"message": "此網站透過 Cookies 來顯示您手冊的操作進度以及提升此網站的使用經驗。"
}
})});
</script>
<!-- end custom head snippets -->
</head>
<bodyclass="layout--single">
<navclass="skip-links">
<ul>
<li><ahref="#site-nav"class="screen-reader-shortcut">Skip to primary navigation</a></li>
<li><ahref="#main"class="screen-reader-shortcut">Skip to content</a></li>
<li><ahref="#footer"class="screen-reader-shortcut">Skip to footer</a></li>
</ul>
</nav>
<!--[if lt IE 9]>
<divclass="notice--danger align-center"style="margin: 0;">You are using an <strong>outdated</strong> browser. Please <ahref="https://browsehappy.com/">upgrade your browser</a> to improve your experience.</div>
<![endif]-->
<divclass="masthead">
<divclass="masthead__inner-wrap">
<divclass="masthead__menu">
<navid="site-nav"class="greedy-nav">
<!-- <a class="site-title" href="/">
3DS Hacks Guide
</a>
-->
<ulclass="visible-links">
<!-- modified to use multilang, guide-specific -->
<p>In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.</p>
<p>We can do this using an existing exploit, BannerBomb3.</p>
<p>To accomplish this, we use your system’s encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.</p>
<p>Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.</p>
<p>For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: <ahref="https://github.com/zoogie/Bannerbomb3">BannerBomb3</a>, <ahref="https://github.com/zoogie/unSAFE_MODE/">unSAFE_MODE</a>.</p>
<pclass="notice--warning">If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow <ahref="installing-boot9strap-(fredtool)">an alternate branch of Seedminer</a>. For assistance with this matter, join <ahref="https://discord.gg/MWxPgEp">Nintendo Homebrew on Discord</a> and ask, in English, for help.</p>
<h3id="必備項目">必備項目</h3>
<ul>
<li>The latest release of <ahref="https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip">SafeB9SInstaller</a> (direct download)</li>
<li>The latest release of <ahref="https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip">boot9strap</a> (direct download)</li>
<li>The latest release of <ahref="https://github.com/LumaTeam/Luma3DS/releases/latest">Luma3DS</a> (the Luma3DS <codeclass="language-plaintext highlighter-rouge">.zip</code> file)</li>
<p>In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active.</p>
<ol>
<li>將 SD 卡插回主機中</li>
<li>啟動您的主機</li>
<li>於您主機上啟動系統設定 (System Settings)</li>
<li>Navigate to <codeclass="language-plaintext highlighter-rouge">Data Management</code> -><codeclass="language-plaintext highlighter-rouge">DSiWare</code>-><codeclass="language-plaintext highlighter-rouge">SD Card</code> (<ahref="/images/screenshots/bb3/dsiware-management.png">image</a>)
<ul>
<li>Your device should show the BB3 multihax menu</li>
<li>If the BB3 multihax menu says “cfw installed already”, you already have custom firmware and should continue from <ahref="checking-for-cfw">here</a></li>
</ul>
</li>
<li>Use the D-Pad to navigate and press the (A) button to select “Install unSAFE_MODE”
<li>Navigate to <codeclass="language-plaintext highlighter-rouge">Internet Settings</code> -><codeclass="language-plaintext highlighter-rouge">Connection Settings</code></li>
<li>Ensure that all three connections are named “Haaaaaaaxxxxxxxxx…”
<ul>
<li>Do NOT change these settings!</li>
<li>If all three connections are NOT all named “Haaaaaaaxxxxxxxxx…”, STOP! Something went wrong in this section and MUST be fixed before you can continue</li>
<p>In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer.</p>
<ol>
<li>With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device
<ul>
<li>Keep holding the buttons until the device boots into Safe Mode (a “system update” menu)</li>
</ul>
</li>
<li>Press “OK” to accept the update
<ul>
<li>There is no update. This is part of the exploit</li>
</ul>
</li>
<li>Press “I accept” to accept the terms and conditions</li>
<li>The update will eventually fail, with the error code <codeclass="language-plaintext highlighter-rouge">003-1099</code>. This is intended behaviour</li>
<li>When asked “Would you like to configure Internet settings?”, select “Yes”</li>
<li>On the following menu, navigate to <codeclass="language-plaintext highlighter-rouge">Connection 1</code> -><codeclass="language-plaintext highlighter-rouge">Change Settings</code> -><codeclass="language-plaintext highlighter-rouge">Next Page (right arrow)</code> -><codeclass="language-plaintext highlighter-rouge">Proxy Settings</code> -><codeclass="language-plaintext highlighter-rouge">Detailed Setup</code> (<ahref="/images/screenshots/usm/safemode_highlighted.png">image</a>)</li>
<li>If the exploit was successful, your device will have booted into SafeB9SInstaller
<ul>
<li>If your device instead freezes on a white screen, hold the POWER button until it turns off, then retry this section</li>
<li>If your device instead freezes on a red screen, you are missing <codeclass="language-plaintext highlighter-rouge">usm.bin</code> from the root of your SD card</li>
<li>If a step on the lower screen has red-colored text, and you are not prompted to input a key combo, <ahref="troubleshooting#issues-with-safeb9sinstaller">follow this troubleshooting guide</a></li>
<li>Once it is complete, press (A) to reboot your device</li>
<li>Your device should have booted into the Luma3DS configuration menu
<ul>
<li>Luma3DS configuration menu are settings for the Luma3DS custom firmware. Many of these settings may be useful for customization or debugging</li>
<li>For the purpose of this guide, <strong>leave these options on the default settings</strong> (do not check or uncheck anything)</li>
<li>If your device shuts down when you try to power it on, ensure that you have copied <codeclass="language-plaintext highlighter-rouge">boot.firm</code> from the Luma3DS <codeclass="language-plaintext highlighter-rouge">.zip</code> to the root of your SD card</li>
</ul>
</li>
<li>按『Start』鍵以存檔並重新啟動系統</li>
</ol>
<p>At this point, your console will boot to Luma3DS by default.</p>
<ul>
<li>Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware.</li>
<li>On the next page, you will install useful homebrew applications to complete your setup.</li>
</ul>
<h4id="第五節--還原-wifi-設定檔">第五節 — 還原 WiFi 設定檔</h4>
<p>In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II.</p>
<ol>
<li>於您主機上啟動系統設定 (System Settings)</li>
<li>Navigate to <codeclass="language-plaintext highlighter-rouge">Data Management</code> -><codeclass="language-plaintext highlighter-rouge">DSiWare</code>-><codeclass="language-plaintext highlighter-rouge">SD Card</code> (<ahref="/images/screenshots/bb3/dsiware-management.png">image</a>)</li>
<li>Use the D-Pad to navigate and press the (A) button to select “Uninstall unSAFE_MODE”
<li>Delete <codeclass="language-plaintext highlighter-rouge">F00D43D5.bin</code> from your Nintendo DSiWare folder and from your computer. 這個檔案之後不再需要了</li>