Try using godmode9. Select the bin file and see what options it shows.@PabloMK7 how can I generate a FAT16 XORPAD w/ D9WIP? I can't find the option under XORPAD GENERATER OPTIONS.
Which one?Try using godmode9. Select the bin file and see what options it shows.
Nothing with XORPads. I'll look into using the OG D9.NAND.bin
well, perhaps you could just add bytes to the end of the dump just to make its size a multiple of 0x2000 (8192)@PabloMK7 I seem to be having trouble using this tool. I have managed to decrypt my NAND.bin and now have a NAND.fat16.bin file, which after searching with a hex editor does appear to contain traces of CTRaging. However when I try to use the fck.exe to extract the files I get the following error:-
"NAND size is uneven, should be a multiple of 0x2000"
Is there a way to bypass this error?
...Or might there be new/better methods to find traces of CTRaging nowadays? Perhaps a script for Godmode9?
Terrible idea. Then the sig would Ben invalid. And no, this tool is very outdated (you can tell - it uses XORpads), but I don’t really know of a way to find it. I guess your best bet is to decrypt and extract the CTRNAND and search with a hex editor.well, perhaps you could just add bytes to the end of the dump just to make its size a multiple of 0x2000 (8192)
If you searched manually then that's enough.Terrible idea. Then the sig would Ben invalid. And no, this tool is very outdated (you can tell - it uses XORpads), but I don’t really know of a way to find it. I guess your best bet is to decrypt and extract the CTRNAND and search with a hex editor.
I searched manually with a hex editor and found two instances of TitleID 0000980F00000400, but I dont know how to extract them.If you searched manually then that's enough.
That program is closed source, no way to edit it. Send screenshots of where you found those matches showing at least 5 lines upwards and downwardsI searched manually with a hex editor and found two instances of TitleID 000400000F980000, but I dont know how to extract them.
Is it possible to modify the fck.exe so it skips decrypting/verifying the NAND.bin, and simply searches and extracts any relevant files?
Or perhaps searching for leftovers of CTRaging is something that could be added to Godmode9 @d0k3?
He can use thisThat program is closed source, no way to edit it. Send screenshots of where you found those matches showing at least 5 lines upwards and downwards
But as far as I know anyone can write scripts for Godmode9? Also the source code is available on the github:-That program is closed source, no way to edit it. Send screenshots of where you found those matches showing at least 5 lines upwards and downwards
Thanks but unfortunately I just get the error:-
You have only shown the lines below, "show 5 lines upwards and downwards"Heres a picture of one of the instances:
Apologies, here is a new picture:-You have only shown the lines below, "show 5 lines upwards and downwards"
That's definitely not ctragingApologies, here is a new picture:-
Ok, so since searching for the string using a hex editor isn't 100% reliable, whats the best way for me to search and extract from my other NAND dumps?That's definitely not ctraging
Wait for @zoogie to reply what's the problem with the program.Ok, so since searching for the string using a hex editor isn't 100% reliable, whats the best way for me to search and extract from my other NAND dumps?
The program works for me. It's supposed to have the input file dropped on top of the program exe.Wait for @zoogie to reply what's the problem with the program.