Homebrew Official [Download] Decrypt9 - Open Source Decryption Tools (WIP)

  • Thread starter d0k3
  • Start date
  • Views 845,098
  • Replies 4,476
  • Likes 71

d0k3

3DS Homebrew Legend
OP
Member
Joined
Dec 3, 2004
Messages
2,786
Trophies
1
XP
3,896
Country
Germany
Yea i just figured out how to compile it! It seemed complicated at first but just ended up being very simple to compile it :D Thank you for your hard work!
There's still some trouble with TWL, so hold your breath for a bit ;).

Yea, reading the commits is the way to go. It seems like you hard coded all the paths in your code. Would you consider doing something similar to what CakesFW does? :rolleyes:

CakesForeveryWan/source/paths.h
Code:
#pragma once

// A file to keep track of all the file paths used throughout cakes.

// The "topdir"
#define PATH_CAKES "/cakes"

#define PATH_FIRMWARE PATH_CAKES "/firmware.bin"
#define PATH_PATCHED_FIRMWARE PATH_CAKES "/firmware_patched.bin"
#define PATH_FIRMKEY PATH_CAKES "/firmkey.bin"
#define PATH_CETK PATH_CAKES "/cetk"

#define PATH_AGB_FIRMWARE PATH_CAKES "/agb_firmware.bin"
#define PATH_PATCHED_AGB_FIRMWARE PATH_CAKES "/agb_firmware_patched.bin"
#define PATH_AGB_FIRMKEY PATH_CAKES "/agb_firmkey.bin"
#define PATH_AGB_CETK PATH_CAKES "/agb_cetk"

#define PATH_UNSUPPORTED_FIRMWARE PATH_CAKES "/firmware_unsupported.bin"
#define PATH_SLOT0X25KEYX "/slot0x25keyX.bin"
#define PATH_SLOT0X11KEY96 "/slot0x11key96.bin"
#define PATH_PATCHES PATH_CAKES "/patches"
#define PATH_CONFIG PATH_CAKES "/config.dat"
Will think about it. Don't know if that really makes things simple. The slot files paths are not hardcoded, just this one is.
 

Geren

Well-Known Member
Member
Joined
Aug 15, 2011
Messages
236
Trophies
0
Website
Visit site
XP
233
Country
Spain
I double checked the code - it is absolutely impossible for this to say it succeeded when it actually did nothing at all. Did you inject into the wrong NAND? Also, the exact output would help.

No problem, I'm posting the decrypt9.log then.

Code:
Searching title "Health&Safety"...
Method 1: Search in title.db...
Found title 0004001000021300
TMD0 found at 0DF60000, size 2868b
APP0 found at 13AC4000, size 832kB
Use arrow keys and <A> to choose a name
hs.app
Dumping & decrypting APP0...
Creating hs.app ...
Code / Crypto: CTR-N-HACE / Standard
Decrypt ExHdr/ExeFS/RomFS (2kB/657kB/0MB)
Verify ExHdr/ExeFS/RomFS: OK/OK/OK
Health&Safety Dump: succeeded!

Press B to return, START to reboot.

Unmounting SD card...

You selected "Health&Safety Inject".
This feature writes to the SysNAND.
Doing this is potentially dangerous!

If you wish to proceed, enter:
<Left>, <Up>, <Right>, <Up>, <A>

(B to return, START to reboot)

Searching title "Health&Safety"...
Method 1: Search in title.db...
Found title 0004001000021300
TMD0 found at 0DF60000, size 2868b
APP0 found at 13AC4000, size 832kB
Use arrow keys and <A> to choose a file
hs.app
Opening hs.app ...
Creating hs.enc ...
Code / Crypto: CTR-N-HACE / Standard
Encrypt ExHdr/ExeFS/RomFS (2kB/657kB/0MB)
Injecting H&S app...
Opening hs.enc ...
Fixing TMD...
Health&Safety Inject: succeeded!

Press B to return, START to reboot.
 

morph95

Well-Known Member
Newcomer
Joined
Jun 6, 2014
Messages
56
Trophies
0
Age
39
XP
162
Country
France
  • CIA Decryptor (deep): Use this to fully decrypt all CIA files in the folder. This also processes the internal NCCH encryption. Deep decryption of a CIA file is otherwise known as cryptofixing. This also may need additional filesslot0x25KeyX.bin and / or seeddb.bin, see above.
2 CIA files succeeded with this option, but I have a "Import failed" while installing the 2 cia output files with BBM on emunands 9.2 and 10.6.
 
Last edited by morph95,

dark_samus3

Well-Known Member
Member
Joined
May 30, 2015
Messages
2,372
Trophies
0
XP
2,142
Country
United States
random question(prob a dumb one) i keep seeing mention of Decrypt9-A9LH is that just this or is there a diff version?
there initially was another version made by @Shadowtrance that was a stripped down version since none of the decryption options really worked.... now a lot of that is fixed, so the new versions are getting progressively more features working on them... So, now we just simply use the main release
 
  • Like
Reactions: pbanj

pbanj

The "friendly" neighborhood sandwich
Member
Joined
Dec 29, 2014
Messages
2,759
Trophies
1
Location
in a ziploc
Website
pbanjin.space
XP
1,693
Country
United States
there initially was another version made by @Shadowtrance that was a stripped down version since none of the decryption options really worked.... now a lot of that is fixed, so the new versions are getting progressively more features working on them... So, now we just simply use the main release
thank you. i kept seeing talk of it but no actual file and was like am i just stupid and not seeing it lol
 

pbanj

The "friendly" neighborhood sandwich
Member
Joined
Dec 29, 2014
Messages
2,759
Trophies
1
Location
in a ziploc
Website
pbanjin.space
XP
1,693
Country
United States
XD found out why the bin wouldnt boot for me with a9l. bootctr9 was having it use an offset. told it not to use one and it loads fine. would of helped if i read the bottom screen sooner lol

i should prob mess with this crap when im fully awake.
 

hirvimies

Well-Known Member
Newcomer
Joined
Dec 5, 2015
Messages
70
Trophies
0
XP
154
Country
Finland
I'm having trouble starting D9 from HBL now after installing a9lh + aureinand. I boot into sysNAND using the R-button, sysNAND is 9.2. Then I go to HBL using browserhax. When trying to start D9WIP from there, the bottom screen flashes red two times then I'm back to HBL.

Also tried starting D9 from emunand then HBL. I guess I'm missing something simple, is there any log I could check?
 

Columbo2811

Well-Known Member
Member
Joined
Jul 19, 2015
Messages
1,399
Trophies
0
XP
1,064
Country
I'm having trouble starting D9 from HBL now after installing a9lh + aureinand. I boot into sysNAND using the R-button, sysNAND is 9.2. Then I go to HBL using browserhax. When trying to start D9WIP from there, the bottom screen flashes red two times then I'm back to HBL.

Also tried starting D9 from emunand then HBL. I guess I'm missing something simple, is there any log I could check?
Use L button to boot if using aureinand. That's the 9.2 firm
 
  • Like
Reactions: Xenosaiga

3xkrazy

Well-Known Member
Member
Joined
Jun 2, 2013
Messages
299
Trophies
0
XP
279
Country
United States
Hi @d0k3,
If I manually added the TWL Customer ID (taken from the Decrypt9.log or looking at screen output when decrypting stuff) to the end of my otp.bin with a hex editor, would this yield a valid otp0x108.bin?
 

Xenosaiga

Time to switch it up
Member
Joined
Oct 9, 2015
Messages
1,501
Trophies
0
Age
34
Location
The Shadows
XP
1,080
Country
United States
That was the problem, thank you for pointing me in the right direction. I found the aureinand guide to be a bit messy which is why I missed it.
Here's a tip. Once you get into your Homebrew menu using browserhax on the 9.2 stadium launch (L button) go ahead and install the Homebrew launcher.cia using FBI.3dsx.

Saves the hassle of having to launch browserhax if and when you have to access Homebrew again.
 

hirvimies

Well-Known Member
Newcomer
Joined
Dec 5, 2015
Messages
70
Trophies
0
XP
154
Country
Finland
Here's a tip. Once you get into your Homebrew menu using browserhax on the 9.2 stadium launch (L button) go ahead and install the Homebrew launcher.cia using FBI.3dsx.

Saves the hassle of having to launch browserhax if and when you have to access Homebrew again.

Yes, already got it on my emunand but haven't touched my sysnand since setting it all up. Might install it there if I feel the need to access HBL from sysnand frequently. Thanks for the tip.
 

d0k3

3DS Homebrew Legend
OP
Member
Joined
Dec 3, 2004
Messages
2,786
Trophies
1
XP
3,896
Country
Germany
No problem, I'm posting the decrypt9.log then.

Code:
Searching title "Health&Safety"...
Method 1: Search in title.db...
Found title 0004001000021300
TMD0 found at 0DF60000, size 2868b
APP0 found at 13AC4000, size 832kB
Use arrow keys and <A> to choose a name
hs.app
Dumping & decrypting APP0...
Creating hs.app ...
Code / Crypto: CTR-N-HACE / Standard
Decrypt ExHdr/ExeFS/RomFS (2kB/657kB/0MB)
Verify ExHdr/ExeFS/RomFS: OK/OK/OK
Health&Safety Dump: succeeded!

Press B to return, START to reboot.

Unmounting SD card...

You selected "Health&Safety Inject".
This feature writes to the SysNAND.
Doing this is potentially dangerous!

If you wish to proceed, enter:
<Left>, <Up>, <Right>, <Up>, <A>

(B to return, START to reboot)

Searching title "Health&Safety"...
Method 1: Search in title.db...
Found title 0004001000021300
TMD0 found at 0DF60000, size 2868b
APP0 found at 13AC4000, size 832kB
Use arrow keys and <A> to choose a file
hs.app
Opening hs.app ...
Creating hs.enc ...
Code / Crypto: CTR-N-HACE / Standard
Encrypt ExHdr/ExeFS/RomFS (2kB/657kB/0MB)
Injecting H&S app...
Opening hs.enc ...
Fixing TMD...
Health&Safety Inject: succeeded!

Press B to return, START to reboot.
Thanks for posting this! And you ran it from several entrypoints, including SysNAND you say? This log looks to be from a proper injection from SysNAND. Note the sizes ("Decrypt ExHdr/ExeFS/RomFS (2kB/657kB/0MB)")? This (2kB + 657kB) is smaller than the original size of the hs.app (832kB). When you start it from SysNAND, you say that still the original Health and Safety app will run? What region is your 3DS, and is there any chance this is from a region swapped 3DS console (in that case, what was the old region?)?

2 CIA files succeeded with this option, but I have a "Import failed" while installing the 2 cia output files with BBM on emunands 9.2 and 10.6.
That problem is not in Decrypt9. If the CIA files succeeded, the hashes were also checked, meaning everything went fine.

@everyone, do you know/have a tutorial to cryptofix an eShop game?
A tutorial?! Put your files into the D9Game / Decrypt9 folder, run "CIA Decryptor (deep)" (for CIAs) "NCCH Decryptor" (for NCCH), done. Is this enough of a tutorial, no? :P For CIAs to work on GW, you need to process them with "CIA Decryptor (CXI only)" instead of "CIA Decryptor (deep)", though.

Hi @d0k3,
If I manually added the TWL Customer ID (taken from the Decrypt9.log or looking at screen output when decrypting stuff) to the end of my otp.bin with a hex editor, would this yield a valid otp0x108.bin?
Yup, that will work. Good idea! Maybe spread this around to everyone whining around having to go through the whole process of downgrading / dumping again now?

Well as my experience goes decrypt9 has issues working from emunand.
Maybe. It was never designed to work from there. Can you tell me what issues you encountered?
 

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
  • No one is chatting at the moment.
    K3Nv2 @ K3Nv2: Gay history is serious +1