Guide_3DS/_pages/en_PT/Decrypt9-(MSET).txt

35 lines
1.6 KiB
Text
Raw Normal View History

2017-01-16 15:31:21 +01:00
---
title: "Decrypt9 (MSET)" #
lang: en
2017-02-16 02:36:35 +01:00
permalink: /en_PT/decrypt9-(mset).html
2017-01-16 15:31:21 +01:00
---
The first thing this guide will do is get you running Decrypt9, which is a multipurpose toolkit that will allow us to install the version 2.1.0, which contains a vulnerability that is needed for further exploitation of the system.
{: .notice}
If you have already hacked your 3DS before and have a EmuNAND based CFW setup, this guide deals exclusively with SysNAND and you should follow all instructions from within or applying to SysNAND. Note that the terms EmuNAND and RedNAND refer to slightly different implementations of [the same concept](http://3dbrew.org/wiki/NAND_Redirection).
{: .notice--info}
2017-02-16 02:36:35 +01:00
#### What ye need
2017-01-16 15:31:21 +01:00
* DS flashcard that works on your 3DS version
* The latest release of [Decrypt9WIP](https://github.com/d0k3/Decrypt9WIP/releases/latest/)
#### Instructions
2017-02-16 02:36:35 +01:00
1. Create a folder named `files9` on th' root 'o ye SD card if it does not already exist
2. Copy `Launcher.dat` 'n `Decrypt9WIP.dat` from th' Decrypt9WIP `.zip` to th' root 'o ye SD card
3. Reinsert ye SD card into ye 3DS
4. Put `Decrypt9.nds` from th' Decrypt9 `.zip` on ye DS flashcard
5. Start ye DS flashcard from ye 3DS
6. Boot `Decrypt9.nds` usin' ye flashcart
7. Select th' correct option fer ye system version
2017-01-16 15:31:21 +01:00
+ 4.X.X -> "4.x Decrypt9WIP"
+ 6.X.X -> "6.x Decrypt9WIP"
2017-02-16 02:36:35 +01:00
8. Reboot th' system, then be off to System Settin's, then "Other Settings", then "Profile", then "Nintendo DS Profile"
9. If th' exploit was successful, ye gunna have booted into Decrypt9
___
2017-01-16 15:31:21 +01:00
Continue to [2.1.0 ctrtransfer](2.1.0-ctrtransfer).
{: .notice--primary}