Hacking 3DS Firmware has been decrypted

Status
Not open for further replies.

digipokemaster

Innocent Uke
Member
Joined
Aug 20, 2009
Messages
1,610
Trophies
0
Age
40
Location
USA
XP
457
Country
United States
so what exactly will this decrypted 3ds fw do ? is this the start of playing 3ds games like with ds2 card?

*facepalm*
well im just asking im trying to learn more about why this is a big deal? i dont know all about this area of knowledge. i have never try to hack anything so i have no clue on these thing.
 
  • Like
Reactions: 1 person

digipokemaster

Innocent Uke
Member
Joined
Aug 20, 2009
Messages
1,610
Trophies
0
Age
40
Location
USA
XP
457
Country
United States
  • Like
Reactions: 1 person

RodrigoDavy

Well-Known Member
Member
Joined
Feb 9, 2011
Messages
1,453
Trophies
0
XP
879
Country
Brazil
so what exactly will this decrypted 3ds fw do ? is this the start of playing 3ds games like with ds2 card?

*facepalm*

it does nothing

it just allows us to look into the 3ds internal working
nothing more nothing less

Still more promising than Crown3DS :yaynds: !


Now, seriously... Happy to see some advance, as the 3ds hacking scene seems stopped in time with just fake rumors. We really have to be grateful for Neimod, he seems to be the only one trying anything at all...
 

Mirby

BDFF Hype~ :3
Member
Joined
Feb 9, 2011
Messages
469
Trophies
1
Age
34
Location
That One Place
Website
mirbystudios.tumblr.com
XP
1,252
Country
United States
So forgive me if this is a stupid question, but does this have any bearing on being able to decrypt the 3DS roms? Not to play them, but to inspect the file structure as, if I'm correct in my reading of this thread, you now could with the decrypted firmware?

I mainly want the music like in 3SF files or something like we can do with the DS and 2SF files.

And yes, I made 3SF up, but it sounds like a probable name for this currently hypothetical 3DS sound format.
 

RupeeClock

Colors 3D Snivy!
Member
Joined
May 15, 2008
Messages
6,497
Trophies
1
Age
34
Website
Visit site
XP
2,975
Country
Well good for neimod's research, no use to any of us for the time being.

Things like this can speed up the development of exploits or flashcarts but neimod may not want any of that to happen.
It could lead to DSiWare and 3DS downloads actually being subject to piracy, and seriously, should that happen it could spell doom for the eShop.
 
  • Like
Reactions: 1 person

Sychophantom

I'm a plant.
Member
Joined
Mar 7, 2008
Messages
1,193
Trophies
0
Age
50
Location
Born on the Bayou
XP
637
Country
United States
Well good for neimod's research, no use to any of us for the time being.

Things like this can speed up the development of exploits or flashcarts but neimod may not want any of that to happen.
It could lead to DSiWare and 3DS downloads actually being subject to piracy, and seriously, should that happen it could spell doom for the eShop.

It would put a hurting on it, but doom? Probably not. As widespread as the piracy is on the DS, it's only a fraction of the userbase. I'd imagine that it's quite similar for the 3DS.

It may force Nintendo to update more often, and perhaps do a little better with weekly sales, but it won't kill the eShop.
 

Snailface

My frothing demand for 3ds homebrew is increasing
Member
Joined
Sep 20, 2010
Messages
4,324
Trophies
2
Age
40
Location
Engine Room with Cyan, watching him learn.
XP
2,256
This practically confirms the firmware decryption:
https://github.com/neimod
gallery_262855_65_8464.jpg

Corresponds nicely with the timeline of the pastie. :)

and this of course (firm.c)
Code:
fprintf(stdout, "Entrypoint ARM9: 0x%08X\n", entrypointarm9);
fprintf(stdout, "Entrypoint ARM11: 0x%08X\n", entrypointarm11);

How did this escape our attention for 7 days? :P
 

RupeeClock

Colors 3D Snivy!
Member
Joined
May 15, 2008
Messages
6,497
Trophies
1
Age
34
Website
Visit site
XP
2,975
Country
Well good for neimod's research, no use to any of us for the time being.

Things like this can speed up the development of exploits or flashcarts but neimod may not want any of that to happen.
It could lead to DSiWare and 3DS downloads actually being subject to piracy, and seriously, should that happen it could spell doom for the eShop.

It would put a hurting on it, but doom? Probably not. As widespread as the piracy is on the DS, it's only a fraction of the userbase. I'd imagine that it's quite similar for the 3DS.

It may force Nintendo to update more often, and perhaps do a little better with weekly sales, but it won't kill the eShop.
Think about how WiiWare ended up, WiiWare/eShop is not as large of a market as retail.
Ocarina of Time 3D has over 10000 ratings on the eShop but has sold over a million copies.

Those who see the most benefit of the eShop may be the most likely to know how to pirate, should it happen.

Well, we'd see. I doubt Nintendo is that unsecured like it was on the DS and Wii.
 

Pong20302000

making notes on everything
Member
Joined
Sep 8, 2009
Messages
8,079
Trophies
2
Location
One's inner self
Website
3dsdb.com
XP
2,460
Country
This practically confirms the firmware decryption:
https://github.com/neimod
gallery_262855_65_8464.jpg

Corresponds nicely with the timeline of the pastie. :)

and this of course (firm.c)
Code:
fprintf(stdout, "Entrypoint ARM9: 0x%08X\n", entrypointarm9);
fprintf(stdout, "Entrypoint ARM11: 0x%08X\n", entrypointarm11);

How did this escape our attention for 7 days? :P

pretty sure that was when he dumps the encrypted firmware, not when he decrypted it ;)
 

RodrigoDavy

Well-Known Member
Member
Joined
Feb 9, 2011
Messages
1,453
Trophies
0
XP
879
Country
Brazil
Couldn't the firmware encryption/decryption be used to create custom firmware like the DS had with FlashMe?

EDIT: Maybe at least downgrade the Nintendo original firmware at the 3ds?
 

Pong20302000

making notes on everything
Member
Joined
Sep 8, 2009
Messages
8,079
Trophies
2
Location
One's inner self
Website
3dsdb.com
XP
2,460
Country
Couldn't the firmware encryption/decryption be used to create custom firmware like the DS had with FlashMe?

how would you plan on installing this CFW with no way on installing any firmware
and no 3DS mode exploit to load a file as such either

this allows is us to see how it functions and if there are any loopholes
hence why arm9 needs a beating to check for possibilities
nothing else
 

Cyan

GBATemp's lurking knight
Former Staff
Joined
Oct 27, 2002
Messages
23,749
Trophies
4
Age
46
Location
Engine room, learning
XP
15,662
Country
France
If I remember, the DS didn't had encryption. Flashme patched the firmware to bypassing the AES check to allow launch of unsigned homebrew.

For 3DS, if we can't bypass it, then we need the encryption key, which only Nintendo has. (private key)
Decryption is done with the common key, which is included in the firmware.

Decrypting the firmware only allow browsing files and checking how it's working, but it doesn't allow encryption/custom firmware creation.

Analyzing how the console internals are working is the first step to allow unsigned homebrew, but it doesn't mean it can be done.
It's possible if Nintendo made a mistake, but they can/will update the firmware to fix any flaw.
 
  • Like
Reactions: 1 person

SifJar

Not a pirate
Member
Joined
Apr 4, 2009
Messages
6,022
Trophies
0
Website
Visit site
XP
1,175
Country
Couldn't the firmware encryption/decryption be used to create custom firmware like the DS had with FlashMe?

EDIT: Maybe at least downgrade the Nintendo original firmware at the 3ds?
No. It is just decryption (assuming this is true), not encryption. Therefore you can just inspect it. You can't modify it and re-encrypt & sign it, so the 3DS won't accept the modified version.

EDIT: Beaten.
 
  • Like
Reactions: 1 person

Snailface

My frothing demand for 3ds homebrew is increasing
Member
Joined
Sep 20, 2010
Messages
4,324
Trophies
2
Age
40
Location
Engine Room with Cyan, watching him learn.
XP
2,256
Couldn't the firmware encryption/decryption be used to create custom firmware like the DS had with FlashMe?

how would you plan on installing this CFW with no way on installing any firmware
and no 3DS mode exploit to load a file as such either

this allows is us to see how it functions and if there are any loopholes
hence why arm9 needs a beating to check for possibilities
nothing else
What excites me is the possibility of an emulator. We have to be close to that breakthrough being feasible, right?

Pong, you are this thread's official tech guru. You must have an answer! :P
 
  • Like
Reactions: 2 people

Cyan

GBATemp's lurking knight
Former Staff
Joined
Oct 27, 2002
Messages
23,749
Trophies
4
Age
46
Location
Engine room, learning
XP
15,662
Country
France
So forgive me if this is a stupid question, but does this have any bearing on being able to decrypt the 3DS roms? Not to play them, but to inspect the file structure as, if I'm correct in my reading of this thread, you now could with the decrypted firmware?
I'm also curious about it.

I think the firmware was dump encrypted as a .bin file, then decrypted with ctrtool using the keys found in it by analyzing the RAM. (stop me if I'm wrong).

To decrypt a cartridge content, I guess it would need either:
- Read it's content directly on the consoles (RAM reading). But it would required a full read, there's no way we can command the console to read the game data like a dump tool. we see only the files while they are accessed while playing.

- Decrypt the dumped ROMs. The key should be in the firmware (not in the ROM itself, it would be to easy to hack).
If it's on the firmware, there are a lot of chance that they can be decrypted now that they can check the firmware content.



The more possible hack with only the common key (decryption) is emulation, like said on previous post.
But it still require a lot of analyzing process to see how arm 9 and 11, and the hardware are working.
 
  • Like
Reactions: 1 person

3DSGuy

No longer in scene
Member
Joined
May 22, 2012
Messages
345
Trophies
0
XP
467
Country
United States
So forgive me if this is a stupid question, but does this have any bearing on being able to decrypt the 3DS roms? Not to play them, but to inspect the file structure as, if I'm correct in my reading of this thread, you now could with the decrypted firmware?
I'm also curious about it.

I think the firmware was dump encrypted as a .bin file, then decrypted with ctrtool using the keys found in it by analyzing the RAM. (stop me if I'm wrong).

To decrypt a cartridge content, I guess it would need either:
- Read it's content directly on the consoles (RAM reading). But it would required a full read, there's no way we can command the console to read the game data like a dump tool. we see only the files while they are accessed while playing.

- Decrypt the dumped ROMs. The key should be in the firmware (not in the ROM itself, it would be to easy to hack).
If it's on the firmware, there are a lot of chance that they can be decrypted now that they can check the firmware content.



The more possible hack with only the common key (decryption) is emulation, like said on previous post.
But it still require a lot of analyzing process to see how arm 9 and 11, and the hardware are working.
No I don't think it would work like that. We need more information to clarify, to be sure. There are system titles which are exclusively titled firmware titles. Or Neimod could be referring to the contents of the NAND as the 'firmware'. It's all a bit vague at the moment for me. But I doubt that the NCCH encryption/decryption keys will be in those decrypted dumps. Also ctrtool can only decrypt the contents of NCCH (CXI/CFA) files and the contents of CIA files. Currently it can only read and check RSA signature of Firmware dumps.

But IMO judging from the quoted IRC text, he's just decrypted the 'firmware' titles.
 
Status
Not open for further replies.

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
    sorabora tempBOT: sorabora has joined the room.