2019-11-22 11:48:41 +01:00
#!/bin/bash
2020-03-09 02:30:19 +01:00
function BasebandDetect {
2020-04-01 04:16:29 +02:00
Firmware = resources/firmware/$ProductType
BasebandURL = $( cat $Firmware /13G37/url 2>/dev/null)
2020-03-29 05:53:53 +02:00
if [ $ProductType = = iPad2,2 ] ; then
2020-04-01 04:16:29 +02:00
BasebandURL = $( cat $Firmware /13G36/url)
2020-03-31 07:46:59 +02:00
Baseband = ICE3_04.12.09_BOOT_02.13.Release.bbfw
2020-05-05 09:05:49 +02:00
BasebandSHA1 = e6f54acc5d5652d39a0ef9af5589681df39e0aca
2020-03-29 05:53:53 +02:00
elif [ $ProductType = = iPad2,3 ] ; then
2020-03-31 07:46:59 +02:00
Baseband = Phoenix-3.6.03.Release.bbfw
2020-05-05 09:05:49 +02:00
BasebandSHA1 = 8d4efb2214344ea8e7c9305392068ab0a7168ba4
2020-03-31 07:46:59 +02:00
elif [ $ProductType = = iPad2,6 ] || [ $ProductType = = iPad2,7 ] ; then
Baseband = Mav5-11.80.00.Release.bbfw
2020-05-05 09:05:49 +02:00
BasebandSHA1 = aa52cf75b82fc686f94772e216008345b6a2a750
2020-03-31 07:46:59 +02:00
elif [ $ProductType = = iPad3,2 ] || [ $ProductType = = iPad3,3 ] ; then
Baseband = Mav4-6.7.00.Release.bbfw
2020-05-05 09:05:49 +02:00
BasebandSHA1 = a5d6978ecead8d9c056250ad4622db4d6c71d15e
2020-03-29 05:53:53 +02:00
elif [ $ProductType = = iPhone4,1 ] ; then
2020-03-31 07:46:59 +02:00
Baseband = Trek-6.7.00.Release.bbfw
2020-05-05 09:05:49 +02:00
BasebandSHA1 = 22a35425a3cdf8fa1458b5116cfb199448eecf49
2020-03-31 07:46:59 +02:00
elif [ $ProductType = = iPad3,5 ] || [ $ProductType = = iPad3,6 ] ||
[ $ProductType = = iPhone5,1 ] || [ $ProductType = = iPhone5,2 ] ; then
2020-04-01 04:16:29 +02:00
BasebandURL = $( cat $Firmware /14G61/url)
2020-03-31 07:46:59 +02:00
Baseband = Mav5-11.80.00.Release.bbfw
2020-05-05 09:05:49 +02:00
BasebandSHA1 = 8951cf09f16029c5c0533e951eb4c06609d0ba7f
2020-03-29 05:53:53 +02:00
else # For Wi-Fi only devices
Baseband = 0
2020-03-09 02:30:19 +01:00
fi
}
function Clean {
2020-05-05 09:05:49 +02:00
rm -rf iP*/ tmp/ $( ls *_${ ProductType } _${ OSVer } -*.shsh2 2>/dev/null) $( ls *.bbfw 2>/dev/null) BuildManifest.plist
2020-03-09 02:30:19 +01:00
}
2020-04-01 04:49:55 +02:00
function Log {
2020-04-16 12:29:11 +02:00
echo " [Log] $1 "
2020-04-01 04:49:55 +02:00
}
function Error {
2020-04-16 12:29:11 +02:00
echo " [Error] $1 "
[ [ ! -z $2 ] ] && echo $2
2020-04-01 04:49:55 +02:00
exit
}
2020-04-01 04:16:29 +02:00
function MainMenu {
2020-03-13 05:12:49 +01:00
if [ $( lsusb | grep -c '1227' ) = = 1 ] ; then
read -p "[Input] Device in DFU mode detected. Is the device in kDFU mode? (y/N) " kDFUManual
2020-03-09 02:30:19 +01:00
if [ [ $kDFUManual = = y ] ] || [ [ $kDFUManual = = Y ] ] ; then
2020-03-10 03:55:04 +01:00
read -p "[Input] Enter ProductType (eg. iPad2,1): " ProductType
2020-04-08 14:01:21 +02:00
read -p "[Input] Enter UniqueChipID (ECID): " UniqueChipID
2020-03-09 02:30:19 +01:00
BasebandDetect
2020-04-01 04:49:55 +02:00
Log " Downgrading device $ProductType in kDFU mode... "
2020-03-09 02:30:19 +01:00
Mode = 'Downgrade'
SelectVersion
else
2020-04-01 04:49:55 +02:00
Error "Please put the device in normal mode and jailbroken before proceeding"
2020-03-09 02:30:19 +01:00
fi
elif [ ! $ProductType ] ; then
2020-04-01 04:49:55 +02:00
Error "Please plug the device in and trust this computer before proceeding"
2020-03-05 12:48:41 +01:00
fi
2020-03-10 03:55:04 +01:00
BasebandDetect
2020-03-05 12:48:41 +01:00
echo "Main Menu"
echo
2020-03-31 08:05:29 +02:00
echo " HardwareModel: ${ HWModel } ap "
2020-04-16 12:29:11 +02:00
echo " ProductType: $ProductType "
echo " ProductVersion: $ProductVer "
2020-03-05 12:48:41 +01:00
echo " UniqueChipID (ECID): $UniqueChipID "
echo
2020-03-10 03:55:04 +01:00
echo "[Input] Select an option:"
2020-03-05 12:48:41 +01:00
select opt in "Downgrade device" "Save OTA blobs" "Just put device in kDFU mode" "(Re-)Install Dependencies" "Exit" ; do
case $opt in
2020-03-31 07:46:59 +02:00
"Downgrade device" ) Mode = 'Downgrade' ; break; ;
"Save OTA blobs" ) Mode = 'SaveOTABlobs' ; break; ;
"Just put device in kDFU mode" ) Mode = 'kDFU' ; break; ;
"(Re-)Install Dependencies" ) InstallDependencies; ;
2020-03-05 12:48:41 +01:00
"Exit" ) exit; ;
*) MainMenu; ;
esac
done
2020-03-31 07:46:59 +02:00
SelectVersion
2020-03-05 12:48:41 +01:00
}
function SelectVersion {
2020-04-01 04:16:29 +02:00
Selection = ( "iOS 8.4.1" )
if [ [ $Mode = = 'kDFU' ] ] ; then
2020-03-05 12:48:41 +01:00
Select841
2020-04-01 04:16:29 +02:00
elif [ $ProductType = = iPad2,1 ] || [ $ProductType = = iPad2,2 ] ||
[ $ProductType = = iPad2,3 ] || [ $ProductType = = iPhone4,1 ] ; then
Selection += ( "iOS 6.1.3" )
2020-03-05 12:48:41 +01:00
fi
2020-04-01 04:16:29 +02:00
[ [ $Mode = = 'Downgrade' ] ] && Selection += ( "Other" )
Selection += ( "Back" )
echo "[Input] Select iOS version:"
select opt in " ${ Selection [@] } " ; do
case $opt in
"iOS 8.4.1" ) Select841; break; ;
"iOS 6.1.3" ) Select613; break; ;
"Other" ) SelectOther; break; ;
"Back" ) MainMenu; break; ;
*) SelectVersion; ;
esac
done
2020-03-05 12:48:41 +01:00
}
function Select841 {
2020-04-16 12:29:11 +02:00
echo " iOS 8.4.1 $Mode "
2020-05-05 09:05:49 +02:00
OSVer = "8.4.1"
BuildVer = "12H321"
2020-03-05 12:48:41 +01:00
Action
}
function Select613 {
2020-04-16 12:29:11 +02:00
echo " iOS 6.1.3 $Mode "
2020-05-05 09:05:49 +02:00
OSVer = "6.1.3"
BuildVer = "10B329"
2020-03-05 12:48:41 +01:00
Action
}
function SelectOther {
2020-04-16 12:29:11 +02:00
echo " Other $Mode "
2020-03-05 12:48:41 +01:00
NotOTA = 1
2020-03-10 03:55:04 +01:00
read -p "[Input] Path to IPSW (drag IPSW to terminal window): " IPSW
2020-03-10 14:19:08 +01:00
IPSW = " $( basename " $IPSW " .ipsw) "
2020-03-10 03:55:04 +01:00
read -p "[Input] Path to SHSH (drag SHSH to terminal window): " SHSH
2020-03-31 07:46:59 +02:00
Action
2019-11-22 11:48:41 +01:00
}
2020-03-05 12:48:41 +01:00
function Action {
2020-05-05 09:05:49 +02:00
iBSS = " iBSS. $HWModel .RELEASE "
IV = $( cat $Firmware /12H321/iv)
Key = $( cat $Firmware /12H321/key)
2020-03-05 12:48:41 +01:00
if [ [ $Mode = = 'Downgrade' ] ] ; then
2020-01-08 00:17:00 +01:00
Downgrade
2020-03-05 12:48:41 +01:00
elif [ [ $Mode = = 'SaveOTABlobs' ] ] ; then
2020-04-01 05:17:19 +02:00
SaveOTABlobs
2020-03-10 03:55:04 +01:00
elif [ [ $Mode = = 'kDFU' ] ] ; then
2020-04-01 05:17:19 +02:00
kDFU
2019-11-22 11:48:41 +01:00
fi
2020-04-01 05:17:19 +02:00
exit
2019-11-22 11:48:41 +01:00
}
2019-11-23 05:15:35 +01:00
function SaveOTABlobs {
2020-05-05 09:05:49 +02:00
BuildManifest = " resources/manifests/BuildManifest_ ${ ProductType } _ ${ OSVer } .plist "
Log " Saving $OSVer blobs with tsschecker... "
env "LD_PRELOAD=libcurl.so.3" resources/tools/tsschecker_$platform -d $ProductType -i $OSVer -o -s -e $UniqueChipID -m $BuildManifest
SHSH = $( ls *_${ ProductType } _${ OSVer } -*.shsh2)
[ ! -e " $SHSH " ] && Error " Saving $OSVer blobs failed. Please run the script again " " It is also possible that $OSVer for $ProductType is no longer signed "
2020-03-29 05:53:53 +02:00
mkdir -p saved/shsh 2>/dev/null
cp " $SHSH " saved/shsh
2020-05-05 09:05:49 +02:00
Log " Successfully saved $OSVer blobs. "
2019-11-23 05:15:35 +01:00
}
2020-03-05 12:48:41 +01:00
function kDFU {
2020-03-29 07:05:45 +02:00
if [ ! -e saved/$ProductType /$iBSS .dfu ] ; then
2020-04-01 04:49:55 +02:00
Log "Downloading iBSS..."
2020-05-05 09:05:49 +02:00
resources/tools/pzb_$platform -g Firmware/dfu/${ iBSS } .dfu -o $iBSS .dfu $( cat $Firmware /12H321/url)
2020-03-29 05:53:53 +02:00
mkdir -p saved/$ProductType 2>/dev/null
mv $iBSS .dfu saved/$ProductType
2020-03-10 03:55:04 +01:00
fi
2020-04-01 04:49:55 +02:00
Log "Decrypting iBSS..."
Log " IV = $IV "
Log " Key = $Key "
2020-03-31 08:13:51 +02:00
resources/tools/xpwntool_$platform saved/$ProductType /$iBSS .dfu tmp/iBSS.dec -k $Key -iv $IV -decrypt
2019-11-22 11:48:41 +01:00
dd bs = 64 skip = 1 if = tmp/iBSS.dec of = tmp/iBSS.dec2
2020-04-01 04:49:55 +02:00
Log "Patching iBSS..."
2020-03-02 08:20:47 +01:00
bspatch tmp/iBSS.dec2 tmp/pwnediBSS resources/patches/$iBSS .patch
2020-03-13 05:12:49 +01:00
# Regular kloader only works on iOS 6 to 9, so other versions are provided for iOS 5 and 10
2019-12-15 04:52:10 +01:00
if [ [ $VersionDetect = = 1 ] ] ; then
2020-03-10 03:55:04 +01:00
kloader = 'kloader_hgsp'
2019-12-15 04:52:10 +01:00
elif [ [ $VersionDetect = = 5 ] ] ; then
2020-03-10 03:55:04 +01:00
kloader = 'kloader5'
2019-11-22 11:48:41 +01:00
else
2020-03-10 03:55:04 +01:00
kloader = 'kloader'
2019-11-22 11:48:41 +01:00
fi
2019-12-15 04:52:10 +01:00
if [ [ $VersionDetect = = 1 ] ] ; then
2020-04-16 12:29:11 +02:00
# ifuse+MTerminal is used instead of SSH for devices on iOS 10
[ ! $( which ifuse) ] && Error "ifuse not found. Please re-install dependencies and try again" "For macOS systems, install osxfuse and ifuse with brew"
2020-03-01 20:47:48 +01:00
WifiAddr = $( ideviceinfo -s | grep 'WiFiAddress' | cut -c 14-)
2019-11-22 11:48:41 +01:00
WifiAddrDecr = $( echo $( printf "%x\n" $( expr $( printf "%d\n" 0x$( echo " ${ WifiAddr } " | tr -d ':' ) ) - 1) ) | sed 's/\(..\)/\1:/g;s/:$//' )
2020-01-08 00:28:11 +01:00
echo '#!/bin/bash' > tmp/pwn.sh
echo " nvram wifiaddr= $WifiAddrDecr
chmod 755 kloader_hgsp
./kloader_hgsp pwnediBSS" >> tmp/pwn.sh
2020-04-01 04:49:55 +02:00
Log "Mounting device with ifuse..."
2020-03-13 05:12:49 +01:00
mkdir mount
2020-03-08 11:59:22 +01:00
ifuse mount
2020-04-01 04:49:55 +02:00
Log "Copying stuff to device..."
2020-03-08 11:59:22 +01:00
cp "tmp/pwn.sh" " resources/tools/ $kloader " "tmp/pwnediBSS" "mount/"
2020-04-01 04:49:55 +02:00
Log "Unmounting device..."
2020-03-08 11:59:22 +01:00
sudo umount mount
2019-11-22 11:48:41 +01:00
echo
2020-04-01 04:49:55 +02:00
Log "Open MTerminal and run these commands:"
2019-11-22 11:48:41 +01:00
echo
2020-01-08 00:17:00 +01:00
echo '$ su'
2019-11-22 11:48:41 +01:00
echo "(enter root password, default is 'alpine')"
2020-01-08 00:17:00 +01:00
echo "# cd Media"
2020-01-08 00:28:11 +01:00
echo "# chmod +x pwn.sh"
echo "# ./pwn.sh"
2019-11-22 11:48:41 +01:00
else
2020-04-16 12:29:11 +02:00
# SSH kloader and pwnediBSS
2019-11-22 11:48:41 +01:00
echo "Make sure SSH is installed and working on the device!"
2020-03-05 12:48:41 +01:00
echo "Please enter Wi-Fi IP address of device for SSH connection"
2020-03-10 16:07:11 +01:00
read -p "[Input] IP Address: " IPAddress
2020-04-01 04:49:55 +02:00
Log "Coonecting to device via SSH... Please enter root password when prompted (default is 'alpine')"
Log "Copying stuff to device..."
2020-03-02 08:20:47 +01:00
scp resources/tools/$kloader tmp/pwnediBSS root@$IPAddress :/
2020-04-16 12:29:11 +02:00
[ $? = = 1 ] && Error "Cannot connect to device via SSH." "Please check your ~/.ssh/known_hosts file and try again"
2020-04-01 04:49:55 +02:00
Log "Entering kDFU mode..."
2020-03-02 08:20:47 +01:00
ssh root@$IPAddress " chmod 755 / $kloader && / $kloader /pwnediBSS " &
2019-11-22 11:48:41 +01:00
fi
2020-01-08 00:17:00 +01:00
echo
2019-11-22 11:48:41 +01:00
echo "Press home/power button once when screen goes black on the device"
2019-12-15 04:52:10 +01:00
FindDFU
}
2019-11-22 11:48:41 +01:00
2019-12-15 04:52:10 +01:00
function FindDFU {
2020-04-01 04:49:55 +02:00
Log "Finding device in DFU mode..."
2019-12-15 04:52:10 +01:00
while [ [ $DFUDevice != 1 ] ] ; do
DFUDevice = $( lsusb | grep -c "1227" )
2019-11-22 11:48:41 +01:00
sleep 2
done
2020-04-01 04:49:55 +02:00
Log "Found device in DFU mode."
2019-11-22 11:48:41 +01:00
}
2020-03-31 08:05:29 +02:00
function Downgrade {
2020-03-05 12:48:41 +01:00
if [ ! $NotOTA ] ; then
SaveOTABlobs
2020-05-05 09:05:49 +02:00
IPSW = " ${ ProductType } _ ${ OSVer } _ ${ BuildVer } _Restore "
2020-03-10 14:19:08 +01:00
if [ ! -e " $IPSW .ipsw " ] ; then
2020-05-05 09:05:49 +02:00
Log " iOS $OSVer IPSW is missing, downloading IPSW... "
curl -L $( cat $Firmware /$BuildVer /url) -o tmp/$IPSW .ipsw
2020-03-13 05:12:49 +01:00
mv tmp/$IPSW .ipsw .
2020-03-05 12:48:41 +01:00
fi
2020-04-01 04:49:55 +02:00
Log "Verifying IPSW..."
2020-05-05 09:15:02 +02:00
IPSWSHA1 = $( cat $Firmware /$BuildVer /sha1sum)
IPSWSHA1L = $( sha1sum " $IPSW .ipsw " | awk '{print $1}' )
[ $IPSWSHA1L != $IPSWSHA1 ] && Error "SHA1 of IPSW does not match. Please run the script again"
2020-04-08 14:01:21 +02:00
if [ ! $kDFUManual ] ; then
Log "Extracting iBSS from IPSW..."
mkdir -p saved/$ProductType 2>/dev/null
unzip -o -j " $IPSW .ipsw " Firmware/dfu/$iBSS .dfu -d saved/$ProductType
fi
2019-11-22 11:48:41 +01:00
fi
2020-03-05 12:48:41 +01:00
2020-04-01 04:16:29 +02:00
[ ! $kDFUManual ] && kDFU
2020-03-05 12:48:41 +01:00
2020-04-01 04:49:55 +02:00
Log "Extracting IPSW..."
2020-03-10 16:07:11 +01:00
unzip -q " $IPSW .ipsw " -d " $IPSW / "
2020-03-10 03:55:04 +01:00
2020-04-01 04:49:55 +02:00
Log "Preparing for futurerestore (starting local server)..."
2020-03-05 12:48:41 +01:00
cd resources
2020-03-29 07:05:45 +02:00
sudo bash -c "python3 -m http.server 80 &"
2020-03-05 12:48:41 +01:00
cd ..
2020-03-29 05:53:53 +02:00
if [ $Baseband = = 0 ] ; then
2020-04-01 04:49:55 +02:00
Log " Device $ProductType has no baseband "
Log "Proceeding to futurerestore..."
2020-03-29 05:53:53 +02:00
sudo env "LD_PRELOAD=libcurl.so.3" resources/tools/futurerestore_$platform -t " $SHSH " --no-baseband --use-pwndfu " $IPSW .ipsw "
else
if [ ! -e saved/$ProductType /*.bbfw ] ; then
2020-04-01 04:49:55 +02:00
Log "Downloading baseband..."
2020-03-31 07:46:59 +02:00
resources/tools/pzb_$platform -g Firmware/$Baseband -o $Baseband $BasebandURL
2020-03-29 05:53:53 +02:00
resources/tools/pzb_$platform -g BuildManifest.plist -o BuildManifest.plist $BasebandURL
mkdir -p saved/$ProductType 2>/dev/null
cp $( ls *.bbfw) BuildManifest.plist saved/$ProductType
2020-03-05 12:48:41 +01:00
else
2020-03-29 05:53:53 +02:00
cp saved/$ProductType /*.bbfw saved/$ProductType /BuildManifest.plist .
2020-03-05 12:48:41 +01:00
fi
2020-05-05 09:15:02 +02:00
BasebandSHA1L = $( sha1sum $( ls *.bbfw) | awk '{print $1}' )
if [ ! -e *.bbfw ] && [ $BasebandSHA1L != $BasebandSHA1 ] ; then
rm saved/$ProductType /*.bbfw saved/$ProductType /BuildManifest.plist
2020-05-05 09:05:49 +02:00
echo "[Error] Downloading/verifying baseband failed!"
2020-03-29 05:53:53 +02:00
echo "Your device is still in kDFU mode, you may run the script again"
echo "If you continue, futurerestore can attempt to download the baseband again"
read -p "[Input] Continue anyway? (y/N)" Continue
if [ [ $Continue = = y ] ] || [ [ $Continue = = Y ] ] ; then
2020-04-01 04:49:55 +02:00
Log "Proceeding to futurerestore..."
2020-03-29 05:53:53 +02:00
sudo env "LD_PRELOAD=libcurl.so.3" resources/tools/futurerestore_$platform -t " $SHSH " --latest-baseband --use-pwndfu " $IPSW .ipsw "
else
exit
fi
2020-03-05 12:48:41 +01:00
fi
2020-03-29 05:53:53 +02:00
if [ [ $Continue != y ] ] && [ [ $Continue != Y ] ] ; then
2020-04-01 04:49:55 +02:00
Log "Proceeding to futurerestore..."
2020-03-29 05:53:53 +02:00
sudo env "LD_PRELOAD=libcurl.so.3" resources/tools/futurerestore_$platform -t " $SHSH " -b $( ls *.bbfw) -p BuildManifest.plist --use-pwndfu " $IPSW .ipsw "
fi
fi
echo
2020-04-01 04:49:55 +02:00
Log "futurerestore done!"
Log "Stopping local server..."
2020-03-29 07:05:45 +02:00
ps aux | awk '/python3/ {print "sudo kill -9 "$2" 2>/dev/null"}' | bash
2020-04-01 04:49:55 +02:00
Log "Downgrade script done!"
2020-03-05 12:48:41 +01:00
}
2020-01-08 00:17:00 +01:00
function InstallDependencies {
echo "Install Dependencies"
2019-12-04 08:11:24 +01:00
2020-03-09 02:30:19 +01:00
. /etc/os-release 2>/dev/null
2020-04-01 04:16:29 +02:00
if [ [ $( which pacman) ] ] ; then
2020-02-04 16:33:45 +01:00
Arch
2020-04-27 07:16:07 +02:00
elif [ [ $VERSION_ID = = "16.04" ] ] || [ [ $VERSION_ID = = "18.04" ] ] || [ [ $VERSION_ID = = "20.04" ] ] ; then
2019-12-04 08:11:24 +01:00
Ubuntu
2020-01-08 00:17:00 +01:00
elif [ [ $OSTYPE = = "darwin" * ] ] ; then
2020-02-04 16:33:45 +01:00
macOS
2019-12-04 08:11:24 +01:00
else
2020-04-17 05:18:24 +02:00
Error "Distro not detected/supported by install script." "See the repo README for OS versions/distros tested on"
2019-12-04 08:11:24 +01:00
fi
2020-04-01 04:49:55 +02:00
Log "Install script done! Please run the script again to proceed"
2020-01-08 00:17:00 +01:00
}
2020-02-04 16:33:45 +01:00
function Arch {
2020-04-01 04:49:55 +02:00
Log "Installing dependencies for Arch with pacman..."
2020-03-02 09:11:52 +01:00
sudo pacman -Sy --noconfirm bsdiff curl ifuse libcurl-compat libpng12 libzip openssh openssl-1.0 python unzip usbutils
2020-02-08 16:19:36 +01:00
sudo pacman -S --noconfirm libimobiledevice usbmuxd
2020-02-04 16:33:45 +01:00
sudo ln -sf /usr/lib/libzip.so.5 /usr/lib/libzip.so.4
}
function macOS {
if [ [ ! $( which brew) ] ] ; then
2020-04-01 04:49:55 +02:00
Log "Homebrew is not detected/installed, installing Homebrew..."
2020-03-05 12:48:41 +01:00
/bin/bash -c " $( curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install.sh) "
2020-02-04 16:33:45 +01:00
fi
2020-04-01 04:49:55 +02:00
Log "Installing dependencies for macOS with Homebrew..."
2020-02-04 16:33:45 +01:00
brew uninstall --ignore-dependencies usbmuxd
brew uninstall --ignore-dependencies libimobiledevice
brew install --HEAD usbmuxd
brew install --HEAD libimobiledevice
2020-04-17 05:18:24 +02:00
brew install libzip lsusb python3
2020-03-06 00:46:08 +01:00
brew cask install osxfuse
brew install ifuse
2020-02-04 16:33:45 +01:00
}
2020-01-08 00:17:00 +01:00
function Ubuntu {
2020-04-01 04:49:55 +02:00
Log "Running APT update..."
2020-01-08 00:17:00 +01:00
sudo apt update
2020-04-27 07:16:07 +02:00
Log " Installing dependencies for Ubuntu $VERSION_ID with APT... "
sudo apt -y install bsdiff curl ifuse libimobiledevice-utils python3 usbmuxd
2020-04-27 07:23:27 +02:00
if [ [ $VERSION_ID != "16.04" ] ] ; then
2020-04-27 07:16:07 +02:00
sudo apt -y install binutils
mkdir tmp
cd tmp
curl -L http://archive.ubuntu.com/ubuntu/pool/universe/c/curl3/libcurl3_7.58.0-2ubuntu2_amd64.deb -o libcurl3.deb
ar x libcurl3.deb data.tar.xz
tar xf data.tar.xz
sudo cp usr/lib/x86_64-linux-gnu/libcurl.so.4.* /usr/lib/libcurl.so.3
2020-04-27 07:40:14 +02:00
if [ [ $VERSION_ID = = "20.04" ] ] ; then
URLlibpng12 = http://ppa.launchpad.net/linuxuprising/libpng12/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.54-1ubuntu1.1+1~ppa0~focal_amd64.deb
curl -L http://archive.ubuntu.com/ubuntu/pool/universe/libz/libzip/libzip4_1.1.2-1.1_amd64.deb -o libzip4.deb
sudo dpkg -i libzip4.deb
2020-04-27 07:47:58 +02:00
curl -L http://archive.ubuntu.com/ubuntu/pool/main/o/openssl1.0/libssl1.0.0_1.0.2n-1ubuntu5.3_amd64.deb -o libssl1.0.0.deb
sudo dpkg -i libssl1.0.0.deb
2020-04-27 07:40:14 +02:00
else
URLlibpng12 = http://mirrors.edge.kernel.org/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.54-1ubuntu1.1_amd64.deb
sudo apt -y install libzip4
fi
curl -L $URLlibpng12 -o libpng12.deb
2020-04-27 07:16:07 +02:00
sudo dpkg -i libpng12.deb
else
sudo apt -y install libzip4
fi
2020-01-08 00:17:00 +01:00
}
2020-03-13 05:12:49 +01:00
# --- MAIN SCRIPT STARTS HERE ---
2020-02-04 16:33:45 +01:00
2020-03-31 08:19:32 +02:00
trap 'Clean; exit' INT TERM EXIT
2020-02-24 15:52:46 +01:00
clear
2020-04-16 12:29:11 +02:00
echo "******* 32bit-OTA-Downgrader *******"
echo " Downgrade script by LukeZGD "
2020-02-24 15:52:46 +01:00
echo
if [ [ $OSTYPE = = "linux-gnu" ] ] ; then
2020-03-10 03:55:04 +01:00
platform = 'linux'
2020-02-24 15:52:46 +01:00
elif [ [ $OSTYPE = = "darwin" * ] ] ; then
2020-03-10 03:55:04 +01:00
platform = 'macos'
2020-02-24 15:52:46 +01:00
else
2020-04-01 04:49:55 +02:00
Error "OSTYPE unknown/not supported" "Supports Linux and macOS only"
2020-02-24 15:52:46 +01:00
fi
2020-04-16 12:29:11 +02:00
[ [ ! $( ping -c1 google.com 2>/dev/null) ] ] && Error "Please check your Internet connection before proceeding"
[ [ $( uname -m) != 'x86_64' ] ] && Error "Only x86_64 distributions are supported. Use a 64-bit distro and try again"
2020-03-04 16:19:01 +01:00
2020-03-31 08:05:29 +02:00
HWModel = $( ideviceinfo -s | grep 'HardwareModel' | cut -c 16- | tr '[:upper:]' '[:lower:]' | sed 's/.\{2\}$//' )
2020-03-01 20:47:48 +01:00
ProductType = $( ideviceinfo -s | grep 'ProductType' | cut -c 14-)
2020-03-02 11:08:15 +01:00
[ ! $ProductType ] && ProductType = $( ideviceinfo | grep 'ProductType' | cut -c 14-)
2020-03-31 07:46:59 +02:00
ProductVer = $( ideviceinfo -s | grep 'ProductVer' | cut -c 17-)
VersionDetect = $( echo $ProductVer | cut -c 1)
2020-03-01 20:47:48 +01:00
UniqueChipID = $( ideviceinfo -s | grep 'UniqueChipID' | cut -c 15-)
2020-02-24 15:52:46 +01:00
2020-03-10 03:55:04 +01:00
if [ ! $( which bspatch) ] || [ ! $( which ideviceinfo) ] || [ ! $( which lsusb) ] || [ ! $( which ssh) ] || [ ! $( which python3) ] ; then
2020-01-08 00:17:00 +01:00
InstallDependencies
2019-12-04 08:11:24 +01:00
else
2020-03-02 08:20:47 +01:00
chmod +x resources/tools/*
2020-04-01 04:16:29 +02:00
Clean
mkdir tmp
rm -rf resources/firmware
curl -Ls https://github.com/LukeZGD/32bit-OTA-Downgrader/archive/firmware.zip -o tmp/firmware.zip
unzip -q tmp/firmware.zip -d tmp
mkdir resources/firmware
mv tmp/32bit-OTA-Downgrader-firmware/* resources/firmware
2019-12-04 08:11:24 +01:00
MainMenu
2019-12-08 10:53:44 +01:00
fi