Hacking 3ds XL Nand's dont ever md5 match

ridiucle

Active Member
OP
Newcomer
Joined
Nov 29, 2013
Messages
43
Trophies
0
Age
33
XP
95
Country
ive made multiple backups of the internal nand and everytime i run them through a md5 checksum the sha*** and md5's never match
 

Kakkoii

Old fart
Member
Joined
Sep 14, 2007
Messages
631
Trophies
0
XP
586
Country
Canada
Perhaps time/date flashed is stored in the nand? or an amount flashed count? Some sort of variable. A single byte changed will result in a different checksum.
 
  • Like
Reactions: migles
D

Deleted User

Guest
I've dumped my NAND via hardware many times, and those dumps didn't match either. Though the dumps are 99% the same, only a few sectors are different. I suspect it is some kind of random seed that gets updated with each boot
 

ridiucle

Active Member
OP
Newcomer
Joined
Nov 29, 2013
Messages
43
Trophies
0
Age
33
XP
95
Country
I've dumped my NAND via hardware many times, and those dumps didn't match either. Though the dumps are 99% the same, only a few sectors are different. I suspect it is some kind of random seed that gets updated with each boot
its kinda weird they dont match at hardware level
 

DarkKnigh_t

Well-Known Member
Member
Joined
Oct 30, 2013
Messages
409
Trophies
0
Location
Zagreb, Croatia
XP
180
Country
Croatia
Whats then stopping us of downgrading 3ds's that didnt make a backup? Can we make some change to the dump to fit other 3dses? Im sorry i dont know i was just wondering
 

mathieulh

Well-Known Member
Member
Joined
Feb 28, 2008
Messages
378
Trophies
0
Website
keybase.io
XP
897
Country
France
Whats then stopping us of downgrading 3ds's that didnt make a backup? Can we make some change to the dump to fit other 3dses? Im sorry i dont know i was just wondering

It's the per console NAND key. The whole NAND FS is encrypted with a per console key, so you can't just grab another console's NAND dump and use it on yours, the same way you can't just edit your NAND because it's encrypted and you likely don't have the key unless you dumped it on an exploitable system (4.5.x or older, unless you have another exploit allowing you to run code in the kernel context on newer systems).
 

DarkKnigh_t

Well-Known Member
Member
Joined
Oct 30, 2013
Messages
409
Trophies
0
Location
Zagreb, Croatia
XP
180
Country
Croatia
That clears up alot of things thank you!
Well we can only hope that someone can crack the encryption in time and then it might be possible. But i think that we'll have support for 6.3 sooner than this if that will be ever possible
 

Duo8

Well-Known Member
Member
Joined
Jul 16, 2013
Messages
3,613
Trophies
2
XP
3,024
Country
Vietnam
That clears up alot of things thank you!
Well we can only hope that someone can crack the encryption in time and then it might be possible. But i think that we'll have support for 6.3 sooner than this if that will be ever possible

What do you mean?
If you meant an exploit for 6.3 then it could be anytime.
If you meant brute forcing the key then that would take impractically long.
 
  • Like
Reactions: DarkKnigh_t

mathieulh

Well-Known Member
Member
Joined
Feb 28, 2008
Messages
378
Trophies
0
Website
keybase.io
XP
897
Country
France
maybe i expressed myself wrong but if the encryption can be broken you could modify the dumps right? and then encrypt them back again using the same algorithm? please correct me if I'm wrong :)

You can't just "crack" the encryption, it's AES based with a 256bits keyset (key + IV). Good luck with that. If you can't dump your per NAND key, you are out of luck, and if you can dump it, you don't really need to downgrade in the first place.
 
  • Like
Reactions: DarkKnigh_t

DarkKnigh_t

Well-Known Member
Member
Joined
Oct 30, 2013
Messages
409
Trophies
0
Location
Zagreb, Croatia
XP
180
Country
Croatia
You can't just "crack" the encryption, it's AES based with a 256bits keyset (key + IV). Good luck with that. If you can't dump your per NAND key, you are out of luck, and if you can dump it, you don't really need to downgrade in the first place.

I get that i know its not a walk in the park. But seeing how the 3ds and the whole scene just exploded lately who knows what the future might bring :)
 

ridiucle

Active Member
OP
Newcomer
Joined
Nov 29, 2013
Messages
43
Trophies
0
Age
33
XP
95
Country
It's just not possible, not that way at least. It's like insisting that 2+2 = 5; it leads nowhere.
its possible only if hackers worked out the algorithm they used to encrypt the files then you can decrypt all nand if they use the same algorithm

that is basically how the lvl2 in ps3 was hacked they worked out simple algebra encryption method
 

mathieulh

Well-Known Member
Member
Joined
Feb 28, 2008
Messages
378
Trophies
0
Website
keybase.io
XP
897
Country
France
its possible only if hackers worked out the algorithm they used to encrypt the files then you can decrypt all nand if they use the same algorithm

that is basically how the lvl2 in ps3 was hacked they worked out simple algebra encryption method

Don't talk to me about ps3 hacking (for which you seem to know nothing about btw), for lv2 (not lvl2 btw) people had the key dumped straight off lv2ldr, it was a generic key, not a unique per system key.

On 3DS you have a per system NAND key, one that is not the same, (as in different) for every single system, you do not have that key unless you have dumped it before from YOUR system. To dump that key, you either need really, really expensive hardware to perform RAM live dumps AND specific sets of exploits + time attacks, or enough exploits to run your own code with kernel privileges and read it out of your 3DS.

Without the key, you can forget about decrypting your NAND, no matter how well you reversed the encryption algorithm (and by the way, it's been reversed...)
Do you know how many trillion years it would take for anyone to bruteforce that key ? That's with all the computering power available in the world, and it would still work only on one system.

Please don't speak about things you have no clue about.
 
  • Like
Reactions: Duo8

DarkKnigh_t

Well-Known Member
Member
Joined
Oct 30, 2013
Messages
409
Trophies
0
Location
Zagreb, Croatia
XP
180
Country
Croatia
its possible only if hackers worked out the algorithm they used to encrypt the files then you can decrypt all nand if they use the same algorithm

that is basically how the lvl2 in ps3 was hacked they worked out simple algebra encryption method

It all depends on the hackers and what they think pays off and how long it will take them. That would be an ultimate step forward towards unlocking the 3ds
 

ridiucle

Active Member
OP
Newcomer
Joined
Nov 29, 2013
Messages
43
Trophies
0
Age
33
XP
95
Country
Don't talk to me about ps3 hacking (for which you seem to know nothing about btw), for lv2 (not lvl2 btw) people had the key dumped straight off lv2ldr, it was a generic key, not a unique per system key.

On 3DS you have a per system NAND key, one that is not the same, (as in different) for every single system, you do not have that key unless you have dumped it before from YOUR system. To dump that key, you either need really, really expensive hardware to perform RAM live dumps AND specific sets of exploits + time attacks, or enough exploits to run your own code with kernel privileges and read it out of your 3DS.

Without the key, you can forget about decrypting your NAND, no matter how well you reversed the encryption algorithm (and by the way, it's been reversed...)
Do you know how many trillion years it would take for anyone to bruteforce that key ? That's with all the computering power available in the world, and it would still work only on one system.

Please don't speak about things you have no clue about.
so i assume the 3ds uses a public key to access then ? how does the 3ds know how to access ?


and im only brief on ps3 hacking i have a cfw ps3 and thats about it i know somewhere along the line the ps3 had something that was decrypted with a generic algorithm
 

justinkb

Well-Known Member
Member
Joined
Oct 7, 2012
Messages
625
Trophies
1
XP
347
Country
Netherlands
Listen to mathieul... AES with enough key bits (which is the case for the 3DS) is unbreakable if implemented correctly (which it likely is). End of story.
 

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
    HiradeGirl @ HiradeGirl: :discuss: