<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Luke1908</id>
	<title>The iPhone Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Luke1908"/>
	<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/wiki/Special:Contributions/Luke1908"/>
	<updated>2026-05-06T05:57:12Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.14</generator>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=PMB8878&amp;diff=4173</id>
		<title>PMB8878</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=PMB8878&amp;diff=4173"/>
		<updated>2009-07-12T00:34:35Z</updated>

		<summary type="html">&lt;p&gt;Luke1908: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the baseband processor used in the iPhone 3G and the iPhone 3Gs. It is upgraded with [[BBUpdaterExtreme]]. It is also known as the PMB8878.&lt;br /&gt;
&lt;br /&gt;
==Datasheet==&lt;br /&gt;
Anyone got one? Infineon provides [http://www.infineon.com/dgdl/X-GOLD608_XMM6080.pdf?location=Products.Mobile_Phone_Baseband_ICs.WCDMA___HSDPA.X-GOLD__608_-_PMB_8878.PRODUCT_TYPE_DOCUMENTS.X-GOLD608_XMM6080.pdf&amp;amp;folderId=db3a304312fcb1bc0113000c158f0004&amp;amp;fileId=db3a30431936bc4b011957c66fee3850 this], which isn't really useful.&lt;br /&gt;
&lt;br /&gt;
==Secpack 2.0==&lt;br /&gt;
This is the security region in the files sent to the [[X-Gold 608]]. This is the first 0xCF8 is new fls and eep files.&lt;br /&gt;
&lt;br /&gt;
===Layout===&lt;br /&gt;
 0x634--Memory Map&lt;br /&gt;
 0x714--Descriptor&lt;br /&gt;
 0xCD4--Post secpack pointer to name&lt;br /&gt;
 0xCEC--Data length&lt;br /&gt;
&lt;br /&gt;
==Endpack==&lt;br /&gt;
The fls and eep files also have a footer tacked onto the end containing the loader and signature.&lt;br /&gt;
&lt;br /&gt;
==Memory Map==&lt;br /&gt;
  FLASH      0x20000000 0x1000000&lt;br /&gt;
  CODE       0x20000000   0x40000 0b0010(bootstrapper)&lt;br /&gt;
  CODE       0x20040000  0xDC0000 0b0100(main firmware)&lt;br /&gt;
  FFS        0x20A00000  0x100000 0b1100(empty)&lt;br /&gt;
  DYNFFS     0x20A00000  0x100000 0b1100(empty)&lt;br /&gt;
  FFS        0x20B00000   0x40000 0b1011(empty)&lt;br /&gt;
  DYN_EEP    0x20E40000   0x80000 0b0110&lt;br /&gt;
  SECPACK    0x20EC0000   0x40000&lt;br /&gt;
  SECZONE    0x20F80000   0x40000&lt;br /&gt;
  STATIC_EEP 0x20FC0000   0x40000 0b0111&lt;br /&gt;
  RAM        0x40000000  0x800000&lt;br /&gt;
&lt;br /&gt;
==MMU relocation table==&lt;br /&gt;
===Bootloader===&lt;br /&gt;
[[Image:Bltbl.png]]&lt;br /&gt;
&lt;br /&gt;
===Firmware===&lt;br /&gt;
[[Image:Bbmmu.png]]&lt;br /&gt;
&lt;br /&gt;
==Complete memory dump==&lt;br /&gt;
[http://depositfiles.com/files/i5119hpzm 0x00000000-0x0001FFFF]&lt;br /&gt;
&lt;br /&gt;
[http://depositfiles.com/files/mxslfu4dp 0x20000000-0x20FFFFFF]&lt;br /&gt;
&lt;br /&gt;
[http://depositfiles.com/files/6wiet73wn 0x40000000-0x407FFFFF]&lt;br /&gt;
&lt;br /&gt;
[http://depositfiles.com/files/fioppsphe 0xFFFF0000-0xFFFFFFFF]&lt;br /&gt;
&lt;br /&gt;
== Known Firmware Versions ==&lt;br /&gt;
  [[1.43.00]]    2.0 (Build 5A331 - Internal Beta)&lt;br /&gt;
  [[1.45.00]]    2.0 (Build 5A347 - Gold Master)&lt;br /&gt;
  [[1.48.02]]    2.0.1 (Build 5B108)&lt;br /&gt;
  [[2.04.03]]    2.1 (Build 5F90)&lt;br /&gt;
  [[2.08.01]]    2.0.2 (Build 5C1)&lt;br /&gt;
  [[2.11.07]]    2.1 (Build 5F136)&lt;br /&gt;
  [[2.28.00]]    2.2 (Build 5G77)&lt;br /&gt;
  [[2.30.03]]    2.2.1 (Build 5H11)&lt;br /&gt;
  [[4.20.01]]    3.0 beta 1 (Build 7A238j)&lt;br /&gt;
  [[4.22.01]]    3.0 beta 2 (Build 7A259g)&lt;br /&gt;
  [[4.24.02]]    3.0 beta 3 (Build 7A280f)&lt;br /&gt;
  [[4.26.08]]    3.0 (Build 7A341 - Gold Master)&lt;br /&gt;
  [[5.08.01]]    3.1 beta 1 (Build 7C97d)&lt;br /&gt;
&lt;br /&gt;
==Accessing [[Interactive Mode]]==&lt;br /&gt;
Interactive mode isn't accessed by sending characters to the baseband. Instead a GPIO pin is raised with a kernel call to preupdate reset.&lt;br /&gt;
 result = IOConnectCallScalarMethod(conn, 0, 0, 0, 0, 0);	//reset&lt;br /&gt;
 result = IOConnectCallScalarMethod(conn, 1, 0, 0, 0, 0);	//power set&lt;br /&gt;
 result = IOConnectCallScalarMethod(conn, 2, 0, 0, 0, 0);	//configuring mux&lt;br /&gt;
 result = IOConnectCallScalarMethod(conn, 7, 0, 0, 0, 0);	//powercycle&lt;br /&gt;
 result = IOConnectCallScalarMethod(conn, 8, 0, 0, 0, 0);	//preupdate reset&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Baseband]]&lt;/div&gt;</summary>
		<author><name>Luke1908</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_(S5L8920%2B)&amp;diff=4172</id>
		<title>Jailbreak (S5L8920+)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_(S5L8920%2B)&amp;diff=4172"/>
		<updated>2009-07-12T00:33:08Z</updated>

		<summary type="html">&lt;p&gt;Luke1908: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Apple did not have the time to fix the [[24kpwn]] hole in the [[S5L8920 (Bootrom)|iPhone 3G[s] Bootrom]]. Thus, the following needs to be done:&lt;br /&gt;
* '''Find [[iBoot]] exploit''' - In order to flash 24kPwned [[LLB]].&lt;br /&gt;
* '''&amp;quot;Port&amp;quot; the [[24kpwn]] exploit''' - In order to run our patched [[LLB]] and to skip the ECID checks.&lt;br /&gt;
&lt;br /&gt;
==ECID==&lt;br /&gt;
Apple added a new tag to the img3 format called ECID. The ECID is ''unique'' to each phone, and is being sigchecked. So Apple could block downgrades once newer firmware becomes available, unless you have a dump of your unique old firmware's img3 or signed certificate. Therefore, iBoot exploits won't be so useful for tethered JBs, because such exploits will be closed in new FWs. [http://iphonejtag.blogspot.com/2009/06/ecid-field-downgrades-no-dice.html].&lt;br /&gt;
&lt;br /&gt;
The issue with this is that, even with [[24kpwn]] still in bootrom, an [[iBoot]] exploit is still needed to actually flash the 24kpwned [[LLB]]. If Apple uses this ECID stuff to block downgrades, then a new [[iBoot]] exploit will be needed whenever they fix the last, so that [[24kpwn]] can be applied. This is because Apple could choose to not let you upload an older / exploitable iBEC / iBoot / iBSS to the device. 3GS owners can save a file which contains the signature of an iBSS for 3.0GM containing their [[ECID]], using http://purplera1n.com/ should Apple try to block this in the future.&lt;br /&gt;
&lt;br /&gt;
==Jailbreak tools==&lt;br /&gt;
There is two possible methods to jailbreak which use the same iboot exploit discovered independently by Geohot and the iPhone Dev team. you can use redsn0w by the iphone dev team to jailbreak or purplera1n by geohot. These currently only work on firmware version 3.0 (12/7/09).&lt;/div&gt;</summary>
		<author><name>Luke1908</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_(S5L8920%2B)&amp;diff=4171</id>
		<title>Jailbreak (S5L8920+)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_(S5L8920%2B)&amp;diff=4171"/>
		<updated>2009-07-12T00:32:14Z</updated>

		<summary type="html">&lt;p&gt;Luke1908: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Apple did not have the time to fix the [[24kpwn]] hole in the [[S5L8920 (Bootrom)|iPhone 3G[s] Bootrom]]. Thus, the following needs to be done:&lt;br /&gt;
* '''Find [[iBoot]] exploit''' - In order to flash 24kPwned [[LLB]].&lt;br /&gt;
* '''&amp;quot;Port&amp;quot; the [[24kpwn]] exploit''' - In order to run our patched [[LLB]] and to skip the ECID checks.&lt;br /&gt;
&lt;br /&gt;
==ECID==&lt;br /&gt;
Apple added a new tag to the img3 format called ECID. The ECID is ''unique'' to each phone, and is being sigchecked. So Apple could block downgrades once newer firmware becomes available, unless you have a dump of your unique old firmware's img3 or signed certificate. Therefore, iBoot exploits won't be so useful for tethered JBs, because such exploits will be closed in new FWs. [http://iphonejtag.blogspot.com/2009/06/ecid-field-downgrades-no-dice.html].&lt;br /&gt;
&lt;br /&gt;
The issue with this is that, even with [[24kpwn]] still in bootrom, an [[iBoot]] exploit is still needed to actually flash the 24kpwned [[LLB]]. If Apple uses this ECID stuff to block downgrades, then a new [[iBoot]] exploit will be needed whenever they fix the last, so that [[24kpwn]] can be applied. This is because Apple could choose to not let you upload an older / exploitable iBEC / iBoot / iBSS to the device. 3GS owners can save a file which contains the signature of an iBSS for 3.0GM containing their [[ECID]], using http://purplera1n.com/ should Apple try to block this in the future.&lt;br /&gt;
&lt;br /&gt;
==Jailbreak tools==&lt;br /&gt;
There is two possible methods to jailbreak which use the same iboot exploit discovered independently by Geohot and the iPhone dev team. you can use redsn0w by the iphone dev team to jailbreak or purplara1n by geohot. These curently only work on firmware version 3.0 (12/7/09).&lt;/div&gt;</summary>
		<author><name>Luke1908</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_(S5L8920%2B)&amp;diff=4170</id>
		<title>Jailbreak (S5L8920+)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_(S5L8920%2B)&amp;diff=4170"/>
		<updated>2009-07-12T00:31:53Z</updated>

		<summary type="html">&lt;p&gt;Luke1908: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Apple did not have the time to fix the [[24kpwn]] hole in the [[S5L8920 (Bootrom)|iPhone 3G[s] Bootrom]]. Thus, the following needs to be done:&lt;br /&gt;
* '''Find [[iBoot]] exploit''' - In order to flash 24kPwned [[LLB]].&lt;br /&gt;
* '''&amp;quot;Port&amp;quot; the [[24kpwn]] exploit''' - In order to run our patched [[LLB]] and to skip the ECID checks.&lt;br /&gt;
&lt;br /&gt;
==ECID==&lt;br /&gt;
Apple added a new tag to the img3 format called ECID. The ECID is ''unique'' to each phone, and is being sigchecked. So Apple could block downgrades once newer firmware becomes available, unless you have a dump of your unique old firmware's img3 or signed certificate. Therefore, iBoot exploits won't be so useful for tethered JBs, because such exploits will be closed in new FWs. [http://iphonejtag.blogspot.com/2009/06/ecid-field-downgrades-no-dice.html].&lt;br /&gt;
&lt;br /&gt;
The issue with this is that, even with [[24kpwn]] still in bootrom, an [[iBoot]] exploit is still needed to actually flash the 24kpwned [[LLB]]. If Apple uses this ECID stuff to block downgrades, then a new [[iBoot]] exploit will be needed whenever they fix the last, so that [[24kpwn]] can be applied. This is because Apple could choose to not let you upload an older / exploitable iBEC / iBoot / iBSS to the device. 3GS owners can save a file which contains the signature of an iBSS for 3.0GM containing their [[ECID]], using http://purplera1n.com/ should Apple try to block this in the future.&lt;br /&gt;
&lt;br /&gt;
==Jailbreak tools==&lt;br /&gt;
There is two possible method to jailbreak which use the same iboot exploit discovered independently by Geohot and the iPhone dev team. you can use redsn0w by the iphone dev team to jailbreak or purplara1n by geohot. These curently only work on firmware version 3.0 (12/7/09).&lt;/div&gt;</summary>
		<author><name>Luke1908</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_(S5L8920%2B)&amp;diff=4169</id>
		<title>Jailbreak (S5L8920+)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_(S5L8920%2B)&amp;diff=4169"/>
		<updated>2009-07-12T00:31:28Z</updated>

		<summary type="html">&lt;p&gt;Luke1908: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Apple did not have the time to fix the [[24kpwn]] hole in the [[S5L8920 (Bootrom)|iPhone 3G[s] Bootrom]]. Thus, the following needs to be done:&lt;br /&gt;
* '''Find [[iBoot]] exploit''' - In order to flash 24kPwned [[LLB]].&lt;br /&gt;
* '''&amp;quot;Port&amp;quot; the [[24kpwn]] exploit''' - In order to run our patched [[LLB]] and to skip the ECID checks.&lt;br /&gt;
&lt;br /&gt;
==ECID==&lt;br /&gt;
Apple added a new tag to the img3 format called ECID. The ECID is ''unique'' to each phone, and is being sigchecked. So Apple could block downgrades once newer firmware becomes available, unless you have a dump of your unique old firmware's img3 or signed certificate. Therefore, iBoot exploits won't be so useful for tethered JBs, because such exploits will be closed in new FWs. [http://iphonejtag.blogspot.com/2009/06/ecid-field-downgrades-no-dice.html].&lt;br /&gt;
&lt;br /&gt;
The issue with this is that, even with [[24kpwn]] still in bootrom, an [[iBoot]] exploit is still needed to actually flash the 24kpwned [[LLB]]. If Apple uses this ECID stuff to block downgrades, then a new [[iBoot]] exploit will be needed whenever they fix the last, so that [[24kpwn]] can be applied. This is because Apple could choose to not let you upload an older / exploitable iBEC / iBoot / iBSS to the device. 3GS owners can save a file which contains the signature of an iBSS for 3.0GM containing their [[ECID]], using http://purplera1n.com/ should Apple try to block this in the future.&lt;br /&gt;
&lt;br /&gt;
==JAILBREAK TOOLS==&lt;br /&gt;
There is two possible method to jailbreak which use the same iboot exploit discovered independently by Geohot and the iPhone dev team. you can use redsn0w by the iphone dev team to jailbreak or purplara1n by geohot. These curently only work on firmware version 3.0 (12/7/09).&lt;/div&gt;</summary>
		<author><name>Luke1908</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=04.26.08&amp;diff=4168</id>
		<title>04.26.08</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=04.26.08&amp;diff=4168"/>
		<updated>2009-07-12T00:23:36Z</updated>

		<summary type="html">&lt;p&gt;Luke1908: New page: Vulnerable to at+xlog crash which is used to inject ultrasn0w for unlocking&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Vulnerable to at+xlog crash which is used to inject ultrasn0w for unlocking&lt;/div&gt;</summary>
		<author><name>Luke1908</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=05.08.01&amp;diff=4167</id>
		<title>05.08.01</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=05.08.01&amp;diff=4167"/>
		<updated>2009-07-12T00:22:26Z</updated>

		<summary type="html">&lt;p&gt;Luke1908: tqh&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This baseband makes ultrasn0w useless in it current form because it closes the whole discovered by Oranav (at+xlog crash). Apple also tighens the securtiy in this baseband by removing 120 AT commands.&lt;/div&gt;</summary>
		<author><name>Luke1908</name></author>
		
	</entry>
</feed>