Talk:DSi exploits
Dub-T's Nintendo DSi Shop Hack
Erm, doesn't this just follow from what I wrote on Hackmii? http://hackmii.com/2009/01/dsibrew/ --Bushing 11:41, 20 April 2009 (UTC)
Kasu's Hack
FakeĀ ? Everyone can do that using a DSi flashcard and remove it afterĀ !
If it isn't a fake show us how you load the codeĀ ! --Ludo6431 16:39, 20 April 2009 (UTC)
Exploit via Opera?
The DSi Webbrowser is based on an older Opera 9.5/9.6 as I know and there are several security issues like the possibility of executing code through manipulated jpeg-images (here more detailed).
Wouldn't it be possible to use such a security hole to start homebrew from the SD card?
Advantages:
1. Opera DSi webbrowser runs in native DSi mode --> access to all DSi features
2. Easy to use: Just save your homebrew on your SD card, surf to the manipulated image an execute your homebrew
3. No extra game/stuff/anything needed, you just have to download the DSi webbrowser for free and then you can start using homebrew on your DSi
Disadvantage:
It has to be found out how to use such a security issue
I have no idea if this is possible and because I don't have the skills to do that, I thought I tell your about and you say if this idea is realistic.
--Makorus 09:19, 9 May 2009 (UTC)
This exploit use a buffer overflow by accesing to an URI (file://) with a very long adress but it's need that the file has to be in the disk.
URI link with Nintendo DSi Browser doesnt't work. [1] (link in French)
--Geniusdj 13:30, 9 May 2009 (CET)
I talked especially about manipulated jpegs, because I suppose (I don't really know, but I think so) they can contain the code that shall be executed.
--Makorus 17:53, 9 May 2009 (UTC)
I was looking for a sample of those manipulated jpegs for Opera < v9.64 and that seems that is it only a vulnerability and not an exploit. The only exploit is the one with URIĀ : i tried two example of thisĀ : [2], the browser seems to be slower and after, it's show a page that saysĀ : "Out of memory. The page may not display correctly" or "The page have a wrong path".
Someone know the path to memory card of DSiĀ ? 'Cause the exploit count on this by putting a file on the disk.
--Geniusdj 13:22, 9 May 2009 (CET)
Bannerbomb for DSi?
I think something like (Bannerbomb) should be possible, because the Firmware of the DSi is similar to the Firmware of the Wii.--Ninko 20:07, 16 May 2009 (UTC)
- The problem with that is that the DSi uses simple bitmaps for banners, and not the intricate proprietary format Nintendo uses. So, unless Nintendo fail at bitmap parsing, there isn't likely to be an exploit there. Muzer 09:14, 17 May 2009 (UTC)
- Oh, I didn't know that. Ninko 18:11, 17 May 2009 (UTC)
- What if you were to attempt to load a corrupted file? Does the DSi have safeguards in place to prevent a malformed bitmap from being loaded? Ploogle 17:24, 24 May 2009 (GMT -8:00)
Camera or Sound Channel Exploit?
Has anyone looked into an exploit involving loading a corrupted sound or image file into the Sound or Camera channel via the SD card? How about a purposefully corrupted filesystem on the SD card? Ploogle 17:29, 24 May 2009 (GMT -8:00)
Dsi Homebrew via DS Download play?
Wouldn't it be possible to develope an app for Wii, which sends a kind of Installer via WiFi to the dsi and then dowload and run it with DS download play? The Wii can send things to the DS(i) so the connectivity is given, isn't it?
Sounds umm... interesting, but it would be inconvenient for users who don't own a wii TwoBladedKnight 09:49, 12 June 2009 (UTC)