Hacking the 3DS 5, Part 1

Everything comes to an end, and so does the 3DS series. In this first part I’ll pave the way to go through the whole exploit chain that leads to native code execution in the ARM11 and ARM9 processors of the Nintendo 3DS. A successful example of black-box hacking, reversing and…

0 Comments

Hacking The 3DS 4: Hardware Attacks

Introduction Let’s talk about hardware hacking, mostly targeting the Nintendo 3ds hardware, but certainly related to other distinct targets. I have tried to create a post which explains with the maximum level of detail each attack / reversing procedure. I consider this useful as a learning resource for future generations.…

0 Comments

Hacking The 3ds 3: Memory Shenanigans

Introduction Welcome again. Finally, it’s time to go back and continue hacking the Nintendo 3ds. Previously, I got raw RAM dumps where several unicode strings could be found, evidencing the data was not encrypted or secured at all in RAM. This also applies for code, binary’s code sections may be also…

0 Comments

Hacking The 3ds 2: Finding the Pattern

Hello again!I’m back with part 2: “Finding The Pattern”! In case you haven’t read yet the first blog entry, click here. Brief Summary Back in the day, I analysed what possible entry-points the 3DS may have. We lead to the conclusion that the RAM contents were not encrypted. This is something…

0 Comments

Hacking The 3ds 1: Introduction

Hello back!Today, a new series begin. A “journey” into hacking the Nintendo 3DS Handheld Console starts. There are several reasons why I am going to do this series; Personal Interest. During the later 2014, the 3DS Scene started growing. I was there, and was told I couldn’t get anything.The obnoxious…

0 Comments

Hacking the 3DS 0: Resources

What is this This is an extra resources pages for storing useful information and resources related to the development of this series of articles. This includes tools, external articles, stack overflow posts, and any other kind of resource that is considered helpful. Consecuently it is also used to store, link…

0 Comments