reply With Quote
Old 02-25-2014, 11:03   #19 (permalink)
Freak Poster
 
Join Date: Sep 2003
Location: Poland
Age: 57
Posts: 147
Member: 40262
Status: Offline
Thanks Meter: 11
No network and nobody make this its only old solutions.
  Reply With Quote
Old 02-25-2014, 11:07   #20 (permalink)
Freak Poster
 
addgsm's Avatar
 
Join Date: Jan 2011
Posts: 408
Member: 1495266
Status: Offline
Sonork: 100.1609552
Thanks Meter: 47
yes is for icloud screen bypass but still cannot bypass icloud id and only works on iphone 4
  Reply With Quote
Old 02-25-2014, 11:44   #21 (permalink)
Insane Poster
 
Join Date: Mar 2012
Location: india kolkata
Age: 36
Posts: 88
Member: 1740101
Status: Offline
Sonork: 100.1641580
Thanks Meter: 11
Quote:
Originally Posted by BesfortShalaTec View Post
i just test it but you need to modify something cuase wont work
1)Download ispw of 7.0.6 if you have copy to this location
C:\Users\Usernamexx\AppData\Local\Temp\ssh_rd
2.delete all file and folder there just leave ispw there
3.open ssh_rd_rev04b.jar
4.connect to device to DFU
5.you will see this
Code:
 
 SSH ramdisk maker & loader, version 29-06-2013 git rev-04b
Made possible thanks to Camilo Rodrigues (@Allpluscomputer)
Including xpwn source code by the Dev Team and planetbeing
Including syringe source code by Chronic-Dev and posixninja
syringe exploits by pod2g, geohot & posixninja
Special thanks to iH8sn0w
device-infos source: iphone-dataprotection
Report bugs to msft.guy<[email protected]> (@msft_guy)
 
 
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\native\jsyringeapi.dll
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\native\mux_redux.dll

Connect a device in DFU mode
MobileDevice event: MuxConnect, 0, 0
MobileDevice event: MuxDisconnect, 0, 0
MobileDevice event: DfuConnect, 4cb1227, 8930
DFU device 'iPhone 4 (GSM)' connected
Building ramdisk for device 'iPhone 4 (GSM)'
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\all_keys.plist
Working dir set to C:\Users\Samiri\AppData\Local\Temp\ssh_rd
IPSW at http://appldnld.apple.com/iOS5.1.1/041-6051.2012.0525.Cvby7/iPhone3,1_5.1.1_9B208_Restore.ipsw
Downloading Restore.plist
Local file C:\Users\Samiri\AppData\Local\Temp\ssh_rd\iPhone3,1_5.1.1_9B208_Restore.ipsw not found; downloading from http://appldnld.apple.com/iOS5.1.1/041-6051.2012.0525.Cvby7/iPhone3,1_5.1.1_9B208_Restore.ipsw
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Restore.plist
Restore.plist downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Restore.plist
Parsing Restore.plist..
Kernel file: kernelcache.release.n90
Restore ramdisk file: 038-5512-003.dmg
Downloading Firmware/dfu/iBSS.n90ap.RELEASE.dfu
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\dfu\iBSS.n90ap.RELEASE.dfu.orig
Decrypted to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\dfu\iBSS.n90ap.RELEASE.dfu.dec
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\nor5.patch.json
Patched to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\dfu\iBSS.n90ap.RELEASE.dfu.dec.p
iBSS prepared at C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\dfu\iBSS.n90ap.RELEASE.dfu
Downloading Firmware/dfu/iBEC.n90ap.RELEASE.dfu
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\dfu\iBEC.n90ap.RELEASE.dfu.orig
Decrypted to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\dfu\iBEC.n90ap.RELEASE.dfu.dec
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\nor5.patch.json
Patched to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\dfu\iBEC.n90ap.RELEASE.dfu.dec.p
iBEC prepared at C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\dfu\iBEC.n90ap.RELEASE.dfu
Downloading Firmware/all_flash/all_flash.n90ap.production/DeviceTree.n90ap.img3
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\all_flash\all_flash.n90ap.production\DeviceTree.n90ap.img3
Device tree prepared at C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\all_flash\all_flash.n90ap.production\DeviceTree.n90ap.img3
Downloading Firmware/all_flash/all_flash.n90ap.production/manifest
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\Firmware\all_flash\all_flash.n90ap.production\manifest
Downloading kernelcache.release.n90
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\kernelcache.release.n90.orig
Decrypted to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\kernelcache.release.n90.dec
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\kernel5.patch.json
Patched to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\kernelcache.release.n90.dec.p
Kernel prepared at C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\kernelcache.release.n90
Downloading 038-5512-003.dmg
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\038-5512-003.dmg.orig
Decrypted to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\038-5512-003.dmg.dec
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ssh.tar
Added ssh.tar to the ramdisk
Ramdisk prepared at C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iphone31_9B208\038-5512-003.dmg
Using syringe to exploit the bootrom..
Exploit sent!
Preparing to load the ramdisk..
Ramdisk load started!
MobileDevice event: DfuDisconnect, 4cb1227, 8930
MobileDevice event: DfuConnect, 4db1227, 8930
DFU device 'iPhone 4 (GSM)' connected
Ignoring same device iPhone 4 (GSM)
MobileDevice event: DfuDisconnect, 4db1227, 8930
MobileDevice event: RecoveryConnect, 4db1281, 8930
MobileDevice event: RecoveryDisconnect, 4db1281, 8930
Almost there..
MobileDevice event: MuxConnect, 0, 0

