3ds XL Nand's dont ever md5 match

Discussion in '3DS - Flashcards & Custom Firmwares' started by ridiucle, Dec 2, 2013.

  1. ridiucle
    OP

    ridiucle Member

    Newcomer
    43
    8
    Nov 29, 2013
    ive made multiple backups of the internal nand and everytime i run them through a md5 checksum the sha*** and md5's never match
     


  2. kyogre123

    kyogre123 Mexican Pride

    Member
    2,919
    1,261
    Sep 23, 2013
    Mexico
  3. Kakkoii

    Kakkoii Old fart

    Member
    621
    282
    Sep 14, 2007
    Canada
    Perhaps time/date flashed is stored in the nand? or an amount flashed count? Some sort of variable. A single byte changed will result in a different checksum.
     
    migles likes this.
  4. json

    json MUSCLEMAN

    Member
    693
    781
    Aug 9, 2013
    Burkina Faso
    I've dumped my NAND via hardware many times, and those dumps didn't match either. Though the dumps are 99% the same, only a few sectors are different. I suspect it is some kind of random seed that gets updated with each boot
     
  5. ridiucle
    OP

    ridiucle Member

    Newcomer
    43
    8
    Nov 29, 2013
    its kinda weird they dont match at hardware level
     
  6. DarkKnigh_t

    DarkKnigh_t GBAtemp Fan

    Member
    409
    55
    Oct 30, 2013
    Croatia
    Zagreb, Croatia
    Whats then stopping us of downgrading 3ds's that didnt make a backup? Can we make some change to the dump to fit other 3dses? Im sorry i dont know i was just wondering
     
  7. Duo8

    Duo8 I don't like video games

    Member
    3,440
    1,140
    Jul 16, 2013
    I think it's the console-specific keys.
     
  8. mathieulh

    mathieulh GBAtemp Fan

    Member
    335
    394
    Feb 28, 2008
    France
    It's the per console NAND key. The whole NAND FS is encrypted with a per console key, so you can't just grab another console's NAND dump and use it on yours, the same way you can't just edit your NAND because it's encrypted and you likely don't have the key unless you dumped it on an exploitable system (4.5.x or older, unless you have another exploit allowing you to run code in the kernel context on newer systems).
     
  9. DarkKnigh_t

    DarkKnigh_t GBAtemp Fan

    Member
    409
    55
    Oct 30, 2013
    Croatia
    Zagreb, Croatia
    That clears up alot of things thank you!
    Well we can only hope that someone can crack the encryption in time and then it might be possible. But i think that we'll have support for 6.3 sooner than this if that will be ever possible
     
  10. Duo8

    Duo8 I don't like video games

    Member
    3,440
    1,140
    Jul 16, 2013
    What do you mean?
    If you meant an exploit for 6.3 then it could be anytime.
    If you meant brute forcing the key then that would take impractically long.
     
    DarkKnigh_t likes this.
  11. DarkKnigh_t

    DarkKnigh_t GBAtemp Fan

    Member
    409
    55
    Oct 30, 2013
    Croatia
    Zagreb, Croatia
    maybe i expressed myself wrong but if the encryption can be broken you could modify the dumps right? and then encrypt them back again using the same algorithm? please correct me if I'm wrong :)
     
  12. Duo8

    Duo8 I don't like video games

    Member
    3,440
    1,140
    Jul 16, 2013
    Only if you can dump the key.
     
    DarkKnigh_t likes this.
  13. mathieulh

    mathieulh GBAtemp Fan

    Member
    335
    394
    Feb 28, 2008
    France
    You can't just "crack" the encryption, it's AES based with a 256bits keyset (key + IV). Good luck with that. If you can't dump your per NAND key, you are out of luck, and if you can dump it, you don't really need to downgrade in the first place.
     
    DarkKnigh_t likes this.
  14. DarkKnigh_t

    DarkKnigh_t GBAtemp Fan

    Member
    409
    55
    Oct 30, 2013
    Croatia
    Zagreb, Croatia
    I get that i know its not a walk in the park. But seeing how the 3ds and the whole scene just exploded lately who knows what the future might bring :)
     
  15. mathieulh

    mathieulh GBAtemp Fan

    Member
    335
    394
    Feb 28, 2008
    France
    It's just not possible, not that way at least. It's like insisting that 2+2 = 5; it leads nowhere.
     
  16. ridiucle
    OP

    ridiucle Member

    Newcomer
    43
    8
    Nov 29, 2013
    its possible only if hackers worked out the algorithm they used to encrypt the files then you can decrypt all nand if they use the same algorithm

    that is basically how the lvl2 in ps3 was hacked they worked out simple algebra encryption method
     
  17. mathieulh

    mathieulh GBAtemp Fan

    Member
    335
    394
    Feb 28, 2008
    France
    Don't talk to me about ps3 hacking (for which you seem to know nothing about btw), for lv2 (not lvl2 btw) people had the key dumped straight off lv2ldr, it was a generic key, not a unique per system key.

    On 3DS you have a per system NAND key, one that is not the same, (as in different) for every single system, you do not have that key unless you have dumped it before from YOUR system. To dump that key, you either need really, really expensive hardware to perform RAM live dumps AND specific sets of exploits + time attacks, or enough exploits to run your own code with kernel privileges and read it out of your 3DS.

    Without the key, you can forget about decrypting your NAND, no matter how well you reversed the encryption algorithm (and by the way, it's been reversed...)
    Do you know how many trillion years it would take for anyone to bruteforce that key ? That's with all the computering power available in the world, and it would still work only on one system.

    Please don't speak about things you have no clue about.
     
    Duo8 likes this.
  18. DarkKnigh_t

    DarkKnigh_t GBAtemp Fan

    Member
    409
    55
    Oct 30, 2013
    Croatia
    Zagreb, Croatia
    It all depends on the hackers and what they think pays off and how long it will take them. That would be an ultimate step forward towards unlocking the 3ds
     
  19. ridiucle
    OP

    ridiucle Member

    Newcomer
    43
    8
    Nov 29, 2013
    so i assume the 3ds uses a public key to access then ? how does the 3ds know how to access ?


    and im only brief on ps3 hacking i have a cfw ps3 and thats about it i know somewhere along the line the ps3 had something that was decrypted with a generic algorithm
     
  20. justinkb

    justinkb GBAtemp Advanced Fan

    Member
    619
    210
    Oct 7, 2012
    Netherlands
    Listen to mathieul... AES with enough key bits (which is the case for the 3DS) is unbreakable if implemented correctly (which it likely is). End of story.