Disecting the iPhone firmware image
I'm sure someone else has probably figured this out by now but it's pretty easy to mount the firmware image under linux. First get yourself a copy of the firmware from the Apple site and then:
Then:
Then:
Talk about weak passwords:
Probably totally useless information. Then again, there is a second file system image (694-5262-39.dmg) that is encrypted (encrcdsa) and maybe the password from the first one is the passphrase to decrypt/mount the second file system. I'm not sure if there is a way to decrypt encrypted dmg images in Linux. I would never purchase one of these overpriced closed up pieces of craps.
- Code: Select all
$ unzip iPhone1,1_1.0_1A543a_Restore.ipsw
$ dd if=694-5259-38.dmg bs=2048 skip=1 of=/tmp/iphone.img
$ file /tmp/iphone.img
/tmp/iphone.img: Macintosh HFS Extended version 4 data last mounted by: 'H+Lx', created: Tue Jun 26 18:40:30 2007, last modified: Tue Jul 3 21:20:16 2007, last checked: Tue Jun 26 20:40:30 2007, block size: 4096, number of blocks: 3838, free blocks: 440
# mount /tmp/iphone.img /mnt -o loop
Then:
- Code: Select all
$ ls -l /mnt
total 4
drwxr-xr-x 1 root root 9 2007-06-26 20:40 bin
drwxr-xr-x 1 root root 2 2007-05-22 22:54 dev
lrwxr-xr-x 1 root 80 11 2007-06-26 20:40 etc -> private/etc
drwxr-xr-x 1 root root 2 2007-05-22 18:05 mnt1
drwxr-xr-x 1 root root 2 2007-05-22 18:05 mnt2
drwxr-xr-x 1 root root 3 2007-06-19 17:42 private
drwxr-xr-x 1 root root 8 2007-06-26 20:40 sbin
drwxr-xr-x 1 root root 4 2007-06-26 20:40 System
drwxr-xr-x 1 root root 7 2007-06-26 20:40 usr
Then:
- Code: Select all
$ cat /mnt/etc/master.passwd
##
# User Database
#
# Note that this file is consulted when the system is running in single-user
# mode. At other times this information is handled by lookupd. By default,
# lookupd gets information from NetInfo, so this file will not be consulted
# unless you have changed lookupd's configuration.
##
nobody:*:-2:-2::0:0:Unprivileged User:/var/empty:/usr/bin/false
root:XUU7aqfpey51o:0:0::0:0:System Administrator:/var/root:/bin/sh
mobile:/smx7MYTQIi2M:501:0::0:0:Mobile User:/var/mobile:/bin/sh
daemon:*:1:1::0:0:System Services:/var/root:XUU7aqfpey51o
unknown:*:99:99::0:0:Unknown User:/var/empty:/usr/bin/false
Talk about weak passwords:
- Code: Select all
# john /mnt/etc/master.passwd
Created directory: /root/.john
Loaded 2 password hashes with 2 different salts (Traditional DES [64/64 BS MMX])
alpine (mobile)
dottie (root)
guesses: 2 time: 0:00:00:57 (3) c/s: 372674 trying: dewMso - dotty1
Probably totally useless information. Then again, there is a second file system image (694-5262-39.dmg) that is encrypted (encrcdsa) and maybe the password from the first one is the passphrase to decrypt/mount the second file system. I'm not sure if there is a way to decrypt encrypted dmg images in Linux. I would never purchase one of these overpriced closed up pieces of craps.