| Nintendo Zone v3.0 has the bug. The NetFront version user agent was removed from the NZone bin, so it's unknown what NetFront version NZone uses. Linux/hostapd compatible box and a NIC supported by hostapd is required. An SSID, and the WEP key generated from the SSID, from a real Nintendo Zone/DS Station AP is required. | | Nintendo Zone v3.0 has the bug. The NetFront version user agent was removed from the NZone bin, so it's unknown what NetFront version NZone uses. Linux/hostapd compatible box and a NIC supported by hostapd is required. An SSID, and the WEP key generated from the SSID, from a real Nintendo Zone/DS Station AP is required. |
− | A DS Station exploit has been written by [[User:Yellows8|Yellows8]]. The exploit is only available on Google Code wmb-asm SVN. SVN web interface is available [http://code.google.com/p/wmb-asm/source/browse/#svn/trunk/nzoneurlstacksmash here], SVN URL available [http://wmb-asm.googlecode.com/svn/trunk/nzoneurlstacksmash here.] To use the exploit at home, you also need a HTTPS forwarder/proxy, like httpsforwarder available in SVN. This exploit hasn't been tested with Nintendo Zone. This exploit can't be tested [[User:Yellows8|until]] a Nintendo Zone AP beacons capture is obtained. This exploit can only be used with html that is transferred over http. All html on the NZone server was probably moved to HTTPS, but this won't be known for certain until [[User:Yellows8|Yellows8]] gets server access with a NZone SSID. The html for the index main and sub screens is transferred over https. However, the html for the main screen for the pages after the index,(main server for DS Station unknown for NZone and third-party companies websites) is transferred with http. The sub screen html is transferred with https, with the main server. Sub screen html with third-party companies is transferred with http. | + | A DS Station exploit has been written by [[User:Yellows8|Yellows8]]. The exploit is only available on Google Code wmb-asm SVN. SVN web interface is available [http://code.google.com/p/wmb-asm/source/browse/#svn/trunk/nzoneurlstacksmash here], SVN URL available [http://wmb-asm.googlecode.com/svn/trunk/nzoneurlstacksmash here.] To use the exploit at home, you also need a HTTPS forwarder/proxy, like httpsforwarder available in SVN. This exploit hasn't been tested with Nintendo Zone. This exploit can't be tested [[User:Yellows8|until]] a Nintendo Zone AP beacons capture is obtained. NZone is region-locked: you can't forward a connection with the Europe DNS server name, to the USA NZone server due to TLS cert server name verification. And an USA NZone SSID won't work with Europe NZone. Once obtained, only a USA Best Buy SSID could be released. This exploit can only be used with html that is transferred over http. All html on the NZone server was probably moved to HTTPS, but this won't be known for certain until [[User:Yellows8|Yellows8]] gets server access with a NZone SSID. The html for the index main and sub screens is transferred over https. However, the html for the main screen for the pages after the index,(main server for DS Station unknown for NZone and third-party companies websites) is transferred with http. The sub screen html is transferred with https, with the main server. Sub screen html with third-party companies is transferred with http. |
| NetFront limits the size of html files that can be downloaded. The max size of a LZSS compressed .nds embedded in the exploit is between 121.7KB - 129.9KB. | | NetFront limits the size of html files that can be downloaded. The max size of a LZSS compressed .nds embedded in the exploit is between 121.7KB - 129.9KB. |