Toggle menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

Eri Hakawai Wii

From GameBrew
Revision as of 05:00, 29 Ocak 2023 by HydeWing (talk | contribs)
Eri HaKawai
File:Erihakawaiwii.jpg
General
Authordelroth
TypeExploits
Version1.0 + 2.0
LicenseGPL-2.0
Last Updated2011/03/27
Links
1.0/2.0 - Download
Website

I have developed a new exploit for the PAL Wii, known as Eri HaKawai, which is compatible with all currently released System Menu versions (up to 4.3). It utilizes a bug in the savegame loading code of the game Tales of Symphonia: Dawn of the New World, a sequel to the Gamecube game Tales of Symphonia.

I am releasing the exploit in source format, under the GPLv2 license. To use the exploit, you will need a Broadway cross-compilation toolchain, as well as access to Segher's Wii Git repository. You are free to use and modify the exploit as you wish, as long as it is in compliance with the GPLv2 license. I will not be distributing any binary files.

Usage & Installation

Prerequisites

  1. SD card (not SDHC) formatted as FAT16 or FAT32.
  2. Some possibility to copy the savegame from the PC to the SD card (i.e. card reader).
  3. "Tales of Symphonia: Dawn of the New World" game.
  4. Some homebrew software to load, e.g. the HackMii Installer. Although this isn't necessary, it's highly recommended.

Howto

  1. (OPTIONAL) If you have an existing ToS savegame. MOVE it to another SD CARD.
  2. Copy the "private" folder to the root of your SD card.
  3. Put the homebrew you want to load on the root of your SD card, named "boot.elf".
  4. On your Wii, copy the save from the SD card to the internal memory.
  5. Start the game and load the first save.
  6. Press the PLUS button to enter the game menu.
  7. Scroll to the STATUS button and press A.
  8. Scroll to the monster named "Eri HaKawai" (NTSC version: "Giantpune") and press A.
  9. The boot.elf file should be loaded from your SD card.

Media

Wii Eri HaKawai Exploit - (softwii)

Credits

  • team twiizers - savezelda elf loader
  • Pierre "delroth" Bourdon - originally found the buffer overflow & managed to turn it into a working exploit (for the PAL version of the game). checksum code for PAL which was a great start when i was doing the USA checksum stuff
  • giantpune - the USA version of this exploit. including - but not limited to - disassembling, poking, breakpointing, hex editing, checksumming, artworking, twintigging, tachtigging

And big thanks to...

  • Segher - really useful save packing/unpacking tools
  • nuke, link, dcx2, brkirch, Y.S, Frank Willie, et al - usb gecko, geckoOS, vdappc, geckoDotNET
  • megazig, dcx2 - lots of useful knowledge concerning ASM, registers, PPC behavior, and other similar low-level stuff

External Links

Advertising: