Guide_3DS/_pages/en_US/Decrypt9-(MSET).txt

34 lines
1.6 KiB
Text
Raw Normal View History

2016-10-30 01:02:14 +02:00
---
title: "Decrypt9 (MSET)" #
2017-01-16 02:10:42 +01:00
lang: en
permalink: /decrypt9-(mset).html
2016-10-30 01:02:14 +02:00
---
The first thing this guide will do is get you running Decrypt9, which is a multipurpose toolkit that will allow us to install the version 2.1.0, which contains a vulnerability that is needed for further exploitation of the system.
{: .notice}
If you have already hacked your 3DS before and have a EmuNAND based CFW setup, this guide deals exclusively with SysNAND and you should follow all instructions from within or applying to SysNAND. Note that the terms EmuNAND and RedNAND refer to slightly different implementations of [the same concept](http://3dbrew.org/wiki/NAND_Redirection).
{: .notice--info}
#### What you need
* DS flashcard that works on your 3DS version
2017-01-14 07:56:39 +01:00
* The latest release of [Decrypt9WIP](https://github.com/d0k3/Decrypt9WIP/releases/latest/)
2016-10-30 01:02:14 +02:00
#### Instructions
1. Create a folder named `files9` on the root of your SD card if it does not already exist
2016-12-09 06:15:32 +01:00
2. Copy `Launcher.dat` and `Decrypt9WIP.dat` from the Decrypt9WIP `.zip` to the root of your SD card
2016-10-30 01:02:14 +02:00
3. Reinsert your SD card into your 3DS
2016-12-09 06:15:32 +01:00
4. Put `Decrypt9.nds` from the Decrypt9 `.zip` on your DS flashcard
2016-10-30 01:02:14 +02:00
5. Start your DS flashcard from your 3DS
6. Boot `Decrypt9.nds` using your flashcart
7. Select the correct option for your system version
+ 4.X.X -> "4.x Decrypt9WIP"
+ 6.X.X -> "6.x Decrypt9WIP"
2016-10-30 01:02:14 +02:00
8. Reboot the system, then go to System Settings, then "Other Settings", then "Profile", then "Nintendo DS Profile"
9. If the exploit was successful, you will have booted into Decrypt9
Continue to [2.1.0 ctrtransfer](2.1.0-ctrtransfer).
{: .notice--primary}