Toggle menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

Xyzzy Wii: Difference between revisions

From GameBrew
No edit summary
No edit summary
Line 10: Line 10:
|description=Extracts Wii encryption keys
|description=Extracts Wii encryption keys
|author=bushing|, DarkMatterCore
|author=bushing|, DarkMatterCore
|lastupdated=2020/06/17
|lastupdated=2022/07/19
|type=System Tools
|type=System Tools
|version=1.30 mod
|version=1.3.2
|license=GPL-2.0
|license=GPL-2.0
|download=https://dlhb.gamebrew.org/wiihomebrews/xyzzywii.7z
|download=https://dlhb.gamebrew.org/wiihomebrews/xyzzywii.7z
Line 18: Line 18:
|source=https://github.com/DarkMatterCore/xyzzy-mod
|source=https://github.com/DarkMatterCore/xyzzy-mod
}}
}}
'''xyzzy''' is a homebrew application which was meant as a replacement for the [https://wiibrew.org/wiki/Tweezer_Attack Tweezer Attack]. It originally used [[Patchmii Wii]] to download, patch, and use a version of IOS to extract the OTP Encryption keys for the Wii. The current mod now disables HW_AHBPROT, so it doesn't install an IOS anymore nor does it use PatchMii. It also supports USB devices, newer Wiimotes and GameCube controllers.
'''Xyzzy''' is an app to extract the  Wii console keys.
 
==What is Xyzzy?==
Xyzzy is a homebrew application that allows the extraction of the OTP and SEEPROM Encryption Keys.
 
This homebrew application which was meant as a replacement for the [https://wiibrew.org/wiki/Tweezer_Attack Tweezer Attack]. It originally used [[Patchmii Wii]] to download, patch, and use a version of IOS to extract the OTP Encryption keys for the Wii.  
 
This modified version uses full hardware access through the HW_AHBPROT flag to read the OTP and SEEPROM chips, the System Menu binary and the ES module from the current IOS, in order to retrieve the console keys. Thus, it no longer installs a modified IOS11 nor uses PatchMii.


== Keys extracted ==
== Keys extracted ==
xyzzy extracts the OTP and SEEPROM encryption keys of the Wii and the vWii. It can also extract the SD IV, MD5 Blanker and MAC address of the Wii. They are stored in SD://keys.txt, and the device certificate is stored in SD://device.cert (or on a USB device if selected). On the Wii U, the [https://wiiubrew.org/wiki/Ancast_Image ancast image] is also dumped.
xyzzy extracts the OTP and SEEPROM encryption keys of the Wii and the vWii. It can also extract the SD IV, MD5 Blanker and MAC address of the Wii. They are stored in SD://keys.txt, and the device certificate is stored in SD://device.cert (or on a USB device if selected). On the Wii U, the [https://wiiubrew.org/wiki/Ancast_Image ancast image] is also dumped.
==What changed in the Mod version?==
* Compatibility with USB mass storage devices.
* Support for GCN controllers and newer WiiMotes.
* Retrieves SD IV, MD5 Blanker and MAC address.
* Besides generating a "keys.txt" file with a hexdump of every dumped key, which follows the format required by [https://github.com/DarkMatterCore/wad2bin wad2bin], these files are also created:
** "device.cert" (raw device certificate dump).
** "otp.bin" (raw OTP memory dump).
** "seeprom.bin" (raw SEEPROM memory dump) (Wii only).
** "bootmii_keys.bin" (follows the BootMii keys.bin format) (Wii only).
** "vwii_sram_otp.bin" (raw vWii OTP bank 6 dump with Wii U OTP data) (Wii U only).
** "boot0.bin" (raw ARM boot0 Mask ROM dump).
Output files are saved to "/xyzzy/{console_id}" on the selected storage device.
==Changelog==
'''v1.3.2'''
*Removed trailing whitespaces in the codebase.
*Added boot0 Mask ROM dumping (as requested by @MasterLuma).
'''v1.3.1'''
*Fixed OTP reading under RVT-R units. Big thanks to @MasterLuma for reporting the *issue and testing the fix.
'''v1.3.0'''
*Added support for vWii System Menu Ancast image.


== External links ==
== External links ==
* Github - https://github.com/DarkMatterCore/xyzzy-mod
* Github - https://github.com/DarkMatterCore/xyzzy-mod
* Wiibrew - https://wiibrew.org/wiki/Xyzzy
* Wiibrew - https://wiibrew.org/wiki/Xyzzy

Revision as of 03:47, 20 November 2022

xyzzy
File:Xyzzywii.jpg
General
Authorbushing
TypeSystem Tools
Version1.3.2
LicenseGPL-2.0
Last Updated2022/07/19
Links
Download
Source

Xyzzy is an app to extract the Wii console keys.

What is Xyzzy?

Xyzzy is a homebrew application that allows the extraction of the OTP and SEEPROM Encryption Keys.

This homebrew application which was meant as a replacement for the Tweezer Attack. It originally used Patchmii Wii to download, patch, and use a version of IOS to extract the OTP Encryption keys for the Wii.

This modified version uses full hardware access through the HW_AHBPROT flag to read the OTP and SEEPROM chips, the System Menu binary and the ES module from the current IOS, in order to retrieve the console keys. Thus, it no longer installs a modified IOS11 nor uses PatchMii.

Keys extracted

xyzzy extracts the OTP and SEEPROM encryption keys of the Wii and the vWii. It can also extract the SD IV, MD5 Blanker and MAC address of the Wii. They are stored in SD://keys.txt, and the device certificate is stored in SD://device.cert (or on a USB device if selected). On the Wii U, the ancast image is also dumped.

What changed in the Mod version?

  • Compatibility with USB mass storage devices.
  • Support for GCN controllers and newer WiiMotes.
  • Retrieves SD IV, MD5 Blanker and MAC address.
  • Besides generating a "keys.txt" file with a hexdump of every dumped key, which follows the format required by wad2bin, these files are also created:
    • "device.cert" (raw device certificate dump).
    • "otp.bin" (raw OTP memory dump).
    • "seeprom.bin" (raw SEEPROM memory dump) (Wii only).
    • "bootmii_keys.bin" (follows the BootMii keys.bin format) (Wii only).
    • "vwii_sram_otp.bin" (raw vWii OTP bank 6 dump with Wii U OTP data) (Wii U only).
    • "boot0.bin" (raw ARM boot0 Mask ROM dump).

Output files are saved to "/xyzzy/{console_id}" on the selected storage device.

Changelog

v1.3.2

  • Removed trailing whitespaces in the codebase.
  • Added boot0 Mask ROM dumping (as requested by @MasterLuma).

v1.3.1

  • Fixed OTP reading under RVT-R units. Big thanks to @MasterLuma for reporting the *issue and testing the fix.

v1.3.0

  • Added support for vWii System Menu Ancast image.

External links

Advertising: