-
-
Notifications
You must be signed in to change notification settings - Fork 382
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
- #380
Comments
Thx. Seems the device is in streaming, but not edl/firehose mode (pid 0x9008) |
No. it's missing the signing key which is stored on hsm. |
I was able to upload SBL1 to my TicWatch and Galaxy Tab E (now without display & battery) and it entered 9006 mode (#375) but would like help for the Pixel 4a |
The samsung devices are locked down. They have crippled firehose loaders that only accept to write specific partitions and forbid to read anything. EDL runs in EL1, so pwning anything there is pretty useless, as you cannot go to EL3. I'm closing this now as this is more for discussions and less for being a real issue I can fix. |
You are mixing stuff. Jtag is a debug interface that is disabled on fused devices. Pbl is the bootrom which is readonly and embedded into the cpu. Most probably your issue is rpmb and secure boot |
@bkerler is correct @infr-automation . Even Google Pixel 4a (sunfish) doesn't seem to have JTAG. You would probably be the most luckiest if you download your stock rom and upload either sbl1 or xbl (depending on your generation of device) and see what it does, if your lucky should go to 9006 mode (it did for me, untested on my Pixel b/c I no longer have the 5G phone since it was used for parts after all) On my pixel it just rebooted but its based of UEFI so it could be different nowadays. |
send me over your xbl file. |
Hmm, do you have discord? I found something interesting.. It has 2 elf files in that file and a uefi partition at the beginning. wonder if i use either the last elf file or remove the uefi and 2nd elf file will force boot into something, assuming it is still valid. I was unable to get the pkhash of the 2nd elf file since it has no signature but look at this binwalk DECIMAL HEXADECIMAL DESCRIPTION0 0x0 ELF, 64-bit LSB executable, version 1 (SYSV) |
Padding_Non-empty_Padding.pad.zip The same thing is with the pixel xbl's i have, I uploaded the 1st half of the loader for your device still gets identified the same hash as before with fhloaderparser, and let me know how it works. Do |
Not sure what didn't work, you didn't give any info about what did happen or anything, are you on Linux? |
Can you try using windows with bkerler/edl and run |
Actually windows support seems broken for me, use a live DVD of Ubuntu 20.04, install edl as provided in the readme (commands below)
, and run |
In my case I didn't have a battery in my SM-T560NU installed and the eMMC wasn't init'ing and the FH loader wasn't uploading, the SBL1 did, but dmesg showed eMMC errors, meaning there wasn't enough power. If you did the XBL using my comment above, you should see what is going on. I zippped 2 files, so you should try both out, and do a dmesg. |
Do the |
ok fine 1 command |
|
Hello! Ignore what I said the last time which is crossed out, but anyways, I think, from the wasted 190GB of samsung leaks i had to download (and deal with torrents), I found a private key and cert, for both root and attestation. Yes you heard me right, I grepped through the 3 Part files that you mentioned earlier, and well, found what I needed in part 2. Note though, most keys in part 2 of the leak were (for god sake, what and why SS?) TEST AUTHORITY KEYS/CERTS. But, that means I found only 1 in part 2 that didn't say TA. Here are the hashes (note the files are renamed by me) f9ecad95bf591e175ccf9f394595eb950375893e8809cd5be803506aa3aebcf0 att.cer Now what, we got keys right? Yes, now we have to get a unsigned loader, of any kind, (for your soc anyways), which is easy, and convert the private certs to public certs and generate the user cert, since the user cert actually contains info about the whole file. Note that qtestsign wont work, because it doesn't make the user cert, but makes it look like it has any cert, no conversion is being done. What am I going to do next? |
Hmm, this is really strange, any fh loading I send it doesn't work, and sbl1 work but without emmc responses?
From the look of that console, you see 2 hashes, 98dc3fdde47b651f47f77620e7376d09905fc36d97cba5b560bcfef2f77df06a (device) and 135673828dd48fb222b9e750d06080773a50996cc6510728b1ba13c7a79f7f19 (stock sbl1), what? They don't match, meaning no secure boot, just like the ticwatch, there only need some cert to upload. I even resigned with my leak certs, and clearly I don't have secure boot, note the signer from qcom removes old certs for you, you just need a sbl1, or fh loader that works on the soc the most likely. |
And before you ask, none of the certs start with 98dc, I mean, look:
And the HWID matches on both, which I can fake, and it would do the same, at this point i have no secure boot. Now I need to test with you then, but the signer is from 2016, and doesn't support your platform (sm8150) in which ill look for the same tool for it online. BTW its called Qualcomm SecTools/SecImage |
Hello! Can you go ahead and try to see if these resigned images, based off of the XBL will work. "Work", as in doing the same thing as your no-modded cert, XBL.
|
secimage_output.zip |
Ok, updates: So, what I need to really find next:
also, the TA, now i see it means "Trusted Authority", as in person, there are test certs, from the keys, though idk if the keys could be generated by the java file with another file only samsung has or what. I did openssl all the files that contain the word "PRIVATE KEY" and sadly found nothing for both of our devices (you only have 3 certs total, though the other 3/6 are for the elf, which are signed by QC, we need only the top Samsung files). Short Explanation: We have the certs, in XBL, We have the useless Public Keys, We need to generate/(find another leak) for the Private key and sign the ELF, we have also the signing tool, already. We are only missing OEM keys. Thats it |
Hmm not seeing any real keys for either of our certs. But I did see on some google searches that you can extract the keys from TrustZone with some CVE's. Since you did send all the partitions of my t560nu, I did find 1 private key in image 0.apnhlos.fat
It sadly doesn't match the assertation cert, but the 16 root certs, still remains unknown, because they are all separate certs. (it doesnt match the single ones either). Wonder if it a generic key now, put the key into grep for the SS source, and i see some QSEE related stuff that seem random. Do you @infr-automation by any chance have a partition dump of your device model? I now have to find a tool to extract the keys from, idk, whatever there is left. The EFUSE wont help, since it keeps the hash, pbl isnt modded, so its gotta be in TZ or img files. |
Seems like the hash of |
@infr-automation I just talked to samsung over the live chat, and they said they may be able to give it to us ("it" == SSBK ? SAK), however the person i talked to couldn't help me out and gave me a phone number to call to get the info we need (they said they don't have the key themselves, only the Knox team does). Here's their info Note: Do not ask, if you are going to call, about firehose or prebuilt images, but rather save it for later. The SS loaders they provide are limited loader from what I've seen, so it needs a regular loader with their key. SSBK Is also known as "Samsung Secure Boot Key" and SAK is "Samsung Attestation Key". No idea which one we need but ask for both if you decide to call. (Attestation Key also b/c Attestation has info about root, and isn't ever changed. SSBK I assume is "root cert/key" in SS Language) Also if you do let me know the results. More info: https://docs.samsungknox.com/admin/whitepaper/kpe/hardware-backed-root-of-trust.htm |
No you only ask for SBBK and SAK, ill say when to ask for firehose (later day) |
@infr-automation I got the message that they can't give SSBK or any boot keys from samsung knox. I need to look for a good RSA-2048 factoring tool, that accepts, well big numbers, 617 digits. |
It should but it would set 7 to 8, also can you extract the loader from the tool and use this tool instead? Can you share a link of unlocktool, i found another tool with this phone but i couldn't extract it (a while ago) |
https://unlocktool.net/models/?q=note10# shows otherwise |
Is it possible to extract from TrustZone Google attestation certificates using this tool? |
Since this is closed and the account is deleted Did he have a fix that could help me cause I also have the issue? |
The text was updated successfully, but these errors were encountered: