Homebrew Channel

From Wikipedia, the free encyclopedia
Jump to: navigation, search
Homebrew Channel
Homebrew channel logo.png
The startup screen (banner) for the Homebrew Channel as displayed in the Wii Menu.
Developer(s) Team Twiizers
Website http://hbc.hackmii.com/

The Homebrew Channel is a freeware homebrew application loader that was developed to provide a way of easily running unofficial software on the Wii console. Once installed, it appears as a standard Wii Channel on the Wii Menu. When launched, it displays a list of applications found on an SD card or USB drive. The user then can control and select an application to launch by using a Wii Remote or the GameCube controller. It also accepts application uploads via a USB Gecko or TCP/IP (over WiFi or Ethernet), which allows for quick application testing during development. When first launched from the Wii Menu, the Homebrew Channel will check for updates to itself and automatically download them if the user chooses to do so.

Overview[edit]

The Wii is designed to prevent the use of unauthorized software and Nintendo once actively attempted to prevent the use of Homebrew Channel with each of its software updates for the Wii. As a result, installation of the Homebrew Channel required the use of various software exploits and workarounds.[1]

Earliest attempts used a bug present in System Menu 3.2 and below in the signature verification of discs in conjunction with a modchip. In systems using software prior to System Menu 4.0, users could load an exploit in the Wii version of The Legend of Zelda: Twilight Princess, and a specially crafted game save called the Twilight Hack copied from an SD card. As of the System Menu 4.0 update, the Twilight Hack had been entirely disabled.[2]

In response to the System menu 4.0 update, Bannerbomb, which uses an exploit in the Wii System Menu (so therefore only requires a normal sized SD card), was developed. Bannerbomb is a software exploit that exploits a bug in the way the Wii renders channel banners. The original version of Bannerbomb was disabled in System Menu 4.2. A further exploit was later discovered and is exploited in the "SD Card Menu".[3] System Menu 4.3 has disabled the Bannerbomb exploit used to load unauthorized software.

In systems using System Menu 4.2 or 4.3, users could exploit a buffer overflow in Lego Indiana Jones: The Original Adventures and use the "HackMii" installer that is loaded on an SD card. The specially-crafted save that uses this exploit to run code is called "Indiana Pwns".[4] Users could also exploit a flaw in custom stage loading in an NTSC version of Super Smash Bros. Brawl to run an installer such as HackMii. The specially-crafted stage that uses this exploit to run code is called "Smash Stack",[5] and is a particularly reliable way of loading homebrew because the game can load custom stages directly from the SD, completely bypassing the System Menu; Nintendo cannot easily fix bugs on game discs, making this exploit particularly difficult to disable. An exploit for LEGO Star Wars: The Complete Saga called "Return of the Jodi"[6] also exists and can run the "HackMii" Installer. "Letterbomb" can be used like "Bannerbomb" to install hackmii and the Homebrew channel, however uses the wii message board to run the exploit. the wii system's MAC address is needed to run the exploit.

Users who had already installed the Homebrew Channel prior to updating their Wiis to System 4.2 or 4.3 could allow the Homebrew Channel to self update which had already been updated to a version that circumvented the System 4.2 and 4.3 prevention measures. There are unofficial download sites that also provide this workaround.

Later, a hack was released and is called Yu-Gi-OWNED, and it works on any system menu.[7] This exploit is based on the Indiana Pwns exploit, and the Twilight Hack. This exploit runs on PAL Wiis, while a separate exploit called "Yu-Gi-VAH" can be used on NTSC consoles.[8] SDHC are not currently working with this exploit, so a normal SD card is required. On August 9, 2011 Team Twiizers released a new exploit named LetterBomb which exploits a bug used in the Wii's internal messaging system that works with System Menu 4.3.[9] After that, Team Twiizers released another exploit called "Bathaxx". This took advantage of another loading issue in the game LEGO Batman. It works on System Menu 4.3.[10]

"Letterbomb" was released for all region versions of System Menu 4.3 in August 2011. Unlike other exploits, it does not require a trigger disc.[11]

Potential issues[edit]

Nintendo maintains that the installation of the Homebrew Channel voids the warranty on a Wii and that users will no longer be protected by warranty from console defects, system file corruption or physical damages because it is considered unauthorized software. This means that the console cannot be repaired unless the user does so themselves.

Companies such as Nintendo say that the Homebrew Channel allows for piracy, but the homebrew community argues that they are against piracy and they do not release code to play pirate games, but pirates often use exploits from the homebrew community and modify them to play these illegal games. The homebrew community has been known to take extra steps against piracy.[12]

References[edit]

  1. ^ "Homebrew Channel". WiiBrew. Retrieved 2011-02-07. 
  2. ^ "System Menu 4.0 Rundown". 
  3. ^ "Bannerbomb". WiiBrew. 2011-02-03. Retrieved 2011-02-07. 
  4. ^ "Indiana Pwns". WiiBrew. 2010-09-25. Retrieved 2011-02-07. 
  5. ^ "Smash Stack". WiiBrew. Retrieved 2011-02-07. 
  6. ^ "Return of the Jodi". WiiBrew. Retrieved 2011-12-09. 
  7. ^ "Yu-Gi-Owned!". WiiBrew. 2010-10-12. Retrieved 2011-02-07. 
  8. ^ "Yu-Gi-Vah". WiiBrew. 2010-09-20. Retrieved 2011-02-07. 
  9. ^ "LetterBomb". HackMii. 2011-08-09. Retrieved 2011-08-10. 
  10. ^ "Bathaxx". WiiBrew. Retrieved 2011-10-01. 
  11. ^ "Letterbomb". Team Twiizers. 2011-08-09. Retrieved 2012-07-19. 
  12. ^ "The Argon resolution". 

External links[edit]