3DS:History of 3DS Hacking: Difference between revisions
From Hacks Guide Wiki
More actions
m only SALT is a team, roxas75 and patois are both individuals |
redundancy, punctuation and clarification |
||
| Line 20: | Line 20: | ||
=== March === | === March === | ||
The first (?) homebrew app is written in .cxi format, "Hello World" | The first (?) homebrew app is written in .cxi format, that being "Hello World" by Xcution (author of CiTRUS, a tool that allows BaNneR and ICoN files to be made using the .xbsf format) | ||
== 2013 == | == 2013 == | ||
| Line 33: | Line 33: | ||
=== January === | === January === | ||
brickgate/brickway - A scandal where Gateway released a FIRM that intentionally bricks consoles using Gateway3DS flashcart clones (such as R4 and Orange3DS). On top of this, | brickgate/brickway - A scandal where Gateway released a FIRM that intentionally bricks consoles using Gateway3DS flashcart clones (such as R4 and Orange3DS). On top of this, it's code was written badly enough that it triggered on many legitimate Gateway3DS cartridges, bricking completely 'innocent' users in the crossfire. | ||
=== March === | === March === | ||
| Line 42: | Line 42: | ||
=== November === | === November === | ||
[https://www.gamebrew.org/wiki/Palantine_CFW_3DS Palantine] (a CFW made by Yellows8 and other) is leaked, bringing a closed-source custom firmware to the public. However, it had limitations such as the | [https://www.gamebrew.org/wiki/Palantine_CFW_3DS Palantine] (a CFW made by Yellows8 and other) is leaked, bringing a closed-source custom firmware to the public. However, it had limitations such as the emuNAND not being update-able, having a low boot rate, and being difficult to install, among others. The thing it did best, running CIAs, would be taken and added to Gateway3DS shortly after. | ||
The flashcart [[Sky3DS]] is first released. It could play pirated roms on entirely stock consoles, but couldn't run homebrew and had a very high ban risk due to the way it worked. This ban risk was unfixable until full custom firmware was released, and by that point it became obsolete anyway. | The flashcart [[Sky3DS]] is first released. It could play pirated roms on entirely stock consoles, but couldn't run homebrew and had a very high ban risk due to the way it worked. This ban risk was unfixable until full custom firmware was released, and by that point it became obsolete anyway. | ||
| Line 57: | Line 57: | ||
=== May === | === May === | ||
The custom firmware PastaCFW is first released. It is named after a leak of sigpatches on pastebin, which was combined with patois' Brahma (an open source memchunkhax/firmlaunchhax) to make the first open source custom firmware. | The custom firmware PastaCFW is first released. It is named after a leak of sigpatches on pastebin, which was combined with patois' Brahma (an open source memchunkhax/firmlaunchhax) to make the first open source custom firmware. It's only major caveat was that it had no emuNAND support. | ||
A fork of rxTools with PastaCFW's sigpatches is released by ahp_person (appletinivi), causing roxas75 to openly dispute him in an attempt to stop piracy from becoming a legal issue for the wider homebrew community. | A fork of rxTools with PastaCFW's sigpatches is released by ahp_person (appletinivi), causing roxas75 to openly dispute him in an attempt to stop piracy from becoming a legal issue for the wider homebrew community. | ||
| Line 80: | Line 80: | ||
=== December === | === December === | ||
An upgrade to Sky3DS, Sky3DS+, is released. Among others, | An upgrade to Sky3DS, Sky3DS+, is released. Among others, it's new features included bypassing cart-based AP in recent games and having a second button for more ease of selecting games. | ||
The CCC hosts [https://gbatemp.net/threads/32c3-console-hacking-3ds-talk-dec-27-smea-derrek-plutoo.405640/ 32c3] in Hamburg, Germany. During 32c3, [https://smealum.github.io/3ds/32c3/ smealum gives a talk] where snshax, [[arm9loaderhax]], memchunkhax2, and ntrcardhax are revealed, & menuhax and ironhax receive updates to continue functioning. | The CCC hosts [https://gbatemp.net/threads/32c3-console-hacking-3ds-talk-dec-27-smea-derrek-plutoo.405640/ 32c3] in Hamburg, Germany. During 32c3, [https://smealum.github.io/3ds/32c3/ smealum gives a talk] where snshax, [[arm9loaderhax]], memchunkhax2, and ntrcardhax are revealed, & menuhax and ironhax receive updates to continue functioning. | ||
| Line 100: | Line 100: | ||
The primary userland exploit ctr-httpwn is first released by yellows8. | The primary userland exploit ctr-httpwn is first released by yellows8. | ||
A complex dispute between the original author of ReiNand (Reisyukaku) and the rest of | A complex dispute between the original author of ReiNand (Reisyukaku) and the rest of it's developer team hits it's first overt boiling point, causing them to cut ties as much as possible and officially fork the project into AuReiNand. | ||
=== March === | === March === | ||
| Line 182: | Line 182: | ||
=== December === | === December === | ||
The CCC hosts [https://gbatemp.net/threads/36c3-hacker-conference-underway-27th-to-30th-of-december-2019.555023/ 36c3] in Leipzig, Germany. During 36c3, [https://mrnbayoh.github.io/36c3/ MrNbaYoh gives a talk] that demonstrates a new primary exploit chain: using StreetPass tags, someone could remotely takeover a 3DS in userland and install custom firmware, with zero user interaction required. This would set up further exploits developed by TuxSH and Lazypixie which would take over the ARM11 kernel, and later on Safehax 2.x to also take over ARM9. However, due to | The CCC hosts [https://gbatemp.net/threads/36c3-hacker-conference-underway-27th-to-30th-of-december-2019.555023/ 36c3] in Leipzig, Germany. During 36c3, [https://mrnbayoh.github.io/36c3/ MrNbaYoh gives a talk] that demonstrates a new primary exploit chain: using StreetPass tags, someone could remotely takeover a 3DS in userland and install custom firmware, with zero user interaction required. This would set up further exploits developed by TuxSH and Lazypixie which would take over the ARM11 kernel, and later on Safehax 2.x to also take over ARM9. However, due to it's potential for malicious use (i.e. remotely bricking consoles), this exploit chain was submitted to HackerOne sometime earlier and patched in version 11.12, two months before 36c3 started. | ||
== 2020 == | == 2020 == | ||
| Line 231: | Line 231: | ||
Nintendo releases version 11.16, breaking TuxSH's universal-otherapp combo by patching smpwn. | Nintendo releases version 11.16, breaking TuxSH's universal-otherapp combo by patching smpwn. | ||
Nintendo also lays the foundation for the eShop closure by updating MINT/ESHOP to handle shutting down eShop payments. Just two weeks later, they would update the NVER on this title due to a typo in the web data module. | Nintendo also lays the foundation for the eShop closure by updating MINT/ESHOP to handle shutting down eShop payments. Just two weeks later, they would update the NVER (most likely meaning Network Version) on this title due to a typo in the web data module. | ||
=== December === | === December === | ||