Changes

Jump to navigation Jump to search
1,715 bytes added ,  01:34, 20 January 2018
Added a glossary for type of ds exploits.
Line 1: Line 1:  
This page is dedicated to the listing of exploits for the Nintendo DSi. Anyone may contribute to this list. This page my not, however be deleted in any way, this ensures that that development of this page is not slowed down. Due to the fact that this page has not changed for over a year due to resets, no more resets.
 
This page is dedicated to the listing of exploits for the Nintendo DSi. Anyone may contribute to this list. This page my not, however be deleted in any way, this ensures that that development of this page is not slowed down. Due to the fact that this page has not changed for over a year due to resets, no more resets.
 +
 +
== Type of exploits ==
 +
Here is a general list of all the different types/terms of exploits to know. This is to know the differences of each exploit.
 +
*'''NTR/NDS-Mode Exploits:'''
 +
These are ARM9 exploits that takes over a NDS-mode cartridge. These cartridges are labeled as ''NTR''. These type of exploits are very limited since there's no SD or NAND access. They can be used to run a small payload. These exploits are almost useless.
 +
*'''TWL/DSi-Enhanced Mode Exploits:'''
 +
These are ARM9 exploits that take over a enhanced DSi mode cartridge. These cartridges are labled as ''TWL''. Unfortunately they don't have SD or NAND access, so you cannot use the SD card or downgrade. They can be used to gather console information and maybe find other vulnerabilities. These exploits can also be used for dslink, which can load homebrew apps in DSi-Mode via internet connections.
 +
*'''DSiWare(True DSi-Mode) Exploits:'''
 +
These are ARM9 exploits that take over a DSiWare title. They run in the same context that Enhanced games do, but with the addition of SD and NAND access. These exploits are valuable since can be used to downgrade the console firmware to older versions. You can also run commercial homebrew off of the SD card with these exploits. However this doesn't allow any cartridge access.
 +
*'''ARM7 Exploits:'''
 +
These exploits take over the ARMv7 processor. In the DSi, these processor handles critical operations and cryptography operations, among other things. These exploits are extremely rare and there's no concrete targets. The DSi menu (The Launcher) is known to run in the ARM7 context. At the moment there's only one exploit known, RocketLauncher. These exploits allow FULL ACCESS with the DSi launcher.
    
== DSi-mode exploits ==
 
== DSi-mode exploits ==

Navigation menu