PDA

View Full Version : boot1



wraggster
June 21st, 2008, 19:05
Some missed news while i was away from bushing:


boot1 is the second stage of the Wiiís bootloader. It lives at the beginning of flash; it is encrypted by AES, using a fixed key. It is hashed using SHA1, and verified against a hash that is burned into OTP memory inside the Hollywood during manufacturing. Therefore, boot1 can be changed in a Wii before it leaves the factory, and new Wiis could have a new version of boot1 ó but itís not possible to upgrade or modify boot1 in an existing Wii.

Fortunately, there is at least one bug in boot1 ó the strncmp / hash verification bug ó and this is what makes all of our firmware hackery possible.

If you want to look at boot1 yourself (to follow along), grab the first few kilobytes of any Wii NAND Flash dump, strip out the spare data (0◊40 of ECC data after every 0◊800 block), and then decrypt it with a command like:

openssl enc -d -aes-128-cbc -K 9258a75264960d82676f904456882a73 -iv 0 -nopad -i boot1-encrypted.bin -o boot1-decrypted.bin

You should end up with 17184 bytes. This is much much larger than boot0, and is already to the point where itís difficult to follow all of the code by just staring at a disassembly. That space is broken down about like so:

1167: initialization code; AES, SHA, signature checking, NAND, ECC functions
2336 bytes: main(), described below
6134 bytes: low-level hardware setup code (to configure the DRAM, talk to the SEEPROM, initialize GPIO pins, etc)
3850 bytes: RSA verification code
2816 bytes: Library code: strncmp, memcpy, printf (!)
872 bytes: Data, including jumptables, the common key (why?!) and the public half of the Root key.

boot1 is interesting to us because it is the first vulnerable code in the Wii. Itís what decides whether or not a hacked boot2 will run. So, we must understand all of the checks it makes if we want to construct a boot2 that will be allowed to run.

[... several days pass ...]
Analyzing boot1 has proven much more difficult than I had feared, so Iím just going to post my disassembly for those who are interested. Iíll follow up soon with the output of SkyEye, which I will post with an explanation of what is actually happening.

Disassembly: boot1.txt

Update: Iíve had some requests for it, so hereís the binary of boot1: boot1-dec.bin

And hereís an IDC file: boot1.idc

Load boot1-dec.bin into IDA Pro (I use 5.2) as an ďunknownĒ file, set processor type to ARMB (ARM Big-Endian), and set it to load the file to 0◊0d400000. Once it has loaded, run the IDC file, and you should have something resembling my IDB file. Feel free to post with any questions or ideas.

http://hackmii.com/2008/06/boot1/