Deploying to gh-pages from @ hacks-guide/Guide_3DS@4c82df4d0d 🚀

This commit is contained in:
lilyuwuu 2023-10-09 18:32:53 +00:00
parent 0b7ed6bcc4
commit cef3f293b9
2 changed files with 2 additions and 2 deletions

View file

@ -1 +1 @@
<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="4.3.2">Jekyll</generator><link href="https://3ds.hacks.guide/feed.xml" rel="self" type="application/atom+xml" /><link href="https://3ds.hacks.guide/" rel="alternate" type="text/html" /><updated>2023-10-09T18:16:36+00:00</updated><id>https://3ds.hacks.guide/feed.xml</id><title type="html">3DS Hacks Guide</title><subtitle>A complete guide to 3DS custom firmware</subtitle><author><name>Nintendo Homebrew</name></author></feed>
<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="4.3.2">Jekyll</generator><link href="https://3ds.hacks.guide/feed.xml" rel="self" type="application/atom+xml" /><link href="https://3ds.hacks.guide/" rel="alternate" type="text/html" /><updated>2023-10-09T18:32:37+00:00</updated><id>https://3ds.hacks.guide/feed.xml</id><title type="html">3DS Hacks Guide</title><subtitle>A complete guide to 3DS custom firmware</subtitle><author><name>Nintendo Homebrew</name></author></feed>

View file

@ -527,7 +527,7 @@ window.cookieconsent.initialise({
<details class="notice--info">
<summary><em>Technical Details (optional)</em></summary>
<p><a href="https://github.com/zoogie/MSET9">MSET9</a> is an exploit for the System Settings application developed by <a href="https://github.com/zoogie">zoogie</a>. It exploits a flaw where the ID1 (the second 32-character folder name inside of the Nintendo 3DS folder, inside of the ID0) can be <em>any</em> name as long as it is 32 characters. Performing a specific sequence of actions results in the 3DS executing the instructions are encoded into the ID1 folder name, which can be used to grant full control over the 3DS.</p>
<p><a href="https://github.com/zoogie/MSET9">MSET9</a> is an exploit for the System Settings application developed by <a href="https://github.com/zoogie">zoogie</a>. It exploits a flaw where the ID1 (the second 32-character folder name inside of the Nintendo 3DS folder, inside of the ID0) can be <em>any</em> name as long as it is 32 characters. Performing a specific sequence of actions results in the console executing the instructions that are encoded into the ID1 folder name, which can be used to grant full control over the 3DS.</p>
</details>