commdante said:This topic is soo funny. 17 pages, and only a couple actually add something to the whole. Hilarious.
Anyways, for an attempt to at least add something ... why not use a packet-sniffer to get the firmware ... as it no doubtly will be saved to internal RAM/EEPROM which "we" (funny how everyone says "we", isn't it?) don't have access to atm.
Also, afaik WPA (don't know which version) takes about 1 month to crack with a decent computer ... anyone heard of "networked computing"? If not, it's a way to divide to whole process amongst more computers .... say we've got 310 people who'll help: (2.5 hours anyone?). Cancer research universities etc have been using this "technology" for ages now. Even if it would take a year ... with 310 people it would be less than a day. Imho it shouldn't be that hard to program a server and clients for such a project.
Then again, my last project was in QuickBasic 4.5 :-P
there's a problem with that...
the firmware updates on the server are encrypted also(which I found out after trying to hack them)
and it gets decrypted after downloaded and then intalled
I have an idea though, On the wii something was done called the "Twiizer Attack". Maybe Someone can try it on they're dsi after looking it up. *WARNING* it involves some coding and opening your dsi to do it. I'd try it myself if I wasn't afraid to break my dsi when I open it.