DSi system flaws: Difference between revisions

PoroCYon (talk | contribs)
No edit summary
Linked to source for overlay checking flaw
 
(2 intermediate revisions by 2 users not shown)
Line 54: Line 54:
|
|
| {{User|PoroCYon}}
| {{User|PoroCYon}}
|-
| [[stage1]] hash verification code is vulnerable to fault injection
| The [[stage1]] code that verifies the first two SHA1 hashes in the RSA signature appendix (the header hash and the "hash of hashes" redundancy hash) is constructed in such a way that they can be both bypassed with a single injected fault. This makes it possible to exploit both bootroms using a a modchip
|
|
| 2022
| nov/dec 2023, see [https://media.ccc.de/v/37c3-11736-nintendo_hacking_2023_2008 37c3 talk]
|}
|}


Line 96: Line 103:
| January 2010
| January 2010
|  
|  
| Datel, and {{User|blasty}} by reverse engineering Datel's [[Action Replay]]
| Datel, and {{User|blasty}} by [https://hackmii.com/2010/02/lawsuit-coming-in-3-2-1/ reverse engineering] Datel's [[Action Replay]]
|}
|}


== Applications ==
== Applications ==
Flaws in this category pertain to applications launched by [[System Menu]]. See also [[DSi_exploits]].
Flaws in this category pertain to applications launched by [[System Menu]]. See also [[DSi exploits]].