Google Code Exporter
Google Code Exporter
``` dataVolumeOffset is 307200 : ) ``` Original comment by `[email protected]` on 4 Oct 2012 at 10:52
``` OK, can you try to open the disk image with the modified HFSExplorer (http://code.google.com/p/iphone-dataprotection/downloads/detail?name=hfsexplore r_iphoneEMF_d4ea02bd3fc3.zip&can=2&q=) And open a random file in the image, for instance /logs/lockdownd.log, the file should...
``` yes , after download HFSexplorer, i did open the image rdisk0s1s2.dmg. as you said, i did open the tile /logs/lockdownd.log, this file contain text PS. attach file : lockdownd.log...
``` ahahahahahah... i saw HFSExplorer debug console this :: Trying to detect CEncryptedEncoding structure... CEncryptedEncoding structure not found. Proceeding... Trying to detect UDIF structure... UDIF structure not found. Proceeding... pos=0...
``` tested program is SQLiteSpy ``` Original comment by `[email protected]` on 6 Oct 2012 at 8:03
``` ok, it seems the dataVolumeOffset field is wrong, lockdownd.log is decrypted incorrecty, it should contain ascii text. You can try running the attached python script (find_dataVolumeOffset.py) on the disk...
``` i try to run the attached script on the disk image but, occured error r3d4l3rtui-MacBook-Pro:python_scripts h2spice$ python find_dataVolumeOffset.py ../../../diskimage/rdisk0s1s2.dmg Using plist file ../../../diskimage/aa56aa017bb856f4.plist Keybag unlocked with passcode key cprotect...
``` ha yes sorry, you need to comment line 120 in hfs/emf.py self.keybag = loadKeybagFromVolume(self, device_infos) => #self.keybag = loadKeybagFromVolume(self, device_infos) ``` Original comment by `[email protected]` on 7 Oct 2012...
``` @h2spice any luck ? ``` Original comment by `[email protected]` on 21 Oct 2012 at 12:23
``` Sorry for my late reply, luckily, i solve this problem, thank you, as soon as, report about this problem. ``` Original comment by `[email protected]` on 24 Oct 2012 at...