Home

Awesome

iExtractor: Automate Extraction from iOS Firmware Files

iExtractor is a collection of tools and scripts to automate data extraction from iOS firmware files (i.e. IPSW files). It runs on macOS and partially on Linux (certain tools and features only work on macOS).

IPSW (iPhone Software) files are provided publicly by Apple for OTA (over-the-air) updates for devices running iOS. ipsw.me provides links to IPSW files by device and iOS version. Similar information is on The iPhone Wiki.

IPSW files are ZIP files packing the filesystem, kernel image and other files. The filesystem image and kernel image files for iOS <= 9 are encrypted; the firmware keys for most of these files are provided by the community on The iPhone Wiki. In the command output below 058-25512-331.dmg (the largest file) is the filesystem image file and kernelcache.release.n41 is the kernel image file or the kernelcache.

$ unzip -l iPhone5,1_9.3_13E237_Restore.ipsw
  Length      Date    Time    Name
---------  ---------- -----   ----
  20660492  03-25-2016 08:55   058-25481-332.dmg
1623427584  03-25-2016 09:03   058-25512-331.dmg
  21491980  03-25-2016 08:55   058-25517-331.dmg
[...]
  10850444  03-25-2016 04:46   kernelcache.release.n41
[...]

iExtractor automates the unpacking, decryption and extraction of interesting data from IPSW files. Output data provided by iExtractor from IPSW files is:

iExtractor is open source software released under the 3-clause BSD license.

Installation

iExtractor uses external tools and glue scripts. You have to run iExtractor in the Bourne-again Shell (Bash).

After cloning the iExtractor repository, you have to clone some of the required tools as submodules:

git submodule update --init tools/sandblaster
git submodule update --init tools/xpwn

In order to install required packages use the commands below on Linux (Debian-based):

sudo apt-get update
sudo apt-get install coreutils grep sed tar wget unzip build-essential
sudo apt-get install libssl-dev python2.7 libz-dev libbz2-dev libusb-dev cmake libpng12-dev dmg2img

or the following commands on macOS using Homebrew:

brew install coreutils grep wget unzip
brew install openssl python zlib bzip2 libpng cmake
brew install libusb coreutils

The dmg2img tool and package isn't required on macOS. The libusb installation isn't required and it's not detected by the xpwn installation.

There should be similar commands on macOS if you are using MacPorts. coreutils should be installed with brew, otherwise the scripts won't find realpath and tac.

Some external tools in the tools/ subfolder need to be built. You need to build:

Setup

Before running iExtractor scripts you need to create a config file in the root of the repository. You can make a copy of the config.sample file and update that:

cp config.sample config

In the config.sample file downloaded and extracted data is stored in subfolders in the current directory (STORE=.). You can update the STORE variable to a different folder where you want the data stored.

You then need to create the storage subfolders. Assuming STORE points to the current directory (.), run the commands:

mkdir ipsw
mkdir out

The ipsw/ folder stores downloaded IPSW files and the out/ folder stores data extracted and processed by iExtractor. You will look in the out/ folder for interesting data and copy data from/to the out/ folder if you want to extract/process part of it on another system.

Usage

In order to do all processing for a given firmware, use the run_all wrapper script. You need to pass it a firmware id, i.e. one of the file names in the firmware-metadata/ subfolder:

./run_all iPhone5,1_9.3_13E237

If you want to do all steps except the lengthier (and more storage hungry) steps of packing the filesystem and extracting the system dynamic libraries files, you can use the run_no_pack_fs_no_dyld wrapper script:

./run_no_pack_fs_no_dyld iPhone5,1_9.3_13E237

Similarly, if you downloaded and unpacked IPSW files elsewhere (on another system), you copied the interesting extracted data and you want to work on that data without going into the download and unpack steps, you can use the run_no_download_no_unpack script:

./run_no_download_no_unpack iPhone5,1_9.3_13E237

You can run a single step by going to the scripts/ subfolder and running a script there:

cd scripts/
./decrypt_kernel iPhone5,1_9.3_13E237

Or you can create your own custom script based on run_all or run_no_pack_no_fs_no_dyld. Read more below.

If you want to check all files and folders corresponding to a given firmware ID, use the list_files wrapper script. It gives you information about the existence and basic properties of those files (IPSW input file, kernelcache, reversed sandbox profiles etc.):

./list_files iPhone5,1_9.3_13E237

Similarly, if you want to remove all or some of the files and folders corresponding to a givn firmware ID, use the clean.sample script or create a script starting from that. The clean.sample script uses rm -i (i.e. interactive run) to prevent you from removing a file by mistake:

./clean.sample iPhone5,1_9.3_13E237

Internals

External tools are located in the tools/ subfolder. They are to be run through two layers of scripts: a lower-layer set of scripts located in the bin/ subfolder and a higher-layer set of scripts in the scripts/ subfolder. The scripts in the scripts/ subfolder are the ones you will work with.

Each higher-layer script in the scripts/ subfolder does a specific action: unpacking an IPSW file, extracting the dynamic library shared cache, extracting the sandbox extension etc.

Each script uses a firmware id as an argument; supported firmware ids are files in the firmware-metadata/ subfolder; each file in the firmware-metadata/ subfolder uses the firmware id as a name and stores in plain text firmware-related information required by scripts. You can add support for a new firmware, by creating a file in the firmware-metadata/ subfolder named after the firmware id and filling it with the required information (download URL and decryption keys) similar to existing files.

You can run each script in the scripts/ subfolder either by itself, or by tying scripts together in a wrapper script, such as run_all, run_no_pack_fs, run_no_pack_fs_no_dyld, run_no_download_no_unpack and run_sandblaster. For debugging purposes or if you want to work on the lower layers, use the scripts in the bin/ subfolder.

When running a script, if previous output data exists it will prompt if you want to overwrite that. That is why, in a wrapper script, you would usually provide an N (for no) to the standard input of a script:

yes N | ./decrypt_kernel "$firmware_id"

You can start from existing scripts to create new ones and extend iExtractor to extract and process other interesting data from IPSW files.

Documentation

Read in-depth information about iExtractor on the wiki.

Community

Join us on Discord for live discussions.