Homebrew Idea: SSL exploit, Flipnote, and the DSi system updater

  • Thread starter Deleted User
  • Start date
  • Views 3,721
  • Replies 18
  • Likes 8
D

Deleted User

Guest
OP
Is the DSI's updater XML/SOAP request signature not checked apart from HTTPS/the installed title signatures?
If it is NOT, could we use the SSL constraint exploit to add Flipnote studio as an "updated title" and install it without the shop? Because it would be the untouched tmd/ticket/app it wouldn't fail the "inner" sig check
 
D

Deleted User

Guest
OP
I was trying to find more information about the update requests and, hilariously, the #1 hit on Google for "dsi updater soap" is this literal thread
 
  • Like
Reactions: banjo2

SCOTT0852

shiny rubber creature
Member
Joined
Jan 20, 2018
Messages
1,140
Trophies
0
Location
The Moon
XP
1,133
Country
United States
There's shutterbug that is already working on an exploit using the SSL flaw
That's different from this though. Shutter's flaw is to run code to install unlaunch whenever any DSi app connects to the network, this is trying to use the system update feature to install Flipnote Studio, which we can exploit.
 
D

Deleted User

Guest
OP
That's different from this though. Shutter's flaw is to run code to install unlaunch whenever any DSi app connects to the network, this is trying to use the system update feature to install Flipnote Studio, which we can exploit.
This, if it works, would also be an order of magnitude easier to actually make.
 

edo9300

Well-Known Member
Member
Joined
Aug 19, 2018
Messages
102
Trophies
0
Age
24
XP
1,085
Country
Italy
Had this idea, instead of downloading an exploitable dsiware, once you can download anything you want, you should be able to directly install an homebrew that let's you mod the ds without performing any exploit
 
D

Deleted User

Guest
OP
Had this idea, instead of downloading an exploitable dsiware, once you can download anything you want, you should be able to directly install an homebrew that let's you mod the ds without performing any exploit
That is not possible.

The updater downloads a list of official, signed titles and installs them. HOWEVER, that list can be edited to include anything that is/was free on the eShop (like Flipnote and the browser, and maybe 4SAE). Not just any code from anywhere
 

bennyman123abc

Well-Known Member
Member
Joined
Mar 21, 2013
Messages
920
Trophies
1
Age
22
Location
Alton, IL
XP
1,208
Country
United States
That is not possible.

The updater downloads a list of official, signed titles and installs them. HOWEVER, that list can be edited to include anything that is/was free on the eShop (like Flipnote and the browser, and maybe 4SAE). Not just any code from anywhere
Okie. Now how do you propose we edit this list?
 

Flashed

Well-Known Member
Member
Joined
Feb 3, 2016
Messages
325
Trophies
0
Age
25
Location
Madrid
XP
409
Country
Spain
This point is really interesting. I have been reading a lot about DNS Spoofing, and knowing that now we can bypass SSL, we should have acces to the updater tool.
Nevertheless, this will require reverse engineering. Tools like wireshark may help a lot.
 

b0br

New Member
Newbie
Joined
Dec 4, 2018
Messages
1
Trophies
0
Age
42
XP
47
Country
United Kingdom
hello all (^_^)
b0br here
I'm new

its there a rogue app store? can we run a httpdssl server, dns resolve locally, recreate the shop and put up our own downloads then?
 
D

Deleted User

Guest
OP
Would be really cool if that would work. Imagine managing to make it so the DSi could install homebrew from the eShop as though it was signed.
It's possible if you were to delete the old eShop and make a patched one without RSA checks, but not directly without unlaunch
 

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
    AncientBoi @ AncientBoi: :rofl2: