Deploying to gh-pages from @ hacks-guide/Guide_3DS@4c82df4d0d 🚀
This commit is contained in:
parent
0b7ed6bcc4
commit
cef3f293b9
2 changed files with 2 additions and 2 deletions
2
feed.xml
2
feed.xml
|
@ -1 +1 @@
|
||||||
<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="4.3.2">Jekyll</generator><link href="https://3ds.hacks.guide/feed.xml" rel="self" type="application/atom+xml" /><link href="https://3ds.hacks.guide/" rel="alternate" type="text/html" /><updated>2023-10-09T18:16:36+00:00</updated><id>https://3ds.hacks.guide/feed.xml</id><title type="html">3DS Hacks Guide</title><subtitle>A complete guide to 3DS custom firmware</subtitle><author><name>Nintendo Homebrew</name></author></feed>
|
<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="4.3.2">Jekyll</generator><link href="https://3ds.hacks.guide/feed.xml" rel="self" type="application/atom+xml" /><link href="https://3ds.hacks.guide/" rel="alternate" type="text/html" /><updated>2023-10-09T18:32:37+00:00</updated><id>https://3ds.hacks.guide/feed.xml</id><title type="html">3DS Hacks Guide</title><subtitle>A complete guide to 3DS custom firmware</subtitle><author><name>Nintendo Homebrew</name></author></feed>
|
|
@ -527,7 +527,7 @@ window.cookieconsent.initialise({
|
||||||
|
|
||||||
<details class="notice--info">
|
<details class="notice--info">
|
||||||
<summary><em>Technical Details (optional)</em></summary>
|
<summary><em>Technical Details (optional)</em></summary>
|
||||||
<p><a href="https://github.com/zoogie/MSET9">MSET9</a> is an exploit for the System Settings application developed by <a href="https://github.com/zoogie">zoogie</a>. It exploits a flaw where the ID1 (the second 32-character folder name inside of the Nintendo 3DS folder, inside of the ID0) can be <em>any</em> name as long as it is 32 characters. Performing a specific sequence of actions results in the 3DS executing the instructions are encoded into the ID1 folder name, which can be used to grant full control over the 3DS.</p>
|
<p><a href="https://github.com/zoogie/MSET9">MSET9</a> is an exploit for the System Settings application developed by <a href="https://github.com/zoogie">zoogie</a>. It exploits a flaw where the ID1 (the second 32-character folder name inside of the Nintendo 3DS folder, inside of the ID0) can be <em>any</em> name as long as it is 32 characters. Performing a specific sequence of actions results in the console executing the instructions that are encoded into the ID1 folder name, which can be used to grant full control over the 3DS.</p>
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue