Home Tech What Switch exploit can we use for crack Switch?

What Switch exploit can we use for crack Switch?

1319
0

If you follow the news of the Nintendo Switch, you must have heard about hackers who cracked it and play free of charge at the latest trend games. so what Switch exploit can we use for? All the exploits can work on cracked switch?

What are the implications of the flaws of the Nintendo Switch?

The Nintendo Switch console suffers from a security weakness in size that has allowed some hackers to take advantage. The flaw lies more precisely in its graphics processor and anyone with sufficient technical knowledge can make significant changes to the console.

You have to know that Nintendo assures you that you can do nothing to fix things, which means that you can jailbreak a console that you already have. Only, we must not hope to find this flaw on the new models of the brand. Do not expect to continue to enjoy the manufacturer’s warranty if you crack your Nintendo. Moreover, hackers themselves warn of the dangers of hacking. According to some, it is very easy for Nintendo to detect if you have the original game or if it is a fraudulent copy. It could, if necessary, ban you.

What Switch exploit can we use for crack Switch?

What does exploit mean? It means a software tool designed to take advantage of a flaw in a computer system, typically for malicious purposes such as installing malware.

List of Switch’s Exploits

Name Compatible firmwares versions Authors
Jamais vu 1.0.0 ReSwitched Team (SciresM, and Motezazer)
PegaSwitch 1.0.0 – 3.0.0 ReSwitched Team (SciresM, and more)
Nereba 1.0.0 – 3.0.0 ReSwitched Team (Stuckpixel)
Déjà Vu / Caffeine 1.0.0 – 4.1.0, partially up to 7.0.1 SciresM
Fusée Gelée All (non iPatched consoles only) Independently discovered by ReSwitched Team (Kate Temkin), fail0verflow (shuffle2).

Jamais vu

Jamais vu exploit a warmboot vulnerability in the TrustZone to allow code execution.

PegaSwitch

PegaSwitch exploit a vulnerability in the Internet navigator WebKit module. PegaSwitch does not allow homebrew launching.

PegaSwitch is triggered by using a computer’s program serving as DNS server.

Nereba

released in April 2019, this exploit is compatible with old firmwares 1.0.0 to 3.0.0 only.

It’s exploiting a warm boot RAM access vulnerability which allows the console to reboot from OFW to any Fusée Gelée payloads using the web applet.

Déjà vu

Déjà vu was an old known but unreleased exploit. It has finally been released in April 2019.

Compatible firmwares from 1.0.0 up to 4.1.0. The vulnerability was only partially fixed in 6.0.0. The vulnerability was kept secret as long as it wasn’t fully fixed in eventuality that it could be useful later to exploit units with patched known exploits.

Nintendo definitely fixed that vulnerability in 2019 with firmware 8.x

Fusée gelée

Fusée gélée exploit a vulnerability in the Recovery mode of the Nintendo Switch, allowing early code execution on the console. The Recovery mode is launched before Horizon OS, the switch’s operating system (the user interface).

Fusée Gelée runs in the Recovery mode step and allows code execution before the Boot loader. It can be used to either:

  • Run standalone applications (key dumpers, display console information, etc.),
  • Replace the bootloader and allows launching of custom OS running on native tegra chipset (Linux, Lakka, etc.)
  • Act as a bootloader and launches Horizon OS, stock (OFW) or with temporary memory patches (CFW),

So in the market of flashcard Switch, such as sx pro, rcmloader, r4s dongle, all the flashcards are based in exploit Fusee gelee, you can see that only the switch impatched could hacker or run cfw to play free games by using this exploit.