Hacking Scam screen Help

XFlak

Wiitired but still kicking
Member
Joined
Sep 12, 2009
Messages
13,813
Trophies
3
Age
38
Location
Cyprus, originally from Toronto
Website
modmii.github.io
XP
9,802
Country
Cyprus
put the bootmini.elf on your sd card. launch bootmii. use the icon to launch a file from sd card. select the bootmini.elf

just to confirm... the instructions I gave on loading bootmini.elf directly via casper was correct right? Or should I have advised what you said above to begin with?
 

megazig

SU
Member
Joined
Oct 25, 2008
Messages
467
Trophies
0
XP
232
Country
United States
bootmini is a ppc app. casper should be loading an arm piece of code. so you'd use casper to load armboot.bin for bootmii which you use to run bootmini
 
  • Like
Reactions: 1 person

luzpher

Active Member
OP
Newcomer
Joined
Jan 23, 2012
Messages
32
Trophies
0
XP
27
Country
United States
put the bootmini.elf on your sd card. launch bootmii. use the icon to launch a file from sd card. select the bootmini.elf

just to confirm... the instructions I gave on loading bootmini.elf directly via casper was correct right? Or should I have advised what you said above to begin with?
OK, this is what I'm doing: I follow the instruction you posted to launch bootmii via casper, I grab bootmini.elf file from hackmii installer v1.0 on copy it on the root of sd card and I also tried it by coping the entire hackmii installer v1.0 folder in the apps folder, I select the sd icon in bootmii and select bootmini.elf file, Don't know why its not launching the file. I'm thinking Im doing something wrong!
 

WiiGetItDone

Well-Known Member
Newcomer
Joined
Jan 12, 2012
Messages
61
Trophies
1
XP
130
Country
United States
Perhaps it's a stupid suggestion, but have you tried doing an official update then running the Hackmii installer directly from LetterBomb? I have had issues with programs running under the wrong ios when using MMM or failing to load at all.
 

luzpher

Active Member
OP
Newcomer
Joined
Jan 23, 2012
Messages
32
Trophies
0
XP
27
Country
United States
that process sounds correct to me, perhaps try v0.8 of the bootmini.elf file
Dang I think I'm back to square one, I would able to launch bootmini.elf via bootmii but my wii froze on the scam screen. I tried different version of hackmii installer. The only thing I was able to really do with bootmii is get a nand backup, is there any way of seeing what fucked up in my wii by looking at the nand backup?
 

