hexFW - Wii U的自定义固件框架

网友投稿 705 2022-10-22

hexFW - Wii U的自定义固件框架

hexFW - Wii U的自定义固件框架

hexFW

hexFW is an attempt to provide a user friendly CFW solution for the Wii U.

Summary

The code in this repository is divided into two main folders:

"firmware": IOSU patching framework"launcher": exploit code chain responsible for injecting the patched IOSU image

Currently, iosuhax (by smealum) is the basis for the firmware patching framework. This project's goal is to build upon smealum's patching system to deliver a fully functional and customizable Wii U CFW. The exploit chain used to inject the firmware's code uses yellows8's wiiu_browserhax_fright and is a direct implementation of two distinct vulnerabilities documented by hykem, naehrwert and plutoo. The exploit is compiled using a stripped down version of the libwiiu project and is triggered from the Wii U's Web Browser.

Dependencies

For Windows users: Cygwin, MinGW or a unix-like shell, environment or operating systemdevkitPRO (devkitPPC and devkitARM)armips (for assembling ARM patches; you can find a precompiled Windows binary at https://github.com/hexkyz/armips/releases)Python 2.7.xXAMPP or equivalent for self-hosting (optional)

Building

Open "Keys.txt" with a text editor and replace the dummy keys with the real ones;Copy "armips(.exe)" to the root of the "firmware" folder;Browse back to the main folder ("hexFW") and run "make" from a shell.

Usage

After building the project a new folder "bin" will be created in the root folder ("hexFW") as well as two sub-folders "www" and "sdcard".Copy the "fw.img" file inside "sdcard" into the root of your SD card (FAT32 formatted, preferably).Setup a server (e.g.: localhost:8080) and host the contents of "www". After inserting the SD card (with the firmware image) into the Wii U, browse to "wiiu_browserhax.php" and pass along your target system's version (e.g.: localhost:8080/wiiu_browserhax.php?sysver=550).The launcher will run ("fwboot") and launch the firmware image from the SD card.

hexcore

hexcore is the default program distributed with hexFW. It's code is injected into IOS-MCP and runs in a dedicated thread, similar to how the old wupserver works. Upon launching the generated "fw.img", you will be presented with a barebones recovery console with the following options:

Dump OTP -> Dumps your console's OTP into the SD cardDump SEEPROM -> Dumps your console's SEEPROM into the SD cardDump SLC -> Dumps a raw image of the SLC into the SD cardDump SLCCMPT -> Dumps a raw image of the SLCCMPT into the SD cardDump MLC -> Dumps a raw image of the MLC into the SD cardDump BOOT1+OTP -> Dumps your console's plaintext boot1 binary and the unlocked OTPLaunch wupserver -> Sets up wupserver and proceeds with booting sysNANDShutdown -> Simply shuts the console downCredits -> Displays the credits page for 10 seconds

You can browse the options' list by pressing the "Eject" button and confirm by pressing the "Power" button. Please note that this is still a work in progress and is meant to showcase the potential for a complete CFW solution. More functionalities will be added in time and the general mode of operation may change at any time.

boot1 dumping

In order to dump your console's boot1 binary you have to boot hexFW twice. Launch hexFW and select the option "Dump BOOT1+OTP". This will reboot your console and you'll have to launch hexFW again. The second time you select the "Dump BOOT1+OTP" option, the actual binary will be written to your SD card.

Credits

derrek, yellows8, naehrwert, plutoo and shuffle2 - boot_info vulnerability (http://wiiubrew.org/wiki/Wii_U_System_Flaws#boot1)smealum - iosuhax project (https://github.com/smealum/iosuhax)yellows8 - wiiu_browserhax_fright exploit (https://github.com/yellows8/wiiuhaxx_common and https://github.com/yellows8/wiiu_browserhax_fright)hykem, naehrwert and plutoo - IOS-USB bad array index check (uhshax) vulnerability (http://wiiubrew.org/wiki/Exploits#IOS-USB_bad_array_index_check_.28uhshax.29); IOS_CreateThread unchecked memset vulnerability (http://wiiubrew.org/wiki/Exploits#IOS_CreateThread_unchecked_memset); extensive documentation and research on the Wii Ulibwiiu team - libwiiu framework (https://github.com/wiiudev/libwiiu)FIX94 - fw.img downloader (https://github.com/FIX94/iosuhax/blob/master/bin/getfwimg.py)

版权声明:本文内容由网络用户投稿,版权归原作者所有,本站不拥有其著作权,亦不承担相应法律责任。如果您发现本站中有涉嫌抄袭或描述失实的内容,请联系我们jiasou666@gmail.com 处理,核实后本网站将在24小时内删除侵权内容。

上一篇:2022年8月8日——mybatis的使用(1)
下一篇:模块化的HTML5休闲游戏框架
相关文章

 发表评论

暂时没有评论,来抢沙发吧~