Jump to content

rileyjstrickland

Member
  • Posts

    3
  • Joined

  • Last visited

Everything posted by rileyjstrickland

  1. While the source is in the post, the actual web-end isn't, only the C programs and the file conversion are. The actual exploit is stored on the web server. I will not provide the actual files, but if you look at the source of the page you'll see the js needed to run the exploit (just rip it yourself), you'll also see the location of LoadROP.dat (of which you can also rip.)
  2. If possible, could you shed some light on how the web end of the exploit works? I see that you load a static file from the webserver (LoadCode.Dat) and execute it, but I also see in the Javascript "b=q.indexOf('dmc:/');" where I'm assuming dmc is the external SD Card of the system. However I am confused at these lines What does this do? I was wondering because I would like to write a program that generates injectable QR Codes for entire SAV files (including exporting them directly to the server.) Does the dmc mean I can see the files on the SD Card? and if possible could I use this to run rsavout.bin, copy the data to my web server, make x changes, and copy it back to the SD card and run rsavin.bin? (Using X QR Codes.)
×
×
  • Create New...