Difference between revisions of "Xyzzy"
Jump to navigation
Jump to search
(xyzzy is still useful for dumping keys in human readable format.) |
Hallowizer (talk | contribs) (updated version number and changed download link to github) |
||
(3 intermediate revisions by the same user not shown) | |||
Line 4: | Line 4: | ||
| description = Key extractor | | description = Key extractor | ||
| type = system tool | | type = system tool | ||
− | | version = 1. | + | | version = 1.3.2 |
| author = [[User:Bushing|bushing]], DarkMatterCore | | author = [[User:Bushing|bushing]], DarkMatterCore | ||
| license = GPLv2 | | license = GPLv2 | ||
− | | download = https:// | + | | download = https://github.com/DarkMatterCore/xyzzy-mod/releases |
| source = https://github.com/DarkMatterCore/xyzzy-mod | | source = https://github.com/DarkMatterCore/xyzzy-mod | ||
| peripherals = {{Wiimote1}} | | peripherals = {{Wiimote1}} | ||
Line 13: | Line 13: | ||
}} | }} | ||
− | '''xyzzy''' is a homebrew application which originally used [[PatchMii]] to download, patch, and use a version of IOS to extract the OTP Encryption keys for the [[Wii]]. The current mod now disables HW_AHBPROT, so it doesn't install an [[IOS]] anymore nor does it use PatchMii. It also supports USB devices, newer Wiimotes and GameCube controllers. | + | '''xyzzy''' is a homebrew application which was meant as a replacement for the [[Tweezer Attack]]. It originally used [[PatchMii]] to download, patch, and use a version of IOS to extract the OTP Encryption keys for the [[Wii]]. The current mod now disables HW_AHBPROT, so it doesn't install an [[IOS]] anymore nor does it use PatchMii. It also supports USB devices, newer Wiimotes and GameCube controllers. |
== Keys extracted == | == Keys extracted == | ||
xyzzy extracts the OTP and SEEPROM encryption keys of the Wii and the vWii. It can also extract the SD IV, MD5 Blanker and MAC address of the Wii. They are stored in SD://keys.txt, and the device certificate is stored in SD://device.cert (or on a USB device if selected). On the Wii U, the [https://wiiubrew.org/wiki/Ancast_Image ancast image] is also dumped. | xyzzy extracts the OTP and SEEPROM encryption keys of the Wii and the vWii. It can also extract the SD IV, MD5 Blanker and MAC address of the Wii. They are stored in SD://keys.txt, and the device certificate is stored in SD://device.cert (or on a USB device if selected). On the Wii U, the [https://wiiubrew.org/wiki/Ancast_Image ancast image] is also dumped. | ||
+ | |||
+ | {{Navbox fail0verflow}} |
Latest revision as of 02:04, 19 July 2022
xyzzy | |
![]() | |
General | |
---|---|
Author(s) | bushing, DarkMatterCore |
Type | System tool |
Version | 1.3.2 |
License | GPLv2 |
Links | |
Download | |
Source | |
Downloadable via the Open Shop Channel | |
Peripherals | |
![]() |
xyzzy is a homebrew application which was meant as a replacement for the Tweezer Attack. It originally used PatchMii to download, patch, and use a version of IOS to extract the OTP Encryption keys for the Wii. The current mod now disables HW_AHBPROT, so it doesn't install an IOS anymore nor does it use PatchMii. It also supports USB devices, newer Wiimotes and GameCube controllers.
Keys extracted
xyzzy extracts the OTP and SEEPROM encryption keys of the Wii and the vWii. It can also extract the SD IV, MD5 Blanker and MAC address of the Wii. They are stored in SD://keys.txt, and the device certificate is stored in SD://device.cert (or on a USB device if selected). On the Wii U, the ancast image is also dumped.
|