![]() With this, the idea is that you add only trusted friends, instead of just throwing it out on the web.įor now I'll probably try to get the nlLib to work and maybe use a pi as a sort of "monkey see, monkey do" rather than trying to fully understand the encryption. So far I want to just see if I can communicate with a vpn/ssh tunnel with a friend, and make it work that way. ![]() Let alone the CECD streetpass system module. Most streetpass data packets would be custom tailored to each consecutive title, making the analysis, parsing, and exploit prevention a big frickin headache. If we truly want to share this data over the internet, we would need parsers to make 100% sure no injection can happen, which would be technically impossible. ![]() And yes, indeed, if the encryption is broken (which shouldn't be too hard as it should be based on static or known data), packets can potentially be crafted to completely take over a device, brick it, or something else (at least with before firmware before 11.12). I did some brainstorming on the available information, as well as trying to approach this project in the best way. Sorry for the long post, but if you've made it this far, thanks for sticking around!Įdit1 This post might contain wrong assumptions/information, follow the posts latest comments to keep up to date.Įdit2 View this repository for a collection of links and information: Įdit 3 any old information has been struck-trough. This is why for now I'm so hyper-focussed on local play. This is mainly difficult due to the 8 hour cooldown time, The access point not being on a consistent channel (wireshark can only listen in on 1 specific channel at a time with my wifi chip), and it happening randomly. I've so far been unsuccesful to capture a streetpass share. Strictly speaking there is some extra characters in the SSID, but for now I'm ignoring those. NWCUSBAP, probably stands for: "Ninentdo Wireless Connector, USB Access Point" Streetpass seems to continuously send out the same SSID: "ername".I want to crack the WEP key, so I can then identify if the passkey is just being broadcasted or if something else is happening. Hence I need to record 1 very long uninterupted session. The main issue is that, either the ssid, or the passkey changes for each local play session. After which clients are able to connect and play together.Īs of right now I'm trying to crack the WEP key, for a single, very long mario kart 7 session, but still need to gather more data.Somehow it communicates to other DS's, its SSID and passkey.Also, these APs seem to have a hidden SSID. Generic broadcasts (before authentication) seem to happen on all 2.4 channels. Usually these APs appear on channel 1,6 and 11. Local play seems to make a WEP-encrypted access point (AP) on the 2.4ghz band with a bandwidth of 20mhz. So as far as local play goes, it shares some similarities with streetpass with the packets that it broadcasts.ĭigging a bit into local play gave me the following information:īoth 3DS's spit out a bunch of broadcasts/beacon frames, showing network SSIDs.Īfter this, the DS's authenticate with the host, and start sharing game data. However, for a while I could not figure out more than this, until I tried something else: Local play. Loading up wireshark with management mode, indeed showed some broadcasting traffic from 2 3DS's I have laying around. After a bit of digging it seemed that it is using a regular 802.11b wifi chip to do its thing. The first area I decided to tackle, is to figure out what the heck streetpass even uses. If this is possible, we could then hope to share streetpass data more easily, without modding, and possibly making our own "spotpass". The goal is to be able to use a regular, unmodified 3DS, to be able to talk to any other wireless device and streetpass that way (Basically making another device fake they are a 3DS). Modding is an option to get the streetpass file from the DS and share it around (streetpass 2 rise from the ashes), but this is not the main goal. Please feel free to discuss and share information/knowledge on this topic! I am only 1 person and cannot possibly hope to figure this out on my own. Since the spotpass servers are all but dead, I'm first focussing on how streetpass works. My goal with this post is to possibly reverse engineer how either: But because of the dwindling amount of 3DS users and the death of spotpass in 2018 and in turn PiPass/HomePass, this is quite difficult. ![]() So to begin with this topic, the reason for me starting it is that I want more streetpasses. First of all Hi!, I'm new to GBAtemp and was mostly a lurker every once in a while.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |