Any software running with the SD+NAND permission enabled can read internal storage (duh) and therefore read your consoleIDReally? How?
Any software running with the SD+NAND permission enabled can read internal storage (duh) and therefore read your consoleIDReally? How?
Right. OK. So I'm basically just waiting for ugopwn to be released (like I was anyway). Great!Any software running with the SD+NAND permission enabled can read internal storage (duh) and therefore read your consoleID
The leaked version works just fineRight. OK. So I'm basically just waiting for ugopwn to be released (like I was anyway). Great!
Take a look at my flag, then reread the release post.The leaked version works just fine
Not sure what your flag has to do with anything.Take a look at my flag, then reread the release post.
Urgh. It says in the release post for ugopwn that EUR and JPN aren't supported and will just crash, and the UK was EUR last time I checked.Not sure what your flag has to do with anything.
find, install, and run the operating system dedicated to unlocking Gateway-bricked 3DSes (which is designed to fully load in memory so then you can remove the card it loads from and connect your console instead), it includes a CID viewer
Disassemble a microSD adapter in the least destructively possible way, connect 4 wires, preferably doing your best to have them of the same length and reasonably short, to CMD, CLK, DAT0, and GND, connect the other end of the first 3 to your console according to the pictures in the OP, connect GND to any metal shield like slot-1Thank you for clearing that part up, but I'm still at a bit of a loss. I'm entirely new to harmodding and don't even know how to about attaching the NAND pinouts to an insertable SD card. If you could explain that, I'd be all set, really.
Disassemble a microSD adapter in the least destructively possible way, connect 4 wires, preferably doing your best to have them of the same length and reasonably short, to CMD, CLK, DAT0, and GND, connect the other end of the first 3 to your console according to the pictures in the OP, connect GND to any metal shield like slot-1
Copy the first line to put into command prompt. There's your CID right there.I dumped my CID with FWTOOL and it gave me a CID.bin
but i don't know what i need to put in the command prompt to decrypt the nand... help
View attachment 94916
Copy the first line to put into command prompt. There's your CID right there.
When I decrypted my NAND, I used this command: twltool nandcrypt --cid 7f3c6cc21a3257373136354d00011500 --consoleid 0820537514114111 --in NAND_0.bin --out NAND_DEC.binwhat of that is the first line? i'm a bit confused xd
When I decrypted my NAND, I used this command: twltool nandcrypt --cid 7f3c6cc21a3257373136354d00011500 --consoleid 0820537514114111 --in NAND_0.bin --out NAND_DEC.bin
Good luck using it for a console that I permanently destroyed.I have your ConsoleID and your CID now I just need your NAND.bin
When I decrypted my NAND, I used this command: twltool nandcrypt --cid 7f3c6cc21a3257373136354d00011500 --consoleid 0820537514114111 --in NAND_0.bin --out NAND_DEC.bin.
Make sure your encrypted NAND file is in the same location with twltool named "NAND_0.bin."so in that case.. i'll need to use the command (i replaced the consoleid with mine and the cid with what you said, copy the first line)
twltool nandcrypt --cid 4D728A1ADD034D303046504100001500 --consoleid 0820190924109135 --in NAND_0.bin --out NAND_DEC.bin.