{"id":48252,"date":"2022-09-01T16:03:34","date_gmt":"2022-09-01T16:03:34","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/33796\/Hacker-Discovers-How-To-Remotely-Pwn-A-Game-Boy-Using-Pokemon-Crystal-After-22-Years.html"},"modified":"2022-09-01T16:03:34","modified_gmt":"2022-09-01T16:03:34","slug":"hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years\/","title":{"rendered":"Hacker Discovers How To Remotely Pwn A Game Boy Using Pokemon Crystal After 22 Years"},"content":{"rendered":"<div readability=\"32\">\n<div><picture class=\"responsive-image lazyloader--lazy lazyloader--lowres\"><source media=\"(min-width: 1000px)\" srcset=\"https:\/\/video-images.vice.com\/articles\/630f7223b667730094d73b66\/lede\/1661957432290-game-boy-color.jpeg?crop=1xw:0.8573xh;0xw,0.0947xh&amp;resize=20:*\"><source media=\"(min-width: 700px)\" srcset=\"https:\/\/video-images.vice.com\/articles\/630f7223b667730094d73b66\/lede\/1661957432290-game-boy-color.jpeg?crop=1xw:0.8573xh;0xw,0.0947xh&amp;resize=20:*\"><source media=\"(min-width: 0px)\" srcset=\"https:\/\/video-images.vice.com\/articles\/630f7223b667730094d73b66\/lede\/1661957432290-game-boy-color.jpeg?crop=1xw:0.8573xh;0xw,0.0947xh&amp;resize=20:*\"><img class=\"responsive-image__img\" alt=\"Two boys playing with theGame Boy Color.\"><\/picture><\/div>\n<p>Image:&nbsp;Ghislaine BRAS\/Gamma-Rapho via Getty Images<\/p>\n<\/div>\n<div data-component=\"BodyComponentRenderer\" readability=\"68.332704995287\">\n<div class=\"topic-callout\" readability=\"7.2888888888889\">\n<div class=\"topic-callout__img\"><a href=\"https:\/\/www.vice.com\/en\/topic\/cyber\"><img decoding=\"async\" src=\"https:\/\/video-images.vice.com\/topics\/57a205628cb727dec795a6b1\/callout_logo\/1614199980283-screen-shot-2021-02-24-at-34918-pm.png?resize=240:*\" alt=\"Screen Shot 2021-02-24 at 3\"><\/a><\/div>\n<p>Hacking. Disinformation. Surveillance. CYBER is Motherboard&#8217;s podcast and reporting on the dark underbelly of the internet.<\/p>\n<\/div>\n<p><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"28.104347826087\"><\/p>\n<p>In January of 2001, <a href=\"https:\/\/bulbapedia.bulbagarden.net\/wiki\/Mobile_Game_Boy_Adapter\" target=\"_blank\" rel=\"noopener\"><span>Nintendo released an adapter<\/span><\/a> that allowed Game Boy Color owners to play Pok\u00e9mon online. Now, 22 years later, a hacker has found a way to hack into another player\u2019s Game Boy by exploiting a bug in the game.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"30\"><\/p>\n<p>Xcellerator, an independent security researcher, said he has always been fascinated by \u201cretro tech.\u201d<\/p>\n<p><\/span><span><\/p>\n<div class=\"adph adph--border\">\n<p>Advertisement<\/p>\n<\/div>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"30\"><\/p>\n<p>\u201cThere&#8217;s a feeling that it&#8217;s possible to understand the whole system that you don&#8217;t get with modern computers and devices. The Game Boy has been on my list for a while to dig into,\u201d he told Motherboard in an online chat.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31.077363896848\"><\/p>\n<p>And so he did. <a href=\"https:\/\/xcellerator.github.io\/posts\/tetsuji\/\" target=\"_blank\" rel=\"noopener\"><span>In a blog post<\/span><\/a>, Xcellerator explained how he tore down and studied the code behind the Mobile Adapter GB, the hardware cable that allowed the Game Boy to connect to the internet via a mobile phone, and the Mobile System GB, the service that ran the adapter and allowed players to square up with their characters in <a href=\"https:\/\/bulbapedia.bulbagarden.net\/wiki\/Pok%C3%A9mon_Crystal_Version\" target=\"_blank\" rel=\"noopener\"><span>Pok\u00e9mon Crystal<\/span><\/a>.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"28\"><\/p>\n<p>The adapter worked by sending information back and forth between the Game Boys of the players facing each other in Pok\u00e9mon Crystal.&nbsp;<\/p>\n<p><\/span><\/p>\n<blockquote data-component=\"QuoteBlock\" class=\"abc__quote abc__quote--blockquote\" readability=\"4.9466666666667\">\n<p><em><strong><a href=\"https:\/\/link1.vice.com\/join\/6qz\/signup-motherboard\">Sign up for Motherboard\u2019s daily newsletter<\/a>&nbsp;for a regular dose of our original reporting, plus behind-the-scenes content about&nbsp;our biggest stories.<\/strong><\/em><\/p>\n<\/blockquote>\n<p><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"34\"><\/p>\n<p>At first, Xcellerator tried several approaches that did not end up working, but he still documented them in detail in his blog post. Finally, after a lot of tinkering, he found a vulnerability he could exploit in the Japanese version of Pok\u00e9mon Crystal, which he exploited via the mobile adapter.<\/p>\n<p><\/span><span><\/p>\n<div class=\"adph adph--border\">\n<p>Advertisement<\/p>\n<\/div>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"33\"><\/p>\n<p>\u201cThere&#8217;s a bug in how Nintendo handles the names of your team that lets me trick the Game Boy into treating another part of the message as the next bit of code to execute,\u201d Xcellerator said. \u201cPutting it all together, by triggering this bug and injecting a \u2018program\u2019 of sorts into the messages, the Game Boy on the other end of the phone line is now under my control as it will execute the code I smuggled in.\u201d<\/p>\n<p><\/span><\/p>\n<blockquote data-component=\"QuoteBlock\" class=\"abc__quote abc__quote--pullquote\" readability=\"6\">\n<p>\u201cThe Game Boy on the other end of the phone line is now under my control as it will execute the code I smuggled in.\u201d<\/p>\n<\/blockquote>\n<p><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"35\"><\/p>\n<p>In practice, Xcellerator explained that this means he now has full control of his opponent\u2019s Game Boy, and \u201cthe sky&#8217;s the limit really,\u201d as he put it. In other words, this is a Remote Code Execution exploit, the cybersecurity lingo for a hack that lets the hacker run whatever code they want on the target machine or device.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"28\"><\/p>\n<p>Xcellerator said he could also cheat and beat opponents by making the game jump to the \u201cout of health\u201d mechanism when a Pok\u00e9mon faints.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"33\"><\/p>\n<p>The Mobile Adapter GB adapter also came with a \u201cMobile Trainer GB\u201d cartridge, which was used to configure dial-up username and password, and even provided a browser and email client. While analyzing how the adapter interacts with the game, Xcellerator found out that the email functionality was used to allow players to trade Pok\u00e9mons online.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"28\"><\/p>\n<p>\u201cThe whole concept of sending a Pokemon trade in an email in 2001 is just wild to me,\u201d he said.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"17.352112676056\"><\/p>\n<p><em><strong>Subscribe to our podcast,&nbsp;<a href=\"https:\/\/itunes.apple.com\/gb\/podcast\/cyber\/id1441708044?mt=2\" target=\"_blank\" rel=\"noopener\">CYBER<\/a>. Subscribe to&nbsp;<a href=\"https:\/\/www.twitch.tv\/motherboardtv\" target=\"_blank\" rel=\"noopener\">our new Twitch channel<\/a>.<\/strong><\/em><\/p>\n<p><\/span><\/div>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/33796\/Hacker-Discovers-How-To-Remotely-Pwn-A-Game-Boy-Using-Pokemon-Crystal-After-22-Years.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":48253,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[140],"class_list":["post-48252","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehacker"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hacker Discovers How To Remotely Pwn A Game Boy Using Pokemon Crystal After 22 Years 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacker Discovers How To Remotely Pwn A Game Boy Using Pokemon Crystal After 22 Years 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-01T16:03:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/video-images.vice.com\/topics\/57a205628cb727dec795a6b1\/callout_logo\/1614199980283-screen-shot-2021-02-24-at-34918-pm.png?resize=240:*\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Hacker Discovers How To Remotely Pwn A Game Boy Using Pokemon Crystal After 22 Years\",\"datePublished\":\"2022-09-01T16:03:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years\\\/\"},\"wordCount\":589,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years.jpg\",\"keywords\":[\"headline,hacker\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years\\\/\",\"name\":\"Hacker Discovers How To Remotely Pwn A Game Boy Using Pokemon Crystal After 22 Years 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years.jpg\",\"datePublished\":\"2022-09-01T16:03:34+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years.jpg\",\"width\":240,\"height\":238},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehacker\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hacker Discovers How To Remotely Pwn A Game Boy Using Pokemon Crystal After 22 Years\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacker Discovers How To Remotely Pwn A Game Boy Using Pokemon Crystal After 22 Years 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years\/","og_locale":"en_US","og_type":"article","og_title":"Hacker Discovers How To Remotely Pwn A Game Boy Using Pokemon Crystal After 22 Years 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-09-01T16:03:34+00:00","og_image":[{"url":"https:\/\/video-images.vice.com\/topics\/57a205628cb727dec795a6b1\/callout_logo\/1614199980283-screen-shot-2021-02-24-at-34918-pm.png?resize=240:*","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Hacker Discovers How To Remotely Pwn A Game Boy Using Pokemon Crystal After 22 Years","datePublished":"2022-09-01T16:03:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years\/"},"wordCount":589,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/09\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years.jpg","keywords":["headline,hacker"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years\/","url":"https:\/\/www.threatshub.org\/blog\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years\/","name":"Hacker Discovers How To Remotely Pwn A Game Boy Using Pokemon Crystal After 22 Years 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/09\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years.jpg","datePublished":"2022-09-01T16:03:34+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/09\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/09\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years.jpg","width":240,"height":238},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/hacker-discovers-how-to-remotely-pwn-a-game-boy-using-pokemon-crystal-after-22-years\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehacker\/"},{"@type":"ListItem","position":3,"name":"Hacker Discovers How To Remotely Pwn A Game Boy Using Pokemon Crystal After 22 Years"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48252"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48252\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/48253"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48252"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48252"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}