2018-11-18 00:14:03 +01:00
---
2022-09-23 10:19:05 +02:00
title: "Installing boot9strap (Fredtool)"
2018-11-18 00:14:03 +01:00
---
{% include toc title="Table of Contents" %}
2022-10-02 00:55:27 +02:00
<details>
<summary><em>Technical Details (optional)</em></summary>
2022-10-12 18:01:24 +02:00
<p>This method of using Seedminer for further exploitation uses your <code>movable.sed</code> file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.</p>
2022-10-02 00:55:27 +02:00
<p>This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed <a href="https://www.3dbrew.org/wiki/3DS_System_Flaws">here</a>.</p>
</details>
2022-10-02 01:36:54 +02:00
{: .notice--info}
2019-02-04 08:37:56 +01:00
2018-11-18 00:14:03 +01:00
### What You Need
2019-02-04 08:37:56 +01:00
* Your `movable.sed` file from completing [Seedminer](seedminer)
2022-05-29 09:06:25 +02:00
* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`)
* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`)
2022-06-06 09:08:34 +02:00
* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file)
2018-11-18 00:14:03 +01:00
2021-08-08 08:40:55 +02:00
#### Section I - CFW Check
2022-10-02 00:55:27 +02:00
As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)).
2021-08-08 08:40:55 +02:00
1. Power off your device
1. Hold the (Select) button
1. Power on your device while still holding the (Select) button
2022-01-31 19:41:09 +01:00
1. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide
2022-10-12 18:01:24 +02:00
1. Power off your device
2021-08-08 08:40:55 +02:00
2022-10-12 18:01:24 +02:00
If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW.
2021-08-08 08:40:55 +02:00
{: .notice--danger}
2022-10-12 18:01:24 +02:00
#### Section II - BannerBomb3
In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section.
2021-08-08 08:40:55 +02:00
2022-10-12 18:01:24 +02:00
1. Reinsert your SD card into your device
1. Power on your device
1. Launch System Settings on your device
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
+ Your device should show the BB3 multihax menu
2022-10-13 18:56:48 +02:00
+ If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu)
2022-10-12 18:01:24 +02:00
1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare"
2022-10-19 02:07:54 +02:00
+ Your device will automatically reboot
1. Power off your device
2022-10-12 18:01:24 +02:00
#### Section III - Prep Work
2018-11-18 00:14:03 +01:00
2022-10-02 00:55:27 +02:00
In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer.
2019-02-04 08:37:56 +01:00
2022-10-12 18:01:24 +02:00
1. Insert your SD card into your computer
2022-09-30 06:44:45 +02:00
1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer
1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters)
2022-10-12 18:01:24 +02:00
1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option
2022-09-30 06:44:45 +02:00
1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option
1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit)
1. Click "Build"
+ Wait a few seconds for the build process to complete
1. In the Build History section on the left, type the Username into the "Filter Builds" field
1. Click on the first search result
+ This result should have the latest timestamp
1. Click the "output_(name).zip" link
2019-07-28 13:40:15 +02:00
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` on your SD card
2022-10-02 00:55:27 +02:00
+ `<ID0>` is the 32-letter folder name that you copied in [Seedminer](seedminer)
2022-10-02 11:59:59 +02:00
+ `<ID1>` is a 32-letter folder inside of the `<ID0>`
2022-10-13 08:48:10 +02:00
1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder
2022-09-30 06:44:45 +02:00
1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder
2022-10-02 11:59:59 +02:00
![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info}
2022-10-02 00:55:27 +02:00
1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
+ The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
1. Copy `boot.nds` (B9STool) to the root of your SD card
1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card
2022-11-15 02:55:44 +01:00
1. Reinsert your SD card into your device
1. Power on your device
2022-10-02 00:55:27 +02:00
2022-10-14 23:53:22 +02:00
![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }})
2022-10-02 00:55:27 +02:00
{: .notice--info}
2022-10-12 18:01:24 +02:00
#### Section IV - Overwriting DS Connection Settings
2022-10-02 00:55:27 +02:00
In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio.
2019-02-04 08:37:56 +01:00
1. Launch System Settings on your device
2022-10-02 00:55:27 +02:00
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
1. Select the "Haxxxxxxxxx!" title
2019-02-04 08:37:56 +01:00
1. Select "Copy", then select "OK"
1. Return to main menu of the System Settings
2022-10-02 12:06:21 +02:00
1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png))
2018-11-18 00:14:03 +01:00
1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio
2019-01-29 14:31:28 +01:00
2022-10-12 18:01:24 +02:00
#### Section V - Flipnote Exploit
2019-02-04 08:37:56 +01:00
If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/).
{: .notice--info}
2019-01-29 14:31:28 +01:00
2022-10-02 00:55:27 +02:00
In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer.
2018-11-18 00:14:03 +01:00
1. Complete the initial setup process for the launched game until you reach the main menu
+ Select the left option whenever prompted during the setup process
1. Using the touch-screen, select the large left box, then select the box with an SD card icon
1. Once the menu loads, select the face icon, then the bottom right icon to continue
2019-07-28 13:40:15 +02:00
1. Press (X) or (UP) on the D-Pad depending on which is shown on the top screen
2019-01-29 14:31:28 +01:00
1. Select the second button along the top with a film-reel icon
2018-11-18 00:14:03 +01:00
1. Scroll right until reel "3/3" is selected
1. Tap the third box with the letter "A" in it
1. Scroll left until reel "1/3" is selected
2018-11-18 09:52:57 +01:00
1. Tap the fourth box with the letter "A" in it
2018-11-18 00:14:03 +01:00
1. If the exploit was successful, your device will have loaded b9sTool
2019-06-22 19:32:41 +02:00
1. Using the D-Pad, move to "Install boot9strap"
2022-11-20 11:58:52 +01:00
+ If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 6 of Section IV
2019-06-22 19:32:41 +02:00
1. Press (A), then press START and SELECT at the same time to begin the process
1. Once completed and the bottom screen says "done.", exit b9sTool, then power off your device
2018-11-18 00:14:03 +01:00
+ You may have to force power off by holding the power button
2022-06-05 09:22:44 +02:00
+ If your device shuts down when you try to power it on, ensure that you have copied `boot.firm` from the Luma3DS `.zip` to the root of your SD card
2022-11-23 05:30:06 +01:00
+ If you see the Luma Configuration screen, power off your device and continue to the next section
2019-02-04 08:37:56 +01:00
2022-11-23 05:30:06 +01:00
#### Section VI - Luma3DS Configuration
2018-11-18 00:14:03 +01:00
2022-11-23 05:30:06 +01:00
1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration
+ If you boot to HOME Menu, [follow this troubleshooting guide](https://github.com/zoogie/b9sTool/blob/master/TROUBLESHOOTING.md)
+ Luma3DS configuration menu are settings for the Luma3DS custom firmware. Many of these settings may be useful for customization or debugging
+ For an explanation of what each setting does, see [this wiki page](https://wiki.hacks.guide/wiki/3DS:Luma3DS/Configuration)
+ For the purposes of this guide, these settings will be left on default settings
1. Press (Start) to save and reboot
2021-08-27 06:42:40 +02:00
2022-06-05 21:51:19 +02:00
At this point, your console will boot to Luma3DS by default.
2022-01-31 19:41:09 +01:00
+ Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware.
2022-06-05 21:51:19 +02:00
+ On the next page, you will install useful homebrew applications to complete your setup.
2018-11-27 17:38:05 +01:00
2022-10-12 18:01:24 +02:00
#### Section VII - Restoring DS Connection Settings
2019-02-10 22:35:35 +01:00
2022-10-12 18:01:24 +02:00
In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV.
2022-10-02 00:55:27 +02:00
2022-10-02 11:59:59 +02:00
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` on your SD card
1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one
2019-02-10 22:35:35 +01:00
1. Reinsert your SD card into your device
1. Power on your device
1. Launch System Settings on your device
2022-10-02 00:55:27 +02:00
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
1. Select the "Nintendo DSi™" title
2019-02-10 22:35:35 +01:00
1. Select "Copy", then select "OK"
2018-11-18 00:14:03 +01:00
___
### Continue to [Finalizing Setup](finalizing-setup)
2018-11-18 09:52:57 +01:00
{: .notice--primary}