Closed mateo08c closed 1 year ago
please git pull, and try again
[==================================================] 100.0%
[==================================================] 100.0%
[*] Waiting for the ramdisk to finish booting
libusb: warning [op_get_configuration] device unconfigured
libusb: error [op_get_active_config_descriptor] device unconfigured
[17:35:27.071][3] Could not get old configuration descriptor for device 3-11: LIBUSB_ERROR_NOT_FOUND
[17:35:27.093][3] Connecting to new device on location 0x3000b as ID 2
[17:35:27.174][3] Connected to v2.0 device 2 on location 0x3000b with serial number ramdisk tool Sep 18 2022 20:14:43
[17:35:27.175][2] device_control_input: Got unhandled payload type 5
[17:35:27.280][2] device_control_input: Got unhandled payload type 5
Error connecting to device: No error information
seputil: Gigalocker file (/mnt7/61356D0D-CA84-501B-B517-90171B8E3E3B.gl) exists
seputil: Gigalocker initialization completed
sepi digest (48 bytes): 6cd78b731e8b1477a59d42c31620bca9d4690ebbe2b0749beaa4bce6c013cf8497a8451ece840b98f0a5b7a285e87fb7
sepi nonce (20 bytes): 3e4e655722b021817f7e1313026586371dddfd6e
rsep digest (48 bytes): 3bd977b45548330b94b9ce693f08911e29be962cfa213e6307ebd2075ecc6d02f615ac00b0f4bb0c9904d658994f26de
rsep nonce (20 bytes): 3e4e655722b021817f7e1313026586371dddfd6e
img4tool version: 0.197-aca6cf005c94caf135023263cbb5c61a0081804f-RELEASE
Compiled with plist: YES
Saved IM4M to work/IM4M
Dumpped SHSH
[*] Patching kernel ...
Reading work/kernelcache...
[NOTE] Image4 payload data is LZFSE compressed, decompressing...
Extracted Image4 payload data to: work/kcache.raw
sending incremental file list
kcache.raw
sent 14.891.064 bytes received 35 bytes 5.956.439,60 bytes/sec
total size is 40.108.060 speedup is 2,69
sending incremental file list
Kernel15Patcher.ios
sent 35.598 bytes received 35 bytes 71.266,00 bytes/sec
total size is 128.736 speedup is 3,61
./downr1n.sh: ligne 787 : [: trop d'arguments
receiving incremental file list
kcache.patched
sent 43 bytes received 14.891.140 bytes 4.254.623,71 bytes/sec
total size is 40.108.032 speedup is 2,69
[==================================================] 100.0% [==================================================] 100.0% [*] Waiting for the ramdisk to finish booting libusb: warning [op_get_configuration] device unconfigured libusb: error [op_get_active_config_descriptor] device unconfigured [17:35:27.071][3] Could not get old configuration descriptor for device 3-11: LIBUSB_ERROR_NOT_FOUND [17:35:27.093][3] Connecting to new device on location 0x3000b as ID 2 [17:35:27.174][3] Connected to v2.0 device 2 on location 0x3000b with serial number ramdisk tool Sep 18 2022 20:14:43 [17:35:27.175][2] device_control_input: Got unhandled payload type 5 [17:35:27.280][2] device_control_input: Got unhandled payload type 5 Error connecting to device: No error information seputil: Gigalocker file (/mnt7/61356D0D-CA84-501B-B517-90171B8E3E3B.gl) exists seputil: Gigalocker initialization completed sepi digest (48 bytes): 6cd78b731e8b1477a59d42c31620bca9d4690ebbe2b0749beaa4bce6c013cf8497a8451ece840b98f0a5b7a285e87fb7 sepi nonce (20 bytes): 3e4e655722b021817f7e1313026586371dddfd6e rsep digest (48 bytes): 3bd977b45548330b94b9ce693f08911e29be962cfa213e6307ebd2075ecc6d02f615ac00b0f4bb0c9904d658994f26de rsep nonce (20 bytes): 3e4e655722b021817f7e1313026586371dddfd6e img4tool version: 0.197-aca6cf005c94caf135023263cbb5c61a0081804f-RELEASE Compiled with plist: YES Saved IM4M to work/IM4M Dumpped SHSH [*] Patching kernel ... Reading work/kernelcache... [NOTE] Image4 payload data is LZFSE compressed, decompressing... Extracted Image4 payload data to: work/kcache.raw sending incremental file list kcache.raw sent 14.891.064 bytes received 35 bytes 5.956.439,60 bytes/sec total size is 40.108.060 speedup is 2,69 sending incremental file list Kernel15Patcher.ios sent 35.598 bytes received 35 bytes 71.266,00 bytes/sec total size is 128.736 speedup is 3,61 ./downr1n.sh: ligne 787 : [: trop d'arguments receiving incremental file list kcache.patched sent 43 bytes received 14.891.140 bytes 4.254.623,71 bytes/sec total size is 40.108.032 speedup is 2,69
i don't see problems, it looks like well, just click enter i think your device is in recovery mode
Wikiproxy error:
./downr1n.sh: ligne 787 : [: trop d'arguments
receiving incremental file list
kcache.patched
sent 43 bytes received 15.353.123 bytes 4.386.618,86 bytes/sec
total size is 41.402.368 speedup is 2,70
[18:12:26.728][3] Removed device 2 on location 0x3000c
[*] To get into DFU mode, you will be guided through 2 steps:
[*] Press any key when ready for DFU mode
Get ready (0)
Release side button, but keep holding volume down (9)
Release side button, but keep holding volume down (2)
[*] Device entered DFU!
[* ]Patchimg some boot files...
trst
[*] Finished moving the boot files to work
usb_timeout: 5
[libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8010
Found the USB handle.
Stage: RESET
ret: true
[libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8010
Found the USB handle.
Stage: SPRAY
ret: true
[libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8010
Found the USB handle.
Stage: SETUP
ret: true
[libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8010
Found the USB handle.
Stage: PATCH
ret: true
[libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8010
Found the USB handle.
Now you can boot untrusted images.
[libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
Found the USB handle.
Version: 7fd877ee7d57a91d2506155752077aad51f896aa-39
main: Starting...
iOS 14 iBoot detected!
getting get_debug_enabled_patch() patch
getting get_sigcheck_patch() patch
applying patch=0x1800c2d88 : 000080d2
applying patch=0x1800c2ddc : 000080d2
applying patch=0x1800c4758 : 200080d2
main: Writing out patched file to work/iBSS.patched...
main: Quitting...
none
usb_timeout: 5
[libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8010
Found the USB handle.
Now you can boot untrusted images.
[libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
Found the USB handle.
Version: 7fd877ee7d57a91d2506155752077aad51f896aa-39
main: Starting...
iOS 14 iBoot detected!
getting get_boot_arg_patch(-v wdt=-1 ) patch
getting get_debug_enabled_patch() patch
getting get_unlock_nvram_patch() patch
getting get_sigcheck_patch() patch
applying patch=0x1800c2d88 : 000080d2
applying patch=0x1800c2ddc : 000080d2
applying patch=0x1800b38c8 : 000080d2c0035fd6
applying patch=0x1800b3918 : 000080d2c0035fd6
applying patch=0x1800f0d2c : 000080d2c0035fd6
applying patch=0x1800c4758 : 200080d2
applying patch=0x1800c5d38 : f96d3230
applying patch=0x18012aaf5 : 2d76207764743d2d312000
applying patch=0x1800c8a14 : 1f2003d5
main: Writing out patched file to work/iBEC.patched...
main: Quitting...
none
main: Starting...
Kernel: Adding AMFI_get_out_of_my_way patch...
get_amfi_out_of_my_way_patch: Entering ...
get_amfi_out_of_my_way_patch: Kernel-7195 inputted
get_amfi_out_of_my_way_patch: Found entitlements too small str loc at 0x8fd5f8
get_amfi_out_of_my_way_patch: Found entitlements too small str ref at 0xfbaf30
get_amfi_out_of_my_way_patch: Patching AMFI at 0xfb5df8
Kernel: Adding root volume seal is broken patch...
get_root_volume_seal_is_broken_patch: Entering ...
get_root_volume_seal_is_broken_patch: Found ""root volume seal is broken %p\n"" str loc at 0xc0c288
get_root_volume_seal_is_broken_patch: Found ""root volume seal is broken %p\n"" xref at 0x1aa8c18
get_root_volume_seal_is_broken_patch: Found tbnz at 0x1aa8bf0
get_root_volume_seal_is_broken_patch: Patching tbnz at 0x1aa8bf0
get_root_volume_seal_is_broken_patch: Patched tbnz at 0x1aa8bf0
Kernel: Adding AppleFirmwareUpdate img4 signature check patch...
get_AppleFirmwareUpdate_img4_signature_check: Entering ...
get_AppleFirmwareUpdate_img4_signature_check: Found "%s::%s() Performing img4 validation outside of workloop" str loc at 0x951f45
get_AppleFirmwareUpdate_img4_signature_check: Found "%s::%s() Performing img4 validation outside of workloop" xref at 0x1093970
get_AppleFirmwareUpdate_img4_signature_check: Patching "%s::%s() Performing img4 validation outside of workloop" at 0x109397c
main: Writing out patched file to work/kcache.patchedB...
main: Quitting...
Reading work/kcache.patchedB...
Compressing payload using LZSS...
IM4P outputted to: work/kcache.im4p
Reading work/kcache.im4p...
Reading work/IM4M...
Creating Image4...
Image4 file outputted to: work/kernelcache.img4
Reading ipsw/extracted/kernelcache.release.iphone9...
[NOTE] Image4 payload data is LZFSE compressed, decompressing...
Extracted Image4 payload data to: work/kcache.dec
main: Starting...
main: Detected fat macho kernel
Kernel: Adding AMFI_get_out_of_my_way patch...
get_amfi_out_of_my_way_patch: Entering ...
get_amfi_out_of_my_way_patch: Kernel-7195 inputted
get_amfi_out_of_my_way_patch: Found entitlements too small str loc at 0x8fd5f8
get_amfi_out_of_my_way_patch: Found entitlements too small str ref at 0xfbaf30
get_amfi_out_of_my_way_patch: Patching AMFI at 0xfb5df8
Kernel: Adding tbypassFirmwareValidate patch...
bypassFirmwareValidate: Entering ...
bypassFirmwareValidate: Found "trust evaluation succeeded" str loc at 0x94ffcd
bypassFirmwareValidate: Found "wrapped Image4 payload" xref at 0x1088a04
bypassFirmwareValidate: Patching "wrapped Image4 payload" at 0x10889e4
main: Writing out patched file to work/krnl.patched...
main: Quitting...
Reading work/krnl.patched...
Compressing payload using LZSS...
IM4P outputted to: work/krnl.im4p
dtre
rdsk
[*] Patching the restored_external and asr, and saving them into the ramdisk ...
getting get_asr_patch()
[*] Image failed signature verification string at 0x4072c
[*] Image passed signature verification string at 0x40708
[*] xref to Image failed signature verification string at 0x243f0
[*] Assembling arm64 branch
[*] Writing out patched file to work/patched_asr
file size: 1015968
getting get_skip_sealing_patch()
[*] Skipping sealing system volume string at 0xaa709
[*] Skipping sealing system volume xref at 0x31b74
[*] Skipping sealing system volume branch to xref at 0x31b14
[*] Assembling arm64 branch
[*] Writing out patched file to work/patched_restored_external
Reading work/ramdisk.dmg...
IM4P outputted to: work/rdsk.im4p
'work/devicetree.img4' -> 'boot/iPhone9,3/devicetree.img4'
'work/iBEC.img4' -> 'boot/iPhone9,3/iBEC.img4'
'work/iBSS.img4' -> 'boot/iPhone9,3/iBSS.img4'
'work/kernelcache.img4' -> 'boot/iPhone9,3/kernelcache.img4'
'work/trustcache.img4' -> 'boot/iPhone9,3/trustcache.img4'
[*] Sucess Patching the boot files
[*] Executing wikiproxy.py in order to fix key issue
INFO: Started server process [5234]
INFO: Waiting for application startup.
INFO: Application startup complete.
--- Logging error ---
Traceback (most recent call last):
File "/usr/lib/python3.10/logging/__init__.py", line 1100, in emit
msg = self.format(record)
File "/usr/lib/python3.10/logging/__init__.py", line 943, in format
return fmt.format(record)
File "/usr/lib/python3.10/logging/__init__.py", line 678, in format
record.message = record.getMessage()
File "/usr/lib/python3.10/logging/__init__.py", line 368, in getMessage
msg = msg % self.args
TypeError: %d format: a real number is required, not str
Call stack:
File "/home/mateo/downr1n/wikiproxy.py", line 181, in <module>
uvicorn.run(app='__main__:app', host='127.0.0.1', port='8888')
File "/usr/local/lib/python3.10/dist-packages/uvicorn/main.py", line 587, in run
server.run()
File "/usr/local/lib/python3.10/dist-packages/uvicorn/server.py", line 61, in run
return asyncio.run(self.serve(sockets=sockets))
File "/usr/lib/python3.10/asyncio/runners.py", line 44, in run
return loop.run_until_complete(main)
File "/usr/lib/python3.10/asyncio/base_events.py", line 633, in run_until_complete
self.run_forever()
File "/usr/lib/python3.10/asyncio/base_events.py", line 600, in run_forever
self._run_once()
File "/usr/lib/python3.10/asyncio/base_events.py", line 1896, in _run_once
handle._run()
File "/usr/lib/python3.10/asyncio/events.py", line 80, in _run
self._context.run(self._callback, *self._args)
File "/usr/local/lib/python3.10/dist-packages/uvicorn/server.py", line 78, in serve
await self.startup(sockets=sockets)
File "/usr/local/lib/python3.10/dist-packages/uvicorn/server.py", line 177, in startup
self._log_started_message(listeners)
File "/usr/local/lib/python3.10/dist-packages/uvicorn/server.py", line 218, in _log_started_message
logger.info(
Message: 'Uvicorn running on %s://%s:%d (Press CTRL+C to quit)'
Arguments: ('http', '127.0.0.1', '8888')
After that, I have to run the script with the --boot argument?
And yes the Kernel15Patcher.ios path error is fixed. Thx!
After --boot:
Wikiproxy error:
./downr1n.sh: ligne 787 : [: trop d'arguments receiving incremental file list kcache.patched sent 43 bytes received 15.353.123 bytes 4.386.618,86 bytes/sec total size is 41.402.368 speedup is 2,70 [18:12:26.728][3] Removed device 2 on location 0x3000c [*] To get into DFU mode, you will be guided through 2 steps: [*] Press any key when ready for DFU mode Get ready (0) Release side button, but keep holding volume down (9) Release side button, but keep holding volume down (2) [*] Device entered DFU! [* ]Patchimg some boot files... trst [*] Finished moving the boot files to work usb_timeout: 5 [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8010 Found the USB handle. Stage: RESET ret: true [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8010 Found the USB handle. Stage: SPRAY ret: true [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8010 Found the USB handle. Stage: SETUP ret: true [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8010 Found the USB handle. Stage: PATCH ret: true [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8010 Found the USB handle. Now you can boot untrusted images. [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 Found the USB handle. Version: 7fd877ee7d57a91d2506155752077aad51f896aa-39 main: Starting... iOS 14 iBoot detected! getting get_debug_enabled_patch() patch getting get_sigcheck_patch() patch applying patch=0x1800c2d88 : 000080d2 applying patch=0x1800c2ddc : 000080d2 applying patch=0x1800c4758 : 200080d2 main: Writing out patched file to work/iBSS.patched... main: Quitting... none usb_timeout: 5 [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 CPID: 0x8010 Found the USB handle. Now you can boot untrusted images. [libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227 Found the USB handle. Version: 7fd877ee7d57a91d2506155752077aad51f896aa-39 main: Starting... iOS 14 iBoot detected! getting get_boot_arg_patch(-v wdt=-1 ) patch getting get_debug_enabled_patch() patch getting get_unlock_nvram_patch() patch getting get_sigcheck_patch() patch applying patch=0x1800c2d88 : 000080d2 applying patch=0x1800c2ddc : 000080d2 applying patch=0x1800b38c8 : 000080d2c0035fd6 applying patch=0x1800b3918 : 000080d2c0035fd6 applying patch=0x1800f0d2c : 000080d2c0035fd6 applying patch=0x1800c4758 : 200080d2 applying patch=0x1800c5d38 : f96d3230 applying patch=0x18012aaf5 : 2d76207764743d2d312000 applying patch=0x1800c8a14 : 1f2003d5 main: Writing out patched file to work/iBEC.patched... main: Quitting... none main: Starting... Kernel: Adding AMFI_get_out_of_my_way patch... get_amfi_out_of_my_way_patch: Entering ... get_amfi_out_of_my_way_patch: Kernel-7195 inputted get_amfi_out_of_my_way_patch: Found entitlements too small str loc at 0x8fd5f8 get_amfi_out_of_my_way_patch: Found entitlements too small str ref at 0xfbaf30 get_amfi_out_of_my_way_patch: Patching AMFI at 0xfb5df8 Kernel: Adding root volume seal is broken patch... get_root_volume_seal_is_broken_patch: Entering ... get_root_volume_seal_is_broken_patch: Found ""root volume seal is broken %p\n"" str loc at 0xc0c288 get_root_volume_seal_is_broken_patch: Found ""root volume seal is broken %p\n"" xref at 0x1aa8c18 get_root_volume_seal_is_broken_patch: Found tbnz at 0x1aa8bf0 get_root_volume_seal_is_broken_patch: Patching tbnz at 0x1aa8bf0 get_root_volume_seal_is_broken_patch: Patched tbnz at 0x1aa8bf0 Kernel: Adding AppleFirmwareUpdate img4 signature check patch... get_AppleFirmwareUpdate_img4_signature_check: Entering ... get_AppleFirmwareUpdate_img4_signature_check: Found "%s::%s() Performing img4 validation outside of workloop" str loc at 0x951f45 get_AppleFirmwareUpdate_img4_signature_check: Found "%s::%s() Performing img4 validation outside of workloop" xref at 0x1093970 get_AppleFirmwareUpdate_img4_signature_check: Patching "%s::%s() Performing img4 validation outside of workloop" at 0x109397c main: Writing out patched file to work/kcache.patchedB... main: Quitting... Reading work/kcache.patchedB... Compressing payload using LZSS... IM4P outputted to: work/kcache.im4p Reading work/kcache.im4p... Reading work/IM4M... Creating Image4... Image4 file outputted to: work/kernelcache.img4 Reading ipsw/extracted/kernelcache.release.iphone9... [NOTE] Image4 payload data is LZFSE compressed, decompressing... Extracted Image4 payload data to: work/kcache.dec main: Starting... main: Detected fat macho kernel Kernel: Adding AMFI_get_out_of_my_way patch... get_amfi_out_of_my_way_patch: Entering ... get_amfi_out_of_my_way_patch: Kernel-7195 inputted get_amfi_out_of_my_way_patch: Found entitlements too small str loc at 0x8fd5f8 get_amfi_out_of_my_way_patch: Found entitlements too small str ref at 0xfbaf30 get_amfi_out_of_my_way_patch: Patching AMFI at 0xfb5df8 Kernel: Adding tbypassFirmwareValidate patch... bypassFirmwareValidate: Entering ... bypassFirmwareValidate: Found "trust evaluation succeeded" str loc at 0x94ffcd bypassFirmwareValidate: Found "wrapped Image4 payload" xref at 0x1088a04 bypassFirmwareValidate: Patching "wrapped Image4 payload" at 0x10889e4 main: Writing out patched file to work/krnl.patched... main: Quitting... Reading work/krnl.patched... Compressing payload using LZSS... IM4P outputted to: work/krnl.im4p dtre rdsk [*] Patching the restored_external and asr, and saving them into the ramdisk ... getting get_asr_patch() [*] Image failed signature verification string at 0x4072c [*] Image passed signature verification string at 0x40708 [*] xref to Image failed signature verification string at 0x243f0 [*] Assembling arm64 branch [*] Writing out patched file to work/patched_asr file size: 1015968 getting get_skip_sealing_patch() [*] Skipping sealing system volume string at 0xaa709 [*] Skipping sealing system volume xref at 0x31b74 [*] Skipping sealing system volume branch to xref at 0x31b14 [*] Assembling arm64 branch [*] Writing out patched file to work/patched_restored_external Reading work/ramdisk.dmg... IM4P outputted to: work/rdsk.im4p 'work/devicetree.img4' -> 'boot/iPhone9,3/devicetree.img4' 'work/iBEC.img4' -> 'boot/iPhone9,3/iBEC.img4' 'work/iBSS.img4' -> 'boot/iPhone9,3/iBSS.img4' 'work/kernelcache.img4' -> 'boot/iPhone9,3/kernelcache.img4' 'work/trustcache.img4' -> 'boot/iPhone9,3/trustcache.img4' [*] Sucess Patching the boot files [*] Executing wikiproxy.py in order to fix key issue INFO: Started server process [5234] INFO: Waiting for application startup. INFO: Application startup complete. --- Logging error --- Traceback (most recent call last): File "/usr/lib/python3.10/logging/__init__.py", line 1100, in emit msg = self.format(record) File "/usr/lib/python3.10/logging/__init__.py", line 943, in format return fmt.format(record) File "/usr/lib/python3.10/logging/__init__.py", line 678, in format record.message = record.getMessage() File "/usr/lib/python3.10/logging/__init__.py", line 368, in getMessage msg = msg % self.args TypeError: %d format: a real number is required, not str Call stack: File "/home/mateo/downr1n/wikiproxy.py", line 181, in <module> uvicorn.run(app='__main__:app', host='127.0.0.1', port='8888') File "/usr/local/lib/python3.10/dist-packages/uvicorn/main.py", line 587, in run server.run() File "/usr/local/lib/python3.10/dist-packages/uvicorn/server.py", line 61, in run return asyncio.run(self.serve(sockets=sockets)) File "/usr/lib/python3.10/asyncio/runners.py", line 44, in run return loop.run_until_complete(main) File "/usr/lib/python3.10/asyncio/base_events.py", line 633, in run_until_complete self.run_forever() File "/usr/lib/python3.10/asyncio/base_events.py", line 600, in run_forever self._run_once() File "/usr/lib/python3.10/asyncio/base_events.py", line 1896, in _run_once handle._run() File "/usr/lib/python3.10/asyncio/events.py", line 80, in _run self._context.run(self._callback, *self._args) File "/usr/local/lib/python3.10/dist-packages/uvicorn/server.py", line 78, in serve await self.startup(sockets=sockets) File "/usr/local/lib/python3.10/dist-packages/uvicorn/server.py", line 177, in startup self._log_started_message(listeners) File "/usr/local/lib/python3.10/dist-packages/uvicorn/server.py", line 218, in _log_started_message logger.info( Message: 'Uvicorn running on %s://%s:%d (Press CTRL+C to quit)' Arguments: ('http', '127.0.0.1', '8888')
After that, I have to run the script with the --boot argument?
And yes the Kernel15Patcher.ios path error is fixed. Thx!
After --boot:
alright thank you, now git pull, and after that try to do it again but remember execute wikiproxy.py doing this command: python3 wikiproxy.py
hmmm
Found the USB handle.
[==================================================] 100.0%
[*] Executing futurerestore ...
===================================================================================================
# WARNING: Starting 'futurerestore' command !
---------------------------------------------------------------------------------------------------
If futurerestore FAILS, Run './downr1n.sh --downgrade' to try again.
---------------------------------------------------------------------------------------------------
If futurerestore SUCCEEDS, Run './downr1n.sh --boot' to boot device.
---------------------------------------------------------------------------------------------------
===================================================================================================
Press ENTER to continue <-
Version: v2.0.0-test(50e1b49d4e3b7896f7668644345c664beaaeb063-305)
img4tool version: 0.197-aca6cf005c94caf135023263cbb5c61a0081804f-RELEASE
libipatcher version: 0.88-1e855d70c84419014e363bdbcaead7b145fe3e1f-RELEASE
Odysseus for 32-bit support: yes
Odysseus for 64-bit support: yes
Checking for updates...
Futurerestore is up to date!
futurerestore: failed with exception:
[exception]:
what=can't init, no device found
code=20840493
line=318
file=/tmp/Builder/repos/futurerestore/src/main.cpp
commit count=305
commit sha =50e1b49d4e3b7896f7668644345c664beaaeb063
if nothing works just try to run (with sudo or without) this command: /home/mateo/downr1n/binaries/Linux/futurerestore -t blobs/iPhone9,3-15.7.7.shsh2 --use-pwndfu --skip-blob --rdsk work/rdsk.im4p --rkrn work/krnl.im4p --latest-sep --latest-baseband ipsw/iPhone_4.7_P3_14.5.1_18E212_Restore.ipsw
if futurerestore restore sucess, you can boot using --boot
^C
root@linux:/home/mateo/downr1n# /home/mateo/downr1n/binaries/Linux/futurerestore -t blobs/iPhone9,3-15.7.7.shsh2 --use-pwndfu --skip-blob --rdsk work/rdsk.im4p --rkrn work/krnl.im4p --latest-sep --latest-baseband ipsw/iPhone_4.7_P3_14.5.1_18E212_Restore.ipsw
Version: v2.0.0-test(50e1b49d4e3b7896f7668644345c664beaaeb063-305)
img4tool version: 0.197-aca6cf005c94caf135023263cbb5c61a0081804f-RELEASE
libipatcher version: 0.88-1e855d70c84419014e363bdbcaead7b145fe3e1f-RELEASE
Odysseus for 32-bit support: yes
Odysseus for 64-bit support: yes
Checking for updates...
Futurerestore is up to date!
[INFO] 64-bit device detected
futurerestore init done
reading signing ticket blobs/iPhone9,3-15.7.7.shsh2 is done
User specified to use latest signed SEP
Cached /tmp/futurerestore/sep.im4p not found, downloading a new one.
Downloading SEP
100 [===================================================================================================>]
Checking if SEP is being signed...
Sending TSS request attempt 1... response successfully received
SEP is being signed!
User specified to use latest signed baseband
Downloading Baseband
100 [===================================================================================================>]
Checking if Baseband is being signed...
Sending TSS request attempt 1... response successfully received
Baseband is being signed!
Downloading the latest firmware components...
Finished downloading the latest firmware components!
Found device in DFU mode
requesting to get into pwnRecovery later
Found device in DFU mode
Identified device as d101ap, iPhone9,3
Extracting BuildManifest from iPSW
Product version: 14.5.1
Product build: 18E212 Major: 18
Device supports Image4: true
checking if the APTicket is valid for this restore...
Verified ECID in APTicket matches the device's ECID
checking if the APTicket is valid for this restore...
Verified ECID in APTicket matches the device's ECID
[IMG4TOOL] checking buildidentity 0:
[IMG4TOOL] checking buildidentity matches board ... YES
[IMG4TOOL] checking buildidentity has all required hashes:
[IMG4TOOL] checking hash for "AOP" OK (untrusted)
[IMG4TOOL] checking hash for "Ap,SystemVolumeCanonicalMetadata"BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "AppleLogo" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "BasebandFirmware" IGN (no digest in BuildManifest)
[IMG4TOOL] checking hash for "BatteryCharging0" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "BatteryCharging1" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "BatteryFull" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "BatteryLow0" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "BatteryLow1" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "BatteryPlugin" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "DeviceTree" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "Homer" OK (untrusted)
[IMG4TOOL] checking hash for "KernelCache" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "LLB" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "Liquid" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "OS" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "RecoveryMode" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "RestoreDeviceTree" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "RestoreKernelCache" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "RestoreLogo" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "RestoreRamDisk" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "RestoreSEP" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "RestoreTrustCache" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "SEP" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "StaticTrustCache" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "SystemVolume" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "ftap" IGN (no digest in BuildManifest)
[IMG4TOOL] checking hash for "ftsp" IGN (no digest in BuildManifest)
[IMG4TOOL] checking hash for "iBEC" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "iBSS" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "iBoot" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "rfta" IGN (no digest in BuildManifest)
[IMG4TOOL] checking hash for "rfts" IGN (no digest in BuildManifest)
failed verification with error:
[exception]:
what=verification failed!
code=84279308
line=1286
file=img4tool.cpp
commit count=197
commit sha =aca6cf005c94caf135023263cbb5c61a0081804f
[IMG4TOOL] checking buildidentity 1:
[IMG4TOOL] checking buildidentity matches board ... NO
[IMG4TOOL] checking buildidentity 2:
[IMG4TOOL] checking buildidentity matches board ... NO
[IMG4TOOL] checking buildidentity 3:
[IMG4TOOL] checking buildidentity matches board ... NO
[IMG4TOOL] checking buildidentity 4:
[IMG4TOOL] checking buildidentity matches board ... YES
[IMG4TOOL] checking buildidentity has all required hashes:
[IMG4TOOL] checking hash for "AOP" OK (untrusted)
[IMG4TOOL] checking hash for "Ap,SystemVolumeCanonicalMetadata"BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "AppleLogo" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "BasebandFirmware" IGN (no digest in BuildManifest)
[IMG4TOOL] checking hash for "BatteryCharging0" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "BatteryCharging1" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "BatteryFull" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "BatteryLow0" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "BatteryLow1" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "BatteryPlugin" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "DeviceTree" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "Homer" OK (untrusted)
[IMG4TOOL] checking hash for "KernelCache" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "LLB" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "Liquid" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "OS" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "RecoveryMode" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "RestoreDeviceTree" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "RestoreKernelCache" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "RestoreLogo" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "RestoreRamDisk" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "RestoreSEP" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "RestoreTrustCache" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "SEP" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "StaticTrustCache" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "SystemVolume" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "ftap" IGN (no digest in BuildManifest)
[IMG4TOOL] checking hash for "ftsp" IGN (no digest in BuildManifest)
[IMG4TOOL] checking hash for "iBEC" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "iBSS" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "iBoot" BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "rfta" IGN (no digest in BuildManifest)
[IMG4TOOL] checking hash for "rfts" IGN (no digest in BuildManifest)
failed verification with error:
[exception]:
what=verification failed!
code=84279308
line=1286
file=img4tool.cpp
commit count=197
commit sha =aca6cf005c94caf135023263cbb5c61a0081804f
[IMG4TOOL] checking buildidentity 5:
[IMG4TOOL] checking buildidentity matches board ... NO
[IMG4TOOL] checking buildidentity 6:
[IMG4TOOL] checking buildidentity matches board ... NO
[IMG4TOOL] checking buildidentity 7:
[IMG4TOOL] checking buildidentity matches board ... NO
[WARNING] NOT VALIDATING SHSH BLOBS IM4M!
[Error] BuildIdentity selected for restore does not match APTicket
BuildIdentity selected for restore:
BuildNumber : 18E212
BuildTrain : AzulE
DeviceClass : d101ap
FDRSupport : YES
MobileDeviceMinVersion : 1253.100.1
RestoreBehavior : Erase
Variant : Customer Erase Install (IPSW)
BuildIdentity is valid for the APTicket:
IM4M is not valid for any restore within the Buildmanifest
This APTicket can't be used for restoring this firmware
[WARNING] NOT VALIDATING SHSH BLOBS!
Variant: Customer Erase Install (IPSW)
This restore will erase all device data.
Device found in DFU Mode.
Getting firmware keys for: d101ap
Patching iBSS
Extracting iBSS.d10.RELEASE.im4p (Firmware/dfu/iBSS.d10.RELEASE.im4p)...
payload decrypted
iBoot64Patch: Staring iBoot64Patch!
iOS 14 iBoot detected!
iBoot64Patch: Inited ibootpatchfinder64!
iBoot64Patch: Added sigpatches!
iBoot64Patch: Added unlock nvram patch!
iBoot64Patch: Added freshnonce patch!
iBoot64Patch: has_kernel_load is false!
iBoot64Patch: Applying patch=0x1800c2d88 : 000080d2
iBoot64Patch: Applying patch=0x1800c2ddc : 000080d2
iBoot64Patch: Applying patch=0x1800b38c8 : 000080d2c0035fd6
iBoot64Patch: Applying patch=0x1800b3918 : 000080d2c0035fd6
iBoot64Patch: Applying patch=0x1800f0d2c : 000080d2c0035fd6
iBoot64Patch: Applying patch=0x1800c8a14 : 1f2003d5
iBoot64Patch: Patches applied!
Patching iBEC
Extracting iBEC.d10.RELEASE.im4p (Firmware/dfu/iBEC.d10.RELEASE.im4p)...
payload decrypted
iBoot64Patch: Staring iBoot64Patch!
iOS 14 iBoot detected!
iBoot64Patch: Inited ibootpatchfinder64!
iBoot64Patch: Added sigpatches!
iBoot64Patch: Added unlock nvram patch!
iBoot64Patch: Added freshnonce patch!
iBoot64Patch: has_kernel_load is true!
iBoot64Patch: Added debugenabled patch!
iBoot64Patch: Added bootarg patch!
iBoot64Patch: Applying patch=0x1800c2d88 : 000080d2
iBoot64Patch: Applying patch=0x1800c2ddc : 000080d2
iBoot64Patch: Applying patch=0x1800b38c8 : 000080d2c0035fd6
iBoot64Patch: Applying patch=0x1800b3918 : 000080d2c0035fd6
iBoot64Patch: Applying patch=0x1800f0d2c : 000080d2c0035fd6
iBoot64Patch: Applying patch=0x1800c8a14 : 1f2003d5
iBoot64Patch: Applying patch=0x1800c4758 : 200080d2
iBoot64Patch: Applying patch=0x1800c5d38 : f96d3230
iBoot64Patch: Applying patch=0x18012aaf5 : 72643d6d6430206e616e642d656e61626c652d7265666f726d61743d307831202d76202d726573746f72652064656275673d30783230313465206b65657073796d733d30783120616d66693d3078666620616d66695f616c6c6f775f616e795f7369676e61747572653d30783120616d66695f6765745f6f75745f6f665f6d795f7761793d3078312063735f656e666f7263656d656e745f64697361626c653d30783100
iBoot64Patch: Patches applied!
Repacking patched iBSS as IMG4
Repacking patched iBEC as IMG4
Sending iBSS (522642 bytes)...
[==================================================] 100.0%
Booting iBSS, waiting for device to disconnect...
Booting iBSS, waiting for device to reconnect...
ApNonce pre-hax:
INFO: device serial number is DX3VT8PWHG7F
Getting ApNonce in recovery mode... b9 8a 30 67 8b 48 b5 f6 91 80 50 74 2e ea 2d 43 07 05 a0 3e 74 64 ce 27 38 3c fc ee cd 71 22 2d
Sending iBEC (522642 bytes)...
[==================================================] 100.0%
Booting iBEC, waiting for device to disconnect...
Booting iBEC, waiting for device to reconnect...
APNonce from device already matches IM4M nonce, no need for extra hax...
Successfully set nonce generator: 0xf9d6340a17a0a90d
Extracting filesystem from iPSW
Erreur de segmentation (core dumped)
Can you add me on discord? mateo.08c
Thx!
download the ipsw again
Can you add me on discord? mateo.08c
Thx!
i couldn't find you
mateo.08c or Matéo#4551 or Mateo#4551
Nah no aperece nj verga
Nah no aperece nj verga
In english ?
Nah no aperece nj verga
In english ?
🤣🤣 I was thinking that you know Spanish because your name. Btw I couldn't find you so I give up just tell me here what's the problem and did you try to re download the ipsw?
Nah no aperece nj verga
In english ?
🤣🤣 I was thinking that you know Spanish because your name. Btw I couldn't find you so I give up just tell me here what's the problem and did you try to re download the ipsw?
I'am French 😂. In fact I want to bypass icloud (owner login). I tested several script but most of them don't work in IOS 15.7.7
So I'm looking for a way to downgrade to try again. I may be wrong that's why I'm looking for help to be better guided 🫡.
download the ipsw again
New IPSW file and MD5 is okay.
Video capture: https://streamable.com/e0xgci
Try the future restore command with sudo
download the ipsw again
New IPSW file and MD5 is okay. Video capture: https://streamable.com/e0xgci
Try the future restore command with sudo
iBoot64Patch: Patches applied!
Repacking patched iBSS as IMG4
Repacking patched iBEC as IMG4
Sending iBSS (522514 bytes)...
[==================================================] 100.0%
Booting iBSS, waiting for device to disconnect...
Booting iBSS, waiting for device to reconnect...
ApNonce pre-hax:
INFO: device serial number is DX3VT8PWHG7F
Getting ApNonce in recovery mode... b9 8a 30 67 8b 48 b5 f6 91 80 50 74 2e ea 2d 43 07 05 a0 3e 74 64 ce 27 38 3c fc ee cd 71 22 2d
Sending iBEC (522514 bytes)...
[==================================================] 100.0%
Booting iBEC, waiting for device to disconnect...
Booting iBEC, waiting for device to reconnect...
APNonce from device already matches IM4M nonce, no need for extra hax...
Successfully set nonce generator: 0xf9d6340a17a0a90d
Extracting filesystem from iPSW
Erreur de segmentation
root@linux:/home/mateo/downr1n#
in syslog :
Jul 19 03:26:17 linux mtp-probe: checking bus 3, device 57: "/sys/devices/pci0000:00/0000:00:14.0/usb3/3-4"
Jul 19 03:26:17 linux mtp-probe: bus: 3, device: 57 was not an MTP device
Jul 19 03:26:17 linux mtp-probe: checking bus 3, device 57: "/sys/devices/pci0000:00/0000:00:14.0/usb3/3-4"
Jul 19 03:26:17 linux mtp-probe: bus: 3, device: 57 was not an MTP device
Jul 19 03:26:19 linux kernel: [ 6048.403688] futurerestore[62635]: segfault at ffffffffffffffc0 ip 00007ffba64baa64 sp 00007ffd98ce9368 error 5 in libc.so.6[7ffba6428000+195000]
Jul 19 03:26:19 linux kernel: [ 6048.403703] Code: c1 e1 20 48 09 ca 48 89 f9 48 31 c1 48 83 e0 c0 48 d3 fa 48 85 d2 74 7e 48 0f bc c2 c3 66 0f 1f 84 00 00 00 00 00 48 83 e0 c0 <66> 0f 74 00 66 0f 74 48 10 66 0f 74 50 20 66 0f 74 58 30 66 0f d7
any idea ?
any idea ?
sorry bro, i don't have any idea. try to use another system like linux or if you are using linux try to use macos
Iphone 7 (GSM) IOS 15.7.7 iCloud Owner Locked