FORUMS
Remove All Ads from XDA

[GUIDE] Decrypting your own branded ROM

271 posts
Thanks Meter: 62
 
By xeviro, Senior Member on 20th July 2010, 05:59 AM
Post Reply Email Thread
Fastest way to decrypt your own branded ROM by Binary
Quote:
Originally Posted by Bin4ry

FYI:
You can also use the new tool here. Usage:

SEUSDECRYPT.BAT FILE_XXXXXXXX -> That gives you a FILE_XXXXXX.tgz -> Unzip -> Then Untar the File which comes out

If you SEUSDECRYPT the small 64kb File you get directly the loader.sin no need to unzip and untar

Regards
Bin4ry

You may find the ConvertTools below.. This is just sick




Old way of decrypting ROM

Below is the guide to decrypting ROM which comes from SEUS. By following this guide, you will have your branded ROM decrypted as SIN files and later you can flash back the ROM to X10 with flashtools. So you can root and debrand all you like without worry because later you can flash your branded ROM back to your X10.

Tools:
jerpelea SIN Reconstructor
http://hotfile.com/dl/52847024/13749...uctor.rar.html

Requirement:
Your Xperia X10 must have the any version of the branded ROM installed first. If you already rooted or debranded it, you must rebrand it with your ROM first. See other threads about how to achieve this. The SIN Reconstructor tools cannot be used to extract the tho downloaded ROM files directly.

Step 1. Getting the extracted ROM from SUES
  1. Task: Getting the targeted ROM files ready to be flashed with SEUS.
    Do an update with SEUS to get your latest branded ROM, and let the ROM to be flashed to your X10. After this you will have the two files in SEUS db ready and next flashing, you don't need to download anymore and SEUS will flash it directly for you.
  2. Task: Installing the extractor files to SEUS
    Inside SIN Reconstructor, you will find com.sonyericsson.cs.usbflashnative_2.10.6.24.jar in seus directory. Backup your usbflashnative.jar from your SEUS plugin's directory somewhere else first, then copy the com.sonyericsson.cs.usbflashnative_2.10.6.24.jar file to plugin directory and then rename to the one you back up just now.
  3. Task: Extracting ROM with dump0
    Now you create a file in SEUS root. You need to create a file name dump0, make sure its dump0, not dump0.txt if you create the file using notepad and rename it. The run the SEUS update again. This will reflash your X10 then afterward, you get a lot of sign and bin files in SEUS root directory. Then you move the file somewhere else first
  4. Task: Extracting ROM with dump1
    Same as above but now you need a file name dump1, and the file dump0 must not exists in SEUS directory. After you are finished with reflash, you will have a lot of sign and bin files again, then move somewhere else.

Step 2. Identifying the bin and sign files
Because the extracted rom files are named in number, you need to identify and rename them first. When renaming, you need to rename pair of sign and bin files to the designated name.

When making SIN files, you only need to create this file below:
  • amss.sin
  • boot.sin
  • dsp1.sin
  • recovery.sin
  • system.sin
  • userdata.sin

The rest of SIN files is the same with other debranded SIN files you downloaded before which are:
  • amss_fs.sin
  • apps-log.sin
  • cache.sin
  • fota0.sin
  • fota1.sin

How to identify is very easy, find the file and the rename
  • amss file size is about 15Mb
  • boot file size is about 5.1Mb
  • dsp1 file size is about 8Mb
  • recovery file size is about 5.4Mb and bigger then boot.sign
  • system file size is the largest
  • userdata file size is 4Kb

When you have all this pairs renamed, copy them to SIN Extractor files directory.
Then we need to recheck the rebuild.cmd against the sign file size. Guides taken from rebuild.cmd
Code:
@echo off
@echo sizes are adjustable for every sign file
@echo if your file size differs from mine 
@echo adjust count= vith the value obtained from 
@echo size of .sign file -17 and correct the value
@pause

@echo amss.sin
@..\tools\dd if=../files/amss.sign bs=1 skip=13 count=4074>amss.sin
@..\tools\cat ../files/amss.bin >>amss.sin
Meaning that if the amss.sign file size is for example 5017, then you need to change the count into 5000.

If you finished to this step, you have the you decrypted rom almost ready, all you need to do is copy the amss_fs.sin, apps-log.sin, cache.sin, fota0.sin, fota1.sin from other debrand ROM you downloaded.

Then you have your decrypted ROM ready. Mission accomplished
Attached Files
File Type: zip ConvertTool.zip - [Click for QR Code] (174.4 KB, 30620 views)
The Following 5 Users Say Thank You to xeviro For This Useful Post: [ View ] Gift xeviro Ad-Free
 
 
20th July 2010, 06:02 AM |#2  
OP Senior Member
Flag Singapore
Thanks Meter: 62
 
Donate to Me
More
For those asking why dump0 and dump1 will create same files, except for extra 8699.bin and 8699.sign, i just recreate the dump guide, i don't know if you just do with dump1 straightaway will get you the same thing if you do dump0 and dump1. too lazy to test.
20th July 2010, 08:05 AM |#3  
MarylandCookie's Avatar
Senior Member
Flag Birmingham, UK
Thanks Meter: 350
 
Donate to Me
More
Both Dump0 and Dump1 present will work
21st July 2010, 01:49 PM |#4  
Senior Member
Flag St. Pölten
Thanks Meter: 10
 
More
i really dont gettin over it,

could you please be so nice and do the decrypting of my A1 ( Austria) files?

kind regards DAuL
21st July 2010, 02:20 PM |#5  
OP Senior Member
Flag Singapore
Thanks Meter: 62
 
Donate to Me
More
is not that i don't want to help. but decrypting rom requires you to flash your x10 with the targeted rom first. which means i need to reflash mine and do the whole thing again.

which part of the process give you.trouble. i'll help you solve it.



Sent from my X10i using Tapatalk
23rd July 2010, 07:25 AM |#6  
Member
Thanks Meter: 0
 
More
Angry
Could this thread be stickied?
26th July 2010, 03:55 AM |#7  
OP Senior Member
Flag Singapore
Thanks Meter: 62
 
Donate to Me
More
bump! mod, make this stickie... please
29th July 2010, 06:46 AM |#8  
OP Senior Member
Flag Singapore
Thanks Meter: 62
 
Donate to Me
More
If next root update come, which means i might reset my whole phone and root, and configure all over again, i might as well help you guys decrypt your branded ROM.

Please upload somewhere like megaupload or hotfile (except rapidshare) for me to download, and later i'll decrypt and post to the decrypted branded rom thread.
29th July 2010, 11:02 PM |#9  
MrKingLouie's Avatar
Senior Member
Flag Stockholm
Thanks Meter: 24
 
More
http://hotfile.com/dl/53464337/95a1a...neric.rar.html

Can you plz decrypt this ?

Sent from my X10i using XDA App
30th July 2010, 09:13 AM |#10  
OP Senior Member
Flag Singapore
Thanks Meter: 62
 
Donate to Me
More
Link broken. Upload again
30th July 2010, 07:47 PM |#11  
MrKingLouie's Avatar
Senior Member
Flag Stockholm
Thanks Meter: 24
 
More
Will Do Sunday, 2 more Days of holiday atm

Sent from my X10i using XDA App
Post Reply Subscribe to Thread

Guest Quick Reply (no urls or BBcode)
Message:
Previous Thread Next Thread
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes