more screenshots! + other fixes
add screenshot for boot9strap folder add screenshot for 3ds folder add file layout screenshots for hbl-pichaxx and hbl-usm fix typo that breaks screenshot link in usm and hbl-usm remove some unnecessary indenting firwmare -> firmware id1 folder consistency based on what people should have at that point of the guide
|
@ -36,7 +36,7 @@ In this section, you will copy the files needed to trigger the BannerBomb3 explo
|
|||
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` on your SD card
|
||||
+ `<ID0>` is the 32-letter folder name that you copied in [Seedminer](seedminer)
|
||||
+ `<ID1>` is a 32-letter folder inside of the `<ID0>`
|
||||
+ ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info}
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info}
|
||||
1. Create a folder named `Nintendo DSiWare` inside of the `<ID1>`
|
||||
+ If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card
|
||||
1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder
|
||||
|
@ -57,7 +57,6 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana
|
|||
1. Insert your SD card into your computer
|
||||
1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page
|
||||
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` on your SD card
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}){: .notice--info}
|
||||
1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore
|
||||
|
||||
|
||||
|
|
|
@ -6,7 +6,7 @@ title: "Homebrew Launcher (PicHaxx)"
|
|||
|
||||
<details>
|
||||
<summary><em>Technical Details (optional)</em></summary>
|
||||
This method of using Seedminer for further exploitation uses your <code>movable.sed</code> file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller.
|
||||
This method of using Seedminer for further exploitation uses your <code>movable.sed</code> file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see <a href="https://github.com/zoogie/pichaxx">here</a>.
|
||||
</details>
|
||||
{: .notice--info}
|
||||
|
||||
|
@ -41,6 +41,13 @@ In this section, you will copy some of the files that will be used to launch the
|
|||
1. Copy the `slotTool` folder from the unSAFE_MODE `.zip` to the `3ds` folder on your SD card
|
||||
1. Copy the otherapp payload for your region/version from the unSAFE_MODE `.zip`'s `otherapps_with_CfgS` folder to the root of your SD card and rename it to `otherapp.bin`
|
||||
|
||||
![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }})
|
||||
{: .notice--info}
|
||||
|
||||
![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }})
|
||||
{: .notice--info}
|
||||
|
||||
|
||||
#### Section II - PicHaxx
|
||||
|
||||
In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device.
|
||||
|
|
|
@ -49,9 +49,9 @@ In this section, you will copy the files necessary to temporarily replace DS Con
|
|||
1. Insert your SD card into your computer
|
||||
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` on your SD card
|
||||
+ `<ID0>` is the 32-letter folder name that you copied in [Seedminer](seedminer)
|
||||
+ `<ID1>` is a 32-letter folder inside of the `<ID0>`
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info}
|
||||
+ `<ID1>` is a 32-letter folder inside of the `<ID0>`
|
||||
1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info}
|
||||
1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
|
||||
+ The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
|
||||
1. Copy `boot.nds` (B9STool) to the root of your SD card
|
||||
|
@ -117,8 +117,8 @@ At this point, your console will boot to Luma3DS by default.
|
|||
|
||||
In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III.
|
||||
|
||||
1. Copy the `42383841.bin` file from the `clean/` folder of the downloaded DSiWare archive (`output_(name).zip`) to the `Nintendo 3DS/<ID0>/<ID1>/Nintendo DSiWare/` folder on your SD card
|
||||
+ Replace the existing `42383841.bin` file
|
||||
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` on your SD card
|
||||
1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one
|
||||
1. Reinsert your SD card into your device
|
||||
1. Power on your device
|
||||
1. Launch System Settings on your device
|
||||
|
|
|
@ -30,6 +30,7 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint
|
|||
In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active.
|
||||
|
||||
1. Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide
|
||||
+ If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross)
|
||||
1. Launch slotTool from the list of homebrew
|
||||
+ If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section
|
||||
1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option
|
||||
|
@ -41,6 +42,12 @@ In this section, you will use Homebrew Launcher to launch slotTool, which will o
|
|||
1. Copy `usm.bin` from the unSAFE_MODE `.zip` to the root of your SD card
|
||||
1. Put your SD card back into your console
|
||||
|
||||
![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }})
|
||||
{: .notice--info}
|
||||
|
||||
![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }})
|
||||
{: .notice--info}
|
||||
|
||||
#### Section II - unSAFE_MODE
|
||||
|
||||
In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer.
|
||||
|
@ -53,7 +60,7 @@ In this section, you will enter Safe Mode (a feature available on all 3DS family
|
|||
1. Press "I accept" to accept the terms and conditions
|
||||
1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour
|
||||
1. When asked "Would you like to configure Internet settings?", select "Yes"
|
||||
1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screeshots/bb3/safemode_highlighted.png))
|
||||
1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png))
|
||||
1. If the exploit was successful, your device will have booted into SafeB9SInstaller
|
||||
|
||||
#### Section III - Installing boot9strap
|
||||
|
@ -73,7 +80,7 @@ At this point, your console will boot to Luma3DS by default.
|
|||
|
||||
#### Section IV - Restoring WiFi Configuration Profiles
|
||||
|
||||
In this section, you will enter the Homebrew Launcher (this time using custom firwmare) so that you can restore the Wi-Fi connection slots that were overwritten in Section II.
|
||||
In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II.
|
||||
|
||||
1. Launch the Download Play application
|
||||
1. Wait until you see the two buttons
|
||||
|
|
|
@ -41,8 +41,11 @@ In this section, you will copy the files needed to trigger both Soundhax and uni
|
|||
1. Reinsert your SD card into your device
|
||||
1. Power on your device
|
||||
|
||||
![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }})
|
||||
{: .notice--info}
|
||||
![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }})
|
||||
{: .notice--info}
|
||||
|
||||
![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }})
|
||||
{: .notice--info}
|
||||
|
||||
#### Section II - Launching SafeB9SInstaller
|
||||
|
||||
|
|
|
@ -46,10 +46,11 @@ In this section, you will copy the files needed to trigger the BannerBomb3 and u
|
|||
1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card
|
||||
1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card
|
||||
![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info}
|
||||
![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info}
|
||||
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` on your SD card
|
||||
+ `<ID0>` is the 32-letter folder name that you copied in [Seedminer](seedminer)
|
||||
+ `<ID1>` is a 32-letter folder inside of the `<ID0>`
|
||||
+ ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info}
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info}
|
||||
1. Create a folder named `Nintendo DSiWare` inside of the `<ID1>`
|
||||
+ If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card
|
||||
1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder
|
||||
|
@ -82,7 +83,7 @@ In this section, you will enter Safe Mode (a feature available on all 3DS family
|
|||
1. Press "I accept" to accept the terms and conditions
|
||||
1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour
|
||||
1. When asked "Would you like to configure Internet settings?", select "Yes"
|
||||
1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screeshots/bb3/safemode_highlighted.png))
|
||||
1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png))
|
||||
1. If the exploit was successful, your device will have booted into SafeB9SInstaller
|
||||
|
||||
#### Section IV - Installing boot9strap
|
||||
|
@ -112,7 +113,6 @@ In this section, you will trigger the BannerBomb3 exploit a second time so that
|
|||
1. Power off your device
|
||||
1. Insert your SD card into your computer
|
||||
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` on your SD card
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}){: .notice--info}
|
||||
1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore
|
||||
|
||||
___
|
||||
|
|
Before Width: | Height: | Size: 13 KiB After Width: | Height: | Size: 11 KiB |
BIN
images/screenshots/bb3/dsiware-location-3.png
Normal file
After Width: | Height: | Size: 13 KiB |
BIN
images/screenshots/bb3/dsiware-location-4.png
Normal file
After Width: | Height: | Size: 12 KiB |
BIN
images/screenshots/boot9strap-folder.png
Normal file
After Width: | Height: | Size: 10 KiB |
BIN
images/screenshots/hblpichaxx-root-layout.png
Normal file
After Width: | Height: | Size: 14 KiB |
BIN
images/screenshots/hblusm-root-layout.png
Normal file
After Width: | Height: | Size: 20 KiB |
BIN
images/screenshots/slottool-folder.png
Normal file
After Width: | Height: | Size: 4.9 KiB |