-
Notifications
You must be signed in to change notification settings - Fork 34
/
run_all
executable file
·38 lines (35 loc) · 1.2 KB
/
run_all
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
#!/bin/bash
if test $# -ne 1; then
echo "Usage: $0 <firmware-identifier>" 1>&2
echo "" 1>&2
echo "Argument is firmware identifier (e.g iPhone5,1_9.3_13E237)" 1>&2
exit 1
fi
firmware_id="$1"
echo "* Change working directory to scripts/"
cd scripts
echo "* Download firmware image"
yes N | ./download_ipsw "$firmware_id"
echo "* Unpack firmware image"
yes N | ./unpack_ipsw "$firmware_id"
echo "* Decrypt disk image file"
yes N | ./decrypt_fs "$firmware_id"
echo "* Decrypt kernelcache"
yes N | ./decrypt_kernel "$firmware_id"
echo "* Extract sandbox extension"
yes N | ./extract_sandbox_extension "$firmware_id"
echo "* Mount root filesystem"
yes N | sudo ./mount_fs "$firmware_id"
echo "* Copy sandboxd"
yes N | ./copy_sandboxd "$firmware_id"
echo "* Extract dynamic library cache"
yes N | ./extract_dyld_shared_cache "$firmware_id"
echo "* Pack filesystem"
yes N | sudo ./pack_filesystem "$firmware_id"
echo "* Unmount root filesystem"
yes N | sudo ./unmount_fs "$firmware_id"
echo "* Extract sandbox profiles"
yes N | ./sandblaster_extract_operations "$firmware_id"
yes N | ./sandblaster_extract_profiles "$firmware_id"
echo "* Reverse sandbox profiles"
yes N | ./sandblaster_reverse_profiles "$firmware_id"