luzpher

Active Member
OP
Newcomer
Joined
Jan 23, 2012
Messages
32
Trophies
0
XP
27
Country
United States
yea, try using giantpune's nandbincheck app on it
I did the nandbincheck, hope someone can find whats messed up in it!! :)
** nandBinCheck : Wii nand info tool **
from giantpune
svn r: 104
built: Jun 5 2011 21:29:38
checking boot1 & 2...
Boot1 B (vulnerable)
found 2 copies of boot2
"blocks 1 & 2: Used for booting; Content Sha1 matches TMD; TMD officially signed; Ticket officially signed; Version 4"
"blocks 7 & 6: Backup copy; Content Sha1 matches TMD; TMD officially signed; Ticket officially signed; Version 4"
checking uid.sys...
checking content.map...
checking "/shared1/00000000.app" ...
checking "/shared1/00000001.app" ...
checking "/shared1/00000002.app" ...
checking "/shared1/00000003.app" ...
checking "/shared1/00000004.app" ...
checking "/shared1/00000005.app" ...
checking "/shared1/00000006.app" ...
checking "/shared1/00000007.app" ...
checking "/shared1/00000008.app" ...
checking "/shared1/00000009.app" ...
checking "/shared1/0000000a.app" ...
checking "/shared1/0000000b.app" ...
checking "/shared1/0000000c.app" ...
checking "/shared1/0000000d.app" ...
checking "/shared1/0000000e.app" ...
checking "/shared1/0000000f.app" ...
checking "/shared1/00000010.app" ...
checking "/shared1/00000011.app" ...
checking "/shared1/00000012.app" ...
checking "/shared1/00000013.app" ...
checking "/shared1/00000014.app" ...
checking "/shared1/00000015.app" ...
checking "/shared1/00000016.app" ...
checking "/shared1/00000017.app" ...
checking "/shared1/00000018.app" ...
checking "/shared1/00000019.app" ...
checking "/shared1/0000001a.app" ...
checking "/shared1/0000001b.app" ...
checking "/shared1/0000001c.app" ...
checking "/shared1/0000001d.app" ...
checking "/shared1/0000001e.app" ...
checking "/shared1/0000001f.app" ...
checking "/shared1/00000020.app" ...
checking "/shared1/00000021.app" ...
checking "/shared1/00000022.app" ...
checking "/shared1/00000023.app" ...
checking "/shared1/00000024.app" ...
checking "/shared1/00000025.app" ...
checking "/shared1/00000026.app" ...
checking "/shared1/00000027.app" ...
checking "/shared1/00000028.app" ...
checking "/shared1/00000029.app" ...
checking "/shared1/0000002a.app" ...
checking "/shared1/0000002b.app" ...
checking "/shared1/0000002c.app" ...
checking "/shared1/0000002d.app" ...
checking "/shared1/0000002e.app" ...
checking "/shared1/0000002f.app" ...
checking "/shared1/00000030.app" ...
checking "/shared1/00000031.app" ...
checking "/shared1/00000032.app" ...
checking "/shared1/00000033.app" ...
checking "/shared1/00000034.app" ...
checking "/shared1/00000035.app" ...
checking "/shared1/00000036.app" ...
checking "/shared1/00000037.app" ...
checking "/shared1/00000038.app" ...
checking "/shared1/00000039.app" ...
checking "/shared1/0000003a.app" ...
checking "/shared1/0000003b.app" ...
checking "/shared1/0000003c.app" ...
checking "/shared1/0000003d.app" ...
checking "/shared1/0000003e.app" ...
checking "/shared1/0000003f.app" ...
checking "/shared1/00000040.app" ...
checking "/shared1/00000041.app" ...
checking "/shared1/00000042.app" ...
checking "/shared1/00000043.app" ...
checking "/shared1/00000044.app" ...
checking "/shared1/00000045.app" ...
checking "/shared1/00000046.app" ...
checking "/shared1/00000047.app" ...
checking "/shared1/00000048.app" ...
checking "/shared1/00000049.app" ...
checking "/shared1/0000004a.app" ...
checking "/shared1/0000004b.app" ...
checking "/shared1/0000004c.app" ...
checking "/shared1/0000004d.app" ...
checking "/shared1/0000004e.app" ...
checking "/shared1/0000004f.app" ...
checking "/shared1/00000050.app" ...
checking "/shared1/00000051.app" ...
checking "/shared1/00000052.app" ...
checking "/shared1/00000053.app" ...
checking "/shared1/00000054.app" ...
checking "/shared1/00000055.app" ...
checking "/shared1/00000056.app" ...
checking "/shared1/00000057.app" ...
checking "/shared1/00000058.app" ...
checking "/shared1/00000059.app" ...
checking "/shared1/0000005a.app" ...
checking "/shared1/0000005b.app" ...
checking "/shared1/0000005c.app" ...
checking "/shared1/0000005d.app" ...
checking "/shared1/0000005e.app" ...
checking "/shared1/0000005f.app" ...
checking "/shared1/00000060.app" ...
checking "/shared1/00000061.app" ...
checking "/shared1/00000062.app" ...
checking "/shared1/00000063.app" ...
checking "/shared1/00000064.app" ...
checking "/shared1/00000065.app" ...
checking "/shared1/00000066.app" ...
checking "/shared1/00000067.app" ...
checking "/shared1/00000068.app" ...
checking "/shared1/00000069.app" ...
checking "/shared1/0000006a.app" ...
checking "/shared1/0000006b.app" ...
checking "/shared1/0000006c.app" ...
checking "/shared1/0000006d.app" ...
checking "/shared1/0000006e.app" ...
checking "/shared1/0000006f.app" ...
checking "/shared1/00000070.app" ...
checking "/shared1/00000071.app" ...
checking "/shared1/00000072.app" ...
checking "/shared1/00000073.app" ...
checking "/shared1/00000074.app" ...
checking "/shared1/00000075.app" ...
checking "/shared1/00000076.app" ...
checking "/shared1/00000077.app" ...
checking "/shared1/00000078.app" ...
checking "/shared1/00000079.app" ...
