More actions
nimdsphax | |
---|---|
General | |
Author | luigoalma |
Type | Exploits |
Version | 1.0 |
License | Mixed |
Last Updated | 2023/07/19 |
Links | |
Download | |
Website | |
Source | |
Nimdsphax is an altered version of nimhax. It is designed to "pwn dsp" with an emulated ps:ps service, set GPUPROT, and exploit kernel. This project is a form of "homebrew" software, which is unofficial software made by amateur developers for closed systems such as the 3DS. In the context of this project, "pwn" is a term used in the hacker community to mean gaining control of a system or exploiting its vulnerabilities
Required sysmodule versions
- httpwn is fixed up for HTTP v14336 (introduced in 11.4)
- nimhax is prepared for NIM v14341 (introduced in 11.8)
- dsp pwn is prepared for DSP v7169 (introduced in 11.1)
Any version between since 11.8 until and including 11.17 (latest as of this writing) should be able to run it fine.
Installation
- Just place the nimdsphax folder itself in /3ds/ on the sdcard, not the individual contents.
- The exploit tries to execute immediately after running.
- On *hax xml takeover runs, there's a chance of it failing to run on a red screen, this is an xml takeover issue.
- Despite using nim:s, online connection is not required.
Changelog
v1.0
- First Release.
Credits
(Included credits from original ctr-httpwn)
- @Tuxsh for the exploit writeup in C for killing PS, emulating it and ipctakeover DSP and set GPUPROT to 0.
- @Tuxsh for the >= 11.4 httpwn method
- @zoogie for fix up on the httpwn sharedmem rop generation code and addresses with the mentioned above resourse. As well fix up bosshaxx addresses.
- This uses the decompression code from here for ExeFS .code decompression: https://github.com/smealum/ninjhax2.x/blob/master/app_bootloader/source/takeover.c
- Tinyxml2 is used for config XML parsing, via portlibs.
- @ihaveamac for the app icon(issue #1).
- types.h at ipctakeover/boss/ is from ctrtool.
- The filepath for "url_config.txt" is from here: https://github.com/skiptirengu/ctr-httpwn