Wir haben Kontakt zu einem Crown 3DS Mitarbeiter.
As you can read here, a group named "TeamPiRATECLUB" say, that they found a working exploit.
For now there are no pictures or videos, but I think they are credible as Crown3DS.
What will the exploit to??
Homebrew Channel or a cfw?
You can start a file with it, a HC or a CFW isnt in Development for now.
But we have made a Hello worldProve will be released soon
Zitat von »MetaKnight«
It would be far more interesting to see Videos or Pictures
Was genau macht euer Exploit, eine genauere Erklärung wäre vllt. auch schon mal hilfreich.We started with Sound file. But we hit a few problems with it so we canceled the project around september but with the release of the "briefkasten" our interst was awaken again
Zitat von »Brawl«
the nintendo briefkasten was released in December . How can you work on it since juni?
No it doesn't. You can use any type of an extension for the file, it doesn't matter. How do you think banner bomb worked? Oversized graphics = temporary system crash due to overlapping buffors = possibility to inject code in the overlap.well they claim that it works with a spicial mp3 file ,this alone makes it very hard to believe
i know this but its hard to believe that the wouldnt build in something like a check to prevent it from opening in the first timteNo it doesn't. You can use any type of an extension for the file, it doesn't matter. How do you think banner bomb worked? Oversized graphics = temporary system crash due to overlapping buffors = possibility to inject code in the overlap.well they claim that it works with a spicial mp3 file ,this alone makes it very hard to believe
No it doesn't. You can use any type of an extension for the file, it doesn't matter. How do you think banner bomb worked? Oversized graphics = temporary system crash due to overlapping buffors = possibility to inject code in the overlap.well they claim that it works with a spicial mp3 file ,this alone makes it very hard to believe
i know this but its hard to believe that the wouldnt build in something like a check to prevent it from opening in the first timteNo it doesn't. You can use any type of an extension for the file, it doesn't matter. How do you think banner bomb worked? Oversized graphics = temporary system crash due to overlapping buffors = possibility to inject code in the overlap.well they claim that it works with a spicial mp3 file ,this alone makes it very hard to believe
MP3 is a very well established format and by this point the vast majority of vulnerabilities in the format are worked out. With bannerbomb, it was using a Nintendo proprietary image format, for which there are not well established libraries with plenty of bugfixes over the years, so vulnerabilities were far more likely. It is unlikely there is an exploit in an MP3 file.No it doesn't. You can use any type of an extension for the file, it doesn't matter. How do you think banner bomb worked? Oversized graphics = temporary system crash due to overlapping buffors = possibility to inject code in the overlap.well they claim that it works with a spicial mp3 file ,this alone makes it very hard to believe
even more why should they help a group that would release the exploid for free which would prevent most user to buy the crown3dsMP3 is a very well established format and by this point the vast majority of vulnerabilities in the format are worked out. With bannerbomb, it was using a Nintendo proprietary image format, for which there are not well established libraries with plenty of bugfixes over the years, so vulnerabilities were far more likely. It is unlikely there is an exploit in an MP3 file.No it doesn't. You can use any type of an extension for the file, it doesn't matter. How do you think banner bomb worked? Oversized graphics = temporary system crash due to overlapping buffors = possibility to inject code in the overlap.well they claim that it works with a spicial mp3 file ,this alone makes it very hard to believe
Also the stuff about Crown3DS - why would a flashcard manufacturer care about an exploit unrelated to their card? All seems like nonsense to me. But I guess you gotta give them a bit of time to provide proof and stuff.
but this could be hust a claim we dont even know if crown3ds isnt scamMP3 might have vulnerabilities in DRM or Artist/etc. data (an absurdly huge string might cause a system crash).
EDIT: They say Crown3DS failed and they've spoken with an ex-developer.