- 精华
- 0
- 帖子
- 6674
- 威望
- 0 点
- 积分
- 6780 点
- 种子
- 212 点
- 注册时间
- 2006-3-14
- 最后登录
- 2024-11-14
|
国外论坛相关讨论:
http://gbatemp.net/threads/wii-u-brew-coming-soon.359179/
实现WiiU Brew,那就意味着黑客发现了WiiU的漏洞,可以采取软破的方式破解WiiU。有了WiiU Brew 即意味着自制软件即可完全实现~
目前Wii上的CFG、Wiiflow..等皆为自制软件。他们都是通过Wii完全破解后,通过HBC来运行自制代码。
有了WiiU Brew实现自制软件,那么就意味着,在WiiU上的无限可能,例如:玩MD、FC、SFC..模拟器,或许NGC、Wii也可以(gamepad操控),看U盘、移动硬盘上的本地视频...等一切WiiU这台硬件设备性能所能满足一切软件应用。
这相当于本来WiiU上只能用运行任天堂官方的软件,但是破解后,就可以运行任何程序员编写的软件。大门完全敞开~
当然,玩破解的WiiU游戏也是自制软件的一项功能。
USB Loader软件就可以绕过光盘镜像的锁区限制等等..
另外,早在今年5月份,WiiU的首个WiiU游戏ISO DUMP The_Avengers_Battle_for_Earth_PAL_WiiU-VENOM 《复仇者联盟:地球之战 欧版》 就已出现。光盘DUMP已经不成问题。
——————————————————————
NB的黑客**~~~将在12月27号于德国 扒掉WiiU最后的裤衩
http://events.ccc.de/congress/2013/Fahrplan/events/5290.html
lecture: Console Hacking 2013
WiiU
Event_large
About a year ago Nintendo released their latest video gaming console, the Wii U. Since 2006, the Wii has led to one of the most active homebrew scenes after its security system was completely bypassed. This talk will discuss the improvements made in Wii U's architecture and explain how it was broken in less than 31 days. The talk is targeted at those who hack (or design) embedded system security, but gamers might also find it interesting.
The talk will consist of several parts. First, we will discuss the Wii U: what it is, what makes it tick, and how it compares to its predecessor, the Wii.
Next, we will cover two different approaches that we used to attack the Wii U system. The focus will be on how our results were achieved instead of on what those results are, so you can reproduce the attacks at home. Along the way we'll describe the Wii U's security architecture.
The third and final part of the talk will cover where to go from here: What is broken, what is yet to be broken, things that still have to be done to create a viable homebrew ecosystem, the balance between the effort required and the reward for users and hackers, and the potential upsides and downsides of different approaches.
Basic knowledge of embedded systems and CPU architectures is recommended for attendees, although we will try to explain required concepts as we go along.
Before and after the talk we will also be available in the hackcenter for those who would like to discuss further details or embedded security in general.
|
本帖子中包含更多资源
您需要 登录 才可以下载或查看,没有帐号?注册
x
|