Hi,
Quick question, but has anybody successfully run any of the last 2 / 3 releases of the JZ iPhone Forensic software he released?
I keep getting
"Couldn't find firmware manifest"
"Remote inject exiting"
I have tried it on OS and Linux and including the release from yesterday? Very weird. I'm sure he tests it…
Any clues much appreciated!
4R
UPDATE
Seems he's moved the Firmware file from Multiplatform_IOS4 root???
What did the author say when you contacted him?
I have just downloaded the new 3108 tools and I have noticed the same thing.
The firmware file simply says "Support/firmware"
Did you get a response from JZ at all?
I noticed the firmware manifest are linked via aliases on the mac osx release.
Has anyone else noticed this?
My aliases were visible but a colleague had problems when his weren't. He had success by copying the firmware manifest to the root of the .sh tools.
Mine seem to work fine, but as I said I can see my aliases.
I have attached a screenshot of my folder view below.
If you delete the sym link file 'firmware' from within the multiplatform folder and just copy the 'support' folder into the multiplatform folder it seems to work OK.
Although I am now having issues with it hanging. will play about some more and post my findings.
Thanks for the responses guys.
As ChrisJones mentioned (thanks for the help bud) I managed a work around on the Linux, but still had trouble with the Mac.
We have two Macs (iMac and MacPro) in the office and after putting OS Lion on them both, it only worked on the MacPro, so am thinking if there some kind of conflict?, but since other people are seeing this, maybe its not just our Macs?
Have not contacted JZ as I posted here to see if its an issue with the software or just us first. Maybe check on Monday to see if there are any new releases and take it from there. I would have thought if it is a major bug then he would be inundated with emails!
Thanks
4F
I have been able to acquire a raw image from an iPhone 4 but cannot get the emf_decrypt script to run. I've installed pycrypto and construct without warning or error and tried both OS-X Lion and Ubuntu. The error output on Lion is
Traceback (most recent call last)
File "emf_decrypter.py", line 8, in <module>
v = EMFVolume(sys.argv[1], sys.argv[2], write=True)
File "/Users/tbalzanto/Desktop/iOS/AutomatedTools/Crypto/hfs/emf.py", line 73, in __init__
pldict = plistlib.readPlist(pl)
File "/System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/plistlib.py", line 78, in readPlist
rootObject = p.parse(pathOrFile)
File "/System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/plistlib.py", line 406, in parse
parser.ParseFile(fileobj)
xml.parsers.expat.ExpatError syntax error line 1, column 0
And yes, I have emailed Jonathan for the past several days and so far we've yet to work out a solution. I was hoping some fresh eyes could offer a suggestion or two.
Greetings,
JZ now works for viaForensics. Perhaps you could call them?
-David
Before I email JZ and I have spoke with another iGuru from here, but am still looking for some info…
I have an iPad 2 running 4.3.3
I am aware that is it unsupported officially via JZs tools, but has anybody managed to use his tools for an iPad 2 extract? as mentioned to me, we could edit the firmware to pump through the iPad2 IPSW file directly and spoof it with the A1332 model number, but I'm not sure if it would work or brick it?