Wii U GamePad reverse-engineered

May 15, 2013
protect

A group of developers has reverse-engineered the Nintendo Wii U GamePad, peeling back the layers to discover the methods by which the controller connects with the main Wii U console. Speaking to Eurogamer, developer Pierre Bourdon noted, "The GamePad is actually not a very secure device... The device firmware is stored in an unencrypted Flash, which allowed us to reverse engineer the binary code pretty easily." Since the GamePad communicates via a variation on the 802.11n wireless networking standard, this meant that Bourdon and his team were able to simulate the GamePad on a PC, as shown in the above video. It turns out that the GamePad's controller inputs are sent to the Wii U console 180 times a second. An in-depth look at the logistics can be found in the Eurogamer write-up.

Tags:

No tags.

JikGuard.com, a high-tech security service provider focusing on game protection and anti-cheat, is committed to helping game companies solve the problem of cheats and hacks, and providing deeply integrated encryption protection solutions for games.

Explore Features>>