Ignoring same device iphone 4 gsm

Ignoring same device iphone 4 gsm

iPhone 4 Hacktivate Tool All iOS — Утилита поможет сделать хактивацию на iPhone 4

1) Скачиваем и устанавливаем программу
2) Запускаем iPhone 4 Hactivate Tool ALL iOS v5
3) Подключаем iPhone к ПК
4) Нажимаем на кнопку 1 и ждем появления окна SSH_RD_tool и заводим аппарат в режим DFU

5) После успешного выполнения программы SSH_RD_tool появится надпись

Success!
Connect to localhost on port 2022 with your favorite SSH client!

и на IPhone будет гореть яблоко с плоской загрузки

6) Нажимаем кнопку 2 и ждем появления на iPhone режима Recovery Mode
7) После появления на iPhone режима в новом появившемся окошке нажимаем кнопку Exit Recovery Mode

ps
ver log
fix win 64 bit
fix iTunes error
fix apple boot logo loop
new cert

ps 2
для тех у кого какой то гемор по причине рукожопства то ставим http://teamviewer.com/ кидай в скайп smolk1984 ид и пас гляну удаленно
ps 3
обновил до 5 версии поправил пропадания основных настроек

iPhone 4 Hactivate Tool ALL iOS 3.exe ( 58.56 МБ )
iPhone 4 Hactivate Tool ALL iOS v5.exe ( 58.52 МБ )

Сообщение отредактировал smolk1984 — 12.05.15, 18:06

Источник

Ignoring same device iphone 4 gsm

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please — Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

GSM-Forum > GSM & CDMA Phones / Tablets Software & Hardware Area > iPhone ,iPod & iPad (Apple Inc. Products) > iPhone 4 / iPhone 4S
deleting setup.app

iPhone 4 / iPhone 4S iPhone 4 / 4S

FS®;10111540]Try copy the iPhone 7.0.4 ipsw to you C:\Users\YourUserName\AppData\Local\Temp\ssh_rd. Worked for me, after spending days trying.[/QUOTE]
[QUOTE]SSH ramdisk maker & loader, version 29-06-2013 git rev-04b
Made possible thanks to Camilo Rodrigues (@Allpluscomputer)
Including xpwn source code by the Dev Team and planetbeing
Including syringe source code by Chronic-Dev and posixninja
syringe exploits by pod2g, geohot & posixninja
Special thanks to iH8sn0w
device-infos source: iphone-dataprotection
Report bugs to msft.guy (@msft_guy)

Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\native\j syringeapi.dll
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\native\m ux_redux.dll

