Coder Social home page Coder Social logo

Comments (20)

edwin170 avatar edwin170 commented on June 15, 2024 1

Can you add me on discord? mateo.08c

Thx!

i couldn't find you

from downr1n.

mateo08c avatar mateo08c commented on June 15, 2024 1

download the ipsw again

New IPSW file and MD5 is okay.

Video capture: https://streamable.com/e0xgci

index

from downr1n.

edwin170 avatar edwin170 commented on June 15, 2024 1

any idea ?

sorry bro, i don't have any idea. try to use another system like linux or if you are using linux try to use macos

from downr1n.

edwin170 avatar edwin170 commented on June 15, 2024

please git pull, and try again

from downr1n.

mateo08c avatar mateo08c commented on June 15, 2024
[==================================================] 100.0%
[==================================================] 100.0%
[*] Waiting for the ramdisk to finish booting
libusb: warning [op_get_configuration] device unconfigured
libusb: error [op_get_active_config_descriptor] device unconfigured
[17:35:27.071][3] Could not get old configuration descriptor for device 3-11: LIBUSB_ERROR_NOT_FOUND
[17:35:27.093][3] Connecting to new device on location 0x3000b as ID 2
[17:35:27.174][3] Connected to v2.0 device 2 on location 0x3000b with serial number ramdisk tool Sep 18 2022 20:14:43
[17:35:27.175][2] device_control_input: Got unhandled payload type 5
[17:35:27.280][2] device_control_input: Got unhandled payload type 5
Error connecting to device: No error information
seputil: Gigalocker file (/mnt7/61356D0D-CA84-501B-B517-90171B8E3E3B.gl) exists
seputil: Gigalocker initialization completed
sepi digest (48 bytes): 6cd78b731e8b1477a59d42c31620bca9d4690ebbe2b0749beaa4bce6c013cf8497a8451ece840b98f0a5b7a285e87fb7
sepi nonce (20 bytes): 3e4e655722b021817f7e1313026586371dddfd6e
rsep digest (48 bytes): 3bd977b45548330b94b9ce693f08911e29be962cfa213e6307ebd2075ecc6d02f615ac00b0f4bb0c9904d658994f26de
rsep nonce (20 bytes): 3e4e655722b021817f7e1313026586371dddfd6e
img4tool version: 0.197-aca6cf005c94caf135023263cbb5c61a0081804f-RELEASE
Compiled with plist: YES
Saved IM4M to work/IM4M
Dumpped SHSH
[*] Patching kernel ...
Reading work/kernelcache...
[NOTE] Image4 payload data is LZFSE compressed, decompressing...
Extracted Image4 payload data to: work/kcache.raw
sending incremental file list
kcache.raw

sent 14.891.064 bytes  received 35 bytes  5.956.439,60 bytes/sec
total size is 40.108.060  speedup is 2,69
sending incremental file list
Kernel15Patcher.ios

sent 35.598 bytes  received 35 bytes  71.266,00 bytes/sec
total size is 128.736  speedup is 3,61
./downr1n.sh: ligne 787 : [: trop d'arguments
receiving incremental file list
kcache.patched

sent 43 bytes  received 14.891.140 bytes  4.254.623,71 bytes/sec
total size is 40.108.032  speedup is 2,69

from downr1n.

edwin170 avatar edwin170 commented on June 15, 2024
[==================================================] 100.0%
[==================================================] 100.0%
[*] Waiting for the ramdisk to finish booting
libusb: warning [op_get_configuration] device unconfigured
libusb: error [op_get_active_config_descriptor] device unconfigured
[17:35:27.071][3] Could not get old configuration descriptor for device 3-11: LIBUSB_ERROR_NOT_FOUND
[17:35:27.093][3] Connecting to new device on location 0x3000b as ID 2
[17:35:27.174][3] Connected to v2.0 device 2 on location 0x3000b with serial number ramdisk tool Sep 18 2022 20:14:43
[17:35:27.175][2] device_control_input: Got unhandled payload type 5
[17:35:27.280][2] device_control_input: Got unhandled payload type 5
Error connecting to device: No error information
seputil: Gigalocker file (/mnt7/61356D0D-CA84-501B-B517-90171B8E3E3B.gl) exists
seputil: Gigalocker initialization completed
sepi digest (48 bytes): 6cd78b731e8b1477a59d42c31620bca9d4690ebbe2b0749beaa4bce6c013cf8497a8451ece840b98f0a5b7a285e87fb7
sepi nonce (20 bytes): 3e4e655722b021817f7e1313026586371dddfd6e
rsep digest (48 bytes): 3bd977b45548330b94b9ce693f08911e29be962cfa213e6307ebd2075ecc6d02f615ac00b0f4bb0c9904d658994f26de
rsep nonce (20 bytes): 3e4e655722b021817f7e1313026586371dddfd6e
img4tool version: 0.197-aca6cf005c94caf135023263cbb5c61a0081804f-RELEASE
Compiled with plist: YES
Saved IM4M to work/IM4M
Dumpped SHSH
[*] Patching kernel ...
Reading work/kernelcache...
[NOTE] Image4 payload data is LZFSE compressed, decompressing...
Extracted Image4 payload data to: work/kcache.raw
sending incremental file list
kcache.raw

sent 14.891.064 bytes  received 35 bytes  5.956.439,60 bytes/sec
total size is 40.108.060  speedup is 2,69
sending incremental file list
Kernel15Patcher.ios

sent 35.598 bytes  received 35 bytes  71.266,00 bytes/sec
total size is 128.736  speedup is 3,61
./downr1n.sh: ligne 787 : [: trop d'arguments
receiving incremental file list
kcache.patched

sent 43 bytes  received 14.891.140 bytes  4.254.623,71 bytes/sec
total size is 40.108.032  speedup is 2,69

i don't see problems, it looks like well, just click enter i think your device is in recovery mode

from downr1n.

mateo08c avatar mateo08c commented on June 15, 2024

Wikiproxy error:

./downr1n.sh: ligne 787 : [: trop d'arguments
receiving incremental file list
kcache.patched

sent 43 bytes  received 15.353.123 bytes  4.386.618,86 bytes/sec
total size is 41.402.368  speedup is 2,70
[18:12:26.728][3] Removed device 2 on location 0x3000c
[*] To get into DFU mode, you will be guided through 2 steps:
[*] Press any key when ready for DFU mode
Get ready (0)
Release side button, but keep holding volume down (9)
Release side button, but keep holding volume down (2)
[*] Device entered DFU!
[* ]Patchimg some boot files...
trst
[*] Finished moving the boot files to work
usb_timeout: 5
[libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8010
Found the USB handle.
Stage: RESET
ret: true
[libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8010
Found the USB handle.
Stage: SPRAY
ret: true
[libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8010
Found the USB handle.
Stage: SETUP
ret: true
[libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8010
Found the USB handle.
Stage: PATCH
ret: true
[libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8010
Found the USB handle.
Now you can boot untrusted images.
[libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
Found the USB handle.
Version: 7fd877ee7d57a91d2506155752077aad51f896aa-39
main: Starting...
iOS 14 iBoot detected!
getting get_debug_enabled_patch() patch
getting get_sigcheck_patch() patch
applying patch=0x1800c2d88 : 000080d2
applying patch=0x1800c2ddc : 000080d2
applying patch=0x1800c4758 : 200080d2
main: Writing out patched file to work/iBSS.patched...
main: Quitting...
none
usb_timeout: 5
[libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8010
Found the USB handle.
Now you can boot untrusted images.
[libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
Found the USB handle.
Version: 7fd877ee7d57a91d2506155752077aad51f896aa-39
main: Starting...
iOS 14 iBoot detected!
getting get_boot_arg_patch(-v wdt=-1 ) patch
getting get_debug_enabled_patch() patch
getting get_unlock_nvram_patch() patch
getting get_sigcheck_patch() patch
applying patch=0x1800c2d88 : 000080d2
applying patch=0x1800c2ddc : 000080d2
applying patch=0x1800b38c8 : 000080d2c0035fd6
applying patch=0x1800b3918 : 000080d2c0035fd6
applying patch=0x1800f0d2c : 000080d2c0035fd6
applying patch=0x1800c4758 : 200080d2
applying patch=0x1800c5d38 : f96d3230
applying patch=0x18012aaf5 : 2d76207764743d2d312000
applying patch=0x1800c8a14 : 1f2003d5
main: Writing out patched file to work/iBEC.patched...
main: Quitting...
none
main: Starting...
Kernel: Adding AMFI_get_out_of_my_way patch...
get_amfi_out_of_my_way_patch: Entering ...
get_amfi_out_of_my_way_patch: Kernel-7195 inputted
get_amfi_out_of_my_way_patch: Found entitlements too small str loc at 0x8fd5f8
get_amfi_out_of_my_way_patch: Found entitlements too small str ref at 0xfbaf30
get_amfi_out_of_my_way_patch: Patching AMFI at 0xfb5df8
Kernel: Adding root volume seal is broken patch...
get_root_volume_seal_is_broken_patch: Entering ...
get_root_volume_seal_is_broken_patch: Found ""root volume seal is broken %p\n"" str loc at 0xc0c288
get_root_volume_seal_is_broken_patch: Found ""root volume seal is broken %p\n"" xref at 0x1aa8c18
get_root_volume_seal_is_broken_patch: Found tbnz at 0x1aa8bf0
get_root_volume_seal_is_broken_patch: Patching tbnz at 0x1aa8bf0
get_root_volume_seal_is_broken_patch: Patched tbnz at 0x1aa8bf0
Kernel: Adding AppleFirmwareUpdate img4 signature check patch...
get_AppleFirmwareUpdate_img4_signature_check: Entering ...
get_AppleFirmwareUpdate_img4_signature_check: Found "%s::%s() Performing img4 validation outside of workloop" str loc at 0x951f45
get_AppleFirmwareUpdate_img4_signature_check: Found "%s::%s() Performing img4 validation outside of workloop" xref at 0x1093970
get_AppleFirmwareUpdate_img4_signature_check: Patching "%s::%s() Performing img4 validation outside of workloop" at 0x109397c

main: Writing out patched file to work/kcache.patchedB...
main: Quitting...
Reading work/kcache.patchedB...
Compressing payload using LZSS...
IM4P outputted to: work/kcache.im4p
Reading work/kcache.im4p...
Reading work/IM4M...
Creating Image4...
Image4 file outputted to: work/kernelcache.img4
Reading ipsw/extracted/kernelcache.release.iphone9...
[NOTE] Image4 payload data is LZFSE compressed, decompressing...
Extracted Image4 payload data to: work/kcache.dec
main: Starting...
main: Detected fat macho kernel
Kernel: Adding AMFI_get_out_of_my_way patch...
get_amfi_out_of_my_way_patch: Entering ...
get_amfi_out_of_my_way_patch: Kernel-7195 inputted
get_amfi_out_of_my_way_patch: Found entitlements too small str loc at 0x8fd5f8
get_amfi_out_of_my_way_patch: Found entitlements too small str ref at 0xfbaf30
get_amfi_out_of_my_way_patch: Patching AMFI at 0xfb5df8
Kernel: Adding tbypassFirmwareValidate patch...
bypassFirmwareValidate: Entering ...
bypassFirmwareValidate: Found "trust evaluation succeeded" str loc at 0x94ffcd
bypassFirmwareValidate: Found "wrapped Image4 payload" xref at 0x1088a04
bypassFirmwareValidate: Patching "wrapped Image4 payload" at 0x10889e4

main: Writing out patched file to work/krnl.patched...
main: Quitting...
Reading work/krnl.patched...
Compressing payload using LZSS...
IM4P outputted to: work/krnl.im4p
dtre
rdsk
[*] Patching the restored_external and asr, and saving them into the ramdisk ...
getting get_asr_patch()
[*] Image failed signature verification string at 0x4072c
[*] Image passed signature verification string at 0x40708
[*] xref to Image failed signature verification string at 0x243f0
[*] Assembling arm64 branch
[*] Writing out patched file to work/patched_asr
file size: 1015968
getting get_skip_sealing_patch()
[*] Skipping sealing system volume string at 0xaa709
[*] Skipping sealing system volume xref at 0x31b74
[*] Skipping sealing system volume branch to xref at 0x31b14
[*] Assembling arm64 branch
[*] Writing out patched file to work/patched_restored_external
Reading work/ramdisk.dmg...
IM4P outputted to: work/rdsk.im4p
'work/devicetree.img4' -> 'boot/iPhone9,3/devicetree.img4'
'work/iBEC.img4' -> 'boot/iPhone9,3/iBEC.img4'
'work/iBSS.img4' -> 'boot/iPhone9,3/iBSS.img4'
'work/kernelcache.img4' -> 'boot/iPhone9,3/kernelcache.img4'
'work/trustcache.img4' -> 'boot/iPhone9,3/trustcache.img4'
[*] Sucess Patching the boot files
[*] Executing wikiproxy.py in order to fix key issue
INFO:     Started server process [5234]
INFO:     Waiting for application startup.
INFO:     Application startup complete.
--- Logging error ---
Traceback (most recent call last):
  File "/usr/lib/python3.10/logging/__init__.py", line 1100, in emit
    msg = self.format(record)
  File "/usr/lib/python3.10/logging/__init__.py", line 943, in format
    return fmt.format(record)
  File "/usr/lib/python3.10/logging/__init__.py", line 678, in format
    record.message = record.getMessage()
  File "/usr/lib/python3.10/logging/__init__.py", line 368, in getMessage
    msg = msg % self.args
TypeError: %d format: a real number is required, not str
Call stack:
  File "/home/mateo/downr1n/wikiproxy.py", line 181, in <module>
    uvicorn.run(app='__main__:app', host='127.0.0.1', port='8888')
  File "/usr/local/lib/python3.10/dist-packages/uvicorn/main.py", line 587, in run
    server.run()
  File "/usr/local/lib/python3.10/dist-packages/uvicorn/server.py", line 61, in run
    return asyncio.run(self.serve(sockets=sockets))
  File "/usr/lib/python3.10/asyncio/runners.py", line 44, in run
    return loop.run_until_complete(main)
  File "/usr/lib/python3.10/asyncio/base_events.py", line 633, in run_until_complete
    self.run_forever()
  File "/usr/lib/python3.10/asyncio/base_events.py", line 600, in run_forever
    self._run_once()
  File "/usr/lib/python3.10/asyncio/base_events.py", line 1896, in _run_once
    handle._run()
  File "/usr/lib/python3.10/asyncio/events.py", line 80, in _run
    self._context.run(self._callback, *self._args)
  File "/usr/local/lib/python3.10/dist-packages/uvicorn/server.py", line 78, in serve
    await self.startup(sockets=sockets)
  File "/usr/local/lib/python3.10/dist-packages/uvicorn/server.py", line 177, in startup
    self._log_started_message(listeners)
  File "/usr/local/lib/python3.10/dist-packages/uvicorn/server.py", line 218, in _log_started_message
    logger.info(
Message: 'Uvicorn running on %s://%s:%d (Press CTRL+C to quit)'
Arguments: ('http', '127.0.0.1', '8888')

After that, I have to run the script with the --boot argument?

And yes the Kernel15Patcher.ios path error is fixed. Thx!

