PDA

View Full Version : extracting DCT3 algo from GTCL-01 flash file



the-equinoxe
26-12-2003, 07:18 PM
I have downloaded the flash file update from the GTCL-01.
There should be a way to extract the dct3 algo from this file because the update contains the algo :D

However, I am a complete n00b in reversing PIC/ARM code (and I don't know what microcontroller is used for the GTCL-01)..
Maybe someone here has more experience in this and could help the Nokia Free community by extracting this algo and making it public.

The GTCL-01 unpdate files can be found here:
http://www.gsmunlock.com/equipment/siemens_clip.html

Happy hunting

Crux
27-12-2003, 05:06 AM
hmmm. that should be hard. im not sure even if it is possible. but if i can help, just ask. :)

the-equinoxe
27-12-2003, 08:40 AM
hmmm. that should be hard. im not sure even if it is possible. but if i can help, just ask. :)

Why should that be impossible?

I have seen award bios emulators, the principle is the same:
read the flash, extract the algo, put it in good use..

And there is something like picutil, it has a debugger and reverse engineer for hex files (but only for limited amount of PIC-controllers).

It could help to know what kind of eeproms and controllers are in the "gut" of this siemens clip.
(there have been reports of cloned gtcl-01's, the knowledge is certainly there)

HONGXING
30-12-2003, 12:01 AM
GTCL-1 uses an ATMEL ATMEGA128 flash microcontroller.

Yes, cloned clips exist from GSMUnlock.com.

the-equinoxe
30-12-2003, 04:49 AM
Thanks,

That is helpfull for reversing the hex code.. :D

Crux
31-12-2003, 04:49 AM
sorry for reopening this conversation but this thread was closed:
http://nokiafree.org/forums/t49072/h/s.html

maybe, and just maybe hongxing isnt a lier as was spoked.
i found this calc on the net. check it.
i would say it is a real dct4 calc. not shell. not a dct4nck modded as i saw before.
so, he has dct4 also. and if he has the dct4 algo, i would say he may also have dct3 algo.
lets face it: its possible!!!
check it for urselfs and reply here.

@Hongxing
is there a problem for releasing dct3 calc?

NokDoc
31-12-2003, 11:39 AM
Mr. Crux,

Can U also imagine why this thread was closed?

We not want those yes/ no games here.

NokDoc

Crux
31-12-2003, 03:28 PM
what do we need to have a conversation in this forum then?

myke2002
31-12-2003, 03:49 PM
sorry for reopening this conversation but this thread was closed:
http://nokiafree.org/forums/t49072/h/s.html

maybe, and just maybe hongxing isnt a lier as was spoked.
i found this calc on the net. check it.
i would say it is a real dct4 calc. not shell. not a dct4nck modded as i saw before.
so, he has dct4 also. and if he has the dct4 algo, i would say he may also have dct3 algo.
lets face it: its possible!!!
check it for urselfs and reply here.

@Hongxing
is there a problem for releasing dct3 calc?

If you would look at the hongxing calculator (btw. itīs protected with telock 0.96) and compare his file with original calculator you would see that they are the same. As I said in another thread, this guy is only good in renaming...nothing more. And he has nothing in his hands, no source for DCT-4 and of course not DCT-3. Heīs just a stupid child playing with otherīs work.

Regards
MyKe

Crux
31-12-2003, 04:20 PM
how can we compare those files?

i cant compare his calc with original dct4nck from joszo

can u?

myke2002
31-12-2003, 04:26 PM
how can we compare those files?

i cant compare his calc with original dct4nck from joszo

can u?

Yes I can. With simple hexeditor.

myke2002
31-12-2003, 04:29 PM
Yes I can. With simple hexeditor.

and of course telock unpacker.
http://protools.anticrack.de/files/unpackers/wkt_telockdumper.zip

HONGXING
31-12-2003, 06:14 PM
It is not renamed, it was disassembled.

myke2002
31-12-2003, 06:20 PM
It is not renamed, it was disassembled.

:lol: :lol: :lol:

Crux
31-12-2003, 06:44 PM
i just compared

u should really be ashame

i was starting to believe in u

now this conversations can be closed.

its done. found another cheater

GeeZuZz
02-01-2004, 10:49 PM
It is not renamed, it was disassembled.

Awesome comment.. :lol:

XARiUS
27-01-2004, 12:18 PM
Getting again into this discussion, does anyone succeded in decrypt *upd files?

the-equinoxe
27-01-2004, 02:41 PM
Getting again into this discussion, does anyone succeded in decrypt *upd files?

I was not able to decrypt the upd files (but I don't have the dongle).
I guess that someone with dongle could decrypt it with ease..

XARiUS
27-01-2004, 09:36 PM
Hi! Yes, it would be great also if i had the clip! A Lot more easy to get the decrypted file! But i don't thik the clip is needed to decrypt these files...

the-equinoxe
28-01-2004, 02:15 PM
Hi! Yes, it would be great also if i had the clip! A Lot more easy to get the decrypted file! But i don't thik the clip is needed to decrypt these files...
You are probably right, the program loads and sends the decrypted-upd to the clip as a flash file.

There must be a way to fool the program that the clip is connected [edit << DONE]and reroute the decrypted flash to a file (with a com sniffor or something..).
However, I am NOT a great or brilliant cracker. Someone with experience in cracking would be able to do that.

the-equinoxe
28-01-2004, 05:11 PM
You are probably right, the program loads and sends the decrypted-upd to the clip as a flash file.

There must be a way to fool the program that the clip is connected and reroute the decrypted flash to a file.. [edit << DONE]
However, I am NOT a great or brilliant cracker. Someone with experience in cracking would be able to do that..

What I managed to do is fooling the software so it ignores that the clip is not there, now the software is sending data to the com port when updating.
This should be enough to get your flash file with a com sniffer.

take it and try, keep me posted.