An Interview with a Switch Hacker

There have been a lot of developments in the Switch homebrew scene in the last 12 months, and we wanted to talk to someone who is at the forefront of it all, someone who is actively hacking the Nintendo Switch platform.
Capture.PNG

What follows is an unedited interview from March 2018 with 'Michael' - otherwise known as SciresM.

INTERVIEW START


[GBAtemp] Hi SciresM, thanks for agreeing to talk to us. How long have you been a hacker, and how did you start?

Since early 2014, when datel added support for Pokemon X/Y to their Powersaves device.
I joined ProjectPokemon's IRC, and eventually found a flaw in their product that allowed for resigning arbitrary 3DS savedata (this was before the 3DS had been blown open). I then started doing game reverse engineering to aid development of PKHeX, and eventually transitioned to doing actual exploit dev work near the end of the 3DS's lifecycle.



[GBAtemp] Were you involved in the 3DS hacking scene, and to what capacity?

Yes -- as above, I joined the 3DS scene in 2014, and made a number of savegame editors in 2014/2015, and datamined all Pokemon titles/demos as they released until they stopped being made for the platform. I also implemented the first "OTPless" arm9loaderhax solution in winter of 2016, and released boot9strap in May of 2017.



[GBAtemp] Why do you hack the Nintendo Switch?

There are three main reasons:
-I love Nintendo's hardware and custom software, and I want to understand how all of it works.
-I want to have arbitrary code execution on the hardware that I own.
-There are Pokemon games releasing for the Nintendo Switch.



[GBAtemp] Are you a solo hacker or part of a larger group?

I'm a member of ReSwitched, a team with the aim of enabling public homebrew solutions for the Switch. I don't think being a solo hacker is really feasible -- getting a group of talented people together to share thoughts and work together is how you get good outcomes, and I love the team/community we've created.

I should note that pretty much all the active groups share information and work together, to some extent, though -- we work
pretty closely with other people like qlutoo, yellows8, and hexkyz.



[GBAtemp] How long did it take from the March 2017 retail release of the Switch for you to gain access to the firmware?

It depends on what you mean by "firmware". We first managed to break into the web browser's sandbox when Schala implemented the "Pegasus" vulnerability the day after the console released, but we didn't manage to break into the code for the OS's system modules until Misson20000 and Schala found the winning pair of vulnerabilities in June, 2017. It's also possible by "firmware" you mean "kernel" or "TrustZone" code, in which case the answer would be that Motezazer and I got code execution at those levels (and thus dumped their code for the first time) in November and December 2017, respectively.



[GBAtemp] Can you tell me about the nature of any current exploits? (not asking for exact specific detail, just layman's
terms of what is allowing you to compromise the Switch's security).

Our TrustZone exploits all fundamentally rely on a Tegra design flaw: the system's go-to-sleep-and-wake-up process is dangerous. You can read more about one way of exploiting that in our Jamais Vu writeup from earlier this year: https://www.reddit.com/r/SwitchHack...is_vu_a_100_trustzone_code_execution_exploit/



[GBAtemp] What do you think of Nintendo's efforts to secure the Switch?

I think that software-wise, Nintendo has done a really great job. Their operating system, Horizon, is a new, updated version of the OS on the 3DS -- with all of the hardening that has come from the 3DS's years of security issues. There have been a few unfortunate mistakes on their part, but by and large HOS is extremely secure. We've still not seen even one traditional exploitable vulnerability in the HOS kernel, which I think speaks well of the investment Nintendo has been making into securing their platform. I think that the Switch's biggest weakness, security-wise, is that it's running on (and has to be designed around) the Tegra X1 hardware.



[GBAtemp] At what level do you have control over the Switch, is it completely compromised?

The switch has been completely compromised.



[GBAtemp] Did the recently discovered flaw in Intel chips have anything to do with the current Switch exploits?

To my knowledge, nobody has used the Spectre or Meltdown vulnerabilities to do anything interesting on the Switch. I think it's theoretically vulnerable to a Spectre variant, though.



[GBAtemp] Can Nintendo counter your findings?

All current hardware can be compromised. They can mitigate vulnerabilities in newer units, though, either via a hardware revision or updating the bootrom patches written at the factory.



[GBAtemp] Can you see Nintendo releasing Switch hardware revisions in the future to try and fix this?

Yes, they're currently in the process of doing so with a new SoC called "Mariko". I expect this will be a "silent revision", where newer units will start being sold using
the newer hardware without any special marketing.



[GBAtemp] What is your end goal with Switch hacking?

We want to create an engaged homebrew scene and do our best to foster a good, healthy community around it.

My personal goal is to continue hacking Pokemon games on the Switch (adding support for save editing via PKHeX, enable custom ROM hack content, etc).



