Toggle menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

Biskeydump Switch: Difference between revisions

From GameBrew
(Created page with "{{Infobox Switch Homebrews |title=BiskeyDump |image=biskeydumpswitch.png |description=fusee payload that dumps your BIS keys. |author=rajkosto |lastupdated=2019/06/22 |type=PC Utilities |version=9 |license=GPL-2.0 |download=https://dlhb.gamebrew.org/switchhomebrews/biskeydumpswitch.7z |website=https://gbatemp.net/threads/biskeydump-version-7-released-with-6-2-0-support.524542/ |source=https://github.com/rajkosto/biskeydump |donation= }} {{#seo: |title=Switch Homebrew PC...")
 
No edit summary
 
(5 intermediate revisions by the same user not shown)
Line 1: Line 1:
{{Infobox Switch Homebrews
{{Infobox Switch Homebrews
|title=BiskeyDump
|title=biskeydump
|image=biskeydumpswitch.png
|image=biskeydumpnx.png
|description=fusee payload that dumps your BIS keys.
|description=Fusee payload that dumps your BIS keys.
 
|author=rajkosto
|author=rajkosto
|lastupdated=2019/06/22
|lastupdated=2019/06/22
|type=PC Utilities
|type=Payload (Binaries)
|version=9
|version=9
|license=GPL-2.0
|license=GPL-2.0
|download=https://dlhb.gamebrew.org/switchhomebrews/biskeydumpswitch.7z
|download=https://dlhb.gamebrew.org/switchhomebrews/biskeydumpnx.7z?k33p0fil35
|website=https://gbatemp.net/threads/biskeydump-version-7-released-with-6-2-0-support.524542/
|website=https://switchtools.sshnuke.net/
|source=https://github.com/rajkosto/biskeydump
|source=https://github.com/rajkosto/biskeydump
|donation=
|donation=https://switchtools.sshnuke.net/
}}
}}
{{#seo:
Dumps all your Switch BIS keys for eMMC contents decryption, to be used as a fusee payload.
|title=Switch Homebrew PC Tools (PC Utilities) - GameBrew
 
|title_mode=append
With all your BIS keys and your RawNand.bin (or the physical eMMC attached via microSD reader or using a mass storage gadget mode in u-boot/linux) you can explore/modify your eMMC partitions using [[HacDiskMount Switch|HacDiskMount]] by rajkosto (if running Windows).
|image=biskeydumpswitch.png
 
|image_alt=BiskeyDump
'''Note:''' The author is not responsible for anything, including dead Switches, loss of life, or total nuclear annihilation.
}}
 
{{cleanup|article|Needs cleanup}}
==User guide==
fusee payload that dumps your BIS keys.
Send the biskeydump.bin to your Switch running in RCM mode via a fusee-launcher (sudo ./fusee-launcher.py biskeydump.bin or just drag and drop it onto TegraRcmSmash.exe on Windows)


Either read out and note down the text printed on your Switch's screen, or scan the generated QR code with your phone to have a copy of all your device-specific keys


==Media==
Alternatively, use [[TegraRcmSmash Switch|TegraRcmSmash]] 1.1.0 or newer with a dummy argument so it keeps listening for usb comms, and you will get all the keys inside the console window, sample cmdline:
<youtube></youtube>


<code>TegraRcmSmash.exe -w out/biskeydump.bin BOOT:0x0</code>


==Screenshots==
==Screenshots==
https://dlhb.gamebrew.org/switchhomebrews/biskeydumpswitch-01.png
https://dlhb.gamebrew.org/switchhomebrews/biskeydumpnx2.png
https://dlhb.gamebrew.org/switchhomebrews/biskeydumpswitch-02.png
https://dlhb.gamebrew.org/switchhomebrews/biskeydumpswitch-03.png
https://dlhb.gamebrew.org/switchhomebrews/biskeydumpswitch-04.png
https://dlhb.gamebrew.org/switchhomebrews/biskeydumpswitch-05.png
https://dlhb.gamebrew.org/switchhomebrews/biskeydumpswitch-06.png
https://dlhb.gamebrew.org/switchhomebrews/biskeydumpswitch-07.png
https://dlhb.gamebrew.org/switchhomebrews/biskeydumpswitch-08.png


==Changelog==
==Changelog==
'''v.1.0'''
'''v9 2019/06/22'''
* First Release.
*Support new tsec fw in 8.1.0.
'''v8 2019/02/05'''
Support new tsec fw in 7.0.0.
'''v7 2018/11/27'''
*Support new tsec fw in 6.2.0 and add option to save keys to microSD.
'''v6 2018/05/04'''
*Outputs dumped keys text to RCM host if it's listening.
'''v5 2018/05/01'''
*Validate retrieved keys by reading a keyblob and verifying its MAC.
'''v4 2018/04/29'''
*First compiled release (v4 and up get TSEC FW from eMMC boot0).


== External links ==
== External links ==
* Gbatemp - https://gbatemp.net/threads/biskeydump-version-7-released-with-6-2-0-support.524542/
* Author's website - https://switchtools.sshnuke.net/
* Github - https://github.com/rajkosto/biskeydump
* GitHub - https://github.com/rajkosto/biskeydump
* Reddit -

Latest revision as of 01:27, 5 February 2024

biskeydump
Biskeydumpnx.png
General
Authorrajkosto
TypePayload (Binaries)
Version9
LicenseGPL-2.0
Last Updated2019/06/22
Links
Download
Website
Source
Support Author

Dumps all your Switch BIS keys for eMMC contents decryption, to be used as a fusee payload.

With all your BIS keys and your RawNand.bin (or the physical eMMC attached via microSD reader or using a mass storage gadget mode in u-boot/linux) you can explore/modify your eMMC partitions using HacDiskMount by rajkosto (if running Windows).

Note: The author is not responsible for anything, including dead Switches, loss of life, or total nuclear annihilation.

User guide

Send the biskeydump.bin to your Switch running in RCM mode via a fusee-launcher (sudo ./fusee-launcher.py biskeydump.bin or just drag and drop it onto TegraRcmSmash.exe on Windows)

Either read out and note down the text printed on your Switch's screen, or scan the generated QR code with your phone to have a copy of all your device-specific keys

Alternatively, use TegraRcmSmash 1.1.0 or newer with a dummy argument so it keeps listening for usb comms, and you will get all the keys inside the console window, sample cmdline:

TegraRcmSmash.exe -w out/biskeydump.bin BOOT:0x0

Screenshots

biskeydumpnx2.png

Changelog

v9 2019/06/22

  • Support new tsec fw in 8.1.0.

v8 2019/02/05 Support new tsec fw in 7.0.0. v7 2018/11/27

  • Support new tsec fw in 6.2.0 and add option to save keys to microSD.

v6 2018/05/04

  • Outputs dumped keys text to RCM host if it's listening.

v5 2018/05/01

  • Validate retrieved keys by reading a keyblob and verifying its MAC.

v4 2018/04/29

  • First compiled release (v4 and up get TSEC FW from eMMC boot0).

External links

Advertising: