Hacking Decrypt emuNAND

nippyn

Well-Known Member
OP
Member
Joined
Jan 4, 2016
Messages
118
Trophies
0
XP
156
Country
hi guys

I was wondering if I am able to dump a decrypted emuNAND file using either rxTools or Decrypt9.

I want to be able to extract the files for a manual system transfer to a region changed console.

I have read the thread that details the process but I wondered if there would be easier ways to do some parts of it now, with updated tools.
 

The Real Jdbye

*is birb*
Member
Joined
Mar 17, 2010
Messages
23,287
Trophies
4
Location
Space
XP
13,845
Country
Norway
hi guys

I was wondering if I am able to dump a decrypted emuNAND file using either rxTools or Decrypt9.

I want to be able to extract the files for a manual system transfer to a region changed console.

I have read the thread that details the process but I wondered if there would be easier ways to do some parts of it now, with updated tools.
I believe Decrypt9 can dump the individual NAND partitions decrypted, using "Partition Dump"
Additionally, it can dump/inject the individual files used for a manual system transfer/region change (SecureInfo_A, movable.sed, ticket.db etc...)
 
Last edited by The Real Jdbye,
  • Like
Reactions: nippyn

nippyn

Well-Known Member
OP
Member
Joined
Jan 4, 2016
Messages
118
Trophies
0
XP
156
Country
I believe Decrypt9 can dump the individual NAND partitions decrypted, using "Partition Dump"
Additionally, it can dump/inject the individual files used for a manual system transfer/region change (SecureInfo_A, movable.sed, ticket.db etc...)
Awesome! Thank you. I'll give it a try.

I guess the file injection doesn't extend to things like Mii Plaza etc?
 
Last edited by nippyn,

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
    Xdqwerty @ Xdqwerty: @SylverReZ, no