Hey team, I just got on the linux4nano team mailing list because I have a 2g
nano and don't like apple anymore because they decided to encrypt the osos.
Anyways I decided to do some key breaking. Anyways im sad now,I assumed a
32-bit RC4 key which is a big assumption,I used visual studio and got some
rc4 decrypting functions from sourceforge and started coding a little app.
Sure, ill crack this code. in 57,732 days my app predicted yeah. So much for
a core2 duo t5600 doing high speed. Lol, guess .net framework isn't
optimized for speed. 2^32 keys is a lot of keyspace. Anyways, so the brute
force idea is pretty much out I guess. Unless someone has a mega-cluster of
computers. I don't really know what is going on with the mailing group the
gna.org list kinda sucks to join in and catch  up on. I like the idea of a
ram-dump of to get the un-encrypted firmware. Before my brute force attack I
used sg3_tools and the ipod in diagnostic mode, no luck. The ipod
vendor/device in diagnostic mode is 0000/0000 and does not respond to any
usb commands. A usb dump of the ram is kinda silly. To do that we need to
run our own code on the cpu, which means we need to write an encrypted osos
so the bootloader will parse it correctly. Which came first the chicken or
the egg? The decipher key or the memdumper? Haha. Using buffer overruns
seems safe b/c osos will crash and reboot into the bootloader, too bad
they're aren't any. Well this is what I have read/discovered the last 30
hours or so trying to brick my ipod. Any ideas? - Jeremy

_______________________________________________
Linux4nano-dev mailing list
[email protected]
https://mail.gna.org/listinfo/linux4nano-dev
http://www.linux4nano.org

Reply via email to