Guide_3DS/_pages/en_US/installing-boot9strap-(fredtool).txt

119 lines
6.4 KiB
Text
Raw Normal View History

2018-11-18 00:14:03 +01:00
---
2022-09-23 10:19:05 +02:00
title: "Installing boot9strap (Fredtool)"
2018-11-18 00:14:03 +01:00
---
{% include toc title="Table of Contents" %}
### Required Reading
This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, for example from BannerBomb or the DSiWare Dumper tool.
This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws).
2018-11-18 00:14:03 +01:00
### What You Need
* A DSiWare Backup (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3))
* Your `movable.sed` file from completing [Seedminer](seedminer)
* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`)
* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`)
* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file)
2018-11-18 00:14:03 +01:00
#### Section I - CFW Check
1. Power off your device
1. Hold the (Select) button
1. Power on your device while still holding the (Select) button
2022-01-31 19:41:09 +01:00
1. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide
2022-01-30 19:31:57 +01:00
If you see a configuration menu, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW.
{: .notice--danger}
#### Section II - Prep Work
2018-11-18 00:14:03 +01:00
1. Power off your device
2018-11-18 00:14:03 +01:00
1. Insert your SD card into your computer
1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
+ The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
2018-11-18 00:14:03 +01:00
1. Copy `boot.nds` (B9STool) to the root of your SD card
1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card
2022-01-11 11:47:47 +01:00
![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }})
{: .notice--info}
#### Section III - Fredtool
1. Open [Fredtool](https://3ds.nhnarwhal.com/3dstools/fredtool.php) on your computer
1. Select your `movable.sed` file for the "Your movable.sed" field
2019-07-28 13:40:15 +02:00
1. Select your DSiWare Backup (`<8-character-id>.bin`) file for the "Your dsiware.bin" field
2021-09-21 11:07:25 +02:00
1. Select "Verify files"
1. Select "Build and Download"
1. Wait for the process to complete
2022-01-31 19:33:54 +01:00
1. When the process is completed, download your modified DSiWare archive from the site
+ This file contains 2 DSiWare backup files, one clean (unmodified) and one hax (exploited)
2019-07-28 13:40:15 +02:00
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` on your SD card
+ The `<ID0>` will be the same one that you used in [Seedminer](seedminer)
+ The `<ID1>` is a 32 character long folder inside of the `<ID0>`
+ If the `Nintendo DSiWare` folder does not exist, create it inside of the `<ID1>`
2021-09-21 11:07:25 +02:00
1. Copy the `42383841.bin` file from the `output/hax/` folder of the downloaded DSiWare archive (`fredtool.zip`) to the `Nintendo DSiWare` folder
1. Reinsert your SD card into your device
1. Power on your device
1. Launch System Settings on your device
1. Navigate to `Data Management` -> `DSiWare`
1. Under the "SD Card" section, select the "Haxxxxxxxxx!" title
1. Select "Copy", then select "OK"
1. Return to main menu of the System Settings
1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK"
2018-11-18 00:14:03 +01:00
1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio
2019-01-29 14:31:28 +01:00
#### Section IV - Flipnote Exploit
If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/).
{: .notice--info}
2019-01-29 14:31:28 +01:00
2018-11-18 00:14:03 +01:00
1. Complete the initial setup process for the launched game until you reach the main menu
+ Select the left option whenever prompted during the setup process
1. Using the touch-screen, select the large left box, then select the box with an SD card icon
1. Once the menu loads, select the face icon, then the bottom right icon to continue
2019-07-28 13:40:15 +02:00
1. Press (X) or (UP) on the D-Pad depending on which is shown on the top screen
2019-01-29 14:31:28 +01:00
1. Select the second button along the top with a film-reel icon
2018-11-18 00:14:03 +01:00
1. Scroll right until reel "3/3" is selected
1. Tap the third box with the letter "A" in it
1. Scroll left until reel "1/3" is selected
1. Tap the fourth box with the letter "A" in it
2018-11-18 00:14:03 +01:00
1. If the exploit was successful, your device will have loaded b9sTool
1. Using the D-Pad, move to "Install boot9strap"
+ If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to start over from Step 12 of Section III
1. Press (A), then press START and SELECT at the same time to begin the process
1. Once completed and the bottom screen says "done.", exit b9sTool, then power off your device
2018-11-18 00:14:03 +01:00
+ You may have to force power off by holding the power button
+ If your device shuts down when you try to power it on, ensure that you have copied `boot.firm` from the Luma3DS `.zip` to the root of your SD card
+ If you see the Luma Configuration screen, press (Start) to reboot, then continue with the guide
#### Section V - Luma3DS Verification
2018-11-18 00:14:03 +01:00
1. Power off your device
1. Insert your SD card into your computer
1. Verify that a `luma` folder exists and that `config.ini` is inside of it
+ The existence of these folders and files confirms that Luma3DS is installed
+ If you do not see the `luma` folder or `config.ini`, [follow this troubleshooting guide](https://github.com/zoogie/b9sTool/blob/master/TROUBLESHOOTING.md)
At this point, your console will boot to Luma3DS by default.
2022-01-31 19:41:09 +01:00
+ Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware.
+ On the next page, you will install useful homebrew applications to complete your setup.
2018-11-27 17:38:05 +01:00
#### Section VI - Restoring DS Connection Settings
2021-09-21 11:07:25 +02:00
1. Copy the `42383841.bin` file from the `output/clean/` folder of the downloaded DSiWare archive (`fredtool.zip`) to the `Nintendo 3DS/<ID0>/<ID1>/Nintendo DSiWare/` folder on your SD card
+ Replace the existing `42383841.bin` file
1. Reinsert your SD card into your device
1. Power on your device
1. Launch System Settings on your device
1. Navigate to `Data Management` -> `DSiWare`
1. Under the "SD Card" section, select the "Nintendo DSi™" title
1. Select "Copy", then select "OK"
2018-11-18 00:14:03 +01:00
___
### Continue to [Finalizing Setup](finalizing-setup)
{: .notice--primary}