Recent content by walk12288

  1. W

    Hacking Zelda Buffer overflow

    Exactly, because it's becoming more popular (and Nintendo was bragging about security), I wouldn't really be surprised if they have protection against buffer overflows. There are still ways to exploit them even then, but the chances of doing that are rare. I still think that we'll see a...
  2. W

    Hacking 3DS mode is very toughDo

    Public keys are found through math/exploits. As he stated they would allow for you to decrypt the ROMs as the CPU does at runtime. Private keys (like the ones that $ony didn't protect) allow you to actually sign the code (it would look like Nintendo wrote the program). Bypassing signature...
  3. W

    Hacking Zelda Buffer overflow

    Someone else didn't read my post on the first page > : D! It's only possible to perform a buffer overflow exploit if there is no hardware based protection (read this: https://lirias.kuleuven.be/bitstream/123456...77/1/paper.pdf). On top of that, if you are exploiting a string, the developer must...
  4. W

    Hacking Zelda Buffer overflow

    This is completely useless aside from feeding someone's fantasy. There are two main types of buffer overflows: Heap and Stack overflows. Stack based overflows write more data to a buffer on the stack than has been allocated. This can allow for the overwriting of a function pointer or return...
  5. W

    Hacking 3DS roms yet?

    @Ravenius Why do Xbox 360 and PS3 games cost $60 on release when the EXACT SAME PC game usually costs $45-$50? By using your argument that piracy hurts sales and development companies, then you could justify the higher price tag by saying that you are compensating for the massive amount of...
General chit-chat
Help Users
    The Real Jdbye @ The Real Jdbye: @BigOnYa series S is the way to go, its a bargain for a capable system