Difference between revisions of "unsorted.7z"

From Rare Gaming Dump
 
(8 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 
{{DISPLAYTITLE:unsorted.7z}}
 
{{DISPLAYTITLE:unsorted.7z}}
  
'''unsorted.7z''' is the name of one of the [[Leaks/Downloads|leaked archives]] from the [[Zammis Clark Breach]]. It was leaked on May 2, 2020, on the 4chan board /ppg/. unsorted.7z was basically the first ever instance of a "gigaleak". It was the first of these leaks to gain widespread attention, including [https://www.youtube.com/watch?v=n8G7eq0GlQs a video made about it by Modern Vintage Gamer,] which gave it lots of attention, but also led to many misunderstandings, due to false claims made in the video.
+
'''unsorted.7z''' is the name of one of the [[Leaks/Downloads|leaked archives]] from the [[Zammis Clark Breach]]. It was leaked on May 2, 2020, on the 4chan board /ppg/. unsorted.7z was the first released archive from the breach to include several different types of content, rather than just Pokemon. It was the first of these leaks to gain widespread attention, including [https://www.youtube.com/watch?v=n8G7eq0GlQs a video made about it by Modern Vintage Gamer,] which gave it lots of attention, but also led to many misunderstandings due to false claims made in the video.
  
==Contents of the archive==
+
The archive contained dumps of the "bb" (BroadOn Board/[[iQue Player]]) and "ng" ([[NNGC]]) development trees from [[Acer Cloud Technology|BroadOn]]'s servers, sent in TAR files from [[Acer Cloud Technology|BroadOn]] to Nintendo. The things that have been found in this data include:
The archive contained dumps of the "bb" and "ng" development trees from [[Acer Cloud Technology|BroadOn]]'s servers, likely sent from [[Acer Cloud Technology|BroadOn]] to Nintendo. Here is a list of things that have been found in this data:
 
  
* Source code for [[boot0]], [[boot1]] and [[boot2]]
+
*Source code for [[boot0]], [[boot1]] and [[boot2]]
* Source code for [[IOS]]
+
*Source code for [[IOS]]
* Source code for the [[DVD]] and [[EXI]] libraries from the [[Wii SDK]]
+
*Source code for the [[DVD]] and [[EXI]] libraries from the [[Wii SDK]]
* Block diagram/datasheets for every Wii system component & Verilog for AES/SHA
+
*Block diagram/datasheets for every Wii system component & Verilog for AES/SHA
* Documents from BroadOn describing feature planning and implementation, APIs, and documents relating to internal software
+
*Documents from BroadOn describing feature planning and implementation, APIs, and documents relating to internal software
* Documents from 2004-2006 describing plans for the implementation of the Wii
+
*Documents from 2004-2006 describing plans for the implementation of the Wii
* Miscellaneous Nintendo data, including an internal WPAD SDK from 2005 and a Wii Overview from RVL_SDK 1.0
+
*Miscellaneous Nintendo data, including an internal WPAD SDK from 2005 and a Wii Overview from RVL_SDK 1.0
* Internal GameCube documents, including a physical disc layout
+
*Internal GameCube documents, including a physical disc layout
* iQue related data, located in the "bb" tree, including various documents, tools, and huge CVS code repositories
+
*iQue related data, located in the "bb" tree, including various documents, tools, and huge CVS code repositories
  
People have claimed to have found partial Super Mario 64 source code inside the contents of the "bb" tree.
+
Moments after the leak, people quickly made a discovery of a software tool used in the [[Wii Factory Process]] called sd_boot. This contained a vulnerability, which was found by Fullmetal5 and could be used to install BootMii as boot2 on [[Bollywood]] Wii consoles with a patched boot1.
  
==sd_boot==
+
The iQue files also include the full source code to the IPL for the [[Nintendo 64DD]], which seemingly used some code from [[Super Mario 64]], which was not discovered until months after the leak, and can be found at the following path:
These leaked files also led to the discovery of a software tool used in the [[Wii Factory Process]] called sd_boot. This contained a vulnerability, which was found by Fullmetal5 and could be used to install BootMii as boot2 on [[Bollywood]] Wii consoles with a patched boot1.
+
 
 +
<code>unsorted.7z/depot/rf/sw/n64os20l/lib/BringupBoot/IPL4</code>
 +
 
 +
==Filesystem==
 +
 
 +
*🗁 unsorted.7z
 +
**🗁 [[unsorted.7z/depot.tar|depot.tar]]
 +
***🗀 [[unsorted.7z/depot.tar/hw|hw]]
 +
***🗀 [[unsorted.7z/depot.tar/rf|rf]]
 +
**🗁 [[unsorted.7z/depotrvl.tar|depotrvl.tar]]
 +
***🗁 [[unsorted.7z/depotrvl.tar/d1|d1]]
 +
****🗁 [[unsorted.7z/depotrvl.tar/d1/routefree|routefree]]
 +
*****🗁 [[unsorted.7z/depotrvl.tar/d1/routefree/ng|ng]]
 +
******🗁 [[unsorted.7z/depotrvl.tar/d1/routefree/ng/depot|depot]]
 +
*******🗀 [[unsorted.7z/depotrvl.tar/d1/routefree/ng/depot/doc|doc]]
 +
*******🗀 [[unsorted.7z/depotrvl.tar/d1/routefree/ng/depot/hw|hw]]
 +
*******🗀 [[unsorted.7z/depotrvl.tar/d1/routefree/ng/depot/sw|sw]]
 +
**🗁 [[unsorted.7z/rvl-factory.tar|rvl-factory.tar]]
 +
***🗀 [[unsorted.7z/rvl-factory.tar/prewrite-062308|prewrite-062308]]
 +
{{LeakNavbox}}
  
 
{{DEFAULTSORT:unsorted.7z}}
 
{{DEFAULTSORT:unsorted.7z}}

Latest revision as of 10:58, 27 November 2021


unsorted.7z is the name of one of the leaked archives from the Zammis Clark Breach. It was leaked on May 2, 2020, on the 4chan board /ppg/. unsorted.7z was the first released archive from the breach to include several different types of content, rather than just Pokemon. It was the first of these leaks to gain widespread attention, including a video made about it by Modern Vintage Gamer, which gave it lots of attention, but also led to many misunderstandings due to false claims made in the video.

The archive contained dumps of the "bb" (BroadOn Board/iQue Player) and "ng" (NNGC) development trees from BroadOn's servers, sent in TAR files from BroadOn to Nintendo. The things that have been found in this data include:

  • Source code for boot0, boot1 and boot2
  • Source code for IOS
  • Source code for the DVD and EXI libraries from the Wii SDK
  • Block diagram/datasheets for every Wii system component & Verilog for AES/SHA
  • Documents from BroadOn describing feature planning and implementation, APIs, and documents relating to internal software
  • Documents from 2004-2006 describing plans for the implementation of the Wii
  • Miscellaneous Nintendo data, including an internal WPAD SDK from 2005 and a Wii Overview from RVL_SDK 1.0
  • Internal GameCube documents, including a physical disc layout
  • iQue related data, located in the "bb" tree, including various documents, tools, and huge CVS code repositories

Moments after the leak, people quickly made a discovery of a software tool used in the Wii Factory Process called sd_boot. This contained a vulnerability, which was found by Fullmetal5 and could be used to install BootMii as boot2 on Bollywood Wii consoles with a patched boot1.

The iQue files also include the full source code to the IPL for the Nintendo 64DD, which seemingly used some code from Super Mario 64, which was not discovered until months after the leak, and can be found at the following path:

unsorted.7z/depot/rf/sw/n64os20l/lib/BringupBoot/IPL4

Filesystem