I decided to do a little probing today of a Wii u formatted USB drive with one game installed on it. First of all I noticed it doesn't actually overwrite everything on the drive, I found traces of a lost+found dir from the ext4 fs that was previously on there. My methods are simple take USB flash drive 8gb let Wii u format it and install a game. Use dd to copy the drive to an image file and then inspect it with a hex editor. First thing I noticed, aside from seeing mention of the lost and found dir and a few files, was that there was a lot of padded spaces with zeros, and the file was obviously huge. So I decided to focus on the first 1mb, there was no strings that I could find that stood out so I assumed what everyone was saying is true that its encrypted. So here is where it gets interesting, using a y cable I tried to hotswap the USB drive. I plugged the power only part to my laptop and the power+data to a Wii u front USB port. I turned on the Wii u and started the game that is on the USB drive. Once started I unplugged the USB y cable that was plugged into the front port and plugged it into my laptop, then dd'd it again. The first chunk of data was the same as the first image, but the second part of the data had changed significantly. That is after the first set of zeros where the second chunk of data began it was completely different than that of the image I took without hotswapping. I tried this several times to make sure it wasn't a fluke and without fail the data always remained the same without hot swapping and it was completely different when I did hotswap. Every time I hotswapped it was always the same as the last time I hotswapped.
So I have a question: did the data get decrypted?
Now I only looked at the first 1mb, I plan on zeroing out the drive and doing more research tomorrow but I am wondering if a softmod may be completely unneeded if we are able to inject dumps right into the USB drive by hotswapping.
I know I am a new member here and might get flamed for posting this, but I need some insight from those with more console hacking experience than me. Tell me what I am missing and maybe what is actually going here?
So I have a question: did the data get decrypted?
Now I only looked at the first 1mb, I plan on zeroing out the drive and doing more research tomorrow but I am wondering if a softmod may be completely unneeded if we are able to inject dumps right into the USB drive by hotswapping.
I know I am a new member here and might get flamed for posting this, but I need some insight from those with more console hacking experience than me. Tell me what I am missing and maybe what is actually going here?