Page 11 of 20 FirstFirst ... 234567891011121314151617181920 LastLast
Results 101 to 110 of 196
Discuss [NCK] validation algorithm public at the iPhone "2G" (Rev. 1) - Hackint0sh.org; Where did you get the info that only 6 of thm are unique? Doesn't sound ...
  1. #101
    iPhone Moderator Array

    Join Date
    Dec 2007
    Posts
    153
    Post Thanks / Like
    Downloads
    0
    Uploads
    0
    Rep Power
    14

    Default

    Where did you get the info that only 6 of thm are unique? Doesn't sound like it because then we would have lots of iPhone with same IMEI.


  2. #102
    Newbie Array

    Join Date
    Dec 2007
    Posts
    6
    Post Thanks / Like
    Downloads
    0
    Uploads
    0
    Rep Power
    0

    Thumbs up

    I saw lots of ideas about brute forcing the iPhone unlocking procedure, which is very good. Keep them coming ...

    Computer Power these days is not a problem e.g. I have several 2xQuad-core servers which I can use if required. My company will also have some 4xQuad-core soon too, which will sit arround for a few weeks before we properly use them.

    However I don't see how the current nckbf program will give usefull info. Will wait for improved info and then give it a go myself.

    I am willing to help with cpu power resources. I think the iPhone unlocking community is big enough to start internet-distributed-processing too.

  3. #103
    Advanced Array

    Join Date
    Oct 2007
    Posts
    37
    Post Thanks / Like
    Downloads
    0
    Uploads
    0
    Rep Power
    0

    Default

    Just to give you an idea of how much computing power you would need here's the statistics from a distributed attempt on cracking the key to one of RSA cryptography challenges.

    http://stats.distributed.net/projects.php?project_id=8

    Even with a couple of thousands cpu's and a few years work they haven't covered more than 0.5 % of the keyspace.

    I don't know if this is comparable to the problem of cracking the "key to the iphone". Somene with more insight could perhaps tell wether less than 1000 years is needed?

  4. #104
    Senior Professional Array tramuyo's Avatar

    Join Date
    Aug 2007
    Posts
    227
    Post Thanks / Like
    Downloads
    0
    Uploads
    0
    Rep Power
    18

    Default

    i've a PS3 with linux yellowdog configured.. So I can help to bruteforce work too

  5. #105
    Senior Professional Array neonkoala's Avatar

    Join Date
    Jul 2006
    Posts
    277
    Post Thanks / Like
    Downloads
    0
    Uploads
    0
    Rep Power
    23

    Default

    Will people stop with the I have X amount of CPUs/PS3s etc. No one cares. This isn't the time. We know the power is there IF and WHEN we need it already. Bruteforce may not even require a distributed effort. Wait and just follow the news or contribute usefully by helping with the cryptography side of things.

    Thanks.

    Quote Originally Posted by FryTheSolid View Post
    I was thinking: I saw on other post, that for the official unlock procedure apple/orange needs the IMEI of the iphone. Is it the only thing that is needed? If it is so, not all 15 digits of the EMEI are unique, only 6 of them are. This would mean that there are only 1000000 possible NCK's, easy to crack if you know the key space. So even if it is so, that only EMEI is needed, it doesn't help the bf attack (we don't know the key space...). I was just wondering.
    Apple probably have a table of NCKs as previously mentioned and on that would probably be a record of each IMEI and the corresponding NCK having been calculated at production when all values were known.
    Last edited by neonkoala; 12-19-2007 at 02:07 AM. Reason: Added usefullness


  6. #106
    Professional Array

    Join Date
    Dec 2007
    Location
    Tucson, AZ
    Posts
    51
    Post Thanks / Like
    Downloads
    0
    Uploads
    0
    Rep Power
    9

    Default

    On my Intel Mac I compiled this:

    1. Uncomment the #define USE_OPENSSL (line 10) line in process.c. I tried to install libgmp but it would not work.

    2. Create a file called 'compile' with:

    #!/bin/sh

    gcc -g -c sha1.c
    gcc -g -c tea.c
    gcc -g -Wall -c process.c

    gcc process.o sha1.o tea.o -o nckbf -lcrypto

    rm -f *.o

    exit 0

    3. chmod 755 compile

    4. ./compile

    5. And it's compiled.

  7. #107
    Senior Professional Array

    Join Date
    Nov 2007
    Posts
    155
    Post Thanks / Like
    Downloads
    0
    Uploads
    0
    Rep Power
    15

    Default

    Well with OpenSSL it's just 3x slower and at the moment we are trying to fiddle around it to get it 10-100x faster
    iPhone 3G 16GB white. Official on contract. Used to have a w48 iPhone (OTB 1.1.2) all the way to 2.0.1 when I went legit.

    Current FW: 2.0.2
    Carrier: EMT (Estonia)
    All functions working

  8. #108
    Newbie Array

    Join Date
    Dec 2007
    Posts
    3
    Post Thanks / Like
    Downloads
    0
    Uploads
    0
    Rep Power
    0

    Default

    Quote Originally Posted by MuscleNerd View Post
    Hi petoto,

    The virginizer doesn't reset the NCK code..it restores the lock table at seczone+0xc88 for those who ran anySIM 1.0.x. The bruteforcer doesn't care about the seczone+0xc88 data so it wouldn't have any impact.
    Hi,

    I sould say NCK counter...
    Last edited by petoto; 12-19-2007 at 08:47 AM.

  9. #109
    Advanced Array FryTheSolid's Avatar

    Join Date
    Dec 2007
    Posts
    38
    Post Thanks / Like
    Downloads
    0
    Uploads
    0
    Rep Power
    0

    Default

    On the IMEI:

    en.wikipedia.org/wiki/IMEI

    On the time needed, 15 digits =+- 54 bits, assume the code is OPTIMIZED, comparable to brute forcing 56 bit DES:

    www.copacobana.org/

    www.copacobana.org/paper/IPAM2006_slides.pdf

    : FPGA vs. PC (average key search in 8.7 days)
    - 22,865 Pentium 4 ( 3.6 million incl. overhead)
    or
    - COPACOBANA (total cost 9000 incl. overhead)

    Exhaustive key search (conventional technology):
    * Check 2^55 keys on average
    * PC (e.g., Pentium4@3GHz) ≈ 2 mio. keys/sec
    * Average key search with one PC ≈ 2^34 sec = 545 years!

    Notice 2mio. keys/sec, currently we get like few thousand... It is not worth a try.
    (2 bit less = 4 times faster, still slow....)

  10. #110
    Professional Array

    Join Date
    Nov 2007
    Posts
    51
    Post Thanks / Like
    Downloads
    0
    Uploads
    0
    Rep Power
    9

    Default

    Quote Originally Posted by Gregsen View Post
    its been a while since i had math, but do i see it right that the number of possible combination for the NCK is 10^15, or 1.000.000.000.000.000 and we got to check them all out? How long would this take on lets say an C2D with 2,2ghz? Also would be great if somebody could explain how exactly the algorithm improvements work for the ones of us not studying informatics
    Based on the person who optimised the code to 270085k/s it would take:

    ((((((10e15/270085)/60)/60)/24)/7)/52) years ( 117.73 years approx )

    Now of course you are going to hit the correct combination WAY before you reach the final 999999999999999 but even still...

    Based on a 100x increase in speed you would move the . to places left so 1.1773 years so even at 1000x speed increase it would take over a month possibly
    Last edited by Sproglet; 12-19-2007 at 12:16 PM.


 

 

Similar Threads

  1. Looking for Volunteers for Product Validation
    By mafili in forum iPhone Developer Exchange
    Replies: 0
    Last Post: 06-01-2011, 04:39 AM
  2. Help with Multiple Text Field Validation
    By zacharyrs in forum iPhone Developer Exchange
    Replies: 0
    Last Post: 01-12-2010, 08:02 PM
  3. MacNN: Cheetah3D 5.1 intros new automatic skinning algorithm
    By hackint0sh in forum Latest Headlines
    Replies: 0
    Last Post: 12-01-2009, 07:50 PM
  4. MacNN: AKVIS Sketch 9.0 provides new conversion algorithm
    By hackint0sh in forum Latest Headlines
    Replies: 0
    Last Post: 08-17-2009, 09:20 PM
  5. [Update] iPod touch $20 validation on reload
    By juliangall in forum iPod Touch 1G
    Replies: 8
    Last Post: 01-21-2008, 03:53 PM

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Powered by vBulletin®
Copyright © 2014 vBulletin Solutions, Inc. All rights reserved.
Search Engine Friendly URLs by vBSEO
(c) 2006-2012 Hackint0sh.org
All times are GMT +2. The time now is 09:39 AM.
twitter, follow us!