Has anyone figured out how the internet settings are stored?

Discussion in 'Wii U - Hacking & Backup Loaders' started by CJmario of the Myst, Dec 4, 2016.

  1. CJmario of the Myst
    OP

    CJmario of the Myst Member

    Newcomer
    13
    1
    Oct 17, 2015
    United States
    With the new update supposedly coming out soon I would love to set up DNS to block the update.
    However, My gamepad is broken.
    I was wondering if anyone had a way to edit the settings without a gamepad yet, seeing as we have IOSU access now.
     
  2. QuarkTheAwesome

    QuarkTheAwesome Working for Hugs

    Member
    786
    1,924
    Apr 19, 2015
    Australia
    Stuck in the PowerPC
    A long time ago, in a galaxy far, far away, a friend of Steve Braxton read the WiFi config from /dev/net/ifmgr/ncl. At the time, his genius was ill-received, with NexoCube being mildly unhappy about his WPA2 passcode being shown onscreen. Sarcasm spiralled into a hardmod discussion, and the rest is history (only available to moderators once most of it was deleted). The mystery of the original file was lost, for a time.

    During this turmoil, focus was thrown onto a certain ryanrocks462, who was the subject of intense scrutiny. Doubts were raised as to whether he had a hardmod. Screenshots were posted. Insults were thrown. Posts were deleted. More posts were deleted. The mists of time, when combined with the ban hammer, produce a potent mixture perfect for the erasure of such history, and today one simple message is branded across the pages of the past: "Fucking stop it."

    With the thread given time to settle, valiant attempts were made to reverse-engineer the secrets behind the reader. A theory was formed - an ELF loader that sets up an ARM routine? Was there a modification to the syscall handler? Could this contain the coveted IOSU exploit? With ppc64 being "simple enough"; reams of Assembly were posted, extrapolated and interpreted. Alas, ppc64 does not run on the Wii U, and the theorist was abused in the same way as Ryan, being called a liar and a cheat for attempting to use their skills for good. In the end, all was revealed to a special 58; a chosen few - those who ventured, who dared, to download a suspicious zip. They had all secrets bestowed upon them in the form of C source code. The original pages defining the mystery had been breached from the vault! The floodgates had opened, the secrets of the WiFi card were laid bare for all to see -

    The thread was EoF'ed.

    From that day forth, none dared go near the caverns of IOS-NET. Legend tells of a consequence even greater than witnessed that week in July - stories of incomprehensible pain. Occasionally, a brave few venture into the labyrinth of ARM, desperate to uncover the enigmas that lie within. Could the fable of netconf_set_wifi_cfg be true? Dwellers of the distant plains of IRC often report their passing, energetic and ready. Then come the reports of screams - screams of horror when they witness the monster of LDMFD. Very few return.

    That said, the ones that do came back with an IOSU exploit.

    TL : DR: I once shitposted an app to print your WiFi password on the screen. It went downhill quickly, and nobody has really messed with the Wii U's WiFi config since. There are functions that might be able to set the config, but more reverse-engineering is needed.
     
    Last edited by QuarkTheAwesome, Dec 4, 2016 - Reason: SMILIES ARE DEATH
    dojafoja, Benjay, Quantumcat and 2 others like this.
  3. AdmiralSpeedy

    AdmiralSpeedy GBAtemp Regular

    Member
    105
    25
    Apr 4, 2016
    Canada
    That update thing is most likely fake.
     
    Last edited by AdmiralSpeedy, Dec 4, 2016