Difference between revisions of "DSi exploits"

From DSiBrew
Jump to navigation Jump to search
m
m
Line 9: Line 9:
  
  
The DSi [[Nintendo Zone]] client has a bug that can used to run some homebrew. This could mainly be used for dumping RAM etc, as Linux is required and only certain Wifi NICs can be used with hostapd. It's unknown if it's possible to use a flash card or a SD card with this exploit, it's unknown if sysmenu locks out either of those or if the exploit bootstrapping is even stable enough to use either of those devices. [[User:Yellows8|Yellows8]]'s [[Nintendo Zone#Exploits|nzoneurlstacksmash]] should work with DSi NZone. This exploit can't be tested with DSi until Nintendo Zone AP beacons captures are obtained, to clone a Nintendo Zone AP at home. Nintendo Zone is only available in Japan, at Nintendo World Store in New York City, and a few McDonalds test locations in [http://translate.google.com/translate?langpair=de|en&u=http%3A%2F%2Fnintendo.de%2FNOE%2Fde_DE%2Fnews%2Fevents%2Fpilotprojekt_-_nintendo_zone_bei_mcdonalds_18254.html Germany]. The test Germany locations are only available for a limited time, see the URL.
+
The DSi [[Nintendo Zone]] client has a bug that can used to run some homebrew. This could mainly be used for dumping RAM etc, as Linux is required and only certain Wifi NICs can be used with hostapd. If the NZone router model is found by capturing and sending a probe request, it should be possible to fake a NZone AP by using the router model used by NZone instead of using hostapd. (Unless the tag data is added by custom fw?) It's unknown if it's possible to use a flash card or a SD card with this exploit, it's unknown if sysmenu locks out either of those or if the exploit bootstrapping is even stable enough to use either of those devices. [[User:Yellows8|Yellows8]]'s [[Nintendo Zone#Exploits|nzoneurlstacksmash]] should work with DSi NZone. This exploit can't be tested with DSi until Nintendo Zone AP beacons captures are obtained, to clone a Nintendo Zone AP at home. Nintendo Zone is only available in Japan, at Nintendo World Store in New York City, and a few McDonalds test locations in [http://translate.google.com/translate?langpair=de|en&u=http%3A%2F%2Fnintendo.de%2FNOE%2Fde_DE%2Fnews%2Fevents%2Fpilotprojekt_-_nintendo_zone_bei_mcdonalds_18254.html Germany]. The test Germany locations are only available for a limited time, see the URL.
  
 
== DS-mode exploits ==
 
== DS-mode exploits ==

Revision as of 17:42, 1 July 2010

This page is dedicated to the listing of exploits used used to run homebrew on the Nintendo DSi. Anyone may contribute to this list, as long as any exploits added are explained and verifiable.

DSi-mode exploits

Team Twiizers have found a DSi-Mode Exploit and have managed to use it to run DSi Mode homebrew. However it has not yet been released. More details at : [1] The additional hardware is just required to get a connection to a computer so that things like ram dumps can be created.


Wintermute has made available an open source DSi hack. The exploit works on DSi enhanced games, allowing you to run custom code from a save file. Instructions for using the exploit can be found here: [2]


The DSi Nintendo Zone client has a bug that can used to run some homebrew. This could mainly be used for dumping RAM etc, as Linux is required and only certain Wifi NICs can be used with hostapd. If the NZone router model is found by capturing and sending a probe request, it should be possible to fake a NZone AP by using the router model used by NZone instead of using hostapd. (Unless the tag data is added by custom fw?) It's unknown if it's possible to use a flash card or a SD card with this exploit, it's unknown if sysmenu locks out either of those or if the exploit bootstrapping is even stable enough to use either of those devices. Yellows8's nzoneurlstacksmash should work with DSi NZone. This exploit can't be tested with DSi until Nintendo Zone AP beacons captures are obtained, to clone a Nintendo Zone AP at home. Nintendo Zone is only available in Japan, at Nintendo World Store in New York City, and a few McDonalds test locations in Germany. The test Germany locations are only available for a limited time, see the URL.

DS-mode exploits

This type of exploit is undesirable because all DSi functionality, such as usage of the cameras, is unavailable to homebrew.

Blasteh (Blasty) has posted a video on Youtube showing code being run in DS mode on the DSi using Fifa '08.