Changes

22 bytes removed ,  15:57, 12 March 2012
Translate the original article into Chinese.
Line 1: Line 1: −
Exploits are used to execute unofficial code (homebrew) on the Nintendo 3DS. This page is a list of known 3DS-mode exploits.
+
漏洞是在N3DS上用来运行非官方代码(homebrew)的一种方式。这个页面记录已经发现的3DS模式下的漏洞。
   −
==List of 3DS exploits==
+
==N3DS漏洞列表==
There are currently no known 3DS-mode exploits.
+
目前在3DS模式下无可行漏洞。
   −
==Failed attempts==
+
==失败的尝试==
Here are listed all attempts at exploiting 3DS software that have failed so far.
+
这里是之前发现的漏洞以及它们的具体信息。
   −
* Pushmo (3DSWare), QR codes: level name is properly limited to 16 characters, game doesn't crash with a longer name. Only possible crashes are from out-of-bounds values and are not exploitable.
+
* Pushmo(3DSWare软件) QR码:关卡名称很可能限制在16个字符长。名字过长后游戏并不崩溃,仅在超出外部极限值的情况下崩溃,并不能用于运行程序。
* Pyramids (3DSWare), QR codes: no strings. The LZ10 compression can't be exploited either. Only crashes are from out-of-bounds values (like background ID) and are not exploitable.
+
* Pyramids(3DSWare软件) QR码:没有字符串,LZ10的压缩算法也不能用于运行程序。仅在超出外部极限值的情况下崩溃(类似于背景数据),同样不能用于运行程序。
* 3DS browser, 2^32 characters long string: The behavior of this crash is not well understood. The crash may or may not be done on purpose (Webkit contains code that triggers 'crashes' on purpose). Anyway any attempt at exploiting this has failed so far.
+
* 3DS网络浏览器。在输入2^32长度字符串后崩溃,目前仍不了解漏洞表现。目前不清楚是否是人为因素造成的(Webkit浏览器内核的代码可能造成假崩溃)但是无论如何这个漏洞是不能用于运行程序的。
   −
==Current efforts==
+
==正在进行的努力==
There are people working on finding exploits and documenting the 3DS. Here's a list of some current efforts being made to make homebrew on the 3DS possible:
+
目前有很多人在尝试寻找漏洞并对3DS内部的文件进行文档整理。以下是一些可能会让自制程序成功运行的一些尝试:
   −
* Neimod has been working on a RAM dumping setup for a little while now. He's desoldered the 3DS's RAM chip and hooked it and the RAM pinouts on the 3DS's PCB up to a custom RAM dumping setup. Recent photos show that the setup is working quite well, with the 3DS successfully booting up. Pictures of neimod's work can be found on [http://www.flickr.com/photos/neimod/ his Flickr stream].
+
* Neimod已经研究了很长时间如何dump出RAM的数据,他拆解了N3DS的原配RAM芯片,然后把它重新焊在一块PCB板上,焊回3DS进行dump测试。最近的照片表示进程很顺利,可以成功启动3DS了。Neimod的成果相关图片可以在这里查看[http://www.flickr.com/photos/neimod/他的Flickr账户].
   −
==Tips and info==
+
==技巧和信息==
Information on the 3DS's internals is scarce. There is little information on programming the 3DS available, other than basic information found by taking the 3DS apart, leaks and reverse engineering.
+
N3DS内部的信息是比较稀缺的。这里是3DS编程的一些有用信息,除了3DS提供的基本信息之外,也可以利用泄露的信息和逆向工程进行积累。
   −
What this means is if any exploits are found, it would be very difficult to do anything useful with them. Work is currently being done to find out how the 3DS ticks and to aid in finding exploits. See the [[#Current efforts | current efforts]] section of this page for examples and more information.
+
这就是说,就算我们找到了一个漏洞,利用它运行自制程序也是很难的。现在正在进行的工作,主要是要找出3DS的奇怪之处,同时寻找可以利用的漏洞。可以参看本文的[[#正在进行的努力 | 正在进行的努力]] 章节来寻找例子和更多的信息。