Nope. Actually looking for an ARM11 flaw. Nothing to do with the browserhax or smashhax.Pretty sure the "exploit" is just a speculation of an entrypoint from yellows8's research too
Pretty sure the "exploit" is just a speculation of an entrypoint from yellows8's research too
Yea. Need to edit the OP when I get time.There really is no exploit. This thread is about trying to find one that works on 9.3+ firmwares, so it's perfectly valid. The title and first post could be a little more clear, but either way I don't think Mass has ever claimed he had a working exploit, just that he was looking for it.
oh ok, dont read it |8Yea. Need to edit the OP when I get time.
You should edit that it will take some time in general too, to stop people from asking "when dae exploit out?"Yea. Need to edit the OP when I get time.
You should edit that it will take some time in general too, to stop people from asking "when dae exploit out?"
Not that I actually expect it to be released at allif only it was that easy...
Not that I actually expect it to be released at all
Besides, I don't really need it, just letting people have hope.
That's what we're working on.Was there a new ARM11 kernel exploit discovered or something?
sounds slighttly valid! What do you think Mass?If you use the amiibo NFC Reader in Nintendo 3DS (or New Nintendo 3DS his NFC Point) by simply reading the data, you can access to the kernel of the console.
In other words: The NFC port of the console have kernel permissions, because is registering your data in the amiibo. So if we open an simulated NFC port that can open the kernel... We'll have access to kernel version 9.5 to 10.1.
To try, nothing happens. This is my idea.
You could program an downgrade and run it from the NFC port.
Only problem is that no known title has the the nfc ports with kernelIf you use the amiibo NFC Reader in Nintendo 3DS (or New Nintendo 3DS his NFC Point) by simply reading the data, you can access to the kernel of the console.
In other words: The NFC port of the console have kernel permissions, because is registering your data in the amiibo. So if we open an simulated NFC port that can open the kernel... We'll have access to kernel version 9.5 to 10.1.
To try, nothing happens. This is my idea.
You could program an downgrade and run it from the NFC port.
If you use the amiibo NFC Reader in Nintendo 3DS (or New Nintendo 3DS his NFC Point) by simply reading the data, you can access to the kernel of the console.
In other words: The NFC port of the console have kernel permissions, because is registering your data in the amiibo. So if we open an simulated NFC port that can open the kernel... We'll have access to kernel version 9.5 to 10.1.
To try, nothing happens. This is my idea.
You could program an downgrade and run it from the NFC port.
If you use the amiibo NFC Reader in Nintendo 3DS (or New Nintendo 3DS his NFC Point) by simply reading the data, you can access to the kernel of the console.
In other words: The NFC port of the console have kernel permissions, because is registering your data in the amiibo. So if we open an simulated NFC port that can open the kernel... We'll have access to kernel version 9.5 to 10.1.
To try, nothing happens. This is my idea. (Sorry for my English, I hope you can understand it)
Nope. Actually looking for an ARM11 flaw. Nothing to do with the browserhax or smashhax.
Of course I know that.How exactly do you intend to find an exploit in the ARM11 kernel? It isn't exactly easy, you know...
Of course I know that.
Literally sifting through a decrypted firmware file.How exactly are you searching? Like are you literally sifting through the programming? Of images of the ram?