Difference between revisions of "The iPhone Wiki:Community portal"

From The iPhone Wiki
Jump to: navigation, search
(RE: IMG3 File Key Grabbing)
(IMG3 File Key Grabbing)
Line 16: Line 16:
 
How does one grab the keys for the IMG3 files if they have a decrypted ramdisk? I have genpass, xpwn, and vfdecrypt, but what do I use to get keys for IMG3 files? --[[User:5urd|5urd]] 17:17, 2 February 2012 (MST)
 
How does one grab the keys for the IMG3 files if they have a decrypted ramdisk? I have genpass, xpwn, and vfdecrypt, but what do I use to get keys for IMG3 files? --[[User:5urd|5urd]] 17:17, 2 February 2012 (MST)
 
:Unlike the vfdecrypt key, the keys for decrypting the [[IMG3_File_Format#Tags | IMG3]] are stored encrypted in the [[KBAG]] section of the IMG3 file itself, not the ramdisk. These keys are encrypted using the [[GID-key]], so access to the AES engine is required. On a device compatible with greenpois0n or openiBoot, this process is (loosely) documented [[AES_Keys#Running_The_Engine | here]]. I am working on implementing a method that can be performed on a jailbroken 4S or iPad 2 (is that is what you're looking for?) and will release when finished --[[User:0x56|0x56]] 20:12, 1 March 2012 (MST)
 
:Unlike the vfdecrypt key, the keys for decrypting the [[IMG3_File_Format#Tags | IMG3]] are stored encrypted in the [[KBAG]] section of the IMG3 file itself, not the ramdisk. These keys are encrypted using the [[GID-key]], so access to the AES engine is required. On a device compatible with greenpois0n or openiBoot, this process is (loosely) documented [[AES_Keys#Running_The_Engine | here]]. I am working on implementing a method that can be performed on a jailbroken 4S or iPad 2 (is that is what you're looking for?) and will release when finished --[[User:0x56|0x56]] 20:12, 1 March 2012 (MST)
  +
::Yah, running greenpois0n is my problem. I cant find the program. --[[User:5urd|5urd]] 21:02, 1 March 2012 (MST)

Revision as of 04:02, 2 March 2012

Archives
 • 2010 • 2011 • 2012 • 2013 • 2014 • 2015 • 2016 • 2017 •

This is the place to post tasks that need to be done on the wiki. Also this is the place for proposed changes. I heard about people wanting a favicon and arranging the main page into categories.

Site Related Requests

AcidSn0w

Can I propose a page for acidsn0w? I heard that there was stolen code, so I haven't posted. --Dylan Laws 17:02, 17 January 2012 (MST)

The first beta did use stolen code, but the second beta fixed that. As it is still in beta, a page may not be a good idea. It does have a good user-base as shown in their blog comments, but it is up to the sysops. If you are in the Pwn Dev Team, then NO. --5urd 17:09, 17 January 2012 (MST)
I am not in their team. :P I'll wait till/if they release it. --Dylan Laws 17:37, 17 January 2012 (MST)
I want to make something clear about this wiki, it's called "The iPhone Wiki", not "The iPhone Community Wiki", or even "The Jailbreaking Wiki". This site exists to document the iPhone, not who made what GUI. A jailbreak tool that doesn't introduce exploits or isn't very widely used isn't notable. To clarify, the Limera1n_Exploit page is far more valuable than the limera1n page. Please focus on adding technical content instead of thinly veiled advertisements. For example, it's appalling we don't have a page documenting ASLR --geohot 23:16, 17 January 2012 (MST)
I would also like to see the Baseband ticket system documented --geohot 14:48, 18 January 2012 (MST)

2.2b1

Is 2.2b1 5G26 or 5G27, because on Beta Firmware, it says 5G27 while on the previous revisions of VFDecrypt Keys is said 5G26 --5urd 18:47, 14 January 2012 (MST)

IMG3 File Key Grabbing

How does one grab the keys for the IMG3 files if they have a decrypted ramdisk? I have genpass, xpwn, and vfdecrypt, but what do I use to get keys for IMG3 files? --5urd 17:17, 2 February 2012 (MST)

Unlike the vfdecrypt key, the keys for decrypting the IMG3 are stored encrypted in the KBAG section of the IMG3 file itself, not the ramdisk. These keys are encrypted using the GID-key, so access to the AES engine is required. On a device compatible with greenpois0n or openiBoot, this process is (loosely) documented here. I am working on implementing a method that can be performed on a jailbroken 4S or iPad 2 (is that is what you're looking for?) and will release when finished --0x56 20:12, 1 March 2012 (MST)
Yah, running greenpois0n is my problem. I cant find the program. --5urd 21:02, 1 March 2012 (MST)