Hacking Error updating A9LH

Keylogger

Well-Known Member
OP
Member
Joined
May 3, 2006
Messages
2,639
Trophies
1
Age
34
Website
Visit site
XP
6,634
Country
France
Hey

There is a long time since I didn't use my 3DS.
I want to update my A9LH using latest version of SafeA9LHInstaller (v2.6.7-42c09f52

I think I have all the required files on SD card (left all files from my previous installation)
But I can't update because I have this error message:
The OTP hash or the NAND Key sector are invalid.

What I have to do to resolve this?
 

adrifcastr

Well-Known Member
Member
Joined
Sep 12, 2016
Messages
2,038
Trophies
0
XP
1,947
Country
Germany
thanks for correcting me! just goes to show what i know about this:rofl2:
https://gbatemp.net/threads/noob-support-how-arm9loaderhax-luma3ds-works-and-what-it-is.460281/


Neither ARM9LOADERHAX is a CFW it is a persistant (low-level) system exploit, nor Luma3DS is a FW Replacement, it is a Signature Patcher.

1. Bootrom reads FIRM0, but due to our payload presence, the signature check will fail.
2. It will read FIRM1 on top of FIRM0, and our payload will still be after it.
3. Check its RSA signature, since it's good it will jump to its arm9loader.
4. The arm9loader will use our crafted key to decrypt the ARM9 binary as garbage, then jump to the kernel entrypoint.
5. With our key the garbage kernel entrypoint will make the cpu jump to our payload location.
6. Code execution!
arm9loaderhax_1-png.77559
 

APartOfMe

( ͡° ͜ʖ ͡°)
Member
Joined
Jan 4, 2017
Messages
1,247
Trophies
1
Location
Mt. Celeste
XP
2,564
Country
United States
https://gbatemp.net/threads/noob-support-how-arm9loaderhax-luma3ds-works-and-what-it-is.460281/


Neither ARM9LOADERHAX is a CFW it is a persistant (low-level) system exploit, nor Luma3DS is a FW Replacement, it is a Signature Patcher.

1. Bootrom reads FIRM0, but due to our payload presence, the signature check will fail.
2. It will read FIRM1 on top of FIRM0, and our payload will still be after it.
3. Check its RSA signature, since it's good it will jump to its arm9loader.
4. The arm9loader will use our crafted key to decrypt the ARM9 binary as garbage, then jump to the kernel entrypoint.
5. With our key the garbage kernel entrypoint will make the cpu jump to our payload location.
6. Code execution!
arm9loaderhax_1-png.77559
cool! i think smealum has a good walkthrough of the steps also. breaking the 3ds security system
 

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
  • No one is chatting at the moment.
    K3Nv2 @ K3Nv2: https://youtube.com/shorts/WOppJ92RgGU?si=KE79L6A_3jESsGQM