13 lines
599 B
Plaintext
13 lines
599 B
Plaintext
|
DEPRECATED: use the python version instead
|
||
|
|
||
|
Decrypts files data forks in raw iOS 4 disk images.
|
||
|
Reads encryption keys from plist file named after the volume ID.
|
||
|
The plist file must have at least the EMF and DKey fields set.
|
||
|
For now the tool decrypts the data forks but does not mark the files as
|
||
|
"decrypted" : running it twice on the same image will produce garbage.
|
||
|
Interrupting the process will also leave the image "half decrypted".
|
||
|
|
||
|
Uses planetbeing/dev team HFS implementation
|
||
|
https://github.com/planetbeing/xpwn
|
||
|
|
||
|
Only builds on Mac OS X, requires CoreFoundation for plist access.
|