Smealum has posted quite a detailed write-up on his Ninjhax exploit for the 3DS, here is just a very small snippet from the article:
ninjhax is the name I gave to the solution I released back in November 2014 to allow users to run homebrew software on their 3DS/2DS/New 3DS with the (at the time) latest firmware version. Because the 9.3 firmware update patched a critical exploit used in this solution and Gateway recently made available a warez-ready solution exploiting the other critical vulnerability used by ninjhax, I’ve decided now’s as good a time as any to share the technical details.
Let’s get started. ninjhax works in 4 stages and almost as many exploits : we first get ROP execution, then we get code execution proper, then we get access to new services by launching and taking over another process, and then we get higher privileges by exploiting a system module.
To read the entire awesome article, click the link below to be taken to the source
Visit The Forum To Discuss The Story: Smealum’s Ninjhax Write-Up