Difference between revisions of "DSi exploits"
(NZone haxx is completely dead.) |
|||
Line 9: | Line 9: | ||
− | The DSi [[Nintendo Zone]] client has a html parsing bug that could have been exploited to run homebrew with [[User:Yellows8|Yellows8]]'s [[Nintendo Zone#Exploits|nzonehtmlhaxx]], but that exploit is | + | The DSi [[Nintendo Zone]] client has a html parsing bug that could have been exploited to run homebrew with [[User:Yellows8|Yellows8]]'s [[Nintendo Zone#Exploits|nzonehtmlhaxx]], but that exploit is impossible to use since everything on Nintendo's and third-party servers use only HTTPS certs signed with Nintendo's root CA. This exploit was used to [[Nintendo_Zone#Server_exploits|crash]] DSi NZone twice by exploiting a EUR NZone server bug, Nintendo quickly fixed that server bug. |
+ | That EUR SSL reneg exploit was the only NZone servers hole in existence, there are no more SSL holes, there are zero http links on all NZone sites Nintendo and third-party, and there are zero NZone beacon data code buffer overflows. NZone haxx is completely dead. | ||
== DS-mode exploits == | == DS-mode exploits == |
Revision as of 19:00, 2 September 2010
This page is dedicated to the listing of exploits used used to run homebrew on the Nintendo DSi. Anyone may contribute to this list, as long as any exploits added are explained and verifiable.
DSi-mode exploits
Team Twiizers have found a DSi-Mode Exploit and have managed to use it to run DSi Mode homebrew. However it has not yet been released. More details at : [1] The additional hardware is just required to get a connection to a computer so that things like ram dumps can be created.
Wintermute has made available an open source DSi hack. The exploit works on DSi enhanced games, allowing you to run custom code from a save file. Instructions for using the exploit can be found here: [2]
The DSi Nintendo Zone client has a html parsing bug that could have been exploited to run homebrew with Yellows8's nzonehtmlhaxx, but that exploit is impossible to use since everything on Nintendo's and third-party servers use only HTTPS certs signed with Nintendo's root CA. This exploit was used to crash DSi NZone twice by exploiting a EUR NZone server bug, Nintendo quickly fixed that server bug.
That EUR SSL reneg exploit was the only NZone servers hole in existence, there are no more SSL holes, there are zero http links on all NZone sites Nintendo and third-party, and there are zero NZone beacon data code buffer overflows. NZone haxx is completely dead.
DS-mode exploits
This type of exploit is undesirable because all DSi functionality, such as usage of the cameras, is unavailable to homebrew.
Blasteh (Blasty) has posted a video on Youtube showing code being run in DS mode on the DSi using Fifa '08.