Brute forcing? I hope you have enough power and sense to know how to do that. You're going to at least have a few plaintext strings first.
Man that was complex! Lol you just blew my mind."The average cost for electricity in the US is $0.12 per kWh. For a single server I'll use 3741 kWh annually as an estimate. That would be about $450 per year for one machine.
Let's say you can do 1014 decryptions per second. That is 3.15∗1021 decrypts per year for one machine. You need to do (on average) 2255 decryptions in a year, so you would need 22553.15∗1021≈1.84∗1055 machines. To figure your cost you would multiply that by $450 and get about $8∗1057 or 8 octodecillion dollars. World GDP is about 63∗1012, so brute-forcing a 256-bit key would cost about 1044 times the world GDP.
You can follow similar math to get the cost of brute forcing a 128-bit key."
Wanna try that again?http://stackoverflow.com/questions/18847580/aes128-vs-aes256-using-bruteforce"The average cost for electricity in the US is $0.12 per kWh. For a single server I'll use 3741 kWh annually as an estimate. That would be about $450 per year for one machine.
Let's say you can do 1014 decryptions per second. That is 3.15∗1021 decrypts per year for one machine. You need to do (on average) 2255 decryptions in a year, so you would need 22553.15∗1021≈1.84∗1055 machines. To figure your cost you would multiply that by $450 and get about $8∗1057 or 8 octodecillion dollars. World GDP is about 63∗1012, so brute-forcing a 256-bit key would cost about 1044 times the world GDP.
You can follow similar math to get the cost of brute forcing a 128-bit key."
"The average cost for electricity in the US is $0.12 per kWh. For a single server I'll use 3741 kWh annually as an estimate. That would be about $450 per year for one machine.
Let's say you can do 1014 decryptions per second. That is 3.15∗1021 decrypts per year for one machine. You need to do (on average) 2255 decryptions in a year, so you would need 22553.15∗1021≈1.84∗1055 machines. To figure your cost you would multiply that by $450 and get about $8∗1057 or 8 octodecillion dollars. World GDP is about 63∗1012, so brute-forcing a 256-bit key would cost about 1044 times the world GDP.
You can follow similar math to get the cost of brute forcing a 128-bit key."
https://www.schneier.com/blog/archives/2011/08/new_attack_on_a_1.html
Also furthermore, im more concerned with dumping and reflashing the nand/emmc at this point anyways to see if its possible. Lets not get ahead of ourselves
https://www.schneier.com/blog/archives/2011/08/new_attack_on_a_1.html
Also furthermore, im more concerned with dumping and reflashing the nand/emmc at this point anyways to see if its possible. Lets not get ahead of ourselves
Okay, i see what you're saying. I guess i was misinformed then. Perhaps, i should revert back to the original plan, a MITM attack. Either that or trying to bit bang for the key and dump it that way....The point is, don't hope to get the keys by brute force. But good luck with the dumping, I'm sure it will be very useful.
The original plan is my OP. If you want to do something by yourself then please keep it to yourself. When you mention brute forcing keys and MITM "attacks" that are not possible (0.0000000000000000000000000000000000000000000000000000001% chance to be accurate) it derails the thread and turns some people off as it is obviously not possible. There is nothing complicated about this. Maybe start your own thread about brute forcing keys and MITM attacks. The pictures you posted were good. I'd actually like to see others who have read (and written in time) their emmc/nand post pics of their "setup." I am not saying any of this to be mean but it derails and is really silly.Okay, i see what you're saying. I guess i was misinformed then. Perhaps, i should revert back to the original plan, a MITM attack. Either that or trying to bit bang for the key and dump it that way....
Anyways, lets see if its possible to get an accurate dump of the nand and flash it back before we try and get any keys...
The original plan is my OP. If you want to do something by yourself then please keep it to yourself. When you mention brute forcing keys and MITM "attacks" that are not possible (0.0000000000000000000000000000000000000000000000000000001% chance to be accurate) it derails the thread and turns some people off as it is obviously not possible. There is nothing complicated about this. Maybe start your own thread about brute forcing keys and MITM attacks. The pictures you posted were good. I'd actually like to see others who have read (and written in time) their emmc/nand post pics of their "setup." I am not saying any of this to be mean but it derails and is really silly.
If anyone has (shares I should say) how to look at what is in the reads then that would be great. If it could ever be like the 360 or Wii then that would be a win in my mind. If you can contribute within the scope of the OP then please do so. It seemed like you were on your way (from your pictures). Otherwise, there is no team, there is no plan to "hack." This is simply about using a hardware angle to get some safety and MAYBE flexibility if people could revert.
Every time someone talks about bruteforcing an AES key on GBAtemp, Schneier kills a kitten.
Please think of the kittens.
Okay fair enough . I'll keep the key stuff out of the discussion. Lets just focus on dumping and reflashing official NAND images. IF I decide to pursue the console specific keys, I will create a brand new thread for that aspect.
Once I get a new power/eject cable, I will attempt to dump my NAND. If the dumping process starts, I will make a quick video of it running. Once that's done, I can attempt to flash it back as we have NOTHING to compare the image to see if it dumped properly. Again, if the console bricks, its not the end of the world. I can get a new console altogether with my tax refund if need be.
I'm willing to sacrifice my current console for this cause. With nothing to compare the NAND image too, the only way to find out if its valid would be to attempt to reflash it.
alright, if someone can shed some light on this for me (yes do my homework for me i guess) I am willing to wipe out my kids Wii U (they don't play it, much anyway) and I would like to delete all data from it, is there a factory restore option? I would be willing to share with those who are qualified (ie - actual Devs, meaning if you have no idea what to do with it, it's not for you) to try and minimize the effect of it being seen and my serial being blacklisted or worse yet getting a letter from someone telling me to stop being mean to their console. Time frame? Don't know, sometime in the next week. I downloaded most of the games on my unit, I have 2 64GB memsticks in it as well holding downloaded games, and they are pretty full as well. This has been the main reason for not f-ing with it, as thats a bit of cash in DL's I don't want to lose, let alone I will have to re-download some, if not all.
It's a 32GB unit purchased last Sept / October time frame, came with a 4.x firmware if I recall. Would love to know if that original firmware is still in there, also can anyone tell me sizes to look for and will HxD allow me to to do chip/partition select (worse case I stick a toggle switch on it with pull up and pull down and just manually select if we are just blind reading..) ? I am used to doing a straight JTAG or SPI to dump, the card reader approach seemed to work, but I did get multiple diff file sizes on all of my attempts. I am extending my hand to whoever wants to work on this --- is it possible (and again I mean no offense) to move this out of the daylight for a minute? We should know relatively fast whether or not a straight dump (a good one) and reflashing will work. But I will say its not worth going it alone, and not worth having someone blow smoke up my tush either --
The chips controller is an 8051 microcontroller, which if you look will see it was hacked to pieces long ago, I think it was actually used in some early CAMs / Smart cards back in the day.