找回密码
 加入我们

QQ登录

只需一步,快速开始

搜索
查看: 1798|回复: 0

[破解] 11246unlock, good enough for the prize

[复制链接]
发表于 2008-2-9 00:00 | 显示全部楼层 |阅读模式
http://iphonejtag.blogspot.com/2 ... ough-for-prize.html
! W( Y1 z. d6 j! \
) ]7 p" t. P  W; D7 o, K' i  d
OMG NOW supports 1.1.3 TOO. But use the 112 fls.& t+ V' u8 t) j: J" e! I% T% t

/ D7 V& t4 |+ z, CFull software unlock of 1.1.2; the impossible(or at least I said so) Here it is; instructions are in the package. I guess I really am becoming a good reverser ;-) - B+ J0 M1 n+ r9 A+ x6 T1 C8 v
; C% Z% H$ s7 t( i
Yes, the impossible has been done. This has absolutely *nothing* to do with JerrySim or any elite/dev/zibri etc project. I'll start with a little story. Yesterday I was really pissed off. So I figured I'd channel my anger toward something productive; I don't know, something like a 1.1.2 software unlock. I knew the odds were against me, but I'd figured I try anyway. At about 1 last night, I hardware "upgraded" a 3.9 phone to 4.6 with the bootrom locations blank, the read command patched to work, and a 0x102 read arbitrary memory command., b) `5 [0 }+ k4 S0 q) [

% g3 }- U+ j0 D2 _4 E% vThe first exploit I found, at around 4 AM last night, was the -0x20000 exploit. Just like the -0x400 exploit, but -0x20000. Go figure. I guess Apple thought big numbers were harder to guess. I was really pumped, hence the blog post. But that wasn't even half the battle.
8 c  I* z2 j8 M3 I9 h5 p5 w" N/ [& M5 R$ X6 o; @
Like I said in the "impossible" post, 0x3C0000 can't have a valid secpack to allow booting. I spent the next 16 hours finding a way to do this. I can already write unsigned to the main fw section, all I need is a way to erase the secpack. My first idea was the eeprom secpack; upload the eeprom, endpack it, and the secpack is erased because the eeprom is "clean". But you can't upload a eeprom secpack until the 0x3C0000 is blank. My next idea was that the bl must erase the secpack before writing it. So a simple timing attack should do it. It turns out that no secpacks, even the same one, will write.
! l$ U; `2 ^' ~* z/ p  }9 g
) N2 d' I( K' C6 V3 Q$ lI finally found a working exploit about 23 hours into my search for the software unlock. The explict addresses 0xA03D0000-0xA03F0000 will always erase. This exploit relied on two things, the secaddrs are copied before the secpack is validated(stupid), and the erase command extends the range to whatever is in the secpack. So I tell it to erase 0xA03D0000-0xA03F0000, the erase command sees 0xA03C0000 to 0xA03F0000 in the secpack; BOOM secpack erased.
2 F& I/ z( K9 }1 \% ]: y2 x
: I* G1 R) _% rThe third minor concern was the full range check of 1.1.3. So use 1.1.2 :) This allows full unsigned code execution, it is a relatively simple matter of patching the bootloader to skip the range check. And while you are at it, patch the bootloader to validate all tokens. IPSF style unlock w/o touching the seczone.7 V/ B8 W4 q7 R6 G5 e
% G# u- z; c! j3 c6 W. R3 {
So, thats 24hrs to a software unlock; with about 3hrs of sleep in two segments. I am disappointed in the elite/dev team for not finding this; or even looking here. I know not everyone in elite/dev is so closed, and I feel bad for those people. Why don't we all just share everything? Apple will patch it anyway. They always have the upper hand. And whetever happened to the dev wiki?

gunlock.rar

9.75 KB, 下载次数: 679

您需要登录后才可以回帖 登录 | 加入我们

本版积分规则

QQ|Archiver|手机版|小黑屋|吹友吧 ( 京ICP备05078561号 )

GMT+8, 2025-4-6 01:12 , Processed in 0.284526 second(s), 19 queries .

Powered by Discuz! X3.5 Licensed

© 2001-2025 Discuz! Team.

快速回复 返回顶部 返回列表