Jump to content

rileyjstrickland

Member
  • Posts

    3
  • Joined

  • Last visited

Posts posted by rileyjstrickland

  1. So your school blocks the website? I honestly doubt a mobile server is going to help for that... But the source files are included on the first post.

    My advice would be just to be patient and wait till your home :bidoof:

    While the source is in the post, the actual web-end isn't, only the C programs and the file conversion are. The actual exploit is stored on the web server.

    I would like to setup a mobile server (on my android phone) to dump at school. Can somebody provide a zip file with all the files I need?

    Thanks,

    Skidooelan

    I will not provide the actual files, but if you look at the source of the page you'll see the js needed to run the exploit (just rip it yourself), you'll also see the location of LoadROP.dat (of which you can also rip.)

  2. If possible, could you shed some light on how the web end of the exploit works? I see that you load a static file from the webserver (LoadCode.Dat) and execute it, but I also see in the Javascript "b=q.indexOf('dmc:/');" where I'm assuming dmc is the external SD Card of the system.

    However I am confused at these lines

    b+=5;

    e=q.indexOf('\0',b); ... else{

    u+='"dmc:/" not found';

    }

    What does this do? I was wondering because I would like to write a program that generates injectable QR Codes for entire SAV files (including exporting them directly to the server.) Does the dmc mean I can see the files on the SD Card? and if possible could I use this to run rsavout.bin, copy the data to my web server, make x changes, and copy it back to the SD card and run rsavin.bin? (Using X QR Codes.)

×
×
  • Create New...