Mike Heskin

1.4K posts

Mike Heskin

Mike Heskin

@hexkyz

Vulnerability researcher, reverse engineer and InfoSec enthusiast. Opinions are my own.

London, England Katılım Ağustos 2016
194 Takip Edilen7.6K Takipçiler
Sabitlenmiş Tweet
Mike Heskin
Mike Heskin@hexkyz·
Insert "It's been 3000 years…" meme here. sha512sum mariko_feks.bin 065ad23e65bae859096ba1f9886a4da5d15a37266bedc2c6e1b2f27e153764b0844a90b1775ad47a0b50dc72c5bbc768027a1868a10de94807ca4e5e828b6872
English
10
26
143
31.8K
Mike Heskin
Mike Heskin@hexkyz·
June 15th comes once again! Atmosphère 1.11.0 is now released: github.com/Atmosphere-NX/… This adds support for 22.0.0. Special thanks to @__alula for their invaluable contributions! Enjoy! :)
English
40
182
1K
48.8K
Mike Heskin
Mike Heskin@hexkyz·
@SciresM It has truly been an honour. Best of luck and godspeed my friend!
English
1
2
176
32.9K
Mike Heskin
Mike Heskin@hexkyz·
@tpu9527 Yes, this seems to have been a staple of theirs for a very long time.
English
0
0
0
209
tpu
tpu@tpu9527·
@hexkyz There have the same vm in gateway3ds firm.
English
1
0
0
251
Mike Heskin
Mike Heskin@hexkyz·
Thanks to the great work done by 15432, we can finally decrypt the MIG flashcart firmware code. Here's what we've learned so far (1/9). github.com/15432/mig_rese…
English
5
18
88
10.8K
Mike Heskin
Mike Heskin@hexkyz·
@W00fer Technically yes, but tbh it's way easier to write the whole thing from scratch. Most of the firmware is useless obfuscation tactics with the actual gamecard protocol being just a very small part of it. Also, the actual read/write block logic is implemented by the FPGA instead.
English
1
0
0
388
W00fer
W00fer@W00fer·
@hexkyz So if all encryption shit is stripped this thing can run on much less specific hardware? You are still in need of the Lotus3 key then.
English
1
0
0
908
Mike Heskin
Mike Heskin@hexkyz·
8) This last XOR-based algorithm is an absolute abomination of mixing random values and multiple seed sources just to make it as hard as possible to reverse engineer (even Ghidra wasn't able to produce an accurate decompilation of it, despite having support for Xtensa). (9/9)
English
0
1
17
2.6K
Mike Heskin
Mike Heskin@hexkyz·
7) Decrypting the "update.s2" file is a matter of stripping away a first layer of TEA encryption, parsing metadata, decrypting the actual firmware code with the right AES key and, finally, deobfuscating the resulting plaintext through their custom XOR-based algorithm. (8/9)
English
1
1
17
2.8K
Mike Heskin retweetledi
Gary
Gary@GaryOderNichts·
Here's a simplified overview of what I figured out about the Alarmo boot process so far.
Gary tweet media
English
5
12
89
7.3K