Difference between revisions of "Talk:DSi exploits"

From DSiBrew
Jump to navigation Jump to search
Line 48: Line 48:
  
 
--[[User:Geniusdj|Geniusdj]] 13:22, 9 May 2009 (CET)
 
--[[User:Geniusdj|Geniusdj]] 13:22, 9 May 2009 (CET)
 +
 +
== Bannerbomb for DSi? ==
 +
 +
I think something like ([http://www.wiibrew.org/wiki/Bannerbomb/ Bannerbomb]) should be possible, because the Firmware of the DSi is similar to the Firmware of the Wii.--[[User:Ninko|Ninko]] 20:07, 16 May 2009 (UTC)

Revision as of 20:10, 16 May 2009

Dub-T's Nintendo DSi Shop Hack

Erm, doesn't this just follow from what I wrote on Hackmii? http://hackmii.com/2009/01/dsibrew/ --Bushing 11:41, 20 April 2009 (UTC)

Kasu's Hack

Fake ? Everyone can do that using a DSi flashcard and remove it after !
If it isn't a fake show us how you load the code ! --Ludo6431 16:39, 20 April 2009 (UTC)

Exploit via Opera?

The DSi Webbrowser is based on an older Opera 9.5/9.6 as I know and there are several security issues like the possibility of executing code through manipulated jpeg-images (here more detailed).

Wouldn't it be possible to use such a security hole to start homebrew from the SD card?


Advantages:

1. Opera DSi webbrowser runs in native DSi mode --> access to all DSi features

2. Easy to use: Just save your homebrew on your SD card, surf to the manipulated image an execute your homebrew

3. No extra game/stuff/anything needed, you just have to download the DSi webbrowser for free and then you can start using homebrew on your DSi


Disadvantage:

It has to be found out how to use such a security issue


I have no idea if this is possible and because I don't have the skills to do that, I thought I tell your about and you say if this idea is realistic.

--Makorus 09:19, 9 May 2009 (UTC)

This exploit use a buffer overflow by accesing to an URI (file://) with a very long adress but it's need that the file has to be in the disk. 

URI link with Nintendo DSi Browser doesnt't work. [1] (link in French)

--Geniusdj 13:30, 9 May 2009 (CET)


I talked especially about manipulated jpegs, because I suppose (I don't really know, but I think so) they can contain the code that shall be executed.

--Makorus 17:53, 9 May 2009 (UTC)

I was looking for a sample of those manipulated jpegs for Opera < v9.64 and that seems that is it only a vulnerability and not an exploit. The only exploit is the one with URI : i tried two example of this : [2], the browser seems to be slower and after, it's show a page that says : "Out of memory. The page may not display correctly" or "The page have a wrong path".

Someone know the path to memory card of DSi ? 'Cause the exploit count on this by putting a file on the disk.

--Geniusdj 13:22, 9 May 2009 (CET)

Bannerbomb for DSi?

I think something like (Bannerbomb) should be possible, because the Firmware of the DSi is similar to the Firmware of the Wii.--Ninko 20:07, 16 May 2009 (UTC)