A9VG电玩部落论坛

 找回密码
 注册
搜索
查看: 4042|回复: 12

[破解] [破解]另一个cIOS应用:xyzzy-1.0,获取你机器的key[11楼更新9562大大厚道的翻译和

[复制链接]
aim

精华
2
帖子
5433
威望
7 点
积分
6041 点
种子
5 点
注册时间
2005-7-12
最后登录
2020-11-17
 楼主| 发表于 2008-7-23 11:20  ·  广东 | 显示全部楼层 |阅读模式
发布页:
http://hackmii.com/2008/07/xyzzy/

下载:
http://static.hackmii.com/xyzzy-1.0.zip
xyzzy-1.0.zip

key的用途:
http://hackmii.com/2008/04/keys-keys-keys

PS:上次是Waninkoko,这次轮到bushing出马了,看来看好cIOS破解路线确实没错
This isn’t the prettiest code I’ve ever written — it doesn’t have much of an interface, and I just threw this release together in a few minutes. However, it’s been exceedingly useful to me, and hopefully some of you will find it useful, too. I’ll quote the README here:

This program will do the following, automatically:

   * Download IOS11 from the Nintendo Update Server
   * Patch it to remove the MEM2 protection (so the PPC can access all 64MB of it)
   * Patch it to allow it to delete itself later using ES_DeleteTitle()
   * Find an unused IOS slot (counting downward from IOS255)
   * Install the hacked IOS11 there
   * Reboot into the hacked IOS
   * Copy the private key structure from the IOS address space into MEM1
   * Reboot back into a sane IOS
   * Delete the temporary, hacked IOS
   * Display the keys on screen
   * Try to write them to a file on the SD card — keys.txt
   * Pause for 60 seconds to allow you to copy the keys down using pen and paper,if necessary

I wrote this a week or two after I killed a Wii trying to reproduce tmbinc’s original Tweezer Hack. May it rest in peace.

The first version of this code just used a patched version of IOS, which was an ugly hack. It’s still an ugly hack, but at least it no longer contains copyrighted code. You should only really need to run it once on any given Wii, but it should be safe to run as much as you want. If nothing else, it demonstrates the kinds of ways you can use PatchMii_core to do something useful (as opposed to just running it and then packaging the result up as cIOS).

(c) 2008 bushing / hackmii.com
.
该用户已被禁言

精华
0
帖子
854
威望
1 点
积分
1081 点
种子
0 点
注册时间
2008-5-5
最后登录
2020-3-7
发表于 2008-7-23 11:23  ·  北京 | 显示全部楼层
这个我今天早上看过了,看来半天还真没明白是干什么的。这个就是前几天那个什么Bushing搞出来的什么Wii softmod??反正最近这哥们儿折腾得挺热闹的,号称N记已经和他接触过了,要求停止这种行为…… 看来这次真的是一刀见血了,哼哼哼哼~ 不过感觉目的有点不单纯,不像是纯粹为了破解而破解,声明都是直接Go public,倒有点准备拿这个Security issue诈点钱花的意思。
Dear Nintendo,

As part of our efforts to understand how the Wii works, we believe we
have found a security issue that could allow pirated Wii games to be
played on an unmodified Wii console.

I would like to speak to an engineer about this — please have one contact me at bushing (at) gmail.com.

Sincerely,
bushing

P.S. Sorry for posting this publicly — I tried emailing you three times
and never received a response. I am trying to follow the model set forth
in RFPolicy v2.0, so your timely response
would be appreciated.

精华
0
帖子
516
威望
0 点
积分
560 点
种子
11 点
注册时间
2007-3-5
最后登录
2023-4-13
发表于 2008-7-23 17:29  ·  江苏 | 显示全部楼层
这东西修复全砖应该不错

精华
0
帖子
516
威望
0 点
积分
560 点
种子
11 点
注册时间
2007-3-5
最后登录
2023-4-13
发表于 2008-7-23 17:32  ·  江苏 | 显示全部楼层
Keys, keys, keys.
April 15th, 2008 by bushing · 16 Comments
By popular request, here’s an explanation of the different encryption keys that are used on the Wii.

AES Keys: The Wii uses 128-bit (16-byte) symmetric AES (aka AES-128-CBC) for most encryption.

Common key (ebe42a225e8593e448d9c5457381aaf7):  This is the “shared secret” that we extracted with the Tweezer Hack.  This key is known by all Wiis, but is never used, directly, to encrypt anything.  Instead, all titles are encrypted with a random AES key; this key is then encrypted with the Common key and then stored inside a ticket. The ticket is then transmitted along with the content — on discs, it’s part of the “certificates” found before the encrypted data starts. Thus, knowing the common key allows you to decrypt most Wii content, as long as you have the right ticket.  This key is stored in the OTP area inside the Starlet ARM core inside the Hollywood package.
SD key (ab01b9d8e1622b08afbad84dbfc2a55d): This is another shared secret — also stored on the Hollywood, but also found plenty of other places, including inside the firmware images. This key is used by the System Menu (1-2) to encrypt anything before writing it out to the SD card, and it’s used by 1-2 to decrypt anything read from the SD card. This is done mainly for the purpose of obfuscation, to keep people from examining savegames. It’s worth noting that all Wii games save their data to the internal NAND — no game supports loading or saving data directly to SD. This frees game writers from the requirement of handling this step themselves; they just write the savegame data, unencrypted and unsigned, to their title-data directory inside the NAND filesystem; the system menu then handles everything else. (The real reason for this is probably that it allowed Nintendo to make a system where they didn’t have to expose the details of this encryption — or any encryption — to their licensed game developers.) This key is also stored in OTP, and in several places in IOS (for no apparent reason).  If you’re using Segher’s tools, you may also be interested in the SD IV (216712e6aa1f689f95c5a22324dc6a98) and the MD5 blanker (0e65378199be4517ab06ec22451a5793), both of which are stored inside the 1-2 binary.
NAND key (varies):  This AES key is used to encrypt the filesystem data on the actual NAND chip itself; it is probably randomly generated during manufacturing and is also stored in the OTP area of the Starlet.  This key is used to prevent the contents of the NAND filesystem from being read using a flash chip reader. Nintendo may or may not actually record this key anywhere, since they (theoretically) don’t need to ever use it. In fact, in some similar systems, keys like this are generated automatically by the device itself and (theoretically) never leave it — the Wii shares some design prinicples with HSMs, but it certainly doesn’t manage to be one. This is another OTP key.
RSA keys: The Wii uses RSA-based authentication in several different places.  This is fundamentally different than the AES encryption used for data-hiding, because RSA is an asymmetric cipher, meaning there are no shared secrets — nothing to be extracted from the Wii. The only RSA keys stored on the Wii are public keys, used to verify authenticity of content.

CP: Content Protection? This key is used to sign the TMD associated with every title. The TMD contains a SHA1 hash of the contents of that title, proving that it had not been modified. My 24c3 presentation was done by injecting a new .DOL into a Lego Star Wars disc and then forging the signature on its TMD, using a flaw originally discovered by Segher. After that presentation, people eventually discovered the common key needed to decrypt update partitions, allowing others to analyze / disassemble IOS. xt5 (who I had the pleasure of meeting at 24c3) was then able to find the same flaw and implemented it in his Trucha Signer. In fact, from disassembling his code, the core part of it was almost identical to our never-released code — great minds think alike, eh?
XS:  ”Access”?  This is the key that signs tickets, which contain the title keys for individual titles.
CA: Certification Authority:  This key signs both the XS and CP keys.
MS: “Master?”  This key is used to sign the certificate that contains a copy of your Wii’s public ECC key.  This certificate is then appended to savegames on SD cards, so that any other Wii can verify that the key was issued by Nintendo.
Root: This is the “grand master key”, which signs the CA key.  The public half of this can be found here.
ECC keys:  The Wii uses Elliptic Curve Cryptography in a few select places — primarily, it uses this when it signs savegames before writing them to SD card. ECC is used in ways similar to RSA, but it’s somewhat newer and much faster to run on an embedded system.

Other:  For lack of a better place to put it, there is also an HMAC key — a 20-byte value that is used in a SHA1-based HMAC of the NAND flash contents to prevent them from being tampered with. This is a commonly used scheme in embedded systems, where a device wants to “sign” something itself, for itself. There are no public vs private keys here — you need to know this value in order to verify the hash, and you need the same value to generate the hash. This isn’t appropriate for communications between two people, but is perfectly fine for letting the Wii test to see if the chip was pulled, rewritten, and resoldered.

Key storage: The public keys are stored in various places — these aren’t sensitive, so they don’t really need to be concealed (although at least one of them needs to be protected from modification, and it can then sign the others). The rest are stored in two places:

Hollywood SEEPROM:  After meeting him at 24c3, bunnie was kind enough to decap some chips for me, including a Hollywood. One of those chips is 2kbit serial EEPROM, which stores the MS signature on the the ECC key.
One-Time Programmable Area:  Inside the Starlet ARM core, there are a bunch of things:  
1。SHA1 hash of boot1
2。Common key
3。ECC private key
4。NAND HMAC
5。NAND AES key
6。RNG seed
7。other stuff we can’t yet decipher
All of that info comes from tmbinc, who recovered it with a method he described here.

精华
2
帖子
4942
威望
7 点
积分
6124 点
种子
0 点
注册时间
2007-4-8
最后登录
2024-3-12
发表于 2008-7-23 18:15  ·  北京 | 显示全部楼层
LS是虾米意思?
何不翻译一篇单独发出,在下好发浮云^_^

否则俺看着像灌水啊,只是纯粹的复制粘贴啊。。。。

精华
0
帖子
516
威望
0 点
积分
560 点
种子
11 点
注册时间
2007-3-5
最后登录
2023-4-13
发表于 2008-7-23 18:19  ·  江苏 | 显示全部楼层
只是纯粹的复制粘贴啊

看懂个大概,初中水平英语,无法翻译
结合电脑知识才能看个轮廓

精华
2
帖子
4942
威望
7 点
积分
6124 点
种子
0 点
注册时间
2007-4-8
最后登录
2024-3-12
发表于 2008-7-23 18:42  ·  北京 | 显示全部楼层
汗。。。。。

纯粹的复制粘贴尽量少发吧。。。。。。^_^
aim

精华
2
帖子
5433
威望
7 点
积分
6041 点
种子
5 点
注册时间
2005-7-12
最后登录
2020-11-17
 楼主| 发表于 2008-7-23 23:30  ·  广东 | 显示全部楼层
下面是引用silenceburn于2008-07-23 18:15发表的:
LS是虾米意思?
何不翻译一篇单独发出,在下好发浮云^_^

否则俺看着像灌水啊,只是纯粹的复制粘贴啊。。。。
就是顶楼上面某连接的内容,hackmi.com的文章,是说明获取的key有什么用的。

声明,这个不是软***!

精华
0
帖子
516
威望
0 点
积分
560 点
种子
11 点
注册时间
2007-3-5
最后登录
2023-4-13
发表于 2008-7-25 10:11  ·  江苏 | 显示全部楼层
老大,全砖的nand可以修复了吗,外网有消息吗,难道他们那全砖很少?
老早就出了Bushing's Amoxiflash刷写程序
需要那个 Infectus 和一个自制的PCB





精华
2
帖子
4942
威望
7 点
积分
6124 点
种子
0 点
注册时间
2007-4-8
最后登录
2024-3-12
发表于 2008-7-25 13:19  ·  北京 | 显示全部楼层
回LS,刷NAND的东西的确早就出了,只不过这个东西国内几乎绝迹,所以没有流传
您需要登录后才可以回帖 登录 | 注册

本版积分规则

Archiver|手机版|A9VG电玩部落 川公网安备 51019002005286号

GMT+8, 2024-6-8 17:02 , Processed in 0.201517 second(s), 15 queries , Redis On.

Powered by Discuz! X3.4

Copyright © 2001-2020, Tencent Cloud.

返回顶部