Homebrew Trying to hack DSi Camera

D

Deleted User

Guest
1. DSi Photos are signed
2. It doesn't accept anything other than a signed photo
I thought someone created a DSi image signer a while back. I want to say it was Apache Thunder, but I'm not entirely sure.
 

Coto

-
Member
Joined
Jun 4, 2010
Messages
2,979
Trophies
2
XP
2,565
Country
Chile
I doubt you'll make any breakthrough with that method you'd be better learning to program and learning assembly then decompile the camera app and look for any bugs in the code

How do you decompile a DSi app?

yeah, pretty much what the first guy said.

You need to grasp the basic file formats (headers (or descriptors depending on the target), improve coding, learn assembly, learn how to gaze assembly from garbage/encrypted/images through hexadecimal, learn how to reverse engineer objects (ELF), learn ROP (a payload written in assembly where you take control of the original program), learn memory management related stuff, learn OS file handles, learn to deal with ISO IEC standards (so you get a shortcut or clues about the file you are dealing with)

edit: also learn how to reverse engineer binary blobs through IDA like, disassemblers.

An exploit works like this, take a look:

https://gbatemp.net/threads/nintendo-switch.474796/page-3

how I managed to find out that between the sea of EOF posts, I don't know lol
 
Last edited by Coto,

ChampionLeake

NTR/TWL Exploiter
Member
Joined
Jan 19, 2016
Messages
209
Trophies
0
Age
25
XP
673
Country
United States
yeah, pretty much what the first guy said.

You need to grasp the basic file formats (headers (or descriptors depending on the target), improve coding, learn assembly, learn how to gaze assembly from garbage/encrypted/images through hexadecimal, learn how to reverse engineer objects (ELF), learn ROP (a payload written in assembly where you take control of the original program), learn memory management related stuff, learn OS file handles, learn to deal with ISO IEC standards (so you get a shortcut or clues about the file you are dealing with)

edit: also learn how to reverse engineer binary blobs through IDA like, disassemblers.

An exploit works like this, take a look:

https://gbatemp.net/threads/nintendo-switch.474796/page-3

how I managed to find out that between the sea of EOF posts, I don't know lol

ROP is not needed for DSi exploitation. You can just find an appropriate return address to paste either a generaltwlpayload or minitwlpayer depending on the size.

And your examples are fine fo learning how to RE code but some of them are a bit unnecessary. I just suggest looking at CTurt's write on exploiting NDS games so you can get a better understanding since some of his methods were used to exploit dsiware.
I thought someone created a DSi image signer a while back. I want to say it was Apache Thunder, but I'm not entirely sure.

And yes! Mr.NbaYoh has a tool on his github repo too.
 

Coto

-
Member
Joined
Jun 4, 2010
Messages
2,979
Trophies
2
XP
2,565
Country
Chile
ROP is not needed for DSi exploitation. You can just find an appropriate return address to paste either a generaltwlpayload or minitwlpayer depending on the size.

And your examples are fine fo learning how to RE code but some of them are a bit unnecessary. I just suggest looking at CTurt's write on exploiting NDS games so you can get a better understanding since some of his methods were used to exploit dsiware.

I don´t give a damn if you find them necessary or not. Having such knowledge will give a good insight when debugging / RE´ing blindly rather than relying on IDA-like debuggers. Your "exploit" approach comes from patching SDK stuff. By having a SDK symbol table traced and looking for bugs

My background comes from something like:
https://github.com/cotodevel/gbaARMHook/blob/master/arm9/source/pu/patches_to_arm.s

Besides, ROP IS necessary for any kind of exploits to be effective, even if you don´t know the SDK symbols way before.
How else are you going to takeover some code?
 
Last edited by Coto,

ChampionLeake

NTR/TWL Exploiter
Member
Joined
Jan 19, 2016
Messages
209
Trophies
0
Age
25
XP
673
Country
United States
I don´t give a damn if you find them necessary or not. Having such knowledge will give a good insight when debugging / RE´ing blindly rather than relying on IDA-like debuggers. Your "exploit" approach comes from patching SDK stuff. By having a SDK symbol table traced and looking for bugs

My background comes from something like:
https://github.com/cotodevel/gbaARMHook/blob/master/arm9/source/pu/patches_to_arm.s

Besides, ROP IS necessary for any kind of exploits to be effective, even if you don´t know the SDK symbols way before.
How else are you going to takeover some code?

No need to get a bit aggressive...(like geez) You can just find a return address really too. (Don't know if that's considered ROP)
And I don't need to know your background really either.
 

Coto

-
Member
Joined
Jun 4, 2010
Messages
2,979
Trophies
2
XP
2,565
Country
Chile
Well if you haven't idea if ROP should be used to take over code, you shouldn't be suggesting to patch payloads on return address. My background is plain ROP to take over some irq on the gba. By default, the ROP is used as I wrote above.

So don't go correcting stuff if you aren't very clear about it.
 
Last edited by Coto,

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
    HiradeGirl @ HiradeGirl: Have a nice day. Life. Week. Month. year.