{"id":13362,"date":"2017-06-22T19:36:00","date_gmt":"2017-06-22T17:36:00","guid":{"rendered":"https:\/\/www.customprotocol.com\/?p=13362"},"modified":"2017-06-22T19:36:00","modified_gmt":"2017-06-22T17:36:00","slug":"switch-team-reswitched-annonce-connaitre-vulnerabilites-dernier-firmware-3-0","status":"publish","type":"post","link":"https:\/\/www.customprotocol.com\/switch-team-reswitched-annonce-connaitre-vulnerabilites-dernier-firmware-3-0\/","title":{"rendered":"[Switch] La Team ReSwitched annonce conna\u00eetre des vuln\u00e9rabilit\u00e9s sur le dernier firmware 3.0"},"content":{"rendered":"<p style=\"text-align: justify;\">Il y a quelques jours, <em>Nintendo<\/em> mettait en ligne une nouvelle version 3.0.0 du <em>firmware<\/em> de son b\u00e9b\u00e9, la Switch, <a href=\"https:\/\/www.gamergen.com\/actualites\/nintendo-switch-nintendo-mise-jour-changelog-firmware-3-0-0-283650-1\" target=\"_blank\" rel=\"noopener noreferrer\">ajoutant pl\u00e9thore de nouvelles fonctionnalit\u00e9s<\/a>. Pourtant, la <em>Team ReSwitched<\/em>, \u00e0 l'origine du <a href=\"https:\/\/www.customprotocol.com\/underground\/switch-pegaswitch-toolkit-exploit-webkit-developpeurs\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>PegaSwitch<\/em><\/a>, vient d'annoncer qu'elle aurait trouv\u00e9 des\u00a0<strong>vuln\u00e9rabilit\u00e9s<\/strong> dans des <em>bugs<\/em> rendant leur outil de piratage (appel\u00e9\u00a0<strong>PegaSwitch<\/strong>) compatible avec le dernier <em>firmware<\/em>...<\/p>\n<figure id=\"attachment_13363\" aria-describedby=\"caption-attachment-13363\" style=\"width: 764px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.customprotocol.com\/medias\/2017\/06\/hack-switch-vignette-simple.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-13363\" src=\"https:\/\/www.customprotocol.com\/medias\/2017\/06\/hack-switch-vignette-simple-764x430.png\" alt=\"\" width=\"764\" height=\"430\" \/><\/a><figcaption id=\"caption-attachment-13363\" class=\"wp-caption-text\"><b>Hack<\/b> Nintendo Switch<\/figcaption><\/figure>\n<hr \/>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.customprotocol.com\/underground\/switch-pegaswitch-toolkit-exploit-webkit-developpeurs\/\" target=\"_blank\" rel=\"noopener noreferrer\">Pour rappel<\/a>&nbsp;:<\/p>\n<p style=\"text-align: justify;\"><div align=\"justify\" class=\"signoff\"><i class=\"fa fa-fw fa-info-circle\"><\/i><strong>PegaSwitch<\/strong> est un <em>toolkit <\/em>(bo\u00eete \u00e0 outils en fran\u00e7ais) destin\u00e9 aux d\u00e9veloppeurs pirates. Il permet d\u2019ores et d\u00e9j\u00e0 de lire\/\u00e9crire dans la m\u00e9moire, appeler des fonctions natives et explorer les fonctionnalit\u00e9s de la Switch \u00e0 partir du processus <em>WebKit<\/em>. Il ne permet pas encore de coder des <em>homebrews<\/em>, mais a surtout \u00e9t\u00e9 con\u00e7u pour permettre \u00e0 d\u2019autres <em>hackers<\/em> de travailler ensemble vers cet objectif.<\/p>\n<p style=\"text-align: justify;\"><strong>PegaSwitch<\/strong> fonctionne toujours sur toutes les Switch dont le firmware est compris entre 1.0 et 2.0 (voir notre <a href=\"https:\/\/www.customprotocol.com\/underground\/switch-pegaswitch-toolkit-exploit-webkit-developpeurs\/\" target=\"_blank\" rel=\"noopener noreferrer\">mini-tutoriel d'utilisation<\/a>), mais a \u00e9t\u00e9 patch\u00e9 \u00e0 partir de la version 2.1.0 du <em>firmware<\/em>.<\/div>\n<p style=\"text-align: justify;\">Gr\u00e2ce au travail acharn\u00e9 des membres de la <em>Team ReSwitched<\/em>, qui avaient annonc\u00e9 avoir trouv\u00e9 un moyen de faire marcher<strong> PegaSwitch<\/strong> sur le <em>firmware<\/em> 2.3 (le dernier en date \u00e0 l'\u00e9poque de l'annonce), le <em>toolkit<\/em> serait fonctionnel sur le <strong>nouveau firmware 3.0<\/strong> de la Switch, bien que ce dernier corrige certaines failles tout de m\u00eame. L'\u00e9quipe aurait simplement r\u00e9-utilis\u00e9 l'<em>exploit<\/em> secret qu'elle avait trouv\u00e9 sur la version 2.3, ce qui signifie donc que <em>Nintendo<\/em> n'aurait pas encore r\u00e9ussi \u00e0 trouver les <strong>vuln\u00e9rabilit\u00e9s<\/strong> exploit\u00e9es par la <em>Team<\/em>...<\/p>\n<div align=\"center\">\n<blockquote class=\"twitter-tweet\" data-lang=\"fr\">\n<p dir=\"ltr\" lang=\"en\">Our bugs for Switch 2.0-2.3 PegaSwitch work on 3.0. Feel free to update; Homebrew will be safe. (When the time comes)&nbsp;\ud83d\ude42 <a href=\"https:\/\/twitter.com\/hashtag\/reswitched?src=hash\">#reswitched<\/a><\/p>\n<p>\u2014 Cody Brocious (@daeken) <a href=\"https:\/\/twitter.com\/daeken\/status\/876965449837293570\">20 juin 2017<\/a><\/p>\n<\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<\/div>\n<p style=\"text-align: justify;\"><em>Daeken<\/em>, l'un des membres de l'\u00e9quipe de pirates, a annonc\u00e9 sur <em>Twitter<\/em> que tous les possesseurs de Switch pouvaient faire la mise \u00e0 jour sans crainte, que les <em>homebrews<\/em> \u00e9taient en \u00ab&nbsp;s\u00e9curit\u00e9&nbsp;\u00bb et qu'il ne restait plus qu'\u00e0 attendre jusqu'au \u00ab&nbsp;moment venu&nbsp;\u00bb. Aucune indication de temps pr\u00e9cise pour l'instant, donc (dites-vous qu'il a fallu attendre 4 ans avant qu'un \u00ab&nbsp;vrai&nbsp;\u00bb hack arrive sur PS Vita...&nbsp;:P). Toutefois, si <em>Nintendo<\/em> arrivait \u00e0 <em>patcher<\/em> les <strong>vuln\u00e9rabilit\u00e9s<\/strong> utilis\u00e9es, la <em>Team ReSwitched<\/em> a promis qu'elle partagerait publiquement leur <em>exploit<\/em>.<\/p>\n<p style=\"text-align: justify;\">Bref, le traditionnel <em>wait &amp; see<\/em> est de mise l\u00e0 aussi... Ah et un conseil&nbsp;: si vous \u00eates vraiment plus int\u00e9ress\u00e9 par le <em>hack<\/em> ou la customisation que par les jeux ou le multijoueur en ligne, on vous conseille de garder le <em>firmware<\/em> le plus bas possible.&#8239;;)<\/p>\n<p style=\"text-align: justify;\">Sur ce... <em>Wait &amp; See<\/em>&#8239;!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le toolkit PegaSwitch fonctionne toujours sur le dernier firmware 3.0.0 de la Switch, via un exploit gard\u00e9 secret par la Team ReSwitched.<\/p>\n","protected":false},"author":481,"featured_media":13363,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,29,71,30],"tags":[2851],"plateformes":[983],"genres":[872,873,2949,2838,2854,2855,2442,2951],"developpeurs":[2852],"editeurs":[2853],"types":[978,864],"sources":[2950],"class_list":["post-13362","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-news-underground","category-outils","category-underground","tag-pegaswitch","plateformes-switch","genres-exploits","genres-exploits-kernel","genres-exploits-kernel-switch","genres-exploits-switch","genres-toolkits","genres-toolkits-switch","genres-vulnerabilites","genres-vulnerabilites-switch","developpeurs-team-reswitched","editeurs-team-reswitched","types-hack-switch","types-news","sources-httpwololo-net20170620nintendo-switch-hack-reswitched-team-say-working-exploits-latest-3-0-firmware"],"yoast_head":"\n<title>[Switch] La Team ReSwitched a des exploits fonctionnels sur 3.0<\/title>\n<meta name=\"description\" content=\"Le toolkit PegaSwitch fonctionne toujours sur le dernier firmware 3.0.0 de la Switch, via un exploit gard\u00e9 secret par la Team ReSwitched.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.customprotocol.com\/switch-team-reswitched-annonce-connaitre-vulnerabilites-dernier-firmware-3-0\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"[Switch] La Team ReSwitched a des exploits fonctionnels sur 3.0\" \/>\n<meta property=\"og:description\" content=\"Le toolkit PegaSwitch fonctionne toujours sur le dernier firmware 3.0.0 de la Switch, via un exploit gard\u00e9 secret par la Team ReSwitched.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.customprotocol.com\/switch-team-reswitched-annonce-connaitre-vulnerabilites-dernier-firmware-3-0\/\" \/>\n<meta property=\"og:site_name\" content=\"Custom Protocol\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-22T17:36:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.customprotocol.com\/medias\/2017\/06\/hack-switch-vignette-simple.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Wirus\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/HackerGen\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Wirus\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimation du temps de lecture\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.customprotocol.com\/switch-team-reswitched-annonce-connaitre-vulnerabilites-dernier-firmware-3-0\/\",\"url\":\"https:\/\/www.customprotocol.com\/switch-team-reswitched-annonce-connaitre-vulnerabilites-dernier-firmware-3-0\/\",\"name\":\"[Switch] La Team ReSwitched a des exploits fonctionnels sur 3.0\",\"isPartOf\":{\"@id\":\"https:\/\/www.customprotocol.com\/#website\"},\"datePublished\":\"2017-06-22T17:36:00+00:00\",\"dateModified\":\"2017-06-22T17:36:00+00:00\",\"author\":{\"@id\":\"https:\/\/www.customprotocol.com\/#\/schema\/person\/e2f5c3e6cbb948e59756b98bed512cf9\"},\"description\":\"Le toolkit PegaSwitch fonctionne toujours sur le dernier firmware 3.0.0 de la Switch, via un exploit gard\u00e9 secret par la Team ReSwitched.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.customprotocol.com\/switch-team-reswitched-annonce-connaitre-vulnerabilites-dernier-firmware-3-0\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.customprotocol.com\/switch-team-reswitched-annonce-connaitre-vulnerabilites-dernier-firmware-3-0\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.customprotocol.com\/switch-team-reswitched-annonce-connaitre-vulnerabilites-dernier-firmware-3-0\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.customprotocol.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"[Switch] La Team ReSwitched annonce conna\u00eetre des vuln\u00e9rabilit\u00e9s sur le dernier firmware 3.0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.customprotocol.com\/#website\",\"url\":\"https:\/\/www.customprotocol.com\/\",\"name\":\"Custom Protocol\",\"description\":\"Site d&#039;hack-tualit\u00e9 et de tutoriels sur la customisation de consoles et appareils (homebrews, plugins, \u00e9mulation...)\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.customprotocol.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.customprotocol.com\/#\/schema\/person\/e2f5c3e6cbb948e59756b98bed512cf9\",\"name\":\"Wirus\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\/\/www.customprotocol.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ff65bb0fba0be9639885c04a3ed7d8a895a98260fc23f283286dc9cf20bf3871?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ff65bb0fba0be9639885c04a3ed7d8a895a98260fc23f283286dc9cf20bf3871?s=96&d=mm&r=g\",\"caption\":\"Wirus\"},\"description\":\"Avez-vous d\u00e9j\u00e0 vu un gentil virus ? Maintenant, oui.\",\"sameAs\":[\"https:\/\/hackergen.com\",\"https:\/\/twitter.com\/https:\/\/twitter.com\/HackerGen\",\"https:\/\/www.youtube.com\/user\/Wirusalization\"],\"url\":\"https:\/\/www.customprotocol.com\/auteur\/wirus\/\"}]}<\/script>\n","yoast_head_json":{"title":"[Switch] La Team ReSwitched a des exploits fonctionnels sur 3.0","description":"Le toolkit PegaSwitch fonctionne toujours sur le dernier firmware 3.0.0 de la Switch, via un exploit gard\u00e9 secret par la Team ReSwitched.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.customprotocol.com\/switch-team-reswitched-annonce-connaitre-vulnerabilites-dernier-firmware-3-0\/","og_locale":"fr_CA","og_type":"article","og_title":"[Switch] La Team ReSwitched a des exploits fonctionnels sur 3.0","og_description":"Le toolkit PegaSwitch fonctionne toujours sur le dernier firmware 3.0.0 de la Switch, via un exploit gard\u00e9 secret par la Team ReSwitched.","og_url":"https:\/\/www.customprotocol.com\/switch-team-reswitched-annonce-connaitre-vulnerabilites-dernier-firmware-3-0\/","og_site_name":"Custom Protocol","article_published_time":"2017-06-22T17:36:00+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.customprotocol.com\/medias\/2017\/06\/hack-switch-vignette-simple.png","type":"image\/png"}],"author":"Wirus","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/HackerGen","twitter_misc":{"\u00c9crit par":"Wirus","Estimation du temps de lecture":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.customprotocol.com\/switch-team-reswitched-annonce-connaitre-vulnerabilites-dernier-firmware-3-0\/","url":"https:\/\/www.customprotocol.com\/switch-team-reswitched-annonce-connaitre-vulnerabilites-dernier-firmware-3-0\/","name":"[Switch] La Team ReSwitched a des exploits fonctionnels sur 3.0","isPartOf":{"@id":"https:\/\/www.customprotocol.com\/#website"},"datePublished":"2017-06-22T17:36:00+00:00","dateModified":"2017-06-22T17:36:00+00:00","author":{"@id":"https:\/\/www.customprotocol.com\/#\/schema\/person\/e2f5c3e6cbb948e59756b98bed512cf9"},"description":"Le toolkit PegaSwitch fonctionne toujours sur le dernier firmware 3.0.0 de la Switch, via un exploit gard\u00e9 secret par la Team ReSwitched.","breadcrumb":{"@id":"https:\/\/www.customprotocol.com\/switch-team-reswitched-annonce-connaitre-vulnerabilites-dernier-firmware-3-0\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.customprotocol.com\/switch-team-reswitched-annonce-connaitre-vulnerabilites-dernier-firmware-3-0\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.customprotocol.com\/switch-team-reswitched-annonce-connaitre-vulnerabilites-dernier-firmware-3-0\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.customprotocol.com\/"},{"@type":"ListItem","position":2,"name":"[Switch] La Team ReSwitched annonce conna\u00eetre des vuln\u00e9rabilit\u00e9s sur le dernier firmware 3.0"}]},{"@type":"WebSite","@id":"https:\/\/www.customprotocol.com\/#website","url":"https:\/\/www.customprotocol.com\/","name":"Custom Protocol","description":"Site d&#039;hack-tualit\u00e9 et de tutoriels sur la customisation de consoles et appareils (homebrews, plugins, \u00e9mulation...)","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.customprotocol.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-CA"},{"@type":"Person","@id":"https:\/\/www.customprotocol.com\/#\/schema\/person\/e2f5c3e6cbb948e59756b98bed512cf9","name":"Wirus","image":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.customprotocol.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ff65bb0fba0be9639885c04a3ed7d8a895a98260fc23f283286dc9cf20bf3871?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ff65bb0fba0be9639885c04a3ed7d8a895a98260fc23f283286dc9cf20bf3871?s=96&d=mm&r=g","caption":"Wirus"},"description":"Avez-vous d\u00e9j\u00e0 vu un gentil virus ? Maintenant, oui.","sameAs":["https:\/\/hackergen.com","https:\/\/twitter.com\/https:\/\/twitter.com\/HackerGen","https:\/\/www.youtube.com\/user\/Wirusalization"],"url":"https:\/\/www.customprotocol.com\/auteur\/wirus\/"}]}},"_links":{"self":[{"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/posts\/13362","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/users\/481"}],"replies":[{"embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/comments?post=13362"}],"version-history":[{"count":0,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/posts\/13362\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/media\/13363"}],"wp:attachment":[{"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/media?parent=13362"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/categories?post=13362"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/tags?post=13362"},{"taxonomy":"plateformes","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/plateformes?post=13362"},{"taxonomy":"genres","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/genres?post=13362"},{"taxonomy":"developpeurs","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/developpeurs?post=13362"},{"taxonomy":"editeurs","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/editeurs?post=13362"},{"taxonomy":"types","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/types?post=13362"},{"taxonomy":"sources","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/sources?post=13362"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}