Is it at all possible, to bring internet with SmileBASIC; I mean with a little know how in Aircrack or something in Linux. I feel like it could be exploited, but no one has seemed to try yet; if we managed to do SmashHax with exploiting multiplayer with SSB4, then can we send data to the Nintendo 3DS via SmileBASIC with a little technical know how. A good example where this could work is a Multi-User Domain(MUD), if you have any ideas how this could be exploited(either with a homebrew 3DS application or with Aircrack on Linux(Potentially on Windows, a Linux bash is coming to Windows natively), please suggest :P
Internet with SmileBASIC?
answerCreated:
Woah an aux cable
I was thinking something along the lines of emulating 3ds wireless signals, but yeah that's totally possible with the way the aux port works.
That's actually a really good idea I never thought of.
This is something I've wondered about in the past, but haven't had the time or patience to do.
I think it would have to work by writing a PC program which would be able to talk to smilebasic using the MP commands.
You'd have to use wireshark on the PC to capture two 3DSes talking to each other, work out what it all means, and make your PC program speak the same language.
In its most simple form, as an initial proof of concept, the PC program could simply try to act as a proxy between two 3DSes over the internet: only receiving and forwarding packets from one to another.
This is something I've wondered about in the past, but haven't had the time or patience to do [snip] only receiving and forwarding packets from one to another.seems like more trouble than it's worth.
Wireless traffic between two 3DS systems is encrypted with TLS. The systems will only trust an agent that is using a TLS certificate that has been signed by Nintendo's certificate authority. This is a common way to handle securing communication between two parties (3DSs) that have a relationship with a trusted 3rd party (Nintendo).
Your options for working around this are:
- Find a key that has been signed by Nintendo and use that (no one has been able to extract one from a 3DS to my knowledge)
- Make your own certificate authority (easy) and replace Nintendo's public key (stored in your 3DS? Or maybe in each game, such as SmileBASIC? Not sure if anyone has figured this one out yet) with your own CA public key. Your 3DS would then trust a cert signed by your CA, and would no longer trust Nintendo signed certs. This would definitely require exploiting your 3DS, and would not be easy.
- Find a serious vulnerability in the TLS implementation in the 3DS. This is probably OpenSSL-based, according to the legal notice in the 3DS manual, but might be based on some other tech also listed there. Exploits are occasionally found, but none so far have been proven to be exploitable on the 3DS. Nintendo is no doubt on the CVE notification lists for this software, and are in a position to release updates before most exploits are known to the general public.
Wireless traffic between two 3DS systems is encrypted with TLS. The systems will only trust an agent that is using a TLS certificate that has been signed by Nintendo's certificate authority. This is a common way to handle securing communication between two parties (3DSs) that have a relationship with a trusted 3rd party (Nintendo). [snip] You're not likely to achieve Internet connectivity in SmileBASIC by posing as a 3DS.The 3ds wlan has been reversed https://3dbrew.org/wiki/NWM_Services Here is a homebrew implementation https://github.com/devkitPro/3ds-examples/tree/master/network/uds The smash bros hax exploit using wlan comms PC <-> 3ds https://github.com/yellows8/3ds_smashbroshax I have no idea how much extra work it would take for a 3ds homebrew (or PC) to talk to Smilebasic through another 3ds but I thought I'd share the above with you anyway.