"message": "此網站透過 Cookies 來顯示您手冊的操作進度以及提升此網站的使用經驗。"
}
})});
</script>
<!-- end custom head snippets -->
</head>
<bodyclass="layout--single">
<navclass="skip-links">
<ul>
<li><ahref="#site-nav"class="screen-reader-shortcut">Skip to primary navigation</a></li>
<li><ahref="#main"class="screen-reader-shortcut">Skip to content</a></li>
<li><ahref="#footer"class="screen-reader-shortcut">Skip to footer</a></li>
</ul>
</nav>
<!--[if lt IE 9]>
<divclass="notice--danger align-center"style="margin: 0;">You are using an <strong>outdated</strong> browser. Please <ahref="https://browsehappy.com/">upgrade your browser</a> to improve your experience.</div>
<![endif]-->
<divclass="masthead">
<divclass="masthead__inner-wrap">
<divclass="masthead__menu">
<navid="site-nav"class="greedy-nav">
<!-- <a class="site-title" href="/">
3DS Hacks Guide
</a>
-->
<ulclass="visible-links">
<!-- modified to use multilang, guide-specific -->
<p>In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.</p>
<p>As we already have Homebrew access, we can use slotTool to do this.</p>
<p>Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.</p>
<p>For a more technical explanation, see <ahref="https://github.com/zoogie/unSAFE_MODE/">here</a> for information about the unSAFE_MODE exploit.</p>
</details>
<h3id="相容性資訊">相容性資訊</h3>
<pclass="notice--danger">If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join <ahref="https://discord.gg/MWxPgEp">Nintendo Homebrew on Discord</a> and ask, in English, for help.</p>
<h3id="必備項目">必備項目</h3>
<ul>
<li>The latest release of <ahref="https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip">SafeB9SInstaller</a> (direct download)</li>
<li>The latest release of <ahref="https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip">boot9strap</a> (direct download)</li>
<li>You may already have this from a prior section of the guide</li>
</ul>
</li>
</ul>
<h4id="第一節--準備工作">第一節 — 準備工作</h4>
<p>In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device’s SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active.</p>
<ol>
<li>Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide
<ul>
<li>If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross)</li>
</ul>
</li>
<li>Launch slotTool from the list of homebrew
<ul>
<li>If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section</li>
</ul>
</li>
<li>Select the “INSTALL exploit to wifi slots 1,2,3 & shutdown” option
<ul>
<li>You will see some on-screen text and then your system will shut down</li>
</ul>
</li>
<li>Remove your SD card from your console and connect it to your computer</li>
<li>Copy <codeclass="language-plaintext highlighter-rouge">usm.bin</code> from the unSAFE_MODE <codeclass="language-plaintext highlighter-rouge">.zip</code> to the root of your SD card</li>
<p>In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer.</p>
<ol>
<li>With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device
<ul>
<li>Keep holding the buttons until the device boots into Safe Mode (a “system update” menu)</li>
<li>If you’re unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, join <ahref="https://discord.gg/MWxPgEp">Nintendo Homebrew on Discord</a> and ask, in English, for help.</li>
</ul>
</li>
<li>Press “OK” to accept the update
<ul>
<li>There is no update. This is part of the exploit</li>
</ul>
</li>
<li>Press “I accept” to accept the terms and conditions</li>
<li>The update will eventually fail, with the error code <codeclass="language-plaintext highlighter-rouge">003-1099</code>. This is intended behaviour</li>
<li>When asked “Would you like to configure Internet settings?”, select “Yes”</li>
<li>On the following menu, navigate to <codeclass="language-plaintext highlighter-rouge">Connection 1</code> -><codeclass="language-plaintext highlighter-rouge">Change Settings</code> -><codeclass="language-plaintext highlighter-rouge">Next Page (right arrow)</code> -><codeclass="language-plaintext highlighter-rouge">Proxy Settings</code> -><codeclass="language-plaintext highlighter-rouge">Detailed Setup</code> (<ahref="/images/screenshots/usm/safemode_highlighted.png">image</a>)</li>
<li>If the exploit was successful, your device will have booted into SafeB9SInstaller</li>
<p>In this section, you will install custom firmware onto your device.</p>
<ol>
<li>When prompted, input the key combo given on the top screen to install boot9strap</li>
<li>Once it is complete, press (A) to reboot your device</li>
<li>Your device should have booted into the Luma3DS configuration menu
<ul>
<li>Luma3DS configuration menu are settings for the Luma3DS custom firmware. Many of these settings may be useful for customization or debugging</li>
<li>For the purpose of this guide, <strong>leave these options on the default settings</strong> (do not check or uncheck anything)</li>
<li>If your device shuts down when you try to power it on, ensure that you have copied <codeclass="language-plaintext highlighter-rouge">boot.firm</code> from the Luma3DS <codeclass="language-plaintext highlighter-rouge">.zip</code> to the root of your SD card</li>
</ul>
</li>
<li>按『Start』鍵以存檔並重新啟動系統</li>
</ol>
<p>At this point, your console will boot to Luma3DS by default.</p>
<ul>
<li>Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware.</li>
<li>On the next page, you will install useful homebrew applications to complete your setup.</li>
</ul>
<h4id="第四節--還原-wifi-設定檔">第四節 — 還原 WiFi 設定檔</h4>
<p>In this section, you will enter the Homebrew Launcher (using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section I.</p>
<ol>
<li>啟動『下載通信 (Download Play)』程式</li>
<li>等到你看到兩個按鍵
<ul>
<li>Do not press either of the buttons</li>
</ul>
</li>
<li>同時按下『L』+『下』+『Select』鍵以啟動 Rosalina 選單</li>
<li>選擇『Miscellaneous options』</li>
<li>選擇『Switch the hb. title to the current app.』</li>
<li>按『B』繼續</li>
<li>按『B』回到 Rosalina 主選單</li>
<li>按『B』退出 Rosalina 選單</li>
<li>按『Home』鍵,並關閉『下載通信 (Download Play)』程式</li>
<li>Relaunch the Download Play application</li>
<li>您的主機應該就會啟動 Homebrew Launcher 了</li>
<li>Launch slotTool from the list of homebrew</li>
<li>Select “RESTORE original wifi slots 1,2,3”</li>