Skip to content

Latest commit

 

History

History
194 lines (141 loc) · 10.4 KB

README.md

File metadata and controls

194 lines (141 loc) · 10.4 KB

SH1MMER (light) SH1MMER (dark)

Shady Hardware 1nstrument Makes Machine Enrollment Retreat

Website, source tree, and write-up for a ChromeOS™️ enrollment jailbreak


What is SH1MMER?

SH1MMER is an exploit found in the ChromeOS shim kernel that utilitzes modified RMA factory shims to gain code execution at recovery. For more info, check out the blog post/writeup here.

How does it work?

RMA shims are a factory tool allowing certain authorization functions to be signed, but only the KERNEL partitions are checked for signatures by the firmware. We can edit the other partitions to our will as long as we remove the forced readonly bit on them.

How do I use it?

Note

dl.sh1mmer.me has been taken down, so you'll need to find a site rehosting the RMA shims alongside Chromebrew.

Here's how you do that. First, you need to know your Chromebook's board. Go to chrome://version on your Chromebook and copy the word after stable-channel. If chrome://version is blocked, you can search up your Chromebook's model name on chrome100 and see what board it corresponds to. DO NOT DOWNLOAD A RECOVERY IMAGE FROM chrome100, IT WILL NOT WORK.

If your board name is in the list below, great! Find the RAW RMA shim corresponding to your board online. We can no longer provide raw RMA shims due to legal reasons. More information here.

ambassador, banon, brask, brya, clapper, coral, corsola, cyan, dedede, edgar, elm, enguarde, fizz, glimmer, grunt, hana, hatch, jacuzzi, kalista, kefka, kukui, lulu, nami, nissa, octopus, orco, puff, pyro, reef, reks, relm, sand, sentry, stout, strongbad, tidus, trogdor, ultima, volteer, zork

If it's not, good luck. You'll have to try and call up your OEM and demand the files from them, which they are most unlikely to give to you.


Building A Beautiful World Shim

Now you can start building. Type out all of these commands in the terminal. You need to be on Linux or WSL2 and have the following packages installed: git, wget. You may need to install additional packages, which the script will prompt you to do.

git clone https://github.com/MercuryWorkshop/sh1mmer
cd sh1mmer/wax
sudo bash wax.sh -i path/to/the/shim/you/downloaded.bin

This will build a beautiful world mini shim. If you want to add chromebrew, do the following:

git clone https://github.com/MercuryWorkshop/sh1mmer
cd sh1mmer/wax
wget https://dl.darkn.bio/api/raw/?path=/Chromebrew/chromebrew.tar.gz
sudo bash wax.sh -i path/to/the/shim/you/downloaded.bin --chromebrew chromebrew.tar.gz -s 4G

Note

If you want to build a devshim, replace chromebrew.tar.gz with chromebrew-dev.tar.gz and replace -s 4G with -s 7G in the wax command. Devshim builds will mount a much larger Chromebrew partition over /usr/local, allowing you to access a desktop environment and even Firefox from within SH1MMER. It's what allowed us to run DOOM on a shim.

When this finishes, the bin file in the path you provided will have been converted into a SH1MMER image. Note that this is a destructive operation, you will need to redownload a fresh shim to try again if it fails.

After injecting, you may continue to the "Booting Into A Shim" section.


Building A Legacy Shim

The factory shims for boards such as hana or coral were built before graphics support was added into the tty. This makes it impossible for the Beautiful World GUI to work and thus a legacy CLI-only shim must be built.

Type out all of these commands in the terminal.

git clone https://github.com/MercuryWorkshop/sh1mmer
cd sh1mmer/wax
sudo bash wax.sh -i path/to/the/shim/you/downloaded.bin -p legacy

Note

Building a legacy shim will work on ALL BOARDS. Legacy shims are easier to update and are recommended for advanced users and developers.

When this finishes, the bin file in the path you provided will have been converted into a SH1MMER image. Note that this is a destructive operation, you will need to redownload a fresh shim to try again if it fails.

After injecting, you may continue to the "Booting Into A Shim" section.


Booting Into A Shim

Once you have injected your raw shim with SH1MMER, go into the Chromebook Recovery Utility, select the settings icon (⚙️), select Use local image, and then select your injected shim. Alternatively, you can also use other flashers such as BalenaEtcher, Rufus, UNetbootin, and etc. This may take up to 10 minutes, depending on the size of your shim and speed of your USB drive.

On the Chromebook, press ESC + Refresh (↻) + Power (⏻) at the same time to enter the recovery screen, then press CTRL + D at the same time and press Enter. This should enable Developer Mode or turn off OS Verification. This may be blocked by system policy, but that doesn't matter.

Press ESC + Refresh (↻) + Power (⏻) at the same time again, then plug in your USB with SH1MMER and you should be booting into the Beautiful World GUI or a CLI screen. From here, you can play around with the options and do what you want.


CryptoSmite

SH1MMER has been patched by Google™️ since v111, but since then a new unenrollment exploit for v119 and lower has released: CryptoSmite. By default, this is bundled inside payloads in all SH1MMER shims, and all you need to do is flash a SH1MMER shim, go into Payloads, and run cryptosmite.sh.

CryptoSmite Instructions
  1. Download a SH1MMER Prebuilt image here: dl.darkn.bio, then flash a USB with it using CRU.
  2. Disable OS verification (blocked or not, doesn't matter), and boot into the shim.
  3. Navigate to Payloads and navigate to CryptoSmite using the arrow keys, then press Enter.
  4. Type in Y then press enter, and it'll automatically reboot upon completion.
  5. Proceed through the setup partially till you get to the Add Account Screen.
    • If you see an update prompt, reboot then press CTRL + ALT + E on the Wi-Fi screen.
      • This should allow skipping the update, or make it not appear at all.
  6. Powerwash the Chromebook at the "Add Account" screen. Afterwards, it'll be fully unenrolled.

The Fog

Note

It is recommended to use CryptoSmite instead if you're only affected by "The Fog" and nothing else. "The Fog" instructions are old, however that doesn't mean you can't try it if you don't wish to use CryptoSmite.

Downgrading and unenrollment has been patched by Google™️. If your Chromebook has never updated to version 112 (or newer) before (check in chrome://version), then you can ignore this and follow the normal instructions. If not, unenrollment will not work as normal.

Fog Bypass Details

If your Chromebook is on version 112 or 113, unenrollment is still possible if you're willing to disable hardware write protection. On most devices, this will require you to take off the back of the Chromebook and unplug the battery, or jump two pins. Further instructions are on the website.

"Unenrolling" with Write Protection

If you aren't willing to take apart your Chromebook to unenroll, you can use an affiliated project, E-Halcyon to boot into an unenrolled environment temporarily. This will bypass both issues of The Fog and The Tsunami, however further caveats are listed on the website.

The Tsunami

Warning

It is VERY recommended to use CryptoSmite instead if you're on v119 or lower. The instructions to do "The Tsunami" are extremely dangerous, even with a chip flasher. Proceed with caution if you can't use CryptoSmite.

Disabling write protection has also been patched by Google™️. If your Chromebook has never updated to version 114 (or newer) before (check in chrome://version), then you can ignore this and follow the Unpatch instructions. If not, disabling write protection will not work as normal.

Tsunami Bypass Details

If your Chromebook is on version 114 or newer, unenrollment is still possible by bridging two pins on the firmware chip. On most devices, this will require you to take off the back of the Chromebook and then use a piece of tinfoil, wire, or other conductive material to bridge the two pins. This bypass is not recommended as you risk permanently bricking the Chromebook, please use E-Halcyon instead.

Credits

  • CoolElectronics - Pioneering this wild exploit
  • ULTRA BLUE - Testing & discovering how to disable RootFS verification
  • Unciaur - Found the inital RMA shim
  • TheMemeSniper - Testing
  • Rafflesia - Hosting files
  • generic - Hosting alternative file mirror & crypto miner (troll emoji)
  • Bypassi - Helped with the website
  • r58Playz - Helped us set parts of the shim & made the initial GUI script
  • OlyB - Scraped additional shims & last remaining sh1mmer maintainer
  • Sharp_Jack - Created wax & compiled the first shims
  • ember - Helped with the website
  • Mark - Technical Understanding and Advisory into the ChromeOS ecosystem