Om DSiWare die op het systeem staat te dumpen naar de SD-kaart, maken we gebruik van een fout in het DSiWare Data Management venster van de Settings applicatie.
Om dit te bereiken, gebruiken we de encryptiesleutel van je systeem (movable.sed) om een DSiWare back-up te maken die het systeem exploiteert om de DSi Internet Settings applicatie naar de hoofdmap van je SD-kaart te dumpen.
Once we have a DSiWare backup, we can inject it into the DS Internet Settings application.
This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws).
You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!!
{: .notice--warning}
### Wat je nodig hebt
* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii))
* De nieuwste versie van [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`)
* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download)
* De nieuwste versie van [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (het Luma3DS `.zip` bestand)
In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section.