[GBAtemp] What do you think about Team Xecuter's announcement of a solder and solderless Switch modchip?

I think it's irresponsible of them to try to profit off of a bootrom 0-day vulnerability that affects more products than just the Switch, and I don't think they provide anything of value to the community.



INTERVIEW END


So there we have it, a bit of insight into how someone can end up hacking a video game system. It's kind of ironic, how the love of a game, in this case Pokemon, can inadvertently lead to Nintendo's latest gaming platform becoming completely compromised.

Thanks to SciresM, for talking to us for the purpose of this article.

We wanted different perspectives from different groups for this piece, so we also contacted Team Xecuter, who declined to comment and answer the same set of questions for this article.

We also contacted fail0verflow, who also declined to comment on a set of questions for this article.


:arrow:Contact GBAtemp
 

medoli900

Open the Benzenes;Gate
Member
Joined
Jan 7, 2013
Messages
1,116
Trophies
0
Location
Lavender Town
XP
1,316
Country
Antarctica
Any car made from the 80s until now has dozens of computers on board. The last vehicle I owned had an entire computer system dedicated to opening and closong the rear liftgate. There was a recall to have the firmware updated on the computer.

Besides, how long would it take to break into someone's car, open up the media center, solder a custom-made (assuming someone manages to reverse-engineer the TX chip, which is certain to be heavily obfuscated) modchip onto the media center, load a payload through the media center, and [assuming the only connection to any essential component ISN'T merely some sort of sensor output for on-screen diagnostic info] find an exploit in one of those computers that allow it to be altered in some way from the media center console? After all that, what exactly would you accomplish anyway? To top it all off, how common are Teslas going to be outside of say, metropolitan California? There is no disaster with the TX modchip. If anything, an open-source software solution would make the process easier.
You don't really have to break in a car. Sure, it is a way, but if you lend your car to a "friend", it could install the chip. As for the reverse engineering part, I don't think they'll put much effort into making them "secured". It is a video game chip after all. If we look at the background of Nintendo's console hardmod, they were cloned pretty easily. Gateway did put bricking code, but that would be even worse if the bricking code affect the car. It probably won't though, since the architecture would probably be different. Also, there is a solderless version of the TX. I am not saying that it will be plug-and-play, since the software will be different, but it is far from impossible.
 

Costello

Headmaster
Administrator
Joined
Oct 24, 2002
Messages
14,201
Trophies
4
XP
19,707
Why is it that news media always uses the "ambiguous male figure with a shadowy face in a hoodie in a dark room sitting in front of a bright computer screen with 'matrix' script running down the background" genre of stock photo to represent a "hacker"?
if you're asking about us, we used the "ambiguous male figure with a shadowy face in a hoodie in a dark room sitting in front of a bright computer screen with 'matrix' script running down the background" genre of stock photo because news media always uses the "ambiguous male figure with a shadowy face in a hoodie in a dark room sitting in front of a bright computer screen with 'matrix' script running down the background" genre of stock photo... so we found it to be quite fitting :) what else would you have used?
 

TotalInsanity4

GBAtemp Supreme Overlord
Member
Joined
Dec 1, 2014
Messages
10,800
Trophies
0
Location
Under a rock
XP
9,814
Country
United States
if you're asking about us, we used the "ambiguous male figure with a shadowy face in a hoodie in a dark room sitting in front of a bright computer screen with 'matrix' script running down the background" genre of stock photo because news media always uses the "ambiguous male figure with a shadowy face in a hoodie in a dark room sitting in front of a bright computer screen with 'matrix' script running down the background" genre of stock photo... so we found it to be quite fitting :) what else would you have used?
Honestly if it were me I would use a Switch console or his avatar here or some combination of the two

Also, don't read this as a criticism of the mag staff here, it's a criticism of technology journalism in general lol
 

guily6669

GbaTemp is my Drug
Member
Joined
Jun 3, 2013
Messages
2,325
Trophies
1
Age
34
Location
Doomed Island
XP
2,090
Country
United States
....Also what does he mean about TX "that affects more products than just the Switch"
It means all Nvidia Tegra X1 (and maybe older) based devices out there that have same vulnerabilities.

They usually use Nvidia Tegra devices for medicine, cars and maybe other stuff, but I bet there isn't as much as on the Nvidia entertainment devices + switch + some old smartphones with older Tehran chips...
You don't really have to break in a car....
We already discussed that...

Lol it's pointless, be safe as I'm sure not a single hacker will break into your car neither if you lend it to anyone I don't think you will ever have a TX chip in your car lol... Before the chip I'm sure you wouldn't see the car anymore instead would be theft...

