<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Xnudaemon</id>
	<title>The iPhone Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Xnudaemon"/>
	<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/wiki/Special:Contributions/Xnudaemon"/>
	<updated>2026-05-09T12:45:03Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.14</generator>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SysCfg&amp;diff=105848</id>
		<title>SysCfg</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SysCfg&amp;diff=105848"/>
		<updated>2020-07-15T19:51:19Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== SysCfg==&lt;br /&gt;
&lt;br /&gt;
'''SysCfg''' also known as System Configuration is a partition on the NAND found on iOS devices.  &lt;br /&gt;
&lt;br /&gt;
It stores the Serial Numbers and Calibrations of hardware of the device, and the Software Behaviour bits.&lt;br /&gt;
&lt;br /&gt;
It is a dictionary-like structure with each entry having a 4-byte (32-bit) key (Ex: SrNm).  &lt;br /&gt;
&lt;br /&gt;
With AppleInternal firmware called Diags, that is found on EVT / DVT / PVT devices this data can be modified and reflashed.  &lt;br /&gt;
&lt;br /&gt;
A smart programmer may be able to use a jailbreak and write a controller around this partition to do the same.  &lt;br /&gt;
&lt;br /&gt;
Modifications to these numbers are permanent but have advantages too.  &lt;br /&gt;
&lt;br /&gt;
A Chinese iOS device generally has limitations as defined by the Software Behaviour bits and the Region, modifying these in the SysCfg may remove them.&lt;br /&gt;
&lt;br /&gt;
== Keys ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; &lt;br /&gt;
|- style=&amp;quot;font-weight:bold;&amp;quot;&lt;br /&gt;
! key&lt;br /&gt;
! description&lt;br /&gt;
! type&lt;br /&gt;
|-&lt;br /&gt;
| AICl&lt;br /&gt;
| Accelerator Interrupt Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| ARot&lt;br /&gt;
| Accelerator Orientation Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| ASCi&lt;br /&gt;
| ---? calibration data&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| ASCl&lt;br /&gt;
| Accelerator Sensitivity Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| BCAL&lt;br /&gt;
| Bluetooth Taurus Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| BCAR&lt;br /&gt;
| BackCamera Autofocus Recalibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| BCMB&lt;br /&gt;
| Back Camera Module Board&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| BCMS&lt;br /&gt;
| Back Camera Module Serialnumber&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| BLCl&lt;br /&gt;
| Backlight Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| BMac&lt;br /&gt;
| Bluetooth Mac Address&lt;br /&gt;
| Data (mac address)&lt;br /&gt;
|-&lt;br /&gt;
| BTRx&lt;br /&gt;
| Bluetooth Reception Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| BTTx&lt;br /&gt;
| Bluetooth Transmission Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| Batt&lt;br /&gt;
| Battery Serial Number&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| CBAT&lt;br /&gt;
| Charget input limit calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| CDCC&lt;br /&gt;
| Compass hilow calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| CGSp&lt;br /&gt;
| Coverglass type&lt;br /&gt;
| Data (binary-hex)&lt;br /&gt;
|-&lt;br /&gt;
| CLHS&lt;br /&gt;
| Housing Color&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| CLCG&lt;br /&gt;
| Coverglass Color&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| CSCM&lt;br /&gt;
| Compass Sensor Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| CVCC&lt;br /&gt;
| Compass VBUS Compensation&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| DBCl&lt;br /&gt;
| Display Backlight Compensation&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| DClr&lt;br /&gt;
| Device color&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| DTCl&lt;br /&gt;
| Display Temperature Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| EMac&lt;br /&gt;
| Ethernet Mac Address&lt;br /&gt;
| Data (mac address)&lt;br /&gt;
|-&lt;br /&gt;
| FCMB&lt;br /&gt;
| Front Camera Module Board&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| FCMS&lt;br /&gt;
| Front Camera Module Serialnumber&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| FDAC&lt;br /&gt;
| Orb Dynamic Accelerator Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| FG2G&lt;br /&gt;
| WiFi Calibration Frequency Group 2G&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| GICl&lt;br /&gt;
| Gyro Interrupt Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| GLCl&lt;br /&gt;
| Gamma Tables Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| GRot&lt;br /&gt;
| Gyro Orientation Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| GSCi&lt;br /&gt;
| Gyro Sensitivity Matrix Inverse&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| GSCl&lt;br /&gt;
| Gyro Sensitivity Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| GTCl&lt;br /&gt;
| Gyro Trim Calibration&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| GYTT&lt;br /&gt;
| Gyro Temp. Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| LCM#&lt;br /&gt;
| Liquid Crystal Monitor Serialnumber (LCD)&lt;br /&gt;
| Data??&lt;br /&gt;
|-&lt;br /&gt;
| LSCI&lt;br /&gt;
| Ambient Lightsensor Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| LTAO&lt;br /&gt;
| Low Temperature Accelerator Offset&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| MLB#&lt;br /&gt;
| Main Logicboard Serialnumber&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| MdlC&lt;br /&gt;
| Murata WiFi Configuration&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| Mod#&lt;br /&gt;
| Model number&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| MtCl&lt;br /&gt;
| Multitouch Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| MtSN&lt;br /&gt;
| Multitouch Serialnumber&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| NFCl&lt;br /&gt;
| Stockholm NFC Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| NSrN&lt;br /&gt;
| Touch-ID Serial Number&lt;br /&gt;
| Data (hex-encoded string)&lt;br /&gt;
|-&lt;br /&gt;
| NoCl&lt;br /&gt;
| ---? Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| NvSn&lt;br /&gt;
| Apple SandDollar SerialNumber&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| OFCl&lt;br /&gt;
| Orb Force Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| OrbC&lt;br /&gt;
| Orb Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| OrbG&lt;br /&gt;
| Orb Gap Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| PACV&lt;br /&gt;
| ---?&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| PrCL&lt;br /&gt;
| Pearl calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| PRSq&lt;br /&gt;
| ---?&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| PRTT&lt;br /&gt;
| Pressure Temperature compensation Table&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| PxCl&lt;br /&gt;
| Proximity Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| RMd#&lt;br /&gt;
| Regulatory Model Number&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| RxCL&lt;br /&gt;
| Rosaline Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| Regn&lt;br /&gt;
| Region code&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| SPPO&lt;br /&gt;
| Pressure Offset Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| SpCl&lt;br /&gt;
| Speaker Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| SrNm&lt;br /&gt;
| Device Serialnumber&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| STRB&lt;br /&gt;
| Camera Strobe Color Calibration&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| SwBh&lt;br /&gt;
| Software Behaviour Bits&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| TCal&lt;br /&gt;
| Audio Actuator Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| VBCA&lt;br /&gt;
| Speaker Configuration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| VBST&lt;br /&gt;
| Speaker Configuration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| VPBR&lt;br /&gt;
| Speaker Configuration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| W24R&lt;br /&gt;
| Wifi Receiver 2.4Ghz Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| WCAL&lt;br /&gt;
| Wifi Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| WMac&lt;br /&gt;
| Wifi mac address&lt;br /&gt;
| Data (mac address)&lt;br /&gt;
|-&lt;br /&gt;
| WRxT&lt;br /&gt;
| Wifi Receiver temp. Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SysCfg&amp;diff=105847</id>
		<title>SysCfg</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SysCfg&amp;diff=105847"/>
		<updated>2020-07-15T19:47:55Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== SysCfg==&lt;br /&gt;
&lt;br /&gt;
'''SysCfg''' also known as System Configuration is a partition on the NAND found on iOS devices.  &lt;br /&gt;
&lt;br /&gt;
It stores the Serial Numbers and Calibrations of hardware of the device, and the Software Behaviour bits.&lt;br /&gt;
&lt;br /&gt;
It is a dictionary-like structure with each entry having a 4-byte (32-bit) key (Ex: SrNm).  &lt;br /&gt;
&lt;br /&gt;
With AppleInternal firmware called Diags, that is found on EVT / DVT / PVT devices this data can be modified and reflashed.  &lt;br /&gt;
&lt;br /&gt;
A smart programmer may be able to use a jailbreak and write a controller around this partition to do the same.  &lt;br /&gt;
&lt;br /&gt;
Modifications to these numbers are permanent but have advantages too.  &lt;br /&gt;
&lt;br /&gt;
A Chinese iOS device generally has limitations as defined by the Software Behaviour bits and the Region, modifying these in the SysCfg may remove them.&lt;br /&gt;
&lt;br /&gt;
== Keys ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; &lt;br /&gt;
|- style=&amp;quot;font-weight:bold;&amp;quot;&lt;br /&gt;
! key&lt;br /&gt;
! description&lt;br /&gt;
! type&lt;br /&gt;
|-&lt;br /&gt;
| AICl&lt;br /&gt;
| Accelerator Interrupt Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| ARot&lt;br /&gt;
| Accelerator Orientation Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| ASCi&lt;br /&gt;
| ---? calibration data&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| ASCl&lt;br /&gt;
| Accelerator Sensitivity Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| BCAL&lt;br /&gt;
| Bluetooth Taurus Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| BCMB&lt;br /&gt;
| Back Camera Module Board&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| BCMS&lt;br /&gt;
| Back Camera Module Serialnumber&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| BLCl&lt;br /&gt;
| Backlight Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| BMac&lt;br /&gt;
| Bluetooth Mac Address&lt;br /&gt;
| Data (mac address)&lt;br /&gt;
|-&lt;br /&gt;
| BTRx&lt;br /&gt;
| Bluetooth Reception Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| BTTx&lt;br /&gt;
| Bluetooth Transmission Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| Batt&lt;br /&gt;
| Battery Serial Number&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| CBAT&lt;br /&gt;
| Charget input limit calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| CDCC&lt;br /&gt;
| Compass hilow calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| CGSp&lt;br /&gt;
| Coverglass type&lt;br /&gt;
| Data (binary-hex)&lt;br /&gt;
|-&lt;br /&gt;
| CLHS&lt;br /&gt;
| Housing Colour&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| CLCG&lt;br /&gt;
| Coverglass Colour&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| CSCM&lt;br /&gt;
| Compass Sensor Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| CVCC&lt;br /&gt;
| Compass VBUS Compensation&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| DBCl&lt;br /&gt;
| Display Backlight Compensation&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| DClr&lt;br /&gt;
| Device color&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| DTCl&lt;br /&gt;
| Display Temperature Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| EMac&lt;br /&gt;
| Ethernet Mac Address&lt;br /&gt;
| Data (mac address)&lt;br /&gt;
|-&lt;br /&gt;
| FCMB&lt;br /&gt;
| Front Camera Module Board&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| FCMS&lt;br /&gt;
| Front Camera Module Serialnumber&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| FDAC&lt;br /&gt;
| Orb Dynamic Accelerator Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| FG2G&lt;br /&gt;
| WiFi Calibration Frequency Group 2G&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| GICl&lt;br /&gt;
| Gyro Interrupt Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| GLCl&lt;br /&gt;
| Gamma Tables Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| GRot&lt;br /&gt;
| Gyro Orientation Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| GSCi&lt;br /&gt;
| Gyro Sensitivity Matrix Inverse&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| GSCl&lt;br /&gt;
| Gyro Sensitivity Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| GTCl&lt;br /&gt;
| Gyro Trim Calibration&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| GYTT&lt;br /&gt;
| Gyro Temp. Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| LCM#&lt;br /&gt;
| Liquid Crystal Monitor Serialnumber (LCD)&lt;br /&gt;
| Data??&lt;br /&gt;
|-&lt;br /&gt;
| LSCI&lt;br /&gt;
| Ambient Lightsensor Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| LTAO&lt;br /&gt;
| Low Temperature Accelerator Offset&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| MLB#&lt;br /&gt;
| Main Logicboard Serialnumber&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| MdlC&lt;br /&gt;
| Murata WiFi Configuration&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| Mod#&lt;br /&gt;
| Model number&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| MtCl&lt;br /&gt;
| Multitouch Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| MtSN&lt;br /&gt;
| Multitouch Serialnumber&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| NFCl&lt;br /&gt;
| Stockholm NFC Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| NSrN&lt;br /&gt;
| Touch-ID Serial Number&lt;br /&gt;
| Data (hex-encoded string)&lt;br /&gt;
|-&lt;br /&gt;
| NoCl&lt;br /&gt;
| ---? Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| NvSn&lt;br /&gt;
| Apple SandDollar SerialNumber&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| OFCl&lt;br /&gt;
| Orb Force Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| OrbC&lt;br /&gt;
| Orb Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| OrbG&lt;br /&gt;
| Orb Gap Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| PACV&lt;br /&gt;
| ---?&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| PRSq&lt;br /&gt;
| ---?&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| PxCl&lt;br /&gt;
| Proximity Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| RMd#&lt;br /&gt;
| Regulatory Model Number&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| Regn&lt;br /&gt;
| Region code&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| SPPO&lt;br /&gt;
| Pressure Offset Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| SpCl&lt;br /&gt;
| Speaker Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| SrNm&lt;br /&gt;
| Device Serialnumber&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| SwBh&lt;br /&gt;
| Software Behaviour Bits&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| TCal&lt;br /&gt;
| Audio Actuator Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| VBCA&lt;br /&gt;
| Speaker Configuration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| VBST&lt;br /&gt;
| Speaker Configuration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| VPBR&lt;br /&gt;
| Speaker Configuration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| W24R&lt;br /&gt;
| Wifi Receiver 2.4Ghz Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| WCAL&lt;br /&gt;
| Wifi Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| WMac&lt;br /&gt;
| Wifi mac address&lt;br /&gt;
| Data (mac address)&lt;br /&gt;
|-&lt;br /&gt;
| WRxT&lt;br /&gt;
| Wifi Receiver temp. Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SysCfg&amp;diff=105846</id>
		<title>SysCfg</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SysCfg&amp;diff=105846"/>
		<updated>2020-07-15T19:47:27Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== SysCfg==&lt;br /&gt;
&lt;br /&gt;
'''SysCfg''' also known as System Configuration is a partition on the NAND found on iOS devices.  &lt;br /&gt;
&lt;br /&gt;
It stores the Serial Numbers and Calibrations of hardware of the device, and the Software Behaviour bits.&lt;br /&gt;
&lt;br /&gt;
It is a dictionary-like structure with each entry having a 4-byte (32-bit) key (Ex: SrNm).  &lt;br /&gt;
&lt;br /&gt;
With AppleInternal firmware called Diags, that is found on EVT / DVT / PVT devices this data can be modified and reflashed.  &lt;br /&gt;
&lt;br /&gt;
A smart programmer may be able to use a jailbreak and write a controller around this partition to do the same.  &lt;br /&gt;
&lt;br /&gt;
Modifications to these numbers are permanent but have advantages too.  &lt;br /&gt;
&lt;br /&gt;
A Chinese iOS device generally has limitations as defined by the Software Behaviour bits and the Region, modifying these in the SysCfg may remove them.&lt;br /&gt;
&lt;br /&gt;
== Keys ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; &lt;br /&gt;
|- style=&amp;quot;font-weight:bold;&amp;quot;&lt;br /&gt;
! key&lt;br /&gt;
! description&lt;br /&gt;
! type&lt;br /&gt;
|-&lt;br /&gt;
| AICl&lt;br /&gt;
| Accelerator Interrupt Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| ARot&lt;br /&gt;
| Accelerator Orientation Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| ASCi&lt;br /&gt;
| ---? calibration data&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| ASCl&lt;br /&gt;
| Accelerator Sensitivity Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| BCAL&lt;br /&gt;
| Bluetooth Taurus Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| BCMB&lt;br /&gt;
| Back Camera Module Board&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| BCMS&lt;br /&gt;
| Back Camera Module Serialnumber&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| BLCl&lt;br /&gt;
| Backlight Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| BMac&lt;br /&gt;
| Bluetooth Mac Address&lt;br /&gt;
| Data (mac address)&lt;br /&gt;
|-&lt;br /&gt;
| BTRx&lt;br /&gt;
| Bluetooth Reception Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| BTTx&lt;br /&gt;
| Bluetooth Transmission Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| Batt&lt;br /&gt;
| Battery Serial Number&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| CBAT&lt;br /&gt;
| Charget input limit calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| CDCC&lt;br /&gt;
| Compass hilow calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| CGSp&lt;br /&gt;
| Coverglass type&lt;br /&gt;
| Data (binary-hex)&lt;br /&gt;
|-&lt;br /&gt;
| CLHS&lt;br /&gt;
| Housing Colour&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| CLCG&lt;br /&gt;
| Coverglass Colour&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| CSCM&lt;br /&gt;
| Compass Sensor Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| CVCC&lt;br /&gt;
| Compass VBUS Compensation&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| DBCl&lt;br /&gt;
| Display Backlight Compensation&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| DClr&lt;br /&gt;
| Device color&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| DTCl&lt;br /&gt;
| Display Temperature Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| EMac&lt;br /&gt;
| Ethernet Mac Address&lt;br /&gt;
| Data (mac address)&lt;br /&gt;
|-&lt;br /&gt;
| FCMB&lt;br /&gt;
| Front Camera Module Board&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| FCMS&lt;br /&gt;
| Front Camera Module Serialnumber&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| FDAC&lt;br /&gt;
| Orb Dynamic Accelerator Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| FG2G&lt;br /&gt;
| WiFi Calibration Frequency Group 2G&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| GICl&lt;br /&gt;
| Gyro Interrupt Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| GLCl&lt;br /&gt;
| Gamma Tables Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| GRot&lt;br /&gt;
| Gyro Orientation Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| GSCi&lt;br /&gt;
| Gyro Sensitivity Matrix Inverse&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| GSCl&lt;br /&gt;
| Gyro Sensitivity Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| GTCl&lt;br /&gt;
| Gyro Trim Calibration&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| GYTT&lt;br /&gt;
| Gyro Temp. Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| LCM#&lt;br /&gt;
| Liquid Crystal Monitor Serialnumber (LCD)&lt;br /&gt;
| Data??&lt;br /&gt;
|-&lt;br /&gt;
| LSCI&lt;br /&gt;
| Ambient Lightsensor Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| LTAO&lt;br /&gt;
| Low Temperature Accelerator Offset&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| MLB#&lt;br /&gt;
| Main Logicboard Serialnumber&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| MdlC&lt;br /&gt;
| Murata WiFi Configuration&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| Mod#&lt;br /&gt;
| Model number&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| MtCl&lt;br /&gt;
| Multitouch Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| MtSN&lt;br /&gt;
| Multitouch Serialnumber&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| NFCl&lt;br /&gt;
| Near Field Communication Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| NSrN&lt;br /&gt;
| Touch-ID Serial Number&lt;br /&gt;
| Data (hex-encoded string)&lt;br /&gt;
|-&lt;br /&gt;
| NoCl&lt;br /&gt;
| ---? Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| NvSn&lt;br /&gt;
| Apple SandDollar SerialNumber&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| OFCl&lt;br /&gt;
| Orb Force Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| OrbC&lt;br /&gt;
| Orb Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| OrbG&lt;br /&gt;
| Orb Gap Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| PACV&lt;br /&gt;
| ---?&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| PRSq&lt;br /&gt;
| ---?&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| PxCl&lt;br /&gt;
| Proximity Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| RMd#&lt;br /&gt;
| Regulatory Model Number&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| Regn&lt;br /&gt;
| Region code&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| SPPO&lt;br /&gt;
| Pressure Offset Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| SpCl&lt;br /&gt;
| Speaker Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| SrNm&lt;br /&gt;
| Device Serialnumber&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| SwBh&lt;br /&gt;
| Software Behaviour Bits&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| TCal&lt;br /&gt;
| Audio Actuator Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| VBCA&lt;br /&gt;
| Speaker Configuration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| VBST&lt;br /&gt;
| Speaker Configuration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| VPBR&lt;br /&gt;
| Speaker Configuration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| W24R&lt;br /&gt;
| Wifi Receiver 2.4Ghz Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| WCAL&lt;br /&gt;
| Wifi Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| WMac&lt;br /&gt;
| Wifi mac address&lt;br /&gt;
| Data (mac address)&lt;br /&gt;
|-&lt;br /&gt;
| WRxT&lt;br /&gt;
| Wifi Receiver temp. Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SysCfg&amp;diff=105845</id>
		<title>SysCfg</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SysCfg&amp;diff=105845"/>
		<updated>2020-07-15T19:39:29Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: /* Keys */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== SysCfg==&lt;br /&gt;
&lt;br /&gt;
'''SysCfg''' also known as System Configuration is a partition on the NAND found on iOS devices.  &lt;br /&gt;
&lt;br /&gt;
It stores the Serial Numbers and Calibrations of hardware of the device, and the Software Behaviour bits.&lt;br /&gt;
&lt;br /&gt;
It is a dictionary-like structure with each entry having a 4-byte (32-bit) key (Ex: SrNm).  &lt;br /&gt;
&lt;br /&gt;
With AppleInternal firmware called Diags, that is found on EVT / DVT / PVT devices this data can be modified and reflashed.  &lt;br /&gt;
&lt;br /&gt;
A smart programmer may be able to use a jailbreak and write a controller around this partition to do the same.  &lt;br /&gt;
&lt;br /&gt;
Modifications to these numbers are permanent but have advantages too.  &lt;br /&gt;
&lt;br /&gt;
A Chinese iOS device generally has limitations as defined by the Software Behaviour bits and the Region, modifying these in the SysCfg may remove them.&lt;br /&gt;
&lt;br /&gt;
== Keys ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; &lt;br /&gt;
|- style=&amp;quot;font-weight:bold;&amp;quot;&lt;br /&gt;
! key&lt;br /&gt;
! description&lt;br /&gt;
! type&lt;br /&gt;
|-&lt;br /&gt;
| AICl&lt;br /&gt;
| Accelerator Interrupt Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| ARot&lt;br /&gt;
| Accelerator Orientation Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| ASCi&lt;br /&gt;
| ---? calibration data&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| ASCl&lt;br /&gt;
| Accelerator Sensitivity Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| BCMB&lt;br /&gt;
| Back Camera Module Board&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| BCMS&lt;br /&gt;
| Back Camera Module Serialnumber&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| BLCl&lt;br /&gt;
| Backlight Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| BMac&lt;br /&gt;
| Bluetooth Mac Address&lt;br /&gt;
| Data (mac address)&lt;br /&gt;
|-&lt;br /&gt;
| BTRx&lt;br /&gt;
| Bluetooth Reception Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| BTTx&lt;br /&gt;
| Bluetooth Transmission Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| Batt&lt;br /&gt;
| Battery Serial Number&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| CBAT&lt;br /&gt;
| Charget input limit calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| CGSp&lt;br /&gt;
| Coverglass type&lt;br /&gt;
| Data (binary-hex)&lt;br /&gt;
|-&lt;br /&gt;
| DClr&lt;br /&gt;
| Device color&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| EMac&lt;br /&gt;
| Ethernet Mac Address&lt;br /&gt;
| Data (mac address)&lt;br /&gt;
|-&lt;br /&gt;
| FCMB&lt;br /&gt;
| Front Camera Module Board&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| FCMS&lt;br /&gt;
| Front Camera Module Serialnumber&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| FDAC&lt;br /&gt;
| Orb Dynamic Accelerator Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| FG2G&lt;br /&gt;
| WiFi Calibration Frequency Group 2G&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| GICl&lt;br /&gt;
| Gyro Interrupt Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| GLCl&lt;br /&gt;
| Gamma Tables Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| GRot&lt;br /&gt;
| Gyro Orientation Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| GSCi&lt;br /&gt;
| Gyro Sensitivity Matrix Inverse&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| GSCl&lt;br /&gt;
| Gyro Sensitivity Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| GTCl&lt;br /&gt;
| Gyro Trim Calibration&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| GYTT&lt;br /&gt;
| Gyro Temp. Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| LCM#&lt;br /&gt;
| Liquid Crystal Monitor Serialnumber (LCD)&lt;br /&gt;
| Data??&lt;br /&gt;
|-&lt;br /&gt;
| LSCI&lt;br /&gt;
| Ambient Lightsensor Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| LTAO&lt;br /&gt;
| Low Temperature Accelerator Offset&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| MLB#&lt;br /&gt;
| Main Logicboard Serialnumber&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| MdlC&lt;br /&gt;
| Murata WiFi Configuration&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| Mod#&lt;br /&gt;
| Model number&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| MtCl&lt;br /&gt;
| Multitouch Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| MtSN&lt;br /&gt;
| Multitouch Serialnumber&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| NFCl&lt;br /&gt;
| Near Field Communication Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| NSrN&lt;br /&gt;
| Touch-ID Serial Number&lt;br /&gt;
| Data (hex-encoded string)&lt;br /&gt;
|-&lt;br /&gt;
| NoCl&lt;br /&gt;
| ---? Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| NvSn&lt;br /&gt;
| Apple SandDollar SerialNumber&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| OFCl&lt;br /&gt;
| Orb Force Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| OrbC&lt;br /&gt;
| Orb Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| OrbG&lt;br /&gt;
| Orb Gap Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| PACV&lt;br /&gt;
| ---?&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| PRSq&lt;br /&gt;
| ---?&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| PxCl&lt;br /&gt;
| Proximity Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| RMd#&lt;br /&gt;
| Regulatory Model Number&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| Regn&lt;br /&gt;
| Region code&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| SPPO&lt;br /&gt;
| Pressure Offset Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| SpCl&lt;br /&gt;
| Speaker Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| SrNm&lt;br /&gt;
| Device Serialnumber&lt;br /&gt;
| String&lt;br /&gt;
|-&lt;br /&gt;
| SwBh&lt;br /&gt;
| Software Behaviour Bits&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| TCal&lt;br /&gt;
| Audio Actuator Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| VBCA&lt;br /&gt;
| Speaker Configuration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| VBST&lt;br /&gt;
| Speaker Configuration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| VPBR&lt;br /&gt;
| Speaker Configuration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| W24R&lt;br /&gt;
| Wifi Receiver 2.4Ghz Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| WCAL&lt;br /&gt;
| Wifi Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| WMac&lt;br /&gt;
| Wifi mac address&lt;br /&gt;
| Data (mac address)&lt;br /&gt;
|-&lt;br /&gt;
| WRxT&lt;br /&gt;
| Wifi Receiver temp. Calibration&lt;br /&gt;
| Data&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=User:Userlandkernel&amp;diff=99127</id>
		<title>User:Userlandkernel</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=User:Userlandkernel&amp;diff=99127"/>
		<updated>2020-02-13T16:59:37Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: Xnudaemon moved page User:Xnudaemon to User:Userlandkernel&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Hackers]]&lt;br /&gt;
== About me ==&lt;br /&gt;
* @userlandkernel on Twitter&lt;br /&gt;
* Hacking stuff (literally anything, web / networks, vending machines, radio etc etc) since 2012&lt;br /&gt;
* Love developing nerdy debug tools and documenting the unknown&lt;br /&gt;
* Am more known for my interest in iOS&lt;br /&gt;
* I am a fast learner&lt;br /&gt;
* I like hardware based side channel attacks (CoreSight KTRW, WatchTower defeat with CPACR, Meltdown &amp;amp; Spectre)&lt;br /&gt;
&lt;br /&gt;
== Disclosed iOS Vulnerabilities ==&lt;br /&gt;
* IOUSBFamily use after free&lt;br /&gt;
* assetsd type-confusion&lt;br /&gt;
* iBooks Denial-of-Service&lt;br /&gt;
* Shortcuts App, partial sandbox escape&lt;br /&gt;
&lt;br /&gt;
== Current projects == &lt;br /&gt;
* Reverse engineering the NVME firmware&lt;br /&gt;
* Flashing custom-made NVME firmware&lt;br /&gt;
* Testing whether NVME firmware can turn off or alter IOMMU.&lt;br /&gt;
* Research whether NVME can be a persistent side-channel to patching iBoot at SecureBoot time&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=User:Xnudaemon&amp;diff=99128</id>
		<title>User:Xnudaemon</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=User:Xnudaemon&amp;diff=99128"/>
		<updated>2020-02-13T16:59:37Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: Xnudaemon moved page User:Xnudaemon to User:Userlandkernel&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[User:Userlandkernel]]&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=User:Userlandkernel&amp;diff=99126</id>
		<title>User:Userlandkernel</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=User:Userlandkernel&amp;diff=99126"/>
		<updated>2020-02-13T16:58:11Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Hackers]]&lt;br /&gt;
== About me ==&lt;br /&gt;
* @userlandkernel on Twitter&lt;br /&gt;
* Hacking stuff (literally anything, web / networks, vending machines, radio etc etc) since 2012&lt;br /&gt;
* Love developing nerdy debug tools and documenting the unknown&lt;br /&gt;
* Am more known for my interest in iOS&lt;br /&gt;
* I am a fast learner&lt;br /&gt;
* I like hardware based side channel attacks (CoreSight KTRW, WatchTower defeat with CPACR, Meltdown &amp;amp; Spectre)&lt;br /&gt;
&lt;br /&gt;
== Disclosed iOS Vulnerabilities ==&lt;br /&gt;
* IOUSBFamily use after free&lt;br /&gt;
* assetsd type-confusion&lt;br /&gt;
* iBooks Denial-of-Service&lt;br /&gt;
* Shortcuts App, partial sandbox escape&lt;br /&gt;
&lt;br /&gt;
== Current projects == &lt;br /&gt;
* Reverse engineering the NVME firmware&lt;br /&gt;
* Flashing custom-made NVME firmware&lt;br /&gt;
* Testing whether NVME firmware can turn off or alter IOMMU.&lt;br /&gt;
* Research whether NVME can be a persistent side-channel to patching iBoot at SecureBoot time&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=User:Userlandkernel&amp;diff=99125</id>
		<title>User:Userlandkernel</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=User:Userlandkernel&amp;diff=99125"/>
		<updated>2020-02-13T16:55:16Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== About me ==&lt;br /&gt;
* @userlandkernel on Twitter&lt;br /&gt;
* Hacking stuff (literally anything, web / networks, vending machines, radio etc etc) since 2012&lt;br /&gt;
* Love developing nerdy debug tools and documenting the unknown&lt;br /&gt;
* Am more known for my interest in iOS&lt;br /&gt;
* I am a fast learner&lt;br /&gt;
* I like hardware based side channel attacks (CoreSight KTRW, WatchTower defeat with CPACR, Meltdown &amp;amp; Spectre)&lt;br /&gt;
&lt;br /&gt;
== Disclosed iOS Vulnerabilities ==&lt;br /&gt;
* IOUSBFamily use after free&lt;br /&gt;
* assetsd type-confusion&lt;br /&gt;
* iBooks Denial-of-Service&lt;br /&gt;
* Shortcuts App, partial sandbox escape&lt;br /&gt;
&lt;br /&gt;
== Current projects == &lt;br /&gt;
* Reverse engineering the NVME firmware&lt;br /&gt;
* Flashing custom-made NVME firmware&lt;br /&gt;
* Testing whether NVME firmware can turn off or alter IOMMU.&lt;br /&gt;
* Research whether NVME can be a persistent side-channel to patching iBoot at SecureBoot time&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=User:Userlandkernel&amp;diff=99124</id>
		<title>User:Userlandkernel</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=User:Userlandkernel&amp;diff=99124"/>
		<updated>2020-02-13T16:54:47Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== About me ==&lt;br /&gt;
* @userlandkernel on Twitter&lt;br /&gt;
* Hacking stuff (literally anything, web / networks, vending machines, radio etc etc) since 2012&lt;br /&gt;
* Love developing nerdy debug tools and documenting the unknown&lt;br /&gt;
* Am more known for my interest in iOS&lt;br /&gt;
* I am a fast learner&lt;br /&gt;
* I like hardware based side channel attacks (CoreSight KTRW, WatchTower defeat with CPACR, Meltdown &amp;amp; Spectre)&lt;br /&gt;
&lt;br /&gt;
== Disclosed iOS Vulnerabilities ==&lt;br /&gt;
* IOUSBFamily use after free&lt;br /&gt;
* assetsd type-confusion&lt;br /&gt;
* iBooks Denial-of-Service&lt;br /&gt;
- Shortcuts App, partial sandbox escape&lt;br /&gt;
&lt;br /&gt;
== Current projects == &lt;br /&gt;
* Reverse engineering the NVME firmware&lt;br /&gt;
* Flashing custom-made NVME firmware&lt;br /&gt;
* Testing whether NVME firmware can turn off or alter IOMMU.&lt;br /&gt;
* Research whether NVME can be a persistent side-channel to patching iBoot at SecureBoot time&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=User:Userlandkernel&amp;diff=99123</id>
		<title>User:Userlandkernel</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=User:Userlandkernel&amp;diff=99123"/>
		<updated>2020-02-13T16:53:34Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: Created page with &amp;quot;== About me == - @userlandkernel on Twitter - Hacking stuff (literally anything, web / networks, vending machines, radio etc etc) since 2012 - Love developing nerdy debug tool...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== About me ==&lt;br /&gt;
- @userlandkernel on Twitter&lt;br /&gt;
- Hacking stuff (literally anything, web / networks, vending machines, radio etc etc) since 2012&lt;br /&gt;
- Love developing nerdy debug tools and documenting the unknown&lt;br /&gt;
- Am more known for my interest in iOS&lt;br /&gt;
- I am a fast learner&lt;br /&gt;
- I like hardware based side channel attacks&lt;br /&gt;
&lt;br /&gt;
== Disclosed iOS Vulnerabilities ==&lt;br /&gt;
- IOUSBFamily use after free&lt;br /&gt;
- assetsd type-confusion&lt;br /&gt;
- iBooks Denial-of-Service&lt;br /&gt;
- Shortcuts App, partial sandbox escape&lt;br /&gt;
&lt;br /&gt;
== Current projects == &lt;br /&gt;
- Reverse engineering the NVME firmware&lt;br /&gt;
- Flashing custom-made NVME firmware&lt;br /&gt;
- Testing whether NVME firmware can turn off or alter IOMMU.&lt;br /&gt;
- Research whether NVME can be a persistent side-channel to patching iBoot at SecureBoot time&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SysCfg&amp;diff=99122</id>
		<title>SysCfg</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SysCfg&amp;diff=99122"/>
		<updated>2020-02-13T09:51:36Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: /* SysCfg */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== SysCfg==&lt;br /&gt;
&lt;br /&gt;
'''SysCfg''' also known as System Configuration is a partition on the NAND found on iOS devices.  &lt;br /&gt;
&lt;br /&gt;
It stores the Serial Numbers and Calibrations of hardware of the device, and the Software Behaviour bits.&lt;br /&gt;
&lt;br /&gt;
It is a dictionary-like structure with each entry having a 4-byte (32-bit) key (Ex: SrNm).  &lt;br /&gt;
&lt;br /&gt;
With AppleInternal firmware called Diags, that is found on EVT / DVT / PVT devices this data can be modified and reflashed.  &lt;br /&gt;
&lt;br /&gt;
A smart programmer may be able to use a jailbreak and write a controller around this partition to do the same.  &lt;br /&gt;
&lt;br /&gt;
Modifications to these numbers are permanent but have advantages too.  &lt;br /&gt;
&lt;br /&gt;
A Chinese iOS device generally has limitations as defined by the Software Behaviour bits and the Region, modifying these in the SysCfg may remove them.&lt;br /&gt;
&lt;br /&gt;
== Keys ==&lt;br /&gt;
&lt;br /&gt;
* AICl&lt;br /&gt;
* ARot&lt;br /&gt;
* ASCi&lt;br /&gt;
* ASCl&lt;br /&gt;
* ATGa&lt;br /&gt;
* BCMB&lt;br /&gt;
* BCMS&lt;br /&gt;
* BLCl&lt;br /&gt;
* BMac&lt;br /&gt;
* BTRx&lt;br /&gt;
* BTTx&lt;br /&gt;
* Batt&lt;br /&gt;
* CBAT&lt;br /&gt;
* CGSp&lt;br /&gt;
* DClr&lt;br /&gt;
* EMac&lt;br /&gt;
* FCMB&lt;br /&gt;
* FCMS&lt;br /&gt;
* FDAC&lt;br /&gt;
* FG2G&lt;br /&gt;
* GICl&lt;br /&gt;
* GLCl&lt;br /&gt;
* GRot&lt;br /&gt;
* GSCi&lt;br /&gt;
* GSCl&lt;br /&gt;
* GTCl&lt;br /&gt;
* GYTT&lt;br /&gt;
* LCM#&lt;br /&gt;
* LSCI&lt;br /&gt;
* LTAO&lt;br /&gt;
* MLB#&lt;br /&gt;
* MdlC&lt;br /&gt;
* Mod#&lt;br /&gt;
* MtCl&lt;br /&gt;
* MtSN&lt;br /&gt;
* NFCl&lt;br /&gt;
* NSrN&lt;br /&gt;
* NoCl&lt;br /&gt;
* NvSn&lt;br /&gt;
* OFCl&lt;br /&gt;
* OrbC&lt;br /&gt;
* OrbG&lt;br /&gt;
* PACV&lt;br /&gt;
* PRSq&lt;br /&gt;
* PxCl&lt;br /&gt;
* RMd#&lt;br /&gt;
* Regn&lt;br /&gt;
* SPPO&lt;br /&gt;
* SpCl&lt;br /&gt;
* SrNm&lt;br /&gt;
* SwBh&lt;br /&gt;
* TCal&lt;br /&gt;
* VBCA&lt;br /&gt;
* VBST&lt;br /&gt;
* VPBR&lt;br /&gt;
* W24R&lt;br /&gt;
* WCAL&lt;br /&gt;
* WMac&lt;br /&gt;
* WRxT&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SysCfg&amp;diff=99121</id>
		<title>SysCfg</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SysCfg&amp;diff=99121"/>
		<updated>2020-02-13T09:48:28Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: /* SysCfg */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== SysCfg==&lt;br /&gt;
&lt;br /&gt;
'''SysCfg''' also known as System Configuration is a partition on the NAND found on iOS devices.  &lt;br /&gt;
It stores the Serial Numbers and Calibrations of hardware of the device, and the Software Behaviour bits.&lt;br /&gt;
It is a dictionary-like structure with each entry having a 4-byte (32-bit) key (Ex: SrNm).  &lt;br /&gt;
With AppleInternal firmware called Diags, that is found on EVT / DVT / PVT devices this data can be modified and reflashed.  &lt;br /&gt;
A smart programmer may be able to use a jailbreak and write a controller around this partition to do the same.  &lt;br /&gt;
Modifications to these numbers are permanent, however it may be useful to change the Software Behaviour bits and Region if you are a limited Chinese citizen looking for more freedom for example.&lt;br /&gt;
&lt;br /&gt;
== Keys ==&lt;br /&gt;
&lt;br /&gt;
* AICl&lt;br /&gt;
* ARot&lt;br /&gt;
* ASCi&lt;br /&gt;
* ASCl&lt;br /&gt;
* ATGa&lt;br /&gt;
* BCMB&lt;br /&gt;
* BCMS&lt;br /&gt;
* BLCl&lt;br /&gt;
* BMac&lt;br /&gt;
* BTRx&lt;br /&gt;
* BTTx&lt;br /&gt;
* Batt&lt;br /&gt;
* CBAT&lt;br /&gt;
* CGSp&lt;br /&gt;
* DClr&lt;br /&gt;
* EMac&lt;br /&gt;
* FCMB&lt;br /&gt;
* FCMS&lt;br /&gt;
* FDAC&lt;br /&gt;
* FG2G&lt;br /&gt;
* GICl&lt;br /&gt;
* GLCl&lt;br /&gt;
* GRot&lt;br /&gt;
* GSCi&lt;br /&gt;
* GSCl&lt;br /&gt;
* GTCl&lt;br /&gt;
* GYTT&lt;br /&gt;
* LCM#&lt;br /&gt;
* LSCI&lt;br /&gt;
* LTAO&lt;br /&gt;
* MLB#&lt;br /&gt;
* MdlC&lt;br /&gt;
* Mod#&lt;br /&gt;
* MtCl&lt;br /&gt;
* MtSN&lt;br /&gt;
* NFCl&lt;br /&gt;
* NSrN&lt;br /&gt;
* NoCl&lt;br /&gt;
* NvSn&lt;br /&gt;
* OFCl&lt;br /&gt;
* OrbC&lt;br /&gt;
* OrbG&lt;br /&gt;
* PACV&lt;br /&gt;
* PRSq&lt;br /&gt;
* PxCl&lt;br /&gt;
* RMd#&lt;br /&gt;
* Regn&lt;br /&gt;
* SPPO&lt;br /&gt;
* SpCl&lt;br /&gt;
* SrNm&lt;br /&gt;
* SwBh&lt;br /&gt;
* TCal&lt;br /&gt;
* VBCA&lt;br /&gt;
* VBST&lt;br /&gt;
* VPBR&lt;br /&gt;
* W24R&lt;br /&gt;
* WCAL&lt;br /&gt;
* WMac&lt;br /&gt;
* WRxT&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SysCfg&amp;diff=99120</id>
		<title>SysCfg</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SysCfg&amp;diff=99120"/>
		<updated>2020-02-13T09:43:30Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: /* Keys */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== SysCfg==&lt;br /&gt;
&lt;br /&gt;
**SysCfg** also known as System Configuration is a partition on the NAND found on iOS devices.  &lt;br /&gt;
It stores the Serial Numbers and Calibrations of hardware of the device, and the Software Behaviour bits.  &lt;br /&gt;
&lt;br /&gt;
== Keys ==&lt;br /&gt;
&lt;br /&gt;
* AICl&lt;br /&gt;
* ARot&lt;br /&gt;
* ASCi&lt;br /&gt;
* ASCl&lt;br /&gt;
* ATGa&lt;br /&gt;
* BCMB&lt;br /&gt;
* BCMS&lt;br /&gt;
* BLCl&lt;br /&gt;
* BMac&lt;br /&gt;
* BTRx&lt;br /&gt;
* BTTx&lt;br /&gt;
* Batt&lt;br /&gt;
* CBAT&lt;br /&gt;
* CGSp&lt;br /&gt;
* DClr&lt;br /&gt;
* EMac&lt;br /&gt;
* FCMB&lt;br /&gt;
* FCMS&lt;br /&gt;
* FDAC&lt;br /&gt;
* FG2G&lt;br /&gt;
* GICl&lt;br /&gt;
* GLCl&lt;br /&gt;
* GRot&lt;br /&gt;
* GSCi&lt;br /&gt;
* GSCl&lt;br /&gt;
* GTCl&lt;br /&gt;
* GYTT&lt;br /&gt;
* LCM#&lt;br /&gt;
* LSCI&lt;br /&gt;
* LTAO&lt;br /&gt;
* MLB#&lt;br /&gt;
* MdlC&lt;br /&gt;
* Mod#&lt;br /&gt;
* MtCl&lt;br /&gt;
* MtSN&lt;br /&gt;
* NFCl&lt;br /&gt;
* NSrN&lt;br /&gt;
* NoCl&lt;br /&gt;
* NvSn&lt;br /&gt;
* OFCl&lt;br /&gt;
* OrbC&lt;br /&gt;
* OrbG&lt;br /&gt;
* PACV&lt;br /&gt;
* PRSq&lt;br /&gt;
* PxCl&lt;br /&gt;
* RMd#&lt;br /&gt;
* Regn&lt;br /&gt;
* SPPO&lt;br /&gt;
* SpCl&lt;br /&gt;
* SrNm&lt;br /&gt;
* SwBh&lt;br /&gt;
* TCal&lt;br /&gt;
* VBCA&lt;br /&gt;
* VBST&lt;br /&gt;
* VPBR&lt;br /&gt;
* W24R&lt;br /&gt;
* WCAL&lt;br /&gt;
* WMac&lt;br /&gt;
* WRxT&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SysCfg&amp;diff=99119</id>
		<title>SysCfg</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SysCfg&amp;diff=99119"/>
		<updated>2020-02-13T09:40:46Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: Created page with &amp;quot;== SysCfg==  **SysCfg** also known as System Configuration is a partition on the NAND found on iOS devices.   It stores the Serial Numbers and Calibrations of hardware of the...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== SysCfg==&lt;br /&gt;
&lt;br /&gt;
**SysCfg** also known as System Configuration is a partition on the NAND found on iOS devices.  &lt;br /&gt;
It stores the Serial Numbers and Calibrations of hardware of the device, and the Software Behaviour bits.  &lt;br /&gt;
&lt;br /&gt;
== Keys ==&lt;br /&gt;
&lt;br /&gt;
**AICl**&lt;br /&gt;
**ARot**&lt;br /&gt;
**ASCi**&lt;br /&gt;
**ASCl**&lt;br /&gt;
**ATGa**&lt;br /&gt;
**BCMB**&lt;br /&gt;
**BCMS**&lt;br /&gt;
**BLCl**&lt;br /&gt;
**BMac**&lt;br /&gt;
**BTRx**&lt;br /&gt;
**BTTx**&lt;br /&gt;
**Batt**&lt;br /&gt;
**CBAT**&lt;br /&gt;
**CGSp**&lt;br /&gt;
**DClr**&lt;br /&gt;
**EMac**&lt;br /&gt;
**FCMB**&lt;br /&gt;
**FCMS**&lt;br /&gt;
**FDAC**&lt;br /&gt;
**FG2G**&lt;br /&gt;
**GICl**&lt;br /&gt;
**GLCl**&lt;br /&gt;
**GRot**&lt;br /&gt;
**GSCi**&lt;br /&gt;
**GSCl**&lt;br /&gt;
**GTCl**&lt;br /&gt;
**GYTT**&lt;br /&gt;
**LCM#**&lt;br /&gt;
**LSCI**&lt;br /&gt;
**LTAO**&lt;br /&gt;
**MLB#**&lt;br /&gt;
**MdlC**&lt;br /&gt;
**Mod#**&lt;br /&gt;
**MtCl**&lt;br /&gt;
**MtSN**&lt;br /&gt;
**NFCl**&lt;br /&gt;
**NSrN**&lt;br /&gt;
**NoCl**&lt;br /&gt;
**NvSn**&lt;br /&gt;
**OFCl**&lt;br /&gt;
**OrbC**&lt;br /&gt;
**OrbG**&lt;br /&gt;
**PACV**&lt;br /&gt;
**PRSq**&lt;br /&gt;
**PxCl**&lt;br /&gt;
**RMd#**&lt;br /&gt;
**Regn**&lt;br /&gt;
**SPPO**&lt;br /&gt;
**SpCl**&lt;br /&gt;
**SrNm**&lt;br /&gt;
**SwBh**&lt;br /&gt;
**TCal**&lt;br /&gt;
**VBCA**&lt;br /&gt;
**VBST**&lt;br /&gt;
**VPBR**&lt;br /&gt;
**W24R**&lt;br /&gt;
**WCAL**&lt;br /&gt;
**WMac**&lt;br /&gt;
**WRxT**&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Nvmefwupdater&amp;diff=98966</id>
		<title>Nvmefwupdater</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Nvmefwupdater&amp;diff=98966"/>
		<updated>2020-01-30T11:40:30Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''nvmefwupdater''' is a tool used by Apple to update the NAND firmware.  &lt;br /&gt;
&lt;br /&gt;
== About ==&lt;br /&gt;
&amp;quot;NVMe (non-volatile memory express) is a host controller interface and storage protocol created to accelerate the transfer of data between enterprise and client systems and solid-state drives (SSDs) over a computer's high-speed Peripheral Component Interconnect Express (PCIe) bus.&amp;quot; - [https://searchstorage.techtarget.com/definition/NVMe-non-volatile-memory-express]&lt;br /&gt;
&lt;br /&gt;
The nvmefwupdater can be found on update ramdisks, however the nand firmware and bfh loader can only be found in certain OTA updates.  &lt;br /&gt;
&lt;br /&gt;
== Update progress ==&lt;br /&gt;
1. The NVMe firmware updater talks to the AppleEmbeddedNVMeController kext&lt;br /&gt;
&lt;br /&gt;
2. The [https://iphonedevwiki.net/index.php/AppleEmbeddedNVMeController AppleEmbeddedNVMeController userclient] will try to place the NVMe in BFH mode&lt;br /&gt;
&lt;br /&gt;
3. The BFH loader (Ex: /usr/standalone/firmware/BFH/s3e-bfh-loader.bin) is loaded into memory using DMA (Direct Memory Access) transfer commands&lt;br /&gt;
&lt;br /&gt;
4. Now the firmware matching the nand model and revision is loaded, a .pak file in (/usr/standalone/firmware/)&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Nvmefwupdater&amp;diff=98965</id>
		<title>Nvmefwupdater</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Nvmefwupdater&amp;diff=98965"/>
		<updated>2020-01-30T11:40:15Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''nvmefwupdater''' is a tool used by Apple to update the NAND firmware.  &lt;br /&gt;
&lt;br /&gt;
== About ==&lt;br /&gt;
&amp;quot;NVMe (non-volatile memory express) is a host controller interface and storage protocol created to accelerate the transfer of data between enterprise and client systems and solid-state drives (SSDs) over a computer's high-speed Peripheral Component Interconnect Express (PCIe) bus.&amp;quot; - [https://searchstorage.techtarget.com/definition/NVMe-non-volatile-memory-express]&lt;br /&gt;
&lt;br /&gt;
The nvmefwupdater can be found on update ramdisks, however the nand firmware and bfh loader can only be found in certain OTA updates.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Update progress ==&lt;br /&gt;
1. The NVMe firmware updater talks to the AppleEmbeddedNVMeController kext&lt;br /&gt;
&lt;br /&gt;
2. The [https://iphonedevwiki.net/index.php/AppleEmbeddedNVMeController AppleEmbeddedNVMeController userclient] will try to place the NVMe in BFH mode&lt;br /&gt;
&lt;br /&gt;
3. The BFH loader (Ex: /usr/standalone/firmware/BFH/s3e-bfh-loader.bin) is loaded into memory using DMA (Direct Memory Access) transfer commands&lt;br /&gt;
&lt;br /&gt;
4. Now the firmware matching the nand model and revision is loaded, a .pak file in (/usr/standalone/firmware/)&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Nvmefwupdater&amp;diff=98964</id>
		<title>Nvmefwupdater</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Nvmefwupdater&amp;diff=98964"/>
		<updated>2020-01-30T11:37:22Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''nvmefwupdater''' is a tool used by Apple to update the NAND firmware.  &lt;br /&gt;
&lt;br /&gt;
== About ==&lt;br /&gt;
&amp;quot;NVMe (non-volatile memory express) is a host controller interface and storage protocol created to accelerate the transfer of data between enterprise and client systems and solid-state drives (SSDs) over a computer's high-speed Peripheral Component Interconnect Express (PCIe) bus.&amp;quot; - [https://searchstorage.techtarget.com/definition/NVMe-non-volatile-memory-express]&lt;br /&gt;
&lt;br /&gt;
The nvmefwupdater can be found on update ramdisks, however the nand firmware and bfh loader can only be found in certain OTA updates.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Update progress ==&lt;br /&gt;
1. The NVMe firmware updater talks to the AppleEmbeddedNVMeController kext&lt;br /&gt;
&lt;br /&gt;
2. The userclient will try to place the NVMe in BFH mode&lt;br /&gt;
&lt;br /&gt;
3. The BFH loader (Ex: /usr/standalone/firmware/BFH/s3e-bfh-loader.bin) is loaded into memory using DMA (Direct Memory Access) transfer commands&lt;br /&gt;
&lt;br /&gt;
4. Now the firmware matching the nand model and revision is loaded, a .pak file in (/usr/standalone/firmware/)&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Nvmefwupdater&amp;diff=98963</id>
		<title>Nvmefwupdater</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Nvmefwupdater&amp;diff=98963"/>
		<updated>2020-01-30T11:29:01Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: Created page with &amp;quot;'''nvmefwupdater''' is a tool used by Apple to update the NAND firmware.    == About == &amp;quot;NVMe (non-volatile memory express) is a host controller interface and storage protocol...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''nvmefwupdater''' is a tool used by Apple to update the NAND firmware.  &lt;br /&gt;
&lt;br /&gt;
== About ==&lt;br /&gt;
&amp;quot;NVMe (non-volatile memory express) is a host controller interface and storage protocol created to accelerate the transfer of data between enterprise and client systems and solid-state drives (SSDs) over a computer's high-speed Peripheral Component Interconnect Express (PCIe) bus.&amp;quot; - [[source]https://searchstorage.techtarget.com/definition/NVMe-non-volatile-memory-express]&lt;br /&gt;
&lt;br /&gt;
The NVMe firmware updater talks to the AppleEmbeddedNVMeController kext.  &lt;br /&gt;
It will attempt to put the NAND in BFH mode&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=MobileDevice_Library&amp;diff=98886</id>
		<title>MobileDevice Library</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=MobileDevice_Library&amp;diff=98886"/>
		<updated>2020-01-24T13:18:27Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{float toc|right}}&lt;br /&gt;
MobileDevice Library is used by [[iTunes]] to transfer data between iPhone and computer over both USB and WiFi connections.&lt;br /&gt;
&lt;br /&gt;
=== Windows: iTunesMobileDevice.dll ===&lt;br /&gt;
* Location: &amp;lt;code&amp;gt;C:\Program Files\Common Files\Apple\Mobile Device Support\iTunesMobileDevice.dll&amp;lt;/code&amp;gt; (&amp;lt;code&amp;gt;Program Files (x86)&amp;lt;/code&amp;gt; on 64-bit)&lt;br /&gt;
* Supporting CoreFoundation.dll (used for CFStringRef, CFPropertyListRef management) is located in the same dir (when using [[iTunes]] prior 9.0). &lt;br /&gt;
* For [[iTunes]] 9.0, the location of CoreFoundation.dll is stored in '''InstallDir''' registry value under '''HKLM\SOFTWARE\Apple Inc.\Apple Application Support''' registry key.&lt;br /&gt;
&lt;br /&gt;
=== Mac OS X: MobileDevice.framework ===&lt;br /&gt;
* Location: /System/Library/PrivateFrameworks/MobileDevice.framework&lt;br /&gt;
* Export command: &amp;lt;code&amp;gt;nm /System/Library/PrivateFrameworks/MobileDevice.framework/Versions/A/MobileDevice&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Library Interfaces ===&lt;br /&gt;
* [http://www.libimobiledevice.org/ libimobiledevice] (provides the same functionality on GNU/Linux)&lt;br /&gt;
* [https://github.com/imkira/mobiledevice mobiledevice] (command line utility for interacting with MobileDevice Framework)&lt;br /&gt;
* [https://github.com/samdmarshall/SDMMobileDevice SDMMobileDevice] (OS X framework written in C that can be used interchangeably with Apple's private framework MobileDevice.framework)&lt;br /&gt;
* [https://bitbucket.org/tristero/mobiledeviceaccess MobileDeviceAccess] (similar to above, but written in Objective-C)&lt;br /&gt;
* [http://samdmarshall.com/media/MobileDevice.h MobileDevice.h] (old reverse engineered header for interfacing with MobileDevice library)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Private Functions ===&lt;br /&gt;
&lt;br /&gt;
==== Obtaining address ====&lt;br /&gt;
In order to obtain the address of a usable private function in MobileDevice, you will have to be able to understand x86-64 assembly to reverse engineer it. These methods differ slightly based on platform due to how dynamically linked libraries handle position independent code.&lt;br /&gt;
&lt;br /&gt;
=====Mac OS X (MobileDevice.framework)=====&lt;br /&gt;
A private function is not marked as exported in the mach-o symbol table. This means it cannot be called by simply linking against the library. To call unexported functions, the mach-o symbol table must be stepped through manually to find the offset of a particular function call. Calls can be verified by checking against the offset of the name inside the name table.&lt;br /&gt;
&lt;br /&gt;
=====Windows (MobileDevice.dll)=====&lt;br /&gt;
Unlike OS X's dynamically linkable libraries, Windows dynamic libraries do not support position independent code in the same manner. A private function will not have its name in the exported symbol table, so in a debugger, like GDB, it will show up as part of another function. However, you will know that it is a separate function as a new stack frame is set up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Known Error Codes ===&lt;br /&gt;
* kAMDSuccess = 0x0&lt;br /&gt;
* kAMDUndefinedError = 0xe8000001&lt;br /&gt;
* kAMDBadHeaderError = 0xe8000002&lt;br /&gt;
* kAMDNoResourcesError = 0xe8000003&lt;br /&gt;
* kAMDReadError = 0xe8000004&lt;br /&gt;
* kAMDWriteError = 0xe8000005&lt;br /&gt;
* kAMDUnknownPacketError = 0xe8000006&lt;br /&gt;
* kAMDInvalidArgumentError = 0xe8000007&lt;br /&gt;
* kAMDNotFoundError = 0xe8000008&lt;br /&gt;
* kAMDIsDirectoryError = 0xe8000009&lt;br /&gt;
* kAMDPermissionError = 0xe800000a&lt;br /&gt;
* kAMDNotConnectedError = 0xe800000b&lt;br /&gt;
* kAMDTimeOutError = 0xe800000c&lt;br /&gt;
* kAMDOverrunError = 0xe800000d&lt;br /&gt;
* kAMDEOFError = 0xe800000e&lt;br /&gt;
* kAMDUnsupportedError = 0xe800000f&lt;br /&gt;
* kAMDFileExistsError = 0xe8000010&lt;br /&gt;
* kAMDBusyError = 0xe8000011&lt;br /&gt;
* kAMDCryptoError = 0xe8000012&lt;br /&gt;
* kAMDInvalidResponseError = 0xe8000013&lt;br /&gt;
* kAMDMissingKeyError = 0xe8000014&lt;br /&gt;
* kAMDMissingValueError = 0xe8000015&lt;br /&gt;
* kAMDGetProhibitedError = 0xe8000016&lt;br /&gt;
* kAMDSetProhibitedError = 0xe8000017&lt;br /&gt;
* kAMDRemoveProhibitedError = 0xe8000018&lt;br /&gt;
* kAMDImmutableValueError = 0xe8000019&lt;br /&gt;
* kAMDPasswordProtectedError = 0xe800001a&lt;br /&gt;
* kAMDMissingHostIDError = 0xe800001b&lt;br /&gt;
* kAMDInvalidHostIDError = 0xe800001c&lt;br /&gt;
* kAMDSessionActiveError = 0xe800001d&lt;br /&gt;
* kAMDSessionInactiveError = 0xe800001e&lt;br /&gt;
* kAMDMissingSessionIDError = 0xe800001f&lt;br /&gt;
* kAMDInvalidSessionIDError = 0xe8000020&lt;br /&gt;
* kAMDMissingServiceError = 0xe8000021&lt;br /&gt;
* kAMDInvalidServiceError = 0xe8000022&lt;br /&gt;
* kAMDInvalidCheckinError = 0xe8000023&lt;br /&gt;
* kAMDCheckinTimeoutError = 0xe8000024&lt;br /&gt;
* kAMDMissingPairRecordError = 0xe8000025&lt;br /&gt;
* kAMDInvalidActivationRecordError = 0xe8000026&lt;br /&gt;
* kAMDMissingActivationRecordError = 0xe8000027&lt;br /&gt;
* kAMDWrongDroidError = 0xe8000028&lt;br /&gt;
* kAMDSUVerificationError = 0xe8000029&lt;br /&gt;
* kAMDSUPatchError = 0xe800002a&lt;br /&gt;
* kAMDSUFirmwareError = 0xe800002b&lt;br /&gt;
* kAMDProvisioningProfileNotValid = 0xe800002c&lt;br /&gt;
* kAMDSendMessageError = 0xe800002d&lt;br /&gt;
* kAMDReceiveMessageError = 0xe800002e&lt;br /&gt;
* kAMDMissingOptionsError = 0xe800002f&lt;br /&gt;
* kAMDMissingImageTypeError = 0xe8000030&lt;br /&gt;
* kAMDDigestFailedError = 0xe8000031&lt;br /&gt;
* kAMDStartServiceError = 0xe8000032&lt;br /&gt;
* kAMDInvalidDiskImageError = 0xe8000033&lt;br /&gt;
* kAMDMissingDigestError = 0xe8000034&lt;br /&gt;
* kAMDMuxError = 0xe8000035&lt;br /&gt;
* kAMDApplicationAlreadyInstalledError = 0xe8000036&lt;br /&gt;
* kAMDApplicationMoveFailedError = 0xe8000037&lt;br /&gt;
* kAMDApplicationSINFCaptureFailedError = 0xe8000038&lt;br /&gt;
* kAMDApplicationSandboxFailedError = 0xe8000039&lt;br /&gt;
* kAMDApplicationVerificationFailedError = 0xe800003a&lt;br /&gt;
* kAMDArchiveDestructionFailedError = 0xe800003b&lt;br /&gt;
* kAMDBundleVerificationFailedError = 0xe800003c&lt;br /&gt;
* kAMDCarrierBundleCopyFailedError = 0xe800003d&lt;br /&gt;
* kAMDCarrierBundleDirectoryCreationFailedError = 0xe800003e&lt;br /&gt;
* kAMDCarrierBundleMissingSupportedSIMsError = 0xe800003f&lt;br /&gt;
* kAMDCommCenterNotificationFailedError = 0xe8000040&lt;br /&gt;
* kAMDContainerCreationFailedError = 0xe8000041&lt;br /&gt;
* kAMDContainerP0wnFailedError = 0xe8000042&lt;br /&gt;
* kAMDContainerRemovalFailedError = 0xe8000043&lt;br /&gt;
* kAMDEmbeddedProfileInstallFailedError = 0xe8000044&lt;br /&gt;
* kAMDErrorError = 0xe8000045&lt;br /&gt;
* kAMDExecutableTwiddleFailedError = 0xe8000046&lt;br /&gt;
* kAMDExistenceCheckFailedError = 0xe8000047&lt;br /&gt;
* kAMDInstallMapUpdateFailedError = 0xe8000048&lt;br /&gt;
* kAMDManifestCaptureFailedError = 0xe8000049&lt;br /&gt;
* kAMDMapGenerationFailedError = 0xe800004a&lt;br /&gt;
* kAMDMissingBundleExecutableError = 0xe800004b&lt;br /&gt;
* kAMDMissingBundleIdentifierError = 0xe800004c&lt;br /&gt;
* kAMDMissingBundlePathError = 0xe800004d&lt;br /&gt;
* kAMDMissingContainerError = 0xe800004e&lt;br /&gt;
* kAMDNotificationFailedError = 0xe800004f&lt;br /&gt;
* kAMDPackageExtractionFailedError = 0xe8000050&lt;br /&gt;
* kAMDPackageInspectionFailedError = 0xe8000051&lt;br /&gt;
* kAMDPackageMoveFailedError = 0xe8000052&lt;br /&gt;
* kAMDPathConversionFailedError = 0xe8000053&lt;br /&gt;
* kAMDRestoreContainerFailedError = 0xe8000054&lt;br /&gt;
* kAMDSeatbeltProfileRemovalFailedError = 0xe8000055&lt;br /&gt;
* kAMDStageCreationFailedError = 0xe8000056&lt;br /&gt;
* kAMDSymlinkFailedError = 0xe8000057&lt;br /&gt;
* kAMDiTunesArtworkCaptureFailedError = 0xe8000058&lt;br /&gt;
* kAMDiTunesMetadataCaptureFailedError = 0xe8000059&lt;br /&gt;
* kAMDAlreadyArchivedError = 0xe800005a&lt;br /&gt;
* kAMDProhibitedBySupervision = 0xe8000083&lt;br /&gt;
&lt;br /&gt;
For the latest error codes you can look at the pseudo-code of AMDErrorString&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Carousel&amp;diff=98336</id>
		<title>Carousel</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Carousel&amp;diff=98336"/>
		<updated>2019-11-27T16:12:54Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Carousel.jpeg|320px]]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
== Summary ==&lt;br /&gt;
Carousel is essentially watchOS's graphical user interface (much the same as GNOME is to Linux, Explorer is to Microsoft Windows, and Finder is to Mac OS) and manages graphical services such as icons and multitasking. When it is launched, it registers PurpleSystemEventPort, essentially making it the main application.&lt;br /&gt;
Perhaps you already know about SpringBoard on iOS, Carousel is the equivalent to it for watchOS devices.&lt;br /&gt;
&lt;br /&gt;
=== Primary Functions===&lt;br /&gt;
* Carousel acts a stacking window manager, rendering the child applications&lt;br /&gt;
* Carousel activates/deactivates and manages memory of the UIKit applications it launches&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Carousel&amp;diff=98335</id>
		<title>Carousel</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Carousel&amp;diff=98335"/>
		<updated>2019-11-27T16:11:19Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:320px-Carousel.jpeg]]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
== Summary ==&lt;br /&gt;
Carousel is essentially watchOS's graphical user interface (much the same as GNOME is to Linux, Explorer is to Microsoft Windows, and Finder is to Mac OS) and manages graphical services such as icons and multitasking. When it is launched, it registers PurpleSystemEventPort, essentially making it the main application.&lt;br /&gt;
Perhaps you already know about SpringBoard on iOS, Carousel is the equivalent to it for watchOS devices.&lt;br /&gt;
&lt;br /&gt;
=== Primary Functions===&lt;br /&gt;
* Carousel acts a stacking window manager, rendering the child applications&lt;br /&gt;
* Carousel activates/deactivates and manages memory of the UIKit applications it launches&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Carousel&amp;diff=98334</id>
		<title>Carousel</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Carousel&amp;diff=98334"/>
		<updated>2019-11-27T16:11:05Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
----&lt;br /&gt;
[[File:320px-Carousel.jpeg]]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
== Summary ==&lt;br /&gt;
Carousel is essentially watchOS's graphical user interface (much the same as GNOME is to Linux, Explorer is to Microsoft Windows, and Finder is to Mac OS) and manages graphical services such as icons and multitasking. When it is launched, it registers PurpleSystemEventPort, essentially making it the main application.&lt;br /&gt;
Perhaps you already know about SpringBoard on iOS, Carousel is the equivalent to it for watchOS devices.&lt;br /&gt;
&lt;br /&gt;
=== Primary Functions===&lt;br /&gt;
* Carousel acts a stacking window manager, rendering the child applications&lt;br /&gt;
* Carousel activates/deactivates and manages memory of the UIKit applications it launches&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Carousel&amp;diff=98333</id>
		<title>Carousel</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Carousel&amp;diff=98333"/>
		<updated>2019-11-27T16:10:09Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: Created page with &amp;quot;File:Carousel.jpeg __NOTOC__ == Summary == Carousel is essentially watchOS's graphical user interface (much the same as GNOME is to Linux, Explorer is to Microsoft Windows...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Carousel.jpeg]]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
== Summary ==&lt;br /&gt;
Carousel is essentially watchOS's graphical user interface (much the same as GNOME is to Linux, Explorer is to Microsoft Windows, and Finder is to Mac OS) and manages graphical services such as icons and multitasking. When it is launched, it registers PurpleSystemEventPort, essentially making it the main application.&lt;br /&gt;
Perhaps you already know about SpringBoard on iOS, Carousel is the equivalent to it for watchOS devices.&lt;br /&gt;
&lt;br /&gt;
=== Primary Functions===&lt;br /&gt;
* Carousel acts a stacking window manager, rendering the child applications&lt;br /&gt;
* Carousel activates/deactivates and manages memory of the UIKit applications it launches&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=File:Carousel.jpeg&amp;diff=98332</id>
		<title>File:Carousel.jpeg</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=File:Carousel.jpeg&amp;diff=98332"/>
		<updated>2019-11-27T16:09:39Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=PeaceC_16C50_(iPad7,5)&amp;diff=76842</id>
		<title>PeaceC 16C50 (iPad7,5)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=PeaceC_16C50_(iPad7,5)&amp;diff=76842"/>
		<updated>2019-10-03T00:52:11Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: Decrypted SEP&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version             = 12.1.1&lt;br /&gt;
 | Build               = 16C50&lt;br /&gt;
 | Device              = iPad7,5&lt;br /&gt;
 | Codename            = PeaceC&lt;br /&gt;
 | DownloadURL         = http://updates-http.cdn-apple.com/2018FallFCS/fullrestores/041-05470/5863A30A-E9F9-11E8-89CA-DE55C29EBEDD/iPad_64bit_TouchID_ASTC_12.1.1_16C50_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | RootFS              = 048-40444-058&lt;br /&gt;
 | RootFSKey           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk       = 048-40327-058&lt;br /&gt;
 | UpdateRamdiskIV     = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk      = 048-40310-058&lt;br /&gt;
 | RestoreRamdiskIV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo           = applelogo@2x~ipad.im4p&lt;br /&gt;
 | AppleLogoIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AOPFirmware         = aopfw-ipad7baop.im4p&lt;br /&gt;
 | AOPFirmwareIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0    = batterycharging0@2x~ipad.im4p&lt;br /&gt;
 | BatteryCharging0IV  = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1    = batterycharging1@2x~ipad.im4p&lt;br /&gt;
 | BatteryCharging1IV  = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull         = batteryfull@2x~ipad.im4p&lt;br /&gt;
 | BatteryFullIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0         = batterylow0@2x~ipad.im4p&lt;br /&gt;
 | BatteryLow0IV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1         = batterylow1@2x~ipad.im4p&lt;br /&gt;
 | BatteryLow1IV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree          = DeviceTree.j71bap.im4p&lt;br /&gt;
 | DeviceTreeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin         = glyphplugin@2x~ipad-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                = iBEC.ipad7b.RELEASE.im4p&lt;br /&gt;
 | iBECIV              = ef6c2d88db083fdb656c8c637455fb5c&lt;br /&gt;
 | iBECKey             = 4764a65b48b053bc55531fb78cdc10616d127a54d6f73d433a3bb5e965045b6e&lt;br /&gt;
&lt;br /&gt;
 | iBoot               = iBoot.ipad7b.RELEASE.im4p&lt;br /&gt;
 | iBootIV             = 4c04a0d71f43d41691a2af5986365c9b&lt;br /&gt;
 | iBootKey            = be6e91d41a589ff1a6d33544d53a8687ecd5936687b785932df04845689ac538&lt;br /&gt;
&lt;br /&gt;
 | iBSS                = iBSS.ipad7b.RELEASE.im4p&lt;br /&gt;
 | iBSSIV              = 77929c9327f952b69fa78b6ab068e2e9&lt;br /&gt;
 | iBSSKey             = 2f3eb57425b55178002440b6980f2712e3816f0dae908ae000c0ecfd6671eb2a&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache         = kernelcache.release.ipad7b&lt;br /&gt;
 | KernelcacheIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                 = LLB.ipad7b.RELEASE.im4p&lt;br /&gt;
 | LLBIV               = 193ebe58a15b00617537fbec853db3c6&lt;br /&gt;
 | LLBKey              = 8ac15c4b2164b96345002a054c67fc71a52af91d92ae2ddaeeac01bfeae750cd&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode        = recoverymode@2x~ipad-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware         = sep-firmware.j71b.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV       = 4c5ee90c5b16df6d2944fab2ce71e7e&lt;br /&gt;
 | SEPFirmwareKey      = 64d00c87a8ad36b6812c062b881734b324701e8af5183c8e2f78110c3cc9cfc4b&lt;br /&gt;
 | SEPFirmwareKBAG     = F934BF35EA161DF7E806058B84F107CAD03C6DAC377EA20063C07822319C5C148E8691E08571AEC56E1011339D8549C2&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Trek-3.4.03&amp;diff=71497</id>
		<title>Trek-3.4.03</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Trek-3.4.03&amp;diff=71497"/>
		<updated>2018-11-17T00:22:16Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: Xnudaemon moved page 3.4.03 to Trek-3.4.03&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Trek Baseband 3.4.03 ==&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''iPhone 4S'''&lt;br /&gt;
&lt;br /&gt;
Chip ID: 0x5a00e1.&lt;br /&gt;
&lt;br /&gt;
Internal Chip name: qsc6695.&lt;br /&gt;
&lt;br /&gt;
Full Internal Chip name: q6695-SSMFTSZ-4307. (Found in DBL.mbn)&lt;br /&gt;
&lt;br /&gt;
OS Bootloader version: Q62xx-OSBL.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Trek Firmware ==&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
The internal name for the baseband firmware is Trek.&lt;br /&gt;
&lt;br /&gt;
Trek can be extracted from an iOS firmware image (ipsw file).&lt;br /&gt;
&lt;br /&gt;
Trek does not seem to be encrypted and therefore can easily be reverse engineered.&lt;br /&gt;
&lt;br /&gt;
At the bottom of each file you can see a code signing certificate, as the firmware needs to be code signed just like Apple iOS firmware does.&lt;br /&gt;
&lt;br /&gt;
All baseband chips up to today are produced by Qualcomm.&lt;br /&gt;
&lt;br /&gt;
The architecture of the chip seems to be ARM as I already expected.&lt;br /&gt;
&lt;br /&gt;
The baseband chip is completely separated from iOS and is only referenced through the kernel and through the bbupdater utility.&lt;br /&gt;
&lt;br /&gt;
CommCenter seems to be a highlevel framework on top of the baseband providing an interface that iOS can work with.&lt;br /&gt;
&lt;br /&gt;
The filesystem used by the baseband seems to be YAFFS (Yet Another Flash FileSystem)&lt;br /&gt;
&lt;br /&gt;
== Firmware Structure ==&lt;br /&gt;
&lt;br /&gt;
As mentioned above, the baseband firmware is not encrypted and when taken from iOS Firmware it will be named ending with a .bbfw (Basebandfirmware) extension.&lt;br /&gt;
&lt;br /&gt;
However when running file on that firmware image you can see that it's just a zip file, just like ipsw files are thus extracting it gives us new, unencrypted files:&lt;br /&gt;
&lt;br /&gt;
- Info.plist&lt;br /&gt;
&lt;br /&gt;
- Options.plist&lt;br /&gt;
&lt;br /&gt;
- amss.mbn (The baseband operating system)&lt;br /&gt;
&lt;br /&gt;
- dbl.mbn (Assumably, factory DFU bootloader)&lt;br /&gt;
&lt;br /&gt;
- osbl.mbn (The Bootloader that bootstraps the normal operating system of the baseband)&lt;br /&gt;
&lt;br /&gt;
- restoredbl.mbn (The restore bootloader)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Info.plist''' &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
contains some basic information about the chip id and firmware version, it can be compared to the BuildManifest.plist file in iOS firmware.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Options.plist'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I haven't figured out what this is for yet but as the name suggest it is mostlikely for configuration purposes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''AMSS.mbn'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This file is what I believe the baseband operating system, file reports that it consists of ARM code.&lt;br /&gt;
&lt;br /&gt;
At the bottom of the file the codesignature can again be found.&lt;br /&gt;
&lt;br /&gt;
It also seems to contain the filesystem for the nand which is all unencrypted thus pretty interesting.&lt;br /&gt;
&lt;br /&gt;
The filesystem will be explained further on this wiki when I have time for it.&lt;br /&gt;
&lt;br /&gt;
What's the most remarkable are strings revealing how to enter specific device modes:&lt;br /&gt;
&lt;br /&gt;
Hold * key   to reset &amp;amp;  log abort&lt;br /&gt;
Hold # key   to enter    dload mode&lt;br /&gt;
&lt;br /&gt;
The dload mode is probably download mode, it is probably comparable to iBoot's communication where you can upload files into iBoot's memory/&lt;br /&gt;
&lt;br /&gt;
For those looking for vulnerabilities in the baseband firmware one string already made me raise a flag.&lt;br /&gt;
&lt;br /&gt;
The baseband seems to support the parsing of property list files.&lt;br /&gt;
&lt;br /&gt;
Because property list files define a type, a user controlled modded type might lead to type confusion bugs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OSBL.mbn'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
OSBL reveals a lot of information about the architecture and internal names and hardware identifiers of the baseband chip.&lt;br /&gt;
&lt;br /&gt;
It also contains references to sourcecode files that tell us that the baseband firmware was written in C, as expected.&lt;br /&gt;
&lt;br /&gt;
OSBL is what I believe an abbreviation of Operating System Bootloader.&lt;br /&gt;
&lt;br /&gt;
By just looking at the strings of the file you can determine a few serial numbers that this firmware is meant for and the name of the chip:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
MT29F4G16ABC&lt;br /&gt;
&lt;br /&gt;
MT29F4G08ABC&lt;br /&gt;
&lt;br /&gt;
MT29F2G16ABD&lt;br /&gt;
&lt;br /&gt;
MT29F2G08ABD&lt;br /&gt;
&lt;br /&gt;
KFN4G16Q2A-DEB8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q62xx-OSBL (The bootloader build version, I think)&lt;br /&gt;
&lt;br /&gt;
QSC6695 (The name of the chip as used internally at Qualcomm, if you look it up you can find some chinese suppliers that sell it.)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The strings also reveal the following source code structure:&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\dload\target\qsc6695\src\dloadarm.c&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_elf_loader.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_elf_loader_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_sec_elf_loader.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_sec_elf_loader_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_clobber_prot.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_clobber_prot_local.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_flash_dev_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_hash_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_auth_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_fsbl_config_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\target\qsc6695\src\boot_pbl_accessor.c&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\shared\src\osbl_mc.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\shared\src\osbl_loader.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\shared\src\osbl_error_handler.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\shared\src\osbl_hash.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\shared\src\osbl_shared_seg.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\target\qsc6695\src\osbl_stubs.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\target\qsc6695\src\osbl_hw_init.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\target\qsc6695\src\osbl_mc_target.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\target\qsc6695\src\osbl_target.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\target\qsc6695\src\osbl_sahara.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\amssboot\target\qsc6695\src\boot_shared_progressive_boot_block.c&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Looking at these you might get a better idea of the bootstages of the iPhone baseband.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''DBL.mbn'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This debugging bootloader, in my thoughts a DFU mode seems to be able to make ROM dumps as well.&lt;br /&gt;
&lt;br /&gt;
- mav_core_dump.bin&lt;br /&gt;
&lt;br /&gt;
- mav_hsic_dump.bin&lt;br /&gt;
&lt;br /&gt;
- mav_nor_dump.bin&lt;br /&gt;
&lt;br /&gt;
- sdram_dump.bin&lt;br /&gt;
&lt;br /&gt;
- iram_dump.bin&lt;br /&gt;
&lt;br /&gt;
These are all strings that reveal these dumps can be generated taken from the start of this bootloader.&lt;br /&gt;
&lt;br /&gt;
What also is interesting is the information revealing the hardware ID in a lower section just after the codesignature:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07 0000 SHA11&lt;br /&gt;
&lt;br /&gt;
06 0000 MODEL_ID1&lt;br /&gt;
&lt;br /&gt;
05 00002000 SW_SIZE1&lt;br /&gt;
&lt;br /&gt;
04 0023 OEM_ID1&amp;quot;0&lt;br /&gt;
&lt;br /&gt;
03 000000000000000F DEBUG1&amp;quot;0&lt;br /&gt;
&lt;br /&gt;
02 005000E100230000 HW_ID1&amp;quot;0&lt;br /&gt;
&lt;br /&gt;
01 0000000000000000 SW_ID1&lt;br /&gt;
&lt;br /&gt;
Maverick1&lt;br /&gt;
&lt;br /&gt;
Onur Tackin0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This image also mentions HS-USBCORE (HighSpeed USB-Core)&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=3.4.03&amp;diff=71498</id>
		<title>3.4.03</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=3.4.03&amp;diff=71498"/>
		<updated>2018-11-17T00:22:16Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: Xnudaemon moved page 3.4.03 to Trek-3.4.03&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[Trek-3.4.03]]&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Trek-3.4.03&amp;diff=71496</id>
		<title>Trek-3.4.03</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Trek-3.4.03&amp;diff=71496"/>
		<updated>2018-11-17T00:20:12Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: /* Trek Firmware */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Trek Baseband 3.4.03 ==&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''iPhone 4S'''&lt;br /&gt;
&lt;br /&gt;
Chip ID: 0x5a00e1.&lt;br /&gt;
&lt;br /&gt;
Internal Chip name: qsc6695.&lt;br /&gt;
&lt;br /&gt;
Full Internal Chip name: q6695-SSMFTSZ-4307. (Found in DBL.mbn)&lt;br /&gt;
&lt;br /&gt;
OS Bootloader version: Q62xx-OSBL.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Trek Firmware ==&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
The internal name for the baseband firmware is Trek.&lt;br /&gt;
&lt;br /&gt;
Trek can be extracted from an iOS firmware image (ipsw file).&lt;br /&gt;
&lt;br /&gt;
Trek does not seem to be encrypted and therefore can easily be reverse engineered.&lt;br /&gt;
&lt;br /&gt;
At the bottom of each file you can see a code signing certificate, as the firmware needs to be code signed just like Apple iOS firmware does.&lt;br /&gt;
&lt;br /&gt;
All baseband chips up to today are produced by Qualcomm.&lt;br /&gt;
&lt;br /&gt;
The architecture of the chip seems to be ARM as I already expected.&lt;br /&gt;
&lt;br /&gt;
The baseband chip is completely separated from iOS and is only referenced through the kernel and through the bbupdater utility.&lt;br /&gt;
&lt;br /&gt;
CommCenter seems to be a highlevel framework on top of the baseband providing an interface that iOS can work with.&lt;br /&gt;
&lt;br /&gt;
The filesystem used by the baseband seems to be YAFFS (Yet Another Flash FileSystem)&lt;br /&gt;
&lt;br /&gt;
== Firmware Structure ==&lt;br /&gt;
&lt;br /&gt;
As mentioned above, the baseband firmware is not encrypted and when taken from iOS Firmware it will be named ending with a .bbfw (Basebandfirmware) extension.&lt;br /&gt;
&lt;br /&gt;
However when running file on that firmware image you can see that it's just a zip file, just like ipsw files are thus extracting it gives us new, unencrypted files:&lt;br /&gt;
&lt;br /&gt;
- Info.plist&lt;br /&gt;
&lt;br /&gt;
- Options.plist&lt;br /&gt;
&lt;br /&gt;
- amss.mbn (The baseband operating system)&lt;br /&gt;
&lt;br /&gt;
- dbl.mbn (Assumably, factory DFU bootloader)&lt;br /&gt;
&lt;br /&gt;
- osbl.mbn (The Bootloader that bootstraps the normal operating system of the baseband)&lt;br /&gt;
&lt;br /&gt;
- restoredbl.mbn (The restore bootloader)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Info.plist''' &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
contains some basic information about the chip id and firmware version, it can be compared to the BuildManifest.plist file in iOS firmware.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Options.plist'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I haven't figured out what this is for yet but as the name suggest it is mostlikely for configuration purposes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''AMSS.mbn'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This file is what I believe the baseband operating system, file reports that it consists of ARM code.&lt;br /&gt;
&lt;br /&gt;
At the bottom of the file the codesignature can again be found.&lt;br /&gt;
&lt;br /&gt;
It also seems to contain the filesystem for the nand which is all unencrypted thus pretty interesting.&lt;br /&gt;
&lt;br /&gt;
The filesystem will be explained further on this wiki when I have time for it.&lt;br /&gt;
&lt;br /&gt;
What's the most remarkable are strings revealing how to enter specific device modes:&lt;br /&gt;
&lt;br /&gt;
Hold * key   to reset &amp;amp;  log abort&lt;br /&gt;
Hold # key   to enter    dload mode&lt;br /&gt;
&lt;br /&gt;
The dload mode is probably download mode, it is probably comparable to iBoot's communication where you can upload files into iBoot's memory/&lt;br /&gt;
&lt;br /&gt;
For those looking for vulnerabilities in the baseband firmware one string already made me raise a flag.&lt;br /&gt;
&lt;br /&gt;
The baseband seems to support the parsing of property list files.&lt;br /&gt;
&lt;br /&gt;
Because property list files define a type, a user controlled modded type might lead to type confusion bugs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OSBL.mbn'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
OSBL reveals a lot of information about the architecture and internal names and hardware identifiers of the baseband chip.&lt;br /&gt;
&lt;br /&gt;
It also contains references to sourcecode files that tell us that the baseband firmware was written in C, as expected.&lt;br /&gt;
&lt;br /&gt;
OSBL is what I believe an abbreviation of Operating System Bootloader.&lt;br /&gt;
&lt;br /&gt;
By just looking at the strings of the file you can determine a few serial numbers that this firmware is meant for and the name of the chip:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
MT29F4G16ABC&lt;br /&gt;
&lt;br /&gt;
MT29F4G08ABC&lt;br /&gt;
&lt;br /&gt;
MT29F2G16ABD&lt;br /&gt;
&lt;br /&gt;
MT29F2G08ABD&lt;br /&gt;
&lt;br /&gt;
KFN4G16Q2A-DEB8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q62xx-OSBL (The bootloader build version, I think)&lt;br /&gt;
&lt;br /&gt;
