diff --git a/_pages/en_US/troubleshooting.txt b/_pages/en_US/troubleshooting.txt index c17bd781ec..f91b2b2a58 100644 --- a/_pages/en_US/troubleshooting.txt +++ b/_pages/en_US/troubleshooting.txt @@ -83,8 +83,8 @@ Note that if you have any payload files other than `GodMode9.firm` in the `/luma 1. Select "Move path(s)" 1. The uppercase extension files will have been moved to the `newdir` directory 1. Press (Start) to reboot your device -1. Return to [Finalizing Setup](finalizing-setup) and retry the FBI injection -1. If this still doesn't work, move the uppercase extension files back to the `content` folder, then move the lowercase extension files to the `newdir` folder, then return to [Finalizing Setup](finalizing-setup) and retry the FBI injection +1. Retry the H&S injection +1. If this still doesn't work, move the uppercase extension files back to the `content` folder, then move the lowercase extension files to the `newdir` folder, then retry the H&S injection ## A browser based exploit is not working