Tutorial: Firmware hack na s60 3rd telefonima

Pravila foruma
Symbian deo foruma posvećen je uopštenoj priči o svemu vezanom za operativni sistem.
Ukoliko želite da pogledate teme vezane za određeni model telefona, možete to uraditi preko sledećih prečica:
NokiaSamsungSony Ericsson
Odgovori
Phantom Lord
Mobil poznavalac
Mobil poznavalac
Postovi: 550
Pridružio se: Pet, 28. Okt 2005. 12:10
Lokacija: C\System\Apps\Beograd

Tutorial: Firmware hack na s60 3rd telefonima

Post od Phantom Lord »

Tutorial za hakovanje firmware-a na s603rd telefonima (pristup sistemskim folderima i instalacija aplikacija bez sertifikovanja):
Napomena:
Iako je ovo potpuno bezbedno,hack radite na sopstvenu odgovornost 8)

Ako primetite neke greske ili imate sugestije,posaljite mi pm.

---------------------------------------S60 3rd (stara metoda)----------------------------------
1. Instalirati i pokreni X-plore,u podesavanjima cekirati prve 4 opcije.Ostaviti aplikaciju da radi u pozadini.
2. Instalirati HelloCarbide.sisx na mem telefona,pokrenuti je,a zatim levi soft taster/menu1 i pritiskajte na yes dok se program ne zatvori.
3. Pokrenuti x-plore (koji je ostao u pozadini) i imate pristup sistemskim folderima
4. Kopirajte installserver.exe y c/sys/bin
5. Instalirati rompatcher (za ukljucivanje i iskljucivanje zastite - caps off/on)

Potrebni fajlovi:
Hack

----------------------------------------S60 3rd (nova metoda)----------------------------------
1. Sertifikuj,instaliraj,a potom pokreni HelloOX v1.03
2. Instalirati RomPatcher i prekopirati Open4All patch u E:\Patches
3. Kada zelite pristup sistemskim folderima samo pokrenite Open4All patch preko RomPatchera (mozete koristiti bilo koji file manager)

Potrebni fajlovi:
Hack

-----------------S60 3rd telefoni koji se mogu hakovati starom metodom-----------------------
N71 (firmware 4.0642.1.05)
N73 (firmware 4.0812.4.3.1)
N76 (fimware 31.0.014)
N77 (firmware 3.0827.22.0.1)
N80 (firmware 5.0725.0.1)
N91 (firmware 2.20.008)
N91 8Gb (firmware 3.10.023)
N93 (China) (firmware 20.1.058)
N93-1 (firmware 10.0.025 or 20.1.058)
N93i (China) (firmware is 30.1.013)
N93i-1 (firmware is 30.0.013)
N95-3 (firmware is 20.2.011)
E50 (firmware is 7.36.0.0)
E60 (firmware is 3.0633.09.04)
E61 (firmware is 3.0633.09.04)
E61i (firmware 3.0633.69.00)
E62 (firmware versions 3.0633.09.13 and 3.0633.31.19)
E70 (firmware2.0618.07.10)
3250
5500 Sport (firmware is 4.60)
5700 XpressMusic (firmware 5.11)
6110 Navigator (China) (firmware 5.12 ?)
6290 (firmware 3.03)
Samsung i550, i550w, i560 (firmware is xxHH1)
N78 (version 12.046)
N81-1 (version 11.0.045)
N81 8Gb (version 20.0.056)
N82 (version 20.0.062)
N82 (China) (can be hacked up to version 20.1.062)
N95 (can be hacked up to version 30.0.015)
N95 8Gb (can be hacked up to version 30.0.018)
E51 (can be hacked up to version 220.34.37)
E51 (can probably NOT be hacked starting version 300.34.56)
E51-2 (without camera) (can be hacked up to version 201.34.38 )
E65 (can be hacked up to version 3.0633.69.00)
E66 (can be hacked up to version 102.07.81)
E71 (can be hacked up to version 100.07.76)
E90 Communicator (can be hacked up to version 210.34.75)
5320 XpressMusic (can be hacked up to version 3.08 )
6110 Navigator (can be hacked up to version 5.11)
6120 Classic (can be hacked up to version 5.11)
6121 Classic (can be hacked up to version 5.11)
6210 Navigator (can be hacked up to version 3.08 )
6220 Classic (can be hacked up to version 3.06)
Samsung G810

--------------------S60 3rd telefoni koji se mogu hakovati novom metodom-------------------------
Trebalo bi da mogu svi pomenuti telefoni sa novijim hack-proff verzijama firmware-a

Sve zasluge pripadaju FCA00000,DeltaFox-u,Yura-smart-u i SF forumu ;)
Poslednja izmena od Phantom Lord u Pet, 08. Maj 2009. 19:45, izmenjeno 24 puta ukupno.

kljun
Mobil manijak
Mobil manijak
Postovi: 1826
Pridružio se: Čet, 26. Jul 2007. 20:56
Lokacija: Sremska Mitrovica
Kontakt:

Post od kljun »

Phantom Lord ovo mi bas sada i nevredi, posto sam promenio series60 3rd fon. al dobro je da su najzad i to provalili.
Nokia N82 + 8GB + Altec Lansing Headphones, SE K810i L.F.C. - Y.N.W.A. moj album

miodrage
WP_guru
WP_guru
Postovi: 11662
Pridružio se: Pon, 13. Mar 2006. 23:35
:: iPhone 14 Pro Max
Lokacija: Subotica
Kontakt:

Post od miodrage »

Phantom Lord, nije tojos ono kompletnomenjanje firmware-a kakvo je nekada bilo na Samsungu T-100 recimo. E to je bilo nesto. Ovo je za sada samo omogucavanje instalacije svega i svacega bez da te telefon pita za sve. Menjanje firmware-a je kada zamenis startup i shutdown sekvencu, kadapromenis default tonove, pozadine, fontove...ma jednom recju sve!
Ceterum censeo, Androidam delendam esse!

LittlePrince
Mobil manijak
Mobil manijak
Postovi: 1356
Pridružio se: Ned, 28. Okt 2007. 04:32
:: Xiaomi Redmi Note 5
Lokacija: Topola
Kontakt:

Post od LittlePrince »

Zato je EF81 zakon :lol: Ni sam ne znam sta mu nisam zamenio, kada ga uzmu u ruke oni koji ga imaju u standardnoj verziji tacno bih mogao da im ponudim nagradu ako pronadju nesto isto :D

Phantom Lord
Mobil poznavalac
Mobil poznavalac
Postovi: 550
Pridružio se: Pet, 28. Okt 2005. 12:10
Lokacija: C\System\Apps\Beograd

Post od Phantom Lord »

Jes' sto kaze miodrage,ali ipak je pocetak,samo da se ukljuce braca Rusi :D
svejedno,svidja mi se ovaj modifikovani y-browse koji ima pristup svim fajlovima i time konacno pokazao da ne postoji savrsena zastita :)

loki13
Expert
Expert
Postovi: 3053
Pridružio se: Pet, 01. Dec 2006. 12:22
:: Htc Desire 500 dual
:: Nokia E71
Lokacija: Novi Sad

Post od loki13 »

Jel to sad prakticno znaci da se ne s60 v9.1 (...) mogu instalirati programi bez potrebnog sertifikovanja???
Ako je to,odoh polako po n73....
:lol: :lol: :lol:
D500&E71

Phantom Lord
Mobil poznavalac
Mobil poznavalac
Postovi: 550
Pridružio se: Pet, 28. Okt 2005. 12:10
Lokacija: C\System\Apps\Beograd

Post od Phantom Lord »

Pa koliko sam ja razumeo,lik je to uspeo na e90...e sad najbolje je da se saceka neko vreme da se sve to razvije.
Meni bi,a verujem i mnogima,najkorisniji bio pristup sistemskim fajlovima,pa bi mogao da koristim backup,koji je na 3rd neupotrebljiv,ali i da brisem repove od izbrisanih programa :-)
Takodje pristup tim fajlovima bi omogucio da se puste u promet neki programi koji su do tada vezivani samo za neke modele,npr music player sa n73 ubacim na e61,itd.

Dream Weaver
Mobil manijak
Mobil manijak
Postovi: 1930
Pridružio se: Sre, 10. Nov 2004. 02:45
:: Xiaomi Mi Max 2
Lokacija: BGD,Dorćol

Post od Dream Weaver »

Hmmm, ovo bi moglo da bude zanimljivo.
Jel ro znaci da nema vise sertifikovanja programa ili??? 8)
and justice for all...

miodrage
WP_guru
WP_guru
Postovi: 11662
Pridružio se: Pon, 13. Mar 2006. 23:35
:: iPhone 14 Pro Max
Lokacija: Subotica
Kontakt:

Post od miodrage »

Polako, videcemo sta ce da bude... ovo je jos uvek samo za geek-ove, jer ono malo ko moze tek tako sam da odradi. Medjutim, ono sto nas sada ceka po mom skromnom misljenju je poplava virusa. Cim je ova zastita probijena, to znachi da sada postoji mogucnost da se maliciozni kodovi ubace u pojedine programe, i zbog omogucavanja instalacije... niko vishe nije bezbedan.
Ceterum censeo, Androidam delendam esse!

markog
Entuzijasta
Entuzijasta
Postovi: 204
Pridružio se: Sub, 18. Mar 2006. 18:45

Post od markog »

miodrage napisao:Medjutim, ono sto nas sada ceka po mom skromnom misljenju je poplava virusa.
:o Ko da mi nije dosta virusa na kompu, sad jos i na telefonu. :chytry:
Kad smo kog virusa, da li je neko sa foruma imao virus na telefonu? :D

bigmag
Redovni učesnik
Redovni učesnik
Postovi: 137
Pridružio se: Čet, 09. Feb 2006. 03:51

Post od bigmag »

Da, ja sam imao jos na mojoj 6600 onaj koji je slao mms-ove ko lud, ali kod mene se nije ovajdio jer sam odmah izvalio sta radi i pobrisao parametre tako da nije mogao da salje i nikom nije ni poslao, posle ja pao format (nazalost tada nokia nije jos izbacila na svom sajtu update) fona i kartice i sve je sljakalo ko pre... :wink:
Svaka cast majstoru koji se setio za taj virus (morao sam sve slike i video clipove preko bt da prebacujem na komp), tih dana sam bas bio raspolozen da ga upoznam negde u cetri zida... :dry:

Sorry za off, decko je pitao pa rekoh da odgovorim... :)

Pozzz.... 8)
.::HTC Desire Z::.

Phantom Lord
Mobil poznavalac
Mobil poznavalac
Postovi: 550
Pridružio se: Pet, 28. Okt 2005. 12:10
Lokacija: C\System\Apps\Beograd

Post od Phantom Lord »

Pre neki dan sam posetio svoj omiljeni ruski hakerski forum za telefone i Whad'Ya Know,izasao je tutorial za uklanjanje zastite koje nema veze sa flesovanjem preko NSU i prakticno nikakve opasnosti za telefon (jer se ne flesuje).Jedina mana je sto za sada je uklanjanje zastite privremeno,tj cim se ugasi telefon hack nestaje(a mozda je to i dobro?) Evo tutoriala:

First of all: you can get the needed files from

http://fca00000.googlepages.com/hack_perms_s60v3.rar


1) Current state:
In S60v3, Symbian implemented a security mechanism: applications need to be signed in order to access some services.
A developper can self-sign his own applications, but the most critical services need a powerful certificate, which not everyone can afford.
For example, you can not make a file browser able to access c:\sys . This is not very important, but some people feels that they should be able
to do anything they want.

2) The theory:
When a program is signed and you install it, its privileges are stored in a internal folder. When the program is executed and
tries to access a service, the privileges are checked. If they don't match, the service can not be executed, and gives an error.
In the PC emulator for Symbian, it is possible to overrride this, so that missing privileges give a warning, not an error.
This is controlled through a file called EPOC.INI that includes a line like
PlatSecEnforcement OFF
In the phone, this is not modifiable directly.
The routine controlling this is called
DProcess::DoHasCapability(TCapability , char const)

In my Nokia N80, this is at F80478BC and says
....
F8047968 BL log_missing_capabilities (F80458D8)
....

Look at F80458D8:
....
F8045930 LDR R0, =pSuperPage
F8045934 LDR R0, [R0]
F8045938 LDR R0, [R0,#0x148]
F804593C TST R0, #2
F8045940 BEQ loc_F804597C
F8045944 ADR R1, aError
F8045948 MOV R0, R1
....


Basically, this looks at the data at [pSuperPage+0x148] and checks bit 2.
If it is set, any missing capability will give an error.
If not, it will log the problem, but the check will succeed.

So, all you need to do is to change this value.

In my mobile, pSuperPage has value 0x60000000, so the data is stored at 0x60000148

3) the hack:
The programming enviroment Carbide.c++ v1.2 includes a file called s60_3_0_app_trk_2_7.sisx
It also comes with CodeWarrior Pro for Symbian, although it is version S60_App_TRK_2_5.sisx
This file is a On-Device-Debugger, used to run programs inside the phone, and see the flow and data in the PC.
In my experience, CodeWarrior is easier to use for debugging.
It allows to look at the program registers, phone memory, processes, and change the data.
At memory address 0x60000148 the value stored is 0x0000001E , which means that
PlatSecEnforcement is ON
So, change it from 0x0000001E to 0x00000010 and you get all the permissions !

4) The tools:
You need a Nokia phone using Symbian 9 .
You also need some way to connect it to a PC, for example USB or bluetooth. Infrared is not valid.
Next step is the MetroTRK.
If you have CodeWarrior, it is the preferred solution. If not, I made a Python program to emulate it.
If you have IDA-disassembler a a ROM dump, then you can investigate in case it doesn't work.

5) The phone:
I have tested with Nokia-N80. I suppose it works with any phone using S60v3.
The changes I make are only in memory. This means that when the phone is switched-off, the hack dissapears.
You need to run it again after a restart. I know this is a limitation, but a permanent solution will come later.
On he other hand, this is good: there is (almost) no risk on permanently breaking your phone.
Of course, do it under your own risk. I take no responsability

6) The connection:
I use a USB cable labelled CA-42 which is a simple data cable; no fancy stuff.
Connect the phone to the PC.
The phone asks the mode you want to use: 'PC Suite'
My operating system is Windows-XP and my PC detects automatically the driver, installing
something called 'Nokia N80 USB modem'.
If not, drivers are available in many places, for example
http://www.nodevice.es/driver/CA-42/get37496.html
If you have PC-Suite, you probably have the driver already. But remember that you need to disable in the PC: stop the program.
At this point, you probably have a new serial port:
Control Panel->System->Hardware->Device Manager->Ports
should show
'Nokia N80 USB (COM6)'
It might happen that you have both COM6 and COM7 . You will need to try both.

7) The MetroTRK:
This is a debugger that installs in the phone. It has powerfull permissions and a strong certificate, which allows to read/write memory.
Transfer the file s60_3_0_app_trk_2_7.sisx into your mobile, and install it.
You should see a new application called 'TRK'.
Run it.
By default it tries to use BlueTooth, so it might give an error because no available ports.
Options->Settings->Connection=USB
Options->Settings->Port=1
Options->Settings->Baud Rate=115200
Options->Connect should tell:
Welcome to TRK for Symbian OS
Status: Connected
PDD: NONE
LDD: EUSBC
CSY: ECACM
Port Number: 1
Baud rate: 115200

This is the most difficult step.
If you get
'Failed to open port.Error Code: -21'
this means that your PC is not talking to the mobile. This is the case when the driver is not installed.

7.1) You need another program called HelloCarbide . It is a simple example. Install it in c:
You also need to transfer HelloCarbide.exe directly under c:\HelloCarbide.exe using any FileBrowser, ex: SExplorer

Cool The hacker:
If you have CodeWarrior, go to 8.2 . If not, go to 8.1
8.1) I made a program called hack_perms_s60v3.py
It is written in pyhton, so you need Python25 from www.python.org
It uses the serial port, so you also need pyserial (http://sourceforge.net/projects/pyserial)
and probably pywin32 (http://sourceforge.net/projects/pywin32)
Download the binaries and execute them. As simple as that.

My program uses COM6 at line
ser = serial.Serial(5)
If you have another port, change this number. COM6 = port 5

Run my program by typing
hack_perms_s60v3.py

It logs a lot of information. In case of problems, investigate. I _might_ try to help.

If you get
serial.serialutil.SerialException: could not open port: ... The system cannot find the file specified.
this means that the port doesn' exist.

If you get
serial.serialutil.SerialException: could not open port: ... The process cannot access the file because it is being used by another process.
this means that there is another program using the port. Most probably you are trying COM7 instead of COM6.

If it hangs after
sendFrame=00
sendFrame=FF
sendFrame=7E
this means that MetroTRK is not running in the mobile.

If everything goes OK, it takes 40 seconds and the last line are:
Close
End+Exit

Look at the trace: you should see 2 lines like:
Read Memory 60000148=1E 00 00 00
candidate!!!

This is good. It means that it found the correct address and patched it.

8.2) If you have CodeWarrior and know how to use it, it is better.
Load any program you have (HelloWorld.mmp is perfect) and start a mobile debugging session:
The target should be GCCE UDEB .
In its settings->Remote Debugging->Connection = Symbian Metro TRK
Same window->Edit Connection->Connection Type=Serial ; Port = COM6
Same window->Remote dowload path = c:\
settings->Remote Download-> Remove any file here
Remember that, because of security, applications can't be downloaded into c:\sys\bin , so they
need to be installed before. I do this manually.
See:
http://www.mobilenme.com/content/view/41/26/
http://mikie.iki.fi/wordpress/?p=33#comment-6299
http://www.newlc.com/topic-5398
http://discussion.forum.nokia.com/forum ... hp?t=72632
http://discussion.forum.nokia.com/forum ... hp?t=80807

Now, start debugging the program.
You should see the 'Metro TRK Communication Log' with lots of information.
Break the program.
Select the stack.
Menu->Data->View Memory . Ignore the error
Display 0x60000000
Look at 0x60000148. Probably has value 0x1E
Double-click, and type 0x10. Hit enter.
Run program.
Close Thread window. Resume.

9) Advanced:
If you have IDA-disassembler and a ROM dump, you can see the actual code.
This is a heavy task, but the main file is ekern.exe
You can get a full Dump using this Symbian code:
RFs fileSession;
fileSession.Connect();

RFile file;
file.Replace(fileSession, _L("e:\\F8000000.bin"), EFileWrite);

TBuf8<0x200> buf;

TUint8 *p =(TUint8*)0xF8000000; // (TUint8*)0xF8000000;
TUint8 *pEnd = (TUint8*)0xFA000000; // (TUint8*)0xFA000000;
TUint8 iVal = 0;
for(;p < pEnd;p++)
{
iVal = *p;
buf.Append(iVal);

if(buf.Length() == buf.MaxLength())
{
file.Write(buf);
buf.Zero();
}
}

file.Close();
fileSession.Close();
And then extract files using ROMTools from Syminternals. If you can't get it, I can provide it.
To use IDA, get the Symbian SDK, and process through ROMTools . Name the routines and study the disassembled code.

10) Test:
Start any application which needs pivileges. I tried SExplorer and TrueExplorer, and I was able to
browse c:\sys , although:
10.1) SExplorer can not access Z:\sys
10.2) TrueExplorer can not find files under c:\sys\bin

Ako neko zeli neka prati razvoj teme na Symbian Freak forumu (posto ne mogu da navedem ruski sajt).Ovo izgleda obecavajuce,mada koliko vidim imaju problema sa fp1 telefonima,ali na svim starijim bi trebalo da radi.Ovih dana cu da isprobam ovo,pa javljam rezultate

:)

Phantom Lord
Mobil poznavalac
Mobil poznavalac
Postovi: 550
Pridružio se: Pet, 28. Okt 2005. 12:10
Lokacija: C\System\Apps\Beograd

Post od Phantom Lord »

A evo i uspeha :D
Slika

Ceo postupak traje par sekundi.Citajte tutorial do tacke 8.2,dalje nema potrebe,to je druga metoda.
Sada telefon ima potpuni pristup c:,moguce je ubaciti operator logo u boji,brisati repove koje neke aplikacije ostave,instalirati programe bez sertifikata,itd

darkado
Mobil stručnjak
Mobil stručnjak
Postovi: 791
Pridružio se: Sre, 04. Okt 2006. 18:00

Post od darkado »

oho, gde se nalazi op logo ?

Phantom Lord
Mobil poznavalac
Mobil poznavalac
Postovi: 550
Pridružio se: Pet, 28. Okt 2005. 12:10
Lokacija: C\System\Apps\Beograd

Post od Phantom Lord »

C:\PRIVATE\10000850 treba ti mbm file 128x32 rezolucije .

milann
Mobil stručnjak
Mobil stručnjak
Postovi: 874
Pridružio se: Ned, 23. Okt 2005. 09:11
:: Xiaomi Mi 9

Post od milann »

Citiricu ceo post clana Aco_kune sa jednog domaceg foruma, u kome je objasnjeno kako razbiti trajno zastitu na vasim telefonima. Naravno, ovde u igri dolazi i NSU, tako da ne preuzimam odgovornost ako vam nesto podje po zlu i ostetite telefon (ovo pogotovo vazi za clanove koji imaju telefon sa novim symbianom 9.2 jer su ih neki s*ebali i servis je bio neminovan) Sa srecom :)

[quote author=aco_kuna link=topic=278927.msg4252281#msg4252281 date=1193571826]
[center] Napravio sam Dobar Tutorijal za Razbijanje Zastitu Pa moglo bi ovo da ide u Prvi Post ako Hocete ,,a ako neko moze i da prevede na Srpski da bi mogao Ceo Svet da Razume ,bilo bi Najbolje


This tutorial will show you how to modify your firmware and tell you everything necessary you need to know about it.

!!! I do not take responsibility for any damages or malfunctions !!!
If anything goes wrong, you can go to Nokia Service Center and tell them your update failed.
They will recover your phone.

First of all, download the tools at the bottom of this post.

You need to do a backup of all your data stored in the phone memory (disc C:) because C: will be formatted during the flashing process.
Use Nokia PC Suite or make a backup using the memory card application. Both methods work.

Next you need to get NokiaSoftware Updater (NSU) from Nokia. It will look if there are updates available for your mobile and will allow you to reinstall your current firmware.
Grab it here hxxp://europe.nokia.com/A4579163 .

Start NSU, click Start, connect your phone to the computer (select 'PC Suite' if it asks you) and click Next.

It will recognize your phone and look for updates. Press the checkbox and continue.

NSU will start downloading the firmware files from Nokia's server and update your phone.

After the process is completed, you will find some firmware files stored in

C:\Documents and Settings\All Users\Application Date\Nokia\Nokia Service Layer\A\nsl_service_module_00001\vpls\www.dsut.online.nokia.com.oti.caresuite\Products\rm-92
Most probably the path differs according to each phone model. You should be able to find it though.

You need the .fpsx file. Its about 45MB and its name structure is: <model>_<version>-...<localization>....fpsx
If you have an up-to-date N80, the filename will look like this n80_5.0719.0.2-prd_western_c00_cc.fpsx

Open the file in WinHex or any other hex editor.

Press Ctrl+F , select 'ASCII/Code Page' in the dropdown box and press OK

Slika


The first search result is pretty useless.. just some filenames and random strings.
Press F3 to get to the next one.

Now you see the content of swipolicy.ini in front of you. The blue marked part in the image shows this file.

Slika


The content may differ from firmware to firmware but you will see where the text ends and where the encrypted code starts.
Maybe you will not even find this part in your firmware at all....

Now select the content -> rightclick -> Edit -> Copy Block -> Into New File -> Save as content.txt (for example)

Use your favourite text editor (I recommend Notepad++ .. look below) to change the file but remember to keep the filesize!

You will need to remove some lines. So I recommend to take a look on this page which explain you the contents of swipolicy.ini
hxxp://www.symbian.com/developer/techlib/v9.2d ... olicy.html

Here is an example of a working swipolicy file .. before and after .. both 536 bytes :


AllowUnsigned = false
MandatePolicies = false
MandateCodeSigningExtension = false
Oid = 1.2.3.4.5.6
Oid = 2.3.4.5.6.7
DRMEnabled = true
DRMIntent = 3
OcspMandatory = false
OcspEnabled = true
AllowGrantUserCapabilities = true
AllowOrphanedOverwrite = true
UserCapabilities = NetworkServices LocalServices ReadUserData WriteUserData UserEnvironment
AllowPackagePropagate = true
SISCompatibleIfNoTargetDevices = false
RunWaitTimeoutSeconds = 600
AllowRunOnInstallUninstall = false
DeletePreinstalledFilesOnUninstall = true



AllowUnsigned = true
MandatePolicies = false
MandateCodeSigningExtension = false
Oid = 1.2.3.4.5.6
Oid = 2.3.4.5.6.7
OcspMandatory = false
OcspEnabled = true
AllowGrantUserCapabilities = true
AllowOrphanedOverwrite = true
UserCapabilities = AllFiles TCB DRM DiskAdmin NetworkServices LocalServices ReadUserData WriteUserData ReadDeviceData WriteDeviceData UserEnvironment PowerMgmt MultimediaDD TrustedUI ProtServ NetworkControl SwEvent Location SurroundingsDD CommDD
AllowPackagePropagate = true


I highly doubt that you will need all the capabilities listed there, this is only a possible example.
The most interesting should be AllFiles - it enables you to view the hidden system folders. Assumed you've got a compatible file browser.
You can also change AllowUnsigned to true. Should be self-explainable.

And Remember to keep the filesize, you can add some spaces until it fits.

When you are done editing, save it as a new file named as content_new.txt (for example)
Again.. check the filesize to be sure. Move your mouse over the file to see a popup saying 536 bytes (in this case).

Open Apatcher and write a command line according to this form:

replace:<content>:<content_new>
...where <content> and <content_new> are the hex values of each text file.

To get the hex values, open the according text file in WinHex, press Ctrl+A and Ctrl+Shift+C.

It should look like this:

Slika


Basically, your patch is ready. You can save it for later use if you want, don't close Apatcher. Now it needs to be applied the firmware file.

Unfortunately NSU will download the firmware files each time you want to flash your phone.
Thats no problem though because you can patch the fpsx file while its finished and the others are downloading.
That will be ~20MB and not much time for people with fast internet connections.
Get NetLimiter to slowdown NSU if you want.

So.. start NSU, let it download the files and check the folder to see when the fpsx is done.
Switch to Apatcher and press the 'Apply patch for file' button (remember to switch file type to 'All files' afterwards) and select the fpsx file.

When its done, you will see some text at the log window below:

Replaced set 1 to 01DA7244H
All DONE!


Now let NSU flash your phone. The process will take ~15-20 minutes and does not require your interaction.

Congratulations! You're done!


Download WinHex

Download NetLimiter

[/center]

Slika



Download APatcher
[/quote]

Kad sve ovo uradite potreban vam je i modifikovan explorer kojeg mozete skinuti ovde

p.s. ja sam sa ovim tutorijalom probio zastitu na moj N73 i nema nikakvih bugova u samom softveru. Cak neke unsignovane aplikacije mozete instalirati bez problema, ali neke morate i dalje sertifikovati.

darkado
Mobil stručnjak
Mobil stručnjak
Postovi: 791
Pridružio se: Sre, 04. Okt 2006. 18:00

Post od darkado »

a shta ako mi nsu ne nudi reinstal ? koji si product code koristio? inache svaka chast za find .

milann
Mobil stručnjak
Mobil stručnjak
Postovi: 874
Pridružio se: Ned, 23. Okt 2005. 09:11
:: Xiaomi Mi 9

Post od milann »

darkado, video sam u temi za N73 da ne mozes da ga updejtujes sa balkan kodom :? Probaj da koristis njegov originalni product kod, ili ga odnesi u servis da ti preko box-a, ubace balkansku verziju. S'njim ces moci da uradis reinstal.

Koristio sam 0539291 (muzicka verzija) :wink:

darkado
Mobil stručnjak
Mobil stručnjak
Postovi: 791
Pridružio se: Sre, 04. Okt 2006. 18:00

Post od darkado »

taj kod i imam samo mi kazhe da imam latest verziju i tu tu ru tu. taj kod koristim vishe od godinu dana. a za novi fw, chuo sam da je povuchen.
Alcatel 992d / Sony Xperia S / Huawei IDEOS X5 / ZTE Blade / HTC Startrek

Phantom Lord
Mobil poznavalac
Mobil poznavalac
Postovi: 550
Pridružio se: Pet, 28. Okt 2005. 12:10
Lokacija: C\System\Apps\Beograd

Post od Phantom Lord »

Ja se ne bih zajebavao sa NSU,bilo je dosta dead telefona,pa moras da ga nosis na flesh u servis.Ovo je bezopasno i privremeno resenje i sto je meni najbitnije ne moram da sve instaliram od pocetka,a bilo mi je potrebno samo da obrisem par fajlova i ubacim logo u boji :wink:

Odgovori