hi, i'm trying to understand some things.
the webkit exploit used for pegaswitch works on 3.0 or lower due to the switch using an older, vulnerable webkit. the same vulnerability that gave us jailbreakme for iOS devices.
this was fixed in firmware 3.0.1?
if you have firmware below 2.1.0, you can use puyo puyo jpn game/demo manual link to use the online manual 'browser' (WebApplet). below 2.1.0 there was no captive wifi support.
if you have firmware 2.1.0-3.0.0 you can use the captive wifi authentication 'browser' (WifiWebAuthApplet). or you can also use the puyo puyo manual WebApplet.
so you can set up a proxy and set the switch to use it, and intercept switch network traffic, and reroute to a local web server.
then the hosted web server is able to execute the exploit. how the exploit works is a bit beyond me.
exploit aside, even with latest firmware you are able to use a browser and redirect with all methods: puyo puyo with proxy, wifi dns/wifi with captive wifi.
back to using the webkit exploit, you are able to execute arbitrary javascript on the client (switch)? only javascript? how are people running non js apps like retroarch and so on?
thanks ahead for any insights.