Difference between revisions of "DSi exploits"

From DSiBrew
Jump to navigation Jump to search
 
(29 intermediate revisions by 9 users not shown)
Line 3: Line 3:
 
== Type of exploits ==
 
== Type of exploits ==
 
Here is a general list of all the different types/terms of exploits to know. This is to know the differences of each exploit.
 
Here is a general list of all the different types/terms of exploits to know. This is to know the differences of each exploit.
*'''NTR/NDS-Mode Exploits:'''
+
== NTR/NDS-Mode Exploits ==
These are ARM9 exploits that takes over a NDS-mode cartridge. These cartridges are labeled as ''NTR''. These type of exploits are very limited since there's no SD or NAND access. They can be used to run a small payload. These exploits are almost useless.
+
These are ARM9 exploits that takes over a NDS-mode cartridge. These cartridges (on the back) are labeled as ''NTR''. These type of exploits are very limited since there's no SD or NAND access. They can be used to run a small binary payload making these exploits almost useless.
*'''TWL/DSi-Enhanced Cart Exploits:'''
 
These are ARM9 exploits that take over a enhanced DSi mode cartridge. These cartridges are labled as ''TWL''. Unfortunately they don't have SD or NAND access, so you cannot use the SD card or downgrade. They can be used to gather console information and maybe find other vulnerabilities. These exploits can also be used for dslink, which can load homebrew apps in DSi-Mode via internet connections.
 
*'''DSiWare(True DSi-Mode) Exploits:'''
 
These are ARM9 exploits that take over a DSiWare title. They run in the same context that Enhanced games do, but with the addition of SD and NAND access. These exploits are valuable since can be used to downgrade the console firmware to older versions. You can also run commercial homebrew off of the SD card with these exploits. However this doesn't allow any cartridge access.
 
*'''ARM7 Exploits:'''
 
These exploits take over the ARMv7 processor. In the DSi, these processor handles critical operations and cryptography operations, among other things. These exploits are extremely rare and there's no concrete targets. The DSi menu (The Launcher) is known to run in the ARM7 context. At the moment there's only one exploit known, RocketLauncher. These exploits allow FULL ACCESS with the DSi launcher.
 
  
== DSi-mode exploits ==
+
{| class="wikitable" border="1"
Team Twiizers released a DSi-mode exploit called [[Sudokuhax]] that loads homebrew from the SD card in DSi-mode. The exploit requires that you have purchased EA's Sudoku game. More details and download: [http://hackmii.com/2011/01/sudokuhax-release/]. Additionally more DSiWare savegame exploits were released for the last time: [http://hackmii.com/2011/08/final-dsiwarehax/]. Copying these savegame exploits to NAND via system settings is [[System_Menu_1.4.2#Global_Update|blocked]] on the latest system version.
+
!  Name
 +
!  Description
 +
!  Author
 +
!  Source
 +
|-
 +
| [[FIFA NDS]]
 +
| Every single FIFA game on the Nintendo DS has been exploited.
 +
| Everyone
 +
| [https://github.com/CTurt/Dara CTurt's Source Code]
 +
|-
 +
| [[Bangai-O-Sploit]]
 +
| A ''primary'' entrypoint for the game, ''Bangai-O Spirit'', on the Nintendo DS. This game was successfully exploit through sound.
 +
| smealum
 +
| [https://github.com/smealum/bangai-o-sploit Install]
 +
|-
 +
| [[NDS-ILH-Save-Exploit]]
 +
| "I Love Horses" Nintendo DS save exploit
 +
| [https://github.com/mojobojo/ mojobojo]
 +
| [https://github.com/mojobojo/NDS-ILH-Save-Exploit Install]
 +
|-
 +
| [[ABR-NDS-SaveExploit]]
 +
| A stack smash savegame exploit for the game "Asterix Brain Trainer"
 +
| [https://github.com/WemI0/ Weml0]
 +
| [https://github.com/WemI0/ABR-NDS-SaveExploit Install]
 +
|-
 +
| [[HaxxStation]]
 +
| DS Download Station exploit, allowing one to run any commercial homebrew over from the DS download play application.
 +
| shutterbug2000, Gericom, and Apache Thunder
 +
| [https://github.com/Gericom/dspatch See Here]
 +
|-
 +
| [[BreakingNews]]
 +
| A stack smash savegame exploit for the game "The New York Times: Crossword" resulting from stack buffer overflow (profile slot names).
 +
| [[User:ChampionLeake|ChampionLeake]]
 +
| [https://github.com/ChampionLeake/BreakingNews/ Install]
 +
|-
 +
| [[NDS-FC2008-Save-Exploit]]
 +
| A savegame exploit for the game "Führerschein Coach 2008".
 +
| [https://github.com/toombaumarkt/ toombaumarkt]
 +
| [https://github.com/toombaumarkt/NDS-FC2008-Save-Exploit Install]
 +
|-
 +
| [[WordJong-Overflow]]
 +
| A buffer overflow exploit for the game WordJong DS (U).  
 +
| [https://github.com/Borgars/ Borgars]
 +
| [https://github.com/Borgars/WordJong-Overflow Install]
 +
|-
 +
| [[CorruptedClues]]
 +
| A stack smash savegame exploit for the game "Cate West: The Vanishing Files", resulted by unchecked string sizes from the highscore data.
 +
| [[User:ChampionLeake|ChampionLeake]]
 +
| [https://github.com/ChampionLeake/CorruptedClues Install]
 +
|}
  
shutterbug2000 has created an exploit for Flipnote Studio, which uses a modified flipnote that you have to paste 122 times exactly. The exploit can be used with fwtool to downgrade the dsi to be able to use [[Sudokuhax]] or things like it.
+
== TWL/DSi-Enhanced Cart Exploits ==
 +
These are ARM9 exploits that take over a enhanced DSi-mode cartridge. These cartridges (on the back) are labeled as ''TWL''. Unfortunately they don't have SD or NAND access but can be used to gather console information and maybe find other vulnerabilities. These exploits can also be used for dslink, which can load homebrew applications via internet connections.
  
== DSi Enhanced exploits ==
+
{| class="wikitable" border="1"
Team Twiizers also have found a DSi-mode exploit in cooking coach and have managed to use it to run DSi-mode homebrew. However it has not yet been released. More details at: [http://hackmii.com/2009/07/dsi-mode-homebrew-anyone/] The additional hardware is just required to get a connection to a computer so that things like ram dumps can be created.
+
!  Name
 +
!  Description
 +
!  Author
 +
!  Source
 +
|-
 +
| [[The Biggest Losers]]
 +
| Exploit for The Biggest Loser which runs in DSi mode if you use a real cartridge on a DSi or 3DS system, otherwise, it runs in DS mode.
 +
| st4rk
 +
| [https://github.com/st4rk/The-Biggest-Loser Install]
 +
[https://davejmurphy.com/dslink/ WinterMute's dslink]
 +
|-
 +
| [[Cookhack]]
 +
| DSi Cooking Coach exploit
 +
| WinterMute
 +
| [https://github.com/WinterMute/savesploits/tree/master/cookhack PoC]
 +
[https://davejmurphy.com/dslink/ dslink]
 +
|-
 +
| [[Classichack]]
 +
| DSi Classic Word Games exploit
 +
| WinterMute
 +
| [https://github.com/WinterMute/savesploits/tree/master/classichack PoC]
 +
[https://davejmurphy.com/dslink/ dslink]
 +
|-  
 +
| [[SystemFlaaw]]
 +
| The first DSi exclusive cartridge title to be exploited for the game, SystemFlaw
 +
| zoogie
 +
| [https://github.com/zoogie/SystemFlaaw Install]
 +
|}
  
Wintermute has made available an open source DSi hack. The exploit works on DSi enhanced games, allowing you to run custom code from a save file. Instructions for using the exploit can be found here: [http://davejmurphy.com/dslink/]
 
  
The cooking coach and classic word games savegame exploits are [[System_Menu_1.4.4|blocked]] on the latest system version. Therefore, the only way to get DSi-mode homebrew running with the latest system version, is with a hardware workaround for the blocked DSi-mode gamecard exploits. Additionally, one could solder the NAND [[Hardware#NAND_pinout|pins]] to a MMC reader/writer, then extract dev.kp for DSiWareHax.
+
== DSiWare (True DSi-Mode) Exploits ==
 +
These are ARM9 exploits that take over a DSiWare title. They run in the same context that the DSi-Enhanced games do, but with additional SD and NAND access. These exploits are valuable since they can be used to downgrade the console firmware to older versions, or install a persistent exploit such as Unlaunch. You can also run commercial homebrew applications from the SD card. However this doesn't allow any cartridge access.
  
It is also possible for homebrew to be loaded through an Action Replay DSi flashcart. If an nds file is saved onto a micro SD card, and then that micro SD is inserted into the Action Replay, the file can be executed by going to the Files menu.
+
{| class="wikitable" border="1"
 +
!  Name
 +
!  Description
 +
!  Author
 +
!  Source
 +
|-
 +
| [[Sudokuhax]]
 +
| One of the first DSiWare exploits for the Nintendo DSi on the game SUDOKU by EA. (You must have the 1st version of this game in order to use the exploit as it was patched.
 +
| TeamTwiizer, yellows8
 +
| [https://github.com/yellows8/dsi/tree/master/exploits/sudokuhax Install]
 +
|-
 +
| [[grtpwn]]
 +
| A Gameloft DSiWare savegame exploit for the game, Guitar Rock Tour!
 +
| yellows8
 +
| [https://github.com/yellows8/dsi/tree/master/exploits/grtpwn Install]
 +
|-
 +
| [[exidiahax]]
 +
| A Gameloft DSiWare savegame exploit for the game, Legend of Exidia!
 +
| yellows8
 +
| [https://github.com/yellows8/dsi/tree/master/exploits/exidiahax Install]
 +
|-
 +
| [[fieldrunhax]]
 +
| A Subatomic Studios DSiWare savegame exploit for the game, FIELDRUNNERS!
 +
| yellows8
 +
| [https://github.com/yellows8/dsi/tree/master/exploits/fieldrunhax Install]
 +
|-
 +
| [[4swordhax]]
 +
| A DSiWare savegame exploit for the game, The Legend of Zelda: Four Swords Anniversary Edition!
 +
| yellows8
 +
| [https://github.com/yellows8/dsi/tree/master/exploits/4swordhax Install]
 +
|-
 +
| [[Flipnote ( ͡° ͜ʖ ͡°)]] and [[ugopwn]]
 +
| A Primary entrypoint for the DSiWare Application, Flipnote Studio! This exploit was first exploit by shutterbug2000. Later, WinterMute and fincs released a stable version of the exploit.
 +
| shutterbug2000, WinterMute, fincs, zoogie
 +
| [https://davejmurphy.com/%CD%A1-%CD%9C%CA%96-%CD%A1/ Install]
 +
|-
 +
| [[UNO*pwn]]
 +
| A DSiWare savegame exploit for the game, UNO, that involves a simple stack buffer overflow within the player's username with the settings functionality of the game!
 +
| [[User:ChampionLeake|ChampionLeake]]
 +
| [https://github.com/ChampionLeake/UNO-pwn Install]
 +
|-
 +
| [[Memory Pit]]
 +
| A primary exploit for the DSi that involves the system application "Camera"! All you need is an SD Card to use this exploit.
 +
| shutterbug2000
 +
| [https://gbatemp.net/threads/memory-pit-a-new-dsi-exploit-for-dsi-camera.539432 Install], [https://github.com/ChampionLeake/BrokenPit Open-source]
 +
|-
 +
| [[petit-compwner]]
 +
| The last string argument of interpreter command "COLSET" is not bounds checked, thus a trivial stack smash can occur if the string is overly long.
 +
| zoogie
 +
| [https://github.com/zoogie/petit-compwner/releases Release]
 +
|-
 +
| [[stylehax]]
 +
| A primary entrypoint, using a use-after-free in Opera 9.50 (which uses WebKit under the hood).
 +
| @0x1337cafe
 +
| [https://github.com/nathanfarlow/stylehax Release], [https://farlow.dev/2023/03/02/hacking-the-nintendo-dsi-browser Writeup]
 +
|}
  
== DS-mode exploits ==
+
== ARM7 Exploits ==
 +
These exploits take over the ARM7 processor. In the DSi, these processor handles critical operations and cryptography operations, among other things. These exploits are extremely rare and there's no concrete targets. The DSi menu (The Launcher) is known to run in the ARM7 context. At the moment there's only one exploit known as RocketLauncher. These exploits allow FULL ACCESS with the DSi launcher.
 +
{| class="wikitable" border="1"
 +
!  Name
 +
!  Description
 +
!  Author
 +
!  Source
 +
|-
 +
| [[RocketLauncher]]
 +
| One of the first ever unlocked ARM7 DSi exploit involving the DS Cart White list in secton 3. This exploit only works on firmwares v1.4!
 +
| ApacheThunder, stuckpixel, NoCash, Gericom, and Normmatt
 +
| [https://github.com/ApacheThunder/RocketLauncher source]
 +
|}
  
This type of exploit is undesirable because all DSi functionality, such as usage of the [[cameras]], is unavailable to homebrew.
 
