Hacking Hack 3DS by Memory Dump?

Kirito-kun

Disciple of GabeN
OP
Banned
Joined
Jul 23, 2013
Messages
290
Trophies
0
Location
22nd Floor
XP
165
Country
Canada
Has anyone thought about uncovering the system encryption's private key by performing a memory dump? The private key has to exist in the system's memory at some point, if it's being used. A memdump will allow the privkey to be accessed while encrypted.

nintendo_3DS_teardown3.jpg


The original RAM chip can be removed and a reversed engineered version of the chip that allows interface with a PC can be attached in it's place. After connecting the modified RAM chip to a PC, we can scan system memory until we find the key.

Once you have they key, you'll be able to run any code you want on the system. The storage NAND is a separate chip on the PCB, so replacing the RAM shouldn't effect it. This seems like a possible method to hack the system.

Anyone thought about trying?
 
  • Like
Reactions: Margen67

ZhangYang

Member
Newcomer
Joined
Jun 7, 2012
Messages
9
Trophies
0
XP
24
So... Why is 3DS homebrew still at such a primitive stage? Are they having trouble finding the keys from the memory dumps?

*I am not sure about this but I'll answer this using stuff I read*
Basically, it's somewhere in the ram but we don't know where it is. The ram is encrypted, and we need something to decrypt that.
EDIT:
You shouldn't use logic with hacking, because it doesn't usually work out.
 

evandixon

PMD Researcher
Developer
Joined
May 29, 2009
Messages
1,725
Trophies
1
Website
projectpokemon.org
XP
2,337
Country
United States
Only the common key would be in memory, and if I remember correctly, it's only there for an instant, making it super hard to find (there's probably some other obstacle too).

[edit] Ninja'd by ZhangYang. I don't get this kind of thing at my usual forum... Oh well, this is bigger.
 

redact

‮҉
Member
Joined
Dec 2, 2007
Messages
3,161
Trophies
0
Location
-
XP
674
Country
Mauritania
there is a different key used to sign content than there is to confirm that it is correctly signed.
the 3ds would not have the signing key stored anywhere because it doesn't need it
 
  • Like
Reactions: pelago

Kirito-kun

Disciple of GabeN
OP
Banned
Joined
Jul 23, 2013
Messages
290
Trophies
0
Location
22nd Floor
XP
165
Country
Canada
there is a different key used to sign content than there is to confirm that it is correctly signed.
the 3ds would not have the signing key stored anywhere because it doesn't need it


We don't need the signing key right now. As long as you crack the FS encryption private key, you'll have access to the FS. This will make it much easier to run code on the system, including code which remove the need to sign games.
 
  • Like
Reactions: Margen67

Coto

-
Member
Joined
Jun 4, 2010
Messages
2,979
Trophies
2
XP
2,565
Country
Chile
but ARM11 features XN (execute never) bit, that will throw an exception if the code jumps to an area with XN's set to 1 (and cannot be set to 0 without kernel access.. see user mode or privileged, but some guys already reached that point..)
 

Snailface

My frothing demand for 3ds homebrew is increasing
Member
Joined
Sep 20, 2010
Messages
4,324
Trophies
2
Age
40
Location
Engine Room with Cyan, watching him learn.
XP
2,256
So... Why is 3DS homebrew still at such a primitive stage? Are they having trouble finding the keys from the memory dumps?
3ds homebrew is not at a primitive stage for yellows8 and neimod. They have full kernel control on firmware 4.5.

It really seems like you have missed the last 2.5 years of 3ds hacking and are now just waking up to make useless and simplistic generalizations about 3ds security.
 

WhiteMaze

Well-Known Member
Member
Joined
Jun 16, 2013
Messages
1,085
Trophies
2
Age
32
XP
2,211
Country
Portugal
3ds homebrew is not at a primitive stage for yellows8 and neimod. They have full kernel control on firmware 4.5.

It really seems like you have missed the last 2.5 years of 3ds hacking and are now just waking up to make useless and simplistic generalizations about 3ds security.

Wow. Easy there.

I think we all understood what he meant by that.
 
  • Like
Reactions: Celice

Ericthegreat

Not New Member
Member
Joined
Nov 8, 2008
Messages
3,455
Trophies
2
Location
Vana'diel
XP
4,294
Country
United States
The real question is what happened to the pics that people donated 2k for, I would think they would make them public if they had them.... Not nice to get people to donate for them and not share....

Edit: So this hasnt been done due to $300....
 
  • Like
Reactions: Margen67

3DSGuy

No longer in scene
Member
Joined
May 22, 2012
Messages
345
Trophies
0
XP
467
Country
United States
So... Why is 3DS homebrew still at such a primitive stage? Are they having trouble finding the keys from the memory dumps?
The keys are never actually in the RAM. All AES keys except decrypted Title keys, are never stored in their "final" form, instead the key is descrambled by a hardware AES engine embedded in the SoC, when it is required for decrypting something.
We don't need the signing key right now. As long as you crack the FS encryption private key, you'll have access to the FS. This will make it much easier to run code on the system, including code which remove the need to sign games.
Signature checks are done by the bootldr to verify the FW stored in the NAND. So yes, you do need the signing key.
 
  • Like
Reactions: DSoryu and pelago

muskieratboi

Rydian's got some competition!
Member
Joined
Sep 19, 2012
Messages
423
Trophies
1
XP
436
Country
if the data in the memory,can be dump very easy!


Getting Data? Very Easy!

DECRYPTING that Data? Nigh-Impossible, without some kind of exploit, which is exactly what we've been looking for all these years.

RE-ENCRYPTING It to actually execute the data (barring unsigned code execution which could require another exploit entirely) without access to the private key? Nope.
 

WhiteMaze

Well-Known Member
Member
Joined
Jun 16, 2013
Messages
1,085
Trophies
2
Age
32
XP
2,211
Country
Portugal
Getting Data? Very Easy!

DECRYPTING that Data? Nigh-Impossible, without some kind of exploit, which is exactly what we've been looking for all these years.

RE-ENCRYPTING It to actually execute the data (barring unsigned code execution which could require another exploit entirely) without access to the private key? Nope.

Not that I wan't to cause any flaming, and neither am I trying to offend anyone here. I know these things can be quite complicated and very hard to achieve.

But that is exactly the kind of "thinking" that if the Gateway team had done, we would not have a cart that can play 3DS roms today..
 

muskieratboi

Rydian's got some competition!
Member
Joined
Sep 19, 2012
Messages
423
Trophies
1
XP
436
Country
Not that I wan't to cause any flaming, and neither am I trying to offend anyone here. I know these things can be quite complicated and very hard to achieve.

But that is exactly the kind of "thinking" that if the Gateway team had done, we would not have a cart that can play 3DS roms today..


The difference is that the Gateway team (apparrently, since we STILL have yet to see the physical cartridge itself in the wild) know what the heck they are doing, and this found said unsigned code execution exploit.

In other words, Read Rydian's thread, namely this:



"Why not look into the 3DS and find the key?"
  • The key to sign things is not in the 3DS. The 3DS has a "common/public" key which is used to decrypt things and check signatures. Only Nintendo has the "secret/private" key/data needed to sign things. See here or here for the basic idea of how asymmetric encryption works.
 
  • Like
Reactions: WhiteMaze

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
  • No one is chatting at the moment.
    Veho @ Veho: https://i.imgur.com/bG1pQld.mp4 +1