<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://dsibrew.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ploogle</id>
	<title>DSiBrew - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://dsibrew.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ploogle"/>
	<link rel="alternate" type="text/html" href="https://dsibrew.org/wiki/Special:Contributions/Ploogle"/>
	<updated>2026-04-17T07:12:13Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.1</generator>
	<entry>
		<id>https://dsibrew.org/w/index.php?title=Talk:DSi_exploits&amp;diff=1369</id>
		<title>Talk:DSi exploits</title>
		<link rel="alternate" type="text/html" href="https://dsibrew.org/w/index.php?title=Talk:DSi_exploits&amp;diff=1369"/>
		<updated>2009-05-24T22:33:50Z</updated>

		<summary type="html">&lt;p&gt;Ploogle: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Dub-T&#039;s Nintendo DSi Shop Hack ==&lt;br /&gt;
&lt;br /&gt;
Erm, doesn&#039;t this just follow from what I wrote on Hackmii? http://hackmii.com/2009/01/dsibrew/ --[[User:Bushing|Bushing]] 11:41, 20 April 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Kasu&#039;s Hack ==&lt;br /&gt;
Fake ? Everyone can do that using a DSi flashcard and remove it after ! &amp;lt;br&amp;gt;&lt;br /&gt;
If it isn&#039;t a fake show us how you load the code ! --[[User:Ludo6431|Ludo6431]] 16:39, 20 April 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Exploit via Opera? ==&lt;br /&gt;
&lt;br /&gt;
The DSi Webbrowser is based on an older Opera 9.5/9.6 as I know and there are several security issues like the possibility of executing code through manipulated jpeg-images ([http://www.opera.com/support/kb/view/926/ here more detailed]). &lt;br /&gt;
&lt;br /&gt;
Wouldn&#039;t it be possible to use such a security hole to start homebrew from the SD card?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Advantages:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
1. Opera DSi webbrowser runs in native DSi mode --&amp;gt; access to all DSi features&lt;br /&gt;
&lt;br /&gt;
2. Easy to use: Just save your homebrew on your SD card, surf to the manipulated image an execute your homebrew&lt;br /&gt;
&lt;br /&gt;
3. No extra game/stuff/anything needed, you just have to download the DSi webbrowser for free and then you can start using homebrew on your DSi&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Disadvantage:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
It has to be found out how to use such a security issue&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have no idea if this is possible and because I don&#039;t have the skills to do that, I thought I tell your about and you say if this idea is realistic.&lt;br /&gt;
&lt;br /&gt;
--[[User:Makorus|Makorus]] 09:19, 9 May 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
 This exploit use a buffer overflow by accesing to an URI (file://) with a very long adress but it&#039;s need that the file has to be in the disk. &lt;br /&gt;
URI link with Nintendo DSi Browser doesnt&#039;t work.&lt;br /&gt;
[http://www.zataz.com/news/18368/faille--vulnerabilite--exploit--opera.html] (link in French)&lt;br /&gt;
&lt;br /&gt;
--[[User:Geniusdj|Geniusdj]] 13:30, 9 May 2009 (CET)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I talked especially about manipulated jpegs, because I suppose (I don&#039;t really know, but I think so) they can contain the code that shall be executed.&lt;br /&gt;
&lt;br /&gt;
--[[User:Makorus|Makorus]] 17:53, 9 May 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
I was looking for a sample of those manipulated jpegs for Opera &amp;lt; v9.64 and that seems that is it only a vulnerability and not an exploit. The only exploit is the one with URI : i tried two example of this : [http://milw0rm.com/exploits/7135], the browser seems to be slower and after, it&#039;s show a page that says : &amp;quot;Out of memory. The page may not display correctly&amp;quot; or &amp;quot;The page have a wrong path&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Someone know the path to memory card of DSi ? &#039;Cause the exploit count on this by putting a file on the disk.&lt;br /&gt;
&lt;br /&gt;
--[[User:Geniusdj|Geniusdj]] 13:22, 9 May 2009 (CET)&lt;br /&gt;
&lt;br /&gt;
== Bannerbomb for DSi? ==&lt;br /&gt;
&lt;br /&gt;
I think something like ([http://www.wiibrew.org/wiki/Bannerbomb/ Bannerbomb]) should be possible, because the Firmware of the DSi is similar to the Firmware of the Wii.--[[User:Ninko|Ninko]] 20:07, 16 May 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
:The problem with that is that the DSi uses simple bitmaps for banners, and not the intricate proprietary format Nintendo uses. So, unless Nintendo fail at bitmap parsing, there isn&#039;t likely to be an exploit there. [[User:Muzer|Muzer]] 09:14, 17 May 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
::Oh, I didn&#039;t know that. [[User:Ninko|Ninko]] 18:11, 17 May 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
:What if you were to attempt to load a corrupted file? Does the DSi have safeguards in place to prevent a malformed bitmap from being loaded? [[User:ploogle|Ploogle]] 17:24, 24 May 2009 (GMT -8:00)&lt;br /&gt;
&lt;br /&gt;
== Camera or Sound Channel Exploit? ==&lt;br /&gt;
Has anyone looked into an exploit involving loading a corrupted sound or image file into the Sound or Camera channel via the SD card? How about a purposefully corrupted filesystem on the SD card? [[User:ploogle|Ploogle]] 17:29, 24 May 2009 (GMT -8:00)&lt;/div&gt;</summary>
		<author><name>Ploogle</name></author>
	</entry>
	<entry>
		<id>https://dsibrew.org/w/index.php?title=Talk:DSi_exploits&amp;diff=1368</id>
		<title>Talk:DSi exploits</title>
		<link rel="alternate" type="text/html" href="https://dsibrew.org/w/index.php?title=Talk:DSi_exploits&amp;diff=1368"/>
		<updated>2009-05-24T22:27:53Z</updated>

		<summary type="html">&lt;p&gt;Ploogle: /* Bannerbomb for DSi? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Dub-T&#039;s Nintendo DSi Shop Hack ==&lt;br /&gt;
&lt;br /&gt;
Erm, doesn&#039;t this just follow from what I wrote on Hackmii? http://hackmii.com/2009/01/dsibrew/ --[[User:Bushing|Bushing]] 11:41, 20 April 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Kasu&#039;s Hack ==&lt;br /&gt;
Fake ? Everyone can do that using a DSi flashcard and remove it after ! &amp;lt;br&amp;gt;&lt;br /&gt;
If it isn&#039;t a fake show us how you load the code ! --[[User:Ludo6431|Ludo6431]] 16:39, 20 April 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Exploit via Opera? ==&lt;br /&gt;
&lt;br /&gt;
The DSi Webbrowser is based on an older Opera 9.5/9.6 as I know and there are several security issues like the possibility of executing code through manipulated jpeg-images ([http://www.opera.com/support/kb/view/926/ here more detailed]). &lt;br /&gt;
&lt;br /&gt;
Wouldn&#039;t it be possible to use such a security hole to start homebrew from the SD card?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Advantages:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
1. Opera DSi webbrowser runs in native DSi mode --&amp;gt; access to all DSi features&lt;br /&gt;
&lt;br /&gt;
2. Easy to use: Just save your homebrew on your SD card, surf to the manipulated image an execute your homebrew&lt;br /&gt;
&lt;br /&gt;
3. No extra game/stuff/anything needed, you just have to download the DSi webbrowser for free and then you can start using homebrew on your DSi&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Disadvantage:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
It has to be found out how to use such a security issue&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have no idea if this is possible and because I don&#039;t have the skills to do that, I thought I tell your about and you say if this idea is realistic.&lt;br /&gt;
&lt;br /&gt;
--[[User:Makorus|Makorus]] 09:19, 9 May 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
 This exploit use a buffer overflow by accesing to an URI (file://) with a very long adress but it&#039;s need that the file has to be in the disk. &lt;br /&gt;
URI link with Nintendo DSi Browser doesnt&#039;t work.&lt;br /&gt;
[http://www.zataz.com/news/18368/faille--vulnerabilite--exploit--opera.html] (link in French)&lt;br /&gt;
&lt;br /&gt;
--[[User:Geniusdj|Geniusdj]] 13:30, 9 May 2009 (CET)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I talked especially about manipulated jpegs, because I suppose (I don&#039;t really know, but I think so) they can contain the code that shall be executed.&lt;br /&gt;
&lt;br /&gt;
--[[User:Makorus|Makorus]] 17:53, 9 May 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
I was looking for a sample of those manipulated jpegs for Opera &amp;lt; v9.64 and that seems that is it only a vulnerability and not an exploit. The only exploit is the one with URI : i tried two example of this : [http://milw0rm.com/exploits/7135], the browser seems to be slower and after, it&#039;s show a page that says : &amp;quot;Out of memory. The page may not display correctly&amp;quot; or &amp;quot;The page have a wrong path&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Someone know the path to memory card of DSi ? &#039;Cause the exploit count on this by putting a file on the disk.&lt;br /&gt;
&lt;br /&gt;
--[[User:Geniusdj|Geniusdj]] 13:22, 9 May 2009 (CET)&lt;br /&gt;
&lt;br /&gt;
== Bannerbomb for DSi? ==&lt;br /&gt;
&lt;br /&gt;
I think something like ([http://www.wiibrew.org/wiki/Bannerbomb/ Bannerbomb]) should be possible, because the Firmware of the DSi is similar to the Firmware of the Wii.--[[User:Ninko|Ninko]] 20:07, 16 May 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
:The problem with that is that the DSi uses simple bitmaps for banners, and not the intricate proprietary format Nintendo uses. So, unless Nintendo fail at bitmap parsing, there isn&#039;t likely to be an exploit there. [[User:Muzer|Muzer]] 09:14, 17 May 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
::Oh, I didn&#039;t know that. [[User:Ninko|Ninko]] 18:11, 17 May 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
:What if you were to attempt to load a corrupted file? Does the DSi have safeguards in place to prevent a malformed bitmap from being loaded? [[User:ploogle|Ploogle]] 17:24, 24 May 2009 (GMT -8:00)&lt;/div&gt;</summary>
		<author><name>Ploogle</name></author>
	</entry>
</feed>