10 martie 2014

Video Tutorial:

Bellow i will show some of the communication request iPhone 5 side only:
albert.apple.com:443
http://captive.apple.com/jlkWKLNnn/onBGBJJKklljds/XOnkdffjksJHfdf.html
http://www.ibook.info/a6JKNDF/okDAFASF/dfFDFDGD/DSdfd/GHDSDddfd.html
http://www.thinkdifferent.us/fgdSAD/fsdfsdDSF5f6q/dsggDASDAFRbhg.html
setup.icloud.com:443
configuration.apple.com:443
-and now to filter the request we used ip.src == expresion
-this was easy, but study the packets captured we found some encryption:
Handshake Type: Client Key Exchange (16)
Change Cipher Spec Protocol: Change Cipher Spec
Encrypted Handshake Message
- we had to deal with TLSV1 protocol here and get the cipher, this was the hardest step in cloning the requests.For this we found a encryption teacher, and that girl helped us tremendously and free.Many thanks!When the cipher was decrypted we have cloned a part of apple server, but was a lot of request and communication protocols and we have to make a software to deal all of this, the result: iHactivation software was born !
New method was developed by iHacktivation Team, based on cloning some parts of the iCloud Apple authentication sequence requests.All requests were inserted in a small software iHactivation program, for easely use.To understand better this method look at the picture bellow to see how its work:

Fig.1 Exploiting the iCloud requests

  • Copyright (c) 1993-2006 Microsoft Corp.
  • This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
  • This file contains the mappings of IP addresses to host names. Each entry should be kept on an individual line. The IP address should be placed in the first column followed by the corresponding host name.
  • The IP address and the host name should be separated by at least one space.
  • Additionally, comments (such as these) may be inserted on individual lines or following the machine name denoted by a ‘#’ symbol.
  • For example:
  • 102.54.94.97     rhino.acme.com          # source server
  • 38.25.63.10     x.acme.com              # x client host
  • localhost name resolution is handle within DNS itself.
  • 127.0.0.1       localhost
  • ::1             localhost
Fig. 2 iHacktivation Software in progress

This method and the software is not free, and will never be.Was made only for test and security researches.Contact me if you want to buy this method and the iHacktivation software the price is 149 USD.For this iCloud unlock, you dont need to exploit the bootrom, to open the phone case, to insert r-sim, x-sim or others, the software work with sim inserted or without sim.

What do you need to use this software?
- a notebook 1.6Ghz CPU, 10 Gb HDD, 2Gb RAM with wireless on board.
- XAMPP server installed
- OS Win 7 , XP.
- On apple device wireless is necessarily to work
What we provide to you?
- iHacktivation Software for 10 Apple device unlock
- Cloned files for Xampp server and Team Viewer support for install the files.
- Support for 10 activations.

Fig 3. iCloud account successfully accessed on iPhone 5

Rating:  
Download iHactivation:
Primary Link:
Mirror:


Categories:

3 comentarii:

  1. Did anyone noticed http://www.fastestiphoneunlock.com/ and http://www.unlockios7icloud.com/ does now have a download link to their updated tool which really bypasses iphone iCloud now??

    Just download it and it REALLYYYY works! No carrier fix yet but they promise in a next update, bypass did work and my iphone did not reboot and I was able to use music and internet!

    RăspundețiȘtergere
  2. Download iCloud Unlocker V2 - Version 2.1b
    http://www.bypassmyicloud.com/
    Bypass My iCloud present iCloud Unlocker that works on all iOS devices running iOS 7 up to iOS 8 beta 5. Does really bypass the iCloud activation lock screen but does not remove find my iphone. No carrier fix yet, carrier will be fixed soon. Sign up today and get informed + receive direct download links after free sign up!
    http://www.bypassmyicloud.com/carrier-fix/
    Bypass my iCloud
    www.bypassmyicloud.com

    RăspundețiȘtergere

Subscribe to RSS Feed Follow me on Twitter!