Hacking Smashed the stack with a 0x0000 byte SETUP request!

Johnny Dunlop

Well-Known Member
OP
Newcomer
Joined
Feb 25, 2015
Messages
55
Trophies
0
Age
34
XP
134
Country
Canada
No RCM device detected
RCM Device detected
Preset "PAYLOAD_FILE" set to : D:\Downloads\Nintendo Switch\Files for SD\hekate_ctcaer_5.0.2_Nyx_0.8.2\hekate_ctcaer_5.0.2.bin
Invoking TegraRcmSmash.exe with args : "D:\Downloads\Nintendo Switch\Files for SD\hekate_ctcaer_5.0.2_Nyx_0.8.2\hekate_ctcaer_5.0.2.bin"
TegraRcmSmash (32bit) 1.2.1-3 by rajkosto
Opened USB device path \\?\usb#vid_0955&pid_7321#5&16b1ae89&0&1#{aa0dbd45-3117-f331-5c49-76bf65225042}
RCM Device with id 808504140000000C46C8456401101062 initialized successfully!
Uploading payload (mezzo size: 92, user size: 124395, total size: 190611, total padded size: 192512)...
Smashing the stack!
Smashed the stack with a 0x0000 byte SETUP request!
Payload successfully injected

Switch Serial Number:
XAW1011

Firmware Version:
9.0.0

Am I boned? =(

Thanks!
 

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
  • No one is chatting at the moment.
    SylverReZ @ SylverReZ: Lol Veho.