Just a question that's been playing on my mind for a while.
was gonna post this directly to TX and see how that went but apparently im a noob. well played TX.
Right now the 15xxx dash in un-RGH-able because of new crypto.
Because of this, you cant get the CPU key string.
Why not dump the NAND onto something like the DAEMON and with custom version of XELL that iterates/bruteforces its way through every combination of keys to see if it matches?
Theres no wear on your NAND and the first time you run XELL you dont have your CPU key anyway which is the point of running it.
Is there more to the crypto stuff that stop XELL from being able to boot? There must be.
I understand a bruteforce attack would take a LONG time, but perhaps for now it could be a possibility?
probably the ramblings of a mad man, but still, anyone?
was gonna post this directly to TX and see how that went but apparently im a noob. well played TX.
Right now the 15xxx dash in un-RGH-able because of new crypto.
Because of this, you cant get the CPU key string.
Why not dump the NAND onto something like the DAEMON and with custom version of XELL that iterates/bruteforces its way through every combination of keys to see if it matches?
Theres no wear on your NAND and the first time you run XELL you dont have your CPU key anyway which is the point of running it.
Is there more to the crypto stuff that stop XELL from being able to boot? There must be.
I understand a bruteforce attack would take a LONG time, but perhaps for now it could be a possibility?
probably the ramblings of a mad man, but still, anyone?