Hacking MH3 Wii U Packet Relayer tool channel dumped.

Eleazan

New Member
Newbie
Joined
Jun 4, 2014
Messages
1
Trophies
0
Age
36
XP
48
Country
Quick research from header's get:

From GET path: 0005000010133600/0000000B
The first, it's TitleId: 0005000010133600
And the second, the contentId: 0000000B

Because, if u set a title that exists, but a wrong content, they show's a 404 and not 401:

Ex: http://ccs.cdn.wup.shop.nintendo.net/ccs/download/0005000010134200/0000000F

And the tool maybe has more content (Try 0000000C, 000000D, 000000F...) ¿when download thats?
 

TUWieZ

Well-Known Member
OP
Newcomer
Joined
Apr 17, 2014
Messages
83
Trophies
0
Age
27
XP
380
Country
United States
Quick research from header's get:

From GET path: 0005000010133600/0000000B
The first, it's TitleId: 0005000010133600
And the second, the contentId: 0000000B

Because, if u set a title that exists, but a wrong content, they show's a 404 and not 401:

Ex: http://ccs.cdn.wup.shop.nintendo.net/ccs/download/0005000010134200/0000000F

And the tool maybe has more content (Try 0000000C, 000000D, 000000F...) ¿when download thats?

Headers with other letters are found in 0000000B, it's a rip of the full download. I don't know much about the encryption of the file but I'm sure they're all in there. As you've seen the header, do a quick Ctrl F for 0000000 (Without a letter ID) and you'll most definitely find the rest of the content( 0000000C, 000000D, 000000F... or whatever letters apply to the rest of the download) . As I said before, "File B" Seems to be a full dump, as Wii u data management says the Packet Relayer is 92.5mb, the same size as the file I uploaded named 0000000B. I simply named the RAW files based on the headers of the TCP streams.
 

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
  • No one is chatting at the moment.
    I @ idonthave: :)