Skip to content

Commit

Permalink
Readme: Added info about ticket dumper
Browse files Browse the repository at this point in the history
  • Loading branch information
d0k3 committed Sep 19, 2016
1 parent ea66935 commit 3ecb406
Showing 1 changed file with 3 additions and 1 deletion.
4 changes: 3 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -98,11 +98,13 @@ This category includes all features that generate XORpads. XORpads are not usefu
### Titlekey Options
This category includes all titlekey related features. Decrypted titlekeys (`decTitleKeys.bin`) are used to download software from CDN via the included Python script `cdn_download.py` and [PlaiCDN](https://github.com/Plailect/PlaiCDN). Encrypted titlekeys are used, for the same purpose, by [FunKeyCIA](https://github.com/llakssz/FunKeyCIA/). You may also view the (encrypted or decrypted) titlekeys via `print_ticket_keys.py`.
* __Titlekey Decrypt (file)__: First, generate the `encTitleKeys.bin` via the included Python script `dump_ticket_keys.py` and place it into the `/files9/` work folder. This feature will decrypt the file and generate the `decTitleKeys.bin`, containing the decrypted titlekeys.
* __Titlekey Encrypt (file)__: This feature takes a `decTitleKeys.bin` file and encrypts it to `encTitleKeys.bin`. This is useful to convert between the two formats, to make sure you have the right format for the tools you use.
* __Titlekey Decrypt (SysNAND)__: This will find and decrypt all the titlekeys contained on your SysNAND, without the need for additional tools. The `decTitleKeys.bin` file will be generated on your SD card.
* __Titlekey Decrypt (EmuNAND)__: This will find and decrypt all the titlekeys contained on your EmuNAND, without the need for additional tools. The `decTitleKeys_emu.bin` file will be generated on your SD card.
* __Titlekey Encrypt (file)__: This feature takes a `decTitleKeys.bin` file and encrypts it to `encTitleKeys.bin`. This is useful to convert between the two formats, to make sure you have the right format for the tools you use.
* __Titlekey Dump (SysNAND)__: This will find all the titlekeys contained on your SysNAND and dump them, without the additional step of decryption, to `encTitleKeys.bin`.
* __Titlekey Dump (EmuNAND)__: This will find all the titlekeys contained on your EmuNAND and dump them, without the additional step of decryption, to `encTitleKeys_emu.bin`.
* __Ticket Dump (SysNAND)__: Use this to dump all tickets found inside your SysNAND ticket.db file. Naming scheme for tickets is (commonkey index)-(console id)-(title id).tik. Commonkey index is typically 0 for eShop titles and 1 for system titles, a console id of zero for eShop titles typically means a forged (= non genuine) ticket. Dumped tickets are installable via [FBI](https://github.com/Steveice10/FBI/releases).
* __Ticket Dump (EmuNAND)__: Same as above, but uses the ticket.db file from your EmuNAND.

### SysNAND / EmuNAND Options
This is actually two categories in the main menu, but the functionality provided the same (for SysNAND / EmuNAND respectively). These categories include all features that dump, inject, modify or extract information from/to the SysNAND/EmuNAND. For functions that output files to the SD card, the user can choose a filename from a predefined list. For functions that use files from the SD card for input, the user can choose among all candidates existing on the SD card. For an extra layer of safety, critical(!) features - meaning all features that actually introduce change to the NAND - are protected by a warning message and an unlock sequence that the user has to enter. Caution is adviced with these protected features. They should only be used by the informed user.
Expand Down

0 comments on commit 3ecb406

Please sign in to comment.