First a hacker would not break into your car, second if you lend to a friend, if a bad accident happen they will investigate and see a TX chip inside and will check fingerprints of your friend and beat him up until he tells he installed it :).

A real hacker most likely if the car happens to have WiFi will probably use the latest WiFi vulnerability to get full remote access to it and leave no traces, I don't think a hacker will commit car theft...

PS: unless the hacker is from daesh... But if that was the case instead of a tx chip he would just tape those chips that do kaboom from outside the car LOL less work than installing a TX chip seriously...
 
Last edited by guily6669,

delta nite

Well-Known Member
Newcomer
Joined
Sep 18, 2010
Messages
86
Trophies
1
XP
1,186
Country
United States
It means all Nvidia Tegra X1 (and maybe older) based devices out there that have same vulnerabilities.

They usually use Nvidia Tegra devices for medicine, cars and maybe other stuff, but I bet there isn't as much as on the Nvidia entertainment devices + switch + some old smartphones with older Tehran chips...

We already discussed that...

Lol it's pointless, be safe as I'm sure not a single hacker will break into your car neither if you lend it to anyone I don't think you will ever have a TX chip in your car lol... Before the chip I'm sure you wouldn't see the car anymore instead would be theft...

First a hacker would not break into your car, second if you lend to a friend, if a bad accident happen they will investigate and see a TX chip inside and will check fingerprints of your friend and beat him up until he tells he installed it :).

A real hacker most likely if the car happens to have WiFi will probably use the latest WiFi vulnerability to get full remote access to it and leave no traces, I don't think a hacker will commit car theft...

PS: unless the hacker is from daesh... But if that was the case instead of a tx chip he would just tape those chips that do kaboom from outside the car LOL less work than installing a TX chip seriously...

Funny how people who don't know how to hack shit say that there's no problem with disclosing the Tegra vulnerability and that cars wouldn't get hacked when actual competent hackers say otherwise. Wonder whos right. :unsure:
 
  • Like
Reactions: TotalInsanity4

guily6669

GbaTemp is my Drug
Member
Joined
Jun 3, 2013
Messages
2,325
Trophies
1
Age
34
Location
Doomed Island
XP
2,090
Country
United States
They will most likely be hacked, specially in the future with more and more cars that drive by them self...

We are talking is about someone breaking into your car, dismantle it solder a chip TX or TX like or use the solder less version to hack into it lol...

I guess a hacker will most likely try to do it remotely...

Also Tegra X1 is probably pointless, it's weak and I don't think much cars out there are using it... Next Nvidia tegras will have this exploits fixed and someone will need to find again new exploits...


Upcoming Volta Tegra might be heavily used in cars since it's quite powerful and would be specially better for AI driving or detecting things live from all sensors.

Ps: in the future off course one of the biggest concerns besides terrorism is hacking, but those current TX connections with switch tegra soc won't probably affect anything... All other found exploits are way bigger concern than the upcoming TX chip specially WiFi vulnerability present on all devices that most likely will never be patched and windows it self is the worse + meltdown + spectre + spectre V2...
 
Last edited by guily6669,

leon315

POWERLIFTER
Member
Joined
Nov 27, 2013
Messages
4,097
Trophies
2
Age
124
XP
4,075
Country
Italy
[GBAtemp] At what level do you have control over the Switch, is it completely compromised?
The switch has been completely compromised.
best part of this interview!

DON'T FORGET: FUCK vulture Team Xecuter, and don't buy their modchip.

piracy is the only thing that metters : D

Find a job ASAP! don't play videogames if you can't afford them.
 
Last edited by leon315,

graeme122

Well-Known Member
Member
Joined
Oct 13, 2007
Messages
248
Trophies
1
Age
33
Location
United kingdom
XP
1,344
Country
United Kingdom
Since fussy jelly will be out by then, I doubt it. Sorry. ;p
not sorry i love hax

Thanks and hax can be fun but imo bringing it to tournaments is bs and needs to stop.


Ooooh a reply from the legend, lol yeah but I can have a little bit of hope but I guess we will see.
 
Last edited by graeme122,
  • Like
Reactions: TotalInsanity4

souler92

Well-Known Member
Member
Joined
Jan 5, 2017
Messages
394
Trophies
0
Age
32
XP
661
Country
Netherlands
to be honest, i like the interview ofcourse its good to hear these things.

but what i'd like to know , is more the hisrtory of how he got involved in IT . why and how did you become a hacker/ had interest in computer language.
 
  • Like
Reactions: x65943

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
  • No one is chatting at the moment.
    K3Nv2 @ K3Nv2: https://youtu.be/MddR6PTmGKg?si=mU2EO5hoE7XXSbSr