15,188
edits
(→Extracting NAND files on Linux: Added command for Linux step 2 (untested)) |
|||
(One intermediate revision by one other user not shown) | |||
Line 17: | Line 17: | ||
# '''Extract''' the per-console NAND key from keys.bin: <code>dd if=keys.bin of=nand-key bs=1 skip=376 count=16</code> | # '''Extract''' the per-console NAND key from keys.bin: <code>dd if=keys.bin of=nand-key bs=1 skip=376 count=16</code> | ||
# '''Decrypt''' the NAND image: <code>openssl enc -d -aes-128-cbc -in nand.bin -out nand-decrypted.bin -K $(hexdump -v -e '/1 "%02X"' < nand-key) -iv $(hexdump -v -e '/1 "%02X"' < aes-iv) -nopad</code> | # '''Decrypt''' the NAND image: <code>openssl enc -d -aes-128-cbc -in nand.bin -out nand-decrypted.bin -K $(hexdump -v -e '/1 "%02X"' < nand-key) -iv $(hexdump -v -e '/1 "%02X"' < aes-iv) -nopad</code> | ||
# '''Unpack''' the decrypted NAND image using zestig. | # '''Unpack''' the decrypted NAND image using zestig. The zestig source code can be downloaded [http://git.infradead.org/?p=users/segher/wii.git from here]. | ||
=== Extracting NAND files on Windows === | === Extracting NAND files on Windows === |