Closed GoogleCodeExporter closed 8 years ago
Hi,
- a plist file with the keys is created by running the bruteforce tool on the
ramdisk (or using the demo_bruteforce.py script that communicates with the
ramdisk).
- right now emf_decrypter does not compile on windows. the plist file with the
keys must be placed in the same folder as the disk image.
Original comment by jean.sig...@gmail.com
on 17 Jul 2011 at 2:56
The python version of emf_decrypter (python_scripts/emf_decrypter.py) works on
windows.
Original comment by jean.sig...@gmail.com
on 1 Oct 2011 at 3:41
Ehh...where to get a 'bruteforce tool on the ramdisk' please...I a really a
newfish...
Original comment by s.c.a.r....@gmail.com
on 8 Oct 2011 at 2:47
You need to compile the tools (under mac os x with ios sdk) then create the
ramdisk :
make -C ramdisk_tools
./build_ramdisk.sh
We will try to add a more detailed how-to soon.
Original comment by jean.sig...@gmail.com
on 8 Oct 2011 at 8:06
I'm neither a developer nor English speaker It seems impossible for me to make
that....is there anyway for someone with no knowledge about programming like me
to retrieve data from a 4 generation ios device? I think such a software is
really needed under no mater mac osx or windows...will you great guys write
such a software? We just need a decrypted img of the disk...or is there anyway
to input some commands in idevice and via a ssh connection directly output a
already decrypted img?
Original comment by s.c.a.r....@gmail.com
on 8 Oct 2011 at 11:42
Original issue reported on code.google.com by
ppdc3...@gmail.com
on 16 Jul 2011 at 2:44