hwd45
Well-known member
One more update:
Okay... which passwords to tackle next? Since the V3 and V4 passwords were so similar, I expect that other passwords covered by the V3 (login passwords) also use similar checksum calculation techniques. Perhaps V4 login passwords do too! Music Star passwords are still a mystery, though.
- I've figured out that one strange 0 / 1 (the leftmost byte) that seems to mess everything up - it turns out that after XORing out those extra 106's the checksum is calculated in basically the same way - after removing the username, the 106's and the 70's, the sum of the bytes (now including the extra "1") is once again a multiple of 256, all the time.
- Analysing Parent / Grandparent / Travel passwords, too, it seems as though once all the encryption is stripped as before, the only difference from other passwords is that the rightmost byte is 130 or 131 instead of 129 (130 for parents and grandparents, 131 for travel items - I think these passwords only work when you've actually got parent characters or when you've actually travelled, though!). I do not know if the Famous Picture souvenir also acts this way, but if it does, I will need to make a very minor modification to my script.
- So basically... V3 item passwords are cracked.
- V4 passwords seem to act identically, except that instead of a 106 it's a 109 and instead of a 70 it's an 87. I have not been able to confirm if they still treat parent / grandparent passwords the same, however. Either way, I've added a V4 option to the generator.
Okay... which passwords to tackle next? Since the V3 and V4 passwords were so similar, I expect that other passwords covered by the V3 (login passwords) also use similar checksum calculation techniques. Perhaps V4 login passwords do too! Music Star passwords are still a mystery, though.