Skip to content
This repository has been archived by the owner on Mar 6, 2023. It is now read-only.

Commit

Permalink
README
Browse files Browse the repository at this point in the history
  • Loading branch information
haiyuidesu committed Nov 4, 2020
1 parent ecb67e1 commit 8696bfd
Show file tree
Hide file tree
Showing 2 changed files with 6 additions and 6 deletions.
7 changes: 6 additions & 1 deletion README
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,12 @@ II. Usage

$ iBoot64Finder -f iBoot.j273a.RELEASE.bin -e

III. Features
> Some plugins were made to import all functions found in a reversing tool :

IDA Pro : https://github.com/haiyuidesu/ida64finder
Binja : https://github.com/matteyeux/iBoot64Finder-importer

IV. Notes
> SecureROM is not a priority but I will add a support for later,
> I highly advise to use this tool on the lastest versions (iOS 7.1.x | 12.4.x | ...),
> This project was made for programming skills and knowledges improvement with bootloaders.
5 changes: 0 additions & 5 deletions iBoot64Finder.c
Original file line number Diff line number Diff line change
Expand Up @@ -117,9 +117,6 @@ else if (version == 2817) x = vers3; \
else if (version >= 5540) x = vers4; \
else x = vers5;

// I basically wrote this for the DTK iBoot but... I am lost...
#define pac_condition(hex1, hex2) ((detect_pac() && version >= 6603) ? hex1 : hex2)

// https://armconverter.com/ (If you ever try to translate every offsets here, I will give you a cola).

void find_image(void) {
Expand All @@ -134,7 +131,6 @@ void find_image(void) {
locate_func(hex_set(4013, hex_set(3406, 0xe20318aa, 0x48af8d72), 0x6000a872),
hex_set(4013, hex_set(3406, 0x810240f9, 0x010b40b9), 0x80018052), false, "_image_load_file");


insn_set(insn,
0x2a5d1053, 0x0a5d1053, 0x0a5d1053,
hex_set(6603, 0x2b5d1053, 0x09294429), 0x2b5d1053);
Expand All @@ -146,7 +142,6 @@ void find_image(void) {
locate_func(hex_set(3406, 0xe20307aa, 0xf40307aa),
hex_set(3406, 0xf30306aa, 0xfd030191), false, "_image_load_memory");


locate_func(hex_set(3406, 0x0100e4d2, 0xf5030091), 0xf30302aa, false, "_image4_get_partial");

locate_func(0x8082c93c, 0xe00314aa, false, "_Img4DecodeGetPayload");
Expand Down

0 comments on commit 8696bfd

Please sign in to comment.