Hacking Derrek6 has the Wii U Boot1 Key!

ARVI80

Well-Known Member
Member
Joined
Feb 25, 2016
Messages
197
Trophies
0
Age
43
Location
UK
XP
315
Country
You can't bruteforce a hash because of collisions, especially when you're dealing with completely random strings such as keys to begin with. There are a (virtually) infinite amount of strings that have the same hash

Password guessing works because it's using a dictionary-based attack and calculating what the hash of known words actually is

You don't need to bruteforce, sha1 collision attacks (namely collision detection) has been possible since 2012 and substantially improved in speed since. This is why Google is trying to push everyone away from sha1.
 

AboodXD

I hack NSMB games, and other shiz.
Member
Joined
Oct 11, 2014
Messages
2,880
Trophies
1
Location
Not under a rock.
XP
2,921
Country
United Arab Emirates
For anyone who is wondering what'll this do?

You can use it to decrypt boot1, and then get to boot0.

You may say "And why would we need to do that?".
To find possible bugs, and exploit them, aka haxx on boot, possibly permanent exploits.
 
  • Like
Reactions: ARVI80

AboodXD

I hack NSMB games, and other shiz.
Member
Joined
Oct 11, 2014
Messages
2,880
Trophies
1
Location
Not under a rock.
XP
2,921
Country
United Arab Emirates
It would be quicker to just wait for the key to be leaked either way. As for wanting the key, I have my reasons other than decrypting boot1.
Like what? it's pretty much useless for anyone who doesn't know what he's doing...
I, myself, am not interested in exploiting systems, so I'll just wait and see. :)
 

Bug_Checker_

Well-Known Member
Member
Joined
Jun 10, 2006
Messages
950
Trophies
0
XP
664
Country
United States
For anyone who is wondering what'll this do?

You can use it to decrypt boot1, and then get to boot0.

You may say "And why would we need to do that?".
To find possible bugs, and exploit them, aka haxx on boot, possibly permanent exploits.

This makes no sense. Boot0 = arm/Starbucks bootrom(Read Only Memory).
You may be able to break the chain of trust from boot1 (since it is write able) but boot0 is set in stone.
 

AboodXD

I hack NSMB games, and other shiz.
Member
Joined
Oct 11, 2014
Messages
2,880
Trophies
1
Location
Not under a rock.
XP
2,921
Country
United Arab Emirates
This makes no sense. Boot0 = arm/Starbucks bootrom(Read Only Memory).
You may be able to break the chain of trust from boot1 (since it is write able) but boot0 is set in stone.
Some people are interested in looking at boot0, IDK why.
I don't think that it has anything to do with exploiting... :unsure:
 

Bug_Checker_

Well-Known Member
Member
Joined
Jun 10, 2006
Messages
950
Trophies
0
XP
664
Country
United States
I am not talking about copyrighting a number. THERE IS NO SUCHTHING,PERIOD END OF DISCUSSION

I was talking about posting a link to copyrighted code. For that, there is no excuse.
 
  • Like
Reactions: KiiWii

Thomas83Lin

Retro Gamer
Member
Joined
Jul 22, 2009
Messages
1,587
Trophies
1
Website
www.thomas83lincodes.com
XP
1,779
Country
United States
If its anything like the Wii, boot0 also checks the hash of boot1. and since boot0 can't be changed cause its read-only. That means all this Key can be used for is decrypting boot1 but cause boot0 checks the hash of boot1 it still can't be modded even with this key. And lastly because boot1 has already been readable before this key was known, its completely useless just for bragging rights I guess. Correct me if I'm wrong.
 
  • Like
Reactions: Bug_Checker_

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
  • No one is chatting at the moment.
    OctoAori20 @ OctoAori20: Nice nice-