Hacking 6.2.0 released

NeoSnipe

New Member
Newbie
Joined
Nov 20, 2018
Messages
4
Trophies
0
Age
35
XP
59
Country
France
Check out videos on youtube about how to use RCM mode. The black screen is normal, you need to learn the additional steps.

Thanks.

I did that last days, press vol + and power quickly to boot. For you it’s not a problem about this new update ? I should have something on screen ?
 

NeoSnipe

New Member
Newbie
Joined
Nov 20, 2018
Messages
4
Trophies
0
Age
35
XP
59
Country
France
Nop bought it one year ago.

So i found my problem.. forgot to rename in payload.bin

Sorry

--------------------- MERGED ---------------------------

So now i have message after unpackaging os in red :

Error package2 magic invalid

This time it’s the new firmware nintendo who’s block install ?

Thanks again :)
 

Aniblaze

Well-Known Member
Newcomer
Joined
Oct 23, 2009
Messages
75
Trophies
1
XP
508
Country
Netherlands
Please keep us updated!
I'm holding off. Some other people updated their system before me, and had the same setup (SD emuNAND 6.1, OFW 6.2). It works, but as soon as you enter sleep mode on the 6.1 emunand and try to wake up the system, it apparently does a fuse check, forcing a shutdown. So until SX OS fixes that, I'm not updating the system to 6.2 yet. I am running SD emuNAND right now though. It's just that my OFW is still on 6.1 as well.
 

palantine

Well-Known Member
Member
Joined
Oct 5, 2014
Messages
174
Trophies
0
Age
38
XP
593
Country
Italy
The new key generation explained:

The switch has an Nvidia coprocessor ( a second processor) inside of it called the TSEC or Falcon that handles cryptographic operations like AES and verifying signatures. This processor is ordinarily supplied a firmware when the switch boots and then hands over the TSEC key to the boot loader so it can decrypt and load the rest of the firmware.

What was changed in 6.2 is that the TSEC firmware now derives one of the decryption keys internally rather than letting the boot loader do it. This means that despite having full control over the boot process, the derivation of this key now happens secretly where we cannot see it.

I'm looking at the TSEC firmware now to research this process but it may be simply out of our reach unless we can exploit or trick the TSEC into doing what we want or leaking the info. Here is a screenshot I took of reverse engineering the 6.2 TSEC firmware.

Screen Shot 2018-11-20 at 6.47.45 PM.png
 

The_Green_Nerd

Well-Known Member
Newcomer
Joined
Mar 9, 2018
Messages
62
Trophies
0
Age
36
XP
636
Country
Netherlands
Just asking: not using SX-OS atm. But planning to do in the future with emunand. Can I savely update to 6.2.0 and still able to install SX-OS and launch a CFW (don't mind if it's 6.1.0)?
 

palantine

Well-Known Member
Member
Joined
Oct 5, 2014
Messages
174
Trophies
0
Age
38
XP
593
Country
Italy
Just asking: not using SX-OS atm. But planning to do in the future with emunand. Can I savely update to 6.2.0 and still able to install SX-OS and launch a CFW (don't mind if it's 6.1.0)?

I spoke to someone on discord who apparently was running SX emunand on 6.1 and OFW on 6.2. Its just one person but it makes sense that this would work.
 

The_Green_Nerd

Well-Known Member
Newcomer
Joined
Mar 9, 2018
Messages
62
Trophies
0
Age
36
XP
636
Country
Netherlands
I spoke to someone on discord who apparently was running SX emunand on 6.1 and OFW on 6.2. Its just one person but it makes sense that this would work.
yeah, but 6.2 also burns a fuse. So you must start 6.1 always from RCM and sleep mode won't work. And I don't have a NAND back-up atm. Which means I must wait until I got my NAND backed up, before I can update. Or are their other ways around?

Also, if I understand you correctly. Hacking 6.2.0 is gonna be a pain in the butt because decrypting is done within another chip on the SoC?
 

flatty69

Well-Known Member
Newcomer
Joined
Sep 2, 2018
Messages
52
Trophies
0
Age
41
XP
244
Country
Colombia
Just a heads up Dont do this and think your safe i had my switch like this and hit update to see if this did block the update and nope it didnt it update to 6.2 from 6.1 so DONT THINK THIS WILL KEPP YOU SAFE DONT HIT THE UPDATE EVEN IF YOU DID THIS TO YOUR DNS "
  1. Change DNS to Manual.
  2. Set the primary DNS server to 163.172.141.219.
  3. Set the secondary DNS 45.248.48.62.
  4. Press the save button and then B to return to the network list.
  5. EPIC FAILL
 
D

Deleted User

Guest
The new key generation explained:

The switch has an Nvidia coprocessor ( a second processor) inside of it called the TSEC or Falcon that handles cryptographic operations like AES and verifying signatures. This processor is ordinarily supplied a firmware when the switch boots and then hands over the TSEC key to the boot loader so it can decrypt and load the rest of the firmware.

What was changed in 6.2 is that the TSEC firmware now derives one of the decryption keys internally rather than letting the boot loader do it. This means that despite having full control over the boot process, the derivation of this key now happens secretly where we cannot see it.

I'm looking at the TSEC firmware now to research this process but it may be simply out of our reach unless we can exploit or trick the TSEC into doing what we want or leaking the info. Here is a screenshot I took of reverse engineering the 6.2 TSEC firmware.

View attachment 149848

Rip
 

Jordan9716

Active Member
Newcomer
Joined
Nov 9, 2015
Messages
31
Trophies
0
Age
33
XP
118
Country
United States
The new key generation explained:

The switch has an Nvidia coprocessor ( a second processor) inside of it called the TSEC or Falcon that handles cryptographic operations like AES and verifying signatures. This processor is ordinarily supplied a firmware when the switch boots and then hands over the TSEC key to the boot loader so it can decrypt and load the rest of the firmware.

What was changed in 6.2 is that the TSEC firmware now derives one of the decryption keys internally rather than letting the boot loader do it. This means that despite having full control over the boot process, the derivation of this key now happens secretly where we cannot see it.

I'm looking at the TSEC firmware now to research this process but it may be simply out of our reach unless we can exploit or trick the TSEC into doing what we want or leaking the info. Here is a screenshot I took of reverse engineering the 6.2 TSEC firmware.

View attachment 149848

God speed man. Best of luck cracking it!

--------------------- MERGED ---------------------------

Just a heads up Dont do this and think your safe i had my switch like this and hit update to see if this did block the update and nope it didnt it update to 6.2 from 6.1 so DONT THINK THIS WILL KEPP YOU SAFE DONT HIT THE UPDATE EVEN IF YOU DID THIS TO YOUR DNS "
  1. Change DNS to Manual.
  2. Set the primary DNS server to 163.172.141.219.
  3. Set the secondary DNS 45.248.48.62.
  4. Press the save button and then B to return to the network list.
  5. EPIC FAILL

Same thing happened to me man :/ I was in CFW, I really hate myself for getting careless like this.
 

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
    K3Nv2 @ K3Nv2: https://youtube.com/shorts/WOppJ92RgGU?si=KE79L6A_3jESsGQM