NxNandManager (Backup/Wiederherstellen des NANDs vom Windows-PC aus)

    This site uses cookies. By continuing to browse this site, you are agreeing to our Cookie Policy.

    • NxNandManager (Backup/Wiederherstellen des NANDs vom Windows-PC aus)

      NxNandManager
      von eliboa

      Mit diesem super Tool, könnt ihr über den Windows-PC euren Nand der Switch sichern + wiederherstellen.

      Funktionen:
      • Kompletter NAND backup & wiederherstellen (BOOT0, BOOT1, RAWNAND)
      • Kopieren einzelner Partitionen (RAWNAND)
      • NAND entschlüsseln/verschlüsseln mittels bis keys
      • Option um Konsole spezifische ID's und Zertifikate zu entfernen (wie Incognito)
      • Anzeigen von nützlichen Informationen vom NAND rawnand/gemountet (Firmware ver., exFat Treiber, S/N, etc.)
      • Dump-Überprüfung der MD5
      • AutoRCM kann aktiviert/deaktiviert werden (BOOT0)


      Download:
      github.com/eliboa/NxNandManager/releases

      Changelog:
      Display Spoiler

      v2.0.1
      • Added support for emuMMC (SD Files). Restoring to a splitted dump is still not supported but you can dump/join and decrypt emuMMC, or install incognito on emuMMC (open the file named "00" in your emuMMC directory)
      • Fixed error when installing incognito on splitted dump.

      v2.0
      NAND decryption/encryption (AES-XTS)
      NxNandManager can now decrypt or encrypt NAND file/drive (rawnand or encrypted partition file "PRODINFO", "SAFE", "SYSTEM", etc).
      A keyset file containing biskeys must be provided.

      CLI Usage :

      Use -d argument to decrypt, -e to encrypt.
      Keys can be provided by the -keyset argument to the keyset filename.
      The program can parse keyset files made with biskeydump or lockpick :
      BIS Key 0 (crypt): <16-byte hex key> BIS Key 0 (tweak): <16-byte hex key> ...or
      bis_key_00 = <32-byte hex key> bis_key_01 = <32-byte hex key> ...Examples
      Decrypt full rawnand :
      NxNandManager.exe -i rawnand.bin -o rawnand.dec -d -keyset keys.dat
      Decrypt single partition file :
      NxNandManager.exe -i PRODINFO -o PRODINFO.dec -d -keyset keys.dat
      Encrypt single partition file :
      NxNandManager.exe -i PRODINFO.dec -o PRODINFO.enc -e -keyset keys.dat
      Decrypt & restore single partition file to physical drive
      NxNandManager.exe -i PRODINFO.dec -o \\.\PhysicalDrive3 -part=PRODINFO -e -keyset keys.dat
      Encrypt & restore full rawnand
      NxNandManager.exe -i rawnand.dec -o \\.\PhysicalDrive3 -e -keyset keys.dat

      GUI :

      GUI has been updated to support crypto operations.
      Keys can be added through 'Configure keyset' entry in 'Options' menu

      Incognito

      An "incognito" option has been implemented. As blawar's incognito does, it will wipe out all console unique id's and certificates from CAL0. It can be useful since Atmosphere prevents writing to CAL0.
      The program will need bis keys to apply incognito on encrypted file/drive
      CLI usage : To apply incognito, use --incognito argument (applies to input -i type : RAWNAND or PRODINFO). For example : NxNandManager.exe --incognito -i rawnand.bin -d -keyset keys.dat
      GUI : Use appropriate entry in "Options" menu

      Misc

      • When keys are provided or if content is already decrypted, the program can retrieve additional information (CLI :--info, GUI : File > Properties)
        • Firmware version & ExFat driver (based on .nca filenames is SYSTEM, the exact same way FVI does it, or from journal/play reports in SYSTEM)
        • Serial Number (from PRODINFO or journal in SYSTEM)
        • Last boot time (from SYSTEM/save/8000000000000060, same way FVI does it)
      • Bootloader version is now retrieved from BOOT0
      • The program prevents the system from entering sleep mode when copy is is progress.


      v1.1.2
      • Added support for 8.1 BOOT1
      v1.1.1
      • Added support for 8.0 BOOT1


      v1.1
      • GUI has been completely redesigned
      • Support was added for splitted dumps
      • New feature to toggle AutoRCM was added
      • BOOT1 detection is now supported for 7.X firmwares




      Wie kannst du den Nand deiner Switch nun sichern oder wiederherstellen?


      Nutze hierzu dieses Tutorial -> [Tutorial] Switch Nand Backup/Restore mit NxNandManager



    • NX Nand Manager wurde auf Version 2.0 aktualisiert!


      NAND decryption/encryption (AES-XTS)
      NxNandManager can now decrypt or encrypt NAND file/drive (rawnand or encrypted partition file "PRODINFO", "SAFE", "SYSTEM", etc).
      A keyset file containing biskeys must be provided.

      CLI Usage :

      Use -d argument to decrypt, -e to encrypt.
      Keys can be provided by the -keyset argument to the keyset filename.
      The program can parse keyset files made with biskeydump or lockpick :
      BIS Key 0 (crypt): <16-byte hex key> BIS Key 0 (tweak): <16-byte hex key> ...or
      bis_key_00 = <32-byte hex key> bis_key_01 = <32-byte hex key> ...Examples
      Decrypt full rawnand :
      NxNandManager.exe -i rawnand.bin -o rawnand.dec -d -keyset keys.dat
      Decrypt single partition file :
      NxNandManager.exe -i PRODINFO -o PRODINFO.dec -d -keyset keys.dat
      Encrypt single partition file :
      NxNandManager.exe -i PRODINFO.dec -o PRODINFO.enc -e -keyset keys.dat
      Decrypt & restore single partition file to physical drive
      NxNandManager.exe -i PRODINFO.dec -o \\.\PhysicalDrive3 -part=PRODINFO -e -keyset keys.dat
      Encrypt & restore full rawnand
      NxNandManager.exe -i rawnand.dec -o \\.\PhysicalDrive3 -e -keyset keys.dat

      GUI :

      GUI has been updated to support crypto operations.
      Keys can be added through 'Configure keyset' entry in 'Options' menu

      Incognito

      An "incognito" option has been implemented. As blawar's incognito does, it will wipe out all console unique id's and certificates from CAL0. It can be useful since Atmosphere prevents writing to CAL0.
      The program will need bis keys to apply incognito on encrypted file/drive
      CLI usage : To apply incognito, use --incognito argument (applies to input -i type : RAWNAND or PRODINFO). For example : NxNandManager.exe --incognito -i rawnand.bin -d -keyset keys.dat
      GUI : Use appropriate entry in "Options" menu

      Misc

      • When keys are provided or if content is already decrypted, the program can retrieve additional information (CLI :--info, GUI : File > Properties)
        • Firmware version & ExFat driver (based on .nca filenames is SYSTEM, the exact same way FVI does it, or from journal/play reports in SYSTEM)
        • Serial Number (from PRODINFO or journal in SYSTEM)
        • Last boot time (from SYSTEM/save/8000000000000060, same way FVI does it)
      • Bootloader version is now retrieved from BOOT0
      • The program prevents the system from entering sleep mode when copy is is progress.
      Gruß
      Muxi