checking "/shared1/0000007a.app" ...
checking "/shared1/0000007b.app" ...
checking "/shared1/0000007c.app" ...
checking "/shared1/0000007d.app" ...
checking "/shared1/0000007e.app" ...
checking "/shared1/0000007f.app" ...
checking "/shared1/00000080.app" ...
checking "/shared1/00000081.app" ...
checking "/shared1/00000082.app" ...
checking "/shared1/00000083.app" ...
checking "/shared1/00000084.app" ...
checking "/shared1/00000085.app" ...
checking "/shared1/00000086.app" ...
checking "/shared1/00000087.app" ...
checking "/shared1/00000088.app" ...
checking "/shared1/00000089.app" ...
checking "/shared1/0000008a.app" ...
checking "/shared1/0000008b.app" ...
checking "/shared1/0000008c.app" ...
checking "/shared1/0000008d.app" ...
checking "/shared1/0000008e.app" ...
checking "/shared1/0000008f.app" ...
checking "/shared1/00000090.app" ...
checking "/shared1/00000091.app" ...
checking "/shared1/00000092.app" ...
checking "/shared1/00000093.app" ...
found 59 titles installed
Checking 00000001-00000009 ...
Checking 00000001-0000000c ...
Checking 00000001-0000000d ...
Checking 00000001-0000000e ...
Checking 00000001-0000000f ...
Checking 00000001-00000011 ...
Checking 00000001-00000015 ...
Checking 00000001-00000016 ...
Checking 00000001-0000001c ...
Checking 00000001-0000001f ...
Checking 00000001-00000021 ...
Checking 00000001-00000022 ...
Checking 00000001-00000023 ...
Checking 00000001-00000024 ...
Checking 00000001-00000025 ...
Checking 00000001-00000026 ...
Checking 00000001-00000029 ...
Checking 00000001-0000002b ...
Checking 00000001-0000002d ...
Checking 00000001-0000002e ...
Checking 00000001-00000030 ...
Checking 00000001-00000035 ...
Checking 00000001-00000037 ...
Checking 00000001-00000038 ...
Checking 00000001-00000039 ...
Checking 00000001-0000003a ...
Checking 00000001-0000003d ...
Checking 00000001-00000050 ...
Checking 00000001-000000fe ...
ticket fakesigned
tmd fakesigned
error reading one of the private contents "/title/00000001/000000fe/content/00000000.app"
found 28 bootable IOS
Checking 00000001-00000002 ...
Checking 00000001-00000004 ...
Checking 00000001-0000000a ...
Checking 00000001-0000000b ...
Checking 00000001-00000010 ...
Checking 00000001-00000014 ...
Checking 00000001-0000001e ...
Checking 00000001-00000028 ...
Checking 00000001-00000032 ...
Checking 00000001-00000033 ...
Checking 00000001-00000034 ...
Checking 00000001-0000003c ...
Checking 00000001-00000046 ...
Checking 00000001-000000de ...
Checking 00000001-000000df ...
Checking 00000001-000000f9 ...
Checking 00000001-000000fa ...
Checking 00000001-000000fe ...
ticket fakesigned
tmd fakesigned
error reading one of the private contents "/title/00000001/000000fe/content/00000000.app"
Checking 00000001-00000100 ...
Checking 00000001-00000101 ...
Checking 00010001-48414445 (HADE) ...
Checking 00010002-48414141 (HAAA) ...
Checking 00010002-48414241 (HABA) ...
Checking 00010002-48414341 (HACA) ...
Checking 00010002-48414641 (HAFA) ...
Checking 00010002-48414645 (HAFE) ...
Checking 00010002-48414741 (HAGA) ...
Checking 00010002-48414745 (HAGE) ...
Checking 00010002-48415941 (HAYA) ...
Checking 00010008-48414b45 (HAKE) ...
Checking 00010008-48414c45 (HALE) ...
Checking for 003 error ...
Checking setting.txt stuff...
Comparing uid.sys against the filesystem...
00010000-00555044 (.UPD) has been deleted
00010000-525a4445 (RZDE) has been deleted
00010000-52535045 (RSPE) has been deleted
00010001-48414a45 (HAJE) has been deleted
00010001-4a414145 (JAAE) has been deleted
00010001-4e414145 (NAAE) has been deleted
00010001-4a414545 (JAEE) has been deleted
00010000-52423445 (RB4E) has been deleted
00010001-48415745 (HAWE) has been deleted
00010001-50414145 (PAAE) has been deleted
00010001-46435745 (FCWE) has been deleted
00010001-48415045 (HAPE) has been deleted
00010000-524d4745 (RMGE) has been deleted
00010000-48415a41 (HAZA) has been deleted
00010000-48424c45 (HBLE) has been deleted
00010000-48424745 (HBGE) has been deleted
00010000-48424445 (HBDE) has been deleted
00010000-48424345 (HBCE) has been deleted
00010000-48424945 (HBIE) has been deleted
00010000-48424245 (HBBE) has been deleted
00010000-48424145 (HBAE) has been deleted
00010000-48424645 (HBFE) has been deleted
00010000-48413945 (HA9E) has been deleted
00010000-48413845 (HA8E) has been deleted
00010000-48424545 (HBEE) has been deleted
00010001-48415445 (HATE) has been deleted
00010000-52345145 (R4QE) has been deleted
00010000-52475845 (RGXE) has been deleted
00010000-534d4e45 (SMNE) has been deleted
00010001-58484645 (XHFE) has been deleted
00010001-4d435045 (MCPE) has been deleted
00010001-48434c45 (HCLE) has been deleted
00010000-525a5445 (RZTE) has been deleted
checking for lost clusters...
found 0 lost clusters
UNK ( 0xffff ) 4 (4f94, 4f95, 4f96, 4f97)
free 4c84
verifying ecc...
2 out of 837376 pages had incorrect ecc.
they were spread through 2 clusters in 2 blocks:
(2, 6)
0 of those clusters are non-special (they belong to the fs)
verifying hmac...
verifying hmac for 458 files
0 files had bad HMAC data
checking HMAC for superclusters...
hmac bad (1)
supercluster 7fc0
hmac bad (1)
supercluster 7ff0
2 superClusters had bad HMAC data
(32704, 32752)
 

mauifrog

DA KINE WiiHacker
Member
Joined
Jan 21, 2010
Messages
1,587
Trophies
0
Website
Visit site
XP
392
Country
United States
I do not believe this is normal

error reading one of the private contents "/title/00000001/000000fe/content/00000000.app"

It is related to your ios254 which is your bootmii ios. Perhaps something is wrong with your bootmii ios254 and it is crashing hackmii installer. I would try this, get a good wad dump of bootmii ios frim a friend. Put cboot2 files on sd:\. Load wiimod via exloit, then reload ios254, wiimod should reload with ahbprot. Go to advanced, title manager, delete ios254. Then go to the wad manager and install the bootmii ios254 wad. Run hackmii again and hope for better luck. Also while your in wiimod with ahbprot you might as well install all the modmii cios, install priiloader, etc. Then you can have fun and just load your apps from priiloader or postloader. One last thing, you have a vulnerable boot1, so you could try to downgrade ios34 and install hackmii 0.6 and get bootmii installed as boot2 bootmii if hackmii 0.7-1.0 are not working for you, then you could use giantpunes nand.bin formater to build a new nand if you like.


cboot2 is here

bootmii

edit-
even simpler
have modmii's files on sd:\
have exploit
have wiimod dol on sd:\
have cboot2 on sd:\
run exloit, wiimod loads
install modmii wads
delete ios254 under advanced title manager
load priiloader 236 installer from wiimod app manager and install
try hackmii installer 1.0 again.

if hackmii still fails, load wiimod again, downgrade ios34 v3348 should work, via wiimod ios manager -no patches
run the hackmii 0.6 installer and install bootmii as boot2 and if you like old hbc
at this point you can use giantpunes nand.bin formater ohneswanzenegger to format your nand.bin from bootmii and install a fresh system. Restoring this nand.bin with boot2 bootmii should fix any of your issue.

Hopefully removing the ios254 will help, or not.
 
  • Like
Reactions: 1 person

luzpher

Active Member
OP
Newcomer
Joined
Jan 23, 2012
Messages
32
Trophies
0
XP
27
Country
United States
I do not believe this is normal

error reading one of the private contents "/title/00000001/000000fe/content/00000000.app"

It is related to your ios254 which is your bootmii ios. Perhaps something is wrong with your bootmii ios254 and it is crashing hackmii installer. I would try this, get a good wad dump of bootmii ios frim a friend. Put cboot2 files on sd:\. Load wiimod via exloit, then reload ios254, wiimod should reload with ahbprot. Go to advanced, title manager, delete ios254. Then go to the wad manager and install the bootmii ios254 wad. Run hackmii again and hope for better luck. Also while your in wiimod with ahbprot you might as well install all the modmii cios, install priiloader, etc. Then you can have fun and just load your apps from priiloader or postloader. One last thing, you have a vulnerable boot1, so you could try to downgrade ios34 and install hackmii 0.6 and get bootmii installed as boot2 bootmii if hackmii 0.7-1.0 are not working for you, then you could use giantpunes nand.bin formater to build a new nand if you like.


cboot2 is here

bootmii
Whenever I launch wiimod and try to load ios254 my wii freezes, is there a reason why its doing that or I'm I missing a file in the sd card? If I select the option "IOSs" from the main menu of wiimod and select ios254 (colored green) it reads:

Currently selected: IOS254 Version Installed: v65281
Latest: v65280 Latest non-stub: v2

any thoughts why my Wii freezes when I try to reload from the "Change IOS" menu?
 

mauifrog

DA KINE WiiHacker
Member
Joined
Jan 21, 2010
Messages
1,587
Trophies
0
Website
Visit site
XP
392
Country
United States
I do not believe this is normal

error reading one of the private contents "/title/00000001/000000fe/content/00000000.app"

It is related to your ios254 which is your bootmii ios. Perhaps something is wrong with your bootmii ios254 and it is crashing hackmii installer. I would try this, get a good wad dump of bootmii ios frim a friend. Put cboot2 files on sd:\. Load wiimod via exloit, then reload ios254, wiimod should reload with ahbprot. Go to advanced, title manager, delete ios254. Then go to the wad manager and install the bootmii ios254 wad. Run hackmii again and hope for better luck. Also while your in wiimod with ahbprot you might as well install all the modmii cios, install priiloader, etc. Then you can have fun and just load your apps from priiloader or postloader. One last thing, you have a vulnerable boot1, so you could try to downgrade ios34 and install hackmii 0.6 and get bootmii installed as boot2 bootmii if hackmii 0.7-1.0 are not working for you, then you could use giantpunes nand.bin formater to build a new nand if you like.


cboot2 is here

bootmii
Whenever I launch wiimod and try to load ios254 my wii freezes, is there a reason why its doing that or I'm I missing a file in the sd card? If I select the option "IOSs" from the main menu of wiimod and select ios254 (colored green) it reads:

Currently selected: IOS254 Version Installed: v65281
Latest: v65280 Latest non-stub: v2

any thoughts why my Wii freezes when I try to reload from the "Change IOS" menu?
If you have bootmii ios and your bootmii files on sd:\ it should load bootmii. If you have cboot2 files it should load sd:\boot.dol via cboot2. Perhaps you don't have the files on sd:\.

You can also do the same thing by loading some bootmii loading app from the apploader in wiimod, but reloading ios254 should work AFAIK.
 

tueidj

I R Expert
Member
Joined
Jan 8, 2009
Messages
2,569
Trophies
0
Website
Visit site
XP
999
Country
Uh, you realize you're trying to tell him to use his broken IOS254 to fix his broken IOS254? It's the equivalent of telling someone with a broken down car to drive to a mechanic to get it fixed.
 
  • Like
Reactions: 2 people

mauifrog

DA KINE WiiHacker
Member
Joined
Jan 21, 2010
Messages
1,587
Trophies
0
Website
Visit site
XP
392
Country
United States
Uh, you realize you're trying to tell him to use his broken IOS254 to fix his broken IOS254? It's the equivalent of telling someone with a broken down car to drive to a mechanic to get it fixed.
Yes, I realize that. If it fails I suppose he should use casper to load the cboot2.

I have never used casper, but you should be able to load cboot2 the same way you load bootmii with it.
 

luzpher

Active Member
OP
Newcomer
Joined
Jan 23, 2012
Messages
32
Trophies
0
XP
27
Country
United States
I do not believe this is normal

error reading one of the private contents "/title/00000001/000000fe/content/00000000.app"

It is related to your ios254 which is your bootmii ios. Perhaps something is wrong with your bootmii ios254 and it is crashing hackmii installer. I would try this, get a good wad dump of bootmii ios frim a friend. Put cboot2 files on sd:\. Load wiimod via exloit, then reload ios254, wiimod should reload with ahbprot. Go to advanced, title manager, delete ios254. Then go to the wad manager and install the bootmii ios254 wad. Run hackmii again and hope for better luck. Also while your in wiimod with ahbprot you might as well install all the modmii cios, install priiloader, etc. Then you can have fun and just load your apps from priiloader or postloader. One last thing, you have a vulnerable boot1, so you could try to downgrade ios34 and install hackmii 0.6 and get bootmii installed as boot2 bootmii if hackmii 0.7-1.0 are not working for you, then you could use giantpunes nand.bin formater to build a new nand if you like.


cboot2 is here

bootmii
Whenever I launch wiimod and try to load ios254 my wii freezes, is there a reason why its doing that or I'm I missing a file in the sd card? If I select the option "IOSs" from the main menu of wiimod and select ios254 (colored green) it reads:

Currently selected: IOS254 Version Installed: v65281
Latest: v65280 Latest non-stub: v2

any thoughts why my Wii freezes when I try to reload from the "Change IOS" menu?
If you have bootmii ios and your bootmii files on sd:\ it should load bootmii. If you have cboot2 files it should load sd:\boot.dol via cboot2. Perhaps you don't have the files on sd:\.

You can also do the same thing by loading some bootmii loading app from the apploader in wiimod, but reloading ios254 should work AFAIK.
In the root of SD I copied:

cBoot2 files ("bootmii" folder and "startup.elf" file)
wiimod files ("boot.dol", "boot.elf", "icon.png", "meta.xml", "changelog.txt", "database.txt", and "wiimod.txt")
BootMii-IOS254-v31338.wad

*From main menu I select Change IOS
*Then I select ios 254
*Wii feezes.

Heres my Check IOS file:
3 0
IOS version Flash FakeSign ES_Ident Usb2.0 Boot2 NAND sysmenuver
45
254 65281 -1 -1 -1 -1 -1 -1 0
250 65280 -1 -1 -1 -1 -1 -1 0
249 65280 -1 -1 -1 -1 -1 -1 0
223 65280 -1 -1 -1 -1 -1 -1 0
222 65280 -1 -1 -1 -1 -1 -1 0
80 6944 -6 -2011 -1017 -6 -1 -102 513
70 6912 0 -1 -1 -1 -1 -1 0
61 5662 -6 -2011 -1017 -6 -1 -102 513
60 6400 0 -1 -1 -1 -1 -1 0
58 6176 -6 -2011 -1017 -6 -1 -102 513
57 5919 -6 -2011 -1017 -6 -1 -102 513
56 5662 -6 -2011 -1017 -6 -1 -102 513
55 5663 -6 -2011 -1017 -6 -1 -102 513
53 5663 -6 -2011 -1017 -6 -1 -102 513
52 5888 0 -1 -1 -1 -1 -1 0
51 4864 0 -1 -1 -1 -1 -1 0
50 5120 0 -1 -1 -1 -1 -1 0
48 4124 -6 -2011 -1017 -6 -1 -102 513
46 3607 -6 -2011 -1017 -6 -1 -102 513
45 3607 -6 -2011 -1017 -6 -1 -102 513
43 3607 -6 -2011 -1017 -6 -1 -102 513
41 3607 -6 -2011 -1017 -6 -1 -102 513
40 3072 0 -1 -1 -1 -1 -1 0
38 4124 -106 -2011 -1017 -6 -1 -102 513
37 5663 -6 -2011 -1017 -6 -1 -102 513
36 3608 -106 -2011 -1017 -6 -1 -102 513
35 3608 -106 -2011 -1017 -6 -1 -102 513
34 3608 -106 -2011 -1017 -6 -1 -102 513
33 3608 -106 -2011 -1017 -6 -1 -102 513
31 3608 -106 -2011 -1017 -6 -1 -102 513
30 2816 0 -1 -1 -1 -1 -1 0
28 1807 -106 -2011 -1017 -6 -1 -102 513
22 1294 -106 -2011 -1017 -6 -1 -102 0
21 1039 -106 -2011 -1017 -6 -1 -102 0
20 256 0 -1 -1 -1 -1 -1 0
17 1032 -106 -2011 -1017 -6 -1 -102 0
16 512 0 -1 -1 -1 -1 -1 0
15 1032 -106 -2011 -1017 -6 -1 -102 0
14 1032 -106 -2011 -1017 -6 -1 -102 0
13 1032 -106 -2011 -1017 -6 -1 -102 0
12 526 -106 -2011 -1017 -6 -1 -102 0
11 256 0 -1 -1 -1 -1 -1 0
10 768 0 -1 -1 -1 -1 -1 0
9 1034 -106 -2011 -1017 -6 -1 -102 0
4 65280 0 -1 -1 -1 -1 -1 0

BC v6
MIOS v10
Region USA
Hollywood v0x11 Console ID: 37029780
Boot2 v4
System menu 513
System menu v4.3U on IOS80
Found 64 titles of which 45 are IOSs.
Wii Mod v3.0
 

mauifrog

DA KINE WiiHacker
Member
Joined
Jan 21, 2010
Messages
1,587
Trophies
0
Website
Visit site
XP
392
Country
United States
Format the sd card
Put the modmii files on sd:\
Put wiimod files on sd:\
Put casper elf in sd:\apps\casper\ rename it boot.elf
Put cboots \bootmii folder and startup.elf on sd:\
Copy sd:\bootmii\armboot.bin to sd:\
Rename sd:\armboot.bin -> sd:\bootmii_ios.bin
I think;-)

Now run exploit, wiimod loads. Select the app manager and load casper. Casper should load cboot2 which should reload wiimod with ahbprot. Install modmii cios via wadmanager, delete ios254 via title manager, load priiloader installer via app manager and install, try hackmii 1.0 again.

If hackmii 1.0 still fails try 0.6 by downgrading ios34.

If it does not work you may need to mess with the argv of casper. You possibly can load sd:\casper.elf from wiimod. I will give it a test tonight, it should work but I have never used casper, so I could be missing something.
 

mauifrog

DA KINE WiiHacker
Member
Joined
Jan 21, 2010
Messages
1,587
Trophies
0
Website
Visit site
XP
392
Country
United States
why would you use wiimod and cboot2 to load casper? run it directly from the exploit and cut out half of those steps
It depends on the exploit you use, the disc expoits will load the boot.elf, the system menu expoits load the boot.dol before the boot.elf, cboot2 loads the boot.dol, all on sd:\
So if you have sd:\boot.dol and sd:\boot.elf, the system menu exploits will load the boot.dol, the disc exploits will load the boot.elf. We need to load the boot.elf first, casper, then have it load cboot2 and the boot.dol. This is easy from disc exploit, but from system exploit the boot.dol loads first which is wiimod. Simple solution is to only have boot.dol, load wiimod, then load casper to reload it with the ahbprot. At least that is how I see it in my head, that is why. You can hex startup.elf and change boot.dol to something else, like shit.dol or whatever you like, using the apploading in wiimod is simpler, assuming it works.

Assuming it works your casper app is probably the best app ever. Now those no vulnerable 4.3 virgin wiis have hope.
 
  • Like
Reactions: 1 person

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
    S @ salazarcosplay: though if it s important to go online for a game I would much rather buy it