NAND Usage Guide: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
(→Extracting NAND files on Linux: Added command for Linux step 2 (untested)) |
||
Line 15: | Line 15: | ||
=== Extracting NAND files on Linux === | === Extracting NAND files on Linux === | ||
# '''Extract''' the AES IV from keys.bin: <code>dd if=keys.bin of=aes-iv bs=1 skip=360 count=16</code> | # '''Extract''' the AES IV from keys.bin: <code>dd if=keys.bin of=aes-iv bs=1 skip=360 count=16</code> | ||
# '''Extract''' the per-console NAND key from keys.bin. | # '''Extract''' the per-console NAND key from keys.bin: <code>dd if=keys.bin of=nand-key bs=1 skip=376 count=16</code> | ||
# '''Decrypt''' the NAND image: <code>openssl enc -d -aes-128-cbc -in nand.bin -out nand-decrypted.bin -K $(hexdump -v -e '/1 "%02X"' < nand-key) -iv $(hexdump -v -e '/1 "%02X"' < aes-iv) -nopad</code> | # '''Decrypt''' the NAND image: <code>openssl enc -d -aes-128-cbc -in nand.bin -out nand-decrypted.bin -K $(hexdump -v -e '/1 "%02X"' < nand-key) -iv $(hexdump -v -e '/1 "%02X"' < aes-iv) -nopad</code> | ||
# '''Unpack''' the decrypted NAND image using zestig. | # '''Unpack''' the decrypted NAND image using zestig. |