"message": "This website uses cookies to display the current guide progress on the sidebar and otherwise enhance the site."
}
})});
</script>
<!-- end custom head snippets -->
</head>
<bodyclass="layout--single">
<navclass="skip-links">
<ul>
<li><ahref="#site-nav"class="screen-reader-shortcut">Skip to primary navigation</a></li>
<li><ahref="#main"class="screen-reader-shortcut">Skip to content</a></li>
<li><ahref="#footer"class="screen-reader-shortcut">Skip to footer</a></li>
</ul>
</nav>
<!--[if lt IE 9]>
<divclass="notice--danger align-center"style="margin: 0;">You are using an <strong>outdated</strong> browser. Please <ahref="https://browsehappy.com/">upgrade your browser</a> to improve your experience.</div>
<![endif]-->
<divclass="masthead">
<divclass="masthead__inner-wrap">
<divclass="masthead__menu">
<navid="site-nav"class="greedy-nav">
<!-- <a class="site-title" href="/">
3DS Hacks Guide
</a>
-->
<ulclass="visible-links">
<!-- modified to use multilang, guide-specific -->
<li><ahref="#what-you-need"id="markdown-toc-what-you-need">What You Need</a><ul>
<li><ahref="#section-i---prep-work"id="markdown-toc-section-i---prep-work">Section I - Prep Work</a></li>
<li><ahref="#section-ii---ssloth"id="markdown-toc-section-ii---ssloth">Section II - SSLoth</a></li>
<li><ahref="#section-iii---launching-safeb9sinstaller"id="markdown-toc-section-iii---launching-safeb9sinstaller">Section III - Launching SafeB9SInstaller</a></li>
<li><ahref="#section-iv---installing-boot9strap"id="markdown-toc-section-iv---installing-boot9strap">Section IV - Installing boot9strap</a></li>
<li><ahref="#section-v---restoring-default-proxy"id="markdown-toc-section-v---restoring-default-proxy">Section V - Restoring default proxy</a></li>
</ul>
</li>
<li><ahref="#continue-to-finalizing-setup"id="markdown-toc-continue-to-finalizing-setup">Continue to Finalizing Setup</a></li>
<p>In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version.</p>
<p>A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check.</p>
<p>Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job.</p>
<p>For technical details on the exploits that you will be using on this page, see <ahref="https://github.com/MrNbaYoh/3ds-ssloth">here</a> (SSLoth) and <ahref="https://github.com/TuxSH/universal-otherapp">here</a> (universal-otherapp).</p>
<p>SSLoth allows users on version 11.13.0 and below to bypass the browser version check, allowing the use of new-browserhax or old-browserhax (compatible with versions 11.4.0 through 11.13.0 in all regions), which can then be used in conjunction with universal-otherapp.</p>
<pclass="notice--warning">If you have updated your device to your current version using a cartridge, your Internet Browser will be inaccessible. If this is the case, you cannot follow this method. Stay on your current firmware and ask <ahref="https://discord.gg/MWxPgEp">Nintendo Homebrew on Discord</a> for help.</p>
<li>The latest release of <ahref="https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip">SafeB9SInstaller</a> (direct download)</li>
<li>The latest release of <ahref="https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip">boot9strap</a> (direct download)</li>
<li>The latest release of <ahref="https://github.com/LumaTeam/Luma3DS/releases/latest">Luma3DS</a> (the Luma3DS <codeclass="language-plaintext highlighter-rouge">.zip</code> file)</li>
<li>The latest release of <ahref="https://github.com/TuxSH/universal-otherapp/releases/latest">universal-otherapp</a> (<codeclass="language-plaintext highlighter-rouge">otherapp.bin</code>)</li>
</ul>
<h4id="section-i---prep-work">Section I - Prep Work</h4>
<p>In this section, you will copy the files needed to trigger both browserhax and universal-otherapp.</p>
<ol>
<li>Power off your device</li>
<li>Insert your SD card into your computer</li>
<li>Copy <codeclass="language-plaintext highlighter-rouge">otherapp.bin</code> to the root of your SD card and rename it to <codeclass="language-plaintext highlighter-rouge">arm11code.bin</code>
<ul>
<li>The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it</li>
<li>If you do not see the <codeclass="language-plaintext highlighter-rouge">.bin</code> extension, do not add it to the end of the filename</li>
</ul>
</li>
<li>Copy <codeclass="language-plaintext highlighter-rouge">boot.firm</code> and <codeclass="language-plaintext highlighter-rouge">boot.3dsx</code> from the Luma3DS <codeclass="language-plaintext highlighter-rouge">.zip</code> to the root of your SD card</li>
<li>Create a folder named <codeclass="language-plaintext highlighter-rouge">boot9strap</code> on the root of your SD card</li>
<li>Copy <codeclass="language-plaintext highlighter-rouge">boot9strap.firm</code> and <codeclass="language-plaintext highlighter-rouge">boot9strap.firm.sha</code> from the boot9strap <codeclass="language-plaintext highlighter-rouge">.zip</code> to the <codeclass="language-plaintext highlighter-rouge">/boot9strap/</code> folder on your SD card</li>
<li>Copy <codeclass="language-plaintext highlighter-rouge">SafeB9SInstaller.bin</code> from the SafeB9SInstaller <codeclass="language-plaintext highlighter-rouge">.zip</code> to the root of your SD card</li>
<li>Reinsert your SD card into your device</li>
<li>Power on your device</li>
</ol>
<h4id="section-ii---ssloth">Section II - SSLoth</h4>
<p>In this section, you will change your Internet connection settings to use a proxy network designed to bypass the browser version check, allowing the browser to function without a system update. This will allow you to access the browser exploit webpage in the next section.</p>
<pclass="notice--info">If you haven’t already, make sure you have a working Internet connection set up on your console.</p>
<ol>
<li>Launch the System Settings application</li>
<li>Navigate to <codeclass="language-plaintext highlighter-rouge">Internet Settings</code> -><codeclass="language-plaintext highlighter-rouge">Connection Settings</code></li>
<li>Click on your network connection slot and navigate to <codeclass="language-plaintext highlighter-rouge">Change Settings</code> -><codeclass="language-plaintext highlighter-rouge">Next Page (right arrow)</code> -><codeclass="language-plaintext highlighter-rouge">Proxy Settings</code></li>
<li>Set “Proxy Settings” to “Yes”, then click <codeclass="language-plaintext highlighter-rouge">Detailed Setup</code></li>
<li>Set the Proxy Server to <codeclass="language-plaintext highlighter-rouge">192.9.234.11</code>, and the Port to <codeclass="language-plaintext highlighter-rouge">8080</code></li>
<li>Click OK, then click Save</li>
<li>When prompted, click “Test” to perform the connection test
<li>Press “Back” twice, then “Close” to go back to the HOME Menu</li>
</ol>
<h4id="section-iii---launching-safeb9sinstaller">Section III - Launching SafeB9SInstaller</h4>
<p>In this section, you will visit the browser exploit webpage, which will use universal-otherapp to launch the boot9strap (custom firmware) installer.</p>
<li>If you are unable to open the camera, open the Internet Browser and manually type the URL instead (<codeclass="language-plaintext highlighter-rouge">https://zoogie.github.io/web/nbhax/</code>)</li>
</ul>
</li>
<li>Tap the QR code button and scan <ahref="http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=https%3A%2F%2Fzoogie.github.io%2Fweb%2Fnbhax&qzone=1&margin=0&size=400x400&ecc=L">this QR code</a>
<ul>
<li>If you get an error, <ahref="troubleshooting#installing-boot9strap-ssloth-browser">follow this troubleshooting guide</a></li>
<li>If you get a security certificate warning, press (A) to allow the connection</li>
</ul>
</li>
<li>Tap the “PROCEED TO HAXX” button</li>
<li>If the exploit was successful, you will have booted into SafeB9SInstaller</li>
</ol>
<h4id="section-iv---installing-boot9strap">Section IV - Installing boot9strap</h4>
<p>In this section, you will install custom firmware onto your device.</p>
<ol>
<li>When prompted, input the key combo given on the top screen to install boot9strap</li>
<li>Once it is complete, press (A) to reboot your device</li>
<li>Your device should have booted into the Luma3DS configuration menu
<ul>
<li>Luma3DS configuration menu are settings for the Luma3DS custom firmware. Many of these settings may be useful for customization or debugging</li>
<li>For the purpose of this guide, <strong>leave these options on the default settings</strong> (do not check or uncheck anything)</li>
<li>If your device shuts down when you try to power it on, ensure that you have copied <codeclass="language-plaintext highlighter-rouge">boot.firm</code> from the Luma3DS <codeclass="language-plaintext highlighter-rouge">.zip</code> to the root of your SD card</li>
</ul>
</li>
<li>Press (Start) to save and reboot</li>
</ol>
<p>At this point, your console will boot to Luma3DS by default.</p>
<ul>
<li>Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware.</li>
<li>On the next page, you will install useful homebrew applications to complete your setup.</li>
</ul>
<h4id="section-v---restoring-default-proxy">Section V - Restoring default proxy</h4>
<p>In this section, you will restore the Internet settings back to normal.</p>
<ol>
<li>Launch the System Settings application</li>
<li>Navigate to <codeclass="language-plaintext highlighter-rouge">Internet Settings</code> -><codeclass="language-plaintext highlighter-rouge">Connection Settings</code></li>
<li>Click on your network connection slot and navigate to <codeclass="language-plaintext highlighter-rouge">Change Settings</code> -><codeclass="language-plaintext highlighter-rouge">Next Page (right arrow)</code> -><codeclass="language-plaintext highlighter-rouge">Proxy Settings</code></li>
<li>Set “Proxy Settings” to “No”</li>
<li>Click OK, then click Save</li>
<li>When prompted, click “Test” to perform the connection test
<ul>
<li>The test should succeed</li>
</ul>
</li>
<li>Power off your device</li>
</ol>
<hr/>
<h3class="notice--primary"id="continue-to-finalizing-setup">Continue to <ahref="finalizing-setup">Finalizing Setup</a></h3>