You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I am downgrading my iPod Touch 7 to iOS 14.5. Everything goes normal, until it reboots into recovery mode.
macOS 10.14, MacBook Air (13", early 2015)
[] Waiting for devices
[] Detected recovery mode device
[] Waiting for devices
[] Detected recovery mode device
[] Getting device info...
Detected cpid, your cpid is 0x8010
Detected model, your model is n112ap
Detected deviceid, your deviceid is iPod9,1
[] To get into DFU mode, you will be guided through 2 steps:
[] Press any key when ready for DFU mode
Get ready (0)
Release side button, but keep holding volume down (9)
Release side button, but keep holding volume down (4)
[] Device entered DFU!
[-] we found ipsw/iPod9,1-14.5.ipsw, do you want to use it ? please write, yes or no
yes
ipsw/iPod9,1-14.5.ipsw
[] Checking if the ipsw is for your device
[] Checking ipsw version
[] Extracting ipsw, hang on please ...
[] Got extract the IPSW successfully
[] Creating ramdisk
[-] Ramdisk is already created so SKIPPING ...
[] Booting ramdisk
[/] We couldn't get the ipsw curl. we will proceed with -k option with curl
usb_timeout: 5
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID:8010 CPRV:11 CPFM:03 SCEP:01 BDID:16 ECID:001165443C638026 IBFL:3C SRTG:[iBoot-2696.0.0.1.33]
Found the USB handle.
Stage: RESET
ret: true
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID:8010 CPRV:11 CPFM:03 SCEP:01 BDID:16 ECID:001165443C638026 IBFL:3C SRTG:[iBoot-2696.0.0.1.33]
Found the USB handle.
Stage: SPRAY
ret: true
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID:8010 CPRV:11 CPFM:03 SCEP:01 BDID:16 ECID:001165443C638026 IBFL:3C SRTG:[iBoot-2696.0.0.1.33]
Found the USB handle.
Stage: SETUP
ret: true
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID:8010 CPRV:11 CPFM:03 SCEP:01 BDID:16 ECID:001165443C638026 IBFL:3C SRTG:[iBoot-2696.0.0.1.33]
Found the USB handle.
Stage: PATCH
ret: true
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID:8010 CPRV:11 CPFM:03 SCEP:01 BDID:16 ECID:001165443C638026 IBFL:3C SRTG:[iBoot-2696.0.0.1.33] PWND:[gaster]
Found the USB handle.
Now you can boot untrusted images.
usb_timeout: 5
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
Found the USB handle.
[==================================================] 100.0%
[==================================================] 100.0%
[==================================================] 100.0%
[==================================================] 100.0%
[==================================================] 100.0%
[==================================================] 100.0%
[==================================================] 100.0%
[] Waiting for the ramdisk to finish booting
Error connecting to device: No such file or directory
Warning: Permanently added '[localhost]:2222' (ECDSA) to the list of known hosts.
[] Mounting filesystems ...
[] Dumpped SHSH
[] Checking device version
the version that the device is currently in is 15.8.3
[] extracting kernel ...
[] extracted
Reboot into recovery mode ...
[] To get into DFU mode, you will be guided through 2 steps:
[] Press any key when ready for DFU mode
Get ready (0)
Release side button, but keep holding volume down (9)
Release side button, but keep holding volume down (3)
[] Device entered DFU!
[ ]Patching some boot files...
[] Finished moving the boot files to work
[] Decrypthing ibss and iboot
usb_timeout: 5
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID:8010 CPRV:11 CPFM:03 SCEP:01 BDID:16 ECID:001165443C638026 IBFL:3C SRTG:[iBoot-2696.0.0.1.33]
Found the USB handle.
Stage: RESET
ret: true
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID:8010 CPRV:11 CPFM:03 SCEP:01 BDID:16 ECID:001165443C638026 IBFL:3C SRTG:[iBoot-2696.0.0.1.33]
Found the USB handle.
Stage: SPRAY
ret: true
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID:8010 CPRV:11 CPFM:03 SCEP:01 BDID:16 ECID:001165443C638026 IBFL:3C SRTG:[iBoot-2696.0.0.1.33]
Found the USB handle.
Stage: SETUP
ret: true
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID:8010 CPRV:11 CPFM:03 SCEP:01 BDID:16 ECID:001165443C638026 IBFL:3C SRTG:[iBoot-2696.0.0.1.33]
Found the USB handle.
Stage: PATCH
ret: true
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID:8010 CPRV:11 CPFM:03 SCEP:01 BDID:16 ECID:001165443C638026 IBFL:3C SRTG:[iBoot-2696.0.0.1.33] PWND:[gaster]
Found the USB handle.
Now you can boot untrusted images.
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
Found the USB handle.
[*] Patching the kernel
dyld: cannot load 'Kernel64Patcher' (load command 0x80000034 is unknown)
/Users/antonlando/Downloads/downr1n-main/downr1n.sh: line 1353: 31141 Abort trap: 6 "$dir"/Kernel64Patcher work/kcache.raw work/kcache.patched if [ "$ptraceDisabled" = "1" ]; then echo "-t"; fiif [ "$aslrDisabled" = "1" ]; then echo "-c"; fiif [[ "$version" = "15."* ]]; then echo "-e -o -r -b15"; fiif [[ "$version" = "14."* ]]; then echo "-b"; fiif [[ "$version" = "13."* ]]; then echo "-b13 -n"; fi > /dev/null
The text was updated successfully, but these errors were encountered:
I am downgrading my iPod Touch 7 to iOS 14.5. Everything goes normal, until it reboots into recovery mode.
macOS 10.14, MacBook Air (13", early 2015)
[] Waiting for devices
[] Detected recovery mode device
[] Waiting for devices
[] Detected recovery mode device
[] Getting device info...
Detected cpid, your cpid is 0x8010
Detected model, your model is n112ap
Detected deviceid, your deviceid is iPod9,1
[] To get into DFU mode, you will be guided through 2 steps:
[] Press any key when ready for DFU mode
Get ready (0)
Release side button, but keep holding volume down (9)
Release side button, but keep holding volume down (4)
[] Device entered DFU!
[-] we found ipsw/iPod9,1-14.5.ipsw, do you want to use it ? please write, yes or no
yes
ipsw/iPod9,1-14.5.ipsw
[] Checking if the ipsw is for your device
[] Checking ipsw version
[] Extracting ipsw, hang on please ...
[] Got extract the IPSW successfully
[] Creating ramdisk
[-] Ramdisk is already created so SKIPPING ...
[] Booting ramdisk
[/] We couldn't get the ipsw curl. we will proceed with -k option with curl
usb_timeout: 5
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID:8010 CPRV:11 CPFM:03 SCEP:01 BDID:16 ECID:001165443C638026 IBFL:3C SRTG:[iBoot-2696.0.0.1.33]
Found the USB handle.
Stage: RESET
ret: true
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID:8010 CPRV:11 CPFM:03 SCEP:01 BDID:16 ECID:001165443C638026 IBFL:3C SRTG:[iBoot-2696.0.0.1.33]
Found the USB handle.
Stage: SPRAY
ret: true
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID:8010 CPRV:11 CPFM:03 SCEP:01 BDID:16 ECID:001165443C638026 IBFL:3C SRTG:[iBoot-2696.0.0.1.33]
Found the USB handle.
Stage: SETUP
ret: true
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID:8010 CPRV:11 CPFM:03 SCEP:01 BDID:16 ECID:001165443C638026 IBFL:3C SRTG:[iBoot-2696.0.0.1.33]
Found the USB handle.
Stage: PATCH
ret: true
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID:8010 CPRV:11 CPFM:03 SCEP:01 BDID:16 ECID:001165443C638026 IBFL:3C SRTG:[iBoot-2696.0.0.1.33] PWND:[gaster]
Found the USB handle.
Now you can boot untrusted images.
usb_timeout: 5
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
Found the USB handle.
[==================================================] 100.0%
[==================================================] 100.0%
[==================================================] 100.0%
[==================================================] 100.0%
[==================================================] 100.0%
[==================================================] 100.0%
[==================================================] 100.0%
[] Waiting for the ramdisk to finish booting
Error connecting to device: No such file or directory
Warning: Permanently added '[localhost]:2222' (ECDSA) to the list of known hosts.
[] Mounting filesystems ...
[] Dumpped SHSH
[] Checking device version
the version that the device is currently in is 15.8.3
[] extracting kernel ...
[] extracted
Reboot into recovery mode ...
[] To get into DFU mode, you will be guided through 2 steps:
[] Press any key when ready for DFU mode
Get ready (0)
Release side button, but keep holding volume down (9)
Release side button, but keep holding volume down (3)
[] Device entered DFU!
[ ]Patching some boot files...
[] Finished moving the boot files to work
[] Decrypthing ibss and iboot
usb_timeout: 5
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID:8010 CPRV:11 CPFM:03 SCEP:01 BDID:16 ECID:001165443C638026 IBFL:3C SRTG:[iBoot-2696.0.0.1.33]
Found the USB handle.
Stage: RESET
ret: true
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID:8010 CPRV:11 CPFM:03 SCEP:01 BDID:16 ECID:001165443C638026 IBFL:3C SRTG:[iBoot-2696.0.0.1.33]
Found the USB handle.
Stage: SPRAY
ret: true
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID:8010 CPRV:11 CPFM:03 SCEP:01 BDID:16 ECID:001165443C638026 IBFL:3C SRTG:[iBoot-2696.0.0.1.33]
Found the USB handle.
Stage: SETUP
ret: true
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID:8010 CPRV:11 CPFM:03 SCEP:01 BDID:16 ECID:001165443C638026 IBFL:3C SRTG:[iBoot-2696.0.0.1.33]
Found the USB handle.
Stage: PATCH
ret: true
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
CPID:8010 CPRV:11 CPFM:03 SCEP:01 BDID:16 ECID:001165443C638026 IBFL:3C SRTG:[iBoot-2696.0.0.1.33] PWND:[gaster]
Found the USB handle.
Now you can boot untrusted images.
[IOKit] Waiting for the USB handle with VID: 0x5AC, PID: 0x1227
Found the USB handle.
[*] Patching the kernel
dyld: cannot load 'Kernel64Patcher' (load command 0x80000034 is unknown)
/Users/antonlando/Downloads/downr1n-main/downr1n.sh: line 1353: 31141 Abort trap: 6 "$dir"/Kernel64Patcher work/kcache.raw work/kcache.patched
if [ "$ptraceDisabled" = "1" ]; then echo "-t"; fi
if [ "$aslrDisabled" = "1" ]; then echo "-c"; fi
if [[ "$version" = "15."* ]]; then echo "-e -o -r -b15"; fi
if [[ "$version" = "14."* ]]; then echo "-b"; fi
if [[ "$version" = "13."* ]]; then echo "-b13 -n"; fi
> /dev/nullThe text was updated successfully, but these errors were encountered: