Glossary: Difference between revisions

From Hacks Guide Wiki
(→‎Nintendo 3DS: id0, id1, essential.exefs)
(Add switch glossary, mostly copied from the guide page)
Line 99: Line 99:


== Nintendo Switch ==
== Nintendo Switch ==
=== # ===
; 90DNS
: DNS that blocks system updates on the Nintendo Switch. This can be enabled by following the guide here.
=== A ===
; Atmosphere
: The CFW developed by the Atmosphere-NX organization on GitHub and the one used in this guide.
; AutoRCM
: A method that corrupts parts of your boot0 and boot1, causing the Switch to boot into RCM automatically. Using this requires an additional peripheral (such as a computer, phone, dongle or trinket) to be able to boot your Switch.
=== B ===
; BOOT0 and BOOT1
: Two partitions of the Switch NAND.
; BIS keys
: Specific keys used to decrypt the NAND.
=== D ===
; Deja Vu
: An unreleased exploit chain for the Nintendo Switch. The completely unpatched version of this chain will grant access to TrustZone, which effectively means being able to enter CFW. The TrustZone part of this exploit was patched in firmware version 5.0.0 and up, but normal homebrew access can still be gained up to firmware version 6.0.1.
; DNS
: Domain Name System. Basically, it's the internet's addressbook. If you visit a website, the DNS is what tells you what server the site is hosted on.
; dns.mitm
: Atmosphere module that enables DNS redirection on a system-wide level. It can be used in place of 90DNS and has the advantage of not needing to be set up for every connection individually.
; Dongle
: Device you can plug in the charging port of your Switch to automatically send a payload if your Switch is in RCM.
=== E ===
; Encryption keys
: Keys used to encrypt files from the Nintendo Switch. These can be dumped by following the guide [[switchguide:extras/dumping_title_keys|here]].
=== F ===
; fusee-gelee/ShofEL2
: Two names for two different implementations of the same exploit. This is an exploit that grants full bootrom access to the Nintendo Switch from the Tegra X1s RCM and permits us to run CFW. This exploit requires an external device and a tiny hardware modification. fusee-gelee is developed by an ex-ReSwitched developer, while ShofEL2 is developed by the failoverfl0w team. This guide uses fusee-gelee.
=== H ===
; hactool
: Software used to decrypt Nintendo Switch files like .XCI and .NSP files.
; Hekate
: A bootloader for the Nintendo Switch. The current guide uses this in combination with essential files from Atmosphere to boot CFW.
; Homebrew launcher
: Software developed by the Switchbrew team that lets you run other Homebrew.
=== J ===
; Jig
: Refers to a piece of hardware that you can put in the Joycon rail to enter RCM.
=== K ===
; KIP
: Short for Kernel Initial Process. These files can be loaded in when the Switch boots in CFW and provide additional functionality.
=== N ===
; NSP
: File format for installable titles.
; nx-hbloader
: Intermediary program used to load the Homebrew Launcher from CFW developed by Switchbrew. Comes bundled with Atmosphere.
=== P ===
; PRODINFO
: A partition on the NAND of your Switch. This along with BOOT0 and BOOT1 is the only part of your Switch that contain data that is unrecoverable without a backup. Atmosphere backs up this partition on booting and it is included in your NAND backup.
=== R ===
; ReSwitched
: A hacking team that is one of the main developers for Atmosphere.
; RCM
: A shorthand for "Recovery Mode". When talking about hacking the Switch, this commonly refers to the Recovery Mode in the Tegra X1 chip that is included in the Nintendo Switch. Can be entered by holding down the Tegra X1 home button. This button is not the same as the home button on the joycons. Ways of pressing this button can be found [[switchguide:user_guide/emummc/entering_rcm|here]].
=== T ===
; TegraRCMGUI/fusee-interface-tk
: Software used to run the fusee-gelee exploit on the Switch.
; Tegra X1
: A chip made by Nvidia that is used in the Nintendo Switch.
; Trinket
: A tiny chip that is soldered on the Switch motherboard to automatically send a payload if it is in RCM.
; TrustZone
: The highest security level on the Switch.
=== X ===
; XCI
: File format for raw gamecard images.

Revision as of 21:15, 25 June 2022

This is a list of terms commonly used within the Nintendo hacking scenes.

General

C

custom firmware, CFW
Software that patches the official firmware to do more things. See also: custom firmware

D

Dump
Copying a game's contents to a format easily accessible by a PC or other device.

E

exploit
Code that is used to take advantage of a vulnerability. In a hacking sense, it can be used as a method to run custom software on the device.

H

homebrew
Software for a device that is not authorized by its manufacturer.

N

NAND
Name for the internal storage or system memory.

R

region change
Changing the system firmware from its source region.

V

vulnerability
A flaw in software that could be exploited. In a hacking sense, it can be used as a vector to run custom code.

Nintendo 3DS

A

AGB_FIRM
Name for the firmware that runs Game Boy Advance games on the 3DS. See also: 3DS:GBA games

C

CIA
An installable package. Short for "CTR Importable Archive".
CTR
Codename for the Nintendo 3DS as a whole, as well as the original 2011 model.
Rosalina
The in-game menu feature of Luma3DS.

E

EmuNAND
A redirected NAND that is instead read from the SD card. Also known as a RedNAND.
essential.exefs
A file generated using GodMode9 containing various per-console files.

I

ID0
Part of the "Nintendo 3DS" SD card directory tree. The name of this folder is generated from a hash based on the movable.sed.
ID1
Part of the "Nintendo 3DS" SD card directory tree. The name of this folder is generated from the CID of the SD card used at the time.

L

Luma3DS
The primary custom firmware for the 3DS. See also: 3DS:Luma3DS

N

NATIVE_FIRM
The normal firmware that is used to run 3DS games and applications.

S

seedminer
The process of bruteforcing the key of a movable.sed file.

T

TWL
Codename for the Nintendo DSi.
TWL_FIRM
Name for the firmware that runs Nintendo DS and DSi games on the 3DS.

Wii U

Nintendo Switch

#

90DNS
DNS that blocks system updates on the Nintendo Switch. This can be enabled by following the guide here.

A

Atmosphere
The CFW developed by the Atmosphere-NX organization on GitHub and the one used in this guide.
AutoRCM
A method that corrupts parts of your boot0 and boot1, causing the Switch to boot into RCM automatically. Using this requires an additional peripheral (such as a computer, phone, dongle or trinket) to be able to boot your Switch.

B

BOOT0 and BOOT1
Two partitions of the Switch NAND.
BIS keys
Specific keys used to decrypt the NAND.

D

Deja Vu
An unreleased exploit chain for the Nintendo Switch. The completely unpatched version of this chain will grant access to TrustZone, which effectively means being able to enter CFW. The TrustZone part of this exploit was patched in firmware version 5.0.0 and up, but normal homebrew access can still be gained up to firmware version 6.0.1.
DNS
Domain Name System. Basically, it's the internet's addressbook. If you visit a website, the DNS is what tells you what server the site is hosted on.
dns.mitm
Atmosphere module that enables DNS redirection on a system-wide level. It can be used in place of 90DNS and has the advantage of not needing to be set up for every connection individually.
Dongle
Device you can plug in the charging port of your Switch to automatically send a payload if your Switch is in RCM.

E

Encryption keys
Keys used to encrypt files from the Nintendo Switch. These can be dumped by following the guide here.

F

fusee-gelee/ShofEL2
Two names for two different implementations of the same exploit. This is an exploit that grants full bootrom access to the Nintendo Switch from the Tegra X1s RCM and permits us to run CFW. This exploit requires an external device and a tiny hardware modification. fusee-gelee is developed by an ex-ReSwitched developer, while ShofEL2 is developed by the failoverfl0w team. This guide uses fusee-gelee.

H

hactool
Software used to decrypt Nintendo Switch files like .XCI and .NSP files.
Hekate
A bootloader for the Nintendo Switch. The current guide uses this in combination with essential files from Atmosphere to boot CFW.
Homebrew launcher
Software developed by the Switchbrew team that lets you run other Homebrew.

J

Jig
Refers to a piece of hardware that you can put in the Joycon rail to enter RCM.

K

KIP
Short for Kernel Initial Process. These files can be loaded in when the Switch boots in CFW and provide additional functionality.

N

NSP
File format for installable titles.
nx-hbloader
Intermediary program used to load the Homebrew Launcher from CFW developed by Switchbrew. Comes bundled with Atmosphere.

P

PRODINFO
A partition on the NAND of your Switch. This along with BOOT0 and BOOT1 is the only part of your Switch that contain data that is unrecoverable without a backup. Atmosphere backs up this partition on booting and it is included in your NAND backup.

R

ReSwitched
A hacking team that is one of the main developers for Atmosphere.
RCM
A shorthand for "Recovery Mode". When talking about hacking the Switch, this commonly refers to the Recovery Mode in the Tegra X1 chip that is included in the Nintendo Switch. Can be entered by holding down the Tegra X1 home button. This button is not the same as the home button on the joycons. Ways of pressing this button can be found here.

T

TegraRCMGUI/fusee-interface-tk
Software used to run the fusee-gelee exploit on the Switch.
Tegra X1
A chip made by Nvidia that is used in the Nintendo Switch.
Trinket
A tiny chip that is soldered on the Switch motherboard to automatically send a payload if it is in RCM.
TrustZone
The highest security level on the Switch.

X

XCI
File format for raw gamecard images.