https://twitter.com/MajorTomVita/status/760595053865820166
Pastebin: http://pastebin.com/pz9FbTet
While we can't directly read game assets with the old Manual method, we can with HENKaku~
Apparently the patch directory works similar to PBOOTs in PSP-land in that anything in it is replaced... including the executable.
So we can run Manual to decrypt the game, then run MolecularShell as the game to read its data from app0: to get anything we want (barring patch data itself, apparently).
This also brings up that HENKaku lets us run unsigned EBOOTs, so if we could theoretically decrypt a game EBOOT, we could do... things. Yes, things.
Pastebin: http://pastebin.com/pz9FbTet
While we can't directly read game assets with the old Manual method, we can with HENKaku~
Apparently the patch directory works similar to PBOOTs in PSP-land in that anything in it is replaced... including the executable.
So we can run Manual to decrypt the game, then run MolecularShell as the game to read its data from app0: to get anything we want (barring patch data itself, apparently).
This also brings up that HENKaku lets us run unsigned EBOOTs, so if we could theoretically decrypt a game EBOOT, we could do... things. Yes, things.
Last edited by dkabot,