Difference between revisions of "Talk:DSi exploits"
Line 42: | Line 42: | ||
--[[User:Makorus|Makorus]] 17:53, 9 May 2009 (UTC) | --[[User:Makorus|Makorus]] 17:53, 9 May 2009 (UTC) | ||
+ | |||
+ | I was looking for a sample of those manipulated jpegs for Opera < v9.64 and that seems that is it only a vulnerability and not an exploit. The only exploit is the one with URI : i tried two example of this : [http://milw0rm.com/exploits/7135], the browser seems to be slower and after, it's show a page that says : "Out of memory. The page may not display correctly" or "The page have a wrong path". | ||
+ | |||
+ | Someone know the path to memory card of DSi ? 'Cause the exploit count on this by putting a file on the disk. | ||
+ | |||
+ | --[[User:Geniusdj|Geniusdj]] 13:22, 9 May 2009 (CET) |
Revision as of 12:25, 10 May 2009
Dub-T's Nintendo DSi Shop Hack
Erm, doesn't this just follow from what I wrote on Hackmii? http://hackmii.com/2009/01/dsibrew/ --Bushing 11:41, 20 April 2009 (UTC)
Kasu's Hack
Fake ? Everyone can do that using a DSi flashcard and remove it after !
If it isn't a fake show us how you load the code ! --Ludo6431 16:39, 20 April 2009 (UTC)
Exploit via Opera?
The DSi Webbrowser is based on an older Opera 9.5/9.6 as I know and there are several security issues like the possibility of executing code through manipulated jpeg-images (here more detailed).
Wouldn't it be possible to use such a security hole to start homebrew from the SD card?
Advantages:
1. Opera DSi webbrowser runs in native DSi mode --> access to all DSi features
2. Easy to use: Just save your homebrew on your SD card, surf to the manipulated image an execute your homebrew
3. No extra game/stuff/anything needed, you just have to download the DSi webbrowser for free and then you can start using homebrew on your DSi
Disadvantage:
It has to be found out how to use such a security issue
I have no idea if this is possible and because I don't have the skills to do that, I thought I tell your about and you say if this idea is realistic.
--Makorus 09:19, 9 May 2009 (UTC)
This exploit use a buffer overflow by accesing to an URI (file://) with a very long adress but it's need that the file has to be in the disk.
URI link with Nintendo DSi Browser doesnt't work. [1] (link in French)
--Geniusdj 13:30, 9 May 2009 (CET)
I talked especially about manipulated jpegs, because I suppose (I don't really know, but I think so) they can contain the code that shall be executed.
--Makorus 17:53, 9 May 2009 (UTC)
I was looking for a sample of those manipulated jpegs for Opera < v9.64 and that seems that is it only a vulnerability and not an exploit. The only exploit is the one with URI : i tried two example of this : [2], the browser seems to be slower and after, it's show a page that says : "Out of memory. The page may not display correctly" or "The page have a wrong path".
Someone know the path to memory card of DSi ? 'Cause the exploit count on this by putting a file on the disk.
--Geniusdj 13:22, 9 May 2009 (CET)