hi just bought a brand new wiiu, am i best to not update it and leave it as is , i bought it in hope that there would be a expliot in the future , do you think anything will happen with the wiiu anytime soon ?
thanks
thanks
hi just bought a brand new wiiu, am i best to not update it and leave it as is , i bought it in hope that there would be a expliot in the future , do you think anything will happen with the wiiu anytime soon ?
thanks
The kernal exploit is close to release. The best thing to do is to update it with a mario kart 8 game disc (borrow one from a friend of you don't have one). You can play around with the current exploit and the coming kernal exploit.
You are asking Ibby , he has no idea when...or even IF the exploit is even coming.Which Firmware is needed for it?
The kernal exploit is close to release. The best thing to do is to update it with a mario kart 8 game disc (borrow one from a friend of you don't have one). You can play around with the current exploit and the coming kernal exploit.
The dev kit you get for making the eshop apps probably forces an umbrella exception handler that covers the whole app. Im not sure about this, but seems like something they would have thought of.Heres an idea, why don't we get someone to just make a quick shitty eshop game and hide an exploit in it.
With Nintendo accepting crap like "The Letter" and "Meme Run" it should be fairly easy to get it accepted.
Probably a stupid idea but it may be worth a shot if its a possibility.
The dev kit you get for making the eshop apps probably forces an umbrella exception handler that covers the whole app. Im not sure about this, but seems like something they would have thought of.
Ya nintendo isnt stupid, im sure they implemented some pretty effective security into the dev kit in terms of eshop development. Of course, nothings "unhackable" per se, but i dont see the point of an eshop based exploit, as nintendo would just remove it almost immediately. I think what Marionumber1 and NWPlayer123 are doing (web based exploits) are our best bet tbhThey've definitely thought about this. Bad games don't give us exploit. If they did Sonic Boom would have enabled piracy somehow.
Ya nintendo isnt stupid, im sure they implemented some pretty effective security into the dev kit in terms of eshop development. Of course, nothings "unhackable" per se, but i dont see the point of an eshop based exploit, as nintendo would just remove it almost immediately. I think what Marionumber1 and NWPlayer123 are doing (web based exploits) are our best bet tbh
Heres an idea, why don't we get someone to just make a quick shitty eshop game and hide an exploit in it.
With Nintendo accepting crap like "The Letter" and "Meme Run" it should be fairly easy to get it accepted.
Probably a stupid idea but it may be worth a shot if its a possibility.
Not sure if you are joking or not...
Can someone reupload this please ? Thanks in advance !RPL is a library and RPX is an executable.
There's a tool for converting RPL/RPX to normal elf files ELF: https://www.sendspace.com/file/ss5pn1
Here's a good writeup for reversing RPL/RPX Wii U files: http://devram0.blogspot.it/2014/01/reversing-wii-u-executables.html
Webkit is a much better attack vector imo anyways, because anyone with the ability to set up a webserver can host an exploit and the end user just has to point their wii u web browser at the right url to run it. Not to mention the webkit is open source and buggy as everI think hes very serious and tbh sounds quite a good idea in reality but I would bet my granny Nintendo vets all there e-shop material before its released on the site so anything like that does not happen!. Also lets face facts, if it was as easy as that I'm sure someone would of done that time ago with Nintendo's e-shop predecessors within the market!![]()
Webkit is a much better attack vector imo anyways, because anyone with the ability to set up a webserver can host an exploit and the end user just has to point their wii u web browser at the right url to run it. Not to mention the webkit is open source and buggy as ever![]()
Correct me if I'm wrong here, but I believe the kernel exploit is initially triggered from the web browser using the current webkit exploit. Then somehow (not going to ask for details, we dont want ninty patching it right away) privileges are escalated to kernel access on the EspressoOnly problem is its userland permissions. But it sounds like we've found a way...
Correct me if I'm wrong here, but I believe the kernel exploit is initially triggered from the web browser using the current webkit exploit. Then somehow (not going to ask for details, we dont want ninty patching it right away) privileges are escalated to kernel access on the Espresso. Much like what Chadderz and beanz did for their MK8 modding...