PoC exploit for Super Smash Brothers Wii U to execute arbitrary ROP in userland
Go to file
2020-02-11 17:13:28 -05:00
kexploit Move python alias into a variable 2019-02-13 11:54:06 -05:00
poc Move python alias into a variable 2019-02-13 11:54:06 -05:00
pymsc@dfaf2f4fcc More organization 2019-01-18 13:58:28 -05:00
.gitignore - Use wiiuhaxx_common for creating a ROP 2019-01-23 21:31:59 +01:00
.gitmodules More organization 2019-01-18 13:58:28 -05:00
inject.py Add file injector 2020-02-11 17:00:37 -05:00
LICENSE Initial commit 2017-07-31 16:35:07 -04:00
Makefile Add top-level Makefile 2020-02-11 17:13:28 -05:00
README.md - Use wiiuhaxx_common for creating a ROP 2019-01-23 21:31:59 +01:00
robot_packed Add file injector 2020-02-11 17:00:37 -05:00
ROP-NOTES.txt Initial commit 2017-07-31 16:35:28 -04:00
WRITE-UP.md Fix spelling/grammer 2017-08-06 13:23:17 -04:00

ROBChain

PoC exploit for Super Smash Brothers Wii U to get arbitrary ROP execution under userland

Can go over any fighter (and possibly article) to gain arbitrary code execution (Only ROP atm). This is a variation of contenthax based around MSC (the main character scripting language) exploiting a heap overflow to gain arbitrary read/write within the MSC script. Use pymsc to build.

Build PoC

Required:

git clone --recurse-submodules https://github.com/jam1garner/ROBChain.git && \
cd ROBChain/poc && \
make clean && make

Install

Take the generated exploit.mscsb and install it in a patch over

/data/fighter/[fighter]/script/msc/[fighter].mscsb

then install via SDCafiine or fs contents replacement.

Video of PoC

https://youtu.be/u3qKsbGPgn0

Write up

https://github.com/jam1garner/ROBChain/blob/master/WRITE-UP.md