Difference between revisions of "Talk:DSi exploits"

From DSiBrew
Jump to navigation Jump to search
Line 54: Line 54:
  
 
:The problem with that is that the DSi uses simple bitmaps for banners, and not the intricate proprietary format Nintendo uses. So, unless Nintendo fail at bitmap parsing, there isn't likely to be an exploit there. [[User:Muzer|Muzer]] 09:14, 17 May 2009 (UTC)
 
:The problem with that is that the DSi uses simple bitmaps for banners, and not the intricate proprietary format Nintendo uses. So, unless Nintendo fail at bitmap parsing, there isn't likely to be an exploit there. [[User:Muzer|Muzer]] 09:14, 17 May 2009 (UTC)
 +
 +
::Oh, I didn't know that. [[User:Ninko|Ninko]] 18:11, 17 May 2009 (UTC)

Revision as of 18:14, 17 May 2009

Dub-T's Nintendo DSi Shop Hack

Erm, doesn't this just follow from what I wrote on Hackmii? http://hackmii.com/2009/01/dsibrew/ --Bushing 11:41, 20 April 2009 (UTC)

Kasu's Hack

Fake ? Everyone can do that using a DSi flashcard and remove it after !
If it isn't a fake show us how you load the code ! --Ludo6431 16:39, 20 April 2009 (UTC)

Exploit via Opera?

The DSi Webbrowser is based on an older Opera 9.5/9.6 as I know and there are several security issues like the possibility of executing code through manipulated jpeg-images (here more detailed).

Wouldn't it be possible to use such a security hole to start homebrew from the SD card?


Advantages:

1. Opera DSi webbrowser runs in native DSi mode --> access to all DSi features

2. Easy to use: Just save your homebrew on your SD card, surf to the manipulated image an execute your homebrew

3. No extra game/stuff/anything needed, you just have to download the DSi webbrowser for free and then you can start using homebrew on your DSi


Disadvantage:

It has to be found out how to use such a security issue


I have no idea if this is possible and because I don't have the skills to do that, I thought I tell your about and you say if this idea is realistic.

--Makorus 09:19, 9 May 2009 (UTC)

This exploit use a buffer overflow by accesing to an URI (file://) with a very long adress but it's need that the file has to be in the disk. 

URI link with Nintendo DSi Browser doesnt't work. [1] (link in French)

--Geniusdj 13:30, 9 May 2009 (CET)


I talked especially about manipulated jpegs, because I suppose (I don't really know, but I think so) they can contain the code that shall be executed.

--Makorus 17:53, 9 May 2009 (UTC)

I was looking for a sample of those manipulated jpegs for Opera < v9.64 and that seems that is it only a vulnerability and not an exploit. The only exploit is the one with URI : i tried two example of this : [2], the browser seems to be slower and after, it's show a page that says : "Out of memory. The page may not display correctly" or "The page have a wrong path".

Someone know the path to memory card of DSi ? 'Cause the exploit count on this by putting a file on the disk.

--Geniusdj 13:22, 9 May 2009 (CET)

Bannerbomb for DSi?

I think something like (Bannerbomb) should be possible, because the Firmware of the DSi is similar to the Firmware of the Wii.--Ninko 20:07, 16 May 2009 (UTC)

The problem with that is that the DSi uses simple bitmaps for banners, and not the intricate proprietary format Nintendo uses. So, unless Nintendo fail at bitmap parsing, there isn't likely to be an exploit there. Muzer 09:14, 17 May 2009 (UTC)
Oh, I didn't know that. Ninko 18:11, 17 May 2009 (UTC)