Toggle menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

3DS Browser Update Bypass: Difference between revisions

From GameBrew
No edit summary
No edit summary
Line 1: Line 1:
{{Infobox 3DS Homebrews
{{Infobox 3DS Homebrews
|title=3DS Browser Update Bypass
|title=3DS Browser Update Bypass
|description=Nintendo 3DS browsers update check bypass based on SSLoth (firmware versions <= 11.13)
|description=Nintendo 3DS browsers update check bypass based on SSLoth (firmware versions <= 11.13).
|author=MrNbaYoh
|author=MrNbaYoh
|lastupdated=2020/12/21
|lastupdated=2020/12/21
|type=System Tools
|type=PC Utilities
|version=2020
|version=2020
|license=Mixed
|license=Mixed
|download=https://dlhb.gamebrew.org/3dshomebrew/3DS-Browser-Update.rar
|download=https://dlhb.gamebrew.org/3dshomebrews/3dsbrowserupdatebypass.7z
|website=https://github.com/MrNbaYoh/3ds-browser-update-bypass-server
|website=https://github.com/MrNbaYoh/3ds-browser-update-bypass-server
|source=https://github.com/MrNbaYoh/3ds-browser-update-bypass-server
|source=https://github.com/MrNbaYoh/3ds-browser-update-bypass-server
}}
}}
== 3DS Browser Update Bypass ==
This is a server that can be used with [https://github.com/MrNbaYoh/3ds-ssloth SSLoth] to spoof the <code>cbvc.cdn.nintendo.net</code> endpoint and bypass the browser update check that prevents using the browsers on firmware versions < 11.14.


This server can be used with [https://github.com/MrNbaYoh/3ds-ssloth SSLoth] to spoof the <code>cbvc.cdn.nintendo.net</code> endpoint and bypass the browser update check that prevents using the browsers on firmware versions &lt; 11.14.
==User guide==
===Public server ===
A public server is available. To bypass the update check, you need to edit your 3DS network settings and set your DNS to <code>54.38.133.70</code>.


== Public server ==
===How does it work===
When you open the browsers, they send a GET request to <code>cbvc.cdn.nintendo.net</code> to check whether an update is available or not.


A public server is available. To bypass the update check, you need to edit your 3DS network settings and set your DNS to <code>54.38.133.70</code>.
If the response is not <code>0</code> (usually they reply with <code>99999</code> when an update is needed), the browser pops a message up saying you need to update.


== How does it work? ==
With [https://github.com/MrNbaYoh/3ds-ssloth SSLoth] we can spoof the server and always send <code>0</code> as a response. Thus, we bypass the update requirement.


When you open the browsers, they send a GET request to <code>cbvc.cdn.nintendo.net</code> to check whether an update is available or not. If the response is not <code>0</code> (usually they reply with <code>99999</code> when an update is needed), the browser pops a message up saying you need to update.
==External links==
* Author's Tweet - https://twitter.com/MrNbaYoh/status/1340749817887207424
* GitHub - https://github.com/MrNbaYoh/3ds-browser-update-bypass-server


With [https://github.com/MrNbaYoh/3ds-ssloth SSLoth] we can spoof the server and always send <code>0</code> as a response. Thus, we bypass the update requirement.
[[Category:3DS homebrew applications]]
[[Category:PC utilities for 3DS homebrew]]

Revision as of 11:07, 7 February 2022

3DS Browser Update Bypass
General
AuthorMrNbaYoh
TypePC Utilities
Version2020
LicenseMixed
Last Updated2020/12/21
Links
Download
Website
Source

This is a server that can be used with SSLoth to spoof the cbvc.cdn.nintendo.net endpoint and bypass the browser update check that prevents using the browsers on firmware versions < 11.14.

User guide

Public server

A public server is available. To bypass the update check, you need to edit your 3DS network settings and set your DNS to 54.38.133.70.

How does it work

When you open the browsers, they send a GET request to cbvc.cdn.nintendo.net to check whether an update is available or not.

If the response is not 0 (usually they reply with 99999 when an update is needed), the browser pops a message up saying you need to update.

With SSLoth we can spoof the server and always send 0 as a response. Thus, we bypass the update requirement.

External links

Advertising: