Revision as of 21:15, 25 June 2022 by Bleck9999 (talk | contribs) (Add switch glossary, mostly copied from the guide page)
This page is a work in progress. |
This is a list of terms commonly used within the Nintendo hacking scenes.
General
C
- custom firmware, CFW
- Software that patches the official firmware to do more things. See also: custom firmware
D
- Dump
- Copying a game's contents to a format easily accessible by a PC or other device.
E
- exploit
- Code that is used to take advantage of a vulnerability. In a hacking sense, it can be used as a method to run custom software on the device.
H
- homebrew
- Software for a device that is not authorized by its manufacturer.
N
- NAND
- Name for the internal storage or system memory.
R
- region change
- Changing the system firmware from its source region.
V
- vulnerability
- A flaw in software that could be exploited. In a hacking sense, it can be used as a vector to run custom code.
Nintendo 3DS
A
- AGB_FIRM
- Name for the firmware that runs Game Boy Advance games on the 3DS. See also: 3DS:GBA games
C
- CIA
- An installable package. Short for "CTR Importable Archive".
- CTR
- Codename for the Nintendo 3DS as a whole, as well as the original 2011 model.
- Rosalina
- The in-game menu feature of Luma3DS.
E
- EmuNAND
- A redirected NAND that is instead read from the SD card. Also known as a RedNAND.
- essential.exefs
- A file generated using GodMode9 containing various per-console files.
I
- ID0
- Part of the "Nintendo 3DS" SD card directory tree. The name of this folder is generated from a hash based on the
movable.sed
.
- ID1
- Part of the "Nintendo 3DS" SD card directory tree. The name of this folder is generated from the CID of the SD card used at the time.
L
- Luma3DS
- The primary custom firmware for the 3DS. See also: 3DS:Luma3DS
N
- NATIVE_FIRM
- The normal firmware that is used to run 3DS games and applications.
S
- seedminer
- The process of bruteforcing the key of a
movable.sed
file.
T
- TWL
- Codename for the Nintendo DSi.
- TWL_FIRM
- Name for the firmware that runs Nintendo DS and DSi games on the 3DS.
Wii U
Nintendo Switch
#
- 90DNS
- DNS that blocks system updates on the Nintendo Switch. This can be enabled by following the guide here.
A
- Atmosphere
- The CFW developed by the Atmosphere-NX organization on GitHub and the one used in this guide.
- AutoRCM
- A method that corrupts parts of your boot0 and boot1, causing the Switch to boot into RCM automatically. Using this requires an additional peripheral (such as a computer, phone, dongle or trinket) to be able to boot your Switch.
B
- BOOT0 and BOOT1
- Two partitions of the Switch NAND.
- BIS keys
- Specific keys used to decrypt the NAND.
D
- Deja Vu
- An unreleased exploit chain for the Nintendo Switch. The completely unpatched version of this chain will grant access to TrustZone, which effectively means being able to enter CFW. The TrustZone part of this exploit was patched in firmware version 5.0.0 and up, but normal homebrew access can still be gained up to firmware version 6.0.1.
- DNS
- Domain Name System. Basically, it's the internet's addressbook. If you visit a website, the DNS is what tells you what server the site is hosted on.
- dns.mitm
- Atmosphere module that enables DNS redirection on a system-wide level. It can be used in place of 90DNS and has the advantage of not needing to be set up for every connection individually.
- Dongle
- Device you can plug in the charging port of your Switch to automatically send a payload if your Switch is in RCM.
E
- Encryption keys
- Keys used to encrypt files from the Nintendo Switch. These can be dumped by following the guide here.
F
- fusee-gelee/ShofEL2
- Two names for two different implementations of the same exploit. This is an exploit that grants full bootrom access to the Nintendo Switch from the Tegra X1s RCM and permits us to run CFW. This exploit requires an external device and a tiny hardware modification. fusee-gelee is developed by an ex-ReSwitched developer, while ShofEL2 is developed by the failoverfl0w team. This guide uses fusee-gelee.
H
- hactool
- Software used to decrypt Nintendo Switch files like .XCI and .NSP files.
- Hekate
- A bootloader for the Nintendo Switch. The current guide uses this in combination with essential files from Atmosphere to boot CFW.
- Homebrew launcher
- Software developed by the Switchbrew team that lets you run other Homebrew.
J
- Jig
- Refers to a piece of hardware that you can put in the Joycon rail to enter RCM.
K
- KIP
- Short for Kernel Initial Process. These files can be loaded in when the Switch boots in CFW and provide additional functionality.
N
- NSP
- File format for installable titles.
- nx-hbloader
- Intermediary program used to load the Homebrew Launcher from CFW developed by Switchbrew. Comes bundled with Atmosphere.
P
- PRODINFO
- A partition on the NAND of your Switch. This along with BOOT0 and BOOT1 is the only part of your Switch that contain data that is unrecoverable without a backup. Atmosphere backs up this partition on booting and it is included in your NAND backup.
R
- ReSwitched
- A hacking team that is one of the main developers for Atmosphere.
- RCM
- A shorthand for "Recovery Mode". When talking about hacking the Switch, this commonly refers to the Recovery Mode in the Tegra X1 chip that is included in the Nintendo Switch. Can be entered by holding down the Tegra X1 home button. This button is not the same as the home button on the joycons. Ways of pressing this button can be found here.
T
- TegraRCMGUI/fusee-interface-tk
- Software used to run the fusee-gelee exploit on the Switch.
- Tegra X1
- A chip made by Nvidia that is used in the Nintendo Switch.
- Trinket
- A tiny chip that is soldered on the Switch motherboard to automatically send a payload if it is in RCM.
- TrustZone
- The highest security level on the Switch.
X
- XCI
- File format for raw gamecard images.