QSC6695 (The name of the chip as used internally at Qualcomm, if you look it up you can find some chinese suppliers that sell it.)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The strings also reveal the following source code structure:&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\dload\target\qsc6695\src\dloadarm.c&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_elf_loader.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_elf_loader_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_sec_elf_loader.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_sec_elf_loader_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_clobber_prot.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_clobber_prot_local.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_flash_dev_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_hash_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_auth_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_fsbl_config_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\target\qsc6695\src\boot_pbl_accessor.c&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\shared\src\osbl_mc.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\shared\src\osbl_loader.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\shared\src\osbl_error_handler.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\shared\src\osbl_hash.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\shared\src\osbl_shared_seg.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\target\qsc6695\src\osbl_stubs.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\target\qsc6695\src\osbl_hw_init.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\target\qsc6695\src\osbl_mc_target.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\target\qsc6695\src\osbl_target.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\target\qsc6695\src\osbl_sahara.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\amssboot\target\qsc6695\src\boot_shared_progressive_boot_block.c&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Looking at these you might get a better idea of the bootstages of the iPhone baseband.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''DBL.mbn'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This debugging bootloader, in my thoughts a DFU mode seems to be able to make ROM dumps as well.&lt;br /&gt;
&lt;br /&gt;
- mav_core_dump.bin&lt;br /&gt;
&lt;br /&gt;
- mav_hsic_dump.bin&lt;br /&gt;
&lt;br /&gt;
- mav_nor_dump.bin&lt;br /&gt;
&lt;br /&gt;
- sdram_dump.bin&lt;br /&gt;
&lt;br /&gt;
- iram_dump.bin&lt;br /&gt;
&lt;br /&gt;
These are all strings that reveal these dumps can be generated taken from the start of this bootloader.&lt;br /&gt;
&lt;br /&gt;
What also is interesting is the information revealing the hardware ID in a lower section just after the codesignature:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07 0000 SHA11&lt;br /&gt;
&lt;br /&gt;
06 0000 MODEL_ID1&lt;br /&gt;
&lt;br /&gt;
05 00002000 SW_SIZE1&lt;br /&gt;
&lt;br /&gt;
04 0023 OEM_ID1&amp;quot;0&lt;br /&gt;
&lt;br /&gt;
03 000000000000000F DEBUG1&amp;quot;0&lt;br /&gt;
&lt;br /&gt;
02 005000E100230000 HW_ID1&amp;quot;0&lt;br /&gt;
&lt;br /&gt;
01 0000000000000000 SW_ID1&lt;br /&gt;
&lt;br /&gt;
Maverick1&lt;br /&gt;
&lt;br /&gt;
Onur Tackin0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This image also mentions HS-USBCORE (HighSpeed USB-Core)&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Trek-3.4.03&amp;diff=71495</id>
		<title>Trek-3.4.03</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Trek-3.4.03&amp;diff=71495"/>
		<updated>2018-11-17T00:15:47Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: /* Firmware Structure */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Trek Baseband 3.4.03 ==&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''iPhone 4S'''&lt;br /&gt;
&lt;br /&gt;
Chip ID: 0x5a00e1.&lt;br /&gt;
&lt;br /&gt;
Internal Chip name: qsc6695.&lt;br /&gt;
&lt;br /&gt;
Full Internal Chip name: q6695-SSMFTSZ-4307. (Found in DBL.mbn)&lt;br /&gt;
&lt;br /&gt;
OS Bootloader version: Q62xx-OSBL.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Trek Firmware ==&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
The internal name for the baseband firmware is Trek.&lt;br /&gt;
&lt;br /&gt;
Trek can be extracted from an iOS firmware image (ipsw file).&lt;br /&gt;
&lt;br /&gt;
Trek does not seem to be encrypted and therefore can easily be reverse engineered.&lt;br /&gt;
&lt;br /&gt;
At the bottom of each file you can see a code signing certificate, as the firmware needs to be code signed just like Apple iOS firmware does.&lt;br /&gt;
&lt;br /&gt;
All baseband chips up to today are produced by Qualcomm.&lt;br /&gt;
&lt;br /&gt;
The architecture of the chip seems to be ARM as I already expected.&lt;br /&gt;
&lt;br /&gt;
The baseband chip is completely separated from iOS and is only referenced through the kernel and through the bbupdater utility.&lt;br /&gt;
&lt;br /&gt;
CommCenter seems to be a highlevel framework on top of the baseband providing an interface that iOS can work with.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Firmware Structure ==&lt;br /&gt;
&lt;br /&gt;
As mentioned above, the baseband firmware is not encrypted and when taken from iOS Firmware it will be named ending with a .bbfw (Basebandfirmware) extension.&lt;br /&gt;
&lt;br /&gt;
However when running file on that firmware image you can see that it's just a zip file, just like ipsw files are thus extracting it gives us new, unencrypted files:&lt;br /&gt;
&lt;br /&gt;
- Info.plist&lt;br /&gt;
&lt;br /&gt;
- Options.plist&lt;br /&gt;
&lt;br /&gt;
- amss.mbn (The baseband operating system)&lt;br /&gt;
&lt;br /&gt;
- dbl.mbn (Assumably, factory DFU bootloader)&lt;br /&gt;
&lt;br /&gt;
- osbl.mbn (The Bootloader that bootstraps the normal operating system of the baseband)&lt;br /&gt;
&lt;br /&gt;
- restoredbl.mbn (The restore bootloader)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Info.plist''' &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
contains some basic information about the chip id and firmware version, it can be compared to the BuildManifest.plist file in iOS firmware.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Options.plist'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I haven't figured out what this is for yet but as the name suggest it is mostlikely for configuration purposes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''AMSS.mbn'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This file is what I believe the baseband operating system, file reports that it consists of ARM code.&lt;br /&gt;
&lt;br /&gt;
At the bottom of the file the codesignature can again be found.&lt;br /&gt;
&lt;br /&gt;
It also seems to contain the filesystem for the nand which is all unencrypted thus pretty interesting.&lt;br /&gt;
&lt;br /&gt;
The filesystem will be explained further on this wiki when I have time for it.&lt;br /&gt;
&lt;br /&gt;
What's the most remarkable are strings revealing how to enter specific device modes:&lt;br /&gt;
&lt;br /&gt;
Hold * key   to reset &amp;amp;  log abort&lt;br /&gt;
Hold # key   to enter    dload mode&lt;br /&gt;
&lt;br /&gt;
The dload mode is probably download mode, it is probably comparable to iBoot's communication where you can upload files into iBoot's memory/&lt;br /&gt;
&lt;br /&gt;
For those looking for vulnerabilities in the baseband firmware one string already made me raise a flag.&lt;br /&gt;
&lt;br /&gt;
The baseband seems to support the parsing of property list files.&lt;br /&gt;
&lt;br /&gt;
Because property list files define a type, a user controlled modded type might lead to type confusion bugs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OSBL.mbn'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
OSBL reveals a lot of information about the architecture and internal names and hardware identifiers of the baseband chip.&lt;br /&gt;
&lt;br /&gt;
It also contains references to sourcecode files that tell us that the baseband firmware was written in C, as expected.&lt;br /&gt;
&lt;br /&gt;
OSBL is what I believe an abbreviation of Operating System Bootloader.&lt;br /&gt;
&lt;br /&gt;
By just looking at the strings of the file you can determine a few serial numbers that this firmware is meant for and the name of the chip:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
MT29F4G16ABC&lt;br /&gt;
&lt;br /&gt;
MT29F4G08ABC&lt;br /&gt;
&lt;br /&gt;
MT29F2G16ABD&lt;br /&gt;
&lt;br /&gt;
MT29F2G08ABD&lt;br /&gt;
&lt;br /&gt;
KFN4G16Q2A-DEB8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q62xx-OSBL (The bootloader build version, I think)&lt;br /&gt;
&lt;br /&gt;
QSC6695 (The name of the chip as used internally at Qualcomm, if you look it up you can find some chinese suppliers that sell it.)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The strings also reveal the following source code structure:&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\dload\target\qsc6695\src\dloadarm.c&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_elf_loader.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_elf_loader_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_sec_elf_loader.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_sec_elf_loader_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_clobber_prot.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_clobber_prot_local.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_flash_dev_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_hash_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_auth_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_fsbl_config_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\target\qsc6695\src\boot_pbl_accessor.c&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\shared\src\osbl_mc.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\shared\src\osbl_loader.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\shared\src\osbl_error_handler.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\shared\src\osbl_hash.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\shared\src\osbl_shared_seg.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\target\qsc6695\src\osbl_stubs.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\target\qsc6695\src\osbl_hw_init.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\target\qsc6695\src\osbl_mc_target.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\target\qsc6695\src\osbl_target.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\target\qsc6695\src\osbl_sahara.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\amssboot\target\qsc6695\src\boot_shared_progressive_boot_block.c&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Looking at these you might get a better idea of the bootstages of the iPhone baseband.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''DBL.mbn'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This debugging bootloader, in my thoughts a DFU mode seems to be able to make ROM dumps as well.&lt;br /&gt;
&lt;br /&gt;
- mav_core_dump.bin&lt;br /&gt;
&lt;br /&gt;
- mav_hsic_dump.bin&lt;br /&gt;
&lt;br /&gt;
- mav_nor_dump.bin&lt;br /&gt;
&lt;br /&gt;
- sdram_dump.bin&lt;br /&gt;
&lt;br /&gt;
- iram_dump.bin&lt;br /&gt;
&lt;br /&gt;
These are all strings that reveal these dumps can be generated taken from the start of this bootloader.&lt;br /&gt;
&lt;br /&gt;
What also is interesting is the information revealing the hardware ID in a lower section just after the codesignature:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07 0000 SHA11&lt;br /&gt;
&lt;br /&gt;
06 0000 MODEL_ID1&lt;br /&gt;
&lt;br /&gt;
05 00002000 SW_SIZE1&lt;br /&gt;
&lt;br /&gt;
04 0023 OEM_ID1&amp;quot;0&lt;br /&gt;
&lt;br /&gt;
03 000000000000000F DEBUG1&amp;quot;0&lt;br /&gt;
&lt;br /&gt;
02 005000E100230000 HW_ID1&amp;quot;0&lt;br /&gt;
&lt;br /&gt;
01 0000000000000000 SW_ID1&lt;br /&gt;
&lt;br /&gt;
Maverick1&lt;br /&gt;
&lt;br /&gt;
Onur Tackin0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This image also mentions HS-USBCORE (HighSpeed USB-Core)&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Trek-3.4.03&amp;diff=71494</id>
		<title>Trek-3.4.03</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Trek-3.4.03&amp;diff=71494"/>
		<updated>2018-11-17T00:14:49Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: /* Firmware Structure */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Trek Baseband 3.4.03 ==&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''iPhone 4S'''&lt;br /&gt;
&lt;br /&gt;
Chip ID: 0x5a00e1.&lt;br /&gt;
&lt;br /&gt;
Internal Chip name: qsc6695.&lt;br /&gt;
&lt;br /&gt;
Full Internal Chip name: q6695-SSMFTSZ-4307. (Found in DBL.mbn)&lt;br /&gt;
&lt;br /&gt;
OS Bootloader version: Q62xx-OSBL.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Trek Firmware ==&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
The internal name for the baseband firmware is Trek.&lt;br /&gt;
&lt;br /&gt;
Trek can be extracted from an iOS firmware image (ipsw file).&lt;br /&gt;
&lt;br /&gt;
Trek does not seem to be encrypted and therefore can easily be reverse engineered.&lt;br /&gt;
&lt;br /&gt;
At the bottom of each file you can see a code signing certificate, as the firmware needs to be code signed just like Apple iOS firmware does.&lt;br /&gt;
&lt;br /&gt;
All baseband chips up to today are produced by Qualcomm.&lt;br /&gt;
&lt;br /&gt;
The architecture of the chip seems to be ARM as I already expected.&lt;br /&gt;
&lt;br /&gt;
The baseband chip is completely separated from iOS and is only referenced through the kernel and through the bbupdater utility.&lt;br /&gt;
&lt;br /&gt;
CommCenter seems to be a highlevel framework on top of the baseband providing an interface that iOS can work with.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Firmware Structure ==&lt;br /&gt;
&lt;br /&gt;
As mentioned above, the baseband firmware is not encrypted and when taken from iOS Firmware it will be named ending with a .bbfw (Basebandfirmware) extension.&lt;br /&gt;
&lt;br /&gt;
However when running file on that firmware image you can see that it's just a zip file, just like ipsw files are thus extracting it gives us new, unencrypted files:&lt;br /&gt;
&lt;br /&gt;
- Info.plist&lt;br /&gt;
&lt;br /&gt;
- Options.plist&lt;br /&gt;
&lt;br /&gt;
- amss.mbn (The baseband operating system)&lt;br /&gt;
&lt;br /&gt;
- dbl.mbn (Assumably, factory DFU bootloader)&lt;br /&gt;
&lt;br /&gt;
- osbl.mbn (The Bootloader that bootstraps the normal operating system of the baseband)&lt;br /&gt;
&lt;br /&gt;
- restoredbl.mbn (The restore bootloader)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Info.plist''' &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
contains some basic information about the chip id and firmware version, it can be compared to the BuildManifest.plist file in iOS firmware.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Options.plist'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I haven't figured out what this is for yet but as the name suggest it is mostlikely for configuration purposes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''AMSS.mbn'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This file is what I believe the baseband operating system, file reports that it consists of ARM code.&lt;br /&gt;
&lt;br /&gt;
At the bottom of the file the codesignature can again be found.&lt;br /&gt;
&lt;br /&gt;
It also seems to contain the filesystem for the nand which is all unencrypted thus pretty interesting.&lt;br /&gt;
&lt;br /&gt;
The filesystem will be explained further on this wiki when I have time for it.&lt;br /&gt;
&lt;br /&gt;
What's the most remarkable are strings revealing how to enter specific device modes:&lt;br /&gt;
&lt;br /&gt;
Hold * key   to reset &amp;amp;  log abort&lt;br /&gt;
Hold # key   to enter    dload mode&lt;br /&gt;
&lt;br /&gt;
The dload mode is probably download mode, it is probably comparable to iBoot's communication where you can upload files into iBoot's memory/&lt;br /&gt;
&lt;br /&gt;
For those looking for vulnerabilities in the baseband firmware one string already made me raise a flag.&lt;br /&gt;
&lt;br /&gt;
The baseband seems to support the parsing of property list files.&lt;br /&gt;
&lt;br /&gt;
Because property list files define a type, a user controlled modded type might lead to type confusion bugs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OSBL.mbn'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
OSBL reveals a lot of information about the architecture and internal names and hardware identifiers of the baseband chip.&lt;br /&gt;
&lt;br /&gt;
It also contains references to sourcecode files that tell us that the baseband firmware was written in C, as expected.&lt;br /&gt;
&lt;br /&gt;
OSBL is what I believe an abbreviation of Operating System Bootloader.&lt;br /&gt;
&lt;br /&gt;
By just looking at the strings of the file you can determine a few serial numbers that this firmware is meant for and the name of the chip:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
MT29F4G16ABC&lt;br /&gt;
&lt;br /&gt;
MT29F4G08ABC&lt;br /&gt;
&lt;br /&gt;
MT29F2G16ABD&lt;br /&gt;
&lt;br /&gt;
MT29F2G08ABD&lt;br /&gt;
&lt;br /&gt;
KFN4G16Q2A-DEB8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q62xx-OSBL (The bootloader build version, I think)&lt;br /&gt;
&lt;br /&gt;
QSC6695 (The name of the chip as used internally at Qualcomm, if you look it up you can find some chinese suppliers that sell it.)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The strings also reveal the following source code structure:&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\dload\target\qsc6695\src\dloadarm.c&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_elf_loader.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_elf_loader_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_sec_elf_loader.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_sec_elf_loader_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_clobber_prot.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_clobber_prot_local.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_flash_dev_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_hash_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_auth_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_fsbl_config_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\target\qsc6695\src\boot_pbl_accessor.c&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\shared\src\osbl_mc.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\shared\src\osbl_loader.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\shared\src\osbl_error_handler.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\shared\src\osbl_hash.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\shared\src\osbl_shared_seg.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\target\qsc6695\src\osbl_stubs.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\target\qsc6695\src\osbl_hw_init.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\target\qsc6695\src\osbl_mc_target.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\target\qsc6695\src\osbl_target.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\target\qsc6695\src\osbl_sahara.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\amssboot\target\qsc6695\src\boot_shared_progressive_boot_block.c&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Looking at these you might get a better idea of the bootstages of the iPhone baseband.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'' DBL.mbn ''&lt;br /&gt;
&lt;br /&gt;
This debugging bootloader, in my thoughts a DFU mode seems to be able to make ROM dumps as well.&lt;br /&gt;
&lt;br /&gt;
- mav_core_dump.bin&lt;br /&gt;
&lt;br /&gt;
- mav_hsic_dump.bin&lt;br /&gt;
&lt;br /&gt;
- mav_nor_dump.bin&lt;br /&gt;
&lt;br /&gt;
- sdram_dump.bin&lt;br /&gt;
&lt;br /&gt;
- iram_dump.bin&lt;br /&gt;
&lt;br /&gt;
These are all strings that reveal these dumps can be generated taken from the start of this bootloader.&lt;br /&gt;
&lt;br /&gt;
What also is interesting is the information revealing the hardware ID in a lower section just after the codesignature:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07 0000 SHA11&lt;br /&gt;
&lt;br /&gt;
06 0000 MODEL_ID1&lt;br /&gt;
&lt;br /&gt;
05 00002000 SW_SIZE1&lt;br /&gt;
&lt;br /&gt;
04 0023 OEM_ID1&amp;quot;0&lt;br /&gt;
&lt;br /&gt;
03 000000000000000F DEBUG1&amp;quot;0&lt;br /&gt;
&lt;br /&gt;
02 005000E100230000 HW_ID1&amp;quot;0&lt;br /&gt;
&lt;br /&gt;
01 0000000000000000 SW_ID1&lt;br /&gt;
&lt;br /&gt;
Maverick1&lt;br /&gt;
&lt;br /&gt;
Onur Tackin0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This image also mentions HS-USBCORE (HighSpeed USB-Core)&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Trek-3.4.03&amp;diff=71493</id>
		<title>Trek-3.4.03</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Trek-3.4.03&amp;diff=71493"/>
		<updated>2018-11-17T00:13:53Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: /* Firmware Structure */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Trek Baseband 3.4.03 ==&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''iPhone 4S'''&lt;br /&gt;
&lt;br /&gt;
Chip ID: 0x5a00e1.&lt;br /&gt;
&lt;br /&gt;
Internal Chip name: qsc6695.&lt;br /&gt;
&lt;br /&gt;
Full Internal Chip name: q6695-SSMFTSZ-4307. (Found in DBL.mbn)&lt;br /&gt;
&lt;br /&gt;
OS Bootloader version: Q62xx-OSBL.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Trek Firmware ==&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
The internal name for the baseband firmware is Trek.&lt;br /&gt;
&lt;br /&gt;
Trek can be extracted from an iOS firmware image (ipsw file).&lt;br /&gt;
&lt;br /&gt;
Trek does not seem to be encrypted and therefore can easily be reverse engineered.&lt;br /&gt;
&lt;br /&gt;
At the bottom of each file you can see a code signing certificate, as the firmware needs to be code signed just like Apple iOS firmware does.&lt;br /&gt;
&lt;br /&gt;
All baseband chips up to today are produced by Qualcomm.&lt;br /&gt;
&lt;br /&gt;
The architecture of the chip seems to be ARM as I already expected.&lt;br /&gt;
&lt;br /&gt;
The baseband chip is completely separated from iOS and is only referenced through the kernel and through the bbupdater utility.&lt;br /&gt;
&lt;br /&gt;
CommCenter seems to be a highlevel framework on top of the baseband providing an interface that iOS can work with.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Firmware Structure ==&lt;br /&gt;
&lt;br /&gt;
As mentioned above, the baseband firmware is not encrypted and when taken from iOS Firmware it will be named ending with a .bbfw (Basebandfirmware) extension.&lt;br /&gt;
&lt;br /&gt;
However when running file on that firmware image you can see that it's just a zip file, just like ipsw files are thus extracting it gives us new, unencrypted files:&lt;br /&gt;
&lt;br /&gt;
- Info.plist&lt;br /&gt;
- Options.plist&lt;br /&gt;
- amss.mbn (The baseband operating system)&lt;br /&gt;
- dbl.mbn (Assumably, factory DFU bootloader)&lt;br /&gt;
- osbl.mbn (The Bootloader that bootstraps the normal operating system of the baseband)&lt;br /&gt;
- restoredbl.mbn (The restore bootloader)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Info.plist''' &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
contains some basic information about the chip id and firmware version, it can be compared to the BuildManifest.plist file in iOS firmware.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Options.plist'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I haven't figured out what this is for yet but as the name suggest it is mostlikely for configuration purposes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''AMSS.mbn'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This file is what I believe the baseband operating system, file reports that it consists of ARM code.&lt;br /&gt;
&lt;br /&gt;
At the bottom of the file the codesignature can again be found.&lt;br /&gt;
&lt;br /&gt;
It also seems to contain the filesystem for the nand which is all unencrypted thus pretty interesting.&lt;br /&gt;
&lt;br /&gt;
The filesystem will be explained further on this wiki when I have time for it.&lt;br /&gt;
&lt;br /&gt;
What's the most remarkable are strings revealing how to enter specific device modes:&lt;br /&gt;
&lt;br /&gt;
Hold * key   to reset &amp;amp;  log abort&lt;br /&gt;
Hold # key   to enter    dload mode&lt;br /&gt;
&lt;br /&gt;
The dload mode is probably download mode, it is probably comparable to iBoot's communication where you can upload files into iBoot's memory/&lt;br /&gt;
&lt;br /&gt;
For those looking for vulnerabilities in the baseband firmware one string already made me raise a flag.&lt;br /&gt;
&lt;br /&gt;
The baseband seems to support the parsing of property list files.&lt;br /&gt;
&lt;br /&gt;
Because property list files define a type, a user controlled modded type might lead to type confusion bugs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OSBL.mbn'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
OSBL reveals a lot of information about the architecture and internal names and hardware identifiers of the baseband chip.&lt;br /&gt;
&lt;br /&gt;
It also contains references to sourcecode files that tell us that the baseband firmware was written in C, as expected.&lt;br /&gt;
&lt;br /&gt;
OSBL is what I believe an abbreviation of Operating System Bootloader.&lt;br /&gt;
&lt;br /&gt;
By just looking at the strings of the file you can determine a few serial numbers that this firmware is meant for and the name of the chip:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
MT29F4G16ABC&lt;br /&gt;
&lt;br /&gt;
MT29F4G08ABC&lt;br /&gt;
&lt;br /&gt;
MT29F2G16ABD&lt;br /&gt;
&lt;br /&gt;
MT29F2G08ABD&lt;br /&gt;
&lt;br /&gt;
KFN4G16Q2A-DEB8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q62xx-OSBL (The bootloader build version, I think)&lt;br /&gt;
&lt;br /&gt;
QSC6695 (The name of the chip as used internally at Qualcomm, if you look it up you can find some chinese suppliers that sell it.)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The strings also reveal the following source code structure:&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\dload\target\qsc6695\src\dloadarm.c&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_elf_loader.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_elf_loader_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_sec_elf_loader.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_sec_elf_loader_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_clobber_prot.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_clobber_prot_local.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_flash_dev_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_hash_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_auth_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_fsbl_config_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\target\qsc6695\src\boot_pbl_accessor.c&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\shared\src\osbl_mc.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\shared\src\osbl_loader.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\shared\src\osbl_error_handler.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\shared\src\osbl_hash.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\shared\src\osbl_shared_seg.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\target\qsc6695\src\osbl_stubs.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\target\qsc6695\src\osbl_hw_init.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\target\qsc6695\src\osbl_mc_target.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\target\qsc6695\src\osbl_target.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\target\qsc6695\src\osbl_sahara.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\amssboot\target\qsc6695\src\boot_shared_progressive_boot_block.c&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Looking at these you might get a better idea of the bootstages of the iPhone baseband.&lt;br /&gt;
&lt;br /&gt;
'' DBL.mbn ''&lt;br /&gt;
&lt;br /&gt;
This debugging bootloader, in my thoughts a DFU mode seems to be able to make ROM dumps as well.&lt;br /&gt;
&lt;br /&gt;
- mav_core_dump.bin&lt;br /&gt;
- mav_hsic_dump.bin&lt;br /&gt;
- mav_nor_dump.bin&lt;br /&gt;
- sdram_dump.bin&lt;br /&gt;
- iram_dump.bin&lt;br /&gt;
&lt;br /&gt;
These are all strings that reveal these dumps can be generated taken from the start of this bootloader.&lt;br /&gt;
&lt;br /&gt;
What also is interesting is the information revealing the hardware ID in a lower section just after the codesignature:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07 0000 SHA11&lt;br /&gt;
&lt;br /&gt;
06 0000 MODEL_ID1&lt;br /&gt;
&lt;br /&gt;
05 00002000 SW_SIZE1&lt;br /&gt;
&lt;br /&gt;
04 0023 OEM_ID1&amp;quot;0&lt;br /&gt;
&lt;br /&gt;
03 000000000000000F DEBUG1&amp;quot;0&lt;br /&gt;
&lt;br /&gt;
02 005000E100230000 HW_ID1&amp;quot;0&lt;br /&gt;
&lt;br /&gt;
01 0000000000000000 SW_ID1&lt;br /&gt;
&lt;br /&gt;
Maverick1&lt;br /&gt;
&lt;br /&gt;
Onur Tackin0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This image also mentions HS-USBCORE (HighSpeed USB-Core)&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Trek-3.4.03&amp;diff=71492</id>
		<title>Trek-3.4.03</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Trek-3.4.03&amp;diff=71492"/>
		<updated>2018-11-17T00:13:27Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: Created page with &amp;quot; == Trek Baseband 3.4.03 ==  ----  '''iPhone 4S'''  Chip ID: 0x5a00e1.  Internal Chip name: qsc6695.  Full Internal Chip name: q6695-SSMFTSZ-4307. (Found in DBL.mbn)  OS Bootl...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Trek Baseband 3.4.03 ==&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''iPhone 4S'''&lt;br /&gt;
&lt;br /&gt;
Chip ID: 0x5a00e1.&lt;br /&gt;
&lt;br /&gt;
Internal Chip name: qsc6695.&lt;br /&gt;
&lt;br /&gt;
Full Internal Chip name: q6695-SSMFTSZ-4307. (Found in DBL.mbn)&lt;br /&gt;
&lt;br /&gt;
OS Bootloader version: Q62xx-OSBL.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Trek Firmware ==&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
The internal name for the baseband firmware is Trek.&lt;br /&gt;
&lt;br /&gt;
Trek can be extracted from an iOS firmware image (ipsw file).&lt;br /&gt;
&lt;br /&gt;
Trek does not seem to be encrypted and therefore can easily be reverse engineered.&lt;br /&gt;
&lt;br /&gt;
At the bottom of each file you can see a code signing certificate, as the firmware needs to be code signed just like Apple iOS firmware does.&lt;br /&gt;
&lt;br /&gt;
All baseband chips up to today are produced by Qualcomm.&lt;br /&gt;
&lt;br /&gt;
The architecture of the chip seems to be ARM as I already expected.&lt;br /&gt;
&lt;br /&gt;
The baseband chip is completely separated from iOS and is only referenced through the kernel and through the bbupdater utility.&lt;br /&gt;
&lt;br /&gt;
CommCenter seems to be a highlevel framework on top of the baseband providing an interface that iOS can work with.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Firmware Structure ==&lt;br /&gt;
&lt;br /&gt;
As mentioned above, the baseband firmware is not encrypted and when taken from iOS Firmware it will be named ending with a .bbfw (Basebandfirmware) extension.&lt;br /&gt;
&lt;br /&gt;
However when running file on that firmware image you can see that it's just a zip file, just like ipsw files are thus extracting it gives us new, unencrypted files:&lt;br /&gt;
&lt;br /&gt;
- Info.plist&lt;br /&gt;
- Options.plist&lt;br /&gt;
- amss.mbn (The baseband operating system)&lt;br /&gt;
- dbl.mbn (Assumably, factory DFU bootloader)&lt;br /&gt;
- osbl.mbn (The Bootloader that bootstraps the normal operating system of the baseband)&lt;br /&gt;
- restoredbl.mbn (The restore bootloader)&lt;br /&gt;
&lt;br /&gt;
'''Info.plist''' &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
contains some basic information about the chip id and firmware version, it can be compared to the BuildManifest.plist file in iOS firmware.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Options.plist'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I haven't figured out what this is for yet but as the name suggest it is mostlikely for configuration purposes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''AMSS.mbn'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This file is what I believe the baseband operating system, file reports that it consists of ARM code.&lt;br /&gt;
&lt;br /&gt;
At the bottom of the file the codesignature can again be found.&lt;br /&gt;
&lt;br /&gt;
It also seems to contain the filesystem for the nand which is all unencrypted thus pretty interesting.&lt;br /&gt;
&lt;br /&gt;
The filesystem will be explained further on this wiki when I have time for it.&lt;br /&gt;
&lt;br /&gt;
What's the most remarkable are strings revealing how to enter specific device modes:&lt;br /&gt;
&lt;br /&gt;
Hold * key   to reset &amp;amp;  log abort&lt;br /&gt;
Hold # key   to enter    dload mode&lt;br /&gt;
&lt;br /&gt;
The dload mode is probably download mode, it is probably comparable to iBoot's communication where you can upload files into iBoot's memory/&lt;br /&gt;
&lt;br /&gt;
For those looking for vulnerabilities in the baseband firmware one string already made me raise a flag.&lt;br /&gt;
&lt;br /&gt;
The baseband seems to support the parsing of property list files.&lt;br /&gt;
&lt;br /&gt;
Because property list files define a type, a user controlled modded type might lead to type confusion bugs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OSBL.mbn'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
OSBL reveals a lot of information about the architecture and internal names and hardware identifiers of the baseband chip.&lt;br /&gt;
&lt;br /&gt;
It also contains references to sourcecode files that tell us that the baseband firmware was written in C, as expected.&lt;br /&gt;
&lt;br /&gt;
OSBL is what I believe an abbreviation of Operating System Bootloader.&lt;br /&gt;
&lt;br /&gt;
By just looking at the strings of the file you can determine a few serial numbers that this firmware is meant for and the name of the chip:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
MT29F4G16ABC&lt;br /&gt;
&lt;br /&gt;
MT29F4G08ABC&lt;br /&gt;
&lt;br /&gt;
MT29F2G16ABD&lt;br /&gt;
&lt;br /&gt;
MT29F2G08ABD&lt;br /&gt;
&lt;br /&gt;
KFN4G16Q2A-DEB8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Q62xx-OSBL (The bootloader build version, I think)&lt;br /&gt;
&lt;br /&gt;
QSC6695 (The name of the chip as used internally at Qualcomm, if you look it up you can find some chinese suppliers that sell it.)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The strings also reveal the following source code structure:&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\dload\target\qsc6695\src\dloadarm.c&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_elf_loader.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_elf_loader_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_sec_elf_loader.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_sec_elf_loader_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_clobber_prot.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_clobber_prot_local.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_flash_dev_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_hash_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_auth_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\shared\src\boot_fsbl_config_if.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\common\target\qsc6695\src\boot_pbl_accessor.c&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\shared\src\osbl_mc.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\shared\src\osbl_loader.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\shared\src\osbl_error_handler.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\shared\src\osbl_hash.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\shared\src\osbl_shared_seg.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\target\qsc6695\src\osbl_stubs.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\target\qsc6695\src\osbl_hw_init.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\target\qsc6695\src\osbl_mc_target.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\target\qsc6695\src\osbl_target.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\secboot2\osbl\target\qsc6695\src\osbl_sahara.c&lt;br /&gt;
&lt;br /&gt;
C:\BWA\TrekBaseBandFW-240\srcroot\core\boot\amssboot\target\qsc6695\src\boot_shared_progressive_boot_block.c&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Looking at these you might get a better idea of the bootstages of the iPhone baseband.&lt;br /&gt;
&lt;br /&gt;
'' DBL.mbn ''&lt;br /&gt;
&lt;br /&gt;
This debugging bootloader, in my thoughts a DFU mode seems to be able to make ROM dumps as well.&lt;br /&gt;
&lt;br /&gt;
- mav_core_dump.bin&lt;br /&gt;
- mav_hsic_dump.bin&lt;br /&gt;
- mav_nor_dump.bin&lt;br /&gt;
- sdram_dump.bin&lt;br /&gt;
- iram_dump.bin&lt;br /&gt;
&lt;br /&gt;
These are all strings that reveal these dumps can be generated taken from the start of this bootloader.&lt;br /&gt;
&lt;br /&gt;
What also is interesting is the information revealing the hardware ID in a lower section just after the codesignature:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
07 0000 SHA11&lt;br /&gt;
&lt;br /&gt;
06 0000 MODEL_ID1&lt;br /&gt;
&lt;br /&gt;
05 00002000 SW_SIZE1&lt;br /&gt;
&lt;br /&gt;
04 0023 OEM_ID1&amp;quot;0&lt;br /&gt;
&lt;br /&gt;
03 000000000000000F DEBUG1&amp;quot;0&lt;br /&gt;
&lt;br /&gt;
02 005000E100230000 HW_ID1&amp;quot;0&lt;br /&gt;
&lt;br /&gt;
01 0000000000000000 SW_ID1&lt;br /&gt;
&lt;br /&gt;
Maverick1&lt;br /&gt;
&lt;br /&gt;
Onur Tackin0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This image also mentions HS-USBCORE (HighSpeed USB-Core)&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Dyld_shared_cache&amp;diff=62920</id>
		<title>Dyld shared cache</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Dyld_shared_cache&amp;diff=62920"/>
		<updated>2017-09-13T11:51:20Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: /* The dyld_shared_cache */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== The dyld_shared_cache ==&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Since iPhone OS 3.1, all system (private and public) libraries have been combined into a big cache file to improve performance. &lt;br /&gt;
The original files are redundant and thus eliminated from the system.&lt;br /&gt;
If you're looking for binaries or libraries inside of /System/Library/Frameworks or /System/Library/PrivateFrameworks (or other directories) and can't, this is why.&lt;br /&gt;
OS X also uses a shared cache.&lt;br /&gt;
Unlike iOS, OS X ships with the source binaries still on-disk, particularly so it can be updated with update_dyld_shared_cache. &lt;br /&gt;
The cache is only vaguely documented in dyld man pages.&amp;quot; - [http://iphonedevwiki.net/index.php/Dyld_shared_cache The iPhone Dev Wiki]&lt;br /&gt;
&lt;br /&gt;
The binaries inside the dyld_shared_cache can be used to create C header files from by using [http://stevenygard.com/projects/class-dump/ classdump].&lt;br /&gt;
&lt;br /&gt;
With that header files using iOS Private API's is sometimes possible.&lt;br /&gt;
&lt;br /&gt;
== Location ==&lt;br /&gt;
In iOS 10, the dyld_shared_cache is located in /System/Library/Caches/com.apple.dyld/&lt;br /&gt;
The folder will contain caches for each CPU-Architecture. (eg: dyld_shared_cache_arm64).&lt;br /&gt;
&lt;br /&gt;
== Extracted dyld_shared_caches ==&lt;br /&gt;
[https://github.com/coffeebreakerz/iOS1031-dyld_shared_cache iOS 10.3.1 ARM64]&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Dyld_shared_cache&amp;diff=62919</id>
		<title>Dyld shared cache</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Dyld_shared_cache&amp;diff=62919"/>
		<updated>2017-09-13T11:51:07Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: /* The dyld_shared_cache */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== The dyld_shared_cache ==&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Since iPhone OS 3.1, all system (private and public) libraries have been combined into a big cache file to improve performance. &lt;br /&gt;
The original files are redundant and thus eliminated from the system.&lt;br /&gt;
If you're looking for binaries or libraries inside of /System/Library/Frameworks or /System/Library/PrivateFrameworks (or other directories) and can't, this is why.&lt;br /&gt;
OS X also uses a shared cache.&lt;br /&gt;
Unlike iOS, OS X ships with the source binaries still on-disk, particularly so it can be updated with update_dyld_shared_cache. &lt;br /&gt;
The cache is only vaguely documented in dyld man pages.&amp;quot; - [http://iphonedevwiki.net/index.php/Dyld_shared_cache The iPhone Dev Wiki]&lt;br /&gt;
&lt;br /&gt;
The binaries inside the dyld_shared_cache can be used to create C header files from by using [http://stevenygard.com/projects/class-dump/ classdump].&lt;br /&gt;
With that header files using iOS Private API's is sometimes possible.&lt;br /&gt;
&lt;br /&gt;
== Location ==&lt;br /&gt;
In iOS 10, the dyld_shared_cache is located in /System/Library/Caches/com.apple.dyld/&lt;br /&gt;
The folder will contain caches for each CPU-Architecture. (eg: dyld_shared_cache_arm64).&lt;br /&gt;
&lt;br /&gt;
== Extracted dyld_shared_caches ==&lt;br /&gt;
[https://github.com/coffeebreakerz/iOS1031-dyld_shared_cache iOS 10.3.1 ARM64]&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Dyld_shared_cache&amp;diff=62918</id>
		<title>Dyld shared cache</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Dyld_shared_cache&amp;diff=62918"/>
		<updated>2017-09-13T11:47:35Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== The dyld_shared_cache ==&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Since iPhone OS 3.1, all system (private and public) libraries have been combined into a big cache file to improve performance. &lt;br /&gt;
The original files are redundant and thus eliminated from the system.&lt;br /&gt;
If you're looking for binaries or libraries inside of /System/Library/Frameworks or /System/Library/PrivateFrameworks (or other directories) and can't, this is why.&lt;br /&gt;
OS X also uses a shared cache.&lt;br /&gt;
Unlike iOS, OS X ships with the source binaries still on-disk, particularly so it can be updated with update_dyld_shared_cache. &lt;br /&gt;
The cache is only vaguely documented in dyld man pages.&amp;quot; - [http://iphonedevwiki.net/index.php/Dyld_shared_cache The iPhone Dev Wiki]&lt;br /&gt;
&lt;br /&gt;
== Location ==&lt;br /&gt;
In iOS 10, the dyld_shared_cache is located in /System/Library/Caches/com.apple.dyld/&lt;br /&gt;
The folder will contain caches for each CPU-Architecture. (eg: dyld_shared_cache_arm64).&lt;br /&gt;
&lt;br /&gt;
== Extracted dyld_shared_caches ==&lt;br /&gt;
[https://github.com/coffeebreakerz/iOS1031-dyld_shared_cache iOS 10.3.1 ARM64]&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Dyld_shared_cache&amp;diff=62917</id>
		<title>Dyld shared cache</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Dyld_shared_cache&amp;diff=62917"/>
		<updated>2017-09-13T11:47:00Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: /* The dyld_shared_cache */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== The dyld_shared_cache ==&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Since iPhone OS 3.1, all system (private and public) libraries have been combined into a big cache file to improve performance. &lt;br /&gt;
The original files are redundant and thus eliminated from the system.&lt;br /&gt;
If you're looking for binaries or libraries inside of /System/Library/Frameworks or /System/Library/PrivateFrameworks (or other directories) and can't, this is why.&lt;br /&gt;
OS X also uses a shared cache.&lt;br /&gt;
Unlike iOS, OS X ships with the source binaries still on-disk, particularly so it can be updated with update_dyld_shared_cache. &lt;br /&gt;
The cache is only vaguely documented in dyld man pages.&amp;quot; - [http://iphonedevwiki.net/index.php/Dyld_shared_cache The iPhone Dev Wiki]&lt;br /&gt;
&lt;br /&gt;
In iOS 10, the dyld_shared_cache is located in /System/Library/Caches/com.apple.dyld/&lt;br /&gt;
&lt;br /&gt;
In the folder will contain caches for each CPU-Architecture. (eg: dyld_shared_cache_arm64).&lt;br /&gt;
&lt;br /&gt;
== Extracted dyld_shared_caches ==&lt;br /&gt;
[https://github.com/coffeebreakerz/iOS1031-dyld_shared_cache iOS 10.3.1 ARM64]&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Dyld_shared_cache&amp;diff=62916</id>
		<title>Dyld shared cache</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Dyld_shared_cache&amp;diff=62916"/>
		<updated>2017-09-13T11:46:26Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== The dyld_shared_cache ==&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Since iPhone OS 3.1, all system (private and public) libraries have been combined into a big cache file to improve performance. &lt;br /&gt;
The original files are redundant and thus eliminated from the system.&lt;br /&gt;
If you're looking for binaries or libraries inside of /System/Library/Frameworks or /System/Library/PrivateFrameworks (or other directories) and can't, this is why.&lt;br /&gt;
OS X also uses a shared cache.&lt;br /&gt;
Unlike iOS, OS X ships with the source binaries still on-disk, particularly so it can be updated with update_dyld_shared_cache. &lt;br /&gt;
The cache is only vaguely documented in dyld man pages.&amp;quot; - [http://iphonedevwiki.net/index.php/Dyld_shared_cache The iPhone Dev Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In iOS 10, the dyld_shared_cache is located in /System/Library/Caches/com.apple.dyld/&lt;br /&gt;
In the folder will contain caches for each CPU-Architecture. (eg: dyld_shared_cache_arm64).&lt;br /&gt;
&lt;br /&gt;
== Extracted dyld_shared_caches ==&lt;br /&gt;
[https://github.com/coffeebreakerz/iOS1031-dyld_shared_cache iOS 10.3.1 ARM64]&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Dyld_shared_cache&amp;diff=62915</id>
		<title>Dyld shared cache</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Dyld_shared_cache&amp;diff=62915"/>
		<updated>2017-09-13T11:45:52Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: /* DYLD_SHARED_CACHE */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== The dyld_shared_cache ==&lt;br /&gt;
&lt;br /&gt;
Since iPhone OS 3.1, all system (private and public) libraries have been combined into a big cache file to improve performance. &lt;br /&gt;
The original files are redundant and thus eliminated from the system.&lt;br /&gt;
If you're looking for binaries or libraries inside of /System/Library/Frameworks or /System/Library/PrivateFrameworks (or other directories) and can't, this is why.&lt;br /&gt;
OS X also uses a shared cache.&lt;br /&gt;
Unlike iOS, OS X ships with the source binaries still on-disk, particularly so it can be updated with update_dyld_shared_cache. &lt;br /&gt;
The cache is only vaguely documented in dyld man pages.&lt;br /&gt;
In iOS 10, the dyld_shared_cache is located in /System/Library/Caches/com.apple.dyld/&lt;br /&gt;
In the folder will contain caches for each CPU-Architecture. (eg: dyld_shared_cache_arm64).&lt;br /&gt;
&lt;br /&gt;
== Extracted dyld_shared_caches ==&lt;br /&gt;
[https://github.com/coffeebreakerz/iOS1031-dyld_shared_cache iOS 10.3.1 ARM64]&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Dyld_shared_cache&amp;diff=62914</id>
		<title>Dyld shared cache</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Dyld_shared_cache&amp;diff=62914"/>
		<updated>2017-09-13T11:43:15Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== DYLD_SHARED_CACHE ==&lt;br /&gt;
&lt;br /&gt;
Since iPhone OS 3.1, all system (private and public) libraries have been combined into a big cache file to improve performance. &lt;br /&gt;
The original files are redundant and thus eliminated from the system.&lt;br /&gt;
If you're looking for binaries or libraries inside of /System/Library/Frameworks or /System/Library/PrivateFrameworks (or other directories) and can't, this is why.&lt;br /&gt;
OS X also uses a shared cache. &lt;br /&gt;
Unlike iOS, OS X ships with the source binaries still on-disk, particularly so it can be updated with update_dyld_shared_cache. &lt;br /&gt;
The cache is only vaguely documented in dyld man pages.&lt;br /&gt;
&lt;br /&gt;
== Extracted dyld_shared_caches ==&lt;br /&gt;
[https://github.com/coffeebreakerz/iOS1031-dyld_shared_cache iOS 10.3.1 ARM64]&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Dyld_shared_cache&amp;diff=62913</id>
		<title>Dyld shared cache</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Dyld_shared_cache&amp;diff=62913"/>
		<updated>2017-09-13T11:43:05Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: /* DYLD_SHARED_CACHE */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== DYLD_SHARED_CACHE ==&lt;br /&gt;
&lt;br /&gt;
Since iPhone OS 3.1, all system (private and public) libraries have been combined into a big cache file to improve performance. &lt;br /&gt;
The original files are redundant and thus eliminated from the system.&lt;br /&gt;
If you're looking for binaries or libraries inside of /System/Library/Frameworks or /System/Library/PrivateFrameworks (or other directories) and can't, this is why.&lt;br /&gt;
OS X also uses a shared cache. &lt;br /&gt;
Unlike iOS, OS X ships with the source binaries still on-disk, particularly so it can be updated with update_dyld_shared_cache. &lt;br /&gt;
The cache is only vaguely documented in dyld man pages.&lt;br /&gt;
&lt;br /&gt;
== Extracted dyld_shared_caches&lt;br /&gt;
[https://github.com/coffeebreakerz/iOS1031-dyld_shared_cache iOS 10.3.1 ARM64]&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Dyld_shared_cache&amp;diff=62912</id>
		<title>Dyld shared cache</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Dyld_shared_cache&amp;diff=62912"/>
		<updated>2017-09-13T11:42:33Z</updated>

		<summary type="html">&lt;p&gt;Xnudaemon: Added a page about the dyld_shared_cache&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== DYLD_SHARED_CACHE ==&lt;br /&gt;
&lt;br /&gt;
Since iPhone OS 3.1, all system (private and public) libraries have been combined into a big cache file to improve performance. The original files are redundant and thus eliminated from the system.&lt;br /&gt;
If you're looking for binaries or libraries inside of /System/Library/Frameworks or /System/Library/PrivateFrameworks (or other directories) and can't, this is why.&lt;br /&gt;
OS X also uses a shared cache. Unlike iOS, OS X ships with the source binaries still on-disk, particularly so it can be updated with update_dyld_shared_cache. The cache is only vaguely documented in dyld man pages.&lt;br /&gt;
&lt;br /&gt;
== Extracted dyld_shared_caches&lt;br /&gt;
[https://github.com/coffeebreakerz/iOS1031-dyld_shared_cache iOS 10.3.1 ARM64]&lt;/div&gt;</summary>
		<author><name>Xnudaemon</name></author>
		
	</entry>
</feed>