1
1
sega_dump_tools/tools/Legacy/Filesytem/Fstools
KIT! c4eefa978e Reorganized Repo
Added readme for filesystem tools.
2024-11-04 12:56:23 +01:00
..
calculate_iv Reorganized Repo 2024-11-04 12:56:23 +01:00
fsdecrypt.exe Reorganized Repo 2024-11-04 12:56:23 +01:00
fstool.exe Reorganized Repo 2024-11-04 12:56:23 +01:00
README.md Reorganized Repo 2024-11-04 12:56:23 +01:00

Fstools

.app files

  1. Create a new file titled <PCB CODE>.bin
  2. Fill in the first 16 bytes of <PCB CODE>.bin with the AES key. (e.g. 9D 0B BA 20 D1 E8 4F 24 59 39 9F 53 83 BE EE 72)
  3. The next 16 bytes will be the NTFS header (EB 52 90 4E 54 46 53 20 20 20 20 00 10 01 00 00)the NTFS header is always the same
  4. Save this file, then decrypt the app files with the following command: fsdecrypt \<PCB CODE>.bin 0x200000 <path/to/app> <out.vhd>
  5. Once it finishes decrypting, run calculate_iv.py and save key 1
  6. Open <PCB CODE>.bin inside the hex editor once more, replace the NTFS header with the key 1
  7. Run "fsdecrypt <PCB CODE>.bin 0x200000 <path/to/app> <out.vhd>" once more
  8. Your app is now decrypted, you can extract the internal_0 with ofsmount

.opt files

  1. Decrypt the opt file using fstools with the following command: fstool.exe dec OPT.bin in.opt out.vhd
  2. Run calculate_iv.py and save key 3
  3. Replace the IV key of the OPT.bin with key 3, the IV key of OPT.bin are the second 16 bytes
  4. Decrypt the opt file once more with the new key