LoginLogin
Nintendo shutting down 3DS + Wii U online services, see our post

Internet with SmileBASIC?

Root / FAQs / [.]

answerCreated:
Is it at all possible, to bring internet with SmileBASIC; I mean with a little know how in Aircrack or something in Linux. I feel like it could be exploited, but no one has seemed to try yet; if we managed to do SmashHax with exploiting multiplayer with SSB4, then can we send data to the Nintendo 3DS via SmileBASIC with a little technical know how. A good example where this could work is a Multi-User Domain(MUD), if you have any ideas how this could be exploited(either with a homebrew 3DS application or with Aircrack on Linux(Potentially on Windows, a Linux bash is coming to Windows natively), please suggest :P

Not really. The only way I could possibly think of doing it is by using an auxiliary cable so that SmileBASIC can send and receive data through a PC. That's probably more trouble than it's worth though.

Woah an aux cable I was thinking something along the lines of emulating 3ds wireless signals, but yeah that's totally possible with the way the aux port works. That's actually a really good idea I never thought of.

Or you can go full masochist mode and do some crazy stuff involving Petit Modem and software on a PC. It would only really work for Internet Poker though...

This is something I've wondered about in the past, but haven't had the time or patience to do. I think it would have to work by writing a PC program which would be able to talk to smilebasic using the MP commands. You'd have to use wireshark on the PC to capture two 3DSes talking to each other, work out what it all means, and make your PC program speak the same language. In its most simple form, as an initial proof of concept, the PC program could simply try to act as a proxy between two 3DSes over the internet: only receiving and forwarding packets from one to another.

This is something I've wondered about in the past, but haven't had the time or patience to do [snip] only receiving and forwarding packets from one to another.
seems like more trouble than it's worth.

seems lie more trouble than it's worth.
The work needed to streamline it may seem outlandish, but the potential applications are outstanding.

Wireless traffic between two 3DS systems is encrypted with TLS. The systems will only trust an agent that is using a TLS certificate that has been signed by Nintendo's certificate authority. This is a common way to handle securing communication between two parties (3DSs) that have a relationship with a trusted 3rd party (Nintendo). Your options for working around this are:
  • Find a key that has been signed by Nintendo and use that (no one has been able to extract one from a 3DS to my knowledge)
  • Make your own certificate authority (easy) and replace Nintendo's public key (stored in your 3DS? Or maybe in each game, such as SmileBASIC? Not sure if anyone has figured this one out yet) with your own CA public key. Your 3DS would then trust a cert signed by your CA, and would no longer trust Nintendo signed certs. This would definitely require exploiting your 3DS, and would not be easy.
  • Find a serious vulnerability in the TLS implementation in the 3DS. This is probably OpenSSL-based, according to the legal notice in the 3DS manual, but might be based on some other tech also listed there. Exploits are occasionally found, but none so far have been proven to be exploitable on the 3DS. Nintendo is no doubt on the CVE notification lists for this software, and are in a position to release updates before most exploits are known to the general public.
You're not likely to achieve Internet connectivity in SmileBASIC by posing as a 3DS.

Wireless traffic between two 3DS systems is encrypted with TLS. The systems will only trust an agent that is using a TLS certificate that has been signed by Nintendo's certificate authority. This is a common way to handle securing communication between two parties (3DSs) that have a relationship with a trusted 3rd party (Nintendo). [snip] You're not likely to achieve Internet connectivity in SmileBASIC by posing as a 3DS.
The 3ds wlan has been reversed https://3dbrew.org/wiki/NWM_Services Here is a homebrew implementation https://github.com/devkitPro/3ds-examples/tree/master/network/uds The smash bros hax exploit using wlan comms PC <-> 3ds https://github.com/yellows8/3ds_smashbroshax I have no idea how much extra work it would take for a 3ds homebrew (or PC) to talk to Smilebasic through another 3ds but I thought I'd share the above with you anyway.