diff --git a/_pages/ar_SA/bannerbomb3.txt b/_pages/ar_SA/bannerbomb3.txt index a0b1ef007e..5a46749529 100644 --- a/_pages/ar_SA/bannerbomb3.txt +++ b/_pages/ar_SA/bannerbomb3.txt @@ -4,11 +4,15 @@ title: "BannerBomb3" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

For a more technical explanation, see here.

+
+{: .notice--info} -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -20,6 +24,9 @@ If you have a Taiwanese console (indicated by a T after the system version), fol * Your `movable.sed` file from completing [Seedminer](seedminer) #### Section I - Prep Work + +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + 1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer 1. Upload your movable.sed using the "Choose File" option 1. Click "Build and Download" @@ -27,28 +34,31 @@ If you have a Taiwanese console (indicated by a T after the system version), fol 1. If your console is powered on, power off your console 1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from the BannerBomb3 `.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section +1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked 1. Power off your device 1. Insert your SD card into your computer -1. You should now have `42383841.bin` in SD root. This is the DSiWare backup you will use later in the guide -1. Navigate to `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card - + This `` will be the same one that you used in [Seedminer](seedminer) -1. Delete `F00D43D5.bin` from the Nintendo DSiWare folder and from your computer. This file will not be needed anymore +1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore + Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} diff --git a/_pages/ar_SA/finalizing-setup.txt b/_pages/ar_SA/finalizing-setup.txt index c5b41ec5b8..29ed5ffea6 100644 --- a/_pages/ar_SA/finalizing-setup.txt +++ b/_pages/ar_SA/finalizing-setup.txt @@ -20,6 +20,8 @@ On this page, we will make critical system file backups and install the followin It is not recommended to skip downloading any of these applications, as many of them will be used later on this page. At the end of this page, your SD card will be cleaned up by removing unnecessary installation files. {: .notice--warning} +### Compatibility Notes + If your **New 3DS** was on version 2.1.0 before following this guide, you should [restore your NAND backup](godmode9-usage#restoring-a-nand-backup) before continuing. {: .notice--warning} @@ -39,6 +41,8 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o #### Section I - Prep Work +In this section, you will copy the files necessary to follow the rest of the instructions on this page. + 1. Power off your device 1. Insert your SD card into your computer 1. Create a folder named `cias` on the root of your SD card if it does not already exist @@ -52,15 +56,20 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o 1. Reinsert your SD card into your device 1. Power on your device - ![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) - {: .notice--info} - ![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) - {: .notice--info} +The screenshots below indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. + +![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) +{: .notice--info} + -These screenshots indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. #### Section II - Updating the System +In this section, you will update your system to the latest version, which is safe to do with custom firmware. + 1. Update your device by going to System Settings, then "Other Settings", then going all the way to the right and using "System Update" + Updates while using B9S + Luma (what you have) are safe + The updater may display a message saying "Your system is up to date" instead of updating. This is normal if you are already up to date; continue with the next section @@ -69,6 +78,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section III - Homebrew Launcher +In this section, you will temporarily replace Download Play with Homebrew Launcher (which we need to launch FBI). Download Play will automatically go back to normal once you reboot your device. + 1. Launch the Download Play application (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. Wait until you see the `Nintendo 3DS` and `Nintendo DS` buttons 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu @@ -83,6 +94,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section IV - RTC and DSP Setup +In this section, you will sync your 3DS internal clock with the actual time and dump the sound firmware (which is necesssary for some homebrew software to use sound properly). + 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu 1. Select "Miscellaneous options" 1. Select "Dump DSP firmware" @@ -94,6 +107,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section V - Installing CIAs +In this section, you will install several useful homebrew applications to HOME Menu. + 1. Launch FBI from the list of homebrew 1. Navigate to `SD` -> `cias` 1. Select "\" @@ -102,6 +117,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VI - CTRNAND Luma3DS +In this section, you will use a script to copy some of Luma3DS's files to internal memory so that they can be accessed, even without an SD card inserted. + 1. Power off your device 1. Press and hold (Start), and while holding (Start), power on your device. This will launch GodMode9 + If you do not boot into GodMode9, ensure that `GodMode9.firm` is in `/luma/payloads/` and that `payloads` is correctly spelled @@ -118,6 +135,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VII - Cleanup SD Card +In this section, you will use a script to remove some unnecessary files from your SD card. + 1. Select "Cleanup SD Card" 1. When prompted, press (A) to proceed 1. Press (A) to continue @@ -125,6 +144,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VIII - Backup Essential Files +In this section, you will make backups of flies that can be used to recover from softwaer bricks or to recover data. + 1. Select "Backup Options" 1. Select "SysNAND Backup" 1. Press (A) to confirm @@ -159,7 +180,7 @@ You're done! Custom firmware is now fully configured on your device. Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! {: .notice--info} -#### Information and Notes +### Information and Notes {% capture notice-6 %} Here are some key combos that you should know: diff --git a/_pages/ar_SA/homebrew-launcher-(pichaxx).txt b/_pages/ar_SA/homebrew-launcher-(pichaxx).txt index 6348abc52a..aff6795262 100644 --- a/_pages/ar_SA/homebrew-launcher-(pichaxx).txt +++ b/_pages/ar_SA/homebrew-launcher-(pichaxx).txt @@ -4,9 +4,17 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. +
+{: .notice--info} -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE to run SafeB9SInstaller. +### Compatibility Notes + +These instructions work on USA, Europe, and Japan consoles as indicated by the letters U, E, or J after the system version. + +You will need a Nintendo Network ID to download Pokémon Picross. This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. {: .notice--warning} @@ -24,15 +32,8 @@ This process will overwrite your Pokémon Picross save file, if you have one. If #### Section I - Prep Work -1. Power on your device -1. Open the Nintendo eShop -1. Tap the Search icon (small magnifying glass) -1. Search for `picross` -1. Open the store page for Pokémon Picross -1. Download Pokémon Picross - + You can scan [this QR code](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=ESHOP://50010000037815&margin=0&qzone=1&size=400x400&ecc=L) using the Nintendo 3DS Camera for a direct link to the eShop app - + Your SD card must be inserted in your device to install Pokémon Picross -1. Power off your device +In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. + 1. Insert your SD card into your computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it @@ -40,8 +41,16 @@ This process will overwrite your Pokémon Picross save file, if you have one. If 1. Copy the `slotTool` folder from the unSAFE_MODE `.zip` to the `3ds` folder on your SD card 1. Copy the otherapp payload for your region/version from the unSAFE_MODE `.zip`'s `otherapps_with_CfgS` folder to the root of your SD card and rename it to `otherapp.bin` +![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }}) +{: .notice--info} + + #### Section II - PicHaxx +In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device. 1. Open [the PicHaxx Injector website](https://3ds.nhnarwhal.com/3dstools/pichaxx.php) on your computer 1. Select your `movable.sed` file 1. Select "Build and Download" diff --git a/_pages/ar_SA/installing-boot9strap-(fredtool).txt b/_pages/ar_SA/installing-boot9strap-(fredtool).txt index 78598ce783..1f7825ac28 100644 --- a/_pages/ar_SA/installing-boot9strap-(fredtool).txt +++ b/_pages/ar_SA/installing-boot9strap-(fredtool).txt @@ -4,15 +4,16 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Table of Contents" %} -### Required Reading - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, for example from BannerBomb or the DSiWare Dumper tool. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). +
+Technical Details (optional) +

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+
+{: .notice--info} ### What You Need -* A DSiWare Backup (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) +* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -20,6 +21,8 @@ This is a currently working implementation of the "FIRM partitions known-plainte #### Section I - CFW Check +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + 1. Power off your device 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button @@ -30,17 +33,7 @@ If you see a configuration menu, you already have CFW, and continuing with these #### Section II - Prep Work -1. Power off your device -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card - - ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} - -#### Section III - Fredtool +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) @@ -53,19 +46,31 @@ If you see a configuration menu, you already have CFW, and continuing with these 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link +1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` - + If the `Nintendo DSiWare` folder does not exist, create it inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` 1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder -1. Reinsert your SD card into your device + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card + + ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} + +#### Section III - Overwriting DS Connection Settings + +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Haxxxxxxxxx!" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title 1. Select "Copy", then select "OK" 1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio #### Section IV - Flipnote Exploit @@ -73,6 +78,8 @@ If you see a configuration menu, you already have CFW, and continuing with these If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} +In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer. + 1. Complete the initial setup process for the launched game until you reach the main menu + Select the left option whenever prompted during the setup process 1. Using the touch-screen, select the large left box, then select the box with an SD card icon @@ -85,7 +92,7 @@ If you would prefer a visual guide to this section, one is available [here](http 1. Tap the fourth box with the letter "A" in it 1. If the exploit was successful, your device will have loaded b9sTool 1. Using the D-Pad, move to "Install boot9strap" - + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to start over from Step 12 of Section III + + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III 1. Press (A), then press START and SELECT at the same time to begin the process 1. Once completed and the bottom screen says "done.", exit b9sTool, then power off your device + You may have to force power off by holding the power button @@ -94,6 +101,8 @@ If you would prefer a visual guide to this section, one is available [here](http #### Section V - Luma3DS Verification +Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. + 1. Power off your device 1. Insert your SD card into your computer 1. Verify that a `luma` folder exists and that `config.ini` is inside of it @@ -106,13 +115,15 @@ At this point, your console will boot to Luma3DS by default. #### Section VI - Restoring DS Connection Settings -1. Copy the `42383841.bin` file from the `clean/` folder of the downloaded DSiWare archive (`output_(name).zip`) to the `Nintendo 3DS///Nintendo DSiWare/` folder on your SD card - + Replace the existing `42383841.bin` file +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Nintendo DSi™" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title 1. Select "Copy", then select "OK" ___ diff --git a/_pages/ar_SA/installing-boot9strap-(hbl-usm).txt b/_pages/ar_SA/installing-boot9strap-(hbl-usm).txt index 142604d9b0..6c9a3f849c 100644 --- a/_pages/ar_SA/installing-boot9strap-(hbl-usm).txt +++ b/_pages/ar_SA/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,16 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

As we already have Homebrew access, we can use slotTool to do this.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--danger} @@ -24,7 +27,10 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint #### Section I - Prep Work +In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. + 1. Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide + + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. Launch slotTool from the list of homebrew + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section 1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option @@ -36,22 +42,31 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint 1. Copy `usm.bin` from the unSAFE_MODE `.zip` to the root of your SD card 1. Put your SD card back into your console +![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} + #### Section II - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](https://uwuu.ca/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section III - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -65,6 +80,8 @@ At this point, your console will boot to Luma3DS by default. #### Section IV - Restoring WiFi Configuration Profiles +In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch the Download Play application 1. Wait until you see the two buttons + Do not press either of the buttons diff --git a/_pages/ar_SA/installing-boot9strap-(soundhax).txt b/_pages/ar_SA/installing-boot9strap-(soundhax).txt index 2302a85291..d9c13f9bc7 100644 --- a/_pages/ar_SA/installing-boot9strap-(soundhax).txt +++ b/_pages/ar_SA/installing-boot9strap-(soundhax).txt @@ -4,7 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+
+{: .notice--info} + +### Compatibility Notes Soundhax (when combined with universal-otherapp) is compatible with versions 1.0.0 through 11.3.0 in all regions. @@ -21,6 +27,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Section I - Prep Work +In this section, you will copy the files needed to trigger both Soundhax and universal-otherapp. + 1. Power off your device 1. Insert your SD card into your computer 1. Copy the Soundhax `.m4a` to the root of your SD card @@ -33,11 +41,16 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 1. Reinsert your SD card into your device 1. Power on your device - ![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} #### Section II - Launching SafeB9SInstaller +In this section, you will launch Soundhax through the Nintendo 3DS Sound app, which will use universal-otherapp to launch the boot9strap (custom firmware) installer. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch Nintendo 3DS Sound @@ -58,6 +71,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Section III - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap 1. Once it is complete, press (A) to reboot your device 1. Your device should have rebooted into the Luma3DS configuration menu diff --git a/_pages/ar_SA/installing-boot9strap-(usm).txt b/_pages/ar_SA/installing-boot9strap-(usm).txt index 6e148372c2..b58fa784a2 100644 --- a/_pages/ar_SA/installing-boot9strap-(usm).txt +++ b/_pages/ar_SA/installing-boot9strap-(usm).txt @@ -4,15 +4,17 @@ title: "Installing boot9strap (USM)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

We can do this using an existing exploit, BannerBomb3.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -29,6 +31,8 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will #### Section I - Prep Work +In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. + 1. If your device is powered on, power off your device 1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer 1. Upload your movable.sed using the "Choose File" option @@ -41,47 +45,51 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will 1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card 1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - + ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }}) - {: .notice--info} - + ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} + ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card 1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Select "Inject haxx" +1. Press (A) to select "Inject haxx" + Your device will automatically power off #### Section III - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section IV - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -95,16 +103,17 @@ At this point, your console will boot to Luma3DS by default. #### Section V - Restoring WiFi Configuration Profiles +In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text -1. Select "Restore slots" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) +1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + Your device will automatically reboot 1. Power off your device 1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore ___ diff --git a/_pages/ar_SA/seedminer.txt b/_pages/ar_SA/seedminer.txt index 44fe68e7b6..871d46e5cd 100644 --- a/_pages/ar_SA/seedminer.txt +++ b/_pages/ar_SA/seedminer.txt @@ -4,52 +4,54 @@ title: "Seedminer" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

+

For information on how Seedminer works, see this presentation.

+

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+
+{: .notice--info} -To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. +### Section I - Prep Work -For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). - -This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. - -### Instructions - -#### Section I - Prep Work +In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. 1. Insert your SD card into your computer 1. Navigate to the `Nintendo 3DS` folder on your SD card -1. Copy the 32 character long name of the folder you see inside Nintendo 3DS - + Do not go inside any more folders - + If you see multiple 32 character long folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + + If you don't have a `Nintendo 3DS` folder, put your SD card into your 3DS and power it on so that the folder can be created +1. Copy the name of the 32-letter folder you see directly inside Nintendo 3DS + + This 32-letter name is system-specific and will be different for each console + + If you see multiple 32-letter folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + You can ignore the `private` folder if you have it - ![]({{ "/images/screenshots/id0-example.png" | absolute_url }}) + ![]({{ "/images/screenshots/seedminer/id0-example.png" | absolute_url }}) {: .notice--info} -1. Paste your 32 character long folder name into a document you can reference later - + This folder name is also known as your "ID0" +1. Paste your 32 character long folder name into [a document](/images/screenshots/seedminer/text-document.png) you can reference later + + This folder is known as your "ID0". Take note of this as this guide will refer to it as such later 1. Power on your device + Your SD card does not need to be inserted at this point 1. Go to your Friend List (the [orange Face Icon]({{ "/images/friend-list-icon.png" | absolute_url }}) in the top row of your HOME Menu) + If you receive an error and are kicked out of the menu, you either must create a new Mii or your device cannot connect to Nintendo's servers (due to a ban or connection issues) 1. Find your Mii profile, then find the "Friend Code" field on the top screen -#### Section II - Seedminer +### Section II - Seedminer + +In this section, you will use the Bruteforce Movable website to retrieve your device's encryption key in the form of `movable.sed`. 1. Open [Bruteforce Movable](https://seedminer.hacks.guide/) on your computer - + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) + If the site isn't working, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field - + Do not attempt to enter the ID0 by hand. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section + + Do not attempt to enter the ID0 manually, as it is easy to make a mistake. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section 1. Select "Go" + If the site immediately goes to step 4, the website has already correctly processed your bruteforce request. You can download your `movable.sed` file and continue to the next section. You do not need to re-add the bot -1. Use the "Register Friend" button on your device to add the bot's friend code as given by the website +1. Use the ["Register Friend" button](/images/screenshots/seedminer/register-friend.png) on your device to add the bot's friend code as given by the website + If prompted, the name that you give to the friend does not matter 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once 1. Once the site processes your information, the site will continue to `Step 2: Bruteforce` automatically 1. Wait for the remainder of the process to complete - + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour + + This is usually fast (1-5 minutes) + During this process, the bot you added may not show up on your 3DS. As long as the website updates, this is not an issue + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site @@ -57,7 +59,7 @@ This method uses a powerful graphics card to perform the calculations needed. A ___ -### Next Steps +### Next steps: Choose an exploit Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. diff --git a/_pages/bg_BG/bannerbomb3.txt b/_pages/bg_BG/bannerbomb3.txt index a0b1ef007e..5a46749529 100644 --- a/_pages/bg_BG/bannerbomb3.txt +++ b/_pages/bg_BG/bannerbomb3.txt @@ -4,11 +4,15 @@ title: "BannerBomb3" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

For a more technical explanation, see here.

+
+{: .notice--info} -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -20,6 +24,9 @@ If you have a Taiwanese console (indicated by a T after the system version), fol * Your `movable.sed` file from completing [Seedminer](seedminer) #### Section I - Prep Work + +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + 1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer 1. Upload your movable.sed using the "Choose File" option 1. Click "Build and Download" @@ -27,28 +34,31 @@ If you have a Taiwanese console (indicated by a T after the system version), fol 1. If your console is powered on, power off your console 1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from the BannerBomb3 `.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section +1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked 1. Power off your device 1. Insert your SD card into your computer -1. You should now have `42383841.bin` in SD root. This is the DSiWare backup you will use later in the guide -1. Navigate to `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card - + This `` will be the same one that you used in [Seedminer](seedminer) -1. Delete `F00D43D5.bin` from the Nintendo DSiWare folder and from your computer. This file will not be needed anymore +1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore + Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} diff --git a/_pages/bg_BG/finalizing-setup.txt b/_pages/bg_BG/finalizing-setup.txt index c5b41ec5b8..29ed5ffea6 100644 --- a/_pages/bg_BG/finalizing-setup.txt +++ b/_pages/bg_BG/finalizing-setup.txt @@ -20,6 +20,8 @@ On this page, we will make critical system file backups and install the followin It is not recommended to skip downloading any of these applications, as many of them will be used later on this page. At the end of this page, your SD card will be cleaned up by removing unnecessary installation files. {: .notice--warning} +### Compatibility Notes + If your **New 3DS** was on version 2.1.0 before following this guide, you should [restore your NAND backup](godmode9-usage#restoring-a-nand-backup) before continuing. {: .notice--warning} @@ -39,6 +41,8 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o #### Section I - Prep Work +In this section, you will copy the files necessary to follow the rest of the instructions on this page. + 1. Power off your device 1. Insert your SD card into your computer 1. Create a folder named `cias` on the root of your SD card if it does not already exist @@ -52,15 +56,20 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o 1. Reinsert your SD card into your device 1. Power on your device - ![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) - {: .notice--info} - ![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) - {: .notice--info} +The screenshots below indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. + +![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) +{: .notice--info} + -These screenshots indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. #### Section II - Updating the System +In this section, you will update your system to the latest version, which is safe to do with custom firmware. + 1. Update your device by going to System Settings, then "Other Settings", then going all the way to the right and using "System Update" + Updates while using B9S + Luma (what you have) are safe + The updater may display a message saying "Your system is up to date" instead of updating. This is normal if you are already up to date; continue with the next section @@ -69,6 +78,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section III - Homebrew Launcher +In this section, you will temporarily replace Download Play with Homebrew Launcher (which we need to launch FBI). Download Play will automatically go back to normal once you reboot your device. + 1. Launch the Download Play application (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. Wait until you see the `Nintendo 3DS` and `Nintendo DS` buttons 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu @@ -83,6 +94,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section IV - RTC and DSP Setup +In this section, you will sync your 3DS internal clock with the actual time and dump the sound firmware (which is necesssary for some homebrew software to use sound properly). + 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu 1. Select "Miscellaneous options" 1. Select "Dump DSP firmware" @@ -94,6 +107,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section V - Installing CIAs +In this section, you will install several useful homebrew applications to HOME Menu. + 1. Launch FBI from the list of homebrew 1. Navigate to `SD` -> `cias` 1. Select "\" @@ -102,6 +117,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VI - CTRNAND Luma3DS +In this section, you will use a script to copy some of Luma3DS's files to internal memory so that they can be accessed, even without an SD card inserted. + 1. Power off your device 1. Press and hold (Start), and while holding (Start), power on your device. This will launch GodMode9 + If you do not boot into GodMode9, ensure that `GodMode9.firm` is in `/luma/payloads/` and that `payloads` is correctly spelled @@ -118,6 +135,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VII - Cleanup SD Card +In this section, you will use a script to remove some unnecessary files from your SD card. + 1. Select "Cleanup SD Card" 1. When prompted, press (A) to proceed 1. Press (A) to continue @@ -125,6 +144,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VIII - Backup Essential Files +In this section, you will make backups of flies that can be used to recover from softwaer bricks or to recover data. + 1. Select "Backup Options" 1. Select "SysNAND Backup" 1. Press (A) to confirm @@ -159,7 +180,7 @@ You're done! Custom firmware is now fully configured on your device. Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! {: .notice--info} -#### Information and Notes +### Information and Notes {% capture notice-6 %} Here are some key combos that you should know: diff --git a/_pages/bg_BG/homebrew-launcher-(pichaxx).txt b/_pages/bg_BG/homebrew-launcher-(pichaxx).txt index 6348abc52a..aff6795262 100644 --- a/_pages/bg_BG/homebrew-launcher-(pichaxx).txt +++ b/_pages/bg_BG/homebrew-launcher-(pichaxx).txt @@ -4,9 +4,17 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. +
+{: .notice--info} -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE to run SafeB9SInstaller. +### Compatibility Notes + +These instructions work on USA, Europe, and Japan consoles as indicated by the letters U, E, or J after the system version. + +You will need a Nintendo Network ID to download Pokémon Picross. This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. {: .notice--warning} @@ -24,15 +32,8 @@ This process will overwrite your Pokémon Picross save file, if you have one. If #### Section I - Prep Work -1. Power on your device -1. Open the Nintendo eShop -1. Tap the Search icon (small magnifying glass) -1. Search for `picross` -1. Open the store page for Pokémon Picross -1. Download Pokémon Picross - + You can scan [this QR code](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=ESHOP://50010000037815&margin=0&qzone=1&size=400x400&ecc=L) using the Nintendo 3DS Camera for a direct link to the eShop app - + Your SD card must be inserted in your device to install Pokémon Picross -1. Power off your device +In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. + 1. Insert your SD card into your computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it @@ -40,8 +41,16 @@ This process will overwrite your Pokémon Picross save file, if you have one. If 1. Copy the `slotTool` folder from the unSAFE_MODE `.zip` to the `3ds` folder on your SD card 1. Copy the otherapp payload for your region/version from the unSAFE_MODE `.zip`'s `otherapps_with_CfgS` folder to the root of your SD card and rename it to `otherapp.bin` +![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }}) +{: .notice--info} + + #### Section II - PicHaxx +In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device. 1. Open [the PicHaxx Injector website](https://3ds.nhnarwhal.com/3dstools/pichaxx.php) on your computer 1. Select your `movable.sed` file 1. Select "Build and Download" diff --git a/_pages/bg_BG/installing-boot9strap-(fredtool).txt b/_pages/bg_BG/installing-boot9strap-(fredtool).txt index 78598ce783..1f7825ac28 100644 --- a/_pages/bg_BG/installing-boot9strap-(fredtool).txt +++ b/_pages/bg_BG/installing-boot9strap-(fredtool).txt @@ -4,15 +4,16 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Table of Contents" %} -### Required Reading - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, for example from BannerBomb or the DSiWare Dumper tool. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). +
+Technical Details (optional) +

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+
+{: .notice--info} ### What You Need -* A DSiWare Backup (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) +* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -20,6 +21,8 @@ This is a currently working implementation of the "FIRM partitions known-plainte #### Section I - CFW Check +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + 1. Power off your device 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button @@ -30,17 +33,7 @@ If you see a configuration menu, you already have CFW, and continuing with these #### Section II - Prep Work -1. Power off your device -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card - - ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} - -#### Section III - Fredtool +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) @@ -53,19 +46,31 @@ If you see a configuration menu, you already have CFW, and continuing with these 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link +1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` - + If the `Nintendo DSiWare` folder does not exist, create it inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` 1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder -1. Reinsert your SD card into your device + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card + + ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} + +#### Section III - Overwriting DS Connection Settings + +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Haxxxxxxxxx!" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title 1. Select "Copy", then select "OK" 1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio #### Section IV - Flipnote Exploit @@ -73,6 +78,8 @@ If you see a configuration menu, you already have CFW, and continuing with these If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} +In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer. + 1. Complete the initial setup process for the launched game until you reach the main menu + Select the left option whenever prompted during the setup process 1. Using the touch-screen, select the large left box, then select the box with an SD card icon @@ -85,7 +92,7 @@ If you would prefer a visual guide to this section, one is available [here](http 1. Tap the fourth box with the letter "A" in it 1. If the exploit was successful, your device will have loaded b9sTool 1. Using the D-Pad, move to "Install boot9strap" - + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to start over from Step 12 of Section III + + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III 1. Press (A), then press START and SELECT at the same time to begin the process 1. Once completed and the bottom screen says "done.", exit b9sTool, then power off your device + You may have to force power off by holding the power button @@ -94,6 +101,8 @@ If you would prefer a visual guide to this section, one is available [here](http #### Section V - Luma3DS Verification +Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. + 1. Power off your device 1. Insert your SD card into your computer 1. Verify that a `luma` folder exists and that `config.ini` is inside of it @@ -106,13 +115,15 @@ At this point, your console will boot to Luma3DS by default. #### Section VI - Restoring DS Connection Settings -1. Copy the `42383841.bin` file from the `clean/` folder of the downloaded DSiWare archive (`output_(name).zip`) to the `Nintendo 3DS///Nintendo DSiWare/` folder on your SD card - + Replace the existing `42383841.bin` file +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Nintendo DSi™" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title 1. Select "Copy", then select "OK" ___ diff --git a/_pages/bg_BG/installing-boot9strap-(hbl-usm).txt b/_pages/bg_BG/installing-boot9strap-(hbl-usm).txt index 142604d9b0..6c9a3f849c 100644 --- a/_pages/bg_BG/installing-boot9strap-(hbl-usm).txt +++ b/_pages/bg_BG/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,16 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

As we already have Homebrew access, we can use slotTool to do this.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--danger} @@ -24,7 +27,10 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint #### Section I - Prep Work +In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. + 1. Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide + + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. Launch slotTool from the list of homebrew + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section 1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option @@ -36,22 +42,31 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint 1. Copy `usm.bin` from the unSAFE_MODE `.zip` to the root of your SD card 1. Put your SD card back into your console +![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} + #### Section II - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](https://uwuu.ca/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section III - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -65,6 +80,8 @@ At this point, your console will boot to Luma3DS by default. #### Section IV - Restoring WiFi Configuration Profiles +In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch the Download Play application 1. Wait until you see the two buttons + Do not press either of the buttons diff --git a/_pages/bg_BG/installing-boot9strap-(soundhax).txt b/_pages/bg_BG/installing-boot9strap-(soundhax).txt index 2302a85291..d9c13f9bc7 100644 --- a/_pages/bg_BG/installing-boot9strap-(soundhax).txt +++ b/_pages/bg_BG/installing-boot9strap-(soundhax).txt @@ -4,7 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+
+{: .notice--info} + +### Compatibility Notes Soundhax (when combined with universal-otherapp) is compatible with versions 1.0.0 through 11.3.0 in all regions. @@ -21,6 +27,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Section I - Prep Work +In this section, you will copy the files needed to trigger both Soundhax and universal-otherapp. + 1. Power off your device 1. Insert your SD card into your computer 1. Copy the Soundhax `.m4a` to the root of your SD card @@ -33,11 +41,16 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 1. Reinsert your SD card into your device 1. Power on your device - ![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} #### Section II - Launching SafeB9SInstaller +In this section, you will launch Soundhax through the Nintendo 3DS Sound app, which will use universal-otherapp to launch the boot9strap (custom firmware) installer. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch Nintendo 3DS Sound @@ -58,6 +71,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Section III - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap 1. Once it is complete, press (A) to reboot your device 1. Your device should have rebooted into the Luma3DS configuration menu diff --git a/_pages/bg_BG/installing-boot9strap-(usm).txt b/_pages/bg_BG/installing-boot9strap-(usm).txt index 6e148372c2..b58fa784a2 100644 --- a/_pages/bg_BG/installing-boot9strap-(usm).txt +++ b/_pages/bg_BG/installing-boot9strap-(usm).txt @@ -4,15 +4,17 @@ title: "Installing boot9strap (USM)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

We can do this using an existing exploit, BannerBomb3.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -29,6 +31,8 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will #### Section I - Prep Work +In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. + 1. If your device is powered on, power off your device 1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer 1. Upload your movable.sed using the "Choose File" option @@ -41,47 +45,51 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will 1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card 1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - + ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }}) - {: .notice--info} - + ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} + ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card 1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Select "Inject haxx" +1. Press (A) to select "Inject haxx" + Your device will automatically power off #### Section III - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section IV - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -95,16 +103,17 @@ At this point, your console will boot to Luma3DS by default. #### Section V - Restoring WiFi Configuration Profiles +In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text -1. Select "Restore slots" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) +1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + Your device will automatically reboot 1. Power off your device 1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore ___ diff --git a/_pages/bg_BG/seedminer.txt b/_pages/bg_BG/seedminer.txt index 44fe68e7b6..871d46e5cd 100644 --- a/_pages/bg_BG/seedminer.txt +++ b/_pages/bg_BG/seedminer.txt @@ -4,52 +4,54 @@ title: "Seedminer" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

+

For information on how Seedminer works, see this presentation.

+

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+
+{: .notice--info} -To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. +### Section I - Prep Work -For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). - -This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. - -### Instructions - -#### Section I - Prep Work +In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. 1. Insert your SD card into your computer 1. Navigate to the `Nintendo 3DS` folder on your SD card -1. Copy the 32 character long name of the folder you see inside Nintendo 3DS - + Do not go inside any more folders - + If you see multiple 32 character long folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + + If you don't have a `Nintendo 3DS` folder, put your SD card into your 3DS and power it on so that the folder can be created +1. Copy the name of the 32-letter folder you see directly inside Nintendo 3DS + + This 32-letter name is system-specific and will be different for each console + + If you see multiple 32-letter folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + You can ignore the `private` folder if you have it - ![]({{ "/images/screenshots/id0-example.png" | absolute_url }}) + ![]({{ "/images/screenshots/seedminer/id0-example.png" | absolute_url }}) {: .notice--info} -1. Paste your 32 character long folder name into a document you can reference later - + This folder name is also known as your "ID0" +1. Paste your 32 character long folder name into [a document](/images/screenshots/seedminer/text-document.png) you can reference later + + This folder is known as your "ID0". Take note of this as this guide will refer to it as such later 1. Power on your device + Your SD card does not need to be inserted at this point 1. Go to your Friend List (the [orange Face Icon]({{ "/images/friend-list-icon.png" | absolute_url }}) in the top row of your HOME Menu) + If you receive an error and are kicked out of the menu, you either must create a new Mii or your device cannot connect to Nintendo's servers (due to a ban or connection issues) 1. Find your Mii profile, then find the "Friend Code" field on the top screen -#### Section II - Seedminer +### Section II - Seedminer + +In this section, you will use the Bruteforce Movable website to retrieve your device's encryption key in the form of `movable.sed`. 1. Open [Bruteforce Movable](https://seedminer.hacks.guide/) on your computer - + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) + If the site isn't working, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field - + Do not attempt to enter the ID0 by hand. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section + + Do not attempt to enter the ID0 manually, as it is easy to make a mistake. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section 1. Select "Go" + If the site immediately goes to step 4, the website has already correctly processed your bruteforce request. You can download your `movable.sed` file and continue to the next section. You do not need to re-add the bot -1. Use the "Register Friend" button on your device to add the bot's friend code as given by the website +1. Use the ["Register Friend" button](/images/screenshots/seedminer/register-friend.png) on your device to add the bot's friend code as given by the website + If prompted, the name that you give to the friend does not matter 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once 1. Once the site processes your information, the site will continue to `Step 2: Bruteforce` automatically 1. Wait for the remainder of the process to complete - + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour + + This is usually fast (1-5 minutes) + During this process, the bot you added may not show up on your 3DS. As long as the website updates, this is not an issue + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site @@ -57,7 +59,7 @@ This method uses a powerful graphics card to perform the calculations needed. A ___ -### Next Steps +### Next steps: Choose an exploit Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. diff --git a/_pages/ca_ES/bannerbomb3.txt b/_pages/ca_ES/bannerbomb3.txt index a0b1ef007e..5a46749529 100644 --- a/_pages/ca_ES/bannerbomb3.txt +++ b/_pages/ca_ES/bannerbomb3.txt @@ -4,11 +4,15 @@ title: "BannerBomb3" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

For a more technical explanation, see here.

+
+{: .notice--info} -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -20,6 +24,9 @@ If you have a Taiwanese console (indicated by a T after the system version), fol * Your `movable.sed` file from completing [Seedminer](seedminer) #### Section I - Prep Work + +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + 1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer 1. Upload your movable.sed using the "Choose File" option 1. Click "Build and Download" @@ -27,28 +34,31 @@ If you have a Taiwanese console (indicated by a T after the system version), fol 1. If your console is powered on, power off your console 1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from the BannerBomb3 `.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section +1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked 1. Power off your device 1. Insert your SD card into your computer -1. You should now have `42383841.bin` in SD root. This is the DSiWare backup you will use later in the guide -1. Navigate to `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card - + This `` will be the same one that you used in [Seedminer](seedminer) -1. Delete `F00D43D5.bin` from the Nintendo DSiWare folder and from your computer. This file will not be needed anymore +1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore + Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} diff --git a/_pages/ca_ES/finalizing-setup.txt b/_pages/ca_ES/finalizing-setup.txt index 05d18a1a82..3ecdf12e03 100644 --- a/_pages/ca_ES/finalizing-setup.txt +++ b/_pages/ca_ES/finalizing-setup.txt @@ -20,6 +20,8 @@ On this page, we will make critical system file backups and install the followin It is not recommended to skip downloading any of these applications, as many of them will be used later on this page. At the end of this page, your SD card will be cleaned up by removing unnecessary installation files. {: .notice--warning} +### Compatibility Notes + If your **New 3DS** was on version 2.1.0 before following this guide, you should [restore your NAND backup](godmode9-usage#restoring-a-nand-backup) before continuing. {: .notice--warning} @@ -39,6 +41,8 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o #### Section I - Prep Work +In this section, you will copy the files necessary to follow the rest of the instructions on this page. + 1. Power off your device 1. Insert your SD card into your computer 1. Create a folder named `cias` on the root of your SD card if it does not already exist @@ -52,15 +56,20 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o 1. Reinsert your SD card into your device 1. Power on your device - ![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) - {: .notice--info} - ![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) - {: .notice--info} +The screenshots below indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. + +![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) +{: .notice--info} + -These screenshots indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. #### Section II - Updating the System +In this section, you will update your system to the latest version, which is safe to do with custom firmware. + 1. Update your device by going to System Settings, then "Other Settings", then going all the way to the right and using "System Update" + Updates while using B9S + Luma (what you have) are safe + The updater may display a message saying "Your system is up to date" instead of updating. This is normal if you are already up to date; continue with the next section @@ -69,6 +78,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section III - Homebrew Launcher +In this section, you will temporarily replace Download Play with Homebrew Launcher (which we need to launch FBI). Download Play will automatically go back to normal once you reboot your device. + 1. Launch the Download Play application (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. Wait until you see the `Nintendo 3DS` and `Nintendo DS` buttons 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu @@ -83,6 +94,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section IV - RTC and DSP Setup +In this section, you will sync your 3DS internal clock with the actual time and dump the sound firmware (which is necesssary for some homebrew software to use sound properly). + 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu 1. Select "Miscellaneous options" 1. Select "Dump DSP firmware" @@ -94,6 +107,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section V - Installing CIAs +In this section, you will install several useful homebrew applications to HOME Menu. + 1. Launch FBI from the list of homebrew 1. Navigate to `SD` -> `cias` 1. Select "\" @@ -102,6 +117,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VI - CTRNAND Luma3DS +In this section, you will use a script to copy some of Luma3DS's files to internal memory so that they can be accessed, even without an SD card inserted. + 1. Power off your device 1. Press and hold (Start), and while holding (Start), power on your device. This will launch GodMode9 + If you do not boot into GodMode9, ensure that `GodMode9.firm` is in `/luma/payloads/` and that `payloads` is correctly spelled @@ -118,6 +135,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VII - Cleanup SD Card +In this section, you will use a script to remove some unnecessary files from your SD card. + 1. Select "Cleanup SD Card" 1. When prompted, press (A) to proceed 1. Press (A) to continue @@ -125,6 +144,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VIII - Backup Essential Files +In this section, you will make backups of flies that can be used to recover from softwaer bricks or to recover data. + 1. Select "Backup Options" 1. Select "SysNAND Backup" 1. Premeu (A) per confirmar @@ -159,7 +180,7 @@ You're done! Custom firmware is now fully configured on your device. Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! {: .notice--info} -#### Information and Notes +### Information and Notes {% capture notice-6 %} Here are some key combos that you should know: diff --git a/_pages/ca_ES/homebrew-launcher-(pichaxx).txt b/_pages/ca_ES/homebrew-launcher-(pichaxx).txt index 6348abc52a..aff6795262 100644 --- a/_pages/ca_ES/homebrew-launcher-(pichaxx).txt +++ b/_pages/ca_ES/homebrew-launcher-(pichaxx).txt @@ -4,9 +4,17 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. +
+{: .notice--info} -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE to run SafeB9SInstaller. +### Compatibility Notes + +These instructions work on USA, Europe, and Japan consoles as indicated by the letters U, E, or J after the system version. + +You will need a Nintendo Network ID to download Pokémon Picross. This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. {: .notice--warning} @@ -24,15 +32,8 @@ This process will overwrite your Pokémon Picross save file, if you have one. If #### Section I - Prep Work -1. Power on your device -1. Open the Nintendo eShop -1. Tap the Search icon (small magnifying glass) -1. Search for `picross` -1. Open the store page for Pokémon Picross -1. Download Pokémon Picross - + You can scan [this QR code](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=ESHOP://50010000037815&margin=0&qzone=1&size=400x400&ecc=L) using the Nintendo 3DS Camera for a direct link to the eShop app - + Your SD card must be inserted in your device to install Pokémon Picross -1. Power off your device +In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. + 1. Insert your SD card into your computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it @@ -40,8 +41,16 @@ This process will overwrite your Pokémon Picross save file, if you have one. If 1. Copy the `slotTool` folder from the unSAFE_MODE `.zip` to the `3ds` folder on your SD card 1. Copy the otherapp payload for your region/version from the unSAFE_MODE `.zip`'s `otherapps_with_CfgS` folder to the root of your SD card and rename it to `otherapp.bin` +![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }}) +{: .notice--info} + + #### Section II - PicHaxx +In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device. 1. Open [the PicHaxx Injector website](https://3ds.nhnarwhal.com/3dstools/pichaxx.php) on your computer 1. Select your `movable.sed` file 1. Select "Build and Download" diff --git a/_pages/ca_ES/installing-boot9strap-(fredtool).txt b/_pages/ca_ES/installing-boot9strap-(fredtool).txt index 78598ce783..1f7825ac28 100644 --- a/_pages/ca_ES/installing-boot9strap-(fredtool).txt +++ b/_pages/ca_ES/installing-boot9strap-(fredtool).txt @@ -4,15 +4,16 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Table of Contents" %} -### Required Reading - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, for example from BannerBomb or the DSiWare Dumper tool. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). +
+Technical Details (optional) +

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+
+{: .notice--info} ### What You Need -* A DSiWare Backup (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) +* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -20,6 +21,8 @@ This is a currently working implementation of the "FIRM partitions known-plainte #### Section I - CFW Check +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + 1. Power off your device 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button @@ -30,17 +33,7 @@ If you see a configuration menu, you already have CFW, and continuing with these #### Section II - Prep Work -1. Power off your device -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card - - ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} - -#### Section III - Fredtool +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) @@ -53,19 +46,31 @@ If you see a configuration menu, you already have CFW, and continuing with these 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link +1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` - + If the `Nintendo DSiWare` folder does not exist, create it inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` 1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder -1. Reinsert your SD card into your device + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card + + ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} + +#### Section III - Overwriting DS Connection Settings + +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Haxxxxxxxxx!" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title 1. Select "Copy", then select "OK" 1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio #### Section IV - Flipnote Exploit @@ -73,6 +78,8 @@ If you see a configuration menu, you already have CFW, and continuing with these If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} +In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer. + 1. Complete the initial setup process for the launched game until you reach the main menu + Select the left option whenever prompted during the setup process 1. Using the touch-screen, select the large left box, then select the box with an SD card icon @@ -85,7 +92,7 @@ If you would prefer a visual guide to this section, one is available [here](http 1. Tap the fourth box with the letter "A" in it 1. If the exploit was successful, your device will have loaded b9sTool 1. Using the D-Pad, move to "Install boot9strap" - + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to start over from Step 12 of Section III + + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III 1. Press (A), then press START and SELECT at the same time to begin the process 1. Once completed and the bottom screen says "done.", exit b9sTool, then power off your device + You may have to force power off by holding the power button @@ -94,6 +101,8 @@ If you would prefer a visual guide to this section, one is available [here](http #### Section V - Luma3DS Verification +Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. + 1. Power off your device 1. Insert your SD card into your computer 1. Verify that a `luma` folder exists and that `config.ini` is inside of it @@ -106,13 +115,15 @@ At this point, your console will boot to Luma3DS by default. #### Section VI - Restoring DS Connection Settings -1. Copy the `42383841.bin` file from the `clean/` folder of the downloaded DSiWare archive (`output_(name).zip`) to the `Nintendo 3DS///Nintendo DSiWare/` folder on your SD card - + Replace the existing `42383841.bin` file +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Nintendo DSi™" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title 1. Select "Copy", then select "OK" ___ diff --git a/_pages/ca_ES/installing-boot9strap-(hbl-usm).txt b/_pages/ca_ES/installing-boot9strap-(hbl-usm).txt index 142604d9b0..6c9a3f849c 100644 --- a/_pages/ca_ES/installing-boot9strap-(hbl-usm).txt +++ b/_pages/ca_ES/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,16 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

As we already have Homebrew access, we can use slotTool to do this.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--danger} @@ -24,7 +27,10 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint #### Section I - Prep Work +In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. + 1. Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide + + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. Launch slotTool from the list of homebrew + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section 1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option @@ -36,22 +42,31 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint 1. Copy `usm.bin` from the unSAFE_MODE `.zip` to the root of your SD card 1. Put your SD card back into your console +![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} + #### Section II - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](https://uwuu.ca/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section III - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -65,6 +80,8 @@ At this point, your console will boot to Luma3DS by default. #### Section IV - Restoring WiFi Configuration Profiles +In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch the Download Play application 1. Wait until you see the two buttons + Do not press either of the buttons diff --git a/_pages/ca_ES/installing-boot9strap-(soundhax).txt b/_pages/ca_ES/installing-boot9strap-(soundhax).txt index 2302a85291..d9c13f9bc7 100644 --- a/_pages/ca_ES/installing-boot9strap-(soundhax).txt +++ b/_pages/ca_ES/installing-boot9strap-(soundhax).txt @@ -4,7 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+
+{: .notice--info} + +### Compatibility Notes Soundhax (when combined with universal-otherapp) is compatible with versions 1.0.0 through 11.3.0 in all regions. @@ -21,6 +27,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Section I - Prep Work +In this section, you will copy the files needed to trigger both Soundhax and universal-otherapp. + 1. Power off your device 1. Insert your SD card into your computer 1. Copy the Soundhax `.m4a` to the root of your SD card @@ -33,11 +41,16 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 1. Reinsert your SD card into your device 1. Power on your device - ![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} #### Section II - Launching SafeB9SInstaller +In this section, you will launch Soundhax through the Nintendo 3DS Sound app, which will use universal-otherapp to launch the boot9strap (custom firmware) installer. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch Nintendo 3DS Sound @@ -58,6 +71,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Section III - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap 1. Once it is complete, press (A) to reboot your device 1. Your device should have rebooted into the Luma3DS configuration menu diff --git a/_pages/ca_ES/installing-boot9strap-(usm).txt b/_pages/ca_ES/installing-boot9strap-(usm).txt index 6e148372c2..b58fa784a2 100644 --- a/_pages/ca_ES/installing-boot9strap-(usm).txt +++ b/_pages/ca_ES/installing-boot9strap-(usm).txt @@ -4,15 +4,17 @@ title: "Installing boot9strap (USM)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

We can do this using an existing exploit, BannerBomb3.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -29,6 +31,8 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will #### Section I - Prep Work +In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. + 1. If your device is powered on, power off your device 1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer 1. Upload your movable.sed using the "Choose File" option @@ -41,47 +45,51 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will 1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card 1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - + ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }}) - {: .notice--info} - + ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} + ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card 1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Select "Inject haxx" +1. Press (A) to select "Inject haxx" + Your device will automatically power off #### Section III - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section IV - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -95,16 +103,17 @@ At this point, your console will boot to Luma3DS by default. #### Section V - Restoring WiFi Configuration Profiles +In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text -1. Select "Restore slots" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) +1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + Your device will automatically reboot 1. Power off your device 1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore ___ diff --git a/_pages/ca_ES/seedminer.txt b/_pages/ca_ES/seedminer.txt index 44fe68e7b6..871d46e5cd 100644 --- a/_pages/ca_ES/seedminer.txt +++ b/_pages/ca_ES/seedminer.txt @@ -4,52 +4,54 @@ title: "Seedminer" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

+

For information on how Seedminer works, see this presentation.

+

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+
+{: .notice--info} -To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. +### Section I - Prep Work -For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). - -This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. - -### Instructions - -#### Section I - Prep Work +In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. 1. Insert your SD card into your computer 1. Navigate to the `Nintendo 3DS` folder on your SD card -1. Copy the 32 character long name of the folder you see inside Nintendo 3DS - + Do not go inside any more folders - + If you see multiple 32 character long folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + + If you don't have a `Nintendo 3DS` folder, put your SD card into your 3DS and power it on so that the folder can be created +1. Copy the name of the 32-letter folder you see directly inside Nintendo 3DS + + This 32-letter name is system-specific and will be different for each console + + If you see multiple 32-letter folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + You can ignore the `private` folder if you have it - ![]({{ "/images/screenshots/id0-example.png" | absolute_url }}) + ![]({{ "/images/screenshots/seedminer/id0-example.png" | absolute_url }}) {: .notice--info} -1. Paste your 32 character long folder name into a document you can reference later - + This folder name is also known as your "ID0" +1. Paste your 32 character long folder name into [a document](/images/screenshots/seedminer/text-document.png) you can reference later + + This folder is known as your "ID0". Take note of this as this guide will refer to it as such later 1. Power on your device + Your SD card does not need to be inserted at this point 1. Go to your Friend List (the [orange Face Icon]({{ "/images/friend-list-icon.png" | absolute_url }}) in the top row of your HOME Menu) + If you receive an error and are kicked out of the menu, you either must create a new Mii or your device cannot connect to Nintendo's servers (due to a ban or connection issues) 1. Find your Mii profile, then find the "Friend Code" field on the top screen -#### Section II - Seedminer +### Section II - Seedminer + +In this section, you will use the Bruteforce Movable website to retrieve your device's encryption key in the form of `movable.sed`. 1. Open [Bruteforce Movable](https://seedminer.hacks.guide/) on your computer - + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) + If the site isn't working, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field - + Do not attempt to enter the ID0 by hand. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section + + Do not attempt to enter the ID0 manually, as it is easy to make a mistake. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section 1. Select "Go" + If the site immediately goes to step 4, the website has already correctly processed your bruteforce request. You can download your `movable.sed` file and continue to the next section. You do not need to re-add the bot -1. Use the "Register Friend" button on your device to add the bot's friend code as given by the website +1. Use the ["Register Friend" button](/images/screenshots/seedminer/register-friend.png) on your device to add the bot's friend code as given by the website + If prompted, the name that you give to the friend does not matter 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once 1. Once the site processes your information, the site will continue to `Step 2: Bruteforce` automatically 1. Wait for the remainder of the process to complete - + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour + + This is usually fast (1-5 minutes) + During this process, the bot you added may not show up on your 3DS. As long as the website updates, this is not an issue + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site @@ -57,7 +59,7 @@ This method uses a powerful graphics card to perform the calculations needed. A ___ -### Next Steps +### Next steps: Choose an exploit Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. diff --git a/_pages/cs_CZ/bannerbomb3.txt b/_pages/cs_CZ/bannerbomb3.txt index a0b1ef007e..5a46749529 100644 --- a/_pages/cs_CZ/bannerbomb3.txt +++ b/_pages/cs_CZ/bannerbomb3.txt @@ -4,11 +4,15 @@ title: "BannerBomb3" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

For a more technical explanation, see here.

+
+{: .notice--info} -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -20,6 +24,9 @@ If you have a Taiwanese console (indicated by a T after the system version), fol * Your `movable.sed` file from completing [Seedminer](seedminer) #### Section I - Prep Work + +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + 1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer 1. Upload your movable.sed using the "Choose File" option 1. Click "Build and Download" @@ -27,28 +34,31 @@ If you have a Taiwanese console (indicated by a T after the system version), fol 1. If your console is powered on, power off your console 1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from the BannerBomb3 `.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section +1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked 1. Power off your device 1. Insert your SD card into your computer -1. You should now have `42383841.bin` in SD root. This is the DSiWare backup you will use later in the guide -1. Navigate to `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card - + This `` will be the same one that you used in [Seedminer](seedminer) -1. Delete `F00D43D5.bin` from the Nintendo DSiWare folder and from your computer. This file will not be needed anymore +1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore + Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} diff --git a/_pages/cs_CZ/finalizing-setup.txt b/_pages/cs_CZ/finalizing-setup.txt index c5b41ec5b8..29ed5ffea6 100644 --- a/_pages/cs_CZ/finalizing-setup.txt +++ b/_pages/cs_CZ/finalizing-setup.txt @@ -20,6 +20,8 @@ On this page, we will make critical system file backups and install the followin It is not recommended to skip downloading any of these applications, as many of them will be used later on this page. At the end of this page, your SD card will be cleaned up by removing unnecessary installation files. {: .notice--warning} +### Compatibility Notes + If your **New 3DS** was on version 2.1.0 before following this guide, you should [restore your NAND backup](godmode9-usage#restoring-a-nand-backup) before continuing. {: .notice--warning} @@ -39,6 +41,8 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o #### Section I - Prep Work +In this section, you will copy the files necessary to follow the rest of the instructions on this page. + 1. Power off your device 1. Insert your SD card into your computer 1. Create a folder named `cias` on the root of your SD card if it does not already exist @@ -52,15 +56,20 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o 1. Reinsert your SD card into your device 1. Power on your device - ![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) - {: .notice--info} - ![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) - {: .notice--info} +The screenshots below indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. + +![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) +{: .notice--info} + -These screenshots indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. #### Section II - Updating the System +In this section, you will update your system to the latest version, which is safe to do with custom firmware. + 1. Update your device by going to System Settings, then "Other Settings", then going all the way to the right and using "System Update" + Updates while using B9S + Luma (what you have) are safe + The updater may display a message saying "Your system is up to date" instead of updating. This is normal if you are already up to date; continue with the next section @@ -69,6 +78,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section III - Homebrew Launcher +In this section, you will temporarily replace Download Play with Homebrew Launcher (which we need to launch FBI). Download Play will automatically go back to normal once you reboot your device. + 1. Launch the Download Play application (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. Wait until you see the `Nintendo 3DS` and `Nintendo DS` buttons 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu @@ -83,6 +94,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section IV - RTC and DSP Setup +In this section, you will sync your 3DS internal clock with the actual time and dump the sound firmware (which is necesssary for some homebrew software to use sound properly). + 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu 1. Select "Miscellaneous options" 1. Select "Dump DSP firmware" @@ -94,6 +107,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section V - Installing CIAs +In this section, you will install several useful homebrew applications to HOME Menu. + 1. Launch FBI from the list of homebrew 1. Navigate to `SD` -> `cias` 1. Select "\" @@ -102,6 +117,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VI - CTRNAND Luma3DS +In this section, you will use a script to copy some of Luma3DS's files to internal memory so that they can be accessed, even without an SD card inserted. + 1. Power off your device 1. Press and hold (Start), and while holding (Start), power on your device. This will launch GodMode9 + If you do not boot into GodMode9, ensure that `GodMode9.firm` is in `/luma/payloads/` and that `payloads` is correctly spelled @@ -118,6 +135,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VII - Cleanup SD Card +In this section, you will use a script to remove some unnecessary files from your SD card. + 1. Select "Cleanup SD Card" 1. When prompted, press (A) to proceed 1. Press (A) to continue @@ -125,6 +144,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VIII - Backup Essential Files +In this section, you will make backups of flies that can be used to recover from softwaer bricks or to recover data. + 1. Select "Backup Options" 1. Select "SysNAND Backup" 1. Press (A) to confirm @@ -159,7 +180,7 @@ You're done! Custom firmware is now fully configured on your device. Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! {: .notice--info} -#### Information and Notes +### Information and Notes {% capture notice-6 %} Here are some key combos that you should know: diff --git a/_pages/cs_CZ/homebrew-launcher-(pichaxx).txt b/_pages/cs_CZ/homebrew-launcher-(pichaxx).txt index 6348abc52a..aff6795262 100644 --- a/_pages/cs_CZ/homebrew-launcher-(pichaxx).txt +++ b/_pages/cs_CZ/homebrew-launcher-(pichaxx).txt @@ -4,9 +4,17 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. +
+{: .notice--info} -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE to run SafeB9SInstaller. +### Compatibility Notes + +These instructions work on USA, Europe, and Japan consoles as indicated by the letters U, E, or J after the system version. + +You will need a Nintendo Network ID to download Pokémon Picross. This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. {: .notice--warning} @@ -24,15 +32,8 @@ This process will overwrite your Pokémon Picross save file, if you have one. If #### Section I - Prep Work -1. Power on your device -1. Open the Nintendo eShop -1. Tap the Search icon (small magnifying glass) -1. Search for `picross` -1. Open the store page for Pokémon Picross -1. Download Pokémon Picross - + You can scan [this QR code](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=ESHOP://50010000037815&margin=0&qzone=1&size=400x400&ecc=L) using the Nintendo 3DS Camera for a direct link to the eShop app - + Your SD card must be inserted in your device to install Pokémon Picross -1. Power off your device +In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. + 1. Insert your SD card into your computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it @@ -40,8 +41,16 @@ This process will overwrite your Pokémon Picross save file, if you have one. If 1. Copy the `slotTool` folder from the unSAFE_MODE `.zip` to the `3ds` folder on your SD card 1. Copy the otherapp payload for your region/version from the unSAFE_MODE `.zip`'s `otherapps_with_CfgS` folder to the root of your SD card and rename it to `otherapp.bin` +![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }}) +{: .notice--info} + + #### Section II - PicHaxx +In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device. 1. Open [the PicHaxx Injector website](https://3ds.nhnarwhal.com/3dstools/pichaxx.php) on your computer 1. Select your `movable.sed` file 1. Select "Build and Download" diff --git a/_pages/cs_CZ/installing-boot9strap-(fredtool).txt b/_pages/cs_CZ/installing-boot9strap-(fredtool).txt index 78598ce783..1f7825ac28 100644 --- a/_pages/cs_CZ/installing-boot9strap-(fredtool).txt +++ b/_pages/cs_CZ/installing-boot9strap-(fredtool).txt @@ -4,15 +4,16 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Table of Contents" %} -### Required Reading - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, for example from BannerBomb or the DSiWare Dumper tool. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). +
+Technical Details (optional) +

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+
+{: .notice--info} ### What You Need -* A DSiWare Backup (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) +* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -20,6 +21,8 @@ This is a currently working implementation of the "FIRM partitions known-plainte #### Section I - CFW Check +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + 1. Power off your device 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button @@ -30,17 +33,7 @@ If you see a configuration menu, you already have CFW, and continuing with these #### Section II - Prep Work -1. Power off your device -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card - - ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} - -#### Section III - Fredtool +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) @@ -53,19 +46,31 @@ If you see a configuration menu, you already have CFW, and continuing with these 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link +1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` - + If the `Nintendo DSiWare` folder does not exist, create it inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` 1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder -1. Reinsert your SD card into your device + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card + + ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} + +#### Section III - Overwriting DS Connection Settings + +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Haxxxxxxxxx!" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title 1. Select "Copy", then select "OK" 1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio #### Section IV - Flipnote Exploit @@ -73,6 +78,8 @@ If you see a configuration menu, you already have CFW, and continuing with these If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} +In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer. + 1. Complete the initial setup process for the launched game until you reach the main menu + Select the left option whenever prompted during the setup process 1. Using the touch-screen, select the large left box, then select the box with an SD card icon @@ -85,7 +92,7 @@ If you would prefer a visual guide to this section, one is available [here](http 1. Tap the fourth box with the letter "A" in it 1. If the exploit was successful, your device will have loaded b9sTool 1. Using the D-Pad, move to "Install boot9strap" - + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to start over from Step 12 of Section III + + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III 1. Press (A), then press START and SELECT at the same time to begin the process 1. Once completed and the bottom screen says "done.", exit b9sTool, then power off your device + You may have to force power off by holding the power button @@ -94,6 +101,8 @@ If you would prefer a visual guide to this section, one is available [here](http #### Section V - Luma3DS Verification +Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. + 1. Power off your device 1. Insert your SD card into your computer 1. Verify that a `luma` folder exists and that `config.ini` is inside of it @@ -106,13 +115,15 @@ At this point, your console will boot to Luma3DS by default. #### Section VI - Restoring DS Connection Settings -1. Copy the `42383841.bin` file from the `clean/` folder of the downloaded DSiWare archive (`output_(name).zip`) to the `Nintendo 3DS///Nintendo DSiWare/` folder on your SD card - + Replace the existing `42383841.bin` file +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Nintendo DSi™" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title 1. Select "Copy", then select "OK" ___ diff --git a/_pages/cs_CZ/installing-boot9strap-(hbl-usm).txt b/_pages/cs_CZ/installing-boot9strap-(hbl-usm).txt index 142604d9b0..6c9a3f849c 100644 --- a/_pages/cs_CZ/installing-boot9strap-(hbl-usm).txt +++ b/_pages/cs_CZ/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,16 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

As we already have Homebrew access, we can use slotTool to do this.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--danger} @@ -24,7 +27,10 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint #### Section I - Prep Work +In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. + 1. Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide + + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. Launch slotTool from the list of homebrew + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section 1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option @@ -36,22 +42,31 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint 1. Copy `usm.bin` from the unSAFE_MODE `.zip` to the root of your SD card 1. Put your SD card back into your console +![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} + #### Section II - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](https://uwuu.ca/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section III - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -65,6 +80,8 @@ At this point, your console will boot to Luma3DS by default. #### Section IV - Restoring WiFi Configuration Profiles +In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch the Download Play application 1. Wait until you see the two buttons + Do not press either of the buttons diff --git a/_pages/cs_CZ/installing-boot9strap-(soundhax).txt b/_pages/cs_CZ/installing-boot9strap-(soundhax).txt index 2302a85291..d9c13f9bc7 100644 --- a/_pages/cs_CZ/installing-boot9strap-(soundhax).txt +++ b/_pages/cs_CZ/installing-boot9strap-(soundhax).txt @@ -4,7 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+
+{: .notice--info} + +### Compatibility Notes Soundhax (when combined with universal-otherapp) is compatible with versions 1.0.0 through 11.3.0 in all regions. @@ -21,6 +27,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Section I - Prep Work +In this section, you will copy the files needed to trigger both Soundhax and universal-otherapp. + 1. Power off your device 1. Insert your SD card into your computer 1. Copy the Soundhax `.m4a` to the root of your SD card @@ -33,11 +41,16 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 1. Reinsert your SD card into your device 1. Power on your device - ![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} #### Section II - Launching SafeB9SInstaller +In this section, you will launch Soundhax through the Nintendo 3DS Sound app, which will use universal-otherapp to launch the boot9strap (custom firmware) installer. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch Nintendo 3DS Sound @@ -58,6 +71,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Section III - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap 1. Once it is complete, press (A) to reboot your device 1. Your device should have rebooted into the Luma3DS configuration menu diff --git a/_pages/cs_CZ/installing-boot9strap-(usm).txt b/_pages/cs_CZ/installing-boot9strap-(usm).txt index 6e148372c2..b58fa784a2 100644 --- a/_pages/cs_CZ/installing-boot9strap-(usm).txt +++ b/_pages/cs_CZ/installing-boot9strap-(usm).txt @@ -4,15 +4,17 @@ title: "Installing boot9strap (USM)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

We can do this using an existing exploit, BannerBomb3.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -29,6 +31,8 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will #### Section I - Prep Work +In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. + 1. If your device is powered on, power off your device 1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer 1. Upload your movable.sed using the "Choose File" option @@ -41,47 +45,51 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will 1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card 1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - + ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }}) - {: .notice--info} - + ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} + ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card 1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Select "Inject haxx" +1. Press (A) to select "Inject haxx" + Your device will automatically power off #### Section III - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section IV - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -95,16 +103,17 @@ At this point, your console will boot to Luma3DS by default. #### Section V - Restoring WiFi Configuration Profiles +In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text -1. Select "Restore slots" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) +1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + Your device will automatically reboot 1. Power off your device 1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore ___ diff --git a/_pages/cs_CZ/seedminer.txt b/_pages/cs_CZ/seedminer.txt index 44fe68e7b6..871d46e5cd 100644 --- a/_pages/cs_CZ/seedminer.txt +++ b/_pages/cs_CZ/seedminer.txt @@ -4,52 +4,54 @@ title: "Seedminer" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

+

For information on how Seedminer works, see this presentation.

+

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+
+{: .notice--info} -To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. +### Section I - Prep Work -For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). - -This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. - -### Instructions - -#### Section I - Prep Work +In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. 1. Insert your SD card into your computer 1. Navigate to the `Nintendo 3DS` folder on your SD card -1. Copy the 32 character long name of the folder you see inside Nintendo 3DS - + Do not go inside any more folders - + If you see multiple 32 character long folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + + If you don't have a `Nintendo 3DS` folder, put your SD card into your 3DS and power it on so that the folder can be created +1. Copy the name of the 32-letter folder you see directly inside Nintendo 3DS + + This 32-letter name is system-specific and will be different for each console + + If you see multiple 32-letter folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + You can ignore the `private` folder if you have it - ![]({{ "/images/screenshots/id0-example.png" | absolute_url }}) + ![]({{ "/images/screenshots/seedminer/id0-example.png" | absolute_url }}) {: .notice--info} -1. Paste your 32 character long folder name into a document you can reference later - + This folder name is also known as your "ID0" +1. Paste your 32 character long folder name into [a document](/images/screenshots/seedminer/text-document.png) you can reference later + + This folder is known as your "ID0". Take note of this as this guide will refer to it as such later 1. Power on your device + Your SD card does not need to be inserted at this point 1. Go to your Friend List (the [orange Face Icon]({{ "/images/friend-list-icon.png" | absolute_url }}) in the top row of your HOME Menu) + If you receive an error and are kicked out of the menu, you either must create a new Mii or your device cannot connect to Nintendo's servers (due to a ban or connection issues) 1. Find your Mii profile, then find the "Friend Code" field on the top screen -#### Section II - Seedminer +### Section II - Seedminer + +In this section, you will use the Bruteforce Movable website to retrieve your device's encryption key in the form of `movable.sed`. 1. Open [Bruteforce Movable](https://seedminer.hacks.guide/) on your computer - + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) + If the site isn't working, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field - + Do not attempt to enter the ID0 by hand. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section + + Do not attempt to enter the ID0 manually, as it is easy to make a mistake. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section 1. Select "Go" + If the site immediately goes to step 4, the website has already correctly processed your bruteforce request. You can download your `movable.sed` file and continue to the next section. You do not need to re-add the bot -1. Use the "Register Friend" button on your device to add the bot's friend code as given by the website +1. Use the ["Register Friend" button](/images/screenshots/seedminer/register-friend.png) on your device to add the bot's friend code as given by the website + If prompted, the name that you give to the friend does not matter 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once 1. Once the site processes your information, the site will continue to `Step 2: Bruteforce` automatically 1. Wait for the remainder of the process to complete - + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour + + This is usually fast (1-5 minutes) + During this process, the bot you added may not show up on your 3DS. As long as the website updates, this is not an issue + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site @@ -57,7 +59,7 @@ This method uses a powerful graphics card to perform the calculations needed. A ___ -### Next Steps +### Next steps: Choose an exploit Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. diff --git a/_pages/de_DE/bannerbomb3.txt b/_pages/de_DE/bannerbomb3.txt index b300372373..0abfcaa144 100644 --- a/_pages/de_DE/bannerbomb3.txt +++ b/_pages/de_DE/bannerbomb3.txt @@ -4,11 +4,15 @@ title: "BannerBomb3" {% include toc title="Inhalt" %} -### Required Reading +
+Technical Details (optional) +

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

For a more technical explanation, see here.

+
+{: .notice--info} -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -20,6 +24,9 @@ If you have a Taiwanese console (indicated by a T after the system version), fol * Your `movable.sed` file from completing [Seedminer](seedminer) #### Schritt I - Vorbereitungen + +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + 1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer 1. Upload your movable.sed using the "Choose File" option 1. Click "Build and Download" @@ -27,28 +34,31 @@ If you have a Taiwanese console (indicated by a T after the system version), fol 1. If your console is powered on, power off your console 1. Stecke deine SD-Karte in deinen Computer 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from the BannerBomb3 `.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. + 1. Stecke deine SD-Karte nun wieder in deinen 3DS 1. Schalte deine Konsole an 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section +1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked 1. Schalte deinen 3DS aus 1. Stecke deine SD-Karte in deinen Computer -1. You should now have `42383841.bin` in SD root. This is the DSiWare backup you will use later in the guide -1. Navigate to `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card - + This `` will be the same one that you used in [Seedminer](seedminer) -1. Delete `F00D43D5.bin` from the Nintendo DSiWare folder and from your computer. This file will not be needed anymore +1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore + Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} diff --git a/_pages/de_DE/finalizing-setup.txt b/_pages/de_DE/finalizing-setup.txt index c26a874bc5..e299e35564 100644 --- a/_pages/de_DE/finalizing-setup.txt +++ b/_pages/de_DE/finalizing-setup.txt @@ -20,6 +20,8 @@ On this page, we will make critical system file backups and install the followin It is not recommended to skip downloading any of these applications, as many of them will be used later on this page. At the end of this page, your SD card will be cleaned up by removing unnecessary installation files. {: .notice--warning} +### Compatibility Notes + If your **New 3DS** was on version 2.1.0 before following this guide, you should [restore your NAND backup](godmode9-usage#restoring-a-nand-backup) before continuing. {: .notice--warning} @@ -39,6 +41,8 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o #### Schritt I - Vorbereitungen +In this section, you will copy the files necessary to follow the rest of the instructions on this page. + 1. Schalte dein Gerät aus 1. Stecke deine SD-Karte in deinen Computer 1. Erstelle einen Ordner namens `cias` im Stammverzeichnis deiner SD-Karte falls er noch nicht existiert @@ -52,15 +56,20 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o 1. Stecke deine SD-Karte wieder in dein Gerät 1. Schalte deine Konsole an - ![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) - {: .notice--info} - ![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) - {: .notice--info} +The screenshots below indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. + +![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) +{: .notice--info} + -These screenshots indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. #### Schritt II - Aktualisierung des Systems +In this section, you will update your system to the latest version, which is safe to do with custom firmware. + 1. Aktualisiere deine Konsole indem du zu den Systemeinstellungen wechselst, danach "Allgemeine Einstellungen" auswählst, ganz nach rechts navigierst (letzter Punkt im unteren Bildschirm) und dann das "System-Update" startest + Updates mit B9S + Luma (welches du hast) sind sicher + The updater may display a message saying "Your system is up to date" instead of updating. This is normal if you are already up to date; continue with the next section @@ -69,6 +78,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section III - Homebrew Launcher +In this section, you will temporarily replace Download Play with Homebrew Launcher (which we need to launch FBI). Download Play will automatically go back to normal once you reboot your device. + 1. Launch the Download Play application (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. Wait until you see the `Nintendo 3DS` and `Nintendo DS` buttons 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu @@ -83,6 +94,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section IV - RTC and DSP Setup +In this section, you will sync your 3DS internal clock with the actual time and dump the sound firmware (which is necesssary for some homebrew software to use sound properly). + 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu 1. Wähle "Miscellaneous options" 1. Select "Dump DSP firmware" @@ -94,6 +107,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section V - Installing CIAs +In this section, you will install several useful homebrew applications to HOME Menu. + 1. Starte FBI aus der Liste des Homebrews 1. Navigiere zu `SD` -> `cias` 1. Wähle "\" @@ -102,6 +117,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Schritt VI - CTRNAND Luma3DS +In this section, you will use a script to copy some of Luma3DS's files to internal memory so that they can be accessed, even without an SD card inserted. + 1. Schalte deinen 3DS aus 1. Press and hold (Start), and while holding (Start), power on your device. This will launch GodMode9 + If you do not boot into GodMode9, ensure that `GodMode9.firm` is in `/luma/payloads/` and that `payloads` is correctly spelled @@ -118,6 +135,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VII - Cleanup SD Card +In this section, you will use a script to remove some unnecessary files from your SD card. + 1. Select "Cleanup SD Card" 1. Drücke (A), wenn du dazu aufgefordert wirst, um fortzufahren 1. Drücke (A) um fortzufahren @@ -125,6 +144,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VIII - Backup Essential Files +In this section, you will make backups of flies that can be used to recover from softwaer bricks or to recover data. + 1. Select "Backup Options" 1. Select "SysNAND Backup" 1. Drücke (A) zum bestätigen @@ -159,7 +180,7 @@ You're done! Custom firmware is now fully configured on your device. Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! {: .notice--info} -#### Information and Notes +### Information and Notes {% capture notice-6 %} Here are some key combos that you should know: diff --git a/_pages/de_DE/homebrew-launcher-(pichaxx).txt b/_pages/de_DE/homebrew-launcher-(pichaxx).txt index b9373063d7..ae6e10c419 100644 --- a/_pages/de_DE/homebrew-launcher-(pichaxx).txt +++ b/_pages/de_DE/homebrew-launcher-(pichaxx).txt @@ -4,9 +4,17 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Inhalt" %} -### Required Reading +
+Technical Details (optional) +This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. +
+{: .notice--info} -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE to run SafeB9SInstaller. +### Compatibility Notes + +These instructions work on USA, Europe, and Japan consoles as indicated by the letters U, E, or J after the system version. + +You will need a Nintendo Network ID to download Pokémon Picross. This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. {: .notice--warning} @@ -24,15 +32,8 @@ This process will overwrite your Pokémon Picross save file, if you have one. If #### Schritt I - Vorbereitungen -1. Schalte deine Konsole an -1. Open the Nintendo eShop -1. Tap the Search icon (small magnifying glass) -1. Search for `picross` -1. Open the store page for Pokémon Picross -1. Download Pokémon Picross - + You can scan [this QR code](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=ESHOP://50010000037815&margin=0&qzone=1&size=400x400&ecc=L) using the Nintendo 3DS Camera for a direct link to the eShop app - + Your SD card must be inserted in your device to install Pokémon Picross -1. Schalte deinen 3DS aus +In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. + 1. Stecke deine SD-Karte in deinen Computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it @@ -40,8 +41,16 @@ This process will overwrite your Pokémon Picross save file, if you have one. If 1. Copy the `slotTool` folder from the unSAFE_MODE `.zip` to the `3ds` folder on your SD card 1. Copy the otherapp payload for your region/version from the unSAFE_MODE `.zip`'s `otherapps_with_CfgS` folder to the root of your SD card and rename it to `otherapp.bin` +![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }}) +{: .notice--info} + + #### Section II - PicHaxx +In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device. 1. Open [the PicHaxx Injector website](https://3ds.nhnarwhal.com/3dstools/pichaxx.php) on your computer 1. Select your `movable.sed` file 1. Select "Build and Download" diff --git a/_pages/de_DE/installing-boot9strap-(fredtool).txt b/_pages/de_DE/installing-boot9strap-(fredtool).txt index b8d2b38c10..83f686c572 100644 --- a/_pages/de_DE/installing-boot9strap-(fredtool).txt +++ b/_pages/de_DE/installing-boot9strap-(fredtool).txt @@ -4,15 +4,16 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Inhalt" %} -### Required Reading - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, for example from BannerBomb or the DSiWare Dumper tool. - -Dies ist eine zurzeit funktionierende Implementation des "FIRM Partitions Known-Plaintext"-Exploits. Details findest du [hier](https://www.3dbrew.org/wiki/3DS_System_Flaws). +
+Technical Details (optional) +

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+
+{: .notice--info} ### Was du brauchst -* A DSiWare Backup (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) +* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -20,6 +21,8 @@ Dies ist eine zurzeit funktionierende Implementation des "FIRM Partitions Known- #### Section I - CFW Check +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + 1. Schalte deinen 3DS aus 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button @@ -30,17 +33,7 @@ If you see a configuration menu, you already have CFW, and continuing with these #### Section II - Prep Work -1. Schalte deinen 3DS aus -1. Stecke deine SD-Karte in deinen Computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card - - ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} - -#### Section III - Fredtool +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) @@ -53,19 +46,31 @@ If you see a configuration menu, you already have CFW, and continuing with these 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link +1. Stecke deine SD-Karte in deinen Computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` - + If the `Nintendo DSiWare` folder does not exist, create it inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` 1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder -1. Stecke deine SD-Karte nun wieder in deinen 3DS + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card + + ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} + +#### Section III - Overwriting DS Connection Settings + +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + 1. Schalte deine Konsole an 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Haxxxxxxxxx!" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title 1. Select "Copy", then select "OK" 1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio #### Section IV - Flipnote Exploit @@ -73,6 +78,8 @@ If you see a configuration menu, you already have CFW, and continuing with these If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} +In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer. + 1. Complete the initial setup process for the launched game until you reach the main menu + Select the left option whenever prompted during the setup process 1. Using the touch-screen, select the large left box, then select the box with an SD card icon @@ -85,7 +92,7 @@ If you would prefer a visual guide to this section, one is available [here](http 1. Tap the fourth box with the letter "A" in it 1. If the exploit was successful, your device will have loaded b9sTool 1. Using the D-Pad, move to "Install boot9strap" - + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to start over from Step 12 of Section III + + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III 1. Press (A), then press START and SELECT at the same time to begin the process 1. Once completed and the bottom screen says "done.", exit b9sTool, then power off your device + Unter Umständen musst du das Ausschalten der Konsole erzwingen indem du den Power-Knopf gedrückt hälst @@ -94,6 +101,8 @@ If you would prefer a visual guide to this section, one is available [here](http #### Section V - Luma3DS Verification +Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. + 1. Schalte deinen 3DS aus 1. Stecke deine SD-Karte in deinen Computer 1. Verify that a `luma` folder exists and that `config.ini` is inside of it @@ -106,13 +115,15 @@ At this point, your console will boot to Luma3DS by default. #### Section VI - Restoring DS Connection Settings -1. Copy the `42383841.bin` file from the `clean/` folder of the downloaded DSiWare archive (`output_(name).zip`) to the `Nintendo 3DS///Nintendo DSiWare/` folder on your SD card - + Replace the existing `42383841.bin` file +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one 1. Stecke deine SD-Karte nun wieder in deinen 3DS 1. Schalte deine Konsole an 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Nintendo DSi™" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title 1. Select "Copy", then select "OK" ___ diff --git a/_pages/de_DE/installing-boot9strap-(hbl-usm).txt b/_pages/de_DE/installing-boot9strap-(hbl-usm).txt index be00c8c2d5..5feb1722cb 100644 --- a/_pages/de_DE/installing-boot9strap-(hbl-usm).txt +++ b/_pages/de_DE/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,16 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Inhalt" %} -### Required Reading +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

As we already have Homebrew access, we can use slotTool to do this.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--danger} @@ -24,7 +27,10 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint #### Schritt I - Vorbereitungen +In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. + 1. Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide + + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. Launch slotTool from the list of homebrew + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section 1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option @@ -36,22 +42,31 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint 1. Copy `usm.bin` from the unSAFE_MODE `.zip` to the root of your SD card 1. Put your SD card back into your console +![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} + #### Section II - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](https://uwuu.ca/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Schritt III - boot9strap installieren +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -65,6 +80,8 @@ At this point, your console will boot to Luma3DS by default. #### Section IV - Restoring WiFi Configuration Profiles +In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Starte die Download-Spiel Anwendung 1. Wait until you see the two buttons + Do not press either of the buttons diff --git a/_pages/de_DE/installing-boot9strap-(soundhax).txt b/_pages/de_DE/installing-boot9strap-(soundhax).txt index aba9148e8e..d6249d8dca 100644 --- a/_pages/de_DE/installing-boot9strap-(soundhax).txt +++ b/_pages/de_DE/installing-boot9strap-(soundhax).txt @@ -4,7 +4,13 @@ title: "Installation von boot9strap (Soundhax)" {% include toc title="Inhalt" %} -### Required Reading +
+Technical Details (optional) +

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+
+{: .notice--info} + +### Compatibility Notes Soundhax (when combined with universal-otherapp) is compatible with versions 1.0.0 through 11.3.0 in all regions. @@ -21,6 +27,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Schritt I - Vorbereitungen +In this section, you will copy the files needed to trigger both Soundhax and universal-otherapp. + 1. Schalte deinen 3DS aus 1. Stecke deine SD-Karte in deinen Computer 1. Kopiere die Soundhax`.m4a` in das Stammverzeichnis der SD-Karte @@ -33,11 +41,16 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 1. Stecke deine SD-Karte nun wieder in deinen 3DS 1. Schalte deine Konsole an - ![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} #### Schritt II - Starten von SafeBS9Installer +In this section, you will launch Soundhax through the Nintendo 3DS Sound app, which will use universal-otherapp to launch the boot9strap (custom firmware) installer. + 1. Stecke deine SD-Karte nun wieder in deinen 3DS 1. Schalte deine Konsole an 1. Starte die Nintendo 3DS Sound App @@ -58,6 +71,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Schritt III - boot9strap installieren +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap 1. Once it is complete, press (A) to reboot your device 1. Dein Gerät sollte neu starten und die Luma3DS Konfiguration anzeigen diff --git a/_pages/de_DE/installing-boot9strap-(usm).txt b/_pages/de_DE/installing-boot9strap-(usm).txt index 50aec295e2..c79871c0fa 100644 --- a/_pages/de_DE/installing-boot9strap-(usm).txt +++ b/_pages/de_DE/installing-boot9strap-(usm).txt @@ -4,15 +4,17 @@ title: "Installing boot9strap (USM)" {% include toc title="Inhalt" %} -### Required Reading +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

We can do this using an existing exploit, BannerBomb3.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -29,6 +31,8 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will #### Schritt I - Vorbereitungen +In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. + 1. If your device is powered on, power off your device 1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer 1. Upload your movable.sed using the "Choose File" option @@ -41,47 +45,51 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will 1. Kopiere `boot9strap.firm` und `boot9strap.firm.sha` aus der boot9strap `.zip` in den `/boot9strap/`-Ordner auf deiner SD-Karte 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card 1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - + ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }}) - {: .notice--info} - + ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} + ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card 1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. + 1. Stecke deine SD-Karte nun wieder in deinen 3DS 1. Schalte deine Konsole an 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Select "Inject haxx" +1. Press (A) to select "Inject haxx" + Your device will automatically power off #### Section III - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section IV - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -95,16 +103,17 @@ At this point, your console will boot to Luma3DS by default. #### Section V - Restoring WiFi Configuration Profiles +In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text -1. Select "Restore slots" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) +1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + Your device will automatically reboot 1. Schalte deinen 3DS aus 1. Stecke deine SD-Karte in deinen Computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore ___ diff --git a/_pages/de_DE/seedminer.txt b/_pages/de_DE/seedminer.txt index f18fd9a557..a1fcb3867e 100644 --- a/_pages/de_DE/seedminer.txt +++ b/_pages/de_DE/seedminer.txt @@ -4,52 +4,54 @@ title: "Seedminer" {% include toc title="Inhalt" %} -### Required Reading +
+Technical Details (optional) +

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

+

For information on how Seedminer works, see this presentation.

+

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+
+{: .notice--info} -To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. +### Section I - Prep Work -For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). - -This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. - -### Anleitung - -#### Schritt I - Vorbereitungen +In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. 1. Stecke deine SD-Karte in deinen Computer 1. Navigate to the `Nintendo 3DS` folder on your SD card -1. Copy the 32 character long name of the folder you see inside Nintendo 3DS - + Do not go inside any more folders - + If you see multiple 32 character long folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + + If you don't have a `Nintendo 3DS` folder, put your SD card into your 3DS and power it on so that the folder can be created +1. Copy the name of the 32-letter folder you see directly inside Nintendo 3DS + + This 32-letter name is system-specific and will be different for each console + + If you see multiple 32-letter folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + You can ignore the `private` folder if you have it - ![]({{ "/images/screenshots/id0-example.png" | absolute_url }}) + ![]({{ "/images/screenshots/seedminer/id0-example.png" | absolute_url }}) {: .notice--info} -1. Paste your 32 character long folder name into a document you can reference later - + This folder name is also known as your "ID0" +1. Paste your 32 character long folder name into [a document](/images/screenshots/seedminer/text-document.png) you can reference later + + This folder is known as your "ID0". Take note of this as this guide will refer to it as such later 1. Schalte deine Konsole an + Your SD card does not need to be inserted at this point 1. Go to your Friend List (the [orange Face Icon]({{ "/images/friend-list-icon.png" | absolute_url }}) in the top row of your HOME Menu) + If you receive an error and are kicked out of the menu, you either must create a new Mii or your device cannot connect to Nintendo's servers (due to a ban or connection issues) 1. Find your Mii profile, then find the "Friend Code" field on the top screen -#### Section II - Seedminer +### Section II - Seedminer + +In this section, you will use the Bruteforce Movable website to retrieve your device's encryption key in the form of `movable.sed`. 1. Open [Bruteforce Movable](https://seedminer.hacks.guide/) on your computer - + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) + If the site isn't working, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field - + Do not attempt to enter the ID0 by hand. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section + + Do not attempt to enter the ID0 manually, as it is easy to make a mistake. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section 1. Select "Go" + If the site immediately goes to step 4, the website has already correctly processed your bruteforce request. You can download your `movable.sed` file and continue to the next section. You do not need to re-add the bot -1. Use the "Register Friend" button on your device to add the bot's friend code as given by the website +1. Use the ["Register Friend" button](/images/screenshots/seedminer/register-friend.png) on your device to add the bot's friend code as given by the website + If prompted, the name that you give to the friend does not matter 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once 1. Once the site processes your information, the site will continue to `Step 2: Bruteforce` automatically 1. Wait for the remainder of the process to complete - + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour + + This is usually fast (1-5 minutes) + During this process, the bot you added may not show up on your 3DS. As long as the website updates, this is not an issue + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site @@ -57,7 +59,7 @@ This method uses a powerful graphics card to perform the calculations needed. A ___ -### Next Steps +### Next steps: Choose an exploit Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. diff --git a/_pages/el_GR/bannerbomb3.txt b/_pages/el_GR/bannerbomb3.txt index 0c33637a5b..6494452e78 100644 --- a/_pages/el_GR/bannerbomb3.txt +++ b/_pages/el_GR/bannerbomb3.txt @@ -4,11 +4,15 @@ title: "BannerBomb3" {% include toc title="Πίνακας περιεχομένων" %} -### Required Reading +
+Technical Details (optional) +

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

For a more technical explanation, see here.

+
+{: .notice--info} -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -20,6 +24,9 @@ If you have a Taiwanese console (indicated by a T after the system version), fol * Your `movable.sed` file from completing [Seedminer](seedminer) #### Section I - Prep Work + +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + 1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer 1. Upload your movable.sed using the "Choose File" option 1. Click "Build and Download" @@ -27,28 +34,31 @@ If you have a Taiwanese console (indicated by a T after the system version), fol 1. If your console is powered on, power off your console 1. Εισάγετε την κάρτα SD στον υπολογιστή σας 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from the BannerBomb3 `.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section +1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked 1. Power off your device 1. Εισάγετε την κάρτα SD στον υπολογιστή σας -1. You should now have `42383841.bin` in SD root. This is the DSiWare backup you will use later in the guide -1. Navigate to `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card - + This `` will be the same one that you used in [Seedminer](seedminer) -1. Delete `F00D43D5.bin` from the Nintendo DSiWare folder and from your computer. This file will not be needed anymore +1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore + Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} diff --git a/_pages/el_GR/finalizing-setup.txt b/_pages/el_GR/finalizing-setup.txt index 46985bae1e..ddd10c7db0 100644 --- a/_pages/el_GR/finalizing-setup.txt +++ b/_pages/el_GR/finalizing-setup.txt @@ -20,6 +20,8 @@ On this page, we will make critical system file backups and install the followin It is not recommended to skip downloading any of these applications, as many of them will be used later on this page. At the end of this page, your SD card will be cleaned up by removing unnecessary installation files. {: .notice--warning} +### Compatibility Notes + If your **New 3DS** was on version 2.1.0 before following this guide, you should [restore your NAND backup](godmode9-usage#restoring-a-nand-backup) before continuing. {: .notice--warning} @@ -39,6 +41,8 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o #### Section I - Prep Work +In this section, you will copy the files necessary to follow the rest of the instructions on this page. + 1. Power off your device 1. Εισάγετε την κάρτα SD στον υπολογιστή σας 1. Δημιουργήστε έναν φάκελο με το όνομα `cias` στην ρίζα της κάρτας SD, σε περίπτωση που δεν υπάρχει ήδη @@ -52,15 +56,20 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o 1. Reinsert your SD card into your device 1. Power on your device - ![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) - {: .notice--info} - ![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) - {: .notice--info} +The screenshots below indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. + +![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) +{: .notice--info} + -These screenshots indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. #### Section II - Updating the System +In this section, you will update your system to the latest version, which is safe to do with custom firmware. + 1. Update your device by going to System Settings, then "Other Settings", then going all the way to the right and using "System Update" + Updates while using B9S + Luma (what you have) are safe + The updater may display a message saying "Your system is up to date" instead of updating. This is normal if you are already up to date; continue with the next section @@ -69,6 +78,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section III - Homebrew Launcher +In this section, you will temporarily replace Download Play with Homebrew Launcher (which we need to launch FBI). Download Play will automatically go back to normal once you reboot your device. + 1. Launch the Download Play application (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. Wait until you see the `Nintendo 3DS` and `Nintendo DS` buttons 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu @@ -83,6 +94,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section IV - RTC and DSP Setup +In this section, you will sync your 3DS internal clock with the actual time and dump the sound firmware (which is necesssary for some homebrew software to use sound properly). + 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu 1. Select "Miscellaneous options" 1. Select "Dump DSP firmware" @@ -94,6 +107,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section V - Installing CIAs +In this section, you will install several useful homebrew applications to HOME Menu. + 1. Launch FBI from the list of homebrew 1. Navigate to `SD` -> `cias` 1. Επιλέξτε "\" @@ -102,6 +117,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VI - CTRNAND Luma3DS +In this section, you will use a script to copy some of Luma3DS's files to internal memory so that they can be accessed, even without an SD card inserted. + 1. Power off your device 1. Press and hold (Start), and while holding (Start), power on your device. This will launch GodMode9 + If you do not boot into GodMode9, ensure that `GodMode9.firm` is in `/luma/payloads/` and that `payloads` is correctly spelled @@ -118,6 +135,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VII - Cleanup SD Card +In this section, you will use a script to remove some unnecessary files from your SD card. + 1. Select "Cleanup SD Card" 1. When prompted, press (A) to proceed 1. Πατήστε (A) για να συνεχίσετε @@ -125,6 +144,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VIII - Backup Essential Files +In this section, you will make backups of flies that can be used to recover from softwaer bricks or to recover data. + 1. Select "Backup Options" 1. Select "SysNAND Backup" 1. Πατήστε (A) για επιβεβαίωση @@ -159,7 +180,7 @@ You're done! Custom firmware is now fully configured on your device. Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! {: .notice--info} -#### Information and Notes +### Information and Notes {% capture notice-6 %} Here are some key combos that you should know: diff --git a/_pages/el_GR/homebrew-launcher-(pichaxx).txt b/_pages/el_GR/homebrew-launcher-(pichaxx).txt index 7f5e962784..c605a51a2b 100644 --- a/_pages/el_GR/homebrew-launcher-(pichaxx).txt +++ b/_pages/el_GR/homebrew-launcher-(pichaxx).txt @@ -4,9 +4,17 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Πίνακας περιεχομένων" %} -### Required Reading +
+Technical Details (optional) +This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. +
+{: .notice--info} -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE to run SafeB9SInstaller. +### Compatibility Notes + +These instructions work on USA, Europe, and Japan consoles as indicated by the letters U, E, or J after the system version. + +You will need a Nintendo Network ID to download Pokémon Picross. This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. {: .notice--warning} @@ -24,15 +32,8 @@ This process will overwrite your Pokémon Picross save file, if you have one. If #### Section I - Prep Work -1. Power on your device -1. Open the Nintendo eShop -1. Tap the Search icon (small magnifying glass) -1. Search for `picross` -1. Open the store page for Pokémon Picross -1. Download Pokémon Picross - + You can scan [this QR code](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=ESHOP://50010000037815&margin=0&qzone=1&size=400x400&ecc=L) using the Nintendo 3DS Camera for a direct link to the eShop app - + Your SD card must be inserted in your device to install Pokémon Picross -1. Power off your device +In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. + 1. Εισάγετε την κάρτα SD στον υπολογιστή σας 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it @@ -40,8 +41,16 @@ This process will overwrite your Pokémon Picross save file, if you have one. If 1. Copy the `slotTool` folder from the unSAFE_MODE `.zip` to the `3ds` folder on your SD card 1. Copy the otherapp payload for your region/version from the unSAFE_MODE `.zip`'s `otherapps_with_CfgS` folder to the root of your SD card and rename it to `otherapp.bin` +![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }}) +{: .notice--info} + + #### Section II - PicHaxx +In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device. 1. Open [the PicHaxx Injector website](https://3ds.nhnarwhal.com/3dstools/pichaxx.php) on your computer 1. Select your `movable.sed` file 1. Select "Build and Download" diff --git a/_pages/el_GR/installing-boot9strap-(fredtool).txt b/_pages/el_GR/installing-boot9strap-(fredtool).txt index 7388e0e6cc..d8ef6b9db4 100644 --- a/_pages/el_GR/installing-boot9strap-(fredtool).txt +++ b/_pages/el_GR/installing-boot9strap-(fredtool).txt @@ -4,15 +4,16 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Πίνακας περιεχομένων" %} -### Required Reading - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, for example from BannerBomb or the DSiWare Dumper tool. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). +
+Technical Details (optional) +

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+
+{: .notice--info} ### What You Need -* A DSiWare Backup (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) +* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -20,6 +21,8 @@ This is a currently working implementation of the "FIRM partitions known-plainte #### Section I - CFW Check +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + 1. Power off your device 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button @@ -30,17 +33,7 @@ If you see a configuration menu, you already have CFW, and continuing with these #### Section II - Prep Work -1. Power off your device -1. Εισάγετε την κάρτα SD στον υπολογιστή σας -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card - - ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} - -#### Section III - Fredtool +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) @@ -53,19 +46,31 @@ If you see a configuration menu, you already have CFW, and continuing with these 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link +1. Εισάγετε την κάρτα SD στον υπολογιστή σας 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` - + If the `Nintendo DSiWare` folder does not exist, create it inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` 1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder -1. Reinsert your SD card into your device + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card + + ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} + +#### Section III - Overwriting DS Connection Settings + +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Haxxxxxxxxx!" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title 1. Select "Copy", then select "OK" 1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio #### Section IV - Flipnote Exploit @@ -73,6 +78,8 @@ If you see a configuration menu, you already have CFW, and continuing with these If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} +In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer. + 1. Complete the initial setup process for the launched game until you reach the main menu + Select the left option whenever prompted during the setup process 1. Using the touch-screen, select the large left box, then select the box with an SD card icon @@ -85,7 +92,7 @@ If you would prefer a visual guide to this section, one is available [here](http 1. Tap the fourth box with the letter "A" in it 1. If the exploit was successful, your device will have loaded b9sTool 1. Using the D-Pad, move to "Install boot9strap" - + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to start over from Step 12 of Section III + + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III 1. Press (A), then press START and SELECT at the same time to begin the process 1. Once completed and the bottom screen says "done.", exit b9sTool, then power off your device + You may have to force power off by holding the power button @@ -94,6 +101,8 @@ If you would prefer a visual guide to this section, one is available [here](http #### Section V - Luma3DS Verification +Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. + 1. Power off your device 1. Εισάγετε την κάρτα SD στον υπολογιστή σας 1. Verify that a `luma` folder exists and that `config.ini` is inside of it @@ -106,13 +115,15 @@ At this point, your console will boot to Luma3DS by default. #### Section VI - Restoring DS Connection Settings -1. Copy the `42383841.bin` file from the `clean/` folder of the downloaded DSiWare archive (`output_(name).zip`) to the `Nintendo 3DS///Nintendo DSiWare/` folder on your SD card - + Replace the existing `42383841.bin` file +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Nintendo DSi™" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title 1. Select "Copy", then select "OK" ___ diff --git a/_pages/el_GR/installing-boot9strap-(hbl-usm).txt b/_pages/el_GR/installing-boot9strap-(hbl-usm).txt index dbfa724161..149f506982 100644 --- a/_pages/el_GR/installing-boot9strap-(hbl-usm).txt +++ b/_pages/el_GR/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,16 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Πίνακας περιεχομένων" %} -### Required Reading +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

As we already have Homebrew access, we can use slotTool to do this.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--danger} @@ -24,7 +27,10 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint #### Section I - Prep Work +In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. + 1. Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide + + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. Launch slotTool from the list of homebrew + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section 1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option @@ -36,22 +42,31 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint 1. Copy `usm.bin` from the unSAFE_MODE `.zip` to the root of your SD card 1. Put your SD card back into your console +![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} + #### Section II - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](https://uwuu.ca/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section III - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -65,6 +80,8 @@ At this point, your console will boot to Luma3DS by default. #### Section IV - Restoring WiFi Configuration Profiles +In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch the Download Play application 1. Wait until you see the two buttons + Do not press either of the buttons diff --git a/_pages/el_GR/installing-boot9strap-(soundhax).txt b/_pages/el_GR/installing-boot9strap-(soundhax).txt index b1d305604c..a1c9fe2dca 100644 --- a/_pages/el_GR/installing-boot9strap-(soundhax).txt +++ b/_pages/el_GR/installing-boot9strap-(soundhax).txt @@ -4,7 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Πίνακας περιεχομένων" %} -### Required Reading +
+Technical Details (optional) +

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+
+{: .notice--info} + +### Compatibility Notes Soundhax (when combined with universal-otherapp) is compatible with versions 1.0.0 through 11.3.0 in all regions. @@ -21,6 +27,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Section I - Prep Work +In this section, you will copy the files needed to trigger both Soundhax and universal-otherapp. + 1. Power off your device 1. Εισάγετε την κάρτα SD στον υπολογιστή σας 1. Copy the Soundhax `.m4a` to the root of your SD card @@ -33,11 +41,16 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 1. Reinsert your SD card into your device 1. Power on your device - ![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} #### Section II - Launching SafeB9SInstaller +In this section, you will launch Soundhax through the Nintendo 3DS Sound app, which will use universal-otherapp to launch the boot9strap (custom firmware) installer. + 1. Reinsert your SD card into your device 1. Power on your device 1. Εκκινήστε την εφαρμογή Nintendo 3DS Sound @@ -58,6 +71,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Section III - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap 1. Once it is complete, press (A) to reboot your device 1. Your device should have rebooted into the Luma3DS configuration menu diff --git a/_pages/el_GR/installing-boot9strap-(usm).txt b/_pages/el_GR/installing-boot9strap-(usm).txt index cf90350bdb..7b030a8e21 100644 --- a/_pages/el_GR/installing-boot9strap-(usm).txt +++ b/_pages/el_GR/installing-boot9strap-(usm).txt @@ -4,15 +4,17 @@ title: "Installing boot9strap (USM)" {% include toc title="Πίνακας περιεχομένων" %} -### Required Reading +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

We can do this using an existing exploit, BannerBomb3.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -29,6 +31,8 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will #### Section I - Prep Work +In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. + 1. If your device is powered on, power off your device 1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer 1. Upload your movable.sed using the "Choose File" option @@ -41,47 +45,51 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will 1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card 1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - + ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }}) - {: .notice--info} - + ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} + ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card 1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Select "Inject haxx" +1. Press (A) to select "Inject haxx" + Your device will automatically power off #### Section III - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section IV - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -95,16 +103,17 @@ At this point, your console will boot to Luma3DS by default. #### Section V - Restoring WiFi Configuration Profiles +In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text -1. Select "Restore slots" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) +1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + Your device will automatically reboot 1. Power off your device 1. Εισάγετε την κάρτα SD στον υπολογιστή σας 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore ___ diff --git a/_pages/el_GR/seedminer.txt b/_pages/el_GR/seedminer.txt index e929e8a3b5..2504084b7a 100644 --- a/_pages/el_GR/seedminer.txt +++ b/_pages/el_GR/seedminer.txt @@ -4,52 +4,54 @@ title: "Seedminer" {% include toc title="Πίνακας περιεχομένων" %} -### Required Reading +
+Technical Details (optional) +

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

+

For information on how Seedminer works, see this presentation.

+

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+
+{: .notice--info} -To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. +### Section I - Prep Work -For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). - -This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. - -### Instructions - -#### Section I - Prep Work +In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. 1. Εισάγετε την κάρτα SD στον υπολογιστή σας 1. Navigate to the `Nintendo 3DS` folder on your SD card -1. Copy the 32 character long name of the folder you see inside Nintendo 3DS - + Do not go inside any more folders - + If you see multiple 32 character long folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + + If you don't have a `Nintendo 3DS` folder, put your SD card into your 3DS and power it on so that the folder can be created +1. Copy the name of the 32-letter folder you see directly inside Nintendo 3DS + + This 32-letter name is system-specific and will be different for each console + + If you see multiple 32-letter folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + You can ignore the `private` folder if you have it - ![]({{ "/images/screenshots/id0-example.png" | absolute_url }}) + ![]({{ "/images/screenshots/seedminer/id0-example.png" | absolute_url }}) {: .notice--info} -1. Paste your 32 character long folder name into a document you can reference later - + This folder name is also known as your "ID0" +1. Paste your 32 character long folder name into [a document](/images/screenshots/seedminer/text-document.png) you can reference later + + This folder is known as your "ID0". Take note of this as this guide will refer to it as such later 1. Power on your device + Your SD card does not need to be inserted at this point 1. Go to your Friend List (the [orange Face Icon]({{ "/images/friend-list-icon.png" | absolute_url }}) in the top row of your HOME Menu) + If you receive an error and are kicked out of the menu, you either must create a new Mii or your device cannot connect to Nintendo's servers (due to a ban or connection issues) 1. Find your Mii profile, then find the "Friend Code" field on the top screen -#### Section II - Seedminer +### Section II - Seedminer + +In this section, you will use the Bruteforce Movable website to retrieve your device's encryption key in the form of `movable.sed`. 1. Open [Bruteforce Movable](https://seedminer.hacks.guide/) on your computer - + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) + If the site isn't working, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field - + Do not attempt to enter the ID0 by hand. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section + + Do not attempt to enter the ID0 manually, as it is easy to make a mistake. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section 1. Select "Go" + If the site immediately goes to step 4, the website has already correctly processed your bruteforce request. You can download your `movable.sed` file and continue to the next section. You do not need to re-add the bot -1. Use the "Register Friend" button on your device to add the bot's friend code as given by the website +1. Use the ["Register Friend" button](/images/screenshots/seedminer/register-friend.png) on your device to add the bot's friend code as given by the website + If prompted, the name that you give to the friend does not matter 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once 1. Once the site processes your information, the site will continue to `Step 2: Bruteforce` automatically 1. Wait for the remainder of the process to complete - + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour + + This is usually fast (1-5 minutes) + During this process, the bot you added may not show up on your 3DS. As long as the website updates, this is not an issue + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site @@ -57,7 +59,7 @@ This method uses a powerful graphics card to perform the calculations needed. A ___ -### Next Steps +### Next steps: Choose an exploit Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. diff --git a/_pages/en_PT/bannerbomb3.txt b/_pages/en_PT/bannerbomb3.txt index eedf65fbae..2c8053d9cf 100644 --- a/_pages/en_PT/bannerbomb3.txt +++ b/_pages/en_PT/bannerbomb3.txt @@ -4,11 +4,15 @@ title: "BannerBomb3" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

For a more technical explanation, see here.

+
+{: .notice--info} -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -20,6 +24,9 @@ If you have a Taiwanese console (indicated by a T after the system version), fol * Your `movable.sed` file from completing [Seedminer](seedminer) #### Section I - Prep Work + +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + 1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer 1. Upload your movable.sed using the "Choose File" option 1. Click "Build and Download" @@ -27,28 +34,31 @@ If you have a Taiwanese console (indicated by a T after the system version), fol 1. If your console is powered on, power off your console 1. Insert ye SD card into ye computer 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from the BannerBomb3 `.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. + 1. Reinsert ye SD card into ye device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section +1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked 1. Power off ye device 1. Insert ye SD card into ye computer -1. You should now have `42383841.bin` in SD root. This is the DSiWare backup you will use later in the guide -1. Navigate to `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card - + This `` will be the same one that you used in [Seedminer](seedminer) -1. Delete `F00D43D5.bin` from the Nintendo DSiWare folder and from your computer. This file will not be needed anymore +1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore + Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} diff --git a/_pages/en_PT/finalizing-setup.txt b/_pages/en_PT/finalizing-setup.txt index 66fa0bea77..b286ce804d 100644 --- a/_pages/en_PT/finalizing-setup.txt +++ b/_pages/en_PT/finalizing-setup.txt @@ -20,6 +20,8 @@ On this page, we will make critical system file backups and install the followin It is not recommended to skip downloading any of these applications, as many of them will be used later on this page. At the end of this page, your SD card will be cleaned up by removing unnecessary installation files. {: .notice--warning} +### Compatibility Notes + If your **New 3DS** was on version 2.1.0 before following this guide, you should [restore your NAND backup](godmode9-usage#restoring-a-nand-backup) before continuing. {: .notice--warning} @@ -39,6 +41,8 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o #### Section I - Prep Work +In this section, you will copy the files necessary to follow the rest of the instructions on this page. + 1. Power off ye device 1. Insert ye SD card into ye computer 1. Create a folder named `cias` on th' root 'o ye SD card if it does not already exist @@ -52,15 +56,20 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o 1. Reinsert ye SD card into ye device 1. Power on your device - ![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) - {: .notice--info} - ![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) - {: .notice--info} +The screenshots below indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. + +![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) +{: .notice--info} + -These screenshots indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. #### Section II - Updating the System +In this section, you will update your system to the latest version, which is safe to do with custom firmware. + 1. Update ye device by settin' off to System Settin's, then "Other Settings", then goin' all th' way to th' right 'n usin' "System Update" + Updates while usin' B9S + Luma (what ye have) be safe + The updater may display a message saying "Your system is up to date" instead of updating. This is normal if you are already up to date; continue with the next section @@ -69,6 +78,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section III - Homebrew Launcher +In this section, you will temporarily replace Download Play with Homebrew Launcher (which we need to launch FBI). Download Play will automatically go back to normal once you reboot your device. + 1. Launch the Download Play application (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. Wait until you see the `Nintendo 3DS` and `Nintendo DS` buttons 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu @@ -83,6 +94,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section IV - RTC and DSP Setup +In this section, you will sync your 3DS internal clock with the actual time and dump the sound firmware (which is necesssary for some homebrew software to use sound properly). + 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu 1. Select "Miscellaneous options" 1. Select "Dump DSP firmware" @@ -94,6 +107,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section V - Installing CIAs +In this section, you will install several useful homebrew applications to HOME Menu. + 1. Launch FBI from th' list 'o homebrew 1. Navigate to `SD` -> `cias` 1. Select "\" @@ -102,6 +117,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VI - CTRNAND Luma3DS +In this section, you will use a script to copy some of Luma3DS's files to internal memory so that they can be accessed, even without an SD card inserted. + 1. Power off ye device 1. Press and hold (Start), and while holding (Start), power on your device. This will launch GodMode9 + If you do not boot into GodMode9, ensure that `GodMode9.firm` is in `/luma/payloads/` and that `payloads` is correctly spelled @@ -118,6 +135,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VII - Cleanup SD Card +In this section, you will use a script to remove some unnecessary files from your SD card. + 1. Select "Cleanup SD Card" 1. When prompted, push (A) to proceed 1. Press (A) to continue @@ -125,6 +144,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VIII - Backup Essential Files +In this section, you will make backups of flies that can be used to recover from softwaer bricks or to recover data. + 1. Select "Backup Options" 1. Select "SysNAND Backup" 1. Press (A) to confirm @@ -159,7 +180,7 @@ You're done! Custom firmware is now fully configured on your device. Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! {: .notice--info} -#### Information and Notes +### Information and Notes {% capture notice-6 %} Here are some key combos that you should know: diff --git a/_pages/en_PT/homebrew-launcher-(pichaxx).txt b/_pages/en_PT/homebrew-launcher-(pichaxx).txt index 17f44b1d43..94adfd1e18 100644 --- a/_pages/en_PT/homebrew-launcher-(pichaxx).txt +++ b/_pages/en_PT/homebrew-launcher-(pichaxx).txt @@ -4,9 +4,17 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. +
+{: .notice--info} -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE to run SafeB9SInstaller. +### Compatibility Notes + +These instructions work on USA, Europe, and Japan consoles as indicated by the letters U, E, or J after the system version. + +You will need a Nintendo Network ID to download Pokémon Picross. This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. {: .notice--warning} @@ -24,15 +32,8 @@ This process will overwrite your Pokémon Picross save file, if you have one. If #### Section I - Prep Work -1. Power on your device -1. Open the Nintendo eShop -1. Tap the Search icon (small magnifying glass) -1. Search for `picross` -1. Open the store page for Pokémon Picross -1. Download Pokémon Picross - + You can scan [this QR code](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=ESHOP://50010000037815&margin=0&qzone=1&size=400x400&ecc=L) using the Nintendo 3DS Camera for a direct link to the eShop app - + Your SD card must be inserted in your device to install Pokémon Picross -1. Power off ye device +In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. + 1. Insert ye SD card into ye computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it @@ -40,8 +41,16 @@ This process will overwrite your Pokémon Picross save file, if you have one. If 1. Copy the `slotTool` folder from the unSAFE_MODE `.zip` to the `3ds` folder on your SD card 1. Copy the otherapp payload for your region/version from the unSAFE_MODE `.zip`'s `otherapps_with_CfgS` folder to the root of your SD card and rename it to `otherapp.bin` +![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }}) +{: .notice--info} + + #### Section II - PicHaxx +In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device. 1. Open [the PicHaxx Injector website](https://3ds.nhnarwhal.com/3dstools/pichaxx.php) on your computer 1. Select your `movable.sed` file 1. Select "Build and Download" diff --git a/_pages/en_PT/installing-boot9strap-(fredtool).txt b/_pages/en_PT/installing-boot9strap-(fredtool).txt index 3dfdbcce42..5720468a71 100644 --- a/_pages/en_PT/installing-boot9strap-(fredtool).txt +++ b/_pages/en_PT/installing-boot9strap-(fredtool).txt @@ -4,15 +4,16 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Table of Contents" %} -### Required Reading - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, for example from BannerBomb or the DSiWare Dumper tool. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). +
+Technical Details (optional) +

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+
+{: .notice--info} ### What You Need -* A DSiWare Backup (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) +* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -20,6 +21,8 @@ This is a currently working implementation of the "FIRM partitions known-plainte #### Section I - CFW Check +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + 1. Power off ye device 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button @@ -30,17 +33,7 @@ If you see a configuration menu, you already have CFW, and continuing with these #### Section II - Prep Work -1. Power off ye device -1. Insert ye SD card into ye computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card - - ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} - -#### Section III - Fredtool +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) @@ -53,19 +46,31 @@ If you see a configuration menu, you already have CFW, and continuing with these 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link +1. Insert ye SD card into ye computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` - + If the `Nintendo DSiWare` folder does not exist, create it inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` 1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder -1. Reinsert ye SD card into ye device + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card + + ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} + +#### Section III - Overwriting DS Connection Settings + +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Haxxxxxxxxx!" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title 1. Select "Copy", then select "OK" 1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio #### Section IV - Flipnote Exploit @@ -73,6 +78,8 @@ If you see a configuration menu, you already have CFW, and continuing with these If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} +In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer. + 1. Complete the initial setup process for the launched game until you reach the main menu + Select the left option whenever prompted during the setup process 1. Using the touch-screen, select the large left box, then select the box with an SD card icon @@ -85,7 +92,7 @@ If you would prefer a visual guide to this section, one is available [here](http 1. Tap the fourth box with the letter "A" in it 1. If the exploit was successful, your device will have loaded b9sTool 1. Using the D-Pad, move to "Install boot9strap" - + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to start over from Step 12 of Section III + + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III 1. Press (A), then press START and SELECT at the same time to begin the process 1. Once completed and the bottom screen says "done.", exit b9sTool, then power off your device + You may have to force power off by holding the power button @@ -94,6 +101,8 @@ If you would prefer a visual guide to this section, one is available [here](http #### Section V - Luma3DS Verification +Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. + 1. Power off ye device 1. Insert ye SD card into ye computer 1. Verify that a `luma` folder exists and that `config.ini` is inside of it @@ -106,13 +115,15 @@ At this point, your console will boot to Luma3DS by default. #### Section VI - Restoring DS Connection Settings -1. Copy the `42383841.bin` file from the `clean/` folder of the downloaded DSiWare archive (`output_(name).zip`) to the `Nintendo 3DS///Nintendo DSiWare/` folder on your SD card - + Replace the existing `42383841.bin` file +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one 1. Reinsert ye SD card into ye device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Nintendo DSi™" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title 1. Select "Copy", then select "OK" ___ diff --git a/_pages/en_PT/installing-boot9strap-(hbl-usm).txt b/_pages/en_PT/installing-boot9strap-(hbl-usm).txt index 1ad8d8ec33..8c34d2345b 100644 --- a/_pages/en_PT/installing-boot9strap-(hbl-usm).txt +++ b/_pages/en_PT/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,16 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

As we already have Homebrew access, we can use slotTool to do this.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--danger} @@ -24,7 +27,10 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint #### Section I - Prep Work +In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. + 1. Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide + + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. Launch slotTool from the list of homebrew + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section 1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option @@ -36,22 +42,31 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint 1. Copy `usm.bin` from the unSAFE_MODE `.zip` to the root of your SD card 1. Put your SD card back into your console +![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} + #### Section II - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](https://uwuu.ca/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section III - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -65,6 +80,8 @@ At this point, your console will boot to Luma3DS by default. #### Section IV - Restoring WiFi Configuration Profiles +In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch the Download Play application 1. Wait until you see the two buttons + Do not press either of the buttons diff --git a/_pages/en_PT/installing-boot9strap-(soundhax).txt b/_pages/en_PT/installing-boot9strap-(soundhax).txt index 5eabf2b740..5379ec8492 100644 --- a/_pages/en_PT/installing-boot9strap-(soundhax).txt +++ b/_pages/en_PT/installing-boot9strap-(soundhax).txt @@ -4,7 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+
+{: .notice--info} + +### Compatibility Notes Soundhax (when combined with universal-otherapp) is compatible with versions 1.0.0 through 11.3.0 in all regions. @@ -21,6 +27,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Section I - Prep Work +In this section, you will copy the files needed to trigger both Soundhax and universal-otherapp. + 1. Power off ye device 1. Insert ye SD card into ye computer 1. Copy the Soundhax `.m4a` to the root of your SD card @@ -33,11 +41,16 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 1. Reinsert ye SD card into ye device 1. Power on your device - ![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} #### Section II - Launching SafeB9SInstaller +In this section, you will launch Soundhax through the Nintendo 3DS Sound app, which will use universal-otherapp to launch the boot9strap (custom firmware) installer. + 1. Reinsert ye SD card into ye device 1. Power on your device 1. Launch Nintendo 3DS Sound @@ -58,6 +71,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Section III - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap 1. Once it is complete, press (A) to reboot your device 1. Ye device should have rebooted into th' Luma3DS configuration menu diff --git a/_pages/en_PT/installing-boot9strap-(usm).txt b/_pages/en_PT/installing-boot9strap-(usm).txt index afcb9ea907..e37dc399e6 100644 --- a/_pages/en_PT/installing-boot9strap-(usm).txt +++ b/_pages/en_PT/installing-boot9strap-(usm).txt @@ -4,15 +4,17 @@ title: "Installing boot9strap (USM)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

We can do this using an existing exploit, BannerBomb3.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -29,6 +31,8 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will #### Section I - Prep Work +In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. + 1. If your device is powered on, power off your device 1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer 1. Upload your movable.sed using the "Choose File" option @@ -41,47 +45,51 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will 1. Copy `boot9strap.firm` 'n `boot9strap.firm.sha` from th' boot9strap `.zip` to th' `/boot9strap/` folder on ye SD card 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card 1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - + ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }}) - {: .notice--info} - + ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} + ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card 1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. + 1. Reinsert ye SD card into ye device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Select "Inject haxx" +1. Press (A) to select "Inject haxx" + Your device will automatically power off #### Section III - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section IV - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -95,16 +103,17 @@ At this point, your console will boot to Luma3DS by default. #### Section V - Restoring WiFi Configuration Profiles +In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text -1. Select "Restore slots" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) +1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + Your device will automatically reboot 1. Power off ye device 1. Insert ye SD card into ye computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore ___ diff --git a/_pages/en_PT/seedminer.txt b/_pages/en_PT/seedminer.txt index 7d900fe08c..0152787c09 100644 --- a/_pages/en_PT/seedminer.txt +++ b/_pages/en_PT/seedminer.txt @@ -4,52 +4,54 @@ title: "Seedminer" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

+

For information on how Seedminer works, see this presentation.

+

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+
+{: .notice--info} -To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. +### Section I - Prep Work -For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). - -This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. - -### Instructions - -#### Section I - Prep Work +In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. 1. Insert ye SD card into ye computer 1. Navigate to the `Nintendo 3DS` folder on your SD card -1. Copy the 32 character long name of the folder you see inside Nintendo 3DS - + Do not go inside any more folders - + If you see multiple 32 character long folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + + If you don't have a `Nintendo 3DS` folder, put your SD card into your 3DS and power it on so that the folder can be created +1. Copy the name of the 32-letter folder you see directly inside Nintendo 3DS + + This 32-letter name is system-specific and will be different for each console + + If you see multiple 32-letter folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + You can ignore the `private` folder if you have it - ![]({{ "/images/screenshots/id0-example.png" | absolute_url }}) + ![]({{ "/images/screenshots/seedminer/id0-example.png" | absolute_url }}) {: .notice--info} -1. Paste your 32 character long folder name into a document you can reference later - + This folder name is also known as your "ID0" +1. Paste your 32 character long folder name into [a document](/images/screenshots/seedminer/text-document.png) you can reference later + + This folder is known as your "ID0". Take note of this as this guide will refer to it as such later 1. Power on your device + Your SD card does not need to be inserted at this point 1. Go to your Friend List (the [orange Face Icon]({{ "/images/friend-list-icon.png" | absolute_url }}) in the top row of your HOME Menu) + If you receive an error and are kicked out of the menu, you either must create a new Mii or your device cannot connect to Nintendo's servers (due to a ban or connection issues) 1. Find your Mii profile, then find the "Friend Code" field on the top screen -#### Section II - Seedminer +### Section II - Seedminer + +In this section, you will use the Bruteforce Movable website to retrieve your device's encryption key in the form of `movable.sed`. 1. Open [Bruteforce Movable](https://seedminer.hacks.guide/) on your computer - + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) + If the site isn't working, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field - + Do not attempt to enter the ID0 by hand. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section + + Do not attempt to enter the ID0 manually, as it is easy to make a mistake. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section 1. Select "Go" + If the site immediately goes to step 4, the website has already correctly processed your bruteforce request. You can download your `movable.sed` file and continue to the next section. You do not need to re-add the bot -1. Use the "Register Friend" button on your device to add the bot's friend code as given by the website +1. Use the ["Register Friend" button](/images/screenshots/seedminer/register-friend.png) on your device to add the bot's friend code as given by the website + If prompted, the name that you give to the friend does not matter 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once 1. Once the site processes your information, the site will continue to `Step 2: Bruteforce` automatically 1. Wait for the remainder of the process to complete - + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour + + This is usually fast (1-5 minutes) + During this process, the bot you added may not show up on your 3DS. As long as the website updates, this is not an issue + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site @@ -57,7 +59,7 @@ This method uses a powerful graphics card to perform the calculations needed. A ___ -### Next Steps +### Next steps: Choose an exploit Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. diff --git a/_pages/es_ES/bannerbomb3.txt b/_pages/es_ES/bannerbomb3.txt index e9414a6a9e..5d603928bf 100644 --- a/_pages/es_ES/bannerbomb3.txt +++ b/_pages/es_ES/bannerbomb3.txt @@ -4,11 +4,15 @@ title: "BannerBomb3" {% include toc title="Tabla de contenidos" %} -### Lectura requerida +
+Technical Details (optional) +

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

For a more technical explanation, see here.

+
+{: .notice--info} -Para volcar una aplicación DSiWare del sistema, aprovecharemos un fallo en la ventana de Gestión de datos DSiWare de la aplicación Configuración. - -Para lograrlo, usamos la clave de cifrado de tu sistema (movable.sed) para crear una copia de seguridad DSiWare que se aproveche del fallo del sistema para volcar la aplicación de Configuración de internet de DSi a la raíz de la SD. +### Compatibility Notes Estas instrucciones funcionan en consolas de las regiones USA, Europa, Japón y Corea, indicado por las letras U, E, J o K después de la versión del sistema. @@ -20,6 +24,9 @@ If you have a Taiwanese console (indicated by a T after the system version), fol * Tu archivo `movable.sed` proveniente de haber completado [Seedminer](seedminer) #### Sección I - Preparativos + +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + 1. Abre [BannerBomb3 Tool](https://bb3.nhnarwhal.com/3dstools/bannerbomb3.php) en tu computadora 1. Carga tu movable.sed usando la opción "Choose File" 1. Haz click en "Build and Download" @@ -27,28 +34,31 @@ If you have a Taiwanese console (indicated by a T after the system version), fol 1. Si tu consola está encendida, apagala 1. Inserta tu tarjeta SD en tu computadora 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + La `` en cuestión es la misma que usaste en [Seedminer](seedminer) - + El `` es una carpeta con un nombre compuesto por 32 caracteres, dentro de `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copia el archivo `F00D43D5.bin` del `.zip` de BannerBomb3 a la carpeta `Nintendo DSiWare` +1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Sección II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. + 1. Vuelve a insertar tu tarjeta SD en tu consola 1. Enciende tu consola 1. Entra a Configuración de la consola -1. Ve a `Data Management` -> `DSiWare` -1. Haz click en la sección de tarjeta SD +1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + Tu sistema debería parpadear el color magenta (rosa/púrpura) y luego crashear unos segundos después. Esto significa que funcionó 1. Apaga tu consola 1. Inserta tu tarjeta SD en tu computadora -1. Ahora deberías tener `42383841.bin` en la raíz de la SD. Esta es la copia de seguridad de DSiWare que usarás después en esta guía -1. Ve a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` en tu tarjeta SD - + La `` en cuestión es la misma que usaste en [Seedminer](seedminer) -1. Elimina `F00D43D5.bin` de la carpeta Nintendo DSiWare y de tu computadora. Este archivo ya no será necesario +1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page +1. Ve a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` en tu tarjeta SD +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. Este archivo ya no será necesario + Continúa en [Instalar boot9strap (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} diff --git a/_pages/es_ES/finalizing-setup.txt b/_pages/es_ES/finalizing-setup.txt index 51915732a6..52ee64a01c 100644 --- a/_pages/es_ES/finalizing-setup.txt +++ b/_pages/es_ES/finalizing-setup.txt @@ -20,6 +20,8 @@ On this page, we will make critical system file backups and install the followin It is not recommended to skip downloading any of these applications, as many of them will be used later on this page. At the end of this page, your SD card will be cleaned up by removing unnecessary installation files. {: .notice--warning} +### Compatibility Notes + If your **New 3DS** was on version 2.1.0 before following this guide, you should [restore your NAND backup](godmode9-usage#restoring-a-nand-backup) before continuing. {: .notice--warning} @@ -39,6 +41,8 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o #### Sección I - Preparativos +In this section, you will copy the files necessary to follow the rest of the instructions on this page. + 1. Apaga tu consola 1. Inserta tu tarjeta SD en tu computadora 1. Crea una carpeta llamada `cias` en la raíz de tu tarjeta SD, si aún no existe @@ -52,15 +56,20 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o 1. Vuelve a insertar tu tarjeta SD en tu consola 1. Enciende tu consola - ![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) - {: .notice--info} - ![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) - {: .notice--info} +The screenshots below indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. + +![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) +{: .notice--info} + -These screenshots indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. #### Sección II - Actualizar el sistema +In this section, you will update your system to the latest version, which is safe to do with custom firmware. + 1. Actualiza tu 3DS dirigiéndote a la Configuración de la consola, después a "Otras opciones", luego ve al último menú de la derecha y pulsa en "Actualización" + Actualizar la consola teniendo B9S y Luma (lo que acabas de instalar) es seguro + El actualizador podría mostrar un mensaje diciendo "La consola ya está actualizada" en lugar de actualizar. Esto es normal si tu consola ya está actualizada; continúa con la siguiente sección @@ -69,6 +78,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Sección III - Homebrew Launcher +In this section, you will temporarily replace Download Play with Homebrew Launcher (which we need to launch FBI). Download Play will automatically go back to normal once you reboot your device. + 1. Ejecuta la aplicación Modo Descarga (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. Espera hasta ver las opciones que dicen `Nintendo 3DS` y `Nintendo DS` 1. Presiona (Left Shoulder) + (Abajo) + (Select) a la vez para abrir el menú de Rosalina @@ -83,6 +94,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section IV - RTC and DSP Setup +In this section, you will sync your 3DS internal clock with the actual time and dump the sound firmware (which is necesssary for some homebrew software to use sound properly). + 1. Presiona (Left Shoulder) + (Abajo) + (Select) a la vez para abrir el menú de Rosalina 1. Selecciona "Miscellaneous options" 1. Select "Dump DSP firmware" @@ -94,6 +107,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section V - Installing CIAs +In this section, you will install several useful homebrew applications to HOME Menu. + 1. Inicia FBI desde la lista de homebrew 1. Ve a `SD` -> `cias` 1. Selecciona "\" @@ -102,6 +117,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Sección VI - CTRNAND Luma3DS +In this section, you will use a script to copy some of Luma3DS's files to internal memory so that they can be accessed, even without an SD card inserted. + 1. Apaga tu consola 1. Presiona y mantén el botón (Start), y mientras lo mantienes presionado, enciende tu consola. Esto abrirá GodMode9 + Si GodMode9 no inicia, asegúrate de que `GodMode9.firm` esté en `/luma/payloads/` y que `payloads` esté escrito correctamente @@ -118,6 +135,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Sección VII - Limpieza de la tarjeta SD +In this section, you will use a script to remove some unnecessary files from your SD card. + 1. Selecciona "Cleanup SD Card" 1. Presiona (A) para continuar cuando se te pida 1. Presiona (A) para continuar @@ -125,6 +144,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Sección VIII - Copia de Seguridad de Archivos Esenciales +In this section, you will make backups of flies that can be used to recover from softwaer bricks or to recover data. + 1. Selecciona "Backup Options" 1. Selecciona "SysNAND Backup" 1. Presiona (A) para confirmar @@ -159,7 +180,7 @@ You're done! Custom firmware is now fully configured on your device. Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! {: .notice--info} -#### Información y notas +### Information and Notes {% capture notice-6 %} Here are some key combos that you should know: diff --git a/_pages/es_ES/homebrew-launcher-(pichaxx).txt b/_pages/es_ES/homebrew-launcher-(pichaxx).txt index b8848cf59c..8efbc1ffb1 100644 --- a/_pages/es_ES/homebrew-launcher-(pichaxx).txt +++ b/_pages/es_ES/homebrew-launcher-(pichaxx).txt @@ -4,9 +4,17 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Tabla de contenidos" %} -### Lectura requerida +
+Technical Details (optional) +This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. +
+{: .notice--info} -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE to run SafeB9SInstaller. +### Compatibility Notes + +These instructions work on USA, Europe, and Japan consoles as indicated by the letters U, E, or J after the system version. + +You will need a Nintendo Network ID to download Pokémon Picross. This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. {: .notice--warning} @@ -24,15 +32,8 @@ This process will overwrite your Pokémon Picross save file, if you have one. If #### Sección I - Preparativos -1. Enciende tu consola -1. Entra a Nintendo eShop -1. Toca el ícono de búsqueda (la lupa pequeña) -1. Busca `picross` -1. Abre la página de Pokémon Picross -1. Descarga Pokémon Picross - + Puedes escanear [este código QR](http://api.qrserver.com/v1/create-qr-code/?color=0000&bgcolor=FFFFF&data=ESHOP://50010000037815&margin=0&qzone=1&size=400x400&ecc=L) usando la Cámara de Nintendo 3DS para ir directamente a la página de la eShop del juego - + Tu tarjeta SD debe estar insertada en tu consola para instalar Pokémon Picross -1. Apaga tu consola +In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. + 1. Inserta tu tarjeta SD en tu computadora 1. Copia los archivos `boot.firm` y `boot.3dsx` desde el `.zip` de Luma3DS a la raíz de tu tarjeta SD + La raíz de tu tarjeta SD se refiere al primer directorio de la tarjeta, donde puedes ver la carpeta Nintendo 3DS pero no estás dentro de ella @@ -40,8 +41,16 @@ This process will overwrite your Pokémon Picross save file, if you have one. If 1. Copy the `slotTool` folder from the unSAFE_MODE `.zip` to the `3ds` folder on your SD card 1. Copy the otherapp payload for your region/version from the unSAFE_MODE `.zip`'s `otherapps_with_CfgS` folder to the root of your SD card and rename it to `otherapp.bin` +![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }}) +{: .notice--info} + + #### Sección II - PicHaxx +In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device. 1. Abre [la página de PicHaxx Injector](https://3ds.nhnarwhal.com/3dstools/pichaxx.php) en tu computadora 1. Selecciona tu archivo `movable.sed` 1. Selecciona "Build and Download" (Construir y Descargar) diff --git a/_pages/es_ES/installing-boot9strap-(fredtool).txt b/_pages/es_ES/installing-boot9strap-(fredtool).txt index 760d6dc568..4b282ec594 100644 --- a/_pages/es_ES/installing-boot9strap-(fredtool).txt +++ b/_pages/es_ES/installing-boot9strap-(fredtool).txt @@ -4,15 +4,16 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Tabla de contenidos" %} -### Lectura requerida - -Este método de uso de Seedminer, para hacer un mejor exploit, utiliza tu archivo `movable.sed` para desencriptar cualquier título de DSiWare con el objetivo de inyectar un título de DSiWare vulnerable en la aplicación de Configuración de Internet de DS. Esto requiere que tengas una copia de seguridad de un título de DSiWare, por ejemplo, el proveniente de BannerBomb o la herramienta DSiWare Dumper. - -Todo esto son implementaciones funcionales del exploit "Particiones FIRM de texto plano conocido" detallado [aquí](https://www.3dbrew.org/wiki/3DS_System_Flaws) (*en inglés*). +
+Technical Details (optional) +

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+
+{: .notice--info} ### Qué necesitas -* A DSiWare Backup (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) +* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Tu archivo `movable.sed` proveniente de haber completado [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -20,6 +21,8 @@ Todo esto son implementaciones funcionales del exploit "Particiones FIRM de text #### Sección I - Verificación de CFW +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + 1. Apaga tu consola 1. Mantén pulsado el botón (Select) 1. Enciende la consola mientras mantienes presionado (Select) @@ -30,17 +33,7 @@ If you see a configuration menu, you already have CFW, and continuing with these #### Sección II - Preparativos -1. Apaga tu consola -1. Inserta tu tarjeta SD en tu computadora -1. Copia los archivos `boot.firm` y `boot.3dsx` desde el `.zip` de Luma3DS a la raíz de tu tarjeta SD - + La raíz de tu tarjeta SD se refiere al primer directorio de la tarjeta, donde puedes ver la carpeta Nintendo 3DS pero no estás dentro de ella -1. Copia `boot.nds` (B9STool) a la raíz de tu tarjeta SD -1. Copia la carpeta `private` contenida en el `.zip` de Frogminer_save a la raíz de tu tarjeta SD - - ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} - -#### Sección III - Fredtool +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) @@ -53,19 +46,31 @@ If you see a configuration menu, you already have CFW, and continuing with these 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link +1. Inserta tu tarjeta SD en tu computadora 1. Ve a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` en tu tarjeta SD - + La `` en cuestión es la misma que usaste en [Seedminer](seedminer) - + El `` es una carpeta con un nombre compuesto por 32 caracteres, dentro de `` - + Si no existe la carpeta `Nintendo DSiWare`, créala dentro de la carpeta `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` 1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder -1. Vuelve a insertar tu tarjeta SD en tu consola + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copia los archivos `boot.firm` y `boot.3dsx` desde el `.zip` de Luma3DS a la raíz de tu tarjeta SD + + La raíz de tu tarjeta SD se refiere al primer directorio de la tarjeta, donde puedes ver la carpeta Nintendo 3DS pero no estás dentro de ella +1. Copia `boot.nds` (B9STool) a la raíz de tu tarjeta SD +1. Copia la carpeta `private` contenida en el `.zip` de Frogminer_save a la raíz de tu tarjeta SD + + ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} + +#### Section III - Overwriting DS Connection Settings + +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + 1. Enciende tu consola 1. Entra a Configuración de la consola -1. Ve a `Data Management` -> `DSiWare` -1. En la sección "Tarjeta SD", elige el título "Haxxxxxxxxx!" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title 1. Selecciona "Copiar", luego "OK" 1. Regresa al menú principal de Configuración de la Consola -1. Ve a `Configuraciones de Internet` -> `Conexiones de Nintendo DS`, luego elige "OK" +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. Si el exploit fue exitoso, tu consola habrá cargado la versión japonesa de Flipnote Studio #### Sección IV - Exploit de Flipnote @@ -73,6 +78,8 @@ If you see a configuration menu, you already have CFW, and continuing with these Si prefieres una guía visual para esta parte, hay una disponible [aquí](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} +In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer. + 1. Completa la configuración del juego hasta que llegues al menú principal + Selecciona la opción de la izquierda cuando te lo pida durante la configuración inicial 1. Utilizando la pantalla táctil, selecciona el cuadrado grande de la izquierda, luego selecciona el cuadrado con el ícono de una tarjeta SD @@ -85,7 +92,7 @@ Si prefieres una guía visual para esta parte, hay una disponible [aquí](https: 1. Toca el cuarto cuadrado con una letra "A" en él 1. Si el exploit fue exitoso, tu consola habrá cargado b9sTool 1. Usando el D-Pad, selecciona "Install boot9strap" - + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to start over from Step 12 of Section III + + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III 1. Presiona (A), luego presiona START y SELECT al mismo tiempo para iniciar el proceso 1. Una vez completado y con la pantalla inferior diciendo "done.", sal de b9sTool, y luego apaga tu consola + Puede que tengas que forzar el apagado manteniendo pulsado el botón de encendido @@ -94,6 +101,8 @@ Si prefieres una guía visual para esta parte, hay una disponible [aquí](https: #### Section V - Luma3DS Verification +Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. + 1. Apaga tu consola 1. Inserta tu tarjeta SD en tu computadora 1. Verify that a `luma` folder exists and that `config.ini` is inside of it @@ -106,13 +115,15 @@ At this point, your console will boot to Luma3DS by default. #### Sección VI - Restaurar Conexiones de Nintendo DS -1. Copy the `42383841.bin` file from the `clean/` folder of the downloaded DSiWare archive (`output_(name).zip`) to the `Nintendo 3DS///Nintendo DSiWare/` folder on your SD card - + Reemplaza el archivo `42383841.bin` ya existente +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. + +1. Ve a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` en tu tarjeta SD +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one 1. Vuelve a insertar tu tarjeta SD en tu consola 1. Enciende tu consola 1. Entra a Configuración de la consola -1. Ve a `Data Management` -> `DSiWare` -1. En la sección "Tarjeta SD", elige el título "Nintendo DSi™" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title 1. Selecciona "Copiar", luego "OK" ___ diff --git a/_pages/es_ES/installing-boot9strap-(hbl-usm).txt b/_pages/es_ES/installing-boot9strap-(hbl-usm).txt index 1de8fe533b..1e048b1881 100644 --- a/_pages/es_ES/installing-boot9strap-(hbl-usm).txt +++ b/_pages/es_ES/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,16 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Tabla de contenidos" %} -### Lectura requerida +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

As we already have Homebrew access, we can use slotTool to do this.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+
+{: .notice--info} -Para pode aprovechar el exploit del firmware SAFE_MODE de nuestro sistema, necesitamos inyectar un perfil de WiFi con el exploit. - -As we already have Homebrew access, we can use slotTool to do this. - -Una vez que el perfil de WiFi ha sido inyectado, usaremos SAFE_MODE, que consiste en una función de recuperación presente en todas las consolas, para activar el perfil de WiFi con el exploit. +### Compatibility Notes If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--danger} @@ -24,7 +27,10 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint #### Sección I - Preparativos +In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. + 1. Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide + + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. Launch slotTool from the list of homebrew + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section 1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option @@ -36,22 +42,31 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint 1. Copy `usm.bin` from the unSAFE_MODE `.zip` to the root of your SD card 1. Put your SD card back into your console +![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} + #### Section II - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Mantén pulsados los botones hasta que la consola encienda en modo seguro + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Presiona "OK" para aceptar la actualización + No hay actualización. Esto es parte del exploit 1. Presiona sobre "Acepto" para aceptar los términos y condiciones 1. The update will eventually fail, with the error code `003-1099`. Este comportamiento es el esperado 1. Cuando se te pregunte "¿Quieres configurar tu conexión a internet?", selecciona "Aceptar" -1. En el menú siguiente, navega a `Conexión 1` -> `Modificar ajustes` -> `Siguiente página (flecha derecha)` -> `Servidor proxy` -> `Ajustes avanzados` - + Esto es una [representación visual](https://uwuu.ca/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. Si el exploit ha funcionado, la consola habrá iniciado SafeB9SInstaller #### Sección III - Instalar boot9strap +In this section, you will install custom firmware onto your device. + 1. Cuando se te pida, introduce la combinación de botones mostrada para instalar boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -65,6 +80,8 @@ At this point, your console will boot to Luma3DS by default. #### Section IV - Restoring WiFi Configuration Profiles +In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Inicia la aplicación de Modo Descarga 1. Espera hasta que veas los dos botones + Do not press either of the buttons diff --git a/_pages/es_ES/installing-boot9strap-(soundhax).txt b/_pages/es_ES/installing-boot9strap-(soundhax).txt index d77c1ac756..bffaa5310a 100644 --- a/_pages/es_ES/installing-boot9strap-(soundhax).txt +++ b/_pages/es_ES/installing-boot9strap-(soundhax).txt @@ -4,7 +4,13 @@ title: "Instalar boot9strap (Soundhax)" {% include toc title="Tabla de contenidos" %} -### Lectura requerida +
+Technical Details (optional) +

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+
+{: .notice--info} + +### Compatibility Notes Soundhax (en combinación con universal-otherapp) es compatible con las versiones 1.0.0 hasta la 11.3.0 en todas las regiones. @@ -21,6 +27,8 @@ Soundhax (en combinación con universal-otherapp) es compatible con las versione #### Sección I - Preparativos +In this section, you will copy the files needed to trigger both Soundhax and universal-otherapp. + 1. Apaga tu consola 1. Inserta tu tarjeta SD en tu computadora 1. Copia el archivo `.m4a` de Soundhax a la raíz de tu tarjeta SD @@ -33,11 +41,16 @@ Soundhax (en combinación con universal-otherapp) es compatible con las versione 1. Vuelve a insertar tu tarjeta SD en tu consola 1. Enciende tu consola - ![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} #### Sección II - Ejecutar SafeB9SInstaller +In this section, you will launch Soundhax through the Nintendo 3DS Sound app, which will use universal-otherapp to launch the boot9strap (custom firmware) installer. + 1. Vuelve a insertar tu tarjeta SD en tu consola 1. Enciende tu consola 1. Inicia Nintendo 3DS Sound @@ -58,6 +71,8 @@ Soundhax (en combinación con universal-otherapp) es compatible con las versione #### Sección III - Instalar boot9strap +In this section, you will install custom firmware onto your device. + 1. Cuando se te pida, introduce la combinación de botones mostrada para instalar boot9strap 1. Once it is complete, press (A) to reboot your device 1. Tu consola debería haber reiniciado en el menú de configuración de Luma3DS diff --git a/_pages/es_ES/installing-boot9strap-(usm).txt b/_pages/es_ES/installing-boot9strap-(usm).txt index a7b6eb4001..17e3c5eb51 100644 --- a/_pages/es_ES/installing-boot9strap-(usm).txt +++ b/_pages/es_ES/installing-boot9strap-(usm).txt @@ -4,15 +4,17 @@ title: "Instalar boot9strap (USM)" {% include toc title="Tabla de contenidos" %} -### Lectura requerida +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

We can do this using an existing exploit, BannerBomb3.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

+
+{: .notice--info} -Para pode aprovechar el exploit del firmware SAFE_MODE de nuestro sistema, necesitamos inyectar un perfil de WiFi con el exploit. - -Podemos hacer esto utilizando un exploit existente, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Una vez que el perfil de WiFi ha sido inyectado, usaremos SAFE_MODE, que consiste en una función de recuperación presente en todas las consolas, para activar el perfil de WiFi con el exploit. +### Compatibility Notes Estas instrucciones funcionan en consolas de las regiones USA, Europa, Japón y Corea, indicado por las letras U, E, J o K después de la versión del sistema. @@ -29,6 +31,8 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will #### Sección I - Preparativos +In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. + 1. Si tu consola está encendida, apágala 1. Abre [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) en tu computadora 1. Carga tu movable.sed usando la opción "Choose File" @@ -41,47 +45,51 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will 1. Copia `boot9strap.firm` y `boot9strap.firm.sha` desde el `.zip` de `boot9strap` a la carpeta `/boot9strap/` en tu tarjeta SD 1. Copia `SafeB9SInstaller.bin` desde el `.zip` de SafeB9SInstaller a la raíz de tu tarjeta SD 1. Copia el archivo `usm.bin` desde `unSAFE_MODE.zip` a la raíz de tu tarjeta SD - + ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }}) - {: .notice--info} - + ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} + ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + La `` en cuestión es la misma que usaste en [Seedminer](seedminer) - + El `` es una carpeta con un nombre compuesto por 32 caracteres, dentro de `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card 1. Copia el archivo `F00D43D5.bin` desde `unSAFE_MODE.zip` a la carpeta `Nintendo DSiWare` - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Sección II - BannerBomb3 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. + 1. Vuelve a insertar tu tarjeta SD en tu consola 1. Enciende tu consola 1. Entra a Configuración de la consola -1. Ve a `Data Management` -> `DSiWare` -1. Haz click en la sección de tarjeta SD - + La consola debería mostrar un menú con algo de texto +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Selecciona "Inject haxx" +1. Press (A) to select "Inject haxx" + Tu consola se apagará automáticamente #### Sección III - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Mantén pulsados los botones hasta que la consola encienda en modo seguro + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Presiona "OK" para aceptar la actualización + No hay actualización. Esto es parte del exploit 1. Presiona sobre "Acepto" para aceptar los términos y condiciones 1. The update will eventually fail, with the error code `003-1099`. Este comportamiento es el esperado 1. Cuando se te pregunte "¿Quieres configurar tu conexión a internet?", selecciona "Aceptar" -1. En el menú siguiente, navega a `Conexión 1` -> `Modificar ajustes` -> `Siguiente página (flecha derecha)` -> `Servidor proxy` -> `Ajustes avanzados` - + This is a [visual representation](/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. Si el exploit ha funcionado, la consola habrá iniciado SafeB9SInstaller #### Section IV - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. Cuando se te pida, introduce la combinación de botones mostrada para instalar boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -95,16 +103,17 @@ At this point, your console will boot to Luma3DS by default. #### Section V - Restoring WiFi Configuration Profiles +In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Entra a Configuración de la consola -1. Ve a `Data Management` -> `DSiWare` -1. Haz click en la sección de tarjeta SD - + La consola debería mostrar un menú con algo de texto -1. Selecciona "Restore slots" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) +1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + Your device will automatically reboot 1. Apaga tu consola 1. Inserta tu tarjeta SD en tu computadora 1. Ve a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` en tu tarjeta SD -1. Elimina `F00D43D5.bin` de la carpeta Nintendo DSiWare +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. Este archivo ya no será necesario ___ diff --git a/_pages/es_ES/seedminer.txt b/_pages/es_ES/seedminer.txt index bf50b87196..e680979ca0 100644 --- a/_pages/es_ES/seedminer.txt +++ b/_pages/es_ES/seedminer.txt @@ -4,52 +4,54 @@ title: "Seedminer" {% include toc title="Tabla de contenidos" %} -### Lectura requerida +
+Technical Details (optional) +

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

+

For information on how Seedminer works, see this presentation.

+

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+
+{: .notice--info} -Para instalar boot9strap en tu consola, obtenemos la clave de encriptación exclusiva de la misma. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. +### Section I - Prep Work -For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). - -Este método utiliza una tarjeta gráfica potente para realizar los cálculos necesarios. Para ayudarte con este método se utiliza un sitio web mantenido por voluntarios. - -### Instrucciones - -#### Sección I - Preparativos +In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. 1. Inserta tu tarjeta SD en tu computadora 1. Ve a la carpeta `Nintendo 3DS` en tu tarjeta SD -1. Copia el nombre de 32 caracteres de la carpeta que hay dentro de Nintendo 3DS - + No abras más carpetas dentro de ésta - + If you see multiple 32 character long folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + + If you don't have a `Nintendo 3DS` folder, put your SD card into your 3DS and power it on so that the folder can be created +1. Copy the name of the 32-letter folder you see directly inside Nintendo 3DS + + This 32-letter name is system-specific and will be different for each console + + If you see multiple 32-letter folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + You can ignore the `private` folder if you have it - ![]({{ "/images/screenshots/id0-example.png" | absolute_url }}) + ![]({{ "/images/screenshots/seedminer/id0-example.png" | absolute_url }}) {: .notice--info} -1. Pega el nombre de 32 caracteres en un documento que puedas tener a mano más tarde - + Este nombre se conoce también como el "ID0" de tu consola +1. Paste your 32 character long folder name into [a document](/images/screenshots/seedminer/text-document.png) you can reference later + + This folder is known as your "ID0". Take note of this as this guide will refer to it as such later 1. Enciende tu consola + Your SD card does not need to be inserted at this point 1. Go to your Friend List (the [orange Face Icon]({{ "/images/friend-list-icon.png" | absolute_url }}) in the top row of your HOME Menu) + Si recibes un error y eres expulsado del menú, es posible que debas crear un nuevo Mii o que tu consola no se pueda conectar a los servidores de Nintendo (debido a un ban o problemas de conexión) 1. Encuentra el perfil de tu Mii, luego busca donde dice "Código de amigo" en la pantalla superior -#### Sección II - Seedminer +### Section II - Seedminer + +In this section, you will use the Bruteforce Movable website to retrieve your device's encryption key in the form of `movable.sed`. 1. Open [Bruteforce Movable](https://seedminer.hacks.guide/) on your computer - + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) + If the site isn't working, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field - + Do not attempt to enter the ID0 by hand. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section + + Do not attempt to enter the ID0 manually, as it is easy to make a mistake. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section 1. Select "Go" + If the site immediately goes to step 4, the website has already correctly processed your bruteforce request. You can download your `movable.sed` file and continue to the next section. You do not need to re-add the bot -1. Use the "Register Friend" button on your device to add the bot's friend code as given by the website +1. Use the ["Register Friend" button](/images/screenshots/seedminer/register-friend.png) on your device to add the bot's friend code as given by the website + If prompted, the name that you give to the friend does not matter 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once 1. Once the site processes your information, the site will continue to `Step 2: Bruteforce` automatically 1. Wait for the remainder of the process to complete - + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour + + This is usually fast (1-5 minutes) + During this process, the bot you added may not show up on your 3DS. As long as the website updates, this is not an issue + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site @@ -57,7 +59,7 @@ Este método utiliza una tarjeta gráfica potente para realizar los cálculos ne ___ -### Next Steps +### Next steps: Choose an exploit Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. diff --git a/_pages/fi_FI/bannerbomb3.txt b/_pages/fi_FI/bannerbomb3.txt index fee407be06..dec536973d 100644 --- a/_pages/fi_FI/bannerbomb3.txt +++ b/_pages/fi_FI/bannerbomb3.txt @@ -4,11 +4,15 @@ title: "BannerBomb3" {% include toc title="Sisällysluettelo" %} -### Tärkeää tietoa +
+Technical Details (optional) +

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

For a more technical explanation, see here.

+
+{: .notice--info} -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -20,6 +24,9 @@ If you have a Taiwanese console (indicated by a T after the system version), fol * Your `movable.sed` file from completing [Seedminer](seedminer) #### Vaihe I – Valmistelut + +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + 1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer 1. Upload your movable.sed using the "Choose File" option 1. Click "Build and Download" @@ -27,28 +34,31 @@ If you have a Taiwanese console (indicated by a T after the system version), fol 1. If your console is powered on, power off your console 1. Aseta SD-korttisi tietokoneeseesi 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from the BannerBomb3 `.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. + 1. Aseta SD-korttisi takaisin konsoliisi 1. Käynnistä konsolisi 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section +1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked 1. Sammuta konsolisi 1. Aseta SD-korttisi tietokoneeseesi -1. You should now have `42383841.bin` in SD root. This is the DSiWare backup you will use later in the guide -1. Navigate to `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card - + This `` will be the same one that you used in [Seedminer](seedminer) -1. Delete `F00D43D5.bin` from the Nintendo DSiWare folder and from your computer. This file will not be needed anymore +1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore + Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} diff --git a/_pages/fi_FI/finalizing-setup.txt b/_pages/fi_FI/finalizing-setup.txt index dc23ebe106..21a656769f 100644 --- a/_pages/fi_FI/finalizing-setup.txt +++ b/_pages/fi_FI/finalizing-setup.txt @@ -20,6 +20,8 @@ On this page, we will make critical system file backups and install the followin It is not recommended to skip downloading any of these applications, as many of them will be used later on this page. At the end of this page, your SD card will be cleaned up by removing unnecessary installation files. {: .notice--warning} +### Compatibility Notes + If your **New 3DS** was on version 2.1.0 before following this guide, you should [restore your NAND backup](godmode9-usage#restoring-a-nand-backup) before continuing. {: .notice--warning} @@ -39,6 +41,8 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o #### Vaihe I – Valmistelut +In this section, you will copy the files necessary to follow the rest of the instructions on this page. + 1. Sammuta konsolisi 1. Aseta SD-korttisi tietokoneeseesi 1. Luo `cias`‑niminen kansio SD‑korttisi juureen, jos sitä ei jo ole olemassa @@ -52,15 +56,20 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o 1. Aseta SD-korttisi takaisin konsoliisi 1. Käynnistä konsolisi - ![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) - {: .notice--info} - ![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) - {: .notice--info} +The screenshots below indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. + +![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) +{: .notice--info} + -These screenshots indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. #### Vaihe II – Järjestelmän päivittäminen +In this section, you will update your system to the latest version, which is safe to do with custom firmware. + 1. Päivitä konsolisi menemällä järjestelmäasetuksiin (System Settings), valitse muut asetukset (Other Settings) ja sitten järjestelmäpäivitys (System Update) viimeiseltä sivulta + Päivitykset B9S + Luma -kokoonpanolla (joka sinulla on) ovat turvallisia + The updater may display a message saying "Your system is up to date" instead of updating. This is normal if you are already up to date; continue with the next section @@ -69,6 +78,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section III - Homebrew Launcher +In this section, you will temporarily replace Download Play with Homebrew Launcher (which we need to launch FBI). Download Play will automatically go back to normal once you reboot your device. + 1. Launch the Download Play application (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. Wait until you see the `Nintendo 3DS` and `Nintendo DS` buttons 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu @@ -83,6 +94,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section IV - RTC and DSP Setup +In this section, you will sync your 3DS internal clock with the actual time and dump the sound firmware (which is necesssary for some homebrew software to use sound properly). + 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu 1. Valitse "Miscellaneous options" 1. Select "Dump DSP firmware" @@ -94,6 +107,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section V - Installing CIAs +In this section, you will install several useful homebrew applications to HOME Menu. + 1. Avaa FBI homebrew-listasta 1. Mene hakemistoon `SD` → `cias` 1. Valitse "\" @@ -102,6 +117,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Vaihe VI – Luma3DS:n asentaminen CTRNANDiin +In this section, you will use a script to copy some of Luma3DS's files to internal memory so that they can be accessed, even without an SD card inserted. + 1. Sammuta konsolisi 1. Press and hold (Start), and while holding (Start), power on your device. This will launch GodMode9 + If you do not boot into GodMode9, ensure that `GodMode9.firm` is in `/luma/payloads/` and that `payloads` is correctly spelled @@ -118,6 +135,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VII - Cleanup SD Card +In this section, you will use a script to remove some unnecessary files from your SD card. + 1. Select "Cleanup SD Card" 1. Paina kehotettaessa (A):ta jatkaaksesi 1. Paina (A):ta jatkaaksesi @@ -125,6 +144,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VIII - Backup Essential Files +In this section, you will make backups of flies that can be used to recover from softwaer bricks or to recover data. + 1. Select "Backup Options" 1. Select "SysNAND Backup" 1. Paina (A):ta vahvistaaksesi @@ -159,7 +180,7 @@ You're done! Custom firmware is now fully configured on your device. Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! {: .notice--info} -#### Information and Notes +### Information and Notes {% capture notice-6 %} Here are some key combos that you should know: diff --git a/_pages/fi_FI/homebrew-launcher-(pichaxx).txt b/_pages/fi_FI/homebrew-launcher-(pichaxx).txt index 0bab6297f4..90ab2285e4 100644 --- a/_pages/fi_FI/homebrew-launcher-(pichaxx).txt +++ b/_pages/fi_FI/homebrew-launcher-(pichaxx).txt @@ -4,9 +4,17 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Sisällysluettelo" %} -### Tärkeää tietoa +
+Technical Details (optional) +This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. +
+{: .notice--info} -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE to run SafeB9SInstaller. +### Compatibility Notes + +These instructions work on USA, Europe, and Japan consoles as indicated by the letters U, E, or J after the system version. + +You will need a Nintendo Network ID to download Pokémon Picross. This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. {: .notice--warning} @@ -24,15 +32,8 @@ This process will overwrite your Pokémon Picross save file, if you have one. If #### Vaihe I – Valmistelut -1. Käynnistä konsolisi -1. Open the Nintendo eShop -1. Tap the Search icon (small magnifying glass) -1. Search for `picross` -1. Open the store page for Pokémon Picross -1. Download Pokémon Picross - + You can scan [this QR code](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=ESHOP://50010000037815&margin=0&qzone=1&size=400x400&ecc=L) using the Nintendo 3DS Camera for a direct link to the eShop app - + Your SD card must be inserted in your device to install Pokémon Picross -1. Sammuta konsolisi +In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. + 1. Aseta SD-korttisi tietokoneeseesi 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it @@ -40,8 +41,16 @@ This process will overwrite your Pokémon Picross save file, if you have one. If 1. Copy the `slotTool` folder from the unSAFE_MODE `.zip` to the `3ds` folder on your SD card 1. Copy the otherapp payload for your region/version from the unSAFE_MODE `.zip`'s `otherapps_with_CfgS` folder to the root of your SD card and rename it to `otherapp.bin` +![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }}) +{: .notice--info} + + #### Section II - PicHaxx +In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device. 1. Open [the PicHaxx Injector website](https://3ds.nhnarwhal.com/3dstools/pichaxx.php) on your computer 1. Select your `movable.sed` file 1. Select "Build and Download" diff --git a/_pages/fi_FI/installing-boot9strap-(fredtool).txt b/_pages/fi_FI/installing-boot9strap-(fredtool).txt index a75cad9694..d456a8ac4a 100644 --- a/_pages/fi_FI/installing-boot9strap-(fredtool).txt +++ b/_pages/fi_FI/installing-boot9strap-(fredtool).txt @@ -4,15 +4,16 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Sisällysluettelo" %} -### Tärkeää tietoa - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, for example from BannerBomb or the DSiWare Dumper tool. - -Tämä menetelmä käyttää FIRM-osioiden salaamatonta muotoa (known-plaintext, selitetty [täällä](https://www.3dbrew.org/wiki/3DS_System_Flaws)) hyödyntävää haavoittuvuutta. +
+Technical Details (optional) +

