Difference between revisions of "DSi exploits"

From DSiBrew
Jump to navigation Jump to search
Line 9: Line 9:
  
  
The DSi [[Nintendo Zone]] client has a bug that can used to run some homebrew. Linux/hostapd compatible box is required and only certain Wifi NICs can be used with hostapd. It's unknown if it's possible to use a flash card or a SD card with this exploit, it's unknown if sysmenu locks out either of those. [[User:Yellows8|Yellows8]]'s [[Nintendo Zone#Exploits|nzoneurlstacksmash]] should work with DSi NZone. This exploit can't be tested with DSi [[User:Yellows8|until]] Nintendo Zone AP beacons captures are obtained, to clone a Nintendo Zone AP at home. Currently the only NZone AP SSID that could be released once obtained is the NYC N World Store NZone SSID, but it probably isn't possible to use the exploit with that SSID since all html on the server was probably moved to HTTPS. Probably the only way to exploit NZone is with an AP location that has third-party content with an external server which is all NZone locations except N World Store. [[User:Yellows8|Yellows8]] can't confirm that all html was moved to HTTPS until he gets a NZone SSID. Since the index main screen html was moved to HTTPS and DS Station uses HTTP with a different URL, the NZone client can't be used with the DS Station server. Thus, only NZone AP SSIDs can be used with the NZone client. If all html really was moved to only HTTPS, a different SSID would be needed for release besides the NYC SSID. The only locations in the following list that could be usable with the exploit and could be released, is the Best Buy locations, and Japan. that Nintendo Zone is only available in Japan, at Nintendo World Store in New York City, and a few McDonalds test locations in [http://translate.google.com/translate?langpair=de|en&u=http%3A%2F%2Fnintendo.de%2FNOE%2Fde_DE%2Fnews%2Fevents%2Fpilotprojekt_-_nintendo_zone_bei_mcdonalds_18254.html Germany]. The test Germany locations are only available for a limited time, see the URL. Several USA Best Buy locations started a NZone test service in June 2009, see [http://gonintendo.com/viewstory.php?id=84077 this]. It's unknown if those Best Buy locations still have NZone.
+
The DSi [[Nintendo Zone]] client has a bug that can used to run some homebrew. Linux/hostapd compatible box is required and only certain Wifi NICs can be used with hostapd. It's unknown if it's possible to use a flash card or a SD card with this exploit, it's unknown if sysmenu locks out either of those. [[User:Yellows8|Yellows8]]'s [[Nintendo Zone#Exploits|nzoneurlstacksmash]] should work with DSi NZone. This exploit can't be tested with DSi [[User:Yellows8|until]] Nintendo Zone AP beacons captures are obtained, to clone a Nintendo Zone AP at home. Since the index main screen html was moved to HTTPS and DS Station uses HTTP with a different URL, the NZone client can't be used with the DS Station server. Thus, only NZone AP SSIDs can be used with the NZone client. The only locations in the following list that could be usable with the exploit and could be released once obtained, is the Best Buy locations, and Japan. Nintendo Zone is available in Japan. Nintendo World Store in New York City used to have NZone, but they don't have NZone or even DS Download Station anymore. A few McDonalds test locations in [http://translate.google.com/translate?langpair=de|en&u=http%3A%2F%2Fnintendo.de%2FNOE%2Fde_DE%2Fnews%2Fevents%2Fpilotprojekt_-_nintendo_zone_bei_mcdonalds_18254.html Germany] have NZone. The test Germany locations are only available for a limited time, see the URL. Several USA Best Buy locations started a NZone test service in June 2009, see [http://gonintendo.com/viewstory.php?id=84077 this]. It's unknown if those Best Buy locations still have NZone.
  
 
== DS-mode exploits ==
 
== DS-mode exploits ==

Revision as of 23:02, 16 July 2010

This page is dedicated to the listing of exploits used used to run homebrew on the Nintendo DSi. Anyone may contribute to this list, as long as any exploits added are explained and verifiable.

DSi-mode exploits

Team Twiizers have found a DSi-Mode Exploit and have managed to use it to run DSi Mode homebrew. However it has not yet been released. More details at : [1] The additional hardware is just required to get a connection to a computer so that things like ram dumps can be created.


Wintermute has made available an open source DSi hack. The exploit works on DSi enhanced games, allowing you to run custom code from a save file. Instructions for using the exploit can be found here: [2]


The DSi Nintendo Zone client has a bug that can used to run some homebrew. Linux/hostapd compatible box is required and only certain Wifi NICs can be used with hostapd. It's unknown if it's possible to use a flash card or a SD card with this exploit, it's unknown if sysmenu locks out either of those. Yellows8's nzoneurlstacksmash should work with DSi NZone. This exploit can't be tested with DSi until Nintendo Zone AP beacons captures are obtained, to clone a Nintendo Zone AP at home. Since the index main screen html was moved to HTTPS and DS Station uses HTTP with a different URL, the NZone client can't be used with the DS Station server. Thus, only NZone AP SSIDs can be used with the NZone client. The only locations in the following list that could be usable with the exploit and could be released once obtained, is the Best Buy locations, and Japan. Nintendo Zone is available in Japan. Nintendo World Store in New York City used to have NZone, but they don't have NZone or even DS Download Station anymore. A few McDonalds test locations in Germany have NZone. The test Germany locations are only available for a limited time, see the URL. Several USA Best Buy locations started a NZone test service in June 2009, see this. It's unknown if those Best Buy locations still have NZone.

DS-mode exploits

This type of exploit is undesirable because all DSi functionality, such as usage of the cameras, is unavailable to homebrew.

Blasteh (Blasty) has posted a video on Youtube showing code being run in DS mode on the DSi using Fifa '08.