Jump to content

Sabresite

Administrator
  • Posts

    2056
  • Joined

  • Last visited

  • Days Won

    66

Everything posted by Sabresite

  1. As a general rule, poke secure hex checkers (as they are referred to), were told by yankeesrule (and other admins), to cross-reference pokemon against our database, and if they are the same, flag them as hacks. This is based on the assumption that our pokemon are not legit (or even legal). In addition, poke secure hex checkers are also told to check the pokemon against the legality checker, to weed out obvious hacks. Also, I have been approached by admins from poke secure, and hex checkers (on multiple, separate occasions), who have confessed that the admins create their own NoK pokemon (as well as other mystery gift based events, I would assume). I, personally, do not believe anything they say, no matter what they say.
  2. It looks exactly like a pokemon that was caught in GBA, however the PID/IVs do not conform to an algorithm.
  3. If someone wants to take a stab at faking the server's certificate using OpenSSL, please go for it. I think that would be our best bet, according to some academic papers online.
  4. With that coin/jump program, people are able to make shiny/perfect IV pokemon without any hack/cheat tools. So while its still not kosher, it can be 99% legit. In terms of this pokemon, it was definitely "created" even though it may look legal.
  5. Starter = Type 1 Roaming Legend (NDS) = Type 1 Roaming Legend (GBA) = Type 1 ( IVs 3 through 6 are zero ) 10 Anni = Restricted Type 5 Wishmaker Jirachi = Unrestricted Type 5 Faraway Mew = Type 1 Rotom = Type 1
  6. Yes sir, thats exactly what I meant! Thank you.
  7. Provide the OTID and OTSID and I will generate a rainbow table while I am at work. The rainbow table will have all legal PIDs (just like Kazu did). Thankfully I have a really damn fast quad core machine and a nice beta program I made that utilizes all cores. Works similar to SCV's PID <--> IV program.
  8. Please attack them as files, or if you do not have the capability to get the pokemon to your computer, then you must contact someone (i am too busy unfortunately) to help you with a wifi trade.
  9. Starter = Type 1 Roaming Legend (GBA) = Type 1 (IVs 3 through 6 should be zeroed out) 10 Anni = Restricted Type 5 Wishmaker = Restricted Type 5 Faraway mew = Type 1 Rotom = Type 1
  10. Choose the IVs that you want (do not choose Max IVs, and starters tend to have shitty IVs below 25 each). Then use PokeSav to find the proper "Wild NDS/GBA" (Type1) PID. you are done.
  11. The restriction on the common gba event algorithm actually pertains directly to the number of people who participated in that particular event. Since most events had 1000 people or less in attendance, then the PIDs can be restricted to a subset of only 1000. Some events, such as GCAE had many thousands, and the same with JAA. It seems that at other events, the PIDs were not incremented or restricted to a specific subset, therefore there is no restriction placed on them. And all of this information is based on sample data, and information gathered from people who understand how the distribution machines worked during the GBA era.
  12. Honestly, i dunno why the latias trash bytes say invalid. Its possible that fenzo or someone loaded it with an old pokesav on accident or something. I will look at it later and fix it.
  13. Unfortunately it was very common for people to make poor hacks of Ho-Oh, Lugia, Latias, Latios, Celebi, Jirachi, etc. During the GBA era, not many people knew about the algorithms and truly believed that the PID was sufficiently random. This means that 99% of shiny stuff out there are hacks (which we now know obviously).
  14. I just shat and pissed my pants! Edit: Okay this is slightly (and by slightly I mean really far away) from my skills, however from what I gather, we have two viable options here. 1) Jiggy and I will be working with SCV to make an ARDS code to clone the other person's pokemon during a trade on Wifi, while looking at their trading partner's pokemon's summary. and the second, more long term project 2) We can use the certificate that kaarosu found to fake a server certificate. If the NDS does not employ sufficient verification of the certificate (or we fake that as well), we can do the following: NDS <--- real NDS certificate, fake WFC server certificate --> Machine in the Middle <--- real certificate that NDS --> WFC So the machine in the middle will have a plausible fake certificate which will decrypt the information to plaintext, then pass it using the real NDS certificate to the WFC. Then take the WFC information and decrypt it using the real NDS certificate, and encrypt it using the fake WFC certificate, then send it to the NDS. While complex/difficult, this is viable. The end goal is to set up the wireless of the NDS manually so that the DNS server is that of a computer on the same wireless network. The computer will be set up with a custom program that will redirect the nintendo servers to itself, and then perform the machine in the middle as explained above. While the person is viewing their trading partner's pokemon, the pokemon itself will be extracted during the machine in the middle plaintext decryption from the WFC, and then displayed on the computer along with its legality. Who is up for this challenge?
  15. I will check again when I get time, its possible I missed something. Its possible that it only checks for the FE flag, and thats it. I know SCV has the proper information somewhere as well, I will see if I can have him dig up his notes.
  16. I was asked to comment on this thread. The game does the following checks before transformation: Is it day time? Is this shaymin from Platinum? (Platinum location above 0) - BOOM transform. Thats it.
  17. I was out of town (went to a wedding in northern cali). I will be working on resource handling and ROM info (encounters, etc), and optimizing how its loaded into the program.
  18. I haven't seen your VB code in regards to PokeText. I cannot find anything in the PPSE SVN for PokeText, so I will probably end up writing it. I have the code already taken care of, basically everything you said, except it also handles trash bytes dynamically. For the file loading, yeah I was going to expand on what has already been coded to support other formats universally, so the program can load a file and save it using the same object.
  19. That trash byte normalizer link is old. Its now bundled with Legality -> Legality Checker
  20. Here will be a nice list of ToDo's for PPSE. This list will be updated with new stuff, and old stuff will be subtracted as necessary. Change hardcoded resources.cpp information to a text or binary loaded resource to lower initialization file. Add PokeText <--> Unicode library for fixed-length, dynamic length strings, and trash byte support using the font dictable. Create a universal file loading handler to handle all possible formats. Handler will keep the file in memory then convert the file to the raw SAV format. Create a universal file saving handler to handle all possible formats. Handler will covert the modified sav file to the same format as the original file from memory. Handler should automatically handle headers/footers.
  21. The WFC is completely different then the GTS. Using the GTS is like searching through a website, its kind of weird. With the WFC, its fairly straight foward: The DS cartridge has a certificate for SSLv3, and it uses some type of information to salt a big number which is sent to the WFC server. A number is sent back to the DS as well. With these numbers, a private key and public key are generated on both ends. The public key the DS has is to encrypt the information that it sends. The private key is to decrypt the information that it receives. Getting that certificate and salting algorithm is already in the ROM, somewhere.
  22. Thank god I do have all of the info, including offsets for each language in memory, save file, and the pokemon formats themselves.
  23. Would you look at the time! Where does time go? Oh thats right, away from threads that are useless and against our rules.
×
×
  • Create New...