Hacking Smea's iosuhax

ARVI80

Well-Known Member
Member
Joined
Feb 25, 2016
Messages
197
Trophies
0
Age
43
Location
UK
XP
315
Country
Which format are the plugins? If they are unitypackage, yes.
Looking around, there is no wii u plugin or available unity version, with full support, that is attainable without being Dev approved. Unless someone leaks the package.
 

punderino

aka Big-PeePee Swinger
Member
Joined
Jan 5, 2016
Messages
1,247
Trophies
0
Age
32
Location
Kansas City, Missouri
Website
www.anus.trade
XP
2,514
Country
United States
Can i play whith this online and why this have the name like the PC games osu?
It's the name of part of the security system in the Wii U, ask Nintendo; and it's not released yet, you cannot actually install this exploit.
<snip>
 
Last edited by raulpica, , Reason: Removed reply to trashed post -rp

recgame77

Well-Known Member
Member
Joined
Dec 25, 2015
Messages
182
Trophies
0
Age
45
XP
280
Country
Cameroon
how is the custom fw.bin loaded ? what is the process ? to write it in memory from iosu then somehiw reinitialize itself ?
 

NWPlayer123

Well-Known Member
Member
Joined
Feb 17, 2012
Messages
2,642
Trophies
0
Location
The Everfree Forest
XP
6,693
Country
United States
I can't vouch for whatever SALT's been working on, but from what I've seen they're making it stable for the end user, smea's thing is hacky as heck, even says:
"also, fair warning : do NOT blindly use this. read the patches. running this with the wrong options enabled can/will brick your console. this release is oriented towards devs, not end users."

You've seen quag's menu stuff, NAND dumping sounds very simple and only has to run once whereas I can't vouch for reliability on smea's stuff, they probably have a more advanced custom firmware from a large amount of reverse engineering and the exploit isn't unstable like having multiple attempts just to dump the OTP (smdh), emuNAND is probably very easy to boot into as well, no idea if a persistent sploit has been achieved or will be released but
 

smealum

growing up sucks.
Member
Joined
May 1, 2006
Messages
635
Trophies
2
Age
31
Location
SF
Website
www.smealum.net
XP
2,516
Country
United States
I can't vouch for whatever SALT's been working on, but from what I've seen they're making it stable for the end user, smea's thing is hacky as heck, even says:
"also, fair warning : do NOT blindly use this. read the patches. running this with the wrong options enabled can/will brick your console. this release is oriented towards devs, not end users."

You've seen quag's menu stuff, NAND dumping sounds very simple and only has to run once whereas I can't vouch for reliability on smea's stuff, they probably have a more advanced custom firmware from a large amount of reverse engineering and the exploit isn't unstable like having multiple attempts just to dump the OTP (smdh), emuNAND is probably very easy to boot into as well, no idea if a persistent sploit has been achieved or will be released but
not oriented towards end users != hacky as heck

it's perfectly reliable and usable if you know what you're doing (which basically just requires the ability to actually read code)
 

Kohmei

Well-Known Member
Member
Joined
Feb 17, 2013
Messages
824
Trophies
0
XP
1,039
Country
United States
So I went ahead an complied this which was fun setting up, and after a successful make I'm left with a new fw.img in the work directory which I assume is patched(?), a folder of patched sections, and a wupserver.bin and elf

Out of morbid curiosity, if I had any idea what I was doing, what kind of thing would I be doing next? This seems oddly incomplete to me. Even if we assume the vulnerabilities/exploits aren't included, it seems like there are missing tools for all the purported functionalities like nand backup and nand redirection
 

VinsCool

Persona Secretiva Felineus
Global Moderator
Joined
Jan 7, 2014
Messages
14,600
Trophies
4
Location
Another World
Website
www.gbatemp.net
XP
25,207
Country
Canada
So I went ahead an complied this which was fun setting up, and after a successful make I'm left with a new fw.img in the work directory which I assume is patched(?), a folder of patched sections, and a wupserver.bin and elf

Out of morbid curiosity, if I had any idea what I was doing, what kind of thing would I be doing next? This seems oddly incomplete to me. Even if we assume the vulnerabilities/exploits aren't included, it seems like there are missing tools for all the purported functionalities like nand backup and nand redirection
Copy all files to your SD card, run .elf file ??? Profits.


inb4 brick.
 

Kohmei

Well-Known Member
Member
Joined
Feb 17, 2013
Messages
824
Trophies
0
XP
1,039
Country
United States
I assume the .elf/bin would need IOSU kernel access to run but to me that suggests the patched FW is already loaded. There seems to be a link in the chain missing in how the fw.img is supposed to either be loaded or installed
 

shinyquagsire23

SALT/Sm4sh Leak Guy
Member
Joined
Nov 18, 2012
Messages
1,977
Trophies
2
Age
26
Location
Las Vegas
XP
3,765
Country
United States
not oriented towards end users != hacky as heck

it's perfectly reliable and usable if you know what you're doing (which basically just requires the ability to actually read code)
Yeah I wouldn't call it hacky as heck, it's just really Not Nice for end users. It definitely works from a development standpoint if you're actually using it for development, but for end users there's not much to be gained yet. Half the problem is/was getting things nice enough and adding enough value that booting into redNAND isn't a pointless burden (assuming that users will be going through browserhax).
 
Last edited by shinyquagsire23,

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
  • No one is chatting at the moment.
    OctoAori20 @ OctoAori20: Nice nice-