Announcing RocketLauncher! The first exploit with unlocked Arm7!

UPDATE:
Looks like NoCash found an exploit that is even better then RocketLauncher:

https://problemkaputt.de/gba.htm

He titled it Unlaunch. The exploit works by exploiting a flaw in Stage2 and apparently works on all firmware versions. It requires you run the installer from a DSiWare based hax environment as access to SD/NAND is required. (thus you can't run this from Slot-1 based TWL exploit)

The flaw in stage2 is a buffer overflow involving Launcher's TMD file. If you provide a larger then normal TMD file, it will attempt to load the TMD into ram anyways (this occurs before it does the RSA check) This causes it to overwrite some code in arm9 ram causing arm9 to execute the custom payload. The full details are found in the info menus in the installer.

Note however the installer does not appear to work correctly at the moment. I'd advise you not attempt to install it from the installer. Use the manual install method instead. BUT I'd highly recommend you have a hard mod before attempting manual install. If you have had experience modifying your nand you may be ok doing this. But for safety sake I would just advise against that until the installer works properly.

(this is one reason why RL hasn't been released yet. No proper installer tools are available yet and we don't want people bricking consoles trying to install it)

The release of this exploit may impact our plans regarding RocketLauncher. I'll post more about this once StuckPixel has decided to comment on this.


Important Notice:

Do NOT visit Data Management in DSi System Settings or use the 3DS Transfer tool after installing unlaunch. You WILL brick the console. Wait until HiyaCFW is refined/released properly so that SD redirected version of Launcher can be used or when NoCash decides to implement his own version of the SD redirect patch.








Today I can finally announce a new exploit for the Nintendo DSi. I found this flaw back on May 29th. Almost a year after NoCash initially discovered a oversight by Nintendo involving the DS Cart White list which this exploit takes advantage of (Nintendo forgot to reimplement the RSA checks on it lolz). I was fudging with various things in the white list to try and get a crash. I got system menu to crash by using large values in section 3! So I contacted NoCash and a few other devs about this to investigate it and to see if it's exploitable. Well long story short it was!


Summery of the above video:

1. The exploit requires 1.4.0 firmware! Older or newer fw revisions do not work!
2. The exploit requires a flashcart that you are able to modify the internal rom it presents to the system.
3. Details on which cards will be compatible will be revealed at a later time.
4. The exploit involves a buffer overflow flaw involving section 3 of the white list.
5. This overflow occurs on arm7 thus allowing overwriting memory exclusive to arm7.
6. As a result a large enough overflow will hit the IRQ interrupt handler. This is how we gain code execution.
7. Arm9 was relatively easy to take over. Though data caching presented a minor roadblock while testing on hardware. :P
8. I currently use a modified build of nds-bootloader from WinterMute's github. You know, that portion of hbmenu responsible for booting SRLs. :P
9. Because we already gained arm7 we only had to put arm9 in the correct wait state so that nds-bootloader can do it's thing. :D
10. The exploit in theory can work from the menu once it's running. But we currently make use of the auto boot feature to ensure a stable consistant environment. Tests with a second console suggest that is the case. Note that the exception vector for arm7 seems to either be somewhere else once the menu GUI is running or the overflow hits something else causing arm7 to crash early. Currently we plan to only target exploiting the system with an autoboot rom as it's more predictable.
11. The exact machanics of the arm9 take over and how nds-bootloader is loaded may change. Currently the entire payload fits on the cart. But we may allow reading a payload off SD instead.

Credits to NoCash, Gericom, and Normmatt for help testing/figuring this out. Big credit to StuckPixel who put in most of the coding needed to make this happen. My contribution was finding the flaw and help with testing on hardware.


I will release further details as we finalize this exploit and prepare stuff that will make installing it easier.

Note you will either need a nand mod or a DSiWare based exploit to downgrade your console/install the modified white list needed for this to work. Hopefully we'll have a better solution then simply using fwtool to do this so that may be the factor that determines release date so please be patient!

When things are ready I will update this thread!
 
Last edited by Apache Thunder,

GhostLatte

GBAtemp's Official Van Master™
Member
Joined
Mar 26, 2015
Messages
3,653
Trophies
3
Age
24
XP
11,253
Country
United States
I know about that sploit. In fact I already have the Flipnote exploit because magic* and I used it to downgrade to 1.4 and install 4swordshax. However, I noticed that you are on a European console and the leaked build only works on a US console.

*Magic = leaks
Did you originally buy four swords?
 

WiiHomebrew+Snes

Member of GBAtemp's shadow district
Member
Joined
May 4, 2016
Messages
641
Trophies
1
Age
39
Location
Floridia
Website
www.lucar.io
XP
2,827
Country
United States
You are correct. It can in fact read the console ID from RAM and print it on-screen.
Now if only someone made a sploit for Bejeweled Twist...
Actually you made the common mistake of confusing the Console ID with the CID. The Biggest Loser exploit reads out the CID, but not the Console ID. the Console ID can be found using the DSi Downgrade Guide found here https://gbatemp.net/threads/dsi-downgrading-the-complete-guide.393682/ . Also as a reminder to everyone, you will need a DSiware exploit for RocketLauncher, no matter what, even if you are on 1.4, as you need to install the modified whitelist.
 
  • Like
Reactions: Deleted User

RosalinaFan573

Well-Known Member
Newcomer
Joined
Jan 27, 2016
Messages
97
Trophies
0
Age
22
XP
311
Country
United States
Actually you made the common mistake of confusing the Console ID with the CID. The Biggest Loser exploit reads out the CID, but not the Console ID. the Console ID can be found using the DSi Downgrade Guide found here https://gbatemp.net/threads/dsi-downgrading-the-complete-guide.393682/ . Also as a reminder to everyone, you will need a DSiware exploit for RocketLauncher, no matter what, even if you are on 1.4, as you need to install the modified whitelist.
I mixed them up. WHOOPSIE DOODLE
But yeah, the CID (Card Identifier) is what I meant.
 

WiiHomebrew+Snes

Member of GBAtemp's shadow district
Member
Joined
May 4, 2016
Messages
641
Trophies
1
Age
39
Location
Floridia
Website
www.lucar.io
XP
2,827
Country
United States
Not only that, but you can also use the upcoming Flipnote/DSi Browser exploit to install the whitelist.
Speaking of the Flipnote exploit, i have found that 120 times seems to be the magic number for anyone who has access to it and is having trouble running it.
 

mariogamer

Well-Known Member
Member
Joined
Aug 12, 2015
Messages
1,256
Trophies
0
Age
28
XP
790
Country
Canada
He's been using the leaked exploit like me. Unfortunately, I bricked myself in a NAND restore, but I'm working to get a hardmod.
Ok, I know. In fact 122 wasn't working for me so I hit dat copy button multiple time and....... It worked :P . (also don't know if it's a trick, but I personally got it working by simply pressing on frame 2 instead of deleting frame 3)

(How do you think you bricked (I am ccurious :P) I also did it myself and it worked)
 
Last edited by mariogamer,

GhostLatte

GBAtemp's Official Van Master™
Member
Joined
Mar 26, 2015
Messages
3,653
Trophies
3
Age
24
XP
11,253
Country
United States
Ok, I know. In fact 122 wasn't working for me so I hit dat copy button multiple time and....... It worked :P . (also don't know if it's a trick, but I personally got it working by simply pressing on frame 2 instead of deleting frame 3)

(How do you think you bricked (I am ccurious :P) I also did it myself and it worked)
Not really sure, but I could care less.
 
  • Like
Reactions: CatmanFan
D

Deleted User

Guest
Also as a reminder to everyone, you will need a DSiware exploit for RocketLauncher, no matter what, even if you are on 1.4, as you need to install the modified whitelist.
Technically, I believe we can install RocketLauncher with only the Console ID, the CID, and a hardmod. Of course, you currently need a DSiWare title anyway to retrieve the Console ID... hence why I was looking to bruteforce said ID in conjunction with my CID, as my 1.4U DSi does not have any DSiWare titles installed. Perhaps I should just accept the fact that it is very unlikely my DSi will ever see the light of ARM7 access, as I already have a DSi XL with everything required for RocketLauncher.
 
  • Like
Reactions: WiiHomebrew+Snes

laharl22

Well-Known Member
Member
Joined
Dec 19, 2014
Messages
1,767
Trophies
0
Age
38
XP
615
Country
France
Oh. Make sure the .nds file is named "2222.nds" and you followed all the instructions correctly.
i missing with the end step paste 122 times and erase frame i have frnech and have a bad english

--------------------- MERGED ---------------------------

i dont understand the instructions its my first time i use flipnote
 

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
    K3Nv2 @ K3Nv2: https://youtu.be/1p-dbSJ2MK8?si=o5xh8Jp_DqC8cHIv