Nope no wayGot a friend's 3DS that's physically dead and they'd want to salvage the saves. Is there any hope?
Just for context, dead 3DS never had mods, but the new target 3DS is modded. Just wanted to know if there's like a save adapter or something.
Thanks!
it seems that the 3DS was modded and he did a NAND backup! what are the tools that we can use for recovery?If you had the movable.sed from a nand backup or that consoles essential.exefs, you could use that movable to decrypt the saves, but since its not modded, you can't do that. IIRC there is a way to get the consoles movable if you have a Mii QR code from a Mii that was made on console A.
sadly he was playing offline all the time as he was scared of a ban going online.Did you or anyone else you guys know ever added your friend's Friend Code to yours or theirs Friend List? If so, there's a very slim chance of recovering his/her Nintendo 3DS folder through SDTransfer methods.
Seems his unneeded scaredness of online has screwed him more than he thought with his console. That friend ID was and is very much needed to get at that data. Without it. his data is a lost cause.it seems that the 3DS was modded and he did a NAND backup! what are the tools that we can use for recovery?
sadly he was playing offline all the time as he was scared of a ban going online.
With the NAND backup, you can open the NAND backup using ninfs (you might also be able to mount it using GodMode9 on a modded 3DS),then you should be able to find movable.sed in /private/. You From there you have a couple options:
- You could likely mount the Nintendo 3DS folder via ninfs, and decrypt it with the movable.sed. From there you can grab and then unpack the 00000001.sav files with 3ds-save-tool.
- You could manually decrypt and unpack the save files with 3ds-save-tool. This would require keys that we are unable to provide.
- You could inject movable.sed into a working console, fix CMACs, run faketik, then make backups via Checkpoint. Make a NAND backup before doing this.
Did you try to mount ctrnand_full with OSFMount on your Windows computer?View attachment 239415
I only have these files after the mount, the essential folder is empty as well. where can i get said movable.sed file from?
That worked! Thank you!Did you try to mount ctrnand_full with OSFMount on your Windows computer?
-snip-
Next would be what's the most user-friendly tool that I can use to transfer this to a different 3DS? 3ds-save-tool seems complicated to me.
Seems that the SDTransfer method is far more complicated than 3ds-save-tool. Are there any tutorials on how to use 3ds-save-tools around, like some examples on how to decrypt and encrypt?Data recoveryRecovering data fromonthe Nintendo 3DS folder is tedious and cumbersomeaffair procedure, but the previously mentioned SDTransfer methodsdoes not involvesdon'tinvolverequire 3ds-save-tool.
Edit- bad grammar.
You're basically a quarter way done in the SDTransfer method when you managed to image mount that SysNAND *.bin and extract the (source) movable.bin. The biggest hurdles are installing the ninfs program, familiarizing yourself in how to use its menu & features, and obtaining that movable.sed with the correct exact 0x10 bytes KeyY.Seems that the SDTransfer method is far more complicated than 3ds-save-tool. Are there any tutorials on how to use 3ds-save-tools around, like some examples on how to decrypt and encrypt?
I think I'm more comfortable with Python and CLI. But I'll try my luck. Thanks all for the info!If the SDTransfer method seems difficult to you, I'm not sure if approaching this from the 3ds-save-tool route would necessarily be better or any easier. As far as I know, there aren't example tutorials on how to use 3ds-save-tool. The type of user who may want to is likely to have a basic grasp about programming and feel right at home entering line codes in Command Prompt (Windows) or Terminal (Linux, Mac).
@reiyu, a bit of warning about modifying the [1:] SYSNAND CTRNAND. You really do need to backup the sysnand beforehand if this is attempted.- You could inject movable.sed into a working console, fix CMACs, run faketik, then make backups via Checkpoint. Make a NAND backup before doing this.