This is the documentation for the old versions of wup.ovh.
- Hosted access gate: http://wup.ovh/
- Archived source repo
- New version and general documentation
JsTypeHax
This is based on the JumpCallPop JsTypeHax (aka WiiUTest) exploit. Unfortunately, JumpCallPop's GitHub account was removed, leaving our archived source repo.
The latest changes to upstream are available in the archived source repo under the
fast branch. While these changes do make the exploit much faster, they
also make it far less reliable. The most reliable version of the exploit
available is on the stable branch, which is also the version actively
hosted on my servers.
A new version of the exploit was later made available on GitHub. This version is available as an experimental option on wup.ovh.
SSI
The stable, cleanup, and fast branches in the archived source repo have changes to make them
compatible with SSI, or Server Side Includes, an Nginx feature that
allows the server to generate certain parts of pages without requiring
PHP or something similar. A version of stable with the SSI
requirements removed is available under the nossi branch.
Cleanup
The cleanup branch is available to make things easier to understand. The original JsTypeHax repo came with a bunch of stuff that, as far as I can tell, isn't actually useful for the exploit. The cleanup branch is the same as stable but has none of the extra stuff. The cleanup branch is largely untested, so if I nuked something that actually is important... Uh... Oops.
Self-hosting
Self-hosting the exploit can help improve the reliability if you have a
slow internet connection. You can checkout the nossi branch of the archived source
repo and host it with any old webserver, or you can checkout the
stable branch and host it with Nginx, assuming SSI is enabled (simply
put ssi on; in the config file). More detailed instructions for
self-hosting may be posted soon.
And Finally, Credits
Once again, all credit for the exploit itself goes to JumpCallPop and everyone else who helped him get this working. We just run this gateway.