Advertisement
Guest User

Untitled

a guest
Oct 23rd, 2019
321
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.45 KB | None | 0 0
  1. Alfonsos-iMac:ipwndfu dingo$ sudo ./ipwndfu -p
  2. Password:
  3. *** checkm8 exploit by axi0mX ***
  4. Found: CPID:8015 CPRV:11 CPFM:03 SCEP:01 BDID:0E ECID:001949100484483A IBFL:3C SRTG:[iBoot-3332.0.0.1.23]
  5. Device is now in pwned DFU Mode.
  6. (0.87 seconds)
  7. Alfonsos-iMac:ipwndfu dingo$ python ./rmsigchks.py
  8. *** SecureROM Signature check remover by Linus Henze ***
  9. *** Fake CA patch by L0W_P1X3L ***
  10. Found: CPID:8015 CPRV:11 CPFM:03 SCEP:01 BDID:0E ECID:001949100484483A IBFL:3C SRTG:[iBoot-3332.0.0.1.23] PWND:[checkm8]
  11. Applying patches...
  12. Traceback (most recent call last):
  13. File "./rmsigchks.py", line 97, in <module>
  14. main()
  15. File "./rmsigchks.py", line 84, in main
  16. pdev.write_memory(k, config.patches[k])
  17. File "/Users/dingo/ipwndfu/usbexec.py", line 44, in write_memory
  18. def write_memory(self, address, data): self.command(self.cmd_memcpy(address, self.cmd_data_address(3), len(data)) + data, 0)
  19. File "/Users/dingo/ipwndfu/usbexec.py", line 106, in command
  20. response = device.ctrl_transfer(0xA1, 2, 0xFFFF, 0, response_length + 1, CMD_TIMEOUT).tostring()[1:]
  21. File "/Users/dingo/ipwndfu/usb/core.py", line 1043, in ctrl_transfer
  22. self.__get_timeout(timeout))
  23. File "/Users/dingo/ipwndfu/usb/backend/libusb1.py", line 883, in ctrl_transfer
  24. timeout))
  25. File "/Users/dingo/ipwndfu/usb/backend/libusb1.py", line 595, in _check
  26. raise USBError(_strerror(ret), ret, _libusb_errno[ret])
  27. usb.core.USBError: [Errno 5] Input/Output Error
  28. Alfonsos-iMac:ipwndfu dingo$
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement