![]() |
FakeSMC V2
|
I think it's very cool on how it tricks "Dont steal Mac OS X.kext" to think it actually runs on a genuine Mac because of OSK1 and OSK2
|
wow thats amazing! Ill be using that When booting Snow Leo, right when ur kernel comes out!
|
I have remade the tools apb_encrypt and apb_decrypt and smc_read
the ones indicated as "legal" query the SMC Get them from: http://rapidshare.com/files/285582619/SMC_Tools.zip |
Ahdy,how to use the utility?
|
Quote:
./apb_decrypt <encrypted_bin> <decrypted_bin> ./apb_encrypt <unencrypted_bin> <encrypted_bin> same for apb_encrypt_legal or apb_decrypt_legal ./smc_read for testing fakesmc... Only works for Leopard as I don't yet have the encryption algo's for Snow Leopard... |
Quote:
I'll check Dont steal Mac OS X to see if I can get it going for 64bit too... It would be cool to have decrypts for SL |
I can't get this to work. I tested this on snow leo using lipo to strip out the x32 version of Finder then ran the decrypt util on it but when I launch it it won't launch.
Did anyone else get this to work? |
Diff
There is a difference in the way Apple decodes the binaries on a Mac OS X 10.6 versus 10.5.
1st The binary pages are decoded on 10.6 with a salt "0x2e69cf40". Here is the relevant source: Code:
#define APPLE_UNPROTECTED_HEADER_SIZE (3 * PAGE_SIZE_64) Code:
#define APPLE_UNPROTECTED_HEADER_SIZE (3 * PAGE_SIZE_64) Code:
crypt_info.crypt_ops = (void *)0x2e69cf40; |
andyvand, do you have a copy of the two apb programs working on Snow Leopard? I modified the code you posted so that it encrypted 64 bit binaries, but the binaries themselves couldn't be run.
Any ideas? |