Tutorial  Updated

OTP Guide

Full Guide Release!

https://plailect.github.io/OTP/

All regions now supported!

If you appreciate this guide and the work I put into maintaining it, I accept donations through both Bitcoin and PayPal.

If you felt like the guide helped you out then I'd really appreciate it! If I get enough I may buy a 2DS for testing hardware stuff so I don't break another N3DS.

If the guide didn't help you out then I'm really sorry about that :(
 
Last edited by Plailect,

Aurora Wright

Well-Known Member
Member
Joined
Aug 13, 2006
Messages
1,550
Trophies
3
XP
4,532
Country
Italy
You surely did a lot to ensure you were flashing the right things, I think it would be great if you make a tutorial describing your method and your security measures as well :)
After downgrade, dump EmuNAND's FIRM0 and FIRM1 with Decrypt9, and check that the first 0xDB000 bytes have a sha1 of A61412B6C3A7FA1A9F8E9F9945714270356506FF.
Then, when you decrypt ctr.bin, calculate the hash of the first 794.624.000 bytes.
Re-inject it with the 0x4 xorpad, and then re-extract it (with the 0x4 xorpad), and check if the hash is the same.
Where to do this varies in all the different hex editors ^^
 
Last edited by Aurora Wright,
  • Like
Reactions: felipejfc

Plailect

Well-Known Member
OP
Member
Joined
Jan 30, 2016
Messages
546
Trophies
1
XP
1,502
Country
United States
After downgrade, dump EmuNAND's FIRM0 and FIRM1 with Decrypt9, and check that the first 0xDB000 bytes have a sha1 of A61412B6C3A7FA1A9F8E9F9945714270356506FF.
Then, when you decrypt ctr.bin, calculate the hash of the first 794.624.000 bytes.
Re-inject it with the 0x4 xorpad, and then re-extract it (with the 0x4 xorpad), and check if the hash is the same.
Where to do this varies in all the different hex editors ^^
Similar steps will be added in the future.

--------------------- MERGED ---------------------------

Thanks, restoring a backup now. File needs to be called NAND.bin just so everyone knows.



Not sure if we can, I just dumped it three times to make sure it was exactly the same each time. It was. Btw, don't you mean a9f.bin?
Cubic ninja makes OTP.bin, the browser makes a9f.bin
 
  • Like
Reactions: Audioboxer

Audioboxer

Well-Known Member
Member
Joined
Jun 7, 2007
Messages
524
Trophies
0
XP
392
Country
After downgrade, dump EmuNAND's FIRM0 and FIRM1 with Decrypt9, and check that the first 0xDB000 bytes have a sha1 of A61412B6C3A7FA1A9F8E9F9945714270356506FF.
Then, when you decrypt ctr.bin, calculate the hash of the first 794.624.000 bytes.
Re-inject it with the 0x4 xorpad, and then re-extract it (with the 0x4 xorpad), and check if the hash is the same.
Where to do this varies in all the different hex editors ^^
Browser payload is stable and many people had it working fine, but it's still private for now (it will be released soon).

@Plailect released it on the last page. I'm currently restoring my 9.2 NAND.
 

Xenon Hacks

Well-Known Member
Member
Joined
Nov 13, 2014
Messages
7,414
Trophies
1
Age
31
XP
4,698
Country
United States
Where does the data_input directory come from? I.e. where is the archive or repo? And what files go in there, and what do you do with it once it's built?
Now your asking to get spoonfed but dont worry im just as clueless im surprised these people have this amount of patience with us seeing as we are intruding on their super secret hacker turf.
 

mashers

Stubborn ape
Member
Joined
Jun 10, 2015
Messages
3,837
Trophies
0
Age
40
Location
Kongo Jungle
XP
5,084
Country
Now your asking to get spoonfed but dont worry im just as clueless im surprised these people have this amount of patience with us seeing as we are intruding on their super secret hacker turf.
I don't expect to be spoon fed, but a GitHub link would be helpful ;)

Edit - it got posted while I was writing :)
 

mashers

Stubborn ape
Member
Joined
Jun 10, 2015
Messages
3,837
Trophies
0
Age
40
Location
Kongo Jungle
XP
5,084
Country
I had the link for ar9lh but as far as im concerned it's gibberish to me.
Just had a look at the readme. Looks fairly straightforward. I think you just put new3ds10.firm, new3ds90.firm, secret_sector.bin and the otp.bin, run make, and that generates the installer 3dsx. What the installer installs and what you do next isn't clear to me from the readme.
 

Audioboxer

Well-Known Member
Member
Joined
Jun 7, 2007
Messages
524
Trophies
0
XP
392
Country
Don't worry guys, none of you are as stupid as me. I have no idea what to do now that I have my OTP. Trying to figure out arm9loaderhax.bin and Rei.

It's probably a miracle I just downgraded, got OTP and then managed to get back to 9.2 without a hard mod :rofl2:
 
  • Like
Reactions: Xenon Hacks

dark_samus3

Well-Known Member
Member
Joined
May 30, 2015
Messages
2,372
Trophies
0
XP
2,142
Country
United States
Just had a look at the readme. Looks fairly straightforward. I think you just put new3ds10.firm, new3ds90.firm, secret_sector.bin and the otp.bin, run make, and that generates the installer 3dsx. What the installer installs and what you do next isn't clear to me from the readme.
Installer just injects everything into NAND... you get the .3dsx and just run that from *hax on a <9.3 system

EDIT: keep in mind the installer fails to work when compiled in linux, and will also probably fail when compiled from a Mac
 

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
  • No one is chatting at the moment.
    SylverReZ @ SylverReZ: @HiradeGirl, Hi