Closed frankpanduh closed 1 month ago
If it helps forgot to mention my setup for testing:
OS: macOS 13.6.5 22G621 x86_64 Kernel: 22.6.0 Host: MacMini6,1 (OpenCore Legacy patched to use Ventura) Shell: zsh 5.9 CPU: Intel i5-3210M (4) @ 2.50GHz GPU: Intel HD Graphics 4000 Memory: 8790MiB / 16384MiB
Didn't see any hardware requirement stuff in case I should use a different device. I have a 22.04 buntu' box and a 2019 MBP to test on as well. Using the mac mini for USB-A ports ease of access.
Hi,
Sorry for late respond...
hdiutil: create failed - user interaction required for authorization
This issue are happened when the script are run in normal mode. To solve this you will have to run the script in root mode, try again with this sudo ./sshrd_lite.sh -p iPad6,3 -b 20H320 -g
and this issue will be solved.
[!] Could not find correct xref for _image4_get_partial. [!] RSA PATCH FAILED
This issue are expected to happened since kairos
patcher haven't been updated in while. However If understood correctly what have been written in this report here this error message shouldn't cause you any big problem when using the patched image, furthermore you better test it and If see you are getting any issues while you are trying to boot with it.
I'll be waiting for your updates. Thanks!
Okay tested with sudo:
sudo ./sshrd_lite.sh -p iPad6,3 -b 20H320 -g
Password:
[-] START:iFirmware-Parser
[-] Parsing device info (from firmwares.json)...
[-] Parsing... filenames
[!] Start downloading the ramdisk files...
[!] PZB in Darwin cannot write output to another directory
[-] Moving downloaded files into: 1_prepare_ramdisk
mv: rename ./ to 1_prepare_ramdisk/./: Invalid argument
mv: rename ./ to 1_prepare_ramdisk/./: Invalid argument
mv: rename ./ to 1_prepare_ramdisk/./: Invalid argument
[!] Checking downloaded files...
[!] Download completed !
[-] END:iFirmware-Parser
img4tool version: 0.197-aca6cf005c94caf135023263cbb5c61a0081804f
Compiled with plist: YES
Saved IM4M to 2_ssh_ramdisk/temp_files/shsh.bin
[!] Decrypting with gaster...
[!] Please make sure to put your device into DFU mode
usb_timeout: 5
usb_abort_timeout_min: 0
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8001
Found the USB handle.
Stage: RESET
ret: true
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8001
Found the USB handle.
Stage: SETUP
ret: true
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8001
Found the USB handle.
Stage: SPRAY
ret: true
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8001
Found the USB handle.
Stage: PATCH
ret: true
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8001
Found the USB handle.
Now you can boot untrusted images.
- Copying iboot files to: './'
cp: 1_prepare_ramdisk/ is a directory (not copied).
cp: 1_prepare_ramdisk/ is a directory (not copied).
cp: 1_prepare_ramdisk/ is a directory (not copied).
usb_timeout: 5
usb_abort_timeout_min: 0
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8001
Found the USB handle.
Now you can boot untrusted images.
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
Found the USB handle.
usb_timeout: 5
usb_abort_timeout_min: 0
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8001
Found the USB handle.
Now you can boot untrusted images.
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
Found the USB handle.
usb_timeout: 5
usb_abort_timeout_min: 0
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8001
Found the USB handle.
Now you can boot untrusted images.
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
Found the USB handle.
[-] Patching iBoot files using kairos ...
[+] Patching 2_ssh_ramdisk/temp_files/iBSS.dec
[+] Base address: 0x180000000
[+] Patching out RSA signature check...
[+] Found IMG4 string at 0x323af
[+] Found IMG4 xref at 0xf6d0
[+] Found beginning of _image4_get_partial at 0xf624
[+] Found xref to _image4_get_partial at 0x10074
[+] Found start of sub_18000ffa0
[+] Found ADR X2, 0x180030f70 at 0x104d4
[+] Call to sub_18000f90c
[+] Did MOV r0, #0 and RET
[+] Wrote patched image to 2_ssh_ramdisk/temp_files/iBSS.patched
[+] Patching 2_ssh_ramdisk/temp_files/iBEC.dec
[+] Base address: 0x870000000
[+] Does have kernel load
[+] Patching boot-args...
[+] Image base address at 0x870000000
[+] Found boot-arg string at 0x5ac36
[+] Relocating from 0x870015260...
[+] Found boot-arg xref at 0x8700152c8
[+] Pointing boot-arg xref to large string at: 0x8700242c8
[+] Enabling kernel debug...
[+] Found debug-enabled string at 0x5a5ce
[+] Found debug-enabled xref at 0x13b38
[+] Found second bl after debug-enabled xref at 0x13b4c
[+] Wrote MOVZ X0, #1 to 0x870013b4c
[+] Enabled kernel debug
[+] Patching out RSA signature check...
[+] Found IMG4 string at 0x5a3e1
[+] Found IMG4 xref at 0xd908
[+] Found beginning of _image4_get_partial at 0xd7e8
[!] Could not find correct xref for _image4_get_partial.
[!] RSA PATCH FAILED
[+] Wrote patched image to 2_ssh_ramdisk/temp_files/iBEC.patched
[+] Patching 2_ssh_ramdisk/temp_files/iBoot.dec
[+] Base address: 0x870000000
[+] Does have kernel load
[+] Enabling kernel debug...
[+] Found debug-enabled string at 0x5a5ce
[+] Found debug-enabled xref at 0x13b38
[+] Found second bl after debug-enabled xref at 0x13b4c
[+] Wrote MOVZ X0, #1 to 0x870013b4c
[+] Enabled kernel debug
[+] Patching out RSA signature check...
[+] Found IMG4 string at 0x5a3e1
[+] Found IMG4 xref at 0xd908
[+] Found beginning of _image4_get_partial at 0xd7e8
[!] Could not find correct xref for _image4_get_partial.
[!] RSA PATCH FAILED
[+] Wrote patched image to 2_ssh_ramdisk/temp_files/iBoot.patched
none
none
none
krnl
Starting KPlooshFinder
patch_trustcache_new: Found trustcache
patch_developer_mode: Found developer mode
patch_launch_constraints: Found launch constraints
patch_amfi_sha1: Found AMFI hashtype check
patch_vnode_lookup: Found vnode_lookup
patch_sbops: Found sbops
patch_shellcode_area: Found shellcode area
patch_ret0_gadget: Found ret0 gadget
patch_vnode_getpath: Found vnode_getpath
patch_vnode_getaddr: Found vnode_getattr
patch_vnode_open_close: Found vnode_open/vnode_close
Patching completed successfully.
[-] Searching for kernel differents...
[!] this could take a while please wait...
0x5e20d4 0x48 0xfffffffb
0x5e20d5 0xffffffd9 0xffffffff
0x5e20d7 0xfffffff0 0x17
0x11e5a34 0xffffffff 0x20
0x11e5a35 0xffffffc3 0x0
0x11e5a36 0x0 0xffffff80
0x11e5a37 0xffffffd1 0xffffffd2
0x11e5a38 0xfffffff4 0x42
0x11e5a39 0x4f 0x0
0x11e5a3a 0x1 0x0
0x11e5a3b 0xffffffa9 0xffffffb4
0x11e5a3c 0xfffffffd 0x40
0x11e5a3d 0x7b 0x0
0x11e5a3e 0x2 0x0
0x11e5a3f 0xffffffa9 0xfffffff9
0x11e5a40 0xfffffffd 0xffffffc0
0x11e5a41 0xffffff83 0x3
0x11e5a42 0x0 0x5f
0x11e5a43 0xffffff91 0xffffffd6
0x11e8bb4 0xfffffffc 0x0
0x11e8bb5 0x6f 0x0
0x11e8bb6 0xffffffba 0xffffff80
0x11e8bb7 0xffffffa9 0x52
0x11e8bb8 0xfffffffa 0xffffffc0
0x11e8bb9 0x67 0x3
0x11e8bba 0x1 0x5f
0x11e8bbb 0xffffffa9 0xffffffd6
0x11ef6f9 0x8 0x0
0x11ef6fb 0x71 0x6b
krnl
[-] Patching kernel completed !
dtre
[!] Found trustcache file : 1_prepare_ramdisk/087-86622-021.dmg.trustcache
rtsc
rdsk
/dev/disk2
/dev/disk3 EF57347C-0000-11AA-AA11-0030654
/dev/disk3s1 41504653-0000-11AA-AA11-0030654 /private/tmp/SSHRD
....................................
created: /Users/panduh/Desktop/SSHRD_Script_Lite/2_ssh_ramdisk/temp_files/reassigned_ramdisk.dmg
"disk2" ejected.
/dev/disk2 /private/tmp/SSHRD
"disk2" ejected.
[-] Packing ramdisk into img4 ...
[-] Packing using img4 utility ...
none
none
[-] Cleaning temp directory ...
[!] All Tasks Completed !
[-] To boot this SSHRD please use: ./boot_sshrd.sh
Tested with ./boot_sshrd.sh:
./boot_sshrd.sh
1: ./2_ssh_ramdisk/iPad6,3_j127ap_20H320/
[-] Please select a directory:1
[-] Reading connected device info ...
[!] Please make sure to put your device into DFU mode
[!] Starting SSHRD booting...
[-] Sending iBSS ...
Attempting to connect...
opening device 05ac:1227 @ 0x14300000...
Setting to configuration 1
Setting to interface 0:0
Connected to iPad6,3, model j127ap, cpid 0x8001, bdid 0x08
Unexpected state 8, issuing ABORT
Unable to upload data to device
Attempting to connect...
opening device 05ac:1227 @ 0x14300000...
Setting to configuration 1
Setting to interface 0:0
Connected to iPad6,3, model j127ap, cpid 0x8001, bdid 0x08
[==================================================] 100.0%
Command completed successfully
[-] Sending iBEC ...
Attempting to connect...
opening device 05ac:1227 @ 0x14300000...
Setting to configuration 1
Setting to interface 0:0
Connected to iPad6,3, model j127ap, cpid 0x8001, bdid 0x08
[==================================================] 100.0%
Command completed successfully
Attempting to connect...
opening device 05ac:1281 @ 0x14300000...
Setting to configuration 1
Setting to interface 0:0
Connected to iPad6,3, model j127ap, cpid 0x8001, bdid 0x08
[==================================================] 100.0%
Command completed successfully
Attempting to connect...
opening device 05ac:1281 @ 0x14300000...
Setting to configuration 1
Setting to interface 0:0
Connected to iPad6,3, model j127ap, cpid 0x8001, bdid 0x08
Command completed successfully
[-] Sending ramdisk ...
Attempting to connect...
opening device 05ac:1281 @ 0x14300000...
Setting to configuration 1
Setting to interface 0:0
Connected to iPad6,3, model j127ap, cpid 0x8001, bdid 0x08
[==================================================] 100.0%
Command completed successfully
Attempting to connect...
opening device 05ac:1281 @ 0x14300000...
Setting to configuration 1
Setting to interface 0:0
Connected to iPad6,3, model j127ap, cpid 0x8001, bdid 0x08
Command completed successfully
[-] Sending devicetree ...
Attempting to connect...
opening device 05ac:1281 @ 0x14300000...
Setting to configuration 1
Setting to interface 0:0
Connected to iPad6,3, model j127ap, cpid 0x8001, bdid 0x08
[==================================================] 100.0%
Command completed successfully
Attempting to connect...
opening device 05ac:1281 @ 0x14300000...
Setting to configuration 1
Setting to interface 0:0
Connected to iPad6,3, model j127ap, cpid 0x8001, bdid 0x08
Command completed successfully
[-] Sending trustcache ...
Attempting to connect...
opening device 05ac:1281 @ 0x14300000...
Setting to configuration 1
Setting to interface 0:0
Connected to iPad6,3, model j127ap, cpid 0x8001, bdid 0x08
[==================================================] 100.0%
Command completed successfully
Attempting to connect...
opening device 05ac:1281 @ 0x14300000...
Setting to configuration 1
Setting to interface 0:0
Connected to iPad6,3, model j127ap, cpid 0x8001, bdid 0x08
Command completed successfully
[-] Sending kernelcache ...
Attempting to connect...
opening device 05ac:1281 @ 0x14300000...
Setting to configuration 1
Setting to interface 0:0
Connected to iPad6,3, model j127ap, cpid 0x8001, bdid 0x08
[==================================================] 100.0%
Command completed successfully
Attempting to connect...
opening device 05ac:1281 @ 0x14300000...
Setting to configuration 1
Setting to interface 0:0
Connected to iPad6,3, model j127ap, cpid 0x8001, bdid 0x08
Command completed successfully
[!] SSHRD Booting has completed!
Just can't seem to ssh after.
./sshrd_lite.sh -c
kex_exchange_identification: read: Connection reset by peer
Connection reset by ::1 port 2222
./sshrd_lite.sh: line 67: [: =: unary operator expected
[-] Force closing usbmuxd ...
sudo: systemctl: command not found
sudo: usbmuxd: command not found
[!] SSHRD Booting has completed!
Please make a verbose output are shown in your iPad screen otherwise this would indicate that the sshrd boot has failed.
kex_exchange_identification: read: Connection reset by peer
Please open new terminal windows and try removing the previous auth keys with this command: rm -Rf ./.ssh
sudo: systemctl: command not found sudo: usbmuxd: command not found
You shouldn't seen this message since you are using macOS, I have pushed a commit to fix this mistake.
[!] SSHRD Booting has completed!
Please make a verbose output are shown in your iPad screen otherwise this would indicate that the sshrd boot has failed.
Howdy, Thanks again for your time.
How do I set a verbose output? I didn't see that option.
No output on the screen after ./boot_sshrd to clarify if you meant to verify if there was a verbose output after the "booting has completed!" stage.
Create Log:
sudo ./sshrd_lite.sh -p iPad6,3 -b 20H320 -g
[-] START:iFirmware-Parser
[-] Parsing device info (from firmwares.json)...
[-] Parsing... filenames
[!] Start downloading the ramdisk files...
[!] PZB in Darwin cannot write output to another directory
[-] Moving downloaded files into: 1_prepare_ramdisk
mv: rename ./ to 1_prepare_ramdisk/./: Invalid argument
mv: rename ./ to 1_prepare_ramdisk/./: Invalid argument
mv: rename ./ to 1_prepare_ramdisk/./: Invalid argument
[!] Checking downloaded files...
[!] Download completed !
[-] END:iFirmware-Parser
img4tool version: 0.197-aca6cf005c94caf135023263cbb5c61a0081804f
Compiled with plist: YES
Saved IM4M to 2_ssh_ramdisk/temp_files/shsh.bin
[!] Decrypting with gaster...
[!] Please make sure to put your device into DFU mode
[Hint] If you stuck here then close the script and run it again with sudo
usb_timeout: 5
usb_abort_timeout_min: 0
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8001
Found the USB handle.
Stage: RESET
ret: true
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8001
Found the USB handle.
Stage: SETUP
ret: true
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8001
Found the USB handle.
Stage: SPRAY
ret: true
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8001
Found the USB handle.
Stage: PATCH
ret: true
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8001
Found the USB handle.
Now you can boot untrusted images.
- Copying iboot files to: './'
cp: 1_prepare_ramdisk/ is a directory (not copied).
cp: 1_prepare_ramdisk/ is a directory (not copied).
cp: 1_prepare_ramdisk/ is a directory (not copied).
usb_timeout: 5
usb_abort_timeout_min: 0
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8001
Found the USB handle.
Now you can boot untrusted images.
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
Found the USB handle.
usb_timeout: 5
usb_abort_timeout_min: 0
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8001
Found the USB handle.
Now you can boot untrusted images.
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
Found the USB handle.
usb_timeout: 5
usb_abort_timeout_min: 0
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8001
Found the USB handle.
Now you can boot untrusted images.
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
Found the USB handle.
[-] Patching iBoot files using kairos ...
[+] Patching 2_ssh_ramdisk/temp_files/iBSS.dec
[+] Base address: 0x180000000
[+] Patching out RSA signature check...
[+] Found IMG4 string at 0x323af
[+] Found IMG4 xref at 0xf6d0
[+] Found beginning of _image4_get_partial at 0xf624
[+] Found xref to _image4_get_partial at 0x10074
[+] Found start of sub_18000ffa0
[+] Found ADR X2, 0x180030f70 at 0x104d4
[+] Call to sub_18000f90c
[+] Did MOV r0, #0 and RET
[+] Wrote patched image to 2_ssh_ramdisk/temp_files/iBSS.patched
[+] Patching 2_ssh_ramdisk/temp_files/iBEC.dec
[+] Base address: 0x870000000
[+] Does have kernel load
[+] Patching boot-args...
[+] Image base address at 0x870000000
[+] Found boot-arg string at 0x5ac36
[+] Relocating from 0x870015260...
[+] Found boot-arg xref at 0x8700152c8
[+] Pointing boot-arg xref to large string at: 0x8700242c8
[+] Enabling kernel debug...
[+] Found debug-enabled string at 0x5a5ce
[+] Found debug-enabled xref at 0x13b38
[+] Found second bl after debug-enabled xref at 0x13b4c
[+] Wrote MOVZ X0, #1 to 0x870013b4c
[+] Enabled kernel debug
[+] Patching out RSA signature check...
[+] Found IMG4 string at 0x5a3e1
[+] Found IMG4 xref at 0xd908
[+] Found beginning of _image4_get_partial at 0xd7e8
[!] Could not find correct xref for _image4_get_partial.
[!] RSA PATCH FAILED
[+] Wrote patched image to 2_ssh_ramdisk/temp_files/iBEC.patched
[+] Patching 2_ssh_ramdisk/temp_files/iBoot.dec
[+] Base address: 0x870000000
[+] Does have kernel load
[+] Enabling kernel debug...
[+] Found debug-enabled string at 0x5a5ce
[+] Found debug-enabled xref at 0x13b38
[+] Found second bl after debug-enabled xref at 0x13b4c
[+] Wrote MOVZ X0, #1 to 0x870013b4c
[+] Enabled kernel debug
[+] Patching out RSA signature check...
[+] Found IMG4 string at 0x5a3e1
[+] Found IMG4 xref at 0xd908
[+] Found beginning of _image4_get_partial at 0xd7e8
[!] Could not find correct xref for _image4_get_partial.
[!] RSA PATCH FAILED
[+] Wrote patched image to 2_ssh_ramdisk/temp_files/iBoot.patched
none
none
none
krnl
Starting KPlooshFinder
patch_trustcache_new: Found trustcache
patch_developer_mode: Found developer mode
patch_launch_constraints: Found launch constraints
patch_amfi_sha1: Found AMFI hashtype check
patch_vnode_lookup: Found vnode_lookup
patch_sbops: Found sbops
patch_shellcode_area: Found shellcode area
patch_ret0_gadget: Found ret0 gadget
patch_vnode_getpath: Found vnode_getpath
patch_vnode_getaddr: Found vnode_getattr
patch_vnode_open_close: Found vnode_open/vnode_close
Patching completed successfully.
[-] Searching for kernel differents...
[!] this could take a while please wait...
0x5e20d4 0x48 0xfffffffb
0x5e20d5 0xffffffd9 0xffffffff
0x5e20d7 0xfffffff0 0x17
0x11e5a34 0xffffffff 0x20
0x11e5a35 0xffffffc3 0x0
0x11e5a36 0x0 0xffffff80
0x11e5a37 0xffffffd1 0xffffffd2
0x11e5a38 0xfffffff4 0x42
0x11e5a39 0x4f 0x0
0x11e5a3a 0x1 0x0
0x11e5a3b 0xffffffa9 0xffffffb4
0x11e5a3c 0xfffffffd 0x40
0x11e5a3d 0x7b 0x0
0x11e5a3e 0x2 0x0
0x11e5a3f 0xffffffa9 0xfffffff9
0x11e5a40 0xfffffffd 0xffffffc0
0x11e5a41 0xffffff83 0x3
0x11e5a42 0x0 0x5f
0x11e5a43 0xffffff91 0xffffffd6
0x11e8bb4 0xfffffffc 0x0
0x11e8bb5 0x6f 0x0
0x11e8bb6 0xffffffba 0xffffff80
0x11e8bb7 0xffffffa9 0x52
0x11e8bb8 0xfffffffa 0xffffffc0
0x11e8bb9 0x67 0x3
0x11e8bba 0x1 0x5f
0x11e8bbb 0xffffffa9 0xffffffd6
0x11ef6f9 0x8 0x0
0x11ef6fb 0x71 0x6b
krnl
[-] Patching kernel completed !
dtre
[!] Found trustcache file : 1_prepare_ramdisk/087-86622-021.dmg.trustcache
rtsc
rdsk
/dev/disk2
/dev/disk3 EF57347C-0000-11AA-AA11-0030654
/dev/disk3s1 41504653-0000-11AA-AA11-0030654 /private/tmp/SSHRD
.............................................................
created: /Users/panduh/Desktop/SSHRD_Script_Lite/2_ssh_ramdisk/temp_files/reassigned_ramdisk.dmg
"disk2" ejected.
/dev/disk2 /private/tmp/SSHRD
"disk2" ejected.
[-] Packing ramdisk into img4 ...
[-] Packing using img4 utility ...
none
none
[-] Cleaning temp directory ...
[!] All Tasks Completed !
[-] To boot this SSHRD please use: ./boot_sshrd.sh
Test ./boot_sshrd.sh:
./boot_sshrd.sh -d
1: ./2_ssh_ramdisk/iPad6,3_j127ap_20H320/
[-] Please select a directory:
[-] Reading connected device info ...
[!] Please make sure to put your device into DFU mode
[!] Starting SSHRD booting...
[-] Sending iBSS ...
Attempting to connect...
opening device 05ac:1227 @ 0x14300000...
Setting to configuration 1
Setting to interface 0:0
Connected to iPad6,3, model j127ap, cpid 0x8001, bdid 0x08
Unexpected state 8, issuing ABORT
Unable to upload data to device
Attempting to connect...
opening device 05ac:1227 @ 0x14300000...
Setting to configuration 1
Setting to interface 0:0
Connected to iPad6,3, model j127ap, cpid 0x8001, bdid 0x08
[==================================================] 100.0%
Command completed successfully
[-] Sending iBEC ...
Attempting to connect...
opening device 05ac:1227 @ 0x14300000...
Setting to configuration 1
Setting to interface 0:0
Connected to iPad6,3, model j127ap, cpid 0x8001, bdid 0x08
[==================================================] 100.0%
Command completed successfully
Attempting to connect...
opening device 05ac:1281 @ 0x14300000...
Setting to configuration 1
Setting to interface 0:0
Connected to iPad6,3, model j127ap, cpid 0x8001, bdid 0x08
[==================================================] 100.0%
Command completed successfully
Attempting to connect...
opening device 05ac:1281 @ 0x14300000...
Setting to configuration 1
Setting to interface 0:0
Connected to iPad6,3, model j127ap, cpid 0x8001, bdid 0x08
Command completed successfully
[-] Sending ramdisk ...
Attempting to connect...
opening device 05ac:1281 @ 0x14300000...
Setting to configuration 1
Setting to interface 0:0
Connected to iPad6,3, model j127ap, cpid 0x8001, bdid 0x08
[==================================================] 100.0%
Command completed successfully
Attempting to connect...
opening device 05ac:1281 @ 0x14300000...
Setting to configuration 1
Setting to interface 0:0
Connected to iPad6,3, model j127ap, cpid 0x8001, bdid 0x08
Command completed successfully
[-] Sending devicetree ...
Attempting to connect...
opening device 05ac:1281 @ 0x14300000...
Setting to configuration 1
Setting to interface 0:0
Connected to iPad6,3, model j127ap, cpid 0x8001, bdid 0x08
[==================================================] 100.0%
Command completed successfully
Attempting to connect...
opening device 05ac:1281 @ 0x14300000...
Setting to configuration 1
Setting to interface 0:0
Connected to iPad6,3, model j127ap, cpid 0x8001, bdid 0x08
Command completed successfully
[-] Sending trustcache ...
Attempting to connect...
opening device 05ac:1281 @ 0x14300000...
Setting to configuration 1
Setting to interface 0:0
Connected to iPad6,3, model j127ap, cpid 0x8001, bdid 0x08
[==================================================] 100.0%
Command completed successfully
Attempting to connect...
opening device 05ac:1281 @ 0x14300000...
Setting to configuration 1
Setting to interface 0:0
Connected to iPad6,3, model j127ap, cpid 0x8001, bdid 0x08
Command completed successfully
[-] Sending kernelcache ...
Attempting to connect...
opening device 05ac:1281 @ 0x14300000...
Setting to configuration 1
Setting to interface 0:0
Connected to iPad6,3, model j127ap, cpid 0x8001, bdid 0x08
[==================================================] 100.0%
Command completed successfully
Attempting to connect...
opening device 05ac:1281 @ 0x14300000...
Setting to configuration 1
Setting to interface 0:0
Connected to iPad6,3, model j127ap, cpid 0x8001, bdid 0x08
Command completed successfully
[!] SSHRD Booting has completed!
At this stage: pure black with backlight screen on the ipad, no output text on the screen.
So I tested: ./sshrd_lite.sh -c
SSH test with new commit:
./sshrd_lite.sh -c kex_exchange_identification: read: Connection reset by peer Connection reset by ::1 port 2222
So I would assume since there is no output on the screen after the ./boot_sshrd.sh
stage and manually ssh attempts after testing ./sshrd_lite.sh -c didn't connect. That it didn't create a proper ramdisk? Or do i need to reconfigure something to get it to boot in verbose?
No output on the screen after ./boot_sshrd to clarify if you meant to verify if there was a verbose output after the "booting has completed!" stage.
Opa, I meant to check If verbose output are shown in your ipad screen, e.g see this picture:
At this stage: pure black with backlight screen on the ipad, no output text on the screen
Unfortunately this means boot has failed i.e something are wrong with the ssh ramdisk files.
do i need to reconfigure something to get it to boot in verbose?
Now your only option will be to try make ramdisk for lower ios version. Go to TheAppleWiki page and find the first same major but stable iOS firmware and then try with the exact build version you found.
[!] Could not find correct xref for _image4_get_partial. [!] RSA PATCH FAILED
I would recommend to report this to kairos author, so hopefully this issue will get solved in nearest feature.
@frankpanduh Please try booting with 20B82
build-version and let me know If it's work.
Howdy hope this finds you well, I pulled the latest version to test with this device:
iPad Pro 9.7 (WIFI - 1st Gen) [iPad6,3 / A9X - j127ap]
It looks like the script hit a wall at:
And the HDUtil stage:
Happy to provide more logs and tests if you need be. Thanks in advance for your time!
Full Log: