aahasem.blogg.se

How to download doulci activator software
How to download doulci activator software





  1. HOW TO DOWNLOAD DOULCI ACTIVATOR SOFTWARE VERIFICATION
  2. HOW TO DOWNLOAD DOULCI ACTIVATOR SOFTWARE CODE

and my servers was using CertifyMe first to prevent the need of the SIM Hook for supported devices.

HOW TO DOWNLOAD DOULCI ACTIVATOR SOFTWARE CODE

The only downside of this second exploit is that it required a trick to make it work for devices that have cellular network, by using a SIM with a PIN Code for the processed devices. Since the first one was not working on all devices but only on iPhone 4 and below for iPhones, iPad 2 and below for iPads and all wifi devices including all iPod Touches. Merruk iCloud Bypass "doulCi" was modified to use both exploits. He discovered it along the way, but used it and wasted and burned the exploit. This exploit was used first by minacriss. Is this process still working now? Unfortunately not.Īgain and as I said before, the CertifyMe exploit led to the discovery that Apple does not verify the data sent to Albert by the on-device generated signature, so you can modify the request to your convenience. By merely changing some words like "certificate-info" to "activation-info", iCloud could be easily bypassed. Trying it on an iCloud locked device as an ActivationTicket also works!?!?! The SpringBoard is showing up. So after playing with CertifyMe and a little bit of debugging, I discovered that the request is almost the same as the activation itself. Hmmmm? So, could we MITM on that? Of course we can, with an activated device and a trusted certificate on it. The worst thing is Apple developers did not even use a security check mechanism existing from the onset on their platform servers, namely "Data Signature Verification", leading to the discovery of the second exploit, which will talk about later.Īnother security flaw is that Apple iDevices leaked some very important information during the boot process "certifyme request with a visible link on the boot log". The problem with this second method is, Apple uses the same info as the Activation Request, with only minimal changes. The second method is a simple CertifyMe request generated on the device and is sent to the Apple server, a.k.a., "Albert".

HOW TO DOWNLOAD DOULCI ACTIVATOR SOFTWARE VERIFICATION

Following is an example of the activation process and how Apple verification takes place. The first one is in the Activation itself. So the old doulCi that i have decided to rename again because of scammers to "Merruk iCloud Bypass" is still working, with some exceptions, because Apple added some security patches on both the server side and in its iOS.Īpple used two methods for the certification of its iDevices. To be fully patched it would require Data Migration, which would be very time and labor consuming for Apple and would require a great deal of effort. The first one is a "CertifyMe" exploit and the second is based on a security flaw on Apple servers that was actually a beginner?s mistake. After that, someone else going by the name of minacriss discovered one of the two exploits used by this bypass. It was discovered, developed and demoed by Yahya Lmallas during the first months of 2014. It had the simple name "doulCi", a reverse spelling of iCloud. Is "Merruk iCloud bypass" real? Is it still working? So, how can I be sure?ĭoulCi kitchen, a.k.a 2.0, was an improved version of the old magic line way method of bypassing Apple's iCloud Activation lock. Merruk iCloud bypass detailed technical instructions: From the beginning. ICloud bypass is no longer called doulCi, it goes Open Source with the name merruk iCloud bypass







How to download doulci activator software