8000 GitHub - rdmrocha/safehax: My implementation of safefirmhax: https://3dbrew.org/wiki/3DS_System_Flaws#Process9
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

rdmrocha/safehax

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

safehax/safefirmhax

What this is:

Basically, it works like Brahma's arm9 bootstrap, but for a wider range of firmwares. It will try to load 'arm9.bin' (alternatively 'arm9loaderhax.bin') from the SD card root, and from there it'll load it into memory @ 0x23F00000. This is useful for a number of things, including installing otpless arm9loaderhax on N3DS, dumping your nand on the newer firmwares, and running CFW.

Before running this, run some k11 exploit that will enable access to srvs and svcBackdoor. This is required.

How it works:

Because 'SAFE_MODE' firm is out of date (~3.0 on O3DS, ~8.1 on N3DS), it's still vulnerable to firmlaunch-hax, which allows us to overwrite the arm9 entry pointer on firmlaunch. Knowing this, we can trigger a firmlaunch, so that 'SAFE_MODE' arm9 can run, then we sync up with arm9 until we can send another firmlaunch request to it. From there, we can do firmlaunch-hax like normal and gain arm9 code execution.

Credits

  • Normmatt - Finding the vuln, helping work out an issue during KSync.
  • 'Everyone' - For also finding the vuln.
  • shinyquagsire23/patois(/etc?) - The firmlaunch-hax code that this uses snippets from, and was used as reference.
  • 3DBrew's Users - VAddrs, and other useful information in general.

About

My implementation of safefirmhax: https://3dbrew.org/wiki/3DS_System_Flaws#Process9

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Makefile 53.0%
  • C 42.3%
  • Assembly 4.3%
  • Objective-C 0.4%
0