TASBot in the Netherlands at MCH glitching OoT, with help from dwangoAC, Blastermak, RGME, and BF
How can button presses in Ocarina of Time lead to taking over an entire N64? Watch to find out! Also, see the full run at https://youtu.be/2x_pqyrf9lA - FAQ at https://GetTriforce.Link or ask questions on Discord at https://discord.gg/tasbot in #triforce-percent
This Triforce Percent OoT ACE Showcase was originally shown under the title Ocarina of Time Beta Showcase during the SGDQ 2022 TAS block after helping raise more than $228k for Doctors Without Borders. Triforce% ACE SHowcase was performed using an original, unmodified US 1.0 release cartridge of The Legend of Zelda: Ocarina of Time on a real, original N64. Everything was done live in front of an audience using only button presses on controllers, ultimately achieving ACE (Arbitrary Code Execution) using a Use After Free (aka Stale Reference Manipulation) exploit with TASBot and Savestate alongside Sauraen and dwangoAC.
This video dives into how the game was exploited using material created by IsoFrieze specifically for this presentation which he adapted from his video Retro Game Mechanics Explained - Finally Obtaining the Triforce in Ocarina of Time: Triforce Percent Explained at https://youtu.be/qBK1sq1BQ2Q
Originally presented at May Contain Hackers (the 2022 MCH hacker camp in the Netherlands) thanks to travel and trip support from Bishop Fox, Blastermak and I (dwangoAC) use the explanations adapted for us by IsoFrieze / RGME to talk through all the details of exactly how the Use After Free exploit was performed and the multiple bootstraps needed to take full control of the game and console, all using an original Nintendo 64 console in front of a live audience in a tent (you can hear a metallic ting sound from the wind in the tent during the talk).
Allan Cecil (dwangoAC) was a Security Consultant with Bishop Fox at the time this video was recorded and is the founder and BDFL of the TASBot online community. He is part of the senior staff for TASVideos.org, a website devoted to using emulators to find glitches and techniques to play video games perfectly. He is a published journal author, patent holder, and presenter with talks at DEF CON, GeekPwn, Thotcon, May Contain Hackers, and other hacker conferences. He uses his combined hacking interests for good at charity events like Games Done Quick to entertain viewers with never-before-seen glitches in games, with events he's led raising more than $1.3m for various charities.
TASBot / dwangoAC:
Discord - http://Discord.TAS.Bot
Twitch - https://twitch.tv/dwangoAC
Twitter - https://Twitter.com/MrTASBot
Patreon - https://Patreon.com/dwangoAC
Web - https://TAS.Bot
Intro / outro Music by: JohnGabrielUK
Video Editor: Spooey
Special Thanks:
Bishop Fox - https://BishopFox.com
May Contain Hackers - https://mch2022.org
This video recording is used with permission from May Contain Hackers. All TASVideos.org content used with permission under Creative Commons Attribution 2.0 (https://creativecommons.org/licenses/by/2.0/)
#triforcepercent #botwoot #heretogether #tas #sgdq #tasbot #useafterfree #glitched #exploit
Other Videos By dwangoAC, keeper of TASBot
Other Statistics
The Legend of Zelda: Ocarina of Time Statistics For dwangoAC, keeper of TASBot
dwangoAC, keeper of TASBot currently has 335,429 views spread across 12 videos for The Legend of Zelda: Ocarina of Time. His channel uploaded 7 hours worth of The Legend of Zelda: Ocarina of Time videos, roughly 7.22% of the content that dwangoAC, keeper of TASBot has uploaded to YouTube.