Kaphotics Posted September 1, 2013 Author Posted September 1, 2013 Not exactly sure where it gets the seed (xfr figured it out - not me), but I know 0xCC-0xD3 should decrypt to 65 89 07 6C 65 8b 58 5d (the 64bit battle RNG mult constant) A slick way of getting the seed would be to XOR out the random numbers required and reverse it... Starts decrypting @ 0xC4. (disregard I said about Pokecheck displaying a decrypted copy at the bottom - it's only for admins :\) https://www.pokecheck.org/?bid=361950631992 Raw decrypted battle video file (seed=19dfe620) (if that helps any)
LEGOanimal22 Posted September 2, 2013 Posted September 2, 2013 (disregard I said about Pokecheck displaying a decrypted copy at the bottom - it's only for admins :\) You should consider making this a public feature.
Kaphotics Posted September 2, 2013 Author Posted September 2, 2013 You should consider making this a public feature. There's no reason to; 99.99% of users do not care about it and it contains sensitive player data (such as their NAS PID).
Kaphotics Posted February 15, 2014 Author Posted February 15, 2014 some notes on checksums that weren't really here: all ccitt16's: 0xC4-0x189F (decrypted) @ 0x18A0 0x00-0x18A3 (encrypted) @ 0x18A6 0x1900-0x1903 @ 0x1913 wrote a manager program that allows ripping/inserting of battle videos for BW & B2W2 (here)
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now