openssl enc -aes-128-ctr -d -in another_code.nsp -out decrypted.nsp -K 4E5350304E5350300000000000000000 -iv 00000000000000000000000000000000 -nosalt Mount or extract the decrypted NSP. Inside exefs/main we find a simple homebrew that XORs an array with 0x42 and prints the result.
Simulate the XOR routine (Python snippet): another code nsp
Use this as the 16-byte key (pad with zeroes): openssl enc -aes-128-ctr -d -in another_code
dd if=another_code.nsp of=hint.bin bs=1 skip=1720000 count=256 Running strings hint.bin reveals: another code nsp
The file is encrypted, but the developer left a clue: “Sometimes the key is right in front of you — just another code.”
openssl enc -aes-128-ctr -d -in another_code.nsp -out decrypted.nsp -K 4E5350304E5350300000000000000000 -iv 00000000000000000000000000000000 -nosalt Mount or extract the decrypted NSP. Inside exefs/main we find a simple homebrew that XORs an array with 0x42 and prints the result.
Simulate the XOR routine (Python snippet):
Use this as the 16-byte key (pad with zeroes):
dd if=another_code.nsp of=hint.bin bs=1 skip=1720000 count=256 Running strings hint.bin reveals:
The file is encrypted, but the developer left a clue: “Sometimes the key is right in front of you — just another code.”