Replies: 3 comments 34 replies
-
same issue, i downgraded my newbootrom iphone 3gs to 3.1.3 before, about two years ago using this same tool and now it just doesnt work, did you figure it out or it's still giving you that issue? |
Beta Was this translation helpful? Give feedback.
-
I would need someone to test this out: update to the latest v25.06.34 then try installing alloc8 exploit i think this issue is exclusive to intel macs only on macos 12+ so only those users should test this, probably |
Beta Was this translation helpful? Give feedback.
-
it's the same alloc8 issue, i tried many iphone 3gs's even installing the alloc8 before doing anything but it keeps failing, i also used different cables in case it was that the issue but it looks like it isnt.. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
*** Legacy iOS Kit ***
Version: v25.06.31 (688129c)
Platform: macos (Ventura 13.7.6 - x86_64)
Device: iPhone 3GS (iPhone2,1 - n88ap) in DFU mode
This iPhone 3GS is a new bootrom model
Cannot check for manufacturing date in DFU mode
iOS Version: Unknown
To get iOS version, go to: Misc Utilities -> Get iOS Version
ECID: 3043271441741
Pwned: limera1n
Only select unmodified IPSW for the selection. Do not select custom IPSWs
Selected Target IPSW: ../iPhone2,1_3.1.3_7E18_Restore.ipsw
Selected Target IPSW is validated
Hacktivation is supported for this restore
You can select your own custom logo and recovery image. This is optional and an experimental option
Note: The images must be in PNG format, and up to 320x480 resolution only
Note 2: The custom images might not work, current support is spotty
No custom Apple logo selected
No custom recovery logo selected
This restore will have baseband update disabled
[Log] Jailbreak option is not available for this version. You may jailbreak (and hacktivate) later after the restore
[Input] Memory Option for creating custom IPSW
[Input] Enable this option? (Y/n):
-> Yes
No
[Log] Memory option enabled.
[Input] Verbose Boot Option
[Input] Enable this option? (Y/n):
-> Yes
No
[Log] Verbose boot option enabled.
[Log] Device seems to be already in pwned DFU mode
[Log] Checking firmware keys in ../saved/firmware/iPhone2,1/7E18
[Log] Preparing config file
ERROR: Unable to successfully restore device
ERROR: Unable to restore device
Proceed to install the alloc8 exploit for the device to boot:
-> Go to: Useful Utilities -> Install alloc8 Exploit
[Log] Do not disconnect your device, not done yet
[Log] Finding device in DFU mode...
[Log] Found device in DFU mode.
[Log] Placing device to pwnDFU mode using ipwnder
[main] enabled: debug log
[main] Waiting for device in DFU mode...
[io_get_serial] Found serial number!
[main] CONNECTED
[main] CPID: 0x8920, BDID: 0x00, STRG: [iBoot-359.3.2]
** exploiting with limera1n
[limera1n] reconnecting
[io_reset] ResetDevice: 0
[io_reset] USBDeviceReEnumerate: 0
[limera1n] sending exploit payload
[limera1n] 0, 1392
[limera1n] sending fake data
[limera1n] 0, 1
[limera1n] e0004051, 0
[limera1n] executing exploit
[limera1n] e0004051, 0
[limera1n] reconnecting
[io_reset] ResetDevice: 0
[io_reset] USBDeviceReEnumerate: 0
[limera1n] 0, 0
[limera1n] 0, 6
[limera1n] 0, 6
[limera1n] 0, 6
[limera1n] exploit sent
[limera1n] reconnecting
[io_reset] ResetDevice: 0
[io_reset] USBDeviceReEnumerate: 0
[io_get_serial] Found serial number!
[limera1n] pwned!
[Log] Checking for device
[Log] Found device in pwned DFU mode.
Pwned: limera1n
[Log] Installing alloc8 to device
Acquiring device handle.
Releasing device handle.
Installing alloc8 exploit to NOR.
Acquiring device handle.
Resetting USB counters.
Performing USB port reset.
Sending 0x11 of data to device.
Traceback (most recent call last):
File "/Users/namin/Downloads/Legacy-iOS-Kit_macos_v25/saved/ipwndfu_python3/./ipwndfu", line 44, in
dump = device.nor_dump(saveBackup=False)
File "/Users/namin/Downloads/Legacy-iOS-Kit_macos_v25/saved/ipwndfu_python3/dfuexec.py", line 108, in nor_dump
(bdev, _) = self.execute(struct.pack('<2I5s', self.config.get_block_device, self.config.load_address + 12, b'nor0\x00'), 0)
File "/Users/namin/Downloads/Legacy-iOS-Kit_macos_v25/saved/ipwndfu_python3/dfuexec.py", line 75, in execute
dfu.send_data(device, EXEC_MAGIC + cmd)
File "/Users/namin/Downloads/Legacy-iOS-Kit_macos_v25/saved/ipwndfu_python3/dfu.py", line 44, in send_data
assert device.ctrl_transfer(0x21, 1, 0, 0, data[index:index + amount], 5000) == amount
File "/Users/namin/Downloads/Legacy-iOS-Kit_macos_v25/saved/ipwndfu_python3/usb/core.py", line 1091, in ctrl_transfer
self._ctx.managed_claim_interface(self, interface_number)
File "/Users/namin/Downloads/Legacy-iOS-Kit_macos_v25/saved/ipwndfu_python3/usb/core.py", line 113, in wrapper
return f(self, *args, **kwargs)
File "/Users/namin/Downloads/Legacy-iOS-Kit_macos_v25/saved/ipwndfu_python3/usb/core.py", line 180, in managed_claim_interface
self.backend.claim_interface(self.handle, i)
File "/Users/namin/Downloads/Legacy-iOS-Kit_macos_v25/saved/ipwndfu_python3/usb/backend/libusb1.py", line 833, in claim_interface
_check(self.lib.libusb_claim_interface(dev_handle.handle, intf))
File "/Users/namin/Downloads/Legacy-iOS-Kit_macos_v25/saved/ipwndfu_python3/usb/backend/libusb1.py", line 604, in _check
raise USBError(_strerror(ret), ret, _libusb_errno[ret])
usb.core.USBError: [Errno 19] No such device (it may have been disconnected)
[WARNING] ipwndfu alloc8 seems to have failed. Just force restart the device, enter DFU, and try again.
You may also need to force restart the device and re-enter DFU mode before retrying.
To retry, just go back to: Useful Utilities -> Install alloc8 Exploit
Save the terminal output now if needed. (macOS: Cmd+S, Linux: Ctrl+Shift+S)
Legacy iOS Kit v25.06.31 (688129c)
Platform: macos (Ventura 13.7.6 - x86_64)
namin@seonnam-in-ui-MacBookPro ~ %
Beta Was this translation helpful? Give feedback.
All reactions