Wii U Взлом Wii U

Тема в разделе "Switch", создана пользователем ScooloV, 7 июн 2011.

  1. dimm

    dimm Administrator Команда форума

    Сообщения:
    20.705
    Симпатии:
    5.900
    Баллы:
    623
    Ну ты прицепился =) Покупал все интересные мне игры сразу, вот и неинтересен был взлом. С 3DS и Gateway так и не "разбирался" на сегодняшний день =))) А с 4.0 можно было еще посидеть, Mario 3D World, Pikmin 3 запускается, а более "свежие" игры еще в пленке лежат =)) Хотя я покупал кое-что в ишопе, поэтому приходилось обновлятся. Не жалею, осталось 5 игр купить и все =)
    Эксплоит для 5.50 поэтому и не выкладывают, ждут ответного удара Нинки.
     
  2. Steve

    Steve Well-Known Member

    Сообщения:
    6.203
    Симпатии:
    1.709
    Баллы:
    523
    Мда,придется ждать следующей проши от нины......смотрю там началась борьба кто кого пересидит,ну че не впервой,все равно доломают,а нет ,так даунгрейдить начнут или еще че ))
     
    Последнее редактирование: 5 ноя 2015
  3. dimm

    dimm Administrator Команда форума

    Сообщения:
    20.705
    Симпатии:
    5.900
    Баллы:
    623
    Хорошие новости для Свайна (надеюсь он хоть читает нас) унд компани, ожидающих это событие.
    Хакер Hуkem обещает хак (exploit) Wii U на паршивке 5.5.0 к Рождеству или чуть позже:
    Upcoming Wii U hack for firmware 5.5.0 announced for Christmas
    Hykem, known for his hacking work on many, many consoles, just confirmed he’ll try to release a Christmas present for Wii U owners. He’s clarified today on GBATemp that he has an exploit running on IOSU, up to firmware 5.5.0, the latest and greates Wii U Firmware.

    Wait, what’s IOSU on the Wii U?
    Alright, for those of us not familiar with Wii U hacking, IOSU is basicallly the operating system of the Wii U when it runs in Wii U mode. It’s what we could compare to the “native” world on the PS Vita per opposition to the PSP Emu. In particular, IOSU is responsible for security checks on the Wii U, verifying that you’re not trying to run unsigned code, etc.

    Hykem’s exploit on Wii U 5.5.0
    Hykem confirmed he compromised IOSU, and that his exploit works up to firmware 5.5.0. His exploit does not require PPC Kernel access, which means kernel exploits won’t need to be revealed for this one to work. (in other words, the Wii U scene has several aces up its sleeves and won’t need to reveal all of them at once).

    Hykem wants to release the exploit for Christmas, but he points out there is still lots of work to do, specifically:
    • Port the exploit to all firmwares where it makes sense (I’d say that it’s most important to release it for the latest firmware first?)
    • Obfuscate the exploit so that Nintendo have a hard(er) time patching it, giving more time for users to be aware of the exploit release.
    • Add mechanisms to the exploit so that people don’t update by mistake. This probably means an option set by default to block auto updates and block specific Nintendo addresses such as nus.c.shop.nintendowifi.net
    So, at this point there’s no guarantee this will be released exactly on December 24, but Hykem’s confirmed the exploit and his intent to meet this deadline. His full statement:

    The following statements are facts:
    – I have successfully compromised the Wii U’s IOSU;
    – The exploit being used works from 2.0.0 up to 5.5.0, but it obviously needs to be ported for each firmware;
    – The exploit doesn’t need PPC kernel access, so the new kernel exploit won’t have to be released.

    I want to do some kind of Christmas surprise yes, but take that with a grain of salt. I can’t promise I will have the time to get everything ready by then and I’m not disclosing what will be released.
    Keep in mind that releasing the exploit “as-is” is pointless, so it will have to be ported first and most likely obfuscated so it will take a little longer to patch. It’s also worth noting that I will have to develop an easy way to block updates so no one updates past 5.5.0 by accident.

    If you don’t believe in anything stated above, that’s not my problem. The best (and easiest) thing to do is wait and see.
    http://wololo.net/2015/12/17/upcoming-wii-u-hack-for-firmware-5-5-0-announced-for-christmas/
    Таже эта инфа подтверждена на GBATEMP:
    https://gbatemp.net/threads/wii-u-hacking-homebrew-discussion.367489/page-672

    Хак предусмотрит защиту от обновлений прошивки выше 5.5.0, так что можно будет не волноваться за случайный апдейт.
     
    RussianSwine нравится это.
  4. dimm

    dimm Administrator Команда форума

    Сообщения:
    20.705
    Симпатии:
    5.900
    Баллы:
    623
    Не успевает Hykem подготовить exploit для взлома 5.5.0 до дедлайна 25.12.2015. Работы продолжаются, страждущим придется подождать недельку-две:
    http://wololo.net/2015/12/24/wii-u-hack-hykems-iosu-exploit-on-5-5-0-slightly-delayed/
     
  5. dimm

    dimm Administrator Команда форума

    Сообщения:
    20.705
    Симпатии:
    5.900
    Баллы:
    623
    Взлом 5.5.0 еще чутка отложен, но до февраля аффтар божится выложить тулзы и инструкции. Дополнительное время нужно автору для исследования найденного им нового бага в MCP модуле, расширения функционала искплоита и может быть, более быстрого создания полноценной кастомной прошивки Ю (cIOSU):
    https://gbatemp.net/threads/wii-u-hacking-homebrew-discussion.367489/page-704#post-5893883
     
  6. RussianSwine

    RussianSwine Главный по нафталину

    Сообщения:
    8.727
    Симпатии:
    2.704
    Баллы:
    523
    К выходу NX управятся небось)
     
  7. dimm

    dimm Administrator Команда форума

    Сообщения:
    20.705
    Симпатии:
    5.900
    Баллы:
    623
    Ждуны хака на 5.5.0 смотрите не обновитесь на 5.5.1, которая сегодня вышла весом 47 гигов:
    И неизвестно, что она там фиксит, может дыры браузера. Тогда сэй тю-тю новому эксплоиту =)

    P.S. И точно фиксит браузер (и вроде как эксплоит на базе запуска mp4-файла уже не работает на их тестовой машине):

    Update-details generation datetime: 2016-01-11 18:13:20-06:00

    The below changes, if any, are only for the current title-versions: this is *not* a diff for previous_version->current_version. The below output, if any, includes vuln-scanning via hashing: whether code gets flagged for manual-code-RE depends on whether the ropgadget_patternfinder tool fails to find the target code or not. The script for this has to be updated each time the code being checked for gets updated, otherwise in later sysupdates it will always detect that the previously updated code was 'updated' in newer sysupdates.

    mvplayer.rpl, with: title=internetbrowser version=v241 region=EUR
    The exact code for stsc handling was not found, manual code RE is required(the code was probably updated).
    The exact code for tx3g handling was not found, manual code RE is required(the code was probably updated).
    Total detected vuln-related code changes, for already known vulns: 2

    mvplayer.rpl, with: title=internetbrowser version=v241 region=JPN
    The exact code for stsc handling was not found, manual code RE is required(the code was probably updated).
    The exact code for tx3g handling was not found, manual code RE is required(the code was probably updated).
    Total detected vuln-related code changes, for already known vulns: 2

    mvplayer.rpl, with: title=internetbrowser version=v241 region=USA
    The exact code for stsc handling was not found, manual code RE is required(the code was probably updated).
    The exact code for tx3g handling was not found, manual code RE is required(the code was probably updated).
    Total detected vuln-related code changes, for already known vulns: 2
    ************************************************************************
    ********************** WiiU System Update Report ***********************
    ************************************************************************

    Region: EUR

    Titles added: 0
    Titles changed: 2
    Titles removed: 0

    ************************** SUMMARY OF CHANGES **************************

    ====== Titles Changed ======

    Unknown title type
    Title ID: 00050010-10041200
    Version: 0x 220
    Size: 70340
    Contents: 4 (of which 0 are shared)

    Unknown title type
    Title ID: 00050030-1001220a
    Version: 0x f1
    Size: 60588152
    Contents: 29 (of which 0 are shared)



    **************************** DETAILED DUMPS ****************************


    ====== Titles Changed ======

    Unknown title type
    Title ID: 00050010-10041200
    Version: 0x220
    Size: 70340
    TMD:
    Versions: 1, CA CRL 0, Signer CRL 0, System 00050010-1000800a
    Title ID: 00050010-10041200 ('\x00\x05\x00\x10'-'\x10\x04\x12\x00')
    Title Type: 256
    Group ID: '\x00\x00'
    Access Rights: 0x00000000
    Title Version: 0x220
    Boot Index: 1
    Hash table hash: 5f e8 ff 36 54 e6 43 db 16 5b 29 c6 2e 3e 75 c9 9d 61 8a fe d8 77 a8 33 78 f2 23 2b 33 da e4 77 [OK]
    Content records hash: fc 27 6e 5a 04 23 b9 ad 67 15 62 72 19 3e 67 79 26 43 7a 32 e6 a8 2c d3 f3 99 47 84 74 ee 1a 54 [OK]
    Contents:
    ID Index Type Size Hash
    00000068 0 0x2001 0x130 11 bf d3 bc e2 e0 d9 5f 71 19 64 87 c9 9c 9b bd e6 86 fe de 00 00 00 00 00 00 00 00 00 00 00 00
    0000007B 1 0x2001 0x28a 86 7e 1b 06 f3 2f de 79 40 52 94 0d 18 c9 2c 77 8c 17 43 19 00 00 00 00 00 00 00 00 00 00 00 00
    0000005C 2 0x2001 0xee9 48 96 dc 0b 06 77 e1 76 f5 09 d5 11 b4 89 05 14 88 6c 51 bf 00 00 00 00 00 00 00 00 00 00 00 00
    0000007C 3 0x2003 0x10000 95 86 50 3c 89 5f 18 4f 9c 37 de ac 49 11 19 9e c6 69 54 c2 00 00 00 00 00 00 00 00 00 00 00 00
    TMD signed by Root-CA00000003-CP0000000b using RSA-2048-SHA256: dd bc 7b ef 19 5c 9c c3 23 40 78 7c e3 70 c6 d7 c6 46 6a 94 9f b6 64 53 d1 98 b7 33 c2 43 b2 a4 [OK]
    TMD Certificates:
    - CP0000000b (RSA-2048-SHA256)
    Certificate signed by Root-CA00000003 using RSA-2048-SHA256: c4 38 25 fc c8 65 da 67 87 f6 81 22 d3 04 0c e2 a1 39 12 72 86 01 16 dc c8 5c 03 1f 3e 2c 34 ab [OK]
    - CA00000003 (RSA-2048-SHA256)
    Certificate signed by Root using RSA-4096-SHA256: a4 a8 83 9a d7 0e 7a b8 03 eb 6d df 8b 34 1c b5 12 2f e4 78 fc a0 13 b8 03 a9 3e 14 10 53 50 bb [OK]
    ETicket:
    Title ID: '\x00\x05\x00\x10\x10\x04\x12\x00'
    Title key IV: 00 05 00 10 10 04 12 00 00 00 00 00 00 00 00 00
    Title key (encrypted): 98 ca 32 de a9 e9 d1 61 01 64 3c 4f fe 53 95 ad
    Common key index: 0
    ETicket signed by Root-CA00000003-XS0000000c using RSA-2048-SHA256: 4f 3a 9f 96 89 d7 ae fd c2 68 47 77 c5 50 fc 62 fc 09 15 28 b0 94 47 84 e6 0b 06 b8 d7 21 7f 72 [OK]
    ETicket Certificates:
    - XS0000000c (RSA-2048-SHA256)
    Certificate signed by Root-CA00000003 using RSA-2048-SHA256: bc 2d ff db 43 a5 c2 03 2b 1f e6 93 40 37 4e 13 1d 09 17 97 e3 f3 10 5e 74 1a ae 0b 94 24 6a 42 [OK]
    - CA00000003 (RSA-2048-SHA256)
    Certificate signed by Root using RSA-4096-SHA256: a4 a8 83 9a d7 0e 7a b8 03 eb 6d df 8b 34 1c b5 12 2f e4 78 fc a0 13 b8 03 a9 3e 14 10 53 50 bb [OK]

    Unknown title type
    Title ID: 00050030-1001220a
    Version: 0xf1
    Size: 60588152
    TMD:
    Versions: 1, CA CRL 0, Signer CRL 0, System 00050010-1000400a
    Title ID: 00050030-1001220a ('\x00\x05\x000'-'\x10\x01"\n')
    Title Type: 256
    Group ID: '\x04\x00'
    Access Rights: 0x00000000
    Title Version: 0xf1
    Boot Index: 0
    Hash table hash: 83 92 06 3f a3 81 1a be 01 73 6f f0 a4 89 1a be c9 ad 76 6f 41 06 fe c6 4b 76 b8 21 8e 9e 92 55 [OK]
    Content records hash: e2 76 08 47 65 5e 89 22 5f a3 eb 17 7e 63 4e 6b ce 72 3c a2 8d 4a d9 e9 38 c9 5d 09 3e bd 55 32 [OK]
    Contents:
    ID Index Type Size Hash
    00000230 0 0x2001 0x8000 eb a0 33 e4 d0 f8 81 20 3a 2a 68 0b d9 63 4a a1 06 21 e8 ba 00 00 00 00 00 00 00 00 00 00 00 00
    00000231 1 0x2001 0x8000 de 68 47 07 63 9f 73 5f 50 a1 8a 5e a2 bd b4 8a 6c 7a 7f 08 00 00 00 00 00 00 00 00 00 00 00 00
    00000232 2 0x2001 0x8000 a6 d0 78 d6 12 10 9a f2 a0 72 8b b8 6d 1f a8 b6 55 8b 0a c4 00 00 00 00 00 00 00 00 00 00 00 00
    00000233 3 0x2003 0x30000 21 a1 3a b3 b2 34 46 a8 a5 05 bb 0f 75 68 2b 8c 63 84 4b e0 00 00 00 00 00 00 00 00 00 00 00 00
    00000148 4 0x2003 0xb30000 d0 8c 66 82 b3 32 38 54 85 6e 46 72 82 51 e9 56 c1 3e 9f ad 00 00 00 00 00 00 00 00 00 00 00 00
    00000149 5 0x2003 0x110000 57 a6 ad 92 13 57 a4 75 31 78 60 34 b0 6c 17 48 0f e2 62 75 00 00 00 00 00 00 00 00 00 00 00 00
    0000014A 6 0x2003 0x110000 c0 22 bb 30 df 81 cb 1c 4b 44 59 2e 1f f0 b2 ca 04 10 40 e8 00 00 00 00 00 00 00 00 00 00 00 00
    0000014B 7 0x2003 0x1870000 7b ce 92 83 89 bd d7 85 93 de b7 0b 74 ff ba 24 a8 c5 85 a7 00 00 00 00 00 00 00 00 00 00 00 00
    00000234 8 0x2001 0x400000 ff 9c 5f 28 91 41 5c 22 04 22 b9 4a 00 34 05 37 b5 6f 00 e8 00 00 00 00 00 00 00 00 00 00 00 00
    00000235 9 0x2001 0x8000 75 fa 31 81 e4 0f 91 99 f3 5d 1e 8d 01 5f a5 ba b7 d1 8c 11 00 00 00 00 00 00 00 00 00 00 00 00
    00000236 10 0x2001 0x18000 bc 3d 66 0f db 86 be 6d 77 19 03 f7 cd cc a4 57 ea c8 e1 20 00 00 00 00 00 00 00 00 00 00 00 00
    00000237 11 0x2001 0x20000 3a f4 f1 f4 3e 38 8f aa fe 76 56 f7 fa c0 e4 e0 c0 46 91 f8 00 00 00 00 00 00 00 00 00 00 00 00
    00000238 12 0x2001 0x48000 8f 53 60 f0 3a 66 13 c1 55 28 ed 1c d0 36 e7 49 41 3d 9c af 00 00 00 00 00 00 00 00 00 00 00 00
    00000239 13 0x2001 0x868000 71 fe ba ed 45 44 65 9c 4b 8a 8a cf aa 7f 8b 1f 43 b9 29 1f 00 00 00 00 00 00 00 00 00 00 00 00
    0000023A 14 0x2001 0x78000 59 40 65 5c 3f 9a 43 94 5f 6a 4b 40 51 4d 35 3e 9a ab dc 38 00 00 00 00 00 00 00 00 00 00 00 00
    00000153 15 0x2001 0x8000 f7 bb 3c d4 c3 5a 5f 98 e1 41 b1 85 e6 5c 61 e8 50 f5 2f 60 00 00 00 00 00 00 00 00 00 00 00 00
    0000023B 16 0x2001 0x8000 99 87 83 6d 37 7f 70 c4 71 25 37 27 2b a6 7d fe 62 45 bb ef 00 00 00 00 00 00 00 00 00 00 00 00
    0000023C 17 0x2001 0x10000 5e f9 99 5b 2e c3 96 a5 b6 9a b2 fc 43 b1 18 af 06 5f c4 7f 00 00 00 00 00 00 00 00 00 00 00 00
    0000023D 18 0x2001 0x20000 d6 8e 1e a8 e0 45 9c 09 71 ef 32 1d 5b 89 95 17 f6 06 a2 07 00 00 00 00 00 00 00 00 00 00 00 00
    0000023E 19 0x2001 0x38000 09 ce 1b 90 0e f2 63 f9 a6 d6 d6 f8 be 4f 5c 9d ca ec ed 38 00 00 00 00 00 00 00 00 00 00 00 00
    0000023F 20 0x2001 0x28000 98 24 25 59 2c 1e 4c 3d 9b f7 72 08 af fb c1 34 7f 15 ea 35 00 00 00 00 00 00 00 00 00 00 00 00
    00000240 21 0x2001 0x10000 6a 4d 92 34 21 ac 70 70 0b fc 25 cc 2d a1 52 6c d6 a8 a2 32 00 00 00 00 00 00 00 00 00 00 00 00
    00000241 22 0x2001 0x58000 43 4c 40 8a 1e b5 a9 2c db 29 1a c1 30 0d f5 d4 49 a3 9c f8 00 00 00 00 00 00 00 00 00 00 00 00
    00000242 23 0x2001 0x30000 1b cc 53 c0 5f ee 90 c9 32 2c 33 c4 55 92 5b 3a 5f 8c 7d 68 00 00 00 00 00 00 00 00 00 00 00 00
    00000243 24 0x2001 0x90000 b7 61 f8 8b 5d b8 63 2b 4e 2f a6 cd 50 3e 92 18 77 f9 9a 21 00 00 00 00 00 00 00 00 00 00 00 00
    00000244 25 0x2001 0x28000 25 f6 fc 86 ee df 5c 05 42 8a 27 02 77 6b 9b c8 0a 2c ee da 00 00 00 00 00 00 00 00 00 00 00 00
    00000245 26 0x2001 0x20000 a0 7b f7 56 c7 33 f0 f5 94 d1 b0 0f 5a e6 24 e5 5f 06 9a d6 00 00 00 00 00 00 00 00 00 00 00 00
    00000246 27 0x2001 0x8000 89 d3 a0 c7 40 5b 86 f4 b3 d2 fe a8 78 d9 03 01 ff 7f c0 d8 00 00 00 00 00 00 00 00 00 00 00 00
    00000203 28 0x2003 0x440000 2c 02 ef 41 5c 62 88 51 1a 9f 5d 7d 0e aa e1 1f dd 88 eb b4 00 00 00 00 00 00 00 00 00 00 00 00
    TMD signed by Root-CA00000003-CP0000000b using RSA-2048-SHA256: 3d 20 72 cd 18 09 fe 7c 2d fc 9f 1f 9b 7a 7d de a1 c1 d8 e5 46 e5 1c 5d 2e c8 bd c0 d8 89 cc 13 [OK]
    TMD Certificates:
    - CP0000000b (RSA-2048-SHA256)
    Certificate signed by Root-CA00000003 using RSA-2048-SHA256: c4 38 25 fc c8 65 da 67 87 f6 81 22 d3 04 0c e2 a1 39 12 72 86 01 16 dc c8 5c 03 1f 3e 2c 34 ab [OK]
    - CA00000003 (RSA-2048-SHA256)
    Certificate signed by Root using RSA-4096-SHA256: a4 a8 83 9a d7 0e 7a b8 03 eb 6d df 8b 34 1c b5 12 2f e4 78 fc a0 13 b8 03 a9 3e 14 10 53 50 bb [OK]
    ETicket:
    Title ID: '\x00\x05\x000\x10\x01"\n'
    Title key IV: 00 05 00 30 10 01 22 0a 00 00 00 00 00 00 00 00
    Title key (encrypted): 25 22 40 64 89 04 bb 4e 1f 42 e8 56 f7 cf 9e d5
    Common key index: 0
    ETicket signed by Root-CA00000003-XS0000000c using RSA-2048-SHA256: b3 66 2d 3d 0b c5 ee ee 81 0e 0a 68 7b 37 da 5b 61 04 5c 73 4e 78 dd 37 8b b7 d3 fb 01 83 3f b6 [OK]
    ETicket Certificates:
    - XS0000000c (RSA-2048-SHA256)
    Certificate signed by Root-CA00000003 using RSA-2048-SHA256: bc 2d ff db 43 a5 c2 03 2b 1f e6 93 40 37 4e 13 1d 09 17 97 e3 f3 10 5e 74 1a ae 0b 94 24 6a 42 [OK]
    - CA00000003 (RSA-2048-SHA256)
    Certificate signed by Root using RSA-4096-SHA256: a4 a8 83 9a d7 0e 7a b8 03 eb 6d df 8b 34 1c b5 12 2f e4 78 fc a0 13 b8 03 a9 3e 14 10 53 50 bb [OK]


    ***************************** MESSAGE LOG *****************************
    00:07:07 [check] INFO: Wiimpersonator: Check invoked for dev wiiu region EUR
    00:07:07 [soap] INFO: Checking for updates...
    00:07:09 [soap] INFO: Title ID Version FsSize
    00:07:09 [soap] INFO: 00050010-10000100 20b9 131072
    00:07:09 [soap] INFO: 00050010-10000200 190c 922308
    00:07:09 [soap] INFO: 00050010-10000400 0205 42208
    00:07:09 [soap] INFO: 00050010-10004000 0001 799072
    00:07:09 [soap] INFO: 00050010-10004001 000c 751584
    00:07:09 [soap] INFO: 00050010-10004009 03ee 16163056
    00:07:09 [soap] INFO: 00050010-1000400A 3d56 23567088
    00:07:09 [soap] INFO: 00050010-100040FF 083c 16189936
    00:07:09 [soap] INFO: 00050010-10040200 00c4 102334584
    00:07:09 [soap] INFO: 00050010-10041200 0220 70340
    00:07:09 [soap] INFO: 00050010-10043200 190c 3019460
    00:07:09 [soap] INFO: 00050010-10044200 1702 58397572
    00:07:09 [soap] INFO: 00050010-10045200 0061 16154724
    00:07:09 [soap] INFO: 00050010-10047200 00b2 64880760
    00:07:09 [soap] INFO: 00050010-10048200 0089 37486712
    00:07:09 [soap] INFO: 00050010-10049200 0067 39125112
    00:07:09 [soap] INFO: 00050010-1004A200 0032 81854584
    00:07:09 [soap] INFO: 00050010-1004B200 0041 30277732
    00:07:09 [soap] INFO: 00050010-1004C200 0035 34046072
    00:07:09 [soap] INFO: 00050010-1004D200 0055 30376056
    00:07:09 [soap] INFO: 00050010-1004E200 0081 18677860
    00:07:09 [soap] INFO: 00050010-1005A200 0037 89030776
    00:07:09 [soap] INFO: 00050010-10062200 002a 68485240
    00:07:09 [soap] INFO: 00050010-10066000 0014 4379444
    00:07:09 [soap] INFO: 0005001B-10042300 0022 70276
    00:07:09 [soap] INFO: 0005001B-10042400 0000 26480916
    00:07:09 [soap] INFO: 0005001B-1004F000 0030 25696996
    00:07:09 [soap] INFO: 0005001B-10050000 0042 136148
    00:07:09 [soap] INFO: 0005001B-10051000 0074 1315572
    00:07:09 [soap] INFO: 0005001B-10052000 0040 3481380
    00:07:09 [soap] INFO: 0005001B-10053000 0030 136260
    00:07:09 [soap] INFO: 0005001B-10054000 0014 138340
    00:07:09 [soap] INFO: 0005001B-10056000 0001 10883524
    00:07:09 [soap] INFO: 0005001B-10057000 0000 1773924
    00:07:09 [soap] INFO: 0005001B-10058000 0033 856788
    00:07:09 [soap] INFO: 0005001B-10059200 00a2 8655140
    00:07:09 [soap] INFO: 0005001B-1005C000 0010 70068
    00:07:09 [soap] INFO: 0005001B-1005F000 0010 5088
    00:07:09 [soap] INFO: 0005001B-10063000 0030 84292
    00:07:09 [soap] INFO: 0005001B-10065000 0001 70100
    00:07:09 [soap] INFO: 0005001B-10067200 0010 70356
    00:07:09 [soap] INFO: 0005001B-10068000 0008 70388
    00:07:09 [soap] INFO: 0005001B-10069200 0000 70276
    00:07:09 [soap] INFO: 0005001B-1006C000 0000 70276
    00:07:09 [soap] INFO: 00050030-10010209 0000 21069964
    00:07:09 [soap] INFO: 00050030-1001020A 00b4 24903800
    00:07:09 [soap] INFO: 00050030-10011209 0000 4453492
    00:07:09 [soap] INFO: 00050030-1001120A 0064 4424676
    00:07:09 [soap] INFO: 00050030-100112FF 0047 4423908
    00:07:09 [soap] INFO: 00050030-1001220A 00f1 60588152
    00:07:09 [soap] INFO: 00050030-1001320A 0051 33390692
    00:07:09 [soap] INFO: 00050030-1001420A 0083 36241508
    00:07:09 [soap] INFO: 00050030-1001520A 0079 36012152
    00:07:09 [soap] INFO: 00050030-1001620A 0071 37355620
    00:07:09 [soap] INFO: 00050030-10017209 0010 16711780
    00:07:09 [soap] INFO: 00050030-1001720A 0044 16547940
    00:07:09 [soap] INFO: 00050030-1001820A 0060 18841700
    00:07:09 [soap] INFO: 00050030-1001920A 0091 20971640
    00:07:09 [soap] INFO: 00050030-1001A10A 0031 18776164
    00:07:09 [soap] INFO: 00050030-1006D20A 0018 19398756
    00:07:09 [soap] INFO: Comparing update with previous...
    00:07:09 [soap] INFO: 0 added, 0 removed, 2 changed
    00:07:09 [check] INFO: Update detected.
    00:07:09 [check] INFO: Downloading new titles...
    00:07:09 [check] INFO: Downloading changed titles...
    00:07:09 [title.0005001010041200] INFO: Dowloading all data...
    00:07:09 [title.0005001010041200] INFO: Downloading file http://nus.cdn.shop.wii.com/ccs/download/0005001010041200/tmd.544
    00:07:09 [title.0005001010041200] INFO: cetk already in cache
    00:07:09 [title.0005001010041200] INFO: 00000068 already in cache
    00:07:09 [title.0005001010041200] INFO: Downloading file http://nus.cdn.shop.wii.com/ccs/download/0005001010041200/0000007B
    00:07:10 [title.0005001010041200] INFO: 0000005C already in cache
    00:07:10 [title.0005001010041200] INFO: Downloading file http://nus.cdn.shop.wii.com/ccs/download/0005001010041200/0000007C
    00:07:10 [title.0005001010041200] INFO: Downloading file http://nus.cdn.shop.wii.com/ccs/download/0005001010041200/0000007C.h3
    00:07:10 [title.000500301001220a] INFO: Dowloading all data...
    00:07:10 [title.000500301001220a] INFO: Downloading file http://nus.cdn.shop.wii.com/ccs/download/000500301001220a/tmd.241
    00:07:10 [title.000500301001220a] INFO: cetk already in cache
    00:07:10 [title.000500301001220a] INFO: Downloading file http://nus.cdn.shop.wii.com/ccs/download/000500301001220a/00000230
    00:07:11 [title.000500301001220a] INFO: Downloading file http://nus.cdn.shop.wii.com/ccs/download/000500301001220a/00000231
    00:07:11 [title.000500301001220a] INFO: Downloading file http://nus.cdn.shop.wii.com/ccs/download/000500301001220a/00000232
    00:07:11 [title.000500301001220a] INFO: Downloading file http://nus.cdn.shop.wii.com/ccs/download/000500301001220a/00000233
    00:07:12 [title.000500301001220a] INFO: Downloading file http://nus.cdn.shop.wii.com/ccs/download/000500301001220a/00000233.h3
    00:07:12 [title.000500301001220a] INFO: 00000148 already in cache
    00:07:12 [title.000500301001220a] INFO: 00000148.h3 already in cache
    00:07:12 [title.000500301001220a] INFO: 00000149 already in cache
    00:07:12 [title.000500301001220a] INFO: 00000149.h3 already in cache
    00:07:12 [title.000500301001220a] INFO: 0000014A already in cache
    00:07:12 [title.000500301001220a] INFO: 0000014A.h3 already in cache
    00:07:12 [title.000500301001220a] INFO: 0000014B already in cache
    00:07:12 [title.000500301001220a] INFO: 0000014B.h3 already in cache
    00:07:12 [title.000500301001220a] INFO: Downloading file http://nus.cdn.shop.wii.com/ccs/download/000500301001220a/00000234
    00:07:21 [title.000500301001220a] INFO: Downloading file http://nus.cdn.shop.wii.com/ccs/download/000500301001220a/00000235
    00:07:22 [title.000500301001220a] INFO: Downloading file http://nus.cdn.shop.wii.com/ccs/download/000500301001220a/00000236
    00:07:22 [title.000500301001220a] INFO: Downloading file http://nus.cdn.shop.wii.com/ccs/download/000500301001220a/00000237
    00:07:23 [title.000500301001220a] INFO: Downloading file http://nus.cdn.shop.wii.com/ccs/download/000500301001220a/00000238
    00:07:23 [title.000500301001220a] INFO: Downloading file http://nus.cdn.shop.wii.com/ccs/download/000500301001220a/00000239
    00:07:39 [title.000500301001220a] INFO: Downloading file http://nus.cdn.shop.wii.com/ccs/download/000500301001220a/0000023A
    00:07:41 [title.000500301001220a] INFO: Downloading file http://nus.cdn.shop.wii.com/ccs/download/000500301001220a/00000153
    00:07:42 [title.000500301001220a] INFO: Downloading file http://nus.cdn.shop.wii.com/ccs/download/000500301001220a/0000023B
    00:07:42 [title.000500301001220a] INFO: Downloading file http://nus.cdn.shop.wii.com/ccs/download/000500301001220a/0000023C
    00:07:42 [title.000500301001220a] INFO: Downloading file http://nus.cdn.shop.wii.com/ccs/download/000500301001220a/0000023D
    00:07:43 [title.000500301001220a] INFO: Downloading file http://nus.cdn.shop.wii.com/ccs/download/000500301001220a/0000023E
    00:07:44 [title.000500301001220a] INFO: Downloading file http://nus.cdn.shop.wii.com/ccs/download/000500301001220a/0000023F
    00:07:44 [title.000500301001220a] INFO: Downloading file http://nus.cdn.shop.wii.com/ccs/download/000500301001220a/00000240
    00:07:45 [title.000500301001220a] INFO: Downloading file http://nus.cdn.shop.wii.com/ccs/download/000500301001220a/00000241
    00:07:46 [title.000500301001220a] INFO: Downloading file http://nus.cdn.shop.wii.com/ccs/download/000500301001220a/00000242
    00:07:46 [title.000500301001220a] INFO: Downloading file http://nus.cdn.shop.wii.com/ccs/download/000500301001220a/00000243
    00:07:48 [title.000500301001220a] INFO: Downloading file http://nus.cdn.shop.wii.com/ccs/download/000500301001220a/00000244
    00:07:48 [title.000500301001220a] INFO: Downloading file http://nus.cdn.shop.wii.com/ccs/download/000500301001220a/00000245
    00:07:49 [title.000500301001220a] INFO: Downloading file http://nus.cdn.shop.wii.com/ccs/download/000500301001220a/00000246
    00:07:49 [title.000500301001220a] INFO: 00000203 already in cache
    00:07:49 [title.000500301001220a] INFO: 00000203.h3 already in cache
    00:07:49 [check] INFO: Generating report...
     
    Последнее редактирование: 12 янв 2016
    RussianSwine нравится это.
  8. SnV

    SnV Человек Труда!

    Сообщения:
    14.784
    Симпатии:
    2.692
    Баллы:
    623
    47 гигов апдейт прошивки?! :eek:

    Может там какой-нибудь сюрприз вшит для фанатов. Бесплатная игра ААА-класса, мега-эксклюзив. :D
     
    dimm нравится это.
  9. dimm

    dimm Administrator Команда форума

    Сообщения:
    20.705
    Симпатии:
    5.900
    Баллы:
    623
    Мегов =)))
     
  10. RussianSwine

    RussianSwine Главный по нафталину

    Сообщения:
    8.727
    Симпатии:
    2.704
    Баллы:
    523
    Блин, а там можно было автоапдейт настроить? А то она чет включалась у мння периодически.. небось венюрнусь домой, а там уже новая проша)
     
  11. dimm

    dimm Administrator Команда форума

    Сообщения:
    20.705
    Симпатии:
    5.900
    Баллы:
    623
    Конечно можно в настройках, если горит оранжевый огонек, то что-то обновляется в данный момент, красный - в режиме ожидания =) Но это самому нужно было настраивать, по умолчанию эта фича отключена.
     
  12. RussianSwine

    RussianSwine Главный по нафталину

    Сообщения:
    8.727
    Симпатии:
    2.704
    Баллы:
    523
    У меня горел периодически оранжевый и пад показывал "спец предложения".. видимо сам включил. Но не было бы счастья, да несчастье помогло:
    Screenshot_2016-01-12-13-49-32.png

    Надеюсь успели отрубить)
     
  13. dimm

    dimm Administrator Команда форума

    Сообщения:
    20.705
    Симпатии:
    5.900
    Баллы:
    623
    Свезло так свезло =)
     
  14. dimm

    dimm Administrator Команда форума

    Сообщения:
    20.705
    Симпатии:
    5.900
    Баллы:
    623
    Какой BrowserHax хак вышел для 5.4.0/5.5.0. Но он к сожалению не патчит kernel, то есть годен только для запуска homebrew (игры не запустишь). Haykem со своим кернел-патчером чо-то молчит пока.
    http://wololo.net/2016/01/13/wii-u-browserhax-released-for-5-5-0/
    Кто желает заморочиться, добро пожаловать на страничку Yellows8 на гитхабе:
    https://github.com/yellows8/wiiu_browserhax_fright
     
  15. dimm

    dimm Administrator Команда форума

    Сообщения:
    20.705
    Симпатии:
    5.900
    Баллы:
    623
    [​IMG]
     
  16. dimm

    dimm Administrator Команда форума

    Сообщения:
    20.705
    Симпатии:
    5.900
    Баллы:
    623
    Вышел kernel exploit для прошивок 5.5.0 и 5.5.1. Курить доки можно здесь (там даже видео есть), ничо сложного там нет:
    http://wololo.net/2016/05/03/wii-u-5-5-kernel-exploit-has-been-leaked/
    Или здесь читануть можно, но без видео:
    Wii U 5.5 Kernel exploit has been leaked
    BY WOLOLO · MAY 3, 2016


    The Wii U Kernel exploit for 5.5 that has been left right and center of discussions on the Wii U scene recently, was just leaked a couple of hours ago on GBATemp. This exploit lets you run Loadiine (Wii U backup launcher), Cafiine, and a bunch of other cool tools. The exploit is compatible with (at least) firmwares 5.5.0 and 5.5.1

    Developer @NWPlayer1234, one of the people behind the exploit (along with Marionumber1) has confirmed the leak is the real thing. It’s a full fledged exploit and people have already been confirming they can runLoadiine and other tools with it.

    The leak happens a few days after NWPlayer1234 “suggested” someone leaked the exploit. It turns out one of the exploit’s handful of beta testers who had access to the file probably took the suggestion a bit too seriously.

    Download and use
    You can download the Wii U 5.5 Kernel exploit here.

    Instructions are sparse, but here’s what we could gather from NWPlayer1234:

    1) reverse folder names
    2) delete that dumb WithLove.png
    3) install java 8+
    4) java -jar HaxServer.jar


    And, last but not least, NWPlayer1234 posted video instructions on how to access the file from your console and run the exploit, then how to run loadiine from there:


    To summarize:

    1. Reverse folder names from the download
    2. Install Java 8 or above
    3. Make sure port 80 is not in use (e.g. make sure to quit Skype if you have it on your computer!)
    4. Run hackserver.jar, and make sure it runs correctly[​IMG]
    5. in a Dos command line (“cmd”), type “ipconfig” to get your computer’s ip address
    6. on your Wii: enter your IP address followed by /hax?kexploit31, for example http://192.168.0.1/hax?kexploit31[​IMG]
    7. Click on done and load the page to run the Wii U 5.5 kernel exploit
    [​IMG]

    To run a tool such as Loadiine:

    1. Get the latest Loadiine nightly from the repository
    2. Copy the content on your SD Card in wiiU/apps/loadiine.gx2
    3. Backups on your SDCard need to be prepared as explained on the Loadiine Readme
    4. Run the kexploit10 binary (http://youripaddress/hax?kexploit10)
    5. Run loadiine
    [​IMG]

    Please report success/failure!

    NWPlayer1234 is releasing “how to” videos as I type this so check out the developer’s twitter account below for more details.

    Source: NWPlayer1234


    ВИДЕО УРОКИ:






    И вот еще тема на gbatemp:
    https://gbatemp.net/threads/tutoria...server-loadiine-homebrew-launcher-etc.424948/
     
    RussianSwine и Каин нравится это.
  17. ScooloV

    ScooloV Well-Known Member

    Сообщения:
    3.874
    Симпатии:
    782
    Баллы:
    303
    Получается сейчас любую игру можно на WiiU запустить, или только определённые? А что с Wii/Virtual Console?
     
  18. dimm

    dimm Administrator Команда форума

    Сообщения:
    20.705
    Симпатии:
    5.900
    Баллы:
    623
    Ну те которые под загрузчик Loadiine адаптировали - все. А игры от Wii с самого начала на ВиЮ запускают, софтмод vWii режима делается так же как и на оригинальной Wii. Про VC честно говоря не знаю (так как вообще этим вопросом не занимаюсь).
     
  19. ScooloV

    ScooloV Well-Known Member

    Сообщения:
    3.874
    Симпатии:
    782
    Баллы:
    303
  20. dimm

    dimm Administrator Команда форума

    Сообщения:
    20.705
    Симпатии:
    5.900
    Баллы:
    623
    Вот тут какой-то совсем простой способ взлома. Оставлен оригинальный текст автора =)