I'm gonna use Ds Exploit with Qr Code and code.bin but http://dukesrg.no-ip.org/3ds/rop/?LoadCode4.dat&code.bin and the other websites is down have you any alternates?
http://www.reboot.ms/3ds/load.html?code.bini got the error message on home page but exploit didnt happened
i think this reboot.ms is a fake website u can write whatever u want just like http://www.reboot.ms/3ds/load.html?filo97.gbatemp
3ds.reboot.ms ISN'T FAKE! is just that i don't know how to use it, even dukesrg.github.io does act like thati think this reboot.ms is a fake website u can write whatever u want just like http://www.reboot.ms/3ds/load.html?filo97.gbatemp
still looks like working but doesnt actually work
i did everything right. i have right code.bin file and 4.5 eu 3ds but it didnt work. its about website i think3ds.reboot.ms ISN'T FAKE! is just that i don't know how to use it, even dukesrg.github.io does act like that
well, it's not fake, maybe it doesn't suppport code.bin (also, to inject a ds profle exploit you must leave the browser on for about one minute) or stuff like that, but at me seems strange since what is on 3ds.reboot.ms works.i did everything right. i have right code.bin file and 4.5 eu 3ds but it didnt work. its about website i think
well, in the otp guide it doesn't make you boot a code.bin... (try to type on your pc as url reboot.ms)reboot.ms does work I used it in the OTP guide
No but you do boot a .dat with it when upgrading to 9.2well, in the otp guide it doesn't make you boot a code.bin... (try to type on your pc as url reboot.ms)
what is that? and tell me how it can be vulnerable.Lol, reboot.ms is vulnerable to XSS exploits. Bad Web developers.
XSS = cross site scripting. This would allow an attacker to include a remote URL to a malicious script (say a cookie stealing Javascript) and it would execute. This is because the site parses HTML input into the address bar after "load.html?".what is that? and tell me how it can be vulnerable.
well, then even dukesrg.github.ioXSS = cross site scripting. This would allow an attacker to include a remote URL to a malicious script (say a cookie stealing Javascript) and it would execute. This is because the site parses HTML input into the address bar after "load.html?".
Example: http://www.reboot.ms/3ds/load.html?<h1>derp</h1>