Another Code Nsp Here

Simulate the XOR routine (Python snippet):

dd if=another_code.nsp of=hint.bin bs=1 skip=1720000 count=256 Running strings hint.bin reveals: another code nsp

openssl enc -aes-128-ctr -d -in another_code.nsp -out decrypted.nsp -K 4E5350304E5350300000000000000000 -iv 00000000000000000000000000000000 -nosalt Mount or extract the decrypted NSP. Inside exefs/main we find a simple homebrew that XORs an array with 0x42 and prints the result. another code nsp

encryption: AES-128-CTR key hint: first 8 bytes of NSP0 magic repeated twice iv = 0x0000000000000000 The NSP0 magic is 4E 53 50 30 → ASCII NSP0 . Repeated twice → 4E 53 50 30 4E 53 50 30 . another code nsp

Aide