I’m not new to the homebrew scene but I’m just starting to learn more about how this exploit stuff actually works. I just recently found my 3DS in storage and got homebrew set up on it. After watching a bunch of videos of different exploits (soundhax, browserhax, pichaxx, ninjhax, etc.) I’m very interested in learning how it actually works; using a software vulnerability to execute unsigned code. I used the devkit to write a simple “hello world” program in C++ which I can execute via the homebrew launcher but I want to execute it directly via one of the existing exploits on a stock firmware. How would I go about doing this? I want to learn as much as I can about software vulnerabilities and see how far I can go with it, perhaps on a different system in the future, using the 3DS as a way to learn more. I know this stuff isn’t simple so if you guys could send me as many resources as possible that would be awesome. I hope I can give you guys back something great in the future. Thanks!
Edit: The exploit that intrigued me the most is the buffer overflow in the Nintendo DS profile settings. It honestly amazes me how tiny little errors like that on the developers end can leave wide open doors for hackers to crack the system wide open.
Edit: The exploit that intrigued me the most is the buffer overflow in the Nintendo DS profile settings. It honestly amazes me how tiny little errors like that on the developers end can leave wide open doors for hackers to crack the system wide open.