09.06.2010, 14:51
Hallo.
Ich wollte die FW entcrypten, damit ich auf die Dateien zugreifen kann um zb die Plists zu ändern.
Das Problem dabei ist, dass Apple die FW versucht, "unentpackbar" zu machen.
Nun habe ich aber ein Tut gefunden, nachdem es gehen soll (MAC)
Jedoch komme ich bei Punkt 8 nicht weiter, da er mir wieder ein DMG macht, anstatt einen Ordner.
Ich wollte die FW entcrypten, damit ich auf die Dateien zugreifen kann um zb die Plists zu ändern.
Das Problem dabei ist, dass Apple die FW versucht, "unentpackbar" zu machen.
Nun habe ich aber ein Tut gefunden, nachdem es gehen soll (MAC)
Jedoch komme ich bei Punkt 8 nicht weiter, da er mir wieder ein DMG macht, anstatt einen Ordner.
Code:
Step #1:
You need to download the needed files for this to work.
* vfDecrypt
* 4.0 firmware - This can't be given to you on here. Please use other sources for this file.
Step #2:
On the firmware file, you need to change the extension from ' .ipsw ' to ' .zip '. From there, go ahead and unzip it.
Step #3:
Once you have the firmware folder, unzip the vfdecrypt.zip and copy the vfdecrypt binary file to the firmware folder.
Step #4:
Open Terminal. You can do this by using Spotlight to search ' terminal ' or open the application directly from the Utilities sub-folder in the Applications folder.
Step #5:
In Terminal, type ' cd ' and drag the IPSW folder into the Terminal window to paste the location of the folder.
Ex.
Code:
cd /Users/ChronicFunk/Downloads/iPhone2,1_4.0_8A230m_Restore/
Step #6:
Find the biggest DMG in the IPSW folder, for example, one could be 10mb, another 11mb, and then the other 280mb. The 280mb one would be the main filesystem dmg. Ex. the iPhone 3GS's is 018-7340-029.dmg.
Now that you know the dmg file name, let's go back to Terminal.
Step #7:
Time to decrypt the DMG. In order to do this, you need the key. The key is sorta like a long password vfdecrypt will use to get the files.
Keys:
iPhone 3G:
Code:
0da2d3316d5ee7cd1858e4035e451387cd8156e97535fb0902 8859e68e5b7b39a6649552
iPhone 3GS:
Code:
62ea9bf9971e6c410231646f916f80330f9cbc1d1c585f0c03dab6b6f7158dc0a9c5efaf
iPod touch 2G:
Code:
d88fa434f6a8c50fd49cd0923879da5c3079c59c0e534cff521a9cecbcad48d84b4daef0
iPod touch 3G:
Code:
382dee11b9d80387b16ac2030ee1e903b78d9743a31a18bcafc922b7921eca85ab0aebf7
Using your device key, type the following into Terminal:
Code:
./vfdecrypt -i DMGNAME.dmg -o decrypted.dmg -k DEVICEKEY
Ex. for the iPhone 3GS
Code:
./vfdecrypt -i 018-7340-029.dmg -o decrypted.dmg -k 62ea9bf9971e6c410231646f916f80330f9cbc1d1c585f0c03dab6b6f7158dc0a9c5efaf
Step #8:
After a few seconds of Terminal doing it's thing, it will output the decrypted DMG into the IPSW folder. Now, open the decrypted DMG and do the following.
Go to '/System/Library/CoreServices/' and open SystemVersion.plist.
Now, remove the following:
Code:
<key>ReleaseType</key>
<string>Beta</string>
Now, save the file and close it.
Step #10:
Now, eject the DMG. Remember the name of the old encrypted DMG and then delete it. As for 'decrypted.dmg', rename that to the old DMG.
Step #11:
Delete the vfdecrypt binary file from the IPSW folder. Now, you need to rezip the IPSW folder. Once you have done that, change the extension of the file to ' .ipsw '.
Step #12:
Now, open iTunes and choose your iPhone or iPod touch from the list in the left in iTunes. Hold down the ' Option ' key on the keyboard and click Restore. Choose the ipsw you have just edited.
Done!