LoginLogin
Nintendo shutting down 3DS + Wii U online services, see our post

SmileBASIC Server API?

Root / General / [.]

ninjagnuCreated:
Is there a hidden api to SmileBoom's SmileBASIC servers? It's probably some php script idk. I remember seeing this in some forum but don't remember which one. I plan to make a backup bot to download a ton of smilebasic programs from their public keys and back them up on the computer.

There is, but it was annoying because you had to get a token from an actual 3DS, which would expire after a day or two.

There is, but it was annoying because you had to get a token from an actual 3DS, which would expire after a day or two.
Yeah, 12Me21 is right... except the tokens expire about 2-3 hours after. Me and Trinitro21 did it a while back, and I wrote a server thing, but it was quite useless seeing that we don't have a constant flow of authentication tokens.

There is, but it was annoying because you had to get a token from an actual 3DS, which would expire after a day or two.
Yeah, 12Me21 is right... except the tokens expire about 2-3 hours after. Me and Trinitro21 did it a while back, and I wrote a server thing, but it was quite useless seeing that we don't have a constant flow of authentication tokens.
Homebrew?

How did you figure out the ip of the server?
This could be done easily by proxying your 3ds's connection and sniffing traffic. You could do this easily with a Kali Linux. Here's an article that gives a tutorial on spoofing a network with kali and a wifi pineapple. While you are spoofing you can connect your 3ds to the spoofed network open smile basic and then upload and download a project from the servers. The urls and IPs connected to will be in the log on the Kali Linux machine running the spoofer.

How did you figure out the ip of the server?
Sadly, it isn't as elaborate as how ateesdalejr described it. We simply dumped the code.bin file (kind of like an EXE for a 3DS application) and searched for anything resembling URLs.

How did you figure out the ip of the server?
Sadly, it isn't as elaborate as how ateesdalejr described it. We simply dumped the code.bin file (kind of like an EXE for a 3DS application) and searched for anything resembling URLs.
Oh, that sounds much simpler. If you sniff traffic you could possibly do a MITM attack. HTTPS may make this impossible tho'