iOS 10 / 10.1 – How to Decrypt The Ramdisk & Extract ASR On OS X

In today's video I show you how to properly decrypt iOS 10's Ramdisk and extract ASR Application on OS X. You probably know that iOS 10's Ramdisk, even if not protected with AES and IV keys, was still impossible to open on OS X due to the an image related error. Now that xerub published IMG4Tool, you are able to decompress the file from it's containers and make it a true DMG file that can be browsed normally. After this, extraction of ASR is as easy as a few clicks.

If you want to disassemble ASR, you can use Hopper Disassembler V3. I've shown you in the video how to feed the app to the disassembler. At this point, patches for ASR can be created. Even tho patching ASR would require iBEC and iBSS patches as well, which in other hand require an iBOOT Exploit.

This video is created more for developers who know Assembly because disassembled ASR creates an ARM Assembly output in Hopper.

You can do this on Windows as well, just download the Windows version of the IMG4Tool available here in the description.

Thanks xerub for IMG4TOOL!

Also, the keys for iOS 9.3.5 iPhone 6,1 (5S) are now up on the iPhone Wiki, if anybody is still on that version.

==Download Section==
IMG4Tool Git:
IMG4Tool Compiled:
IMG4Tool Windows:

iOS 10 – How to decrypt the Kernel:
iOS 10 – Modify ROOT FS on Windows:

New iOS SHSH Status Service I made:


About GeoSn0w

C#, C, Objective-C Programmer | Beginner iOS Security Researcher | Content Creator | Web Developer I like to bring the latest news from the iOS / iDevice / Jailbreak battlefield to you in a beautiful manner :) I hope you like the site. If you do, don't forget to check out my channel :)