54 lines
2.1 KiB
Text
54 lines
2.1 KiB
Text
|
---
|
||
|
title: "Dumping Movable (nimhax)"
|
||
|
---
|
||
|
|
||
|
{% include toc title="Tabela de Conteúdo" %}
|
||
|
|
||
|
{% capture technical_info %}
|
||
|
<summary><em>Detalhes técnicos (opcional)</em></summary>
|
||
|
|
||
|
Para instalar boot9strap em seu dispositivo, nós derivamos a chave de criptografia exclusiva do seu dispositivo. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your device.
|
||
|
|
||
|
For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit.
|
||
|
|
||
|
{% endcapture %}
|
||
|
<details>{{ technical_info | markdownify }}</details>
|
||
|
{: .notice--info}
|
||
|
|
||
|
### O que é necessário
|
||
|
|
||
|
* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file)
|
||
|
|
||
|
### Instruções
|
||
|
|
||
|
#### Seção I - Preparação
|
||
|
|
||
|
1. Desligue seu dispositivo
|
||
|
1. Insira o cartão SD no seu computador
|
||
|
1. Copy the `nimhax` folder from the nimhax `.zip` to the `/3ds/` folder on your SD card
|
||
|
1. Reinsira seu cartão SD no seu dispositivo
|
||
|
1. Ligue o seu dispositivo
|
||
|
|
||
|
#### Section II - nimhax
|
||
|
|
||
|
1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser)
|
||
|
1. Launch nimhax from the list of homebrew
|
||
|
1. If the exploit was successful, a `movable.sed` file will appear on the root of your SD card
|
||
|
|
||
|
### Next step: Choose an exploit
|
||
|
|
||
|
#### Bannerbomb3 (recommended)
|
||
|
|
||
|
Once you have your device's encryption key (`movable.sed`), you can use it in conjunction with BannerBomb3, which uses your `movable.sed` file to take advantage of exploits in the System Settings application.
|
||
|
|
||
|
Continue em [BannerBomb3](bannerbomb3)
|
||
|
{: .notice--info}
|
||
|
|
||
|
#### Frogtool
|
||
|
|
||
|
Once you have your device's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \
|
||
|
While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you're unable to use a torrent client.
|
||
|
|
||
|
Continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool))
|
||
|
{: .notice--warning}
|