Success!
Connect to localhost on port 2022 with your favorite SSH client!

 login: root
 password: alpine
5.open putty connect to "localhost" port 2022 root alpine
6.mount.sh
7.delete setup.app in putty reboot_bak
8.use ireb or tinyumbrella to exit recovery mode

can u prove this via video or screenshots actually its not working till then how can u say its easy to hactivate??????
  Reply With Quote
Old 02-25-2014, 12:45   #22 (permalink)
Freak Poster
 
Join Date: Oct 2011
Location: Almoradi (ALICANTE) . SPAIN
Posts: 493
Member: 1677266
Status: Offline
Thanks Meter: 90
i did hacktivate iphone 4 and put my icloud account wehen i update whit itunes it ask for old icloud account i get no service....
  Reply With Quote
Old 02-25-2014, 12:56   #23 (permalink)
Insane Poster
 
Join Date: Sep 2006
Location: Việt Nam (Biên Hoà)
Age: 36
Posts: 80
Member: 360453
Status: Offline
Thanks Meter: 5
Iphone 4S 5 5S can be Hactivate Sir ?
  Reply With Quote
Old 02-25-2014, 17:49   #24 (permalink)
No Life Poster
 
Join Date: Feb 2014
Location: gsm
Posts: 634
Member: 2131081
Status: Offline
Sonork: 76543322223
Thanks Meter: 92
please some one tell how to step by step....
  Reply With Quote
Old 02-26-2014, 07:34   #25 (permalink)
hekmat-safi
Guest
 
Posts: n/a
Member:
working only iphone 4 ,,,,,,,,,,,, omplete iCloud activation bypass. This works as long as you follow all of directions and have the correct files . I know many doubted but here is partial proof in the pudding, you can follow this tutorial now and bring your iPhone back to life. The greatest thing of all here is that you can add your own iCloud credentials and totally reclaim the iPhone as yours. In addition, iTunes detects the phone as activated and so does evasi0n which means you can also jailbreak your device freely.



This is fantastic news for a lot of us and I really hope it help you all, but our work has only just began, please sign up and contribute to the site guys. Post comments articles and suggestions it would be greatly appreciated.
The video below should explain everything and will guide you step by step a more extensive written tutorial will be posted soon.
In the mean time here is a quick written tutorial.
Put device into DFU mode
Run ssh.jar wait until it says successful
Open winSCP
Open a new connection
Host name: 127.0.0.1
Port: 2022
Login: root
Password: alpine
Press the terminal button in winSCP and type: mount.sh
Go to /mnt1/var/Applications and right click and delete setup.app
To activate your device and have it work with your mobile carrier, iTunes and Evasi0n copy the supplied files into the specified folders in the
Reboot your device
Your device will now be in recovery mode, Use Tiny Umbrella to kick it out of recovery as specified .
the certificates could not be manipulated WELL HERE IT
  Reply With Quote
The Following User Says Thank You to For This Useful Post:
Old 02-26-2014, 08:43   #26 (permalink)
Junior Member
 
Join Date: May 2009
Posts: 34
Member: 1028797
Status: Offline
Thanks Meter: 3
can i use this acivate for iphone 4s and iphone 5?
  Reply With Quote
Old 02-27-2014, 00:41   #27 (permalink)
Junior Member
 
Join Date: Oct 2010
Posts: 2
Member: 1416681
Status: Offline
Sonork: maxtra iphone 4
Thanks Meter: 0
Hello this step does not work with the service, not to copy files to the device to retrieve service.
any suggestions?
  Reply With Quote
Old 02-27-2014, 07:23   #28 (permalink)
Freak Poster
 
chenqin503's Avatar
 
Join Date: Apr 2008
Location: China
Posts: 317
Member: 748867
Status: Offline
Sonork: 100.1625979
Thanks Meter: 53
no network service , how to fix it?
  Reply With Quote
Old 02-27-2014, 07:55   #29 (permalink)
No Life Poster
 
ribbentrop's Avatar
 
Join Date: Sep 2003
Location: Ukraine
Age: 51
Posts: 4,614
Member: 40400
Status: Offline
Thanks Meter: 1,250
It was posted many times, you won't be able to get network service after deleting Setup.app and there is no way to get it back. Also you can't jaibreak your phone.
  Reply With Quote
Old 03-01-2014, 20:20   #30 (permalink)
Freak Poster
 
citra kalasan's Avatar
 
Join Date: Nov 2006
Location: maldives in java
Posts: 146
Member: 389262
Status: Offline
Thanks Meter: 46
Donate money to this user

screenshot capture

result like that ,,, if with wifi,,, network is gone,,,
  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On



All times are GMT +1. The time now is 03:28.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.27586 seconds with 8 queries

SEO by vBSEO