Reswitched has said that it's very unlikely any game exploits will come out for the Switch. This is because the Switch uses ASLR, which means the memory is randomized every time. The exploit has to locate the right memory addresses to chain together to gain code execution. I won't go into too much detail, but the reason it works in the web browser is because it has a scripting engine that can be abused. But in a regular game, you have no way to execute custom code, you can only chain together existing pieces of code, and those pieces can't be located because we have no code execution at that point.Hi !
I'm new to the Switch hacking scene, I come from the 3ds one, and my idea maybe seems stupid, but I'm thinking of a way to hack patched switches. First, sorry for my bad english. Do you know the exploit steelhax from the 3ds scene ? It is a way to run the 3ds Homebrew Launcher by injecting a hacked save file into the game Steeldiver Subwars to the sd card, which will run unsigned code. As a the save file needs to be encrypted, you need to send a false friend request to obtain the encryption. They've probably patched this issue for the Switch, but maybe we can inject a hacked save file (if making a hacked save file to run unsigned code is possible) in a clean NAND from a RCM compatible Switch, then transfer the user with the hacked file to a patched switch. Do you think it can work ?
Bottom line, no matter how vulnerable a game is, unless it has some sort of scripting engine that can be used, ASLR will stop you before you even get to the open door.
Last edited by The Real Jdbye,