- Joined
- Apr 2, 2011
- Messages
- 11,005
- Trophies
- 1
- Location
- The Twilight Zone
- Website
- www.hacksden.com
- XP
- 4,339
- Country
It means we get a close look at the vWii NAND before a bug-free exploit is found.
I think the wad packer did that.
Look in the file system of the extracted nand: /ticket/00000001/ The tickets are proper there.
Here's a side-by-side: http://i.imgur.com/3K6Ym.png One on the left is from vWii IOS9 after it was WAD'd then unpacked again. Right side is the ticket as seen in the /ticket/00000001/ folder.
That string is in the title key field. It can be pretty much anything you want as long as it fits. Normally it's random hex that N generates when they publish the title, but there's nothing stopping us from putting human-readable characters in there...Makes sense I guess. I am not familiar with ShowMeWads. Though it seems kind of odd to just put whatever you want into a ticket.
Wish it was that easy .Ios 40, 50, 60 is missing in that list. Install one using a proper wad manager and there you have an exploitable ios on your virtual wii or not?
They haven't been able to install any IOS, not even a legitimate one. It would be good to install IOS16.Ios 40, 50, 60 is missing in that list. Install one using a proper wad manager and there you have an exploitable ios on your virtual wii or not?
Good to know...You can save yourself the time of trying to install any IOSs, all vIOSs have error -1017 hardcoded for all IOSs and the system menu within these functions: ES_AddTicket/ES_AddTitleStart/ES_AddContentStart.
How did you make the wads?Nice
You might want to remove the link though...mods removed your old ones and said you can't link to dumps.
In other news, I'm downloading as fast as you're uploading I keep refreshing and watching more rar parts show up
EDIT: Extracted beautifully in NANDEXtract. Not corrupt this time The homemade keys.bin works fine. Thanks Deadly! Let the exploration and experimentation begin!
EDIT2: Here's a shot of a vWii NAND as seen in ShowMiiWads:
HCTE is a new channel we haven't seen yet, either in impersonator or on WiiUBrew. It's the system transfer tool
Thinking same here with the IOS. Wasn't really expecting them to work because the hardware is different.I wouldn't expect the IOS to work even if you could install them. However, I had no trouble packing the SM wad. Try v1.5 Mod.
http://code.google.com/p/showmiiwads-mod/
Open the dump in showmiiwads: Choose Options->Change NAND Backup Path. Select the folder where the extracted dump is. Then just select the titles in the showmiiwads list that you want, right click, and Pack Wad. Choose a folder to save the wads in.
That just made my brain hurtHere's my copy-paste on the whole brute forcing idea, aimed at the DSi.
I present to you: "DSi Encryption Put In Perspective", also known as "I Love Crushing People's Dreams".
The DSi uses 128-bit encryption (IIRC).
How do you break it? You find the correct encryption key.
How many encryption keys are there? 2 (binary, a bit) to the 128th power (number of bits), divided by 8 (8 bits in a byte).
That's so many that the calculator that comes with windows (at least XP) can't even display the number without reverting to scientific notation.
128-bits is...
340,282,366,920,938,463,463,374,607,431,768,211,456 possible values in binary.
However, Since there's 8 bits in a byte, you divide 128 by 8 and get 16. That's 16 bytes, 16 characters.
That's 18,446,744,073,709,552,000 possible values, ranging from 0x0000000000000000 to 0xFFFFFFFFFFFFFFFF. Eighteen quintillion possible keys.
The actual number is a bit less less since a key will be a certain number of digits and be designed to not have repeating segments, but this puts it in perspective.
Let's say that you have a computer program which can try 50,000 unique keys a second.
That's 3,000,000 keys a minute.
180,000,000 keys in an hour.
4,320,000,000 keys a day.
1,576,800,000,000 keys in one year.
It would take 11,698,848 years to try all the keys at that speed.