Connect a device in DFU mode
MobileDevice event: DfuConnect, 2341227, 8930
DFU device ‘iPhone 4 (GSM)’ connected
Building ramdisk for device ‘iPhone 4 (GSM)’
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\all_keys .plist
Working dir set to C:\Users\Samiri\AppData\Local\Temp\ssh_rd
IPSW at http://appldnld.apple.com/iOS5.1.1/0. 8_Restore.ipsw
Downloading Restore.plist
Local file C:\Users\Samiri\AppData\Local\Temp\ssh_rd\iPhone3, 1_5.1.1_9B208_Restore.ipsw not found; downloading from http://appldnld.apple.com/iOS5.1.1/0. 8_Restore.ipsw
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iph one31_9B208\Restore.plist
Restore.plist downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iph one31_9B208\Restore.plist
Parsing Restore.plist..
Kernel file: kernelcache.release.n90
Restore ramdisk file: 038-5512-003.dmg
Downloading Firmware/dfu/iBSS.n90ap.RELEASE.dfu
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iph one31_9B208\Firmware\dfu\iBSS.n90ap.RELEASE.dfu.or ig
Decrypted to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iph one31_9B208\Firmware\dfu\iBSS.n90ap.RELEASE.dfu.de c
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\nor5.pat ch.json
Patched to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iph one31_9B208\Firmware\dfu\iBSS.n90ap.RELEASE.dfu.de c.p
iBSS prepared at C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iph one31_9B208\Firmware\dfu\iBSS.n90ap.RELEASE.dfu
Downloading Firmware/dfu/iBEC.n90ap.RELEASE.dfu
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iph one31_9B208\Firmware\dfu\iBEC.n90ap.RELEASE.dfu.or ig
Decrypted to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iph one31_9B208\Firmware\dfu\iBEC.n90ap.RELEASE.dfu.de c
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\nor5.pat ch.json
Patched to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iph one31_9B208\Firmware\dfu\iBEC.n90ap.RELEASE.dfu.de c.p
iBEC prepared at C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iph one31_9B208\Firmware\dfu\iBEC.n90ap.RELEASE.dfu
Downloading Firmware/all_flash/all_flash.n90ap.production/DeviceTree.n90ap.img3
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iph one31_9B208\Firmware\all_flash\all_flash.n90ap.pro duction\DeviceTree.n90ap.img3
Device tree prepared at C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iph one31_9B208\Firmware\all_flash\all_flash.n90ap.pro duction\DeviceTree.n90ap.img3
Downloading Firmware/all_flash/all_flash.n90ap.production/manifest
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iph one31_9B208\Firmware\all_flash\all_flash.n90ap.pro duction\manifest
Downloading kernelcache.release.n90
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iph one31_9B208\kernelcache.release.n90.orig
Decrypted to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iph one31_9B208\kernelcache.release.n90.dec
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\kernel5. patch.json
Patched to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iph one31_9B208\kernelcache.release.n90.dec.p
Kernel prepared at C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iph one31_9B208\kernelcache.release.n90
Downloading 038-5512-003.dmg
Downloaded to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iph one31_9B208\038-5512-003.dmg.orig
Decrypted to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iph one31_9B208\038-5512-003.dmg.dec
Extracted resource to C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ssh.tar
Added ssh.tar to the ramdisk
Ramdisk prepared at C:\Users\Samiri\AppData\Local\Temp\ssh_rd\ipsw_iph one31_9B208\038-5512-003.dmg
Using syringe to exploit the bootrom..
Exploit sent!
Preparing to load the ramdisk..
Ramdisk load started!
MobileDevice event: DfuDisconnect, 2341227, 8930
MobileDevice event: DfuConnect, 5291227, 8930
DFU device ‘iPhone 4 (GSM)’ connected
Ignoring same device iPhone 4 (GSM)
MobileDevice event: DfuDisconnect, 5291227, 8930
MobileDevice event: RecoveryConnect, 5291281, 8930
MobileDevice event: RecoveryDisconnect, 5291281, 8930
Almost there..
MobileDevice event: MuxConnect, 0, 0

Читайте также:  Как зарядить айфон без lightning

Success!
Connect to localhost on port 2022 with your favorite SSH client!

login: root
password: alpine
Still SAme problem

Источник

I have successfully Jailbroken the iPhone 4 iOS 7.1 🙂

User Tag List

Worked all night on this, hopefully this helps some of the «devs» work on a new release for the public

Definitely still has some kinks to work out but overall it works as it should, devs need to add all the code in to get apps and ipa’s to show up and install and function. I did my part and did what I could, I sound extremely tired, because I am, and I am getting over a bad cold. Enjoy!

This Jail;break applies to the following iDevices:

— iPad (4th Generation)
— iPad (Third Generation)
but does not support:
Filters in Camera app
Panoramic photos
AirDrop

— iPad 2
but does not support:
All items from 3rd Gen. iPad, plus
Filters in Photos app
Square photos and videos
Siri

— 5th Generation iPod Touch

As Part of a Team Effort, My Cohorts and I have Finally produced what we said we would before iOS 8 rolled out! Apple’s LATEST 7.1.1 Firmware is COMPLETELY Jailbreakable!

Here is the official WORKING release to Jailbreak your iOS 7.1.1 iPhone, iPod Touch, iPad, or Other — (CURRENTLY THE LATEST VERSION OF APPLE’S IOS , enjoy it guys

Supports up to iOS 7.1.1, works well on iOS 7.1 as well as previous versions with no problems, it is A Semi-Tethered Jailbreak. Meaning in order to use it if you shut the iPhone/iPod Touch off, you will need to re-jailbreak it via the computer.

Читайте также:  Custom apple macbook pro

Step By Step & What You Will Need:

— .NET Framework 2.5, 3.0, 3.5, 4.0, or 4.5, it doesn’t matter as long as you have one installed. I suggest 3.5! — DOWNLOAD & INSTALL ONE OF THE FOLLOWING!

— Java SDK SE Development Kit 7 Download (Choose the x86/32 bit option, even if you are running x64, the 32 bit version is required to make this work! — DOWNLOAD & INSTALL THE x86 VERSION, NOT THE x64, EVEN IF YOU ARE USING x64! THIS PROGRAM REQUIRES x86! — Make sure you accept the license agreement, or it won’t let you download.

— 5 minutes of your time!
— A computer, running Windows (XP minimum), Mac OS X (10.6 minimum) or Linux (x86 / x86_64)
— iTunes installed if you’re running Windows (Latest is recommended)
— An iPhone, iPad or iPod running iOS 7.0 through 7.1.1 (you may check in Settings / General / About => Version)
— A USB cable to connect the device to the computer

For 7.1.1 Jailbreak, Simply download the above mentioned programs, and follow this video — made by a friend of mine:

Telnet Logs of my progress working all night nd day to get iOS 7.1.1 Jailbreakable on virtually every device that supports it!

SSH ramdisk maker & loader, version 29-06-2013 git rev-04b
Made possible thanks to Camilo Rodrigues (@Allpluscomputer)
Including xpwn source code by the Dev Team and planetbeing
Including syringe source code by Chronic-Dev and posixninja
syringe exploits by pod2g, geohot & posixninja
Special thanks to iH8sn0w
device-infos source: iphone-dataprotection
Report bugs to msft.guy (@msft_guy)

Extracted resource to C:\Users\MassModz\AppData\Local\Temp\ssh_rd\native \jsyringeapi.dll
Extracted resource to C:\Users\MassModz\AppData\Local\Temp\ssh_rd\native \mux_redux.dll

Connect a device in DFU mode
MobileDevice event: DfuConnect, 14f11227, 8930
DFU device ‘iPhone 4 (GSM)’ connected
Building ramdisk for device ‘iPhone 4 (GSM)’
Extracted resource to C:\Users\MassModz\AppData\Local\Temp\ssh_rd\all_ke ys.plist
Working dir set to C:\Users\MassModz\AppData\Local\Temp\ssh_rd
IPSW at http://appldnld.apple.com/iOS7/031-1. a_Restore.ipsw
Downloading Restore.plist
Skipping processing of C:\Users\MassModz\AppData\Local\Temp\ssh_rd\ipsw_i phone31_11B554a\Restore.plist, file already exists!
Restore.plist downloaded to C:\Users\MassModz\AppData\Local\Temp\ssh_rd\ipsw_i phone31_11B554a\Restore.plist
Parsing Restore.plist..
Kernel file: kernelcache.release.n90
Restore ramdisk file: 058-1056-002.dmg
Downloading Firmware/dfu/iBSS.n90ap.RELEASE.dfu
Skipping processing of C:\Users\MassModz\AppData\Local\Temp\ssh_rd\ipsw_i phone31_11B554a\Firmware\dfu\iBSS.n90ap.RELEASE.df u, file already exists!
iBSS prepared at C:\Users\MassModz\AppData\Local\Temp\ssh_rd\ipsw_i phone31_11B554a\Firmware\dfu\iBSS.n90ap.RELEASE.df u
Downloading Firmware/dfu/iBEC.n90ap.RELEASE.dfu
Skipping processing of C:\Users\MassModz\AppData\Local\Temp\ssh_rd\ipsw_i phone31_11B554a\Firmware\dfu\iBEC.n90ap.RELEASE.df u, file already exists!
iBEC prepared at C:\Users\MassModz\AppData\Local\Temp\ssh_rd\ipsw_i phone31_11B554a\Firmware\dfu\iBEC.n90ap.RELEASE.df u
Downloading Firmware/all_flash/all_flash.n90ap.production/DeviceTree.n90ap.img3
Skipping processing of C:\Users\MassModz\AppData\Local\Temp\ssh_rd\ipsw_i phone31_11B554a\Firmware\all_flash\all_flash.n90ap .production\DeviceTree.n90ap.img3, file already exists!
Device tree prepared at C:\Users\MassModz\AppData\Local\Temp\ssh_rd\ipsw_i phone31_11B554a\Firmware\all_flash\all_flash.n90ap .production\DeviceTree.n90ap.img3
Downloading Firmware/all_flash/all_flash.n90ap.production/manifest
Skipping processing of C:\Users\MassModz\AppData\Local\Temp\ssh_rd\ipsw_i phone31_11B554a\Firmware\all_flash\all_flash.n90ap .production\manifest, file already exists!
Downloading kernelcache.release.n90
Skipping processing of C:\Users\MassModz\AppData\Local\Temp\ssh_rd\ipsw_i phone31_11B554a\kernelcache.release.n90, file already exists!
Kernel prepared at C:\Users\MassModz\AppData\Local\Temp\ssh_rd\ipsw_i phone31_11B554a\kernelcache.release.n90
Downloading 058-1056-002.dmg
Skipping processing of C:\Users\MassModz\AppData\Local\Temp\ssh_rd\ipsw_i phone31_11B554a\058-1056-002.dmg, file already exists!
Ramdisk prepared at C:\Users\MassModz\AppData\Local\Temp\ssh_rd\ipsw_i phone31_11B554a\058-1056-002.dmg
Using syringe to exploit the bootrom..
MobileDevice event: DfuDisconnect, 14f11227, 8930
MobileDevice event: DfuConnect, 14f11227, 8930
Exploit sent!
Preparing to load the ramdisk..
Ramdisk load started!
DFU device ‘iPhone 4 (GSM)’ connected
Ignoring same device iPhone 4 (GSM)
MobileDevice event: DfuDisconnect, 14f11227, 8930
MobileDevice event: DfuConnect, 17b81227, 8930
DFU device ‘iPhone 4 (GSM)’ connected
Ignoring same device iPhone 4 (GSM)
MobileDevice event: DfuDisconnect, 17b81227, 8930
MobileDevice event: RecoveryConnect, 17b81281, 8930
MobileDevice event: RecoveryDisconnect, 17b81281, 8930
Almost there..
MobileDevice event: MuxConnect, 0, 0

Читайте также:  Apple app store как зарегистрироваться

Success!
Connect to localhost on port 2022 with your favorite SSH client!

login: root
password: alpine
MobileDevice event: MuxDisconnect, 0, 0
MobileDevice event: DfuConnect, 14f11227, 8930
DFU device ‘iPhone 4 (GSM)’ connected
Ignoring same device iPhone 4 (GSM)
MobileDevice event: DfuDisconnect, 14f11227, 8930
MobileDevice event: DfuConnect, 14f11227, 8930
DFU device ‘iPhone 4 (GSM)’ connected
Ignoring same device iPhone 4 (GSM)
MobileDevice event: DfuDisconnect, 14f11227, 8930
MobileDevice event: DfuConnect, 14f11227, 8930
DFU device ‘iPhone 4 (GSM)’ connected
Ignoring same device iPhone 4 (GSM)
MobileDevice event: DfuDisconnect, 14f11227, 8930
MobileDevice event: DfuConnect, 14f11227, 8930
DFU device ‘iPhone 4 (GSM)’ connected
Ignoring same device iPhone 4 (GSM)
MobileDevice event: DfuDisconnect, 14f11227, 8930
MobileDevice event: DfuConnect, 14f11227, 8930
DFU device ‘iPhone 4 (GSM)’ connected
Ignoring same device iPhone 4 (GSM)
MobileDevice event: DfuDisconnect, 14f11227, 8930
MobileDevice event: DfuConnect, 17b81227, 8930
DFU device ‘iPhone 4 (GSM)’ connected
Ignoring same device iPhone 4 (GSM)
MobileDevice event: DfuDisconnect, 17b81227, 8930
MobileDevice event: RecoveryConnect, 17b81281, 8930
MobileDevice event: RecoveryDisconnect, 17b81281, 8930
Almost there..
MobileDevice event: MuxConnect, 0, 0

posted over @ usbjtag.com by Mr.Rogers

does this really work? have any of you tried it

Last edited by Pir8pete; 2014-05-26 at 03:41 AM .

Источник

Оцените статью