![]() It returns the ECID as a CFNumberRef(kCFNumberSInt64Type) object.At the beginning of the offline update cancellation, iOS devices must connect to the server and send device information during the update. On OSX, call AMDeviceCopyValue in the MobileDevice Framework with "UniqueChipID". It should show on the second line after the colon (in hexadecimal, possibly with a leading zero). To get only the ECID part, use openssl asn1parse -inform DER -in r | grep -A1 ECID. Now you can use any old ASN.1 parser to display the file, such as openssl asn1parse -i -inform DER -in r. using plutil -extract ApImg4Ticket xml1 -o - *.shsh | xmllint -xpath '/plist/data/text()' - | base64 -D > r. Copy it from your device in /System/Library/Caches/r. ![]() ![]() to a.) we can extract the * part into ECID(Dec).įirst, get your r. The * part is the ECID(Dec) encrypted by a certain formula which isĪ.Transform ECID(Dec) into ECID(Hex) such as 58608372174291 -> 35 4D D3 34 4D D3ī.Reverse the ECID(Hex) string such as 35 4D D3 34 4D D3 -> D3 4D 34 D3 4D 35Ĭ.Transform the string we have got into binary such as D3 4D 34 D3 4D 35 -> ÓM4ÓM5ĭ.Encode the binary with base64 such as ÓM4ÓM5 -> 00000001 RElDRUAAAAAIAAAA********AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA There are 19 blobs in an SHSH, and the first line of every blob is the same as below:
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |