Toggle menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

Wilbrand: Difference between revisions

From GameBrew
No edit summary
No edit summary
 
(7 intermediate revisions by the same user not shown)
Line 1: Line 1:
{{#seo:
|title=Wii Homebrew Loaders (Exploits) - GameBrew
|title_mode=append
|image=wilbrandwii.jpg
|image_alt=Wilbrand
}}
{{Infobox Wii Homebrews
{{Infobox Wii Homebrews
|title=Wilbrand
|title=Wilbrand
|image=wilbrandwii.jpg
|image=wilbrand3.png
|description=This is a program used to build the mailbox bomb exploit for the Wii system menu.
|description=A program used to build the mailbox bomb exploit for the Wii system menu.
|author=giantpune
|author=giantpune
|lastupdated=2012/04/17
|lastupdated=2012/04/17
|type=Exploits
|type=Exploits
|version=4
|version=3
|license=GPL-2.0
|license=GPL-2.0
|download=https://dlhb.gamebrew.org/wiihomebrews/wilbrandwii.7z
|download=https://dlhb.gamebrew.org/wiihomebrews/wilbrand.7z
|website=https://wiidatabase.de/downloads/exploits/wilbrand/
|website=https://wiidatabase.de/downloads/exploits/wilbrand/
|source=https://github.com/giantpune/mailboxbomb
|source=https://github.com/giantpune/mailboxbomb
}}
}}
Wilbrand is a exploit for the Wii system, similar to [[LetterBomb Wii]], that works on system menus ranging from 3.0 to 4.3. The tool, which is included in the download, is operated through the command line and includes an EXE for Windows and a binary for Unix-like systems.
Wilbrand is a exploit for the Wii Message Board. Similar to [[LetterBomb Wii|LetterBomb]], it works on system menus from 3.0 to 4.3.  


== Usage ==
The tool is operated through the command line and includes an executable for Windows and a binary for Unix-like systems.
This is a cli program. If you don't know how to use it, google. Here is the usage:
 
== User guide ==
This is a cli program. Here is the usage:


<pre>Wilbrand &lt;MAC address&gt; &lt;date&gt; &lt;sysmenu version&gt; &lt;SD Root&gt;</pre>
<pre>Wilbrand &lt;MAC address&gt; &lt;date&gt; &lt;sysmenu version&gt; &lt;SD Root&gt;</pre>
Line 29: Line 25:
! Definition
! Definition
|-
|-
| MAC Address
! MAC Address
| The wireless MAC address of the wii. you can get this from the internet settings, or if those are inaccessible for whatever reason, many routers will display it. It may contain dashes, colons, or spaces, but should be 12 hex characters when these extra characters are removed.
| The wireless MAC address of the wii. you can get this from the internet settings, or if those are inaccessible for whatever reason, many routers will display it. It may contain dashes, colons, or spaces, but should be 12 hex characters when these extra characters are removed.
|-
|-
| Date
! Date
| this is the date you want the message to show up under in the message board. It should be within the range of 2000 - 2035. Accepted formats are mm/dd/yyyy or in a 32bit hex representation of the number of seconds since 00:00 Jan, 01 2000. NOTE The System menu is triggered to load messages from the SD card when you scroll across days. So if you build the message for the current day, you will have to scroll to a different day and then back again to trigger the loading of it.
| this is the date you want the message to show up under in the message board. It should be within the range of 2000 - 2035. Accepted formats are mm/dd/yyyy or in a 32bit hex representation of the number of seconds since 00:00 Jan, 01 2000. NOTE The System menu is triggered to load messages from the SD card when you scroll across days. So if you build the message for the current day, you will have to scroll to a different day and then back again to trigger the loading of it.
|-
|-
| SysmenuVersion
! SysmenuVersion
| This is the version of the System menu to build the exploit for. It can be read in the first page under Wii settings. Accepted formats are 3.2u, 32u, 3.2U, and 32U. Accepted versions are any official, publicly released version from 3.0 - 4.3.
| This is the version of the System menu to build the exploit for. It can be read in the first page under Wii settings. Accepted formats are 3.2u, 32u, 3.2U, and 32U. Accepted versions are any official, publicly released version from 3.0 - 4.3.
|-
|-
| SD Root
! SD Root
| This is the base folder where you would like the message created. The design of the cdb archive uses about 13 subfolders to store files. This program will use the given folder and create the necessary folder structure and then place the exploit message in its place.
| This is the base folder where you would like the message created. The design of the cdb archive uses about 13 subfolders to store files. This program will use the given folder and create the necessary folder structure and then place the exploit message in its place.
|}
|}


Examples:
'''Examples:'''


./Wilbrand 001122334455 10/25/2011 3.2u /media/sdcard
./Wilbrand 001122334455 10/25/2011 3.2u /media/sdcard
Line 50: Line 46:
./Wilbrand '00 11 22 33 44 55' 163a09c4 4.3K F:
./Wilbrand '00 11 22 33 44 55' 163a09c4 4.3K F:


You need to use an SD card that is supported by your system menu version. To test this, go to the data management or SD card menu and try to use the SD card. It will tell you if it can't be used. Once you have run this program, and have the exploit message on your SD card, you need some homebrew to load. [http://bootmii.org/download/ This one] works pretty well. Save the homebrew as SD:/boot.elf. Then stick the SD card in your Wii, start it up, go to the message board, and then scroll to the day that the exploit was built for. It should be easily identifiable as it will be the best looking envelope there. Click it and watch the magic happen.
You need to use an SD card that is supported by your system menu version. To test this, go to the data management or SD card menu and try to use the SD card.  
 
== Doesn't work? ==
Q - I can't run the program.


Q - Wilbrand just gives me errors and doesn't build the exploit.
It will tell you if it can't be used. Once you have run this program, and have the exploit message on your SD card, you need some homebrew to load. [http://bootmii.org/download/ This one] works pretty well. Save the homebrew as SD:/boot.elf.  


A - Read and re-read the usage instructions. Google how to use a cli program.
Then stick the SD card in your Wii, start it up, go to the message board, and then scroll to the day that the exploit was built for. It should be easily identifiable as it will be the best looking envelope there. Click it and watch the magic happen.


Q - I don't see the incredibly cool image.
==Screenshots==
https://dlhb.gamebrew.org/wiihomebrews/wilbrand3.png


A - Double check that you are looking at the date you gave to wilbrand when building the exploit.
=== FAQ ===
'''Q. I can't run the program./Wilbrand just gives me errors and doesn't build the exploit.'''


Make sure the system menu can access your SD card.
Read and re-read the usage instructions. Google how to use a cli program.


Make sure you gave the correct WIRELESS MAC address to the program
'''Q. I don't see the incredibly cool image.'''


Q - When I click the message, it freezes.
Double check that you are looking at the date you gave to wilbrand when building the exploit.


A - You gave the wrong system menu version when building the exploit message.
Make sure the system menu can access your SD card.
 
Q - I click the message and I get a black screen with white text flying by over and over.


A - Make sure you have SD:/boot.elf. Try with a different SD card. Apparently this SD code doesn't like some cards.
Make sure you gave the correct WIRELESS MAC address to the program.


== Compiling ==
'''Q. When I click the message, it freezes.'''
The elf loader code should be built with a toolchain targeting the wii ppc. Change the PREFIX in ./loader/Makefile to point to yours. Once you have built ./loader/loader.bin, copy that into the ./data folder.


Along with the usual gcc tools, Wilbrand needs the bin2s program from devkitpro to build. Wilbrand has 3 makefiles. I'm using a debian Linux x86_64 system with multilib and mingw packages and the *x86 and *.win makefiles to build 3 different binaries. On any linux machine, the plain Makefile should build a native binary.
You gave the wrong system menu version when building the exploit message.


Windows users should use the *.win makefile and change the PREFIX, as I've added a little makefile voodoo in there. It SHOULD work with mingw and cygwin.
'''Q. I click the message and I get a black screen with white text flying by over and over.'''


I don't have access to a Mac with a decent build system, so I can't say if it will work there or not.
Make sure you have SD:/boot.elf. Try with a different SD card. Apparently this SD code doesn't like some cards.


== Changelog ==
== Changelog ==
Line 88: Line 80:
*Initial public release.
*Initial public release.


== Authors ==
==Credits==
Authors:
*Hackmii team - Savezelda's loader was used as a starting point for the payload.
*Hackmii team - Savezelda's loader was used as a starting point for the payload.
*Paul E. Jones - sha1 code
*Paul E. Jones - sha1 code.
*Mike Scott - AES code
*Mike Scott - AES code.
*others - there is some misc code involved (such as wbe32()) that was takes from various open-source projects which was very nice to have, but I'm sure I couldn't name all occurances and credit all authors appropriately
*Others - there is some misc code involved (such as wbe32()) that was takes from various open-source projects which was very nice to have, but I'm sure I couldn't name all occurances and credit all authors appropriately.
*giantpune - finding the initial bug [WOOHOO!], dumping and debugging 32 version of the system menu to find the offsets, pretty much everything else involved
*giantpune - finding the initial bug [WOOHOO!], dumping and debugging 32 version of the system menu to find the offsets, pretty much everything else involved.


== License ==
==External links==
Wilbrand is licensed under the GPL v2 license. The AES and SHA1 code each have their own license and copyright. See those files for their respective licenses. Savezelda is licensed under GPL v2 as well.
* GitHub - https://github.com/giantpune/mailboxbomb
* Wiidatabase - https://wiidatabase.de/downloads/exploits/wilbrand/

Latest revision as of 15:41, 3 August 2023

Wilbrand
Wilbrand3.png
General
Authorgiantpune
TypeExploits
Version3
LicenseGPL-2.0
Last Updated2012/04/17
Links
Download
Website
Source

Wilbrand is a exploit for the Wii Message Board. Similar to LetterBomb, it works on system menus from 3.0 to 4.3.

The tool is operated through the command line and includes an executable for Windows and a binary for Unix-like systems.

User guide

This is a cli program. Here is the usage:

Wilbrand <MAC address> <date> <sysmenu version> <SD Root>
Term Definition
MAC Address The wireless MAC address of the wii. you can get this from the internet settings, or if those are inaccessible for whatever reason, many routers will display it. It may contain dashes, colons, or spaces, but should be 12 hex characters when these extra characters are removed.
Date this is the date you want the message to show up under in the message board. It should be within the range of 2000 - 2035. Accepted formats are mm/dd/yyyy or in a 32bit hex representation of the number of seconds since 00:00 Jan, 01 2000. NOTE The System menu is triggered to load messages from the SD card when you scroll across days. So if you build the message for the current day, you will have to scroll to a different day and then back again to trigger the loading of it.
SysmenuVersion This is the version of the System menu to build the exploit for. It can be read in the first page under Wii settings. Accepted formats are 3.2u, 32u, 3.2U, and 32U. Accepted versions are any official, publicly released version from 3.0 - 4.3.
SD Root This is the base folder where you would like the message created. The design of the cdb archive uses about 13 subfolders to store files. This program will use the given folder and create the necessary folder structure and then place the exploit message in its place.

Examples:

./Wilbrand 001122334455 10/25/2011 3.2u /media/sdcard

./Wilbrand 00-11-22-33-44-55 163a09c4 43U /media/sdcard

./Wilbrand '00 11 22 33 44 55' 163a09c4 4.3K F:

You need to use an SD card that is supported by your system menu version. To test this, go to the data management or SD card menu and try to use the SD card.

It will tell you if it can't be used. Once you have run this program, and have the exploit message on your SD card, you need some homebrew to load. This one works pretty well. Save the homebrew as SD:/boot.elf.

Then stick the SD card in your Wii, start it up, go to the message board, and then scroll to the day that the exploit was built for. It should be easily identifiable as it will be the best looking envelope there. Click it and watch the magic happen.

Screenshots

wilbrand3.png

FAQ

Q. I can't run the program./Wilbrand just gives me errors and doesn't build the exploit.

Read and re-read the usage instructions. Google how to use a cli program.

Q. I don't see the incredibly cool image.

Double check that you are looking at the date you gave to wilbrand when building the exploit.

Make sure the system menu can access your SD card.

Make sure you gave the correct WIRELESS MAC address to the program.

Q. When I click the message, it freezes.

You gave the wrong system menu version when building the exploit message.

Q. I click the message and I get a black screen with white text flying by over and over.

Make sure you have SD:/boot.elf. Try with a different SD card. Apparently this SD code doesn't like some cards.

Changelog

3.0

  • Initial public release.

Credits

Authors:

  • Hackmii team - Savezelda's loader was used as a starting point for the payload.
  • Paul E. Jones - sha1 code.
  • Mike Scott - AES code.
  • Others - there is some misc code involved (such as wbe32()) that was takes from various open-source projects which was very nice to have, but I'm sure I couldn't name all occurances and credit all authors appropriately.
  • giantpune - finding the initial bug [WOOHOO!], dumping and debugging 32 version of the system menu to find the offsets, pretty much everything else involved.

External links

Advertising: