Highlight
Why
- download
iBoot
via partialzip - extract the payloads
- lookup the decryption keys
- decrypt the payloads
When you can just...
❯ ipsw dl ipsw --device iPhone15,2 --version 16.6 --pattern 'iBoot.*im4p$' --decrypt
• Parsing remote IPSW build=20G75 device=iPhone15,2 signed=false version=16.6
• Downloading files matching pattern "iBoot.*im4p$"
1.27 MiB / 1.27 MiB [==========================================================| ✅ ] 604.21 KiB/s
1.27 MiB / 1.27 MiB [==========================================================| ✅ ] 1.14 MiB/s
242.00 b / 242.00 b [==========================================================| ✅ ]
242.00 b / 242.00 b [==========================================================| ✅ ]
• Created 20G75__iPhone15,2/Firmware/all_flash/iBoot.d73.RELEASE.im4p
• Created 20G75__iPhone15,2/Firmware/all_flash/iBoot.d73.RESEARCH_RELEASE.im4p
• Created 20G75__iPhone15,2/Firmware/all_flash/iBootData.d73.RELEASE.im4p
• Created 20G75__iPhone15,2/Firmware/all_flash/iBootData.d73.RESEARCH_RELEASE.im4p
• Searching for keys to decrypt files
• Decrypted 20G75__iPhone15,2/Firmware/all_flash/iBoot.d73.RELEASE.im4p.dec
• Decrypted 20G75__iPhone15,2/Firmware/all_flash/iBootData.d73.RELEASE.im4p.dec
• Decrypted 20G75__iPhone15,2/Firmware/all_flash/iBootData.d73.RESEARCH_RELEASE.im4p.dec
• Decrypted 20G75__iPhone15,2/Firmware/all_flash/iBoot.d73.RESEARCH_RELEASE.im4p.dec
😎
Changelog
New Features
- a09f62f: feat: add 🆕
--decrypt
flag toipsw dl ipsw
to attempt to lookup and use keys for--pattern
files (@blacktop)
Bug fixes
- 00fb34f: fix: add better error handling to
ipsw dl keys
cmd (@blacktop) - 8f6bd0a: fix: swift bind lookups (@blacktop)
Dependency updates
Summary
Full Changelog: v3.1.474...v3.1.475
What to do next?
- Read the documentation
- Follow us on Twitter
- Follow us on Mastodon