Hacking [Dev] Wii U File System

piratesephiroth

I wish I could read
Member
Joined
Sep 5, 2013
Messages
3,453
Trophies
2
Age
103
XP
3,233
Country
Brazil
even with the file browser though.. we still don't know how the wii u signs and installs the titles
I don't think that's relevant for us since the system also provides installation commands (as used by wupinstaller).
Plus even if we knew exactly how it worked we'd still need signed tickets.

If we're gonna use a hacked system there's really no particular reason to dig too deep into that (other than some morbid curiosity).

I'd be content with a native Wi U app that allows me to manipulate the files in the SD card and USB device. Like the current PC tools do, only way faster.
 
Last edited by piratesephiroth,

jam1garner

Well-Known Member
Newcomer
Joined
Apr 7, 2016
Messages
99
Trophies
0
Age
33
XP
382
Country
United States
Here's some scripts for decrypting your USB drive btw. You'll need to make a raw image of the drive yourself (just use a hex editor, open the drive and dump to a file or recode this yourself in C to just write it back over the drive itself)
https://drive.google.com/open?id=0B0ChF7ulI6o6alJJSTAzSzNmMWc

Kinda lazily made tbh but I just wanted to do some research on the format myself to mess around. It'll also print out some keys for you so you don't have to decrpyt them yourself. Requires PyCrypto.
Have these files in the same folder then just run it:
otp.bin
seeprom.bin
encryptedDrive.bin (or decryptedDrive.bin for if you are using the encrypting script)

hope that helps you, I don't really plan on doing any more work on it myself and don't have enough substance in my notes to be worth releasing. Do whatever you want with these script idc
 

PhusionDev

Member
OP
Newcomer
Joined
Dec 27, 2016
Messages
13
Trophies
0
Age
36
XP
106
Country
United States
Here's some scripts for decrypting your USB drive btw. You'll need to make a raw image of the drive yourself (just use a hex editor, open the drive and dump to a file or recode this yourself in C to just write it back over the drive itself)
https://drive.google.com/open?id=0B0ChF7ulI6o6alJJSTAzSzNmMWc

Kinda lazily made tbh but I just wanted to do some research on the format myself to mess around. It'll also print out some keys for you so you don't have to decrpyt them yourself. Requires PyCrypto.
Have these files in the same folder then just run it:
otp.bin
seeprom.bin
encryptedDrive.bin (or decryptedDrive.bin for if you are using the encrypting script)

hope that helps you, I don't really plan on doing any more work on it myself and don't have enough substance in my notes to be worth releasing. Do whatever you want with these script idc

Thanks for this, I have my drive decrypted and I've been taking notes myself as well but I'll try your utility out. I've taken a few dumps of my drive:
1.) Freshly Zero'd and then freshly formatted by the Wii U
2.) Remounted and Installed Virtual Console NES Title (Super Mario Bros)
3.) Remounted Only (nothing else changed)

I'm running comparisons of each dump and taking down notes that I find interesting. Everything is way too early at this point to be considered conclusive, but I am noticing a few patterns of data worth paying attention to that may end up explaining the FS. If you wouldn't mind sharing your notes in a PM I would love to see what you've discovered.
 

helladamnleet

Member
Newcomer
Joined
May 6, 2016
Messages
19
Trophies
0
Age
32
XP
66
Country
United States
Godspeed, PhusionDev. The entire bane of my Wii U experience is not wanting to drop money on a huge SD card just for moving install files, plus cracking the file system is a step closer to being able to use, say, NTFS.
 

jam1garner

Well-Known Member
Newcomer
Joined
Apr 7, 2016
Messages
99
Trophies
0
Age
33
XP
382
Country
United States
Thanks for this, I have my drive decrypted and I've been taking notes myself as well but I'll try your utility out. I've taken a few dumps of my drive:
1.) Freshly Zero'd and then freshly formatted by the Wii U
2.) Remounted and Installed Virtual Console NES Title (Super Mario Bros)
3.) Remounted Only (nothing else changed)

I'm running comparisons of each dump and taking down notes that I find interesting. Everything is way too early at this point to be considered conclusive, but I am noticing a few patterns of data worth paying attention to that may end up explaining the FS. If you wouldn't mind sharing your notes in a PM I would love to see what you've discovered.
Ehhh my notes are mostly just things I noticed specifically about my dump, just offsets and stuff I noticed. Only major thing I could really help you out with is that one thing I noticed is that every first 0x10 bytes of any given file appear to be encrypted (I don't know where the key is so I can't help you much there). Personally I lost interest in the file system after a while due to some of my other projects consuming my time + with FAT32 support on the way for USB drives in mocha I see absolutely no reason to pursue anything related to modifying USB contents.
 
  • Like
Reactions: PhusionDev

GorGylka

Well-Known Member
Newcomer
Joined
May 3, 2016
Messages
53
Trophies
0
Age
27
XP
620
Country
Serbia, Republic of
Have these files in the same folder then just run it:
otp.bin
seeprom.bin
encryptedDrive.bin (or decryptedDrive.bin for if you are using the encrypting script)

hope that helps you
so actually i get message "finished decrypting USB key!" and aslo decryptedDrive.bin size about 0KB. what i doing wrong?
 

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
    Psionic Roshambo @ Psionic Roshambo: https://www.youtube.com/watch?v=pkYA4rALqEE