Anonymous user
Pokémon Yellow C109 ID 0x0F arbitrary code execution: Difference between revisions
Pokémon Yellow C109 ID 0x0F arbitrary code execution (view source)
Revision as of 23:41, 24 May 2022
, 1 year ago→Expanded party method
(12 intermediate revisions by the same user not shown) | |||
Line 20:
==Expanded party method==
The exploit can also be done by swapping a Pokémon into Pokémon 91 in the [[expanded
Typically, the swapped Pokémon's lower Defense byte would
*Have the Pokémon to be swapped as Pokémon 2 and Pokémon 91.
*Have it underneath a [[GlitchDex/Y:255|Q (0xFF)]] (in slot 1) to avoid a potential [[zero maximum HP glitch]] or display related freeze.
*Pokémon 2 must have a certain Trainer ID modulo 256 and the uppermost experience byte corresponding with a valid sound bank (02 02
*Pokémon 2 must be a Nidoran♀ (note only the first species byte counts and is the only one taken into consideration; so a Nidoran♀ hybrid from the [[Pokémon merge glitch]] is also applicable, but not a glitch that changed only the second species byte to Nidoran♀).
Under unknown circumstances, Lg - may corrupt the player's coordinates; adding 0x33 to D360 (y coordinate), 0x80 to D361 (x coordinate), 0x33 to D362 (y coordinate block) and 0x80 to D363 (x coordinate block) and typically moving the player to no longer be adjacent to the entrance of Viridian Forest, but the player can work around that by setting the glitched coordinates in advance, such as FC, 90, CE, 80 with the [[expanded inventory]] (the swaps begin at item 34 quantity through to item 36's item; effectively TM01 x 252, [[ItemDex/Y:144|p’é ₽ Enemy TRAINE (0x90)]] x 206 and [[ItemDex/Y:128|₽ ₽ぅ 88 ₽ ぅ 4A (0x80)]] x(any) are to be swapped in those places (care should be taken not to merge the existing TM01 stack)). This example results in 2F, 10, 01, 00 (where the addition exceeds FF the result is modulo 0xFF (256)); the default coordinates after entering the door leading to Viridian Forest.
==Attribution==
*Torchickens/ChickasaurusGL (
*[https://archives.glitchcity.info/forums/board-115/thread-7930/page-1.html jfb1337 - Searches for jp hl in the disassembly projects, which lead to C109 arbitrary code execution as a concept, and its discovery]
==YouTube video==
{{YouTube|5aOVYyr3uTw|ChickasaurusGL}}
{{YouTube|iJbW-wVEpzE|ChickasaurusGL}}
{{stub}}
[[Category:Arbitrary code execution]]
|