---
title: "BannerBomb3"
{% include toc title="Πίνακας περιεχομένων" %}
{% capture technical_info %}
<summary><em>Technical Details (optional)</em></summary>
To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.
To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.
For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3).
{% endcapture %}
<details>{{ technical_info | markdownify }}</details>
{: .notice--info}
### Compatibility Notes
These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version.
If you have a Taiwanese console (indicated by a T after the system version), follow [this page](bannerbomb3-fredtool-(twn)) instead.
{: .notice--warning}
### What You Need
* Your `movable.sed` file from completing Seedminer
* The latest release of [BannerBomb3](https://github.com/zoogie/Bannerbomb3/releases/download/v3.0/Release_v3.0.zip) (direct download)
#### Section I - Prep Work
{% include_relative include/bb3-prep.txt %}
#### Section II - BannerBomb3
In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and use it to install the menuhax67 exploit.
1. Power on your console
1. Launch System Settings on your console
1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
+ Your console should show the BB3 multihax menu
1. Use the D-Pad to navigate and press the (A) button to select "Install *hax"
+ Your console will automatically reboot
1. Power off your console
___
### Continue to [Installing boot9strap (menuhax)](installing-boot9strap-(menuhax))
{: .notice--primary}