Views: 1,613,056 | Main | Rules/FAQ | Memberlist | Active users | Last posts | Calendar | Stats | Online users | Search | 12-12-24 05:25 PM |
Guest: |
0 users reading Rebuilding a (fully decrypted) CCI with already available tools? | 1 bot |
Main - Homebrew discussion - Rebuilding a (fully decrypted) CCI with already available tools? | Hide post layouts | New reply |
d0k3 |
| ||
Member Normal user Level: 20 Posts: 60/75 EXP: 38311 Next: 4128 Since: 06-04-15 Last post: 3272 days ago Last view: 3019 days ago |
This may sound like somewhat of a noob question, but I haven't found any way to do this yet, without coding it myself. From looking at the source code, I'm pretty sure Makerom would be capable of it, but there is just no method implemented to actually do it.
So, here's what I want to do: o Start with a fully decrypted CCI (made from a comercial cartridge, then decrypted via Decrypt9). Signatures are all bad at this point, of course. o Reencrypt everything (= all contents) with zerokey crypto (already have figured that out, no problem). o Now, also fix the signatures (target "development keys & certs" in makerom) for each and every content. That's the difficult step. => have a fully working (as in manual and all) zerokey encrypted rom for GW I don't even own a Gateway, just doing this for scientific purposes. In essence, what I'd need is a "zerokey signature fixer". Haven't found anything like that yet, though. The fact that this would only be of any use for GW makes it even less probable something like that exists, too. Any ideas? |
Syphurith |
| ||
Member Normal user Level: 18 Posts: 43/59 EXP: 26171 Next: 3726 Since: 10-26-15 Last post: 3255 days ago Last view: 3205 days ago |
Why would use use a Zero key? For the re-encryption: You can just generate the correct xorpads from decrypted contents.
Just get xorpad of a small file and rebuild it to enlarge its romfs/exefs, and compare this to the one for new file. The begining would be the same. Also there is Zero Key fix, I used that to fix the sh*tty ZeroCrypto that stops the usage for CFWs. -- produces no valid signatures, neither. And, since ZeroKey is now only supported by GW or its fakes.. Unless ZeroKey adjustments are done for CFW, you can have the possibility to run.. However even the signature is valid for a dev unit, it is still invalid for a retail one. So you still need to patch signatures check. Why you need this? Note: There is leaked contents of dev unit keys and certs.. |
d0k3 |
| ||
Member Normal user Level: 20 Posts: 61/75 EXP: 38311 Next: 4128 Since: 06-04-15 Last post: 3272 days ago Last view: 3019 days ago |
I know about all this . I'm doing this for (a) scientific purposes and (b) to help GW users use Decrypt9 better.
From the Makerom source code - I know it is doing something with the signatures for the development target. And in fact, it should generate valid signatures (again, for the development target only). GW actually won't run zerokey encrypted stuff if the signature doesn't match (it won't run unencrypted stuff at all, and for other types of crypto bad sigs are okay). Homebrew .3DS are typically zerokey encrypted, so they must also have good signatures. |
Main - Homebrew discussion - Rebuilding a (fully decrypted) CCI with already available tools? | Hide post layouts | New reply |
Page rendered in 0.017 seconds. (2048KB of memory used) MySQL - queries: 28, rows: 69/69, time: 0.009 seconds. Acmlmboard 2.064 (2018-07-20) © 2005-2008 Acmlm, Xkeeper, blackhole89 et al. |