Thank you all for the help, the problem in solved.by peter4432 - Homebrew General
Not according to the program description found here: FE100 Page So can anyone advice me what hex editor to use on the nand.bin and how to use it to find the ecc key.by peter4432 - Homebrew General
To experiment and play around with FE100 Save unpacker and packer, to see what it does.by peter4432 - Homebrew General
Quote1cefiretry a hex editor How do I use a hex editor, as I have never used one in my life. I have download one called XVI32, but have not idea what I need to look for or how to use it.by peter4432 - Homebrew General
QuotebushingUm... the entire contents of OTP (including all keys) are tacked on the end of the nand.bin dump that BootMii creates. Xyzzy is officially obsolete. The last 1K of the file contains both the OTP and SEEPROM; you can find the structure definitions here: That being the case, how do I extract this final 1k from the nand.bin file?by peter4432 - Homebrew General
Quotedaniel_c_wEven if the ECC key was on the NAND, it couldn't be extracted without getting the NAND key first Well I have the following keys: sd-key sd-iv md5-blanker NG-id NG-mac NG-key-id NG-sig Is one of these the NAND key, and if so how would i use it?by peter4432 - Homebrew General
Hi I am trying to find my Wii's ECC encryption key, but as my Wii has been updated to system menu 4.0, the fake signing exploit in older IOS's that xyzzy would use is no longer available, so it doesn't work. I was therefor wondering is there either a patched version of xyzzy that works on the newer IOS, or an alternative method or program to obtain the ECC, preferably that doby peter4432 - Homebrew General