  
Blasteh (Blasty) has posted a [http://www.youtube.com/watch?v=7QHO7ctWuZ8 video on Youtube] showing code being run in DS mode on the DSi using [http://en.wikipedia.org/wiki/Fifa_08 Fifa '08].
+
== Bootcode Exploits ==
  
== List of ideas for exploitation/hacking of the latest DSi system version ==
+
These exploits gain full SCFG_EXT access rights immediately after powering on the system (right before starting the launcher). These exploits are significantly rare and concrete targets can be the launcher's ''title.tmd''. At the moment, nocash's exploit, ''Unlaunch'' is the only known usable exploit.
Rules
 
  
→Do not remove ideas, only add
+
{| class="wikitable" border="1"
 
+
!  Name
→Do not delete this section
+
!  Description
 
+
!  Author
→If your idea is 'Epic' mark it with * [only do this if it will certainly work]
+
!  Source
 
+
|-
→You must research whether your idea will work or not
+
| [[Unlaunch]]
+
| Possibly one of the first bootcode exploit for the Nintendo DSi! This exploit deals with taking advantage of the launcher's "title.tmd" size as it's not checked, allowing esculated permissions!
 
+
| NoCash
Just an idea, but couldn't we make a .gif file that Flipnote could read, then the GIF could crash Flipnote and somehow load up the DSi homebrew?
+
| [https://problemkaputt.de/unlaunch.htm Install & Writeup]
 
+
|-
We could try to connect to the DSi using the DS Download Play software, like the Wii and other DS can? I suggest connecting a PC via Bluetooth, push over an exploit program and run it.--[[User:Bernd L|Bernd L]] 16:18, 21 February 2017 (CET)
+
| Unnamed modchip
: [[User:Bernd L|Bernd L]] Long time, no answer. "Don't worry, there will be an exploit coming soon for Flipnote Studio/DSi Browser that will allow you to downgrade to 1.4." Source: https://gbatemp.net/threads/hiyacfw-discussion.478848/ [[User:Abequinn|Abequinn]] 23:46, 14 August 2017 (CEST)
+
| A modchip that exlploits the bootROMs of the Nintendo DSi. It enables code execution on both cores before boot ROM lockout.
 +
| PoroCYon
 +
| [https://media.ccc.de/v/37c3-11736-nintendo_hacking_2023_2008 37c3 talk], [https://icosahedron.website/@pcy/111676158956228552 video], [https://github.com/dsi-modchip/guide DIY guide]
 +
|}

Latest revision as of 17:12, 2 December 2024

This page is dedicated to the listing of exploits for the Nintendo DSi. Anyone may contribute to this list. This page my not, however be deleted in any way, this ensures that that development of this page is not slowed down. Due to the fact that this page has not changed for over a year due to resets, no more resets.

Type of exploits

Here is a general list of all the different types/terms of exploits to know. This is to know the differences of each exploit.

NTR/NDS-Mode Exploits

These are ARM9 exploits that takes over a NDS-mode cartridge. These cartridges (on the back) are labeled as NTR. These type of exploits are very limited since there's no SD or NAND access. They can be used to run a small binary payload making these exploits almost useless.

Name Description Author Source
FIFA NDS Every single FIFA game on the Nintendo DS has been exploited. Everyone CTurt's Source Code
Bangai-O-Sploit A primary entrypoint for the game, Bangai-O Spirit, on the Nintendo DS. This game was successfully exploit through sound. smealum Install
NDS-ILH-Save-Exploit "I Love Horses" Nintendo DS save exploit mojobojo Install
ABR-NDS-SaveExploit A stack smash savegame exploit for the game "Asterix Brain Trainer" Weml0 Install
HaxxStation DS Download Station exploit, allowing one to run any commercial homebrew over from the DS download play application. shutterbug2000, Gericom, and Apache Thunder See Here
BreakingNews A stack smash savegame exploit for the game "The New York Times: Crossword" resulting from stack buffer overflow (profile slot names). ChampionLeake Install
NDS-FC2008-Save-Exploit A savegame exploit for the game "Führerschein Coach 2008". toombaumarkt Install
WordJong-Overflow A buffer overflow exploit for the game WordJong DS (U). Borgars Install
CorruptedClues A stack smash savegame exploit for the game "Cate West: The Vanishing Files", resulted by unchecked string sizes from the highscore data. ChampionLeake Install

TWL/DSi-Enhanced Cart Exploits

These are ARM9 exploits that take over a enhanced DSi-mode cartridge. These cartridges (on the back) are labeled as TWL. Unfortunately they don't have SD or NAND access but can be used to gather console information and maybe find other vulnerabilities. These exploits can also be used for dslink, which can load homebrew applications via internet connections.

Name Description Author Source
The Biggest Losers Exploit for The Biggest Loser which runs in DSi mode if you use a real cartridge on a DSi or 3DS system, otherwise, it runs in DS mode. st4rk Install

WinterMute's dslink

Cookhack DSi Cooking Coach exploit WinterMute PoC

dslink

Classichack DSi Classic Word Games exploit WinterMute PoC

dslink

SystemFlaaw The first DSi exclusive cartridge title to be exploited for the game, SystemFlaw zoogie Install


DSiWare (True DSi-Mode) Exploits

These are ARM9 exploits that take over a DSiWare title. They run in the same context that the DSi-Enhanced games do, but with additional SD and NAND access. These exploits are valuable since they can be used to downgrade the console firmware to older versions, or install a persistent exploit such as Unlaunch. You can also run commercial homebrew applications from the SD card. However this doesn't allow any cartridge access.

Name Description Author Source
Sudokuhax One of the first DSiWare exploits for the Nintendo DSi on the game SUDOKU by EA. (You must have the 1st version of this game in order to use the exploit as it was patched. TeamTwiizer, yellows8 Install
grtpwn A Gameloft DSiWare savegame exploit for the game, Guitar Rock Tour! yellows8 Install
exidiahax A Gameloft DSiWare savegame exploit for the game, Legend of Exidia! yellows8 Install
fieldrunhax A Subatomic Studios DSiWare savegame exploit for the game, FIELDRUNNERS! yellows8 Install
4swordhax A DSiWare savegame exploit for the game, The Legend of Zelda: Four Swords Anniversary Edition! yellows8 Install
Flipnote ( ͡° ͜ʖ ͡°) and ugopwn A Primary entrypoint for the DSiWare Application, Flipnote Studio! This exploit was first exploit by shutterbug2000. Later, WinterMute and fincs released a stable version of the exploit. shutterbug2000, WinterMute, fincs, zoogie Install
UNO*pwn A DSiWare savegame exploit for the game, UNO, that involves a simple stack buffer overflow within the player's username with the settings functionality of the game! ChampionLeake Install
Memory Pit A primary exploit for the DSi that involves the system application "Camera"! All you need is an SD Card to use this exploit. shutterbug2000 Install, Open-source
petit-compwner The last string argument of interpreter command "COLSET" is not bounds checked, thus a trivial stack smash can occur if the string is overly long. zoogie Release
stylehax A primary entrypoint, using a use-after-free in Opera 9.50 (which uses WebKit under the hood). @0x1337cafe Release, Writeup

ARM7 Exploits

These exploits take over the ARM7 processor. In the DSi, these processor handles critical operations and cryptography operations, among other things. These exploits are extremely rare and there's no concrete targets. The DSi menu (The Launcher) is known to run in the ARM7 context. At the moment there's only one exploit known as RocketLauncher. These exploits allow FULL ACCESS with the DSi launcher.

Name Description Author Source
RocketLauncher One of the first ever unlocked ARM7 DSi exploit involving the DS Cart White list in secton 3. This exploit only works on firmwares v1.4! ApacheThunder, stuckpixel, NoCash, Gericom, and Normmatt source


Bootcode Exploits

These exploits gain full SCFG_EXT access rights immediately after powering on the system (right before starting the launcher). These exploits are significantly rare and concrete targets can be the launcher's title.tmd. At the moment, nocash's exploit, Unlaunch is the only known usable exploit.

Name Description Author Source
Unlaunch Possibly one of the first bootcode exploit for the Nintendo DSi! This exploit deals with taking advantage of the launcher's "title.tmd" size as it's not checked, allowing esculated permissions! NoCash Install & Writeup
Unnamed modchip A modchip that exlploits the bootROMs of the Nintendo DSi. It enables code execution on both cores before boot ROM lockout. PoroCYon 37c3 talk, video, DIY guide