Unfinished business of forgotten UDIDs

Screen-Shot-2012-09-07-at-4.03.50-AM

I came around the news of the leaked UDIDs from an FBI officers laptop... hhmmm good thing to go deeper

So basically what you should do to get the list (with proper censorship and privacy s#its of course) is :

Download links:
http://freakshare.com/files/6gw0653b/Rxdzz.txt.html
http://u32.extabit.com/go/28du69vxbo4ix/?upld=1
http://d01.megashares.com/dl/22GofmH/Rxdzz.txt
http://minus.com/l3Q9eDctVSXW3
https://minus.com/mFEx56uOa
http://uploadany.com/?d=50452CCA1
http://www.ziddu.com/download/20266246/Rxdzz.txt.html
http://www.sendmyway.com/2bmtivv6vhub/Rxdzz.txt.html
HOW TO GET THE CANDY ONCE YOU HAVE DOWNLOADED THE FILE
first check the file MD5:
e7d0984f7bb632ee19d8dda1337e9fba
(lol yes, a “1337” there for the lulz, God is in the detail) {{LOL}}
then decrypt the file using openssl:
openssl aes-256-cbc -d -a -in file.txt -out decryptedfile.tar.gz
password is:
antis3cs5clockTea#579d8c28d34af73fea4354f5386a06a6
then uncompress:
tar -xvzf decryptedfile.tar.gz

First the funny part was I had problems with decrypting with the password and everywhere I search even in some forums the dumbest users that where asking how to check the md5sum to go to the next step (!!) were able to decrypt it in the end…. LOL

eventually I found where the problem of ” bad magic number ” was. apparentley there is either a difference between a library in Mac OS X Lion and Linux one that OpenSSL is dependent on (different randomization, counting, something) or the difference is between OpenSSL 0.9.8k 25 Mar 2009 and OpenSSL 0.9.8r 8 Feb 2011. or probably some other thing that made this happen but I don’t have the time to figure out what.

So finally the file got decrypted and extracted in BackTrack5 using the procedure.

it is a really interesting list though:

getting more famous :D

getting more famous 😀

you can search through it by

 

cat ‘/root/Desktop/iphonelist.txt’ | grep KEYWORD

 

%d bloggers like this: