xvdtool is a C# command-line utility for manipulating Xbox One XVD/XVC packages. It can print detailed info about package headers, resign, rehash, en/decrypt and verify data integrity of a package, it can also convert decrypted XVD files to VHD or extract the filesystem itself.
So far it's only been tested with dev-crypted packages (which use a different 256-bit Offline Distribution Key (ODK) to retail packages), as the retail key is still unknown. This currently makes the tool useless for 90% of people, but developers looking into how XVD files work will find a detailed mapping of the XVD structures and near-complete methods for manipulating them.
However no encryption keys are provided with this tool, you'll have to find them yourself. Hashes for the dev keys are provided below. If you have an Xbox One development kit or GamingServices framework (Windows10-exclusive) installed, you can use DurangoKeyExtractor to extract the keys from there.
Also included is a tool for extracting files from the XBFS (Xbox Boot File System) inside the Xbox One NAND, based on tuxuser's original NANDOne work with a few small additions. Thanks Kebob for providing OpenXvd.
Usage
Usage : xvdtool.exe [parameters] [filename] Parameters: -h (-help) - print xvdtool usage -i (-info) - print info about package -wi (-writeinfo) - write info about package to [filename].txt -o (-output) <output-path> - specify output filename -m (-mount) - mount package -um (-unmount) - unmount package -mp (-mountpoint) - Mount point for package (e.g. "X:") -lk (-listkeys) - List known keys including their hashes / availability -signfile <path-to-file> - Path to xvd sign key (RSA) -odkfile <path-to-file> - Path to Offline Distribution key -cikfile <path-to-file> - Path to Content Instance key -sk (-signkey) <key-name> - Name of xvd sign key to use -odk (-odkid) <id> - Id of Offline Distribution key to use (uint) -cik (-cikguid) <GUID> - Guid of Content Instance key to use -nd (-nodatahash) - disable data hash checking, speeds up -l and -f -ne (-noextract) - disable data (embedded XVD/user data) extraction, speeds up -l and -f -eu (-decrypt) - decrypt output xvd -ee (-encrypt) - encrypt output xvd XVDs will have a new CIK generated (if CIK in XVD header is empty), which will be encrypted with the ODK and stored in the XVD header -hd (-removehash) - remove hash tree/data integrity from package -he (-addhash) - add hash tree/data integrity to package -md (-removemdu) - remove mutable data (MDU) from package -r (-rehash) - fix data integrity hashes inside package -rs (-resign) - sign package using the private key from rsa3_key.bin -xe (-extractembedded) <output-file> - extract embedded XVD from package -xu (-extractuserdata) <output-file> - extract user data from package -xv (-extractvhd) <output-vhd> - extracts filesystem from XVD into a VHD file -xi (-extractimage) <output-file> - extract raw filesystem image -xf (-extractfiles) <output-folder> - extract files from XVD filesystem The next two commands will write info about each package found to [filename].txt also extracts embedded XVD and user data to [filename].exvd.bin / [filename].userdata.bin -l (-filelist) <path-to-file-list> - use each XVD specified in the list -f (-folder) <path-to-folder> - scan folder for XVD files To mount a package in Windows you'll have to decrypt it and remove the hash tables & mutable data first (-eu -hd -md)
To decrypt non-XVC packages you'll need the correct ODK. The devkit ODK is "widely known" and a hashes are provided below, but as mentioned above the retail key is currently unknown.
Decrypting XVC packages is a different matter, XVC packages use a Content Instance Key (CIK) which appears to be stored somewhere outside the package, however where and how it's stored is currently unknown. If you have the correct deobfuscated CIK for a given package you should be able to use it to to decrypt the package.
Devkit/test-signed XVC packages use a static CIK which is also "widely known" (Hash provided below).
Required Files
To make full use of this tool you'll need the following files, which are not included. The tool will work fine without them, but some functions might not work.
You can use the included tool "DurangoKeyExtractor" to extract these keys from the Microsoft.GamingServices framework available on Windows 10. Just check some DLL / SYS / EXE files - you might find them.
- 33ec8436-5a0e-4f0d-b1ce-3f29c3955039.cik: CIK keys for XVC crypto. First entry should be the key used by SDK tools/devkits. Format: [16 byte encryption key GUID][32 byte CIK]
MD5: C9E58F4E1DC611E110A849648DADCC9B
SHA256: 855CCA97C85558AE8E5FF87D8EEDB44AE6B8510601EB71423178B80EF1A7FF7F
- RedOdk.odk: ODK key used by SDK tools/devkits Format: [32 byte ODK]
MD5: A2BCFA87F6F83A560BD5739586A5D516
SHA256: CA37132DFB4B811506AE4DC45F45970FED8FE5E58C1BACB259F1B96145B0EBC6
- RedXvdPrivateKey.rsa: Private RSA key used by SDK tools to verify/sign packages. Format: RSAFULLPRIVATEBLOB struct
MD5: 2DC371F46B67E29FFCC514C5B134BF73
SHA256: 8E2B60377006D87EE850334C42FC200081386A838C65D96D1EA52032AA9628C5
For other known keys and their hashes use the -listkeys cmdline switch. To chose a specific key use the following cmdline switches:
-sk (-signkey) <key-name> - Name of xvd sign key to use -odk (-odkid) <id> - Id of Offline Distribution key to use (uint) -cik (-cikguid) <GUID> - Guid of Content Instance key to use
Possible locations to store keys
XVDTool will create configuration/keys folders on first start - Global and local to the app.
Global configuration folder:
- Windows: C:\Users\<username>\AppData\Local\xvdtool
- Linux: /home/<username>/.config/xvdtool
- Mac OS X: /Users/<username>/.config/xvdtool
Local configuration folder is the current directory of the executable.
Inside these folders you can can store your keys to be autoloaded.
- Xvd Signing keys: <config dir>/XvdSigningKey/
- Content Instance keys: <config dir>/Cik/
- Offline distribution keys: <config dir>/Odk/
Additionally, you can provide keys from arbitrary filesystem locations via the respective cmdline switches: -signfile, -odkfile, -cikfile
Naming the keys
For CIK it is not important how the keys are named if they have the binary structure of [16 byte encryption key GUID][32 byte CIK]. XVD signing keys should have a distinct identifier so you can refer to them via the -sk (-signkey) cmdline switch. ODK needs to be named either by OdkIndex (<index>.odk) or by its identifier: RedOdk.odk, StandardOdk.odk etc. For detailed up-to-date info refer to: LibXboxOne/Keys/
What are XVDs?
XVD packages are a secured file format used by the Xbox One to store data, an analogue to the Xbox 360's STFS packages. XVD files are usually used to store system images/data while XVCs (a slightly modified variant of XVDs) are used to store game data.
For a more detailed explanation of XVD files see xvd_info.md
Third party libraries used
- BouncyCastle
- NDesk.Options
- DiscUtils
by emoose.
Que novedades incluye la versión 0.53
Released
- Few fixes