2019-07-28 13:40:15 +02:00
---
title: "BannerBomb3"
---
{% include toc title="Table of Contents" %}
2022-11-30 00:58:39 +01:00
{% capture technical_info %}
2022-10-02 00:55:27 +02:00
<summary><em>Technical Details (optional)</em></summary>
2022-11-30 00:58:39 +01:00
To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.
To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.
For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3).
{% endcapture %}
<details>{{ technical_info | markdownify }}</details>
2022-10-02 01:36:54 +02:00
{: .notice--info}
2022-10-02 00:55:27 +02:00
### Compatibility Notes
2019-07-28 13:40:15 +02:00
These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version.
2022-02-18 13:23:07 +01:00
If you have a Taiwanese console (indicated by a T after the system version), follow [this page](bannerbomb3-fredtool-(twn)) instead.
2022-08-30 06:04:12 +02:00
{: .notice--warning}
2022-02-18 13:23:07 +01:00
2019-07-28 13:40:15 +02:00
### What You Need
2023-04-07 06:00:57 +02:00
* Your `movable.sed` file from completing Seedminer or nimhax
2019-07-28 13:40:15 +02:00
2022-01-22 11:48:30 +01:00
#### Section I - Prep Work
2022-10-02 00:55:27 +02:00
In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card.
2022-10-12 18:01:24 +02:00
1. Power off your device
2019-07-28 13:40:15 +02:00
1. Insert your SD card into your computer
2022-10-12 18:01:24 +02:00
1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer
1. Upload your movable.sed using the “Choose File” option
1. Click “Build and Download”
+ This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`)
1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card
+ The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
2023-03-11 03:06:06 +01:00
+ This file does not need to be opened or extracted
2022-10-14 23:53:22 +02:00
![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info}
2022-09-11 07:17:24 +02:00
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` on your SD card
2022-10-02 00:55:27 +02:00
+ `<ID0>` is the 32-letter folder name that you copied in [Seedminer](seedminer)
+ `<ID1>` is a 32-letter folder inside of the `<ID0>`
2023-03-11 03:06:06 +01:00
+ If you have multiple `<ID1>` folders, follow the instructions [here](troubleshooting#bannerbomb3)
2022-10-02 11:59:59 +02:00
![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info}
2022-09-11 07:17:24 +02:00
1. Create a folder named `Nintendo DSiWare` inside of the `<ID1>`
+ If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card
2022-10-12 18:01:24 +02:00
1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder
2022-01-22 11:48:30 +01:00
2022-10-02 00:55:27 +02:00
![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }})
2023-05-07 09:58:16 +02:00
{: .notice--info}
2022-01-22 11:48:30 +01:00
2022-10-12 18:01:24 +02:00
#### Section II - Hardware Button Check
2022-10-02 00:55:27 +02:00
2023-03-28 05:11:26 +02:00
In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page.
2022-10-02 00:55:27 +02:00
2023-05-07 09:58:16 +02:00
Your SD card should remain in your computer while you perform this check.
2023-04-07 05:49:56 +02:00
{% include_relative include/safemodecheck.txt %}
2022-10-02 00:55:27 +02:00
2022-10-12 18:01:24 +02:00
___
### Next steps: Choose an exploit
2019-07-28 13:40:15 +02:00
2023-03-28 05:11:26 +02:00
If you saw the system update screen in the previous section, Safe Mode is working on your device.
2022-10-12 18:01:24 +02:00
If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm))
2019-07-28 13:40:15 +02:00
{: .notice--primary}
2022-10-12 18:01:24 +02:00
If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool))
2023-05-07 09:58:16 +02:00
{: .notice--info}