Changes

581 bytes added ,  17:20, 17 June 2019
no edit summary
Line 4: Line 4:  
Here is a general list of all the different types/terms of exploits to know. This is to know the differences of each exploit.
 
Here is a general list of all the different types/terms of exploits to know. This is to know the differences of each exploit.
 
*'''NTR/NDS-Mode Exploits:'''
 
*'''NTR/NDS-Mode Exploits:'''
These are ARM9 exploits that takes over a NDS-mode cartridge. These cartridges are labeled as ''NTR''. These type of exploits are very limited since there's no SD or NAND access. They can be used to run a small payload. These exploits are almost useless.
+
These are ARM9 exploits that takes over a NDS-mode cartridge. These cartridges (on the back) are labeled as ''NTR''. These type of exploits are very limited since there's no SD or NAND access. They can be used to run a small binary payload making these exploits almost useless.
 
*'''TWL/DSi-Enhanced Cart Exploits:'''
 
*'''TWL/DSi-Enhanced Cart Exploits:'''
These are ARM9 exploits that take over a enhanced DSi mode cartridge. These cartridges are labled as ''TWL''. Unfortunately they don't have SD or NAND access, so you cannot use the SD card or downgrade. They can be used to gather console information and maybe find other vulnerabilities. These exploits can also be used for dslink, which can load homebrew apps in DSi-Mode via internet connections.
+
These are ARM9 exploits that take over a enhanced DSi-mode cartridge. These cartridges (on the back) are labeled as ''TWL''. Unfortunately they don't have SD or NAND access but can be used to gather console information and maybe find other vulnerabilities. These exploits can also be used for dslink, which can load homebrew applications via internet connections.
 
*'''DSiWare(True DSi-Mode) Exploits:'''
 
*'''DSiWare(True DSi-Mode) Exploits:'''
These are ARM9 exploits that take over a DSiWare title. They run in the same context that Enhanced games do, but with the addition of SD and NAND access. These exploits are valuable since can be used to downgrade the console firmware to older versions. You can also run commercial homebrew off of the SD card with these exploits. However this doesn't allow any cartridge access.
+
These are ARM9 exploits that take over a DSiWare title. They run in the same context that the DSi-Enhanced games do, but with additional SD and NAND access. These exploits are valuable since they can be used to downgrade the console firmware to older versions. You can also run commercial homebrew applications from the SD card. However this doesn't allow any cartridge access.
 
*'''ARM7 Exploits:'''
 
*'''ARM7 Exploits:'''
These exploits take over the ARMv7 processor. In the DSi, these processor handles critical operations and cryptography operations, among other things. These exploits are extremely rare and there's no concrete targets. The DSi menu (The Launcher) is known to run in the ARM7 context. At the moment there's only one exploit known, RocketLauncher. These exploits allow FULL ACCESS with the DSi launcher.
+
These exploits take over the ARMv7 processor. In the DSi, these processor handles critical operations and cryptography operations, among other things. These exploits are extremely rare and there's no concrete targets. The DSi menu (The Launcher) is known to run in the ARM7 context. At the moment there's only one exploit known as RocketLauncher. These exploits allow FULL ACCESS with the DSi launcher.
 +
*'''Bootcode Exploits:'''
 +
These exploits gain full SCFG_EXT access rights immediately after powering on the system (right before starting the launcher). These exploits are significantly rare and concrete targets can be the launcher's ''title.tmd''. At the moment, nocash's exploit, ''Unlaunch'' is the only known exploit.
    
== DSi-mode exploits ==
 
== DSi-mode exploits ==
Line 16: Line 18:     
shutterbug2000 has created an exploit for Flipnote Studio, which uses a modified flipnote that you have to paste 122 times exactly. The exploit can be used with fwtool to downgrade the dsi to be able to use [[Sudokuhax]] or things like it. wintermute and fincs simple 1 paste exploit can be found here [https://davejmurphy.com/%CD%A1-%CD%9C%CA%96-%CD%A1/].
 
shutterbug2000 has created an exploit for Flipnote Studio, which uses a modified flipnote that you have to paste 122 times exactly. The exploit can be used with fwtool to downgrade the dsi to be able to use [[Sudokuhax]] or things like it. wintermute and fincs simple 1 paste exploit can be found here [https://davejmurphy.com/%CD%A1-%CD%9C%CA%96-%CD%A1/].
 +
 +
ChampionLeake has released an exploit for UNO, a regular DSiWare savegame exploit. Instructions to installing the exploit are here:  [https://github.com/ChampionLeake/UNO-pwn#installing-unopwn]
    
The source of the majority of the old dsiware exploits can be found on yellows8's github page [https://github.com/yellows8/dsi]
 
The source of the majority of the old dsiware exploits can be found on yellows8's github page [https://github.com/yellows8/dsi]
 +
 +
An incomplete list of all DSi exploits are here: [[List of DSi Exploits]]
    
== DSi Enhanced exploits ==
 
== DSi Enhanced exploits ==
15

edits