Difference between revisions of "DSi exploits"

From DSiBrew
Jump to navigation Jump to search
Line 9: Line 9:
  
  
The DSi [[Nintendo Zone]] client has a bug that can used to run some homebrew. Linux/hostapd compatible box is required and only certain Wifi NICs can be used with hostapd. It's unknown if it's possible to use a flash card or a SD card with this exploit, it's unknown if sysmenu locks out either of those. [[User:Yellows8|Yellows8]]'s [[Nintendo Zone#Exploits|nzoneurlstacksmash]] should work with DSi NZone. This exploit can't be tested with DSi [[User:Yellows8|until]] Nintendo Zone AP beacons captures are obtained, to clone a Nintendo Zone AP at home. NZone is region-locked: you can't forward a connection with the Europe DNS server name, to the USA NZone server due to TLS cert server name verification. And an USA NZone SSID won't work with Europe NZone. The region-specific URLs NZone uses for the initial server HTTPS connection is hard-coded. Once obtained, only a USA Best Buy SSID could be released. Since the index main screen html was moved to HTTPS and DS Station uses HTTP with a different URL, the NZone client can't be used with the DS Station server. Thus, only NZone AP SSIDs can be used with the NZone client. The only locations in the following list that could be usable with the exploit and could be released once obtained, is the Best Buy locations, and Japan. Nintendo Zone is available in Japan. Nintendo World Store in New York City used to have NZone, but they don't have NZone or even DS Download Station anymore. A few McDonalds test locations in [http://translate.google.com/translate?langpair=de|en&u=http%3A%2F%2Fnintendo.de%2FNOE%2Fde_DE%2Fnews%2Fevents%2Fpilotprojekt_-_nintendo_zone_bei_mcdonalds_18254.html Germany] have NZone. The test Germany locations are only available for a limited time, see the URL. Several USA Best Buy locations started a NZone test service in June 2009, see [http://gonintendo.com/viewstory.php?id=84077 this]. It's unknown if those Best Buy locations still have NZone.
+
The DSi [[Nintendo Zone]] client has a html parsing bug that could have been exploited to run homebrew with [[User:Yellows8|Yellows8]]'s [[Nintendo Zone#Exploits|nzoneurlstacksmash]], but that exploit is useless since everything on Nintendo's and third-party servers use only HTTPS certs signed with Nintendo's root CA.
  
 
== DS-mode exploits ==
 
== DS-mode exploits ==

Revision as of 22:33, 7 August 2010

This page is dedicated to the listing of exploits used used to run homebrew on the Nintendo DSi. Anyone may contribute to this list, as long as any exploits added are explained and verifiable.

DSi-mode exploits

Team Twiizers have found a DSi-Mode Exploit and have managed to use it to run DSi Mode homebrew. However it has not yet been released. More details at : [1] The additional hardware is just required to get a connection to a computer so that things like ram dumps can be created.


Wintermute has made available an open source DSi hack. The exploit works on DSi enhanced games, allowing you to run custom code from a save file. Instructions for using the exploit can be found here: [2]


The DSi Nintendo Zone client has a html parsing bug that could have been exploited to run homebrew with Yellows8's nzoneurlstacksmash, but that exploit is useless since everything on Nintendo's and third-party servers use only HTTPS certs signed with Nintendo's root CA.

DS-mode exploits

This type of exploit is undesirable because all DSi functionality, such as usage of the cameras, is unavailable to homebrew.

Blasteh (Blasty) has posted a video on Youtube showing code being run in DS mode on the DSi using Fifa '08.