The Twilight Princess exploit worked by using a modified save file containing a name for Link's horse, which was long enough to cause a buffer overflow pointing to a memory address containing the loader code. Video Source: crediar's clip of bushing from the 24c3 conference (Jan 2008).Īt the annual 24c3 hacker conference, bushing demonstrated an altered version of Lego Star Wars which was used to load some basic code displaying Wii Remote data in real time.Īn exploit found in the save system of The Legend of Zelda: Twilight Princess (Wii version) led to the next step: the release of the Twilight Hack, which could load executables containing custom code compiled against libogc. Once the Wii's private keys were obtained, exploration of the system could truly get into full swing. Team Twiizers is named for the infamous tweezer attack in which a pair of tweezers was used to obtain the Wii's private encryption keys.