After --boot:
IMG_20230717_182126

from downr1n.

edwin170 avatar edwin170 commented on June 15, 2024

Wikiproxy error:

./downr1n.sh: ligne 787 : [: trop d'arguments
receiving incremental file list
kcache.patched

sent 43 bytes  received 15.353.123 bytes  4.386.618,86 bytes/sec
total size is 41.402.368  speedup is 2,70
[18:12:26.728][3] Removed device 2 on location 0x3000c
[*] To get into DFU mode, you will be guided through 2 steps:
[*] Press any key when ready for DFU mode
Get ready (0)
Release side button, but keep holding volume down (9)
Release side button, but keep holding volume down (2)
[*] Device entered DFU!
[* ]Patchimg some boot files...
trst
[*] Finished moving the boot files to work
usb_timeout: 5
[libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8010
Found the USB handle.
Stage: RESET
ret: true
[libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8010
Found the USB handle.
Stage: SPRAY
ret: true
[libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8010
Found the USB handle.
Stage: SETUP
ret: true
[libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8010
Found the USB handle.
Stage: PATCH
ret: true
[libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8010
Found the USB handle.
Now you can boot untrusted images.
[libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
Found the USB handle.
Version: 7fd877ee7d57a91d2506155752077aad51f896aa-39
main: Starting...
iOS 14 iBoot detected!
getting get_debug_enabled_patch() patch
getting get_sigcheck_patch() patch
applying patch=0x1800c2d88 : 000080d2
applying patch=0x1800c2ddc : 000080d2
applying patch=0x1800c4758 : 200080d2
main: Writing out patched file to work/iBSS.patched...
main: Quitting...
none
usb_timeout: 5
[libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID: 0x8010
Found the USB handle.
Now you can boot untrusted images.
[libusb] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
Found the USB handle.
Version: 7fd877ee7d57a91d2506155752077aad51f896aa-39
main: Starting...
iOS 14 iBoot detected!
getting get_boot_arg_patch(-v wdt=-1 ) patch
getting get_debug_enabled_patch() patch
getting get_unlock_nvram_patch() patch
getting get_sigcheck_patch() patch
applying patch=0x1800c2d88 : 000080d2
applying patch=0x1800c2ddc : 000080d2
applying patch=0x1800b38c8 : 000080d2c0035fd6
applying patch=0x1800b3918 : 000080d2c0035fd6
applying patch=0x1800f0d2c : 000080d2c0035fd6
applying patch=0x1800c4758 : 200080d2
applying patch=0x1800c5d38 : f96d3230
applying patch=0x18012aaf5 : 2d76207764743d2d312000
applying patch=0x1800c8a14 : 1f2003d5
main: Writing out patched file to work/iBEC.patched...
main: Quitting...
none
main: Starting...
Kernel: Adding AMFI_get_out_of_my_way patch...
get_amfi_out_of_my_way_patch: Entering ...
get_amfi_out_of_my_way_patch: Kernel-7195 inputted
get_amfi_out_of_my_way_patch: Found entitlements too small str loc at 0x8fd5f8
get_amfi_out_of_my_way_patch: Found entitlements too small str ref at 0xfbaf30
get_amfi_out_of_my_way_patch: Patching AMFI at 0xfb5df8
Kernel: Adding root volume seal is broken patch...
get_root_volume_seal_is_broken_patch: Entering ...
get_root_volume_seal_is_broken_patch: Found ""root volume seal is broken %p\n"" str loc at 0xc0c288
get_root_volume_seal_is_broken_patch: Found ""root volume seal is broken %p\n"" xref at 0x1aa8c18
get_root_volume_seal_is_broken_patch: Found tbnz at 0x1aa8bf0
get_root_volume_seal_is_broken_patch: Patching tbnz at 0x1aa8bf0
get_root_volume_seal_is_broken_patch: Patched tbnz at 0x1aa8bf0
Kernel: Adding AppleFirmwareUpdate img4 signature check patch...
get_AppleFirmwareUpdate_img4_signature_check: Entering ...
get_AppleFirmwareUpdate_img4_signature_check: Found "%s::%s() Performing img4 validation outside of workloop" str loc at 0x951f45
get_AppleFirmwareUpdate_img4_signature_check: Found "%s::%s() Performing img4 validation outside of workloop" xref at 0x1093970
get_AppleFirmwareUpdate_img4_signature_check: Patching "%s::%s() Performing img4 validation outside of workloop" at 0x109397c

main: Writing out patched file to work/kcache.patchedB...
main: Quitting...
Reading work/kcache.patchedB...
Compressing payload using LZSS...
IM4P outputted to: work/kcache.im4p
Reading work/kcache.im4p...
Reading work/IM4M...
Creating Image4...
Image4 file outputted to: work/kernelcache.img4
Reading ipsw/extracted/kernelcache.release.iphone9...
[NOTE] Image4 payload data is LZFSE compressed, decompressing...
Extracted Image4 payload data to: work/kcache.dec
main: Starting...
main: Detected fat macho kernel
Kernel: Adding AMFI_get_out_of_my_way patch...
get_amfi_out_of_my_way_patch: Entering ...
get_amfi_out_of_my_way_patch: Kernel-7195 inputted
get_amfi_out_of_my_way_patch: Found entitlements too small str loc at 0x8fd5f8
get_amfi_out_of_my_way_patch: Found entitlements too small str ref at 0xfbaf30
get_amfi_out_of_my_way_patch: Patching AMFI at 0xfb5df8
Kernel: Adding tbypassFirmwareValidate patch...
bypassFirmwareValidate: Entering ...
bypassFirmwareValidate: Found "trust evaluation succeeded" str loc at 0x94ffcd
bypassFirmwareValidate: Found "wrapped Image4 payload" xref at 0x1088a04
bypassFirmwareValidate: Patching "wrapped Image4 payload" at 0x10889e4

main: Writing out patched file to work/krnl.patched...
main: Quitting...
Reading work/krnl.patched...
Compressing payload using LZSS...
IM4P outputted to: work/krnl.im4p
dtre
rdsk
[*] Patching the restored_external and asr, and saving them into the ramdisk ...
getting get_asr_patch()
[*] Image failed signature verification string at 0x4072c
[*] Image passed signature verification string at 0x40708
[*] xref to Image failed signature verification string at 0x243f0
[*] Assembling arm64 branch
[*] Writing out patched file to work/patched_asr
file size: 1015968
getting get_skip_sealing_patch()
[*] Skipping sealing system volume string at 0xaa709
[*] Skipping sealing system volume xref at 0x31b74
[*] Skipping sealing system volume branch to xref at 0x31b14
[*] Assembling arm64 branch
[*] Writing out patched file to work/patched_restored_external
Reading work/ramdisk.dmg...
IM4P outputted to: work/rdsk.im4p
'work/devicetree.img4' -> 'boot/iPhone9,3/devicetree.img4'
'work/iBEC.img4' -> 'boot/iPhone9,3/iBEC.img4'
'work/iBSS.img4' -> 'boot/iPhone9,3/iBSS.img4'
'work/kernelcache.img4' -> 'boot/iPhone9,3/kernelcache.img4'
'work/trustcache.img4' -> 'boot/iPhone9,3/trustcache.img4'
[*] Sucess Patching the boot files
[*] Executing wikiproxy.py in order to fix key issue
INFO:     Started server process [5234]
INFO:     Waiting for application startup.
INFO:     Application startup complete.
--- Logging error ---
Traceback (most recent call last):
  File "/usr/lib/python3.10/logging/__init__.py", line 1100, in emit
    msg = self.format(record)
  File "/usr/lib/python3.10/logging/__init__.py", line 943, in format
    return fmt.format(record)
  File "/usr/lib/python3.10/logging/__init__.py", line 678, in format
    record.message = record.getMessage()
  File "/usr/lib/python3.10/logging/__init__.py", line 368, in getMessage
    msg = msg % self.args
TypeError: %d format: a real number is required, not str
Call stack:
  File "/home/mateo/downr1n/wikiproxy.py", line 181, in <module>
    uvicorn.run(app='__main__:app', host='127.0.0.1', port='8888')
  File "/usr/local/lib/python3.10/dist-packages/uvicorn/main.py", line 587, in run
    server.run()
  File "/usr/local/lib/python3.10/dist-packages/uvicorn/server.py", line 61, in run
    return asyncio.run(self.serve(sockets=sockets))
  File "/usr/lib/python3.10/asyncio/runners.py", line 44, in run
    return loop.run_until_complete(main)
  File "/usr/lib/python3.10/asyncio/base_events.py", line 633, in run_until_complete
    self.run_forever()
  File "/usr/lib/python3.10/asyncio/base_events.py", line 600, in run_forever
    self._run_once()
  File "/usr/lib/python3.10/asyncio/base_events.py", line 1896, in _run_once
    handle._run()
  File "/usr/lib/python3.10/asyncio/events.py", line 80, in _run
    self._context.run(self._callback, *self._args)
  File "/usr/local/lib/python3.10/dist-packages/uvicorn/server.py", line 78, in serve
    await self.startup(sockets=sockets)
  File "/usr/local/lib/python3.10/dist-packages/uvicorn/server.py", line 177, in startup
    self._log_started_message(listeners)
  File "/usr/local/lib/python3.10/dist-packages/uvicorn/server.py", line 218, in _log_started_message
    logger.info(
Message: 'Uvicorn running on %s://%s:%d (Press CTRL+C to quit)'
Arguments: ('http', '127.0.0.1', '8888')

After that, I have to run the script with the --boot argument?

And yes the Kernel15Patcher.ios path error is fixed. Thx!

After --boot: IMG_20230717_182126

alright thank you, now git pull, and after that try to do it again but remember execute wikiproxy.py doing this command: python3 wikiproxy.py

from downr1n.

mateo08c avatar mateo08c commented on June 15, 2024

hmmm

Found the USB handle.
[==================================================] 100.0%
[*] Executing futurerestore ...
===================================================================================================
#                          WARNING: Starting 'futurerestore' command !
---------------------------------------------------------------------------------------------------
If futurerestore FAILS, Run './downr1n.sh --downgrade' to try again.
---------------------------------------------------------------------------------------------------
If futurerestore SUCCEEDS, Run './downr1n.sh --boot' to boot device.
---------------------------------------------------------------------------------------------------
===================================================================================================
Press ENTER to continue <-
Version: v2.0.0-test(50e1b49d4e3b7896f7668644345c664beaaeb063-305)
img4tool version: 0.197-aca6cf005c94caf135023263cbb5c61a0081804f-RELEASE
libipatcher version: 0.88-1e855d70c84419014e363bdbcaead7b145fe3e1f-RELEASE
Odysseus for 32-bit support: yes
Odysseus for 64-bit support: yes
Checking for updates...
Futurerestore is up to date!
futurerestore: failed with exception:
[exception]:
what=can't init, no device found

code=20840493
line=318
file=/tmp/Builder/repos/futurerestore/src/main.cpp
commit count=305
commit sha  =50e1b49d4e3b7896f7668644345c664beaaeb063
if nothing works just try to run (with sudo or without) this command: /home/mateo/downr1n/binaries/Linux/futurerestore -t blobs/iPhone9,3-15.7.7.shsh2 --use-pwndfu --skip-blob --rdsk work/rdsk.im4p --rkrn work/krnl.im4p --latest-sep --latest-baseband ipsw/iPhone_4.7_P3_14.5.1_18E212_Restore.ipsw
if futurerestore restore sucess, you can boot using  --boot
^C
root@linux:/home/mateo/downr1n# /home/mateo/downr1n/binaries/Linux/futurerestore -t blobs/iPhone9,3-15.7.7.shsh2 --use-pwndfu --skip-blob --rdsk work/rdsk.im4p --rkrn work/krnl.im4p --latest-sep --latest-baseband ipsw/iPhone_4.7_P3_14.5.1_18E212_Restore.ipsw
Version: v2.0.0-test(50e1b49d4e3b7896f7668644345c664beaaeb063-305)
img4tool version: 0.197-aca6cf005c94caf135023263cbb5c61a0081804f-RELEASE
libipatcher version: 0.88-1e855d70c84419014e363bdbcaead7b145fe3e1f-RELEASE
Odysseus for 32-bit support: yes
Odysseus for 64-bit support: yes
Checking for updates...
Futurerestore is up to date!
[INFO] 64-bit device detected
futurerestore init done
reading signing ticket blobs/iPhone9,3-15.7.7.shsh2 is done
User specified to use latest signed SEP
Cached /tmp/futurerestore/sep.im4p not found, downloading a new one.
Downloading SEP
100 [===================================================================================================>]
Checking if SEP is being signed...
Sending TSS request attempt 1... response successfully received
SEP is being signed!
User specified to use latest signed baseband
Downloading Baseband
100 [===================================================================================================>]
Checking if Baseband is being signed...
Sending TSS request attempt 1... response successfully received
Baseband is being signed!
Downloading the latest firmware components...
Finished downloading the latest firmware components!
Found device in DFU mode
requesting to get into pwnRecovery later
Found device in DFU mode
Identified device as d101ap, iPhone9,3
Extracting BuildManifest from iPSW
Product version: 14.5.1
Product build: 18E212 Major: 18
Device supports Image4: true
checking if the APTicket is valid for this restore...
Verified ECID in APTicket matches the device's ECID
checking if the APTicket is valid for this restore...
Verified ECID in APTicket matches the device's ECID
[IMG4TOOL] checking buildidentity 0:
[IMG4TOOL] checking buildidentity matches board ... YES
[IMG4TOOL] checking buildidentity has all required hashes:
[IMG4TOOL] checking hash for "AOP"                     OK (untrusted)
[IMG4TOOL] checking hash for "Ap,SystemVolumeCanonicalMetadata"BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "AppleLogo"               BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "BasebandFirmware"        IGN (no digest in BuildManifest)
[IMG4TOOL] checking hash for "BatteryCharging0"        BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "BatteryCharging1"        BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "BatteryFull"             BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "BatteryLow0"             BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "BatteryLow1"             BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "BatteryPlugin"           BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "DeviceTree"              BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "Homer"                   OK (untrusted)
[IMG4TOOL] checking hash for "KernelCache"             BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "LLB"                     BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "Liquid"                  BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "OS"                      BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "RecoveryMode"            BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "RestoreDeviceTree"       BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "RestoreKernelCache"      BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "RestoreLogo"             BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "RestoreRamDisk"          BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "RestoreSEP"              BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "RestoreTrustCache"       BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "SEP"                     BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "StaticTrustCache"        BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "SystemVolume"            BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "ftap"                    IGN (no digest in BuildManifest)
[IMG4TOOL] checking hash for "ftsp"                    IGN (no digest in BuildManifest)
[IMG4TOOL] checking hash for "iBEC"                    BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "iBSS"                    BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "iBoot"                   BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "rfta"                    IGN (no digest in BuildManifest)
[IMG4TOOL] checking hash for "rfts"                    IGN (no digest in BuildManifest)

failed verification with error:
[exception]:
what=verification failed!
code=84279308
line=1286
file=img4tool.cpp
commit count=197
commit sha  =aca6cf005c94caf135023263cbb5c61a0081804f
[IMG4TOOL] checking buildidentity 1:
[IMG4TOOL] checking buildidentity matches board ... NO
[IMG4TOOL] checking buildidentity 2:
[IMG4TOOL] checking buildidentity matches board ... NO
[IMG4TOOL] checking buildidentity 3:
[IMG4TOOL] checking buildidentity matches board ... NO
[IMG4TOOL] checking buildidentity 4:
[IMG4TOOL] checking buildidentity matches board ... YES
[IMG4TOOL] checking buildidentity has all required hashes:
[IMG4TOOL] checking hash for "AOP"                     OK (untrusted)
[IMG4TOOL] checking hash for "Ap,SystemVolumeCanonicalMetadata"BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "AppleLogo"               BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "BasebandFirmware"        IGN (no digest in BuildManifest)
[IMG4TOOL] checking hash for "BatteryCharging0"        BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "BatteryCharging1"        BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "BatteryFull"             BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "BatteryLow0"             BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "BatteryLow1"             BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "BatteryPlugin"           BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "DeviceTree"              BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "Homer"                   OK (untrusted)
[IMG4TOOL] checking hash for "KernelCache"             BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "LLB"                     BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "Liquid"                  BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "OS"                      BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "RecoveryMode"            BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "RestoreDeviceTree"       BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "RestoreKernelCache"      BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "RestoreLogo"             BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "RestoreRamDisk"          BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "RestoreSEP"              BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "RestoreTrustCache"       BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "SEP"                     BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "StaticTrustCache"        BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "SystemVolume"            BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "ftap"                    IGN (no digest in BuildManifest)
[IMG4TOOL] checking hash for "ftsp"                    IGN (no digest in BuildManifest)
[IMG4TOOL] checking hash for "iBEC"                    BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "iBSS"                    BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "iBoot"                   BAD! (hash not found in im4m)
[IMG4TOOL] checking hash for "rfta"                    IGN (no digest in BuildManifest)
[IMG4TOOL] checking hash for "rfts"                    IGN (no digest in BuildManifest)

failed verification with error:
[exception]:
what=verification failed!
code=84279308
line=1286
file=img4tool.cpp
commit count=197
commit sha  =aca6cf005c94caf135023263cbb5c61a0081804f
[IMG4TOOL] checking buildidentity 5:
[IMG4TOOL] checking buildidentity matches board ... NO
[IMG4TOOL] checking buildidentity 6:
[IMG4TOOL] checking buildidentity matches board ... NO
[IMG4TOOL] checking buildidentity 7:
[IMG4TOOL] checking buildidentity matches board ... NO
[WARNING] NOT VALIDATING SHSH BLOBS IM4M!
[Error] BuildIdentity selected for restore does not match APTicket

BuildIdentity selected for restore:
BuildNumber : 18E212
BuildTrain : AzulE
DeviceClass : d101ap
FDRSupport : YES
MobileDeviceMinVersion : 1253.100.1
RestoreBehavior : Erase
Variant : Customer Erase Install (IPSW)

BuildIdentity is valid for the APTicket:
IM4M is not valid for any restore within the Buildmanifest
This APTicket can't be used for restoring this firmware
[WARNING] NOT VALIDATING SHSH BLOBS!
Variant: Customer Erase Install (IPSW)
This restore will erase all device data.
Device found in DFU Mode.
Getting firmware keys for: d101ap
Patching iBSS
Extracting iBSS.d10.RELEASE.im4p (Firmware/dfu/iBSS.d10.RELEASE.im4p)...
payload decrypted
iBoot64Patch: Staring iBoot64Patch!
iOS 14 iBoot detected!
iBoot64Patch: Inited ibootpatchfinder64!
iBoot64Patch: Added sigpatches!
iBoot64Patch: Added unlock nvram patch!
iBoot64Patch: Added freshnonce patch!
iBoot64Patch: has_kernel_load is false!
iBoot64Patch: Applying patch=0x1800c2d88 : 000080d2
iBoot64Patch: Applying patch=0x1800c2ddc : 000080d2
iBoot64Patch: Applying patch=0x1800b38c8 : 000080d2c0035fd6
iBoot64Patch: Applying patch=0x1800b3918 : 000080d2c0035fd6
iBoot64Patch: Applying patch=0x1800f0d2c : 000080d2c0035fd6
iBoot64Patch: Applying patch=0x1800c8a14 : 1f2003d5
iBoot64Patch: Patches applied!
Patching iBEC
Extracting iBEC.d10.RELEASE.im4p (Firmware/dfu/iBEC.d10.RELEASE.im4p)...
payload decrypted
iBoot64Patch: Staring iBoot64Patch!
iOS 14 iBoot detected!
iBoot64Patch: Inited ibootpatchfinder64!
iBoot64Patch: Added sigpatches!
iBoot64Patch: Added unlock nvram patch!
iBoot64Patch: Added freshnonce patch!
iBoot64Patch: has_kernel_load is true!
iBoot64Patch: Added debugenabled patch!
iBoot64Patch: Added bootarg patch!
iBoot64Patch: Applying patch=0x1800c2d88 : 000080d2
iBoot64Patch: Applying patch=0x1800c2ddc : 000080d2
iBoot64Patch: Applying patch=0x1800b38c8 : 000080d2c0035fd6
iBoot64Patch: Applying patch=0x1800b3918 : 000080d2c0035fd6
iBoot64Patch: Applying patch=0x1800f0d2c : 000080d2c0035fd6
iBoot64Patch: Applying patch=0x1800c8a14 : 1f2003d5
iBoot64Patch: Applying patch=0x1800c4758 : 200080d2
iBoot64Patch: Applying patch=0x1800c5d38 : f96d3230
iBoot64Patch: Applying patch=0x18012aaf5 : 72643d6d6430206e616e642d656e61626c652d7265666f726d61743d307831202d76202d726573746f72652064656275673d30783230313465206b65657073796d733d30783120616d66693d3078666620616d66695f616c6c6f775f616e795f7369676e61747572653d30783120616d66695f6765745f6f75745f6f665f6d795f7761793d3078312063735f656e666f7263656d656e745f64697361626c653d30783100
iBoot64Patch: Patches applied!
Repacking patched iBSS as IMG4
Repacking patched iBEC as IMG4
Sending iBSS (522642 bytes)...
[==================================================] 100.0%
Booting iBSS, waiting for device to disconnect...
Booting iBSS, waiting for device to reconnect...
ApNonce pre-hax:
INFO: device serial number is DX3VT8PWHG7F
Getting ApNonce in recovery mode... b9 8a 30 67 8b 48 b5 f6 91 80 50 74 2e ea 2d 43 07 05 a0 3e 74 64 ce 27 38 3c fc ee cd 71 22 2d 
Sending iBEC (522642 bytes)...
[==================================================] 100.0%
Booting iBEC, waiting for device to disconnect...
Booting iBEC, waiting for device to reconnect...
APNonce from device already matches IM4M nonce, no need for extra hax...
Successfully set nonce generator: 0xf9d6340a17a0a90d
Extracting filesystem from iPSW
Erreur de segmentation (core dumped)

from downr1n.

mateo08c avatar mateo08c commented on June 15, 2024

Can you add me on discord? mateo.08c

Thx!

from downr1n.

edwin170 avatar edwin170 commented on June 15, 2024

download the ipsw again

from downr1n.

mateo08c avatar mateo08c commented on June 15, 2024

mateo.08c or Matéo#4551 or Mateo#4551

from downr1n.

dualra1n avatar dualra1n commented on June 15, 2024

Nah no aperece nj verga

from downr1n.

mateo08c avatar mateo08c commented on June 15, 2024

Nah no aperece nj verga

In english ?

from downr1n.

dualra1n avatar dualra1n commented on June 15, 2024

Nah no aperece nj verga

In english ?

🤣🤣 I was thinking that you know Spanish because your name. Btw I couldn't find you so I give up just tell me here what's the problem and did you try to re download the ipsw?

from downr1n.

mateo08c avatar mateo08c commented on June 15, 2024

Nah no aperece nj verga

In english ?

🤣🤣 I was thinking that you know Spanish because your name. Btw I couldn't find you so I give up just tell me here what's the problem and did you try to re download the ipsw?

I'am French 😂. In fact I want to bypass icloud (owner login). I tested several script but most of them don't work in IOS 15.7.7

So I'm looking for a way to downgrade to try again. I may be wrong that's why I'm looking for help to be better guided 🫡.

from downr1n.

dualra1n avatar dualra1n commented on June 15, 2024

download the ipsw again

New IPSW file and MD5 is okay.

Video capture: https://streamable.com/e0xgci

index

Try the future restore command with sudo

from downr1n.

mateo08c avatar mateo08c commented on June 15, 2024

download the ipsw again

New IPSW file and MD5 is okay.
Video capture: https://streamable.com/e0xgci

Try the future restore command with sudo

iBoot64Patch: Patches applied!
Repacking patched iBSS as IMG4
Repacking patched iBEC as IMG4
Sending iBSS (522514 bytes)...
[==================================================] 100.0%
Booting iBSS, waiting for device to disconnect...
Booting iBSS, waiting for device to reconnect...
ApNonce pre-hax:
INFO: device serial number is DX3VT8PWHG7F
Getting ApNonce in recovery mode... b9 8a 30 67 8b 48 b5 f6 91 80 50 74 2e ea 2d 43 07 05 a0 3e 74 64 ce 27 38 3c fc ee cd 71 22 2d 
Sending iBEC (522514 bytes)...
[==================================================] 100.0%
Booting iBEC, waiting for device to disconnect...
Booting iBEC, waiting for device to reconnect...
APNonce from device already matches IM4M nonce, no need for extra hax...
Successfully set nonce generator: 0xf9d6340a17a0a90d
Extracting filesystem from iPSW
Erreur de segmentation
root@linux:/home/mateo/downr1n#

from downr1n.

mateo08c avatar mateo08c commented on June 15, 2024

in syslog :

Jul 19 03:26:17 linux mtp-probe: checking bus 3, device 57: "/sys/devices/pci0000:00/0000:00:14.0/usb3/3-4"
Jul 19 03:26:17 linux mtp-probe: bus: 3, device: 57 was not an MTP device
Jul 19 03:26:17 linux mtp-probe: checking bus 3, device 57: "/sys/devices/pci0000:00/0000:00:14.0/usb3/3-4"
Jul 19 03:26:17 linux mtp-probe: bus: 3, device: 57 was not an MTP device
Jul 19 03:26:19 linux kernel: [ 6048.403688] futurerestore[62635]: segfault at ffffffffffffffc0 ip 00007ffba64baa64 sp 00007ffd98ce9368 error 5 in libc.so.6[7ffba6428000+195000]
Jul 19 03:26:19 linux kernel: [ 6048.403703] Code: c1 e1 20 48 09 ca 48 89 f9 48 31 c1 48 83 e0 c0 48 d3 fa 48 85 d2 74 7e 48 0f bc c2 c3 66 0f 1f 84 00 00 00 00 00 48 83 e0 c0 <66> 0f 74 00 66 0f 74 48 10 66 0f 74 50 20 66 0f 74 58 30 66 0f d7

from downr1n.

mateo08c avatar mateo08c commented on June 15, 2024

any idea ?

from downr1n.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.