Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Error: zcat: can't stat: ./data/bootstrap.tgz #30

Open
schnabelnator opened this issue Oct 18, 2015 · 12 comments
Open

Error: zcat: can't stat: ./data/bootstrap.tgz #30

schnabelnator opened this issue Oct 18, 2015 · 12 comments

Comments

@schnabelnator
Copy link

Hi,
got quite far with the process but now I'm stuck here :(

Copying files to device...
Error opening local file for reading: PhotoData/KimJongCracks/Library/PrivateFrameworks/GPUToolsCore.framework/GPUToolsCore - No such file or directory
Uploaded 92912 bytes to drugs
zcat: can't stat: ./data/bootstrap.tgz (./data/bootstrap.tgz.Z): No such file or directory
Uploaded 0 bytes to PhotoData/KimJongCracks/bootstrap.tar
Uploaded 324288 bytes to PhotoData/KimJongCracks/tar
Tap on the jailbreak icon to crash the kernel (or 0wn it if you're in luck!)

Anyone know how to fix this?
Looks to me like it somewhere fails to extract the bootstrap.tgz in the correct directory....
Any help would be appreciated!
Thanks

@spotlightishere
Copy link

Yep, that's a known issue. There is a pull request open at #29 that should fix it.

Sent from everywhere and nowhere at once.

On Sun, Oct 18, 2015 at 5:54 PM, schnabelnator notifications@github.com
wrote:

Hi,
got quite far with the process but now I'm stuck here :(

Copying files to device...
Error opening local file for reading: PhotoData/KimJongCracks/Library/PrivateFrameworks/GPUToolsCore.framework/GPUToolsCore - No such file or directory
Uploaded 92912 bytes to drugs
zcat: can't stat: ./data/bootstrap.tgz (./data/bootstrap.tgz.Z): No such file or directory
Uploaded 0 bytes to PhotoData/KimJongCracks/bootstrap.tar
Uploaded 324288 bytes to PhotoData/KimJongCracks/tar
Tap on the jailbreak icon to crash the kernel (or 0wn it if you're in luck!)

Anyone know how to fix this?
Looks to me like it somewhere fails to extract the bootstrap.tgz in the correct directory....
Any help would be appreciated!

Thanks

Reply to this email directly or view it on GitHub:
#30

@schnabelnator
Copy link
Author

Unfortunately doesn't fix it for me :( exactly the same error...

@spotlightishere
Copy link

Which repo did you try? This one, or @qfdk's fork?

@qfdk
Copy link
Contributor

qfdk commented Oct 19, 2015

i think the make.sh is filed, so if you don'thave a magic.dylib, normal GPUToolsCore is missing...

@schnabelnator
Copy link
Author

I'm using @qfdk's fork, but I probably cna't get further because I am only trying on a 32-bit device...
Thought yalu was ready for all devices after this tweet https://twitter.com/qwertyoruiop/status/655825775850078208 but looks like I'm wrong...

@bolo1981
Copy link

yep, Cydia bootstrap is missing, but u can use openssh bootstrap for gain root acces.

@schnabelnator
Copy link
Author

Would it then be possible to install cydia via ssh? If so could you guide me in the right direction, I'm fairly new at this... thanks!

@kpwn
Copy link
Owner

kpwn commented Oct 20, 2015

You can install cydia if you install the untether.
For SSH (on your mac):

cd /tmp
sudo su

mkdir bootstrap
cd bootstrap
tar xf
find . | grep patcyh | while read x; do rm $x; touch $x; done
dpkg-deb -e
dpkg-deb -e

sbin/reboot
nano sbin/reboot
-- Enter this:
#!/bin/sh
launchctl load /Library/LaunchDaemons/com.openssh.sshd.plist
exit 0
-- Exit from nano & save the file
usr/bin/uicache
tar cf ../bootstrap.tar *

You will now have a (hopefully good) SSH bootstrap in /tmp
Tap the Jailbreak icon to install the bootstrap.
To start SSH, just use idevicediagnostics restart (which execves /sbin/reboot) after doing the kernel exploit by tapping on Jailbreak.

To install the untether (via SSH):
move /usr/libexec/amfid to /usr/libexec/amfid_
copy /usr/libexec/UserEventAgent to /usr/libexec/amfid
copy /usr/libexec/UserEventAgent to your Mac
Open up an hex editor, search for "UserEventPlugins", replace with UserEventPluginz
ldid the binary, copy to your phone into /usr/libexec/UserEventAgent, chmod +x
mv /System/Library/UserEventPlugins /System/Library/UserEventPluginz
mkdir /System/Library/UserEventPlugins
copy a plugin from UEPluginz to UEPlugins
compile dyldmagic_amfid, replace the plugin mach-o with the resulting dylib.
Move all launchdeamons except jetsamproperties / mobilefileintegrity / crashhousekeeper to /Library/LaunchDeamons
Copy the crashhousekeeper plist to /Library/LaunchDeamons
Edit it so it uses a different identifier & exec path
Copy /usr/libexec/CrashHousekeeper to the new exec path
Replace /usr/libexec/CrashHousekeeper with a symlink to the untether

This may brick your device, so I don't suggest using it. I am on XMPP at protectyourneck at jabber dot ccc dot de if you want me to do it for you (so I can also carry out tests to check compatibility with your device).

@qfdk
Copy link
Contributor

qfdk commented Oct 20, 2015

Question .

yalubreak iso841 - Kim Jong Cracks Research
Credits:
qwertyoruiop - sb escape & codesign bypass & initial kernel exploit
panguteam: kernel vulns
windknown: kernel exploit & knows it's stuff
_Morpheus_: this guy knows stuff
jk9356: kim jong cracks anthem
JonSeals: crack rocks supply (w/ Frank & haifisch)
ih8sn0w: <3
posixninja: <3
xerub <3
its_not_herpes because thanks god it wasnt herpes
eric fuck off
Kim Jong Un for being Dear Leader.
RIP TTWJ / PYTECH / DISSIDENT
SHOUT OUT @ ALL THE OLD GANGSTAS STILL IN THE JB SCENE
HEROIN IS THE MEANING OF LIFE

BRITTA ROLL UP [no its not pythech!] 
[i] iomasterport: 0x0000070b / gasgauge user client: 0x0000050b
jk++
ret: 28868000
ret: 00000000
ret: 0000000d

i have got this log 5 days ago.
I have tried upload bootstrap(ssh), i use tar -czvf bootstrap.tgz * for archiver, but i can't use SSH.
Is it the problem of the bootstrap.tar ? i have downloaded (openssh.deb&openssl.deb)==>bootstrap.tgz. i know it will be placed to "/", but i can't connect it.
i will try it ,so just add "something " in sbin/reboot?

@kpwn
Copy link
Owner

kpwn commented Oct 20, 2015

ret: 28868000
ret: 00000000
ret: 0000000d

This means the kernel exploit failed to execute, and it's supposed to happen randomly. Just try again until you see more than 5-6 "ret"s being printed

@qfdk
Copy link
Contributor

qfdk commented Oct 20, 2015

thx,i have tried it several time, but some time i dont have this log. it means the kernel exploit failed, too?

@kpwn
Copy link
Owner

kpwn commented Oct 21, 2015

I've heard about reports on how using fetchsymbols to dump the dyld cache may increase the reliability of the kernel exploit. Try to do that before running the Jailbreak app.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants