-
Notifications
You must be signed in to change notification settings - Fork 240
Home
You can extract even more artwork if you decrypt and mount an iOS firmware (.ipsw file).
- ipsw_decrypt.py
- Python 3.2 (required by ipsw_decrypt.py)
-
VFDecrypt (required by ipsw_decrypt.py)
Make sure to install thevfdecrypt
binary somewhere in your PATH or use the-d
option of the theipsw_decrypt.py
script.
-
Download an iPhone or iPad firmware that matches your simulator version and make sure that there is a VFDecrypt Key by checking the corresponding Build column. For beta versions, check the VFDecrypt Keys page instead.
-
Run the
ipsw_decrypt.py
script on the firmware you downloaded. The output should look like this:<Info> Extracting content from iPhone3,1_5.1_9B176_Restore.ipsw, it may take a minute... <Info> Extracted firmware to 'iPhone 4, 5.1 (9B176)'. You may use the '-o "iPhone 4, 5.1 (9B176)"' switch in the future to skip this step. <Info> iPhone 4 (iPhone3,1), class n90ap <Info> iOS version 5.1, build Hoodoo 9B176 <Info> Downloading decryption keys from 'http://theiphonewiki.com/wiki/index.php?title=Hoodoo_9B176_(iPhone_4)'... <Info> Retrieved 18 keys. <Notice> Skipping BasebandFirmware (ICE3_04.12.01_BOOT_02.13.Release.bbfw): No decryption key <Info> Decrypting 'iBEC.n90ap.RELEASE.dfu'... <Info> Decrypting 'iBSS.n90ap.RELEASE.dfu'... <Info> Decrypting 'recoverymode@2x~iphone.s5l8930x.img3'... <Notice> Image color format: argb; size: 172x786 <Info> Decrypting '038-1768-165.dmg', it may take a minute... sig encrcdsa blocksize datasize 774709676 dataoffset 122880 keyDerivationAlgorithm 0 keyDerivationPRNGAlgorithm 0 keyDerivationIterationCount 0 keyDerivationSaltSize 0 keyDerivationSalt blobEncryptionIVSize 0 blobEncryptionIV blobEncryptionKeySizeInBits 0 blobEncryptionAlgorithm 0 blobEncryptionPadding 0 blobEncryptionMode 0 encryptedBlobSize 0 encryptedBlob <Info> Decrypting '[email protected]'... <Notice> Image color format: argb; size: 504x556 <Info> Decrypting 'LLB.n90ap.RELEASE.img3'... <Info> Decrypting '038-1800-166.dmg'... <Info> Decrypting '[email protected]'... <Notice> Image color format: grey; size: 238x68 <Info> Decrypting 'kernelcache.release.n90'... <Info> Decompressing LZSS... (100%) <Info> Decrypting '[email protected]'... <Notice> Image color format: argb; size: 70x556 <Info> Decrypting '[email protected]'... <Notice> Image color format: grey; size: 132x164 <Info> Decrypting 'DeviceTree.n90ap.img3'... <Info> Decrypting '[email protected]'... <Notice> Image color format: argb; size: 70x556 <Info> Decrypting '038-1813-172.dmg'... <Info> Decrypting '[email protected]'... <Notice> Image color format: grey; size: 296x346 <Info> Decrypting '[email protected]'... <Notice> Image color format: grey; size: 86x102 <Info> Decrypting '[email protected]'... <Notice> Image color format: grey; size: 154x216 <Info> Decrypting 'iBoot.n90ap.RELEASE.img3'...
-
Go into the
iPhone 4, 5.1 (9B176)
folder or whatever folder was created depending on the firmware you chose. -
Open the biggest file ending with
.decrypted.dmg
in order to mount the disk image. In this example:038-1768-165.decrypted.dmg
-
Run iOS Artwork Extractor. If the mounted iOS firmware version matches your simulator version, then you will discover much more artwork.