Quoted from AckerApple:Thus far:
1. Bought 60g solid state hard drive off Amazon
2. Bought simplistic cheapest drive cloner off Amazon
3. Successfully cloned ruby red's hard drive and plugged in clone into pinball machine. It works
4. If all else fails, I have a backup of my machines hard drive
5. A simple read of the hard drive reveals all file names and folders are fully named and structured for easy navigation
6. System files appear unencrypted while WoZ source files are encrypted
To try:
1. Get hard drive running on a Virtual Machine or even a Mac can boot the drive holding option at startup and selecting cloned drive
2. Copy a few encrypted files and attempt using tool based brute force file cracking
2.1 Use the well known KaliLinux for its penetration tests
2.2 Use zcat process for its bruteforce compression reverse piping abilities
2.2.1 The key will be to accurately replicate the compression and encryption process that was originally used
2.2.2 A terminal command will look like following to unencrypted and untarball a file $ zcat foobar.bin | bzcat | zcat | tar xO | tar xO | bzcat | tar xO | zcat | file - /dev/stdin: ASCII text
3. Attempt installation of Linux tools or my Node code to interject itself into a running game to read memory and such
That's it for now. Chime in at will. Again, some people love to add hardware and tinker with their machines physically and I want to have that same enjoyment but at a software level. That's why I'm doing this, for the fun of it
I've tried this before with a couple of Pinsiders a few years ago. We got pretty far! We swapped out some video and sound files, and we got the environment to install in a VM, but not boot. This is before asset encryption. I have attached a PDF guide for setting up the VM in VMware.