Announcing RocketLauncher! The first exploit with unlocked Arm7!

UPDATE:
Looks like NoCash found an exploit that is even better then RocketLauncher:

https://problemkaputt.de/gba.htm

He titled it Unlaunch. The exploit works by exploiting a flaw in Stage2 and apparently works on all firmware versions. It requires you run the installer from a DSiWare based hax environment as access to SD/NAND is required. (thus you can't run this from Slot-1 based TWL exploit)

The flaw in stage2 is a buffer overflow involving Launcher's TMD file. If you provide a larger then normal TMD file, it will attempt to load the TMD into ram anyways (this occurs before it does the RSA check) This causes it to overwrite some code in arm9 ram causing arm9 to execute the custom payload. The full details are found in the info menus in the installer.

Note however the installer does not appear to work correctly at the moment. I'd advise you not attempt to install it from the installer. Use the manual install method instead. BUT I'd highly recommend you have a hard mod before attempting manual install. If you have had experience modifying your nand you may be ok doing this. But for safety sake I would just advise against that until the installer works properly.

(this is one reason why RL hasn't been released yet. No proper installer tools are available yet and we don't want people bricking consoles trying to install it)

The release of this exploit may impact our plans regarding RocketLauncher. I'll post more about this once StuckPixel has decided to comment on this.


Important Notice:

Do NOT visit Data Management in DSi System Settings or use the 3DS Transfer tool after installing unlaunch. You WILL brick the console. Wait until HiyaCFW is refined/released properly so that SD redirected version of Launcher can be used or when NoCash decides to implement his own version of the SD redirect patch.








Today I can finally announce a new exploit for the Nintendo DSi. I found this flaw back on May 29th. Almost a year after NoCash initially discovered a oversight by Nintendo involving the DS Cart White list which this exploit takes advantage of (Nintendo forgot to reimplement the RSA checks on it lolz). I was fudging with various things in the white list to try and get a crash. I got system menu to crash by using large values in section 3! So I contacted NoCash and a few other devs about this to investigate it and to see if it's exploitable. Well long story short it was!


Summery of the above video:

1. The exploit requires 1.4.0 firmware! Older or newer fw revisions do not work!
2. The exploit requires a flashcart that you are able to modify the internal rom it presents to the system.
3. Details on which cards will be compatible will be revealed at a later time.
4. The exploit involves a buffer overflow flaw involving section 3 of the white list.
5. This overflow occurs on arm7 thus allowing overwriting memory exclusive to arm7.
6. As a result a large enough overflow will hit the IRQ interrupt handler. This is how we gain code execution.
7. Arm9 was relatively easy to take over. Though data caching presented a minor roadblock while testing on hardware. :P
8. I currently use a modified build of nds-bootloader from WinterMute's github. You know, that portion of hbmenu responsible for booting SRLs. :P
9. Because we already gained arm7 we only had to put arm9 in the correct wait state so that nds-bootloader can do it's thing. :D
10. The exploit in theory can work from the menu once it's running. But we currently make use of the auto boot feature to ensure a stable consistant environment. Tests with a second console suggest that is the case. Note that the exception vector for arm7 seems to either be somewhere else once the menu GUI is running or the overflow hits something else causing arm7 to crash early. Currently we plan to only target exploiting the system with an autoboot rom as it's more predictable.
11. The exact machanics of the arm9 take over and how nds-bootloader is loaded may change. Currently the entire payload fits on the cart. But we may allow reading a payload off SD instead.

Credits to NoCash, Gericom, and Normmatt for help testing/figuring this out. Big credit to StuckPixel who put in most of the coding needed to make this happen. My contribution was finding the flaw and help with testing on hardware.


I will release further details as we finalize this exploit and prepare stuff that will make installing it easier.

Note you will either need a nand mod or a DSiWare based exploit to downgrade your console/install the modified white list needed for this to work. Hopefully we'll have a better solution then simply using fwtool to do this so that may be the factor that determines release date so please be patient!

When things are ready I will update this thread!
 
Last edited by Apache Thunder,
D

Deleted-236924

Guest
The DSiWare has the SRL in with the footer etcetera. Unless Nintendo signed 3DS Transfer Tool for everyone, and they didn't since they did for FnS but your key is still there; you go into the footer and there's "RootCA-characters-CHARACTERS" - the CHARACTERS are your ConsoleID

How do you suggest I obtain the required information off of a system app that can't be moved to SD card?
 
  • Like
Reactions: Deleted User
D

Deleted User

Guest
How do you suggest I obtain the required information off of a system app that can't be moved to SD card?
You.. can't.
I only said 3DS Transfer Tool because IIRC you can copy to SD, but you have to copy DSiWare over to SD. Heck, anything that is _DSiWare on your SD_ will work.
 

Jhynjhiruu

Well-Known Member
Member
Joined
Dec 31, 2016
Messages
817
Trophies
0
Age
21
XP
1,708
Country
I need a list of all the apps that will work with this, as my friend has literally nothing installed on his DSi, not even Flipnote or the browser. He just has System Settings, camera, PictoChat, sound, shop and download play.
 
D

Deleted User

Guest
I need a list of all the apps that will work with this, as my friend has literally nothing installed on his DSi, not even Flipnote or the browser. He just has System Settings, camera, PictoChat, sound, shop and download play.

Your friend will need to hardmod, unless they're already on 1.4. There is no way around this, and likely never will be.
 

smf

Well-Known Member
Member
Joined
Feb 23, 2009
Messages
6,643
Trophies
2
XP
5,864
Country
United Kingdom
Your friend will need to hardmod, unless they're already on 1.4. There is no way around this, and likely never will be.

How can they get the console id to do a hardmod if they don't have any dsi ware? Even if they are on 1.4, they'll need the console id to install the rocketlauncher white list.

I need a list of all the apps that will work with this, as my friend has literally nothing installed on his DSi, not even Flipnote or the browser. He just has System Settings, camera, PictoChat, sound, shop and download play.

Go into system settings, then data management, one at a time click anything listed in system memory & select copy. If there is nothing there, or it says it can't be copied then unless another way to obtain your console id comes out then you need a new console.

Of course it's possible that one of the apps that is impossible to remove, has an exploit that lets you run code that can access the console id, cid & nand. But nothing like that has been discussed. If the exploit that has been found is in an app on 99% of DSi then I doubt there will be any interest in finding an exploit for the other 1%.
 
Last edited by smf,

Valery0p

Well-Known Member
Member
Joined
Jan 16, 2017
Messages
560
Trophies
0
XP
1,646
Country
Italy
I have a uk DSi with sudokuhax already installed and an acekard 2i. So I'll fight you for it.

I tried to dump everything and decrypt it, but I think fwtool can't backup cid.bin because sudokuhax is an arse

http://ngemu.com/threads/dsi-cid-discovered.169257/

Normmatt: Thats because keyslot3 was corrupted by sudokuhax to prevent people from decrypting their nands.

Supposedly v1.1 might be different, but bootmii.org has taken down the clients and server for generating it. Do I have any other option than biggest loser? Or will rocketlauncher come with a downgrader that can work regardless?

Someone with an eur sudokuhax? Mhh...
Anyways, on yellows8's github there are the souce code of the exploits, so if you can compile them...
 
D

Deleted User

Guest
How can they get the console id to do a hardmod if they don't have any dsi ware? Even if they are on 1.4, they'll need the console id to install the rocketlauncher white list.
Oh, that's a good point. In which case, I suppose they can't retrieve their Console ID.
Where did you hear that you need the Console ID to install the RocketLauncher whitelist? This is the first time I've heard of this.
 

firke_the_one

*insert custom title*
Member
Joined
Jan 9, 2016
Messages
234
Trophies
0
XP
744
Country
Croatia
Oh, that's a good point. In which case, I suppose they can't retrieve their Console ID.
Where did you hear that you need the Console ID to install the RocketLauncher whitelist? This is the first time I've heard of this.
it's same as downgrading a normal whitelist, but this time you're not downgrading it but just installing a custom one
 

RocketRobz

Stylish TWiLight Hero
Developer
Joined
Oct 1, 2010
Messages
16,601
Trophies
3
Age
24
XP
21,004
Country
United States
Oh, that's a good point. In which case, I suppose they can't retrieve their Console ID.
Where did you hear that you need the Console ID to install the RocketLauncher whitelist? This is the first time I've heard of this.
Well, one will need a Console ID to decrypt the DSi NAND using twltool, in order to install the RocketLauncher whitelist.
 
D

Deleted User

Guest
Well, one will need a Console ID to decrypt the DSi NAND using twltool, in order to install the RocketLauncher whitelist.
Ah. Wonderful.
I guess that's one less device I own that's eligible for RocketLauncher. :/
Though, it's technically possible to extract it from the RAM, yes? Not that I would/could ever attempt something like that.
 
Last edited by ,

smf

Well-Known Member
Member
Joined
Feb 23, 2009
Messages
6,643
Trophies
2
XP
5,864
Country
United Kingdom
Someone with an eur sudokuhax? Mhh...
Anyways, on yellows8's github there are the souce code of the exploits, so if you can compile them...

It's a common problem, so if it were easy then I imagine it would have been done by now. I might take a look, but I don't want to break my dsi.
 

RocketRobz

Stylish TWiLight Hero
Developer
Joined
Oct 1, 2010
Messages
16,601
Trophies
3
Age
24
XP
21,004
Country
United States
It's a common problem, so if it were easy then I imagine it would have been done by now. I might take a look, but I don't want to break my dsi.
Your DSi will only brick if you flash a decrypted NAND on it, instead of an encrypted one.
 

CatmanFan

Anxious and regretful
Member
Joined
Aug 14, 2016
Messages
1,962
Trophies
0
Website
www.youtube.com
XP
2,591
Country
Morocco
@Robz8 BTW, I'm on 1.4E and I have only DSi Browser. I don't have Sudoku or any other exploitable DSiWare, not even Flipnote. Will I be able to install RocketLauncher and do other stuff with the future dsibrowserhax?
 

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
  • No one is chatting at the moment.
    Metoroid0 @ Metoroid0: im more interested in metroid prime 4