<li><ahref="#site-nav"class="screen-reader-shortcut">Skip to primary navigation</a></li>
<li><ahref="#main"class="screen-reader-shortcut">Skip to content</a></li>
<li><ahref="#footer"class="screen-reader-shortcut">Skip to footer</a></li>
</ul>
</nav>
<!--[if lt IE 9]>
<divclass="notice--danger align-center"style="margin: 0;">You are using an <strong>outdated</strong> browser. Please <ahref="https://browsehappy.com/">upgrade your browser</a> to improve your experience.</div>
<li><ahref="#sección-i---preparativos"id="markdown-toc-sección-i---preparativos">Sección I - Preparativos</a></li>
<li><ahref="#section-ii---ssloth"id="markdown-toc-section-ii---ssloth">Section II - SSLoth</a></li>
<li><ahref="#section-iii---launching-safeb9sinstaller"id="markdown-toc-section-iii---launching-safeb9sinstaller">Section III - Launching SafeB9SInstaller</a></li>
<li><ahref="#section-iv---installing-boot9strap"id="markdown-toc-section-iv---installing-boot9strap">Section IV - Installing boot9strap</a></li>
<li><ahref="#section-v---restoring-default-proxy"id="markdown-toc-section-v---restoring-default-proxy">Section V - Restoring default proxy</a></li>
</ul>
</li>
<li><ahref="#continúa-en-finalizar-instalación"id="markdown-toc-continúa-en-finalizar-instalación">Continúa en Finalizar instalación</a></li>
<p>In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version.</p>
<p>A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check.</p>
<p>Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job.</p>
<p>For technical details on the exploits that you will be using on this page, see <ahref="https://github.com/MrNbaYoh/3ds-ssloth">here</a> (SSLoth) and <ahref="https://github.com/TuxSH/universal-otherapp">here</a> (universal-otherapp).</p>
<p>SSLoth allows users on version 11.13.0 and below to bypass the browser version check, allowing the use of new-browserhax or old-browserhax (compatible with versions 11.4.0 through 11.13.0 in all regions), which can then be used in conjunction with universal-otherapp.</p>
<h3id="qué-necesitas">Qué necesitas</h3>
<ul>
<li>The latest release of <ahref="https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip">SafeB9SInstaller</a> (direct download)</li>
<li>The latest release of <ahref="https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip">boot9strap</a> (direct download)</li>
<li>The latest release of <ahref="https://github.com/LumaTeam/Luma3DS/releases/latest">Luma3DS</a> (the Luma3DS <codeclass="language-plaintext highlighter-rouge">.zip</code> file)</li>
<li>The latest release of <ahref="https://github.com/TuxSH/universal-otherapp/releases/latest">universal-otherapp</a> (<codeclass="language-plaintext highlighter-rouge">otherapp.bin</code>)</li>
</ul>
<h4id="sección-i---preparativos">Sección I - Preparativos</h4>
<p>In this section, you will copy the files needed to trigger both browserhax and universal-otherapp.</p>
<li>Copy <codeclass="language-plaintext highlighter-rouge">otherapp.bin</code> to the root of your SD card and rename it to <codeclass="language-plaintext highlighter-rouge">arm11code.bin</code>
<ul>
<li>La raíz de tu tarjeta SD se refiere al primer directorio de la tarjeta, donde puedes ver la carpeta Nintendo 3DS pero no estás dentro de ella</li>
<li>If you do not see the <codeclass="language-plaintext highlighter-rouge">.bin</code> extension, do not add it to the end of the filename</li>
</ul>
</li>
<li>Copia los archivos <codeclass="language-plaintext highlighter-rouge">boot.firm</code> y <codeclass="language-plaintext highlighter-rouge">boot.3dsx</code> desde el <codeclass="language-plaintext highlighter-rouge">.zip</code> de Luma3DS a la raíz de tu tarjeta SD</li>
<li>Crea una carpeta llamada <codeclass="language-plaintext highlighter-rouge">boot9strap</code> en la raíz de tu tarjeta SD</li>
<li>Copia <codeclass="language-plaintext highlighter-rouge">boot9strap.firm</code> y <codeclass="language-plaintext highlighter-rouge">boot9strap.firm.sha</code> desde el <codeclass="language-plaintext highlighter-rouge">.zip</code> de <codeclass="language-plaintext highlighter-rouge">boot9strap</code> a la carpeta <codeclass="language-plaintext highlighter-rouge">/boot9strap/</code> en tu tarjeta SD</li>
<li>Copia <codeclass="language-plaintext highlighter-rouge">SafeB9SInstaller.bin</code> desde el <codeclass="language-plaintext highlighter-rouge">.zip</code> de SafeB9SInstaller a la raíz de tu tarjeta SD</li>
<h4id="section-ii---ssloth">Section II - SSLoth</h4>
<p>In this section, you will change your Internet connection settings to use a proxy network designed to bypass the browser version check, allowing the browser to function without a system update. This will allow you to access the browser exploit webpage in the next section.</p>
<pclass="notice--info">If you haven’t already, make sure you have a working Internet connection set up on your console.</p>
<li>Navigate to <codeclass="language-plaintext highlighter-rouge">Internet Settings</code> -><codeclass="language-plaintext highlighter-rouge">Connection Settings</code></li>
<li>Click on your network connection slot and navigate to <codeclass="language-plaintext highlighter-rouge">Change Settings</code> -><codeclass="language-plaintext highlighter-rouge">Next Page (right arrow)</code> -><codeclass="language-plaintext highlighter-rouge">Proxy Settings</code></li>
<li>Set “Proxy Settings” to “Yes”, then click <codeclass="language-plaintext highlighter-rouge">Detailed Setup</code></li>
<li>Set the Proxy Server to <codeclass="language-plaintext highlighter-rouge">ssloth.nintendohomebrew.com</code>, and the Port to <codeclass="language-plaintext highlighter-rouge">8080</code></li>
<li>Press “Back” twice, then “Close” to go back to the HOME Menu</li>
</ol>
<h4id="section-iii---launching-safeb9sinstaller">Section III - Launching SafeB9SInstaller</h4>
<p>In this section, you will visit the browser exploit webpage, which will use universal-otherapp to launch the boot9strap (custom firmware) installer.</p>
<li>If you are unable to open the camera, open the Internet Browser and manually type the URL instead (<codeclass="language-plaintext highlighter-rouge">https://zoogie.github.io/web/nbhax/</code>)</li>
</ul>
</li>
<li>Tap the QR code button and scan <ahref="http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=https%3A%2F%2Fzoogie.github.io%2Fweb%2Fnbhax&qzone=1&margin=0&size=400x400&ecc=L">this QR code</a>
<li>If a step on the lower screen has red-colored text, and you are not prompted to input a key combo, <ahref="troubleshooting#issues-with-safeb9sinstaller">follow this troubleshooting guide</a></li>
<li>If your console shuts down when you try to power it on, ensure that you have copied <codeclass="language-plaintext highlighter-rouge">boot.firm</code> from the Luma3DS <codeclass="language-plaintext highlighter-rouge">.zip</code> to the root of your SD card</li>
<li>Presiona (Start) para guardar y reiniciar</li>
</ol>
<h4id="section-v---restoring-default-proxy">Section V - Restoring default proxy</h4>
<p>In this section, you will restore the Internet settings back to normal.</p>
<ol>
<li>Launch the System Settings application</li>
<li>Navigate to <codeclass="language-plaintext highlighter-rouge">Internet Settings</code> -><codeclass="language-plaintext highlighter-rouge">Connection Settings</code></li>
<li>Click on your network connection slot and navigate to <codeclass="language-plaintext highlighter-rouge">Change Settings</code> -><codeclass="language-plaintext highlighter-rouge">Next Page (right arrow)</code> -><codeclass="language-plaintext highlighter-rouge">Proxy Settings</code></li>
<li>Set “Proxy Settings” to “No”</li>
<li>Click OK, then click Save</li>
<li>When prompted, click “Test” to perform the connection test