haxchi/payload_generator
orboditilt ba142e1ca0 - Added the haxchi installer
- Move roms creation into sub folder
- re-add support for other base games
2019-08-14 22:06:31 +02:00
..
defines - Added the haxchi installer 2019-08-14 22:06:31 +02:00
.gitignore - Added the haxchi installer 2019-08-14 22:06:31 +02:00
Makefile - Added the haxchi installer 2019-08-14 22:06:31 +02:00
README.md - Added the haxchi installer 2019-08-14 22:06:31 +02:00
coreinit.s - Added the haxchi installer 2019-08-14 22:06:31 +02:00
haxchi.s - Added the haxchi installer 2019-08-14 22:06:31 +02:00
haxchi_rop.s - Added the haxchi installer 2019-08-14 22:06:31 +02:00

README.md

Haxchi-Exploit

This is the continuation of Haxchi from FIX94 (initial PoC by smea).

haxchi is an exploit for the Nintendo DS virtual console emulator on Wii U (hachihachi). 
it is possible due to "contenthax", a vulnerability in the wii u's title integrity design: 
only code and critical descriptors are signed, with all other contents left at the mercy of attackers.

Usage

Put a payload code550.bin in the root of this project.
This payload should be statically linked to 0x18000000, and is called inside a thread.
Make sure to exit this thread via OSExitThread(0);, afterwards the rop switches automatically to the Mii Maker.

An example payload which perform the kernel exploit can be found here.

Notes

Currently this ONLY executes a given code550.bin, nothing usable for the end user. Only one game, no CFW, no coldboothax, nothing.

Dependencies

armips and zip in your PATH variable.

credit

smea, plutoo, yellows8, naehrwert, derrek, FIX94, dimok and orboditilt.