How does most homebrew exploits work?

breonhaxwwS

Member
OP
Newcomer
Joined
Mar 20, 2022
Messages
6
Trophies
0
Age
23
Location
califonia
XP
89
Country
United States
I've seen how running an m4a file can let code execute on the 3DS, and seeing my Internet connections turn into the word "Haxxxxxxxxxx", so how do most of the #DS homebrewing exploits function?
 
  • Like
Reactions: zoogie

Kwyjor

Well-Known Member
Member
Joined
May 23, 2018
Messages
4,323
Trophies
1
XP
4,454
Country
Canada
Your question is rather unclear. Those are two completely different exploits.

I've seen how running an m4a file can let code execute on the 3DS
Basically, in some older versions of the system software, the sound player had a bug whereby it could be made to start executing data in a specifically-designed m4a file as code. Lots of media players have had similar problems over the years. (The PSP, for instance, once had a vulnerability that could be exploited by using a corrupted .tiff file.)

and seeing my Internet connections turn into the word "Haxxxxxxxxxx", so how do most of the #DS homebrewing exploits function?
If you're referring to https://3ds.hacks.guide/installing-boot9strap-(usm) , then as it says, it involves injecting "an exploited WiFi profile" - a profile that contains code that the system software can be tricked into executing. (USM in particular makes use of the fact that "safe mode" uses an older version of the system software that was never updated and still has an exploit that was patched out of later versions.)

You can read a lot more detail about these and other system flaws at https://www.3dbrew.org/wiki/3DS_System_Flaws .
 
  • Like
Reactions: Stefano_Lassandro

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
    K3Nv2 @ K3Nv2: they be like which lite firefox exe pls