MatthewPierson / PyBoot

Tool for tether booting Checkm8 vulnerable iOS devices
GNU Lesser General Public License v3.0
281 stars 51 forks source link

DFU stops working and returns!! #57

Open ADMNTK opened 3 years ago

ADMNTK commented 3 years ago

Hello,

I tried a lot to restore the version of my device, USB stick stops running and then returns to work, the device is in DFU mode.

MacOS : ver 10.15.7 iPhone 6 downgrade 12 to 11.0 xxx

--

`AbdulRahmans-MacBook-Pro:~ abdulrahman$ cd /Users/abdulrahman/Desktop/PyBoot-master AbdulRahmans-MacBook-Pro:PyBoot-master abdulrahman$ ./pyboot.py -i iPhone7,2 11.2 PyBoot - A tool for tether booting Checkm8 vulnerable iOS devices by Matty, @mosk_i

Current version is: Beta 0.9.1 Make sure your device is connected in DFU mode Checking theiphonewiki for 11.2 keys... Found Keys! Downloading 11.2's BuildManifest.plist Extracting: BuildManifest.plist, from iPhone_4.7_11.2_15C114_Restore.ipsw Found multiple device models... Which is your device?

1: n71map 2: n71ap 3: n61ap

Enter the number that corresponds with your device: 3 Device set to n61ap Getting SHSH for signing images Downloading and patching 11.2's iBSS/iBEC Extracting: Firmware/dfu/iBEC.n61.RELEASE.im4p, from iPhone_4.7_11.2_15C114_Restore.ipsw Extracting: Firmware/dfu/iBSS.n61.RELEASE.im4p, from iPhone_4.7_11.2_15C114_Restore.ipsw dyld: Library not loaded: /usr/local/lib/libpng16.16.dylib Referenced from: /Users/abdulrahman/Desktop/PyBoot-master/./resources/bin/ibootim Reason: image not found Downloading 11.2's KernelCache Extracting: kernelcache.release.iphone7, from iPhone_4.7_11.2_15C114_Restore.ipsw Downloading 11.2's DeviceTree Extracting: Firmware/all_flash/DeviceTree.n61ap.im4p, from iPhone_4.7_11.2_15C114_Restore.ipsw iOS version is 11.x, not downloading trustcache Patching Kernel's type from krnl to rkrn iOS version is 11.x, skipping trustcache patching Patching Devicetree's type from dtre to rdtr Signing boot files Exploiting device with checkm8 Waiting for the USB device with VID: 0x5AC, PID: 0x1227, SRTG: iBoot-1992.0.0.1.19 Found the USB device. Stage: RESET, ret: 0x0 Found the USB device. transfer_ret: 0xE00002EB, transfer_sz: 0x0 Stage: SETUP, ret: 0x0 Found the USB device. Stage: PATCH, ret: 0x0

Eclipsa doesn't allow me to see if the exploit worked or not =( Just have to assume it did, if it didn't then reboot into DFU mode and re-run PyBoot Sending boot files to the device and booting [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% [==================================================] 100.0% Device should be booting! `