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+
+{: .notice--info} ### Tarpeet -* A DSiWare Backup (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) +* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -20,6 +21,8 @@ Tämä menetelmä käyttää FIRM-osioiden salaamatonta muotoa (known-plaintext, #### Section I - CFW Check +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + 1. Sammuta konsolisi 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button @@ -30,17 +33,7 @@ If you see a configuration menu, you already have CFW, and continuing with these #### Section II - Prep Work -1. Sammuta konsolisi -1. Aseta SD-korttisi tietokoneeseesi -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card - - ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} - -#### Section III - Fredtool +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) @@ -53,19 +46,31 @@ If you see a configuration menu, you already have CFW, and continuing with these 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link +1. Aseta SD-korttisi tietokoneeseesi 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` - + If the `Nintendo DSiWare` folder does not exist, create it inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` 1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder -1. Aseta SD-korttisi takaisin konsoliisi + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card + + ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} + +#### Section III - Overwriting DS Connection Settings + +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + 1. Käynnistä konsolisi 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Haxxxxxxxxx!" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title 1. Select "Copy", then select "OK" 1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio #### Section IV - Flipnote Exploit @@ -73,6 +78,8 @@ If you see a configuration menu, you already have CFW, and continuing with these If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} +In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer. + 1. Complete the initial setup process for the launched game until you reach the main menu + Select the left option whenever prompted during the setup process 1. Using the touch-screen, select the large left box, then select the box with an SD card icon @@ -85,7 +92,7 @@ If you would prefer a visual guide to this section, one is available [here](http 1. Tap the fourth box with the letter "A" in it 1. If the exploit was successful, your device will have loaded b9sTool 1. Using the D-Pad, move to "Install boot9strap" - + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to start over from Step 12 of Section III + + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III 1. Press (A), then press START and SELECT at the same time to begin the process 1. Once completed and the bottom screen says "done.", exit b9sTool, then power off your device + Voit joutua pakottamaan konsolin sammuksiin pitämällä virtapainiketta pohjassa @@ -94,6 +101,8 @@ If you would prefer a visual guide to this section, one is available [here](http #### Section V - Luma3DS Verification +Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. + 1. Sammuta konsolisi 1. Aseta SD-korttisi tietokoneeseesi 1. Verify that a `luma` folder exists and that `config.ini` is inside of it @@ -106,13 +115,15 @@ At this point, your console will boot to Luma3DS by default. #### Section VI - Restoring DS Connection Settings -1. Copy the `42383841.bin` file from the `clean/` folder of the downloaded DSiWare archive (`output_(name).zip`) to the `Nintendo 3DS///Nintendo DSiWare/` folder on your SD card - + Replace the existing `42383841.bin` file +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one 1. Aseta SD-korttisi takaisin konsoliisi 1. Käynnistä konsolisi 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Nintendo DSi™" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title 1. Select "Copy", then select "OK" ___ diff --git a/_pages/fi_FI/installing-boot9strap-(hbl-usm).txt b/_pages/fi_FI/installing-boot9strap-(hbl-usm).txt index 6733ed9705..47682df3ec 100644 --- a/_pages/fi_FI/installing-boot9strap-(hbl-usm).txt +++ b/_pages/fi_FI/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,16 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Sisällysluettelo" %} -### Tärkeää tietoa +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

As we already have Homebrew access, we can use slotTool to do this.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--danger} @@ -24,7 +27,10 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint #### Vaihe I – Valmistelut +In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. + 1. Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide + + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. Launch slotTool from the list of homebrew + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section 1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option @@ -36,22 +42,31 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint 1. Copy `usm.bin` from the unSAFE_MODE `.zip` to the root of your SD card 1. Put your SD card back into your console +![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} + #### Section II - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](https://uwuu.ca/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Vaihe III – Boot9strapin asentaminen +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -65,6 +80,8 @@ At this point, your console will boot to Luma3DS by default. #### Section IV - Restoring WiFi Configuration Profiles +In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Avaa Download Play -sovellus 1. Wait until you see the two buttons + Do not press either of the buttons diff --git a/_pages/fi_FI/installing-boot9strap-(soundhax).txt b/_pages/fi_FI/installing-boot9strap-(soundhax).txt index ea73c43897..d4c82d8a82 100644 --- a/_pages/fi_FI/installing-boot9strap-(soundhax).txt +++ b/_pages/fi_FI/installing-boot9strap-(soundhax).txt @@ -4,7 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Sisällysluettelo" %} -### Tärkeää tietoa +
+Technical Details (optional) +

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+
+{: .notice--info} + +### Compatibility Notes Soundhax (when combined with universal-otherapp) is compatible with versions 1.0.0 through 11.3.0 in all regions. @@ -21,6 +27,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Vaihe I – Valmistelut +In this section, you will copy the files needed to trigger both Soundhax and universal-otherapp. + 1. Sammuta konsolisi 1. Aseta SD-korttisi tietokoneeseesi 1. Kopioi SoundHax-`.m4a`-tiedosto SD-korttisi juureen @@ -33,11 +41,16 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 1. Aseta SD-korttisi takaisin konsoliisi 1. Käynnistä konsolisi - ![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} #### Vaihe II – SafeB9SInstallerin avaaminen +In this section, you will launch Soundhax through the Nintendo 3DS Sound app, which will use universal-otherapp to launch the boot9strap (custom firmware) installer. + 1. Aseta SD-korttisi takaisin konsoliisi 1. Käynnistä konsolisi 1. Avaa Nintendo 3DS Sound @@ -58,6 +71,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Vaihe III – Boot9strapin asentaminen +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap 1. Once it is complete, press (A) to reboot your device 1. Konsolisi pitäisi uudelleenkäynnistyä suoraan Luma3DS:n määritysvalikkoon diff --git a/_pages/fi_FI/installing-boot9strap-(usm).txt b/_pages/fi_FI/installing-boot9strap-(usm).txt index c58f21aaed..00b904c230 100644 --- a/_pages/fi_FI/installing-boot9strap-(usm).txt +++ b/_pages/fi_FI/installing-boot9strap-(usm).txt @@ -4,15 +4,17 @@ title: "Installing boot9strap (USM)" {% include toc title="Sisällysluettelo" %} -### Tärkeää tietoa +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

We can do this using an existing exploit, BannerBomb3.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -29,6 +31,8 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will #### Vaihe I – Valmistelut +In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. + 1. If your device is powered on, power off your device 1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer 1. Upload your movable.sed using the "Choose File" option @@ -41,47 +45,51 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will 1. Kopioi boot9strap-`.zip`-pakkauksesta `boot9strap.firm` ja `boot9strap.firm.sha` SD-korttisi `/boot9strap/`-kansioon 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card 1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - + ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }}) - {: .notice--info} - + ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} + ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card 1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. + 1. Aseta SD-korttisi takaisin konsoliisi 1. Käynnistä konsolisi 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Select "Inject haxx" +1. Press (A) to select "Inject haxx" + Your device will automatically power off #### Section III - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section IV - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -95,16 +103,17 @@ At this point, your console will boot to Luma3DS by default. #### Section V - Restoring WiFi Configuration Profiles +In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text -1. Select "Restore slots" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) +1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + Your device will automatically reboot 1. Sammuta konsolisi 1. Aseta SD-korttisi tietokoneeseesi 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore ___ diff --git a/_pages/fi_FI/seedminer.txt b/_pages/fi_FI/seedminer.txt index 1a90ff7f02..471811224c 100644 --- a/_pages/fi_FI/seedminer.txt +++ b/_pages/fi_FI/seedminer.txt @@ -4,52 +4,54 @@ title: "Seedminer" {% include toc title="Sisällysluettelo" %} -### Tärkeää tietoa +
+Technical Details (optional) +

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

+

For information on how Seedminer works, see this presentation.

+

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+
+{: .notice--info} -To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. +### Section I - Prep Work -For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). - -This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. - -### Ohjeet - -#### Vaihe I – Valmistelut +In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. 1. Aseta SD-korttisi tietokoneeseesi 1. Navigate to the `Nintendo 3DS` folder on your SD card -1. Copy the 32 character long name of the folder you see inside Nintendo 3DS - + Do not go inside any more folders - + If you see multiple 32 character long folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + + If you don't have a `Nintendo 3DS` folder, put your SD card into your 3DS and power it on so that the folder can be created +1. Copy the name of the 32-letter folder you see directly inside Nintendo 3DS + + This 32-letter name is system-specific and will be different for each console + + If you see multiple 32-letter folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + You can ignore the `private` folder if you have it - ![]({{ "/images/screenshots/id0-example.png" | absolute_url }}) + ![]({{ "/images/screenshots/seedminer/id0-example.png" | absolute_url }}) {: .notice--info} -1. Paste your 32 character long folder name into a document you can reference later - + This folder name is also known as your "ID0" +1. Paste your 32 character long folder name into [a document](/images/screenshots/seedminer/text-document.png) you can reference later + + This folder is known as your "ID0". Take note of this as this guide will refer to it as such later 1. Käynnistä konsolisi + Your SD card does not need to be inserted at this point 1. Go to your Friend List (the [orange Face Icon]({{ "/images/friend-list-icon.png" | absolute_url }}) in the top row of your HOME Menu) + If you receive an error and are kicked out of the menu, you either must create a new Mii or your device cannot connect to Nintendo's servers (due to a ban or connection issues) 1. Find your Mii profile, then find the "Friend Code" field on the top screen -#### Section II - Seedminer +### Section II - Seedminer + +In this section, you will use the Bruteforce Movable website to retrieve your device's encryption key in the form of `movable.sed`. 1. Open [Bruteforce Movable](https://seedminer.hacks.guide/) on your computer - + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) + If the site isn't working, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field - + Do not attempt to enter the ID0 by hand. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section + + Do not attempt to enter the ID0 manually, as it is easy to make a mistake. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section 1. Select "Go" + If the site immediately goes to step 4, the website has already correctly processed your bruteforce request. You can download your `movable.sed` file and continue to the next section. You do not need to re-add the bot -1. Use the "Register Friend" button on your device to add the bot's friend code as given by the website +1. Use the ["Register Friend" button](/images/screenshots/seedminer/register-friend.png) on your device to add the bot's friend code as given by the website + If prompted, the name that you give to the friend does not matter 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once 1. Once the site processes your information, the site will continue to `Step 2: Bruteforce` automatically 1. Wait for the remainder of the process to complete - + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour + + This is usually fast (1-5 minutes) + During this process, the bot you added may not show up on your 3DS. As long as the website updates, this is not an issue + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site @@ -57,7 +59,7 @@ This method uses a powerful graphics card to perform the calculations needed. A ___ -### Next Steps +### Next steps: Choose an exploit Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. diff --git a/_pages/fr_FR/bannerbomb3-fredtool-(twn).txt b/_pages/fr_FR/bannerbomb3-fredtool-(twn).txt index 2b4266641b..d566845452 100644 --- a/_pages/fr_FR/bannerbomb3-fredtool-(twn).txt +++ b/_pages/fr_FR/bannerbomb3-fredtool-(twn).txt @@ -58,7 +58,7 @@ If you see a configuration menu, you already have CFW, and continuing with these 1. Click the "output_(name).zip" link 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + L'`` sera le même que celui que vous avez utilisé dans [Seedminer](seedminer) - + L'`` est un dossier de 32 caractères à l'intérieur du `` + + L'`` est un dossier de 32 caractères à l'intérieur du dossier `` 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card 1. Open the output_(name) `.zip` file and navigate to `China_Taiwan` -> `output_setup` diff --git a/_pages/fr_FR/bannerbomb3.txt b/_pages/fr_FR/bannerbomb3.txt index 52e517a004..b2c47fa8ef 100644 --- a/_pages/fr_FR/bannerbomb3.txt +++ b/_pages/fr_FR/bannerbomb3.txt @@ -4,11 +4,15 @@ title: "BannerBomb3" {% include toc title="Table des matières" %} -### Lecture requise +
+Technical Details (optional) +

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

For a more technical explanation, see here.

+
+{: .notice--info} -Pour extraire un DSiWare système, nous exploitons une faille dans l'onglet de gestion des données DSiWare présent dans les paramètres système. - -Pour accomplir cela, nous utilisons la clé de chiffrement de votre console (movable.sed) pour construire une copie de DSiWare qui exploite le système afin d'en extraire l'application Paramètres Internet DSi à la racine de la carte SD. +### Compatibility Notes Ces instructions fonctionnent dans les régions USA, Europe, Japon et Corée indiquées par les lettres U, E, J ou K après le numéro de version de la console. @@ -20,6 +24,9 @@ If you have a Taiwanese console (indicated by a T after the system version), fol * Votre fichier `movable.sed` obtenu grâce à [Seedminer](seedminer) #### Section I - Préparatifs + +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + 1. Ouvrez [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) sur votre ordinateur 1. Téléchargez votre movable.sed en utilisant l'option "Choisir le fichier" 1. Sélectionnez "Build and Download" @@ -27,28 +34,31 @@ If you have a Taiwanese console (indicated by a T after the system version), fol 1. Si votre console est allumée, éteignez-la 1. Insérez votre carte SD dans votre ordinateur 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + L'`` sera le même que celui que vous avez utilisé dans [Seedminer](seedminer) - + L'`` est un dossier de 32 caractères à l'intérieur du `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copiez le fichier `F00D43D5.bin` depuis l'archive `.zip` de BannerBomb3 vers le dossier `Nintendo DSiWare` +1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. + 1. Réinsérez votre carte SD dans votre 3DS 1. Allumez votre console 1. Lancez les Paramètres de la console -1. Naviguez vers `Gestion des données` -> `DSiWare` -1. Cliquez sur l'onglet Carte SD +1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + Votre console devrait clignoter en magenta (rose/violet) et puis planter quelques secondes plus tard. Cela signifie que ça a fonctionné 1. Éteignez votre 3DS 1. Insérez votre carte SD dans votre ordinateur -1. Vous devriez maintenant avoir le fichier `42383841.bin` à la racine de votre carte SD. Ceci est la copie de DSiWare que vous utiliserez plus tard dans le guide -1. Naviguez vers `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` sur votre carte SD - + Cet `` sera le même que celui que vous avez utilisé dans [Seedminer](seedminer) -1. Supprimez `F00D43D5.bin` du dossier Nintendo DSiWare et de votre ordinateur. Ce fichier ne sera plus nécessaire +1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page +1. Naviguez vers `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` sur votre carte SD +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. Ce fichier ne sera plus nécessaire + Continuez vers [Installation de boot9strap (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} diff --git a/_pages/fr_FR/finalizing-setup.txt b/_pages/fr_FR/finalizing-setup.txt index d9e3e0af0e..1cd7110c03 100644 --- a/_pages/fr_FR/finalizing-setup.txt +++ b/_pages/fr_FR/finalizing-setup.txt @@ -20,6 +20,8 @@ On this page, we will make critical system file backups and install the followin It is not recommended to skip downloading any of these applications, as many of them will be used later on this page. At the end of this page, your SD card will be cleaned up by removing unnecessary installation files. {: .notice--warning} +### Compatibility Notes + If your **New 3DS** was on version 2.1.0 before following this guide, you should [restore your NAND backup](godmode9-usage#restoring-a-nand-backup) before continuing. {: .notice--warning} @@ -39,6 +41,8 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o #### Section I - Préparatifs +In this section, you will copy the files necessary to follow the rest of the instructions on this page. + 1. Éteignez votre 3DS 1. Insérez votre carte SD dans votre ordinateur 1. Créez un dossier nommé `cias` à la racine de votre carte SD si celui ci n'existe pas @@ -52,15 +56,20 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o 1. Réinsérez votre carte SD dans votre 3DS 1. Allumez votre console - ![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) - {: .notice--info} - ![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) - {: .notice--info} +The screenshots below indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. + +![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) +{: .notice--info} + -These screenshots indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. #### Section II - Mise à jour du système +In this section, you will update your system to the latest version, which is safe to do with custom firmware. + 1. Mettez à jour votre console en vous rendant dans les Paramètres de la console, puis "Autres paramètres", puis tout à droite sur l'option "Mise à jour" + Mettre à jour tout en ayant B9S + Luma (ce que vous avez) est sans danger + La console peut afficher un message disant "Aucune mise à jour nécessaire" au lieu de faire une mise à jour. Ceci est normal si vous êtes déjà à jour ; continuez vers la section suivante @@ -69,6 +78,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section III - Homebrew Launcher +In this section, you will temporarily replace Download Play with Homebrew Launcher (which we need to launch FBI). Download Play will automatically go back to normal once you reboot your device. + 1. Lancez l'application Mode Téléchargement (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. Attendez jusqu'à ce que vous voyiez les boutons `Nintendo 3DS` et `Nintendo DS` 1. Appuyez simultanément sur (L) + (Bas sur la croix directionnelle) + (Select) pour ouvrir le menu Rosalina @@ -83,6 +94,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section IV - RTC and DSP Setup +In this section, you will sync your 3DS internal clock with the actual time and dump the sound firmware (which is necesssary for some homebrew software to use sound properly). + 1. Appuyez simultanément sur (L) + (Bas sur la croix directionnelle) + (Select) pour ouvrir le menu Rosalina 1. Sélectionnez "Miscellaneous options" 1. Select "Dump DSP firmware" @@ -94,6 +107,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section V - Installing CIAs +In this section, you will install several useful homebrew applications to HOME Menu. + 1. Lancez FBI que vous trouverez dans la liste des homebrews 1. Naviguez vers `SD` -> `cias` 1. Sélectionnez "\" @@ -102,6 +117,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VI - CTRNAND Luma3DS +In this section, you will use a script to copy some of Luma3DS's files to internal memory so that they can be accessed, even without an SD card inserted. + 1. Éteignez votre 3DS 1. Appuyez sur le bouton (START) et maintenez le enfoncé tout en allumant votre console. Ceci lancera GodMode9 + Si votre console ne démarre pas sur GodMode9, assurez-vous que le fichier `GodMode9.firm` est présent dans `/luma/payloads/` et que `payloads` est correctement écrit @@ -118,6 +135,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VII - Nettoyage de la carte SD +In this section, you will use a script to remove some unnecessary files from your SD card. + 1. Sélectionnez "Cleanup SD Card" 1. Lorsque vous êtes invité, appuyez sur (A) 1. Appuyez sur (A) pour continuer @@ -125,6 +144,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VIII - Sauvegarde des fichiers essentiels +In this section, you will make backups of flies that can be used to recover from softwaer bricks or to recover data. + 1. Sélectionnez "Backup Options" 1. Sélectionnez "SysNAND Backup" 1. Appuyez sur (A) pour confirmer @@ -159,7 +180,7 @@ You're done! Custom firmware is now fully configured on your device. Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! {: .notice--info} -#### Informations et notes +### Information and Notes {% capture notice-6 %} Here are some key combos that you should know: diff --git a/_pages/fr_FR/homebrew-launcher-(pichaxx).txt b/_pages/fr_FR/homebrew-launcher-(pichaxx).txt index b9a0b72e3b..6a5c3ac99c 100644 --- a/_pages/fr_FR/homebrew-launcher-(pichaxx).txt +++ b/_pages/fr_FR/homebrew-launcher-(pichaxx).txt @@ -4,9 +4,17 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Table des matières" %} -### Lecture requise +
+Technical Details (optional) +This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. +
+{: .notice--info} -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE to run SafeB9SInstaller. +### Compatibility Notes + +These instructions work on USA, Europe, and Japan consoles as indicated by the letters U, E, or J after the system version. + +You will need a Nintendo Network ID to download Pokémon Picross. This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. {: .notice--warning} @@ -24,15 +32,8 @@ This process will overwrite your Pokémon Picross save file, if you have one. If #### Section I - Préparatifs -1. Allumez votre console -1. Open the Nintendo eShop -1. Tap the Search icon (small magnifying glass) -1. Search for `picross` -1. Open the store page for Pokémon Picross -1. Download Pokémon Picross - + Vous pouvez scanner [ce QR code](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFF&data=ESHOP://50010000037815&margin=0&qzone=1&size=400x400&ecc=L) en utilisant l'Appareil photo Nintendo 3DS pour un lien direct vers l'application eShop - + Your SD card must be inserted in your device to install Pokémon Picross -1. Éteignez votre 3DS +In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. + 1. Insérez votre carte SD dans votre ordinateur 1. Copiez `boot.firm` et `boot.3dsx` depuis Luma3DS `.zip`vers la racine de votre carte SD + La racine de la carte SD représente le répertoire initial de la carte SD où vous pouvez voir le dossier Nintendo 3DS, mais ce n'est pas à l'intérieur de ce dernier @@ -40,15 +41,23 @@ This process will overwrite your Pokémon Picross save file, if you have one. If 1. Copy the `slotTool` folder from the unSAFE_MODE `.zip` to the `3ds` folder on your SD card 1. Copy the otherapp payload for your region/version from the unSAFE_MODE `.zip`'s `otherapps_with_CfgS` folder to the root of your SD card and rename it to `otherapp.bin` +![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }}) +{: .notice--info} + + #### Section II - PicHaxx +In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device. 1. Ouvrez [le site Web de PicHaxx Injector](https://3ds.nhnarwhal.com/3dstools/pichaxx.php) sur votre ordinateur 1. Sélectionnez votre fichier `movable.sed` 1. Sélectionnez "Build and Download" 1. Attendez la fin de l'opération 1. Accédez à `Nintendo 3DS` ->``->``->`title` -> `00040000` ->` 0017c100` -> `data` sur votre carte SD + L'`` sera le même que celui que vous avez utilisé dans [Seedminer](seedminer) - + L'`` est un dossier de 32 caractères à l'intérieur du `` + + L'`` est un dossier de 32 caractères à l'intérieur du dossier `` 1. Copiez le fichier fraîchement téléchargé `00000001.sav` vers le dossier `data` sur votre carte SD + Remplacez l'ancien fichier de sauvegarde lorsque cela vous sera demandé diff --git a/_pages/fr_FR/installing-boot9strap-(fredtool).txt b/_pages/fr_FR/installing-boot9strap-(fredtool).txt index d223cd001c..1afbec3bfe 100644 --- a/_pages/fr_FR/installing-boot9strap-(fredtool).txt +++ b/_pages/fr_FR/installing-boot9strap-(fredtool).txt @@ -4,15 +4,16 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Table des matières" %} -### Lecture requise - -Cette méthode d'utilisation de Seedminer pour une exploitation ultérieure utilise votre fichier `movable.sed` pour déchiffrer n'importe quel titre DSiWare afin d'injecter un titre DSiWare exploitable dans l'application Connexions Nintendo DS. Cela nécessite d'avoir une sauvegarde d'un DSiWare, par exemple à partir de BannerBomb ou de l'outil DSiWare Dumper. - -Ceci est une implémentation de l'exploit "FIRM partitions known-plaintext" qui est décrit [ici](https://www.3dbrew.org/wiki/3DS_System_Flaws). +
+Technical Details (optional) +

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+
+{: .notice--info} ## Ce dont vous avez besoin -* A DSiWare Backup (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) +* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Votre fichier `movable.sed` obtenu grâce à [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -20,6 +21,8 @@ Ceci est une implémentation de l'exploit "FIRM partitions known-plaintext" qui #### Section I - Vérification de la présence d’un CFW +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + 1. Éteignez votre 3DS 1. Maintenez le bouton (Select) enfoncé 1. Allumez votre console tout en maintenant le bouton (Select) enfoncé @@ -30,17 +33,7 @@ If you see a configuration menu, you already have CFW, and continuing with these #### Section II - Préparatifs -1. Éteignez votre 3DS -1. Insérez votre carte SD dans votre ordinateur -1. Copiez `boot.firm` et `boot.3dsx` depuis Luma3DS `.zip`vers la racine de votre carte SD - + La racine de la carte SD représente le répertoire initial de la carte SD où vous pouvez voir le dossier Nintendo 3DS, mais ce n'est pas à l'intérieur de ce dernier -1. Copiez le fichier `boot.nds`(B9STool) vers la racine de votre carte SD -1. Copiez le dossier `private` du fichier `.zip` de Frogminer_save vers la racine de votre carte SD - - ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} - -#### Section III - Fredtool +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) @@ -53,19 +46,31 @@ If you see a configuration menu, you already have CFW, and continuing with these 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link +1. Insérez votre carte SD dans votre ordinateur 1. Naviguez vers `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` sur votre carte SD - + L'`` sera le même que celui que vous avez utilisé dans [Seedminer](seedminer) - + L'`` est un dossier de 32 caractères à l'intérieur du `` - + Si le dossier `Nintendo DSiWare` n'existe pas, créez-le à l'intérieur de `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` 1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder -1. Réinsérez votre carte SD dans votre 3DS + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copiez `boot.firm` et `boot.3dsx` depuis Luma3DS `.zip`vers la racine de votre carte SD + + La racine de la carte SD représente le répertoire initial de la carte SD où vous pouvez voir le dossier Nintendo 3DS, mais ce n'est pas à l'intérieur de ce dernier +1. Copiez le fichier `boot.nds`(B9STool) vers la racine de votre carte SD +1. Copiez le dossier `private` du fichier `.zip` de Frogminer_save vers la racine de votre carte SD + + ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} + +#### Section III - Overwriting DS Connection Settings + +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + 1. Allumez votre console 1. Lancez les Paramètres de la console -1. Naviguez vers`Gestion des données` -> `DSiWare` -1. Sous la section "Carte SD", sélectionnez le titre "Haxxxxxxxxx !" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title 1. Sélectionnez "Copier", puis sélectionnez "OK" 1. Retournez au menu principal des Paramètres de la console -1. Naviguez vers `Paramètres Internet` -> `Connexions Nintendo DS`, puis sélectionnez "OK" +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. Si l'exploit a réussi, votre console devrait avoir démarré la version japonaise de Flipnote Studio #### Section IV - Exploit Flipnote @@ -73,6 +78,8 @@ If you see a configuration menu, you already have CFW, and continuing with these Si vous préférez un guide visuel pour cette section, un tel guide est disponible [ici](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} +In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer. + 1. Terminez le processus de configuration initial pour le jeu lancé jusqu'à ce que vous atteigniez le menu principal + Sélectionnez l'option de gauche chaque fois que vous y êtes invité durant le processus de configuration 1. En utilisant l'écran tactile, sélectionnez la grande case à gauche, puis sélectionnez la boîte avec une icône de carte SD @@ -85,7 +92,7 @@ Si vous préférez un guide visuel pour cette section, un tel guide est disponib 1. Touchez la quatrième case contenant la lettre "A" 1. Si l'exploit a réussi, votre console devrait avoir démarré b9sTool 1. Séléctionnez "Install boot9strap" en utilisant la croix directionnelle - + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to start over from Step 12 of Section III + + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III 1. Appuyez sur (A), puis appuyez sur START et SELECT en même temps pour démarrer le processus 1. Une fois que le processus est terminé et que vous voyez le message "done." s'afficher sur l'écran du bas, quittez b9sTool, puis éteignez votre console + Vous allez peut-être devoir forcer la fermeture en maintenant le bouton d’alimentation enfoncé @@ -94,6 +101,8 @@ Si vous préférez un guide visuel pour cette section, un tel guide est disponib #### Section V - Luma3DS Verification +Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. + 1. Éteignez votre 3DS 1. Insérez votre carte SD dans votre ordinateur 1. Verify that a `luma` folder exists and that `config.ini` is inside of it @@ -106,13 +115,15 @@ At this point, your console will boot to Luma3DS by default. #### Section VI - Restauration des paramètres de Connexions Nintendo DS -1. Copy the `42383841.bin` file from the `clean/` folder of the downloaded DSiWare archive (`output_(name).zip`) to the `Nintendo 3DS///Nintendo DSiWare/` folder on your SD card - + Remplacez le fichier `42383841.bin` existant +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. + +1. Naviguez vers `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` sur votre carte SD +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one 1. Réinsérez votre carte SD dans votre 3DS 1. Allumez votre console 1. Lancez les Paramètres de la console -1. Naviguez vers`Gestion des données` -> `DSiWare` -1. Sous la section "Carte SD", sélectionnez le titre "Nintendo DSi™" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title 1. Sélectionnez "Copier", puis sélectionnez "OK" ___ diff --git a/_pages/fr_FR/installing-boot9strap-(hbl-usm).txt b/_pages/fr_FR/installing-boot9strap-(hbl-usm).txt index 483ab81f58..f1db5410af 100644 --- a/_pages/fr_FR/installing-boot9strap-(hbl-usm).txt +++ b/_pages/fr_FR/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,16 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Table des matières" %} -### Lecture requise +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

As we already have Homebrew access, we can use slotTool to do this.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+
+{: .notice--info} -Afin d'exploiter le firmware SAFE_MODE de notre console, nous devons injecter un profil Wi-Fi exploité. - -As we already have Homebrew access, we can use slotTool to do this. - -Une fois le profil WiFi injecté, nous utiliserons SAFE_MODE, qui est une fonctionnalité de récupération présente sur toutes les consoles 3DS, pour activer le profil WiFi exploité. +### Compatibility Notes If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--danger} @@ -24,7 +27,10 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint #### Section I - Préparatifs +In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. + 1. Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide + + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. Launch slotTool from the list of homebrew + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section 1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option @@ -36,22 +42,31 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint 1. Copy `usm.bin` from the unSAFE_MODE `.zip` to the root of your SD card 1. Put your SD card back into your console +![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} + #### Section II - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Maintenez les boutons enfoncés jusqu'à ce que la console démarre en mode sans échec + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Appuyez sur "OK" pour accepter la mise à jour + Aucune mise à jour nécessaire. Ceci fait partie de l'exploit 1. Appuyez sur « J'accepte » pour accepter les termes et conditions 1. The update will eventually fail, with the error code `003-1099`. Ne vous inquiétez pas, c'est normal 1. Lorsque votre console vous demande "Paramétrer la connexion Internet de la console ?", sélectionnez "Paramétrer" -1. Dans le menu suivant, accédez à `Connexion 1` -> `Modifier` -> `Page suivante (flèche de droite)` -> `Serveur proxy` -> `Paramètres avancés` - + Voici une [représentation visuelle](https://uwuu.ca/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. Si l'exploit a réussi, votre console devrait avoir démarré sur SafeB9SInstaller #### Section III - Installation de boot9strap +In this section, you will install custom firmware onto your device. + 1. Lorsque vous y êtes invité, entrez la combinaison de touches indiquée sur l'écran supérieur pour installer boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -65,6 +80,8 @@ At this point, your console will boot to Luma3DS by default. #### Section IV - Restoring WiFi Configuration Profiles +In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Lancez l’application Mode téléchargement 1. Attendez jusqu'à ce que vous voyiez les deux boutons + Do not press either of the buttons diff --git a/_pages/fr_FR/installing-boot9strap-(soundhax).txt b/_pages/fr_FR/installing-boot9strap-(soundhax).txt index 78236b7053..2161ef5170 100644 --- a/_pages/fr_FR/installing-boot9strap-(soundhax).txt +++ b/_pages/fr_FR/installing-boot9strap-(soundhax).txt @@ -4,7 +4,13 @@ title: "Installer boot9strap (Soundhax)" {% include toc title="Table des matières" %} -### Lecture requise +
+Technical Details (optional) +

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+
+{: .notice--info} + +### Compatibility Notes Soundhax (quand combiné avec pre9otherapp) est compatible avec les versions comprises entre 1.0.0 et 11.3.0 de toutes les régions. @@ -21,6 +27,8 @@ Soundhax (quand combiné avec pre9otherapp) est compatible avec les versions com #### Section I - Préparatifs +In this section, you will copy the files needed to trigger both Soundhax and universal-otherapp. + 1. Éteignez votre 3DS 1. Insérez votre carte SD dans votre ordinateur 1. Copiez le fichier SoundHax `.m4a` à la racine de votre carte SD @@ -33,11 +41,16 @@ Soundhax (quand combiné avec pre9otherapp) est compatible avec les versions com 1. Réinsérez votre carte SD dans votre 3DS 1. Allumez votre console - ![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} #### Section II - Lancer SafeB9SInstaller +In this section, you will launch Soundhax through the Nintendo 3DS Sound app, which will use universal-otherapp to launch the boot9strap (custom firmware) installer. + 1. Réinsérez votre carte SD dans votre 3DS 1. Allumez votre console 1. Lancez l'application Studio Son Nintendo 3DS @@ -58,6 +71,8 @@ Soundhax (quand combiné avec pre9otherapp) est compatible avec les versions com #### Section III - Installation de boot9strap +In this section, you will install custom firmware onto your device. + 1. Lorsque vous y êtes invité, entrez la combinaison de touches indiquée sur l'écran supérieur pour installer boot9strap 1. Once it is complete, press (A) to reboot your device 1. Votre console va redémarrer dans la configuration de Luma3DS diff --git a/_pages/fr_FR/installing-boot9strap-(usm).txt b/_pages/fr_FR/installing-boot9strap-(usm).txt index 20d1b2af07..9faecbd68a 100644 --- a/_pages/fr_FR/installing-boot9strap-(usm).txt +++ b/_pages/fr_FR/installing-boot9strap-(usm).txt @@ -4,15 +4,17 @@ title: "Installation de boot9strap (USM)" {% include toc title="Table des matières" %} -### Lecture requise +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

We can do this using an existing exploit, BannerBomb3.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

+
+{: .notice--info} -Afin d'exploiter le firmware SAFE_MODE de notre console, nous devons injecter un profil Wi-Fi exploité. - -Nous pouvons le faire en utilisant un exploit existant, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Une fois le profil WiFi injecté, nous utiliserons SAFE_MODE, qui est une fonctionnalité de récupération présente sur toutes les consoles 3DS, pour activer le profil WiFi exploité. +### Compatibility Notes Ces instructions fonctionnent dans les régions USA, Europe, Japon et Corée indiquées par les lettres U, E, J ou K après le numéro de version de la console. @@ -29,6 +31,8 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will #### Section I - Préparatifs +In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. + 1. Si votre console est allumée, éteignez la 1. Ouvrez [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) sur votre ordinateur 1. Téléchargez votre movable.sed en utilisant l'option "Choisir le fichier" @@ -41,47 +45,51 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will 1. Copiez `boot9strap.firm` et `boot9strap.firm.sha` depuis le fichier ".zip" de boot9strap vers le dossier `/boot9strap/` sur votre carte SD 1. Copiez `SafeB9SInstaller.bin` depuis le fichier `.zip` de SafeB9SInstaller à la racine de votre carte SD 1. Copiez `usm.bin` depuis l'archive `unSAFE_MODE.zip` vers la racine de votre carte SD - + ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }}) - {: .notice--info} - + ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} + ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + L'`` sera le même que celui que vous avez utilisé dans [Seedminer](seedminer) - + L'`` est un dossier de 32 caractères à l'intérieur du dossier `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card 1. Copiez le fichier `F00D43D5.bin` depuis `unSAFE_MODE.zip` vers le dossier `Nintendo DSiWare` - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. + 1. Réinsérez votre carte SD dans votre 3DS 1. Allumez votre console 1. Lancez les Paramètres de la console -1. Naviguez vers`Gestion des données` -> `DSiWare` -1. Cliquez sur l'onglet Carte SD - + Votre console devrait afficher un menu avec du texte +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Sélectionnez "Inject haxx" +1. Press (A) to select "Inject haxx" + Votre console s'éteindra automatiquement #### Section III - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Maintenez les boutons enfoncés jusqu'à ce que la console démarre en mode sans échec + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Appuyez sur "OK" pour accepter la mise à jour + Aucune mise à jour nécessaire. Ceci fait partie de l'exploit 1. Appuyez sur « J'accepte » pour accepter les termes et conditions 1. The update will eventually fail, with the error code `003-1099`. Ne vous inquiétez pas, c'est normal 1. Lorsque votre console vous demande "Paramétrer la connexion Internet de la console ?", sélectionnez "Paramétrer" -1. Dans le menu suivant, accédez à `Connexion 1` -> `Modifier` -> `Page suivante (flèche de droite)` -> `Serveur proxy` -> `Paramètres avancés` - + This is a [visual representation](/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. Si l'exploit a réussi, votre console devrait avoir démarré sur SafeB9SInstaller #### Section IV - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. Lorsque vous y êtes invité, entrez la combinaison de touches indiquée sur l'écran supérieur pour installer boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -95,16 +103,17 @@ At this point, your console will boot to Luma3DS by default. #### Section V - Restoring WiFi Configuration Profiles +In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Lancez les Paramètres de la console -1. Naviguez vers`Gestion des données` -> `DSiWare` -1. Cliquez sur l'onglet Carte SD - + Votre console devrait afficher un menu avec du texte -1. Sélectionnez "Restore slots" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) +1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + Your device will automatically reboot 1. Éteignez votre 3DS 1. Insérez votre carte SD dans votre ordinateur 1. Naviguez vers `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` sur votre carte SD -1. Supprimez `F00D43D5.bin` de votre dossier Nintendo DSiWare +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. Ce fichier ne sera plus nécessaire ___ diff --git a/_pages/fr_FR/seedminer.txt b/_pages/fr_FR/seedminer.txt index aab1e2732f..456f520c61 100644 --- a/_pages/fr_FR/seedminer.txt +++ b/_pages/fr_FR/seedminer.txt @@ -4,52 +4,54 @@ title: "Seedminer" {% include toc title="Table des matières" %} -### Lecture requise +
+Technical Details (optional) +

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

+

For information on how Seedminer works, see this presentation.

+

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+
+{: .notice--info} -Pour installer boot9strap sur votre 3DS, nous dérivons la clé de chiffrement unique de votre console. Pour y parvenir, nous allons utiliser un outil nommé Seedminer pour calculer la clé de chiffrement de données (movable.sed) de votre console. +### Section I - Prep Work -Pour plus d'informations sur le fonctionnement de Seedminer, regardez [cette présentation](https://zoogie.github.io/web/34⅕c3). - -Cette méthode utilise une carte graphique puissante pour effectuer les calculs nécessaires. Un site web géré par des bénévoles est utilisé dans le but de vous aider avec cette méthode. - -### Instructions - -#### Section I - Préparatifs +In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. 1. Insérez votre carte SD dans votre ordinateur 1. Naviguez vers le dossier `Nintendo 3DS` de votre carte SD -1. Copiez le nom du dossier qui fait 32 caractères de long que vous voyez dans Nintendo 3DS - + N'allez plus dans aucun dossier - + Si vous voyez plusieurs dossiers de 32 caractères, suivez [ces instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + + If you don't have a `Nintendo 3DS` folder, put your SD card into your 3DS and power it on so that the folder can be created +1. Copy the name of the 32-letter folder you see directly inside Nintendo 3DS + + This 32-letter name is system-specific and will be different for each console + + If you see multiple 32-letter folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + Vous pouvez ignorer le dossier `private` si vous l'avez - ![]({{ "/images/screenshots/id0-example.png" | absolute_url }}) + ![]({{ "/images/screenshots/seedminer/id0-example.png" | absolute_url }}) {: .notice--info} -1. Collez le nom du dossier (qui fait 32 caractères de long) dans un document pour pouvoir le récupérer plus tard - + Ce nom de dossier est aussi appelé votre "ID0" +1. Paste your 32 character long folder name into [a document](/images/screenshots/seedminer/text-document.png) you can reference later + + This folder is known as your "ID0". Take note of this as this guide will refer to it as such later 1. Allumez votre console + Votre carte SD n'a pas besoin d'être insérée à ce stade 1. Accédez à votre Liste d’amis (l'[icône avec un visage orange]({{"/images/friend-list-icon.png" | absolute_url}}) dans la rangée du haut de votre Menu HOME) + Si vous obtenez une erreur et que vous êtes renvoyé vers le Menu HOME, vous devez soit créer un nouveau Mii, soit votre console ne peut pas se connecter aux serveurs de Nintendo (en raison d'un bannissement ou de problèmes de connexion) 1. Trouvez le profil de votre Mii, puis trouvez le champ "Code ami" sur l'écran supérieur -#### Section II - Seedminer +### Section II - Seedminer + +In this section, you will use the Bruteforce Movable website to retrieve your device's encryption key in the form of `movable.sed`. 1. Open [Bruteforce Movable](https://seedminer.hacks.guide/) on your computer - + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) + If the site isn't working, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field - + Do not attempt to enter the ID0 by hand. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section + + Do not attempt to enter the ID0 manually, as it is easy to make a mistake. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section 1. Select "Go" + If the site immediately goes to step 4, the website has already correctly processed your bruteforce request. You can download your `movable.sed` file and continue to the next section. You do not need to re-add the bot -1. Use the "Register Friend" button on your device to add the bot's friend code as given by the website +1. Use the ["Register Friend" button](/images/screenshots/seedminer/register-friend.png) on your device to add the bot's friend code as given by the website + If prompted, the name that you give to the friend does not matter 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once 1. Once the site processes your information, the site will continue to `Step 2: Bruteforce` automatically 1. Wait for the remainder of the process to complete - + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour + + This is usually fast (1-5 minutes) + During this process, the bot you added may not show up on your 3DS. As long as the website updates, this is not an issue + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site @@ -57,7 +59,7 @@ Cette méthode utilise une carte graphique puissante pour effectuer les calculs ___ -### Prochaînes étapes +### Next steps: Choose an exploit Une fois que vous avez la clé de chiffrement de votre console (`movable.sed`), vous l'utiliserez en conjonction avec d'autres exploits pour installer un custom firmware sur votre 3DS. diff --git a/_pages/he_IL/bannerbomb3.txt b/_pages/he_IL/bannerbomb3.txt index ac7fb7cc79..6477cc4aa0 100644 --- a/_pages/he_IL/bannerbomb3.txt +++ b/_pages/he_IL/bannerbomb3.txt @@ -4,11 +4,15 @@ title: "BannerBomb3" {% include toc title="תוכן העניינים" %} -### קריאה דרושה +
+Technical Details (optional) +

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

For a more technical explanation, see here.

+
+{: .notice--info} -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -20,6 +24,9 @@ If you have a Taiwanese console (indicated by a T after the system version), fol * Your `movable.sed` file from completing [Seedminer](seedminer) #### חלק I - הכנות + +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + 1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer 1. Upload your movable.sed using the "Choose File" option 1. Click "Build and Download" @@ -27,28 +34,31 @@ If you have a Taiwanese console (indicated by a T after the system version), fol 1. If your console is powered on, power off your console 1. תכניסו את ה-SD שלכם למחשב 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from the BannerBomb3 `.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. + 1. תכניסו מחדש את כרטיס הSD שלכם לתוך המכשיר שלכם 1. תפעילו את המכשיר 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section +1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked 1. תכבו את המכשיר 1. תכניסו את ה-SD שלכם למחשב -1. You should now have `42383841.bin` in SD root. This is the DSiWare backup you will use later in the guide -1. Navigate to `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card - + This `` will be the same one that you used in [Seedminer](seedminer) -1. Delete `F00D43D5.bin` from the Nintendo DSiWare folder and from your computer. This file will not be needed anymore +1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore + Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} diff --git a/_pages/he_IL/finalizing-setup.txt b/_pages/he_IL/finalizing-setup.txt index 782c0918a8..153b6dc1c4 100644 --- a/_pages/he_IL/finalizing-setup.txt +++ b/_pages/he_IL/finalizing-setup.txt @@ -20,6 +20,8 @@ On this page, we will make critical system file backups and install the followin It is not recommended to skip downloading any of these applications, as many of them will be used later on this page. At the end of this page, your SD card will be cleaned up by removing unnecessary installation files. {: .notice--warning} +### Compatibility Notes + If your **New 3DS** was on version 2.1.0 before following this guide, you should [restore your NAND backup](godmode9-usage#restoring-a-nand-backup) before continuing. {: .notice--warning} @@ -39,6 +41,8 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o #### חלק I - הכנות +In this section, you will copy the files necessary to follow the rest of the instructions on this page. + 1. תכבו את המכשיר 1. תכניסו את ה-SD שלכם למחשב 1. צרו תיקייה בשם `cias` בתיקיית האם של כרטיס ה- SD שלכם אם לא קיימת תיקייה כזו @@ -52,15 +56,20 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o 1. תכניסו מחדש את כרטיס הSD שלכם לתוך המכשיר שלכם 1. תפעילו את המכשיר - ![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) - {: .notice--info} - ![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) - {: .notice--info} +The screenshots below indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. + +![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) +{: .notice--info} + -These screenshots indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. #### חלק II - עדכון המערכת +In this section, you will update your system to the latest version, which is safe to do with custom firmware. + 1. עדכנו את המכשיר שלכם על ידי לחיצה על System Sttings, לאחר מכן "Other Settings", לכו ימינה עד הסוף ואז לחצו על "System Update" + עדכונים שתבצעו תוך שימוש ב-B9S+Luma (במידה שיש לכם את שניהם) הם בטוחים לחלוטין + The updater may display a message saying "Your system is up to date" instead of updating. This is normal if you are already up to date; continue with the next section @@ -69,6 +78,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section III - Homebrew Launcher +In this section, you will temporarily replace Download Play with Homebrew Launcher (which we need to launch FBI). Download Play will automatically go back to normal once you reboot your device. + 1. Launch the Download Play application (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. Wait until you see the `Nintendo 3DS` and `Nintendo DS` buttons 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu @@ -83,6 +94,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section IV - RTC and DSP Setup +In this section, you will sync your 3DS internal clock with the actual time and dump the sound firmware (which is necesssary for some homebrew software to use sound properly). + 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu 1. תבחרו ב "Miscellaneous options" 1. Select "Dump DSP firmware" @@ -94,6 +107,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section V - Installing CIAs +In this section, you will install several useful homebrew applications to HOME Menu. + 1. תפעילו את FBI מרשימת הhomebrew שלכם 1. נווטו אל `SD` ושם אל `cias` 1. לחצו על "\" @@ -102,6 +117,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### חלק VI - Luma3DS על ה- CTRNAND +In this section, you will use a script to copy some of Luma3DS's files to internal memory so that they can be accessed, even without an SD card inserted. + 1. תכבו את המכשיר 1. Press and hold (Start), and while holding (Start), power on your device. This will launch GodMode9 + If you do not boot into GodMode9, ensure that `GodMode9.firm` is in `/luma/payloads/` and that `payloads` is correctly spelled @@ -118,6 +135,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VII - Cleanup SD Card +In this section, you will use a script to remove some unnecessary files from your SD card. + 1. Select "Cleanup SD Card" 1. כשתתבקשו, תלחצו (A) כדי להמשיך 1. תלחצו (A) כדי להמשיך @@ -125,6 +144,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VIII - Backup Essential Files +In this section, you will make backups of flies that can be used to recover from softwaer bricks or to recover data. + 1. Select "Backup Options" 1. Select "SysNAND Backup" 1. תלחצו (A) כדי לאשר @@ -159,7 +180,7 @@ You're done! Custom firmware is now fully configured on your device. Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! {: .notice--info} -#### Information and Notes +### Information and Notes {% capture notice-6 %} Here are some key combos that you should know: diff --git a/_pages/he_IL/homebrew-launcher-(pichaxx).txt b/_pages/he_IL/homebrew-launcher-(pichaxx).txt index dbaa012168..3b14b477ab 100644 --- a/_pages/he_IL/homebrew-launcher-(pichaxx).txt +++ b/_pages/he_IL/homebrew-launcher-(pichaxx).txt @@ -4,9 +4,17 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="תוכן העניינים" %} -### קריאה דרושה +
+Technical Details (optional) +This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. +
+{: .notice--info} -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE to run SafeB9SInstaller. +### Compatibility Notes + +These instructions work on USA, Europe, and Japan consoles as indicated by the letters U, E, or J after the system version. + +You will need a Nintendo Network ID to download Pokémon Picross. This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. {: .notice--warning} @@ -24,15 +32,8 @@ This process will overwrite your Pokémon Picross save file, if you have one. If #### חלק I - הכנות -1. תפעילו את המכשיר -1. Open the Nintendo eShop -1. Tap the Search icon (small magnifying glass) -1. Search for `picross` -1. Open the store page for Pokémon Picross -1. Download Pokémon Picross - + You can scan [this QR code](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=ESHOP://50010000037815&margin=0&qzone=1&size=400x400&ecc=L) using the Nintendo 3DS Camera for a direct link to the eShop app - + Your SD card must be inserted in your device to install Pokémon Picross -1. תכבו את המכשיר +In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. + 1. תכניסו את ה-SD שלכם למחשב 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it @@ -40,8 +41,16 @@ This process will overwrite your Pokémon Picross save file, if you have one. If 1. Copy the `slotTool` folder from the unSAFE_MODE `.zip` to the `3ds` folder on your SD card 1. Copy the otherapp payload for your region/version from the unSAFE_MODE `.zip`'s `otherapps_with_CfgS` folder to the root of your SD card and rename it to `otherapp.bin` +![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }}) +{: .notice--info} + + #### Section II - PicHaxx +In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device. 1. Open [the PicHaxx Injector website](https://3ds.nhnarwhal.com/3dstools/pichaxx.php) on your computer 1. Select your `movable.sed` file 1. Select "Build and Download" diff --git a/_pages/he_IL/installing-boot9strap-(fredtool).txt b/_pages/he_IL/installing-boot9strap-(fredtool).txt index d2eeeff630..255c6b9ac5 100644 --- a/_pages/he_IL/installing-boot9strap-(fredtool).txt +++ b/_pages/he_IL/installing-boot9strap-(fredtool).txt @@ -4,15 +4,16 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="תוכן העניינים" %} -### קריאה דרושה - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, for example from BannerBomb or the DSiWare Dumper tool. - -זה כרגע יישום עