Рет қаралды 1,914
BAIKAL IS NOT SUPPORTED! YOU HAVE BEEN WARNED!
Need WSL2 (For mounting support)
Need HDD (Obviously)
Need HDD Script (Python, requires #binascii #pathlib #pycryptodome)
Need Sflash0 dump (either from console or from ftp server in hacked console)
sflash0 must be labeled like this and next to script
Need WSL2 Kernel with UFS Read Only Support (for user partition)
Need to install cryptmount
Need to generate keys.bin with script
need cmtab properly edited and proper permissions
644
Example of my cmtab:
# /etc/cryptmount/cmtab - encrypted filesystem information for cryptmount
# try 'man 8 cryptmount' or 'man 5 cmtab' for more details
user {
dev=/dev/sdc13
dir=/mnt/c/Users/zecoxao/Desktop/user
flags=user,nofsck
fstype=ufs mountoptions=ro,noatime,noexec,ufstype=ufs2
cipher=aes-xts-plain64
keyfile=/mnt/c/Users/zecoxao/Desktop/hdd_script/keys.bin
keyformat=raw
}
sudo cryptmount user will mount the user partition (found either at /dev/sdX27 or at /dev/sdX13)
Link for script:
www.psx-place.com/threads/hdd-script-by-anonymous.30863/
Link for WSL2 UFS RO Kernel:
mega.nz/file/Kl8SVBTT#2BdItX3ZONo4HhEvDQvlbb8Dn-WVipVmnUF8LaAJRpM
Commands:
Get Disk List (PowerShell Admin)
GET-CimInstance -query "SELECT * from Win32_DiskDrive"
Mount Disk with WSL2 (CommandLine Admin)
wsl --mount \\.\PHYSICALDRIVE1
Copy bzImage to User Profile (WSL)
powershell.exe /C 'Copy-Item .\arch\x86\boot\bzImage $env:USERPROFILE'
Add kernel entry to .wslconfig (WSL)
powershell.exe /C 'Write-Output [wsl2]`nkernel=$env:USERPROFILE\bzImage | % {$_.replace("\","\\")} | Out-File $env:USERPROFILE\.wslconfig -encoding ASCII'