GET /scoresVV.php?game=0&name=Billy&score=888&hours_played=0&techpoints_earned=118&babies_made=1&food_gathered=135&people_cured=0&crabs_found=3&peak_population=7&deaths=0&oldest_villager=25&number_events=0&twins_birthed=0&triplets_birthed=0&version=1030&digest=0o0090f00t0r00gil0096x00g6i0090l&game_starttime=27&puzzles_solved=1 HTTP/1.1
User-Agent: GameWebBrowser
Host: www.ldwsoftware.com
Connection: Keep-Alive
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 15 Apr 2021 00:42:06 GMT
Server: Apache/2.2.15 (CentOS)
This Japanese app gets delisted from eShop on 14 April 2021, so I got bored and decided to nose at it since it's free.
When booting the app, it ensures that you have the correct time for JST, by sending a POST to https://beyblade.takaratomy.co.jp/api/3ds/v1.0/_is_time_correct
with the following form-data attributes:
APP_TOKEN application/octet-stream <64 char string>
RID application/octet-stream <8 char string>
UT application/octet-stream 1618002522
This guide has been moved to my blog
Old post (not updated!)
Most Switch communications are over TLS - this includes NEX and Eagle communications (for Nintendo Switch Online)* as well as other servers such as BAAS (friends/status) and NPNS (notifications)*NPLN, the new Switch online servers that Monster Hunter Rise demo used, cannot be dumped with Charles currently as it doesn't support gRPC - use grpc-dump to dump these communications - the gPRC section will explain this better.
Please find this post on my blog
Original post
# Dumping Nintendo TLS TrafficThis guide is for capturing encrypted web traffic between the Internet and a 3DS or Wii U. You will need a hacked console for this.
NOTE: This traffic is sensitive - it will likely contain sensitive data such as a hashed form of your NNID password, and the device's unique identifiers including their unique certificates - as such, please be careful who you share these dumps with! They should be stored safely.