#
# Checkra1n hacktivation
#
# Proudly written in VSCode
# (c) 2019 Noah Shanaberger
#
#======== Made by =======
# Noah Shanaberger
#======== Thanks to =======
# argp, axi0mx, danyl931, jaywalker, kirb, littlelailo
# nitoTV, nullpixel, pimskeks, qwertyoruiop, sbingner, siguza
# haifisch, jndok, jonseals, xerub, lilstevie, psychotea, sferrini
# Cellebrite (ih8sn0w, cjori, ronyrus et al.)
#====== Special Note ======
# Praise the free market!
#==========================
- [*] We're going to jailbreak your device now.
- [!] Put your device into DFU mode. Hit enter when you're in DFU mode.
- [*]: Waiting for DFU devices
- [*]: Exploiting
- [*]: Checking if device is ready
- [*]: Setting up the exploit (this is the heap spray)
- [*]: Right before trigger (this is the real bug setup)
- [*]: Entered download mode
- [*]: Booting...
- [!] Hit enter when it is fully booted.
- [*] Starting iProxy connection.
- [!] Unplug the device, and plug it back in. Hit enter when done.
- [*] Connecting to device SSH via USB.
Exception: Error reading SSH protocol banner[Errno 54] Connection reset by peer
Traceback (most recent call last):
File "/Users/aklh204/.local/share/virtualenvs/hacktivate-master-T5WBpBDd/lib/python3.7/site-packages/paramiko/transport.py", line 2211, in _check_banner
buf = self.packetizer.readline(timeout)
File "/Users/aklh204/.local/share/virtualenvs/hacktivate-master-T5WBpBDd/lib/python3.7/site-packages/paramiko/packet.py", line 380, in readline
buf += self._read_timeout(timeout)
File "/Users/aklh204/.local/share/virtualenvs/hacktivate-master-T5WBpBDd/lib/python3.7/site-packages/paramiko/packet.py", line 607, in _read_timeout
x = self.__socket.recv(128)
ConnectionResetError: [Errno 54] Connection reset by peer
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/Users/aklh204/.local/share/virtualenvs/hacktivate-master-T5WBpBDd/lib/python3.7/site-packages/paramiko/transport.py", line 2039, in run
self._check_banner()
File "/Users/aklh204/.local/share/virtualenvs/hacktivate-master-T5WBpBDd/lib/python3.7/site-packages/paramiko/transport.py", line 2216, in _check_banner
"Error reading SSH protocol banner" + str(e)
paramiko.ssh_exception.SSHException: Error reading SSH protocol banner[Errno 54] Connection reset by peer
Traceback (most recent call last):
File "/Users/aklh204/.local/share/virtualenvs/hacktivate-master-T5WBpBDd/lib/python3.7/site-packages/paramiko/transport.py", line 2211, in _check_banner
buf = self.packetizer.readline(timeout)
File "/Users/aklh204/.local/share/virtualenvs/hacktivate-master-T5WBpBDd/lib/python3.7/site-packages/paramiko/packet.py", line 380, in readline
buf += self._read_timeout(timeout)
File "/Users/aklh204/.local/share/virtualenvs/hacktivate-master-T5WBpBDd/lib/python3.7/site-packages/paramiko/packet.py", line 607, in _read_timeout
x = self.__socket.recv(128)
ConnectionResetError: [Errno 54] Connection reset by peer
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "hacktivate.py", line 153, in <module>
hacktivateDevice(22)
File "hacktivate.py", line 109, in hacktivateDevice
sshClient.connect(hostname="localhost", port=2222, username="root", password="alpine")
File "/Users/aklh204/.local/share/virtualenvs/hacktivate-master-T5WBpBDd/lib/python3.7/site-packages/paramiko/client.py", line 406, in connect
t.start_client(timeout=timeout)
File "/Users/aklh204/.local/share/virtualenvs/hacktivate-master-T5WBpBDd/lib/python3.7/site-packages/paramiko/transport.py", line 660, in start_client
raise e
File "/Users/aklh204/.local/share/virtualenvs/hacktivate-master-T5WBpBDd/lib/python3.7/site-packages/paramiko/transport.py", line 2039, in run
self._check_banner()
File "/Users/aklh204/.local/share/virtualenvs/hacktivate-master-T5WBpBDd/lib/python3.7/site-packages/paramiko/transport.py", line 2216, in _check_banner
"Error reading SSH protocol banner" + str(e)
paramiko.ssh_exception.SSHException: Error reading SSH protocol banner[Errno 54] Connection reset by peer
(hacktivate-master) bash-3.2$
Same error encountered with two devices and regardless of --alternate argument.
* Starting iProxy connection.
Traceback (most recent call last):
File "hacktivate.py", line 151, in
hacktivateDevice(44)
File "hacktivate.py", line 104, in hacktivateDevice
iproxyProc = pexpect.spawn(f"iproxy 2222 {str(port)}")
File "/Users/rctabb/.local/share/virtualenvs/hacktivate-master-VMLclRNX/lib/python3.7/site-packages/pexpect/pty_spawn.py", line 204, in init
self._spawn(command, args, preexec_fn, dimensions)
File "/Users/rctabb/.local/share/virtualenvs/hacktivate-master-VMLclRNX/lib/python3.7/site-packages/pexpect/pty_spawn.py", line 276, in _spawn
'executable: %s.' % self.command)
pexpect.exceptions.ExceptionPexpect: The command was not found or was not executable: iproxy.
(hacktivate-master) bash-3.2$
checkra1n_gui
to justcheckra1n
.--alternative
does not match "hacktivate.py"'s--alternate
https://pastebin.com/n6ZuwiVL
Same error encountered with two devices and regardless of
--alternate
argument.