<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Padraig</id>
	<title>The iPhone Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Padraig"/>
	<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/wiki/Special:Contributions/Padraig"/>
	<updated>2026-05-01T12:30:55Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.14</generator>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Decrypting_Firmwares&amp;diff=4911</id>
		<title>Decrypting Firmwares</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Decrypting_Firmwares&amp;diff=4911"/>
		<updated>2009-09-29T19:44:39Z</updated>

		<summary type="html">&lt;p&gt;Padraig: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==1.0.x==&lt;br /&gt;
If you want to decrypt 1.0.x iPhone ramdisk you must remove some trash from the beginning of them. You can do this in Terminal.app (on Mac OS X you can find them in /Applications/Utilities/).&lt;br /&gt;
&lt;br /&gt;
Unzip firmware image (change extension .ipsw to .zip and double click on archive) and find restore ramdisk. In Terminal.app enter simple command:&lt;br /&gt;
&lt;br /&gt;
''dd if=restore_ramdisk.dmg of=restore_ramdisk.stripped.dmg bs=512 skip=4 count=37464 conv=sync''&lt;br /&gt;
&lt;br /&gt;
Where '''restore_ramdisk.dmg''' is image of restore ramdisk (for example 1.0 iPhone firmware restore ramdisk is 694-5259-38.dmg), and '''restore_ramdisk.stripped.dmg''' is 'decrypted' image, that you can mount and explore from Finder.&lt;br /&gt;
&lt;br /&gt;
Note: If after mounting stripped ramdisk you see errors, ignore them.&lt;br /&gt;
&lt;br /&gt;
==1.1.x==&lt;br /&gt;
To decrypt the 1.1.x ramdisk, strip the first 0x800 bytes. I'm not proficient in dd, but the above command could be modified for this, or it could be done in a hex editor. Once that's complete, run this command:&lt;br /&gt;
&lt;br /&gt;
''openssl enc -d -in ramdisk.dmg -out de.dmg -aes-128-cbc -K 188458A6D15034DFE386F23B61D43774 -iv 0''&lt;br /&gt;
&lt;br /&gt;
This uses the iPhone's 0x837 key which was first leaked by Zibri and had its purpose revealed on Geohot's blog.&lt;br /&gt;
&lt;br /&gt;
==2.x+==&lt;br /&gt;
The ramdisk on both 2.x and 3.x firmwares is a simple [[IMG3_File_Format|img3 file]], that you can decrypt using [http://code.google.com/p/img3decrypt/ img3decrypt] or [http://github.com/planetbeing/xpwn/tree/master xpwntool]. You must download one of these utilities. For easier access, put them in '''/usr/local/bin'''&lt;br /&gt;
&lt;br /&gt;
If you're using img3decrypt use this:&lt;br /&gt;
''img3decrypt e restore_ramdisk.dmg restore_ramdisk_decrypted.dmg Ramdisk_IV Ramdisk_Key'' &lt;br /&gt;
&lt;br /&gt;
Use this if you're using xpwntool on a mac:&lt;br /&gt;
''xpwntool restore_ramdisk.dmg restore_ramdisk_decrypted.dmg -k Ramdisk_Key -iv Ramdisk_IV''&lt;br /&gt;
&lt;br /&gt;
or on Windows:&lt;br /&gt;
&amp;quot;xpwntool.exe restore_ramdisk.dmg restore_ramdisk_decrypted.dmg -k Ramdisk_Key -iv Ramdisk_IV&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Where '''restore_ramdisk.dmg''' is image of restore ramdisk (for example 3.0 beta 1 iPhone GSM firmware restore ramdisk is 018-4793-1.dmg), and '''restore_ramdisk_decrypted.dmg''' is decrypted image, that you can mount and explore from Finder. Ramdisk_IV and Ramdisk_Key is a decrypted keys that you can find in [[VFDecrypt_Keys:_3.x|vfdecrypt page]] or in Info.plist from PwnageTool FirmwareBundles folder (when Dev Team include support for this firmware).&lt;br /&gt;
&lt;br /&gt;
Because of the new HFS Compression used in Snow Leopard and 3.0 DMGs, you may see zero-sized files in the DMG if you don't use Snow Leopard. In order to extract those, check [[Talk:Ramdisk Decryption]].&lt;/div&gt;</summary>
		<author><name>Padraig</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Firmware_Keys&amp;diff=4910</id>
		<title>Firmware Keys</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Firmware_Keys&amp;diff=4910"/>
		<updated>2009-09-29T19:40:12Z</updated>

		<summary type="html">&lt;p&gt;Padraig: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
These keys are for use with the 'vfdecrypt' tool to decrypt the main filesystem DMG found in every iPhone/iPhone 3G/iPod touch .ipsw file. Every key will work on the main filesystem DMG for that build, regardless if it is for the iPhone or iPod touch unless specified. The DMG that you are after is the bigger one, in the case of current builds of 2.0, it can sometimes be 200+ MB!&lt;br /&gt;
&lt;br /&gt;
== VFDecrypt Usage ==&lt;br /&gt;
 ./vfdecrypt -i &amp;lt;dmg&amp;gt; -o decrypted_fs.dmg -k &amp;lt;key&amp;gt; or vfdecrypt.exe -i &amp;lt;dmg&amp;gt; -o decrypted_fs.dmg -k &amp;lt;key&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Gaps ==&lt;br /&gt;
As you will notice, there may be a gap or two, or a key for a current build that is not there. Please feel free to add them, but please be sure that it is only the key for a User or Developer build, as if you gave the key for another type of build that might or may not be out there '''people could get in trouble, and we do not want that'''. Thanks for contributing!&lt;br /&gt;
&lt;br /&gt;
== Downloads ==&lt;br /&gt;
&lt;br /&gt;
* http://rgov.org/files/vfdecrypt-mac.zip (Mac OS X Universal)&lt;br /&gt;
* http://iphoneelite.googlecode.com/files/vfdecrypt.zip (Windows)&lt;br /&gt;
&lt;br /&gt;
* Source Credit: http://lorenzo.yellowspace.net/corrupt-sparseimage.html&lt;br /&gt;
&lt;br /&gt;
== Firmwares ==&lt;br /&gt;
* [[VFDecrypt Keys: 1.x|1.x]]&lt;br /&gt;
* [[VFDecrypt Keys: 2.x|2.x]]&lt;br /&gt;
* [[VFDecrypt Keys: 3.x BETA|3.x Beta]]&lt;br /&gt;
* [[VFDecrypt Keys: 3.x|3.x]]&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
* [[System]] - a page with links to download the firmware images&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:VFDecrypt]]&lt;/div&gt;</summary>
		<author><name>Padraig</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Firmware_Keys&amp;diff=4909</id>
		<title>Firmware Keys</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Firmware_Keys&amp;diff=4909"/>
		<updated>2009-09-29T19:39:28Z</updated>

		<summary type="html">&lt;p&gt;Padraig: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
These keys are for use with the 'vfdecrypt' tool to decrypt the main filesystem DMG found in every iPhone/iPhone 3G/iPod touch .ipsw file. Every key will work on the main filesystem DMG for that build, regardless if it is for the iPhone or iPod touch unless specified. The DMG that you are after is the bigger one, in the case of current builds of 2.0, it can sometimes be 200+ MB!&lt;br /&gt;
&lt;br /&gt;
== VFDecrypt Usage ==&lt;br /&gt;
 ./vfdecrypt -i &amp;lt;dmg&amp;gt; -o decrypted_fs.dmg -k &amp;lt;key&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 or&lt;br /&gt;
&lt;br /&gt;
 vfdecrypt.exe -i &amp;lt;dmg&amp;gt; -o decrypted_fs.dmg -k &amp;lt;key&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Gaps ==&lt;br /&gt;
As you will notice, there may be a gap or two, or a key for a current build that is not there. Please feel free to add them, but please be sure that it is only the key for a User or Developer build, as if you gave the key for another type of build that might or may not be out there '''people could get in trouble, and we do not want that'''. Thanks for contributing!&lt;br /&gt;
&lt;br /&gt;
== Downloads ==&lt;br /&gt;
&lt;br /&gt;
* http://rgov.org/files/vfdecrypt-mac.zip (Mac OS X Universal)&lt;br /&gt;
* http://iphoneelite.googlecode.com/files/vfdecrypt.zip (Windows)&lt;br /&gt;
&lt;br /&gt;
* Source Credit: http://lorenzo.yellowspace.net/corrupt-sparseimage.html&lt;br /&gt;
&lt;br /&gt;
== Firmwares ==&lt;br /&gt;
* [[VFDecrypt Keys: 1.x|1.x]]&lt;br /&gt;
* [[VFDecrypt Keys: 2.x|2.x]]&lt;br /&gt;
* [[VFDecrypt Keys: 3.x BETA|3.x Beta]]&lt;br /&gt;
* [[VFDecrypt Keys: 3.x|3.x]]&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
* [[System]] - a page with links to download the firmware images&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:VFDecrypt]]&lt;/div&gt;</summary>
		<author><name>Padraig</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Firmware_Keys&amp;diff=4908</id>
		<title>Firmware Keys</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Firmware_Keys&amp;diff=4908"/>
		<updated>2009-09-29T19:39:07Z</updated>

		<summary type="html">&lt;p&gt;Padraig: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
These keys are for use with the 'vfdecrypt' tool to decrypt the main filesystem DMG found in every iPhone/iPhone 3G/iPod touch .ipsw file. Every key will work on the main filesystem DMG for that build, regardless if it is for the iPhone or iPod touch unless specified. The DMG that you are after is the bigger one, in the case of current builds of 2.0, it can sometimes be 200+ MB!&lt;br /&gt;
&lt;br /&gt;
== VFDecrypt Usage ==&lt;br /&gt;
 ./vfdecrypt -i &amp;lt;dmg&amp;gt; -o decrypted_fs.dmg -k &amp;lt;key&amp;gt;&lt;br /&gt;
 or&lt;br /&gt;
 vfdecrypt.exe -i &amp;lt;dmg&amp;gt; -o decrypted_fs.dmg -k &amp;lt;key&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Gaps ==&lt;br /&gt;
As you will notice, there may be a gap or two, or a key for a current build that is not there. Please feel free to add them, but please be sure that it is only the key for a User or Developer build, as if you gave the key for another type of build that might or may not be out there '''people could get in trouble, and we do not want that'''. Thanks for contributing!&lt;br /&gt;
&lt;br /&gt;
== Downloads ==&lt;br /&gt;
&lt;br /&gt;
* http://rgov.org/files/vfdecrypt-mac.zip (Mac OS X Universal)&lt;br /&gt;
* http://iphoneelite.googlecode.com/files/vfdecrypt.zip (Windows)&lt;br /&gt;
&lt;br /&gt;
* Source Credit: http://lorenzo.yellowspace.net/corrupt-sparseimage.html&lt;br /&gt;
&lt;br /&gt;
== Firmwares ==&lt;br /&gt;
* [[VFDecrypt Keys: 1.x|1.x]]&lt;br /&gt;
* [[VFDecrypt Keys: 2.x|2.x]]&lt;br /&gt;
* [[VFDecrypt Keys: 3.x BETA|3.x Beta]]&lt;br /&gt;
* [[VFDecrypt Keys: 3.x|3.x]]&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
* [[System]] - a page with links to download the firmware images&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:VFDecrypt]]&lt;/div&gt;</summary>
		<author><name>Padraig</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Greenpois0n_(jailbreak)&amp;diff=4895</id>
		<title>Greenpois0n (jailbreak)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Greenpois0n_(jailbreak)&amp;diff=4895"/>
		<updated>2009-09-27T10:40:44Z</updated>

		<summary type="html">&lt;p&gt;Padraig: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The tool that will soon be released for jailbreaking 3.1 on all devices. Even the iPod touch 3G. &lt;br /&gt;
&lt;br /&gt;
It uses a previously unreleased exploit that is yet to be announced.&lt;br /&gt;
&lt;br /&gt;
Here is a video made by Chronic of him proving that the exploit does in fact work on the iPod touch 3G: http://qik.ly/f4M8.&lt;/div&gt;</summary>
		<author><name>Padraig</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=N18AP&amp;diff=4832</id>
		<title>N18AP</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=N18AP&amp;diff=4832"/>
		<updated>2009-09-15T15:07:43Z</updated>

		<summary type="html">&lt;p&gt;Padraig: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{DISPLAYTITLE:iPod touch 3G}}&lt;br /&gt;
This is the 3rd Generation [[N45ap|iPod Touch]]. It was announced on September 9th, 2009. It makes a small improvement over the [[N72ap|previous generation]]; adding a faster processor, doubling the ram, increasing storage capacity, etc. &lt;br /&gt;
&lt;br /&gt;
==Application Processor==&lt;br /&gt;
It makes use of the [[S5L8922]] application processor. No other known device uses this processor; however, the iPhone 3GS uses the similar [[S5L8920]].&lt;br /&gt;
&lt;br /&gt;
==Wifi Chip==&lt;br /&gt;
[[BCM4329]] Wifi B/G/N, Bluetooth, FM Transmit/Receive&lt;br /&gt;
&lt;br /&gt;
==Specifications==&lt;/div&gt;</summary>
		<author><name>Padraig</name></author>
		
	</entry>
</feed>