jsj2008 / iphone-dataprotection

Automatically exported from code.google.com/p/iphone-dataprotection
0 stars 0 forks source link

PPN devices support #61

Open GoogleCodeExporter opened 9 years ago

GoogleCodeExporter commented 9 years ago
Newer devices use PPN NAND chips. Reading through the 
IOFlashControllerUserClient iOS 5 hack on a 16Gb PPN iPhone 4S gives strange 
results : most of the bootloader area is read incorrectly (except the first 
block), data from the system partition seems to be decrypted (maybe not 
encrypted at all on flash storage).

Then the PPNFTL/PPNVFL layers need to be reversed in order to mount the new FTL 
and access data in the image.

Original issue reported on code.google.com by jean.sig...@gmail.com on 27 Jun 2012 at 3:32

GoogleCodeExporter commented 9 years ago
This issue was updated by revision fb5460f8d7b6.

Original comment by jean.sig...@gmail.com on 2 Apr 2014 at 4:24

GoogleCodeExporter commented 9 years ago
This issue was updated by revision 3d3dda91541a.

handle unencrypted ramdisks/kernel
Update issue 127

Original comment by jean.sig...@gmail.com on 2 Apr 2014 at 4:24

GoogleCodeExporter commented 9 years ago
This issue was updated by revision a6e9f43d2fad.

ioflash: handle iOS 6 pool partitions + ppn slc blocks
try to read page 0 for sanity check
externalMethod.s: save regs + vtable offset for ios6/7

Original comment by jean.sig...@gmail.com on 2 Sep 2014 at 5:10

GoogleCodeExporter commented 9 years ago
This issue was updated by revision 600407425cb7.

PPNFTL bruteforce with SQLite backend

Original comment by jean.sig...@gmail.com on 2 Sep 2014 at 5:10

GoogleCodeExporter commented 9 years ago
This issue was updated by revision 468d7ad1ee21.

A bunch of hacks for PPN support

Original comment by jean.sig...@gmail.com on 2 Sep 2014 at 5:10