Search results

  1. Hillary_Clinton

    Hacking CVE-2016-4657 walk-through and intro to browser exploitation

    Yes, it's a proof of concept, but a critical part of the proof is seeing that the length changed, and I'm not reaching that alert. So this makes me curious exactly what his setup was, if he was reliably having success. Edit: Okay, now if I set up my server with his exact files freshly unzipped...
  2. Hillary_Clinton

    Hacking CVE-2016-4657 walk-through and intro to browser exploitation

    But it's not supposed to crash; if you watch the first video, he gets all the way through. What I think you're saying is: this is expected behavior since it's just a really touchy exploit? Edit: It sometimes makes it to the "misaligned" alert.
  3. Hillary_Clinton

    Hacking CVE-2016-4657 walk-through and intro to browser exploitation

    Still crashes after the first two alerts. :huh: Is it working any better for you?
  4. Hillary_Clinton

    Hacking CVE-2016-4657 walk-through and intro to browser exploitation

    What I mean is, it doesn't get to the part where it's supposed to alert "smash.length is now: 0x1337" It should get there before crashing.
  5. Hillary_Clinton

    Hacking CVE-2016-4657 walk-through and intro to browser exploitation

    always crashes before the end for me
  6. Hillary_Clinton

    Hacking A few words on IOSU, redNAND, and iosuhax.

    I'm Hillary Clinton and I approve this message
  7. Hillary_Clinton

    Who do you think is going to become the next president of the USA?

    That's like something out of an Agatha Christie novel.
  8. Hillary_Clinton

    Hacking OTP access via IOSU kernel

    I put that in there; I don't know if it makes a difference in code's execution. It's an instruction memory barrier. The entire .zip is only meant to return from a syscall and then branch to userland IOS-USB so we're not blocking the rest of IOSU from running. It's not really cool so there was...
  9. Hillary_Clinton

    Hacking OTP access via IOSU kernel

    Just so you guys know, Donald_Trump isn't responding because he's locked out of the thread because they think he's a duplicate account.
  10. Hillary_Clinton

    Hacking OTP access via IOSU kernel

    Don't run this on 5.3.2, please. It was built for 5.5.1 and it hasn't been tested on anything else.
  11. Hillary_Clinton

    Hacking OTP access via IOSU kernel

    Yeah it failed for me like ten times in a row.
  12. Hillary_Clinton

    Hacking OTP access via IOSU kernel

    No, it's not fake. There are screenshots earlier in the thread. If it displays all zeroes, it didn't work, so you should try again.
  13. Hillary_Clinton

    Hacking OTP access via IOSU kernel

    You can directly load the homebrew launcher from loadiine.ovh. That's how I do it.
  14. Hillary_Clinton

    Hacking OTP access via IOSU kernel

    It displays it to the screen only, no writing to the SD card. It's a start.
  15. Hillary_Clinton

    Hacking ROP from within IOS_USB (5.5.1)

    Hello! Yes, you must change two files inside the dynamic_libs folder. Just copy dynamic_libs from the .zip I posted earlier and merge it into your project folder, and that ought to work.
  16. Hillary_Clinton

    Hacking ROP from within IOS_USB (5.5.1)

    I didn't find the IOSU syscall table myself, although I understand how it must have been found. The syscall handler is installed at address 0xFFFF0004. It is located at 0x0812DD6C. You can see that at address 0x0812DDF4 the syscall handler loads the address of the syscall table (0x081419F0) and...
  17. Hillary_Clinton

    Hacking ROP from within IOS_USB (5.5.1)

    Here's IOSU kernel code execution (using the IOS_CreateThread vector which is described on wiiubrew): //Main.c #include <string.h> #include <stdarg.h> #include <stdlib.h> #include <malloc.h> #include <unistd.h> #include "dynamic_libs/os_functions.h" #include "dynamic_libs/fs_functions.h"...
General chit-chat
Help Users
  • No one is chatting at the moment.
    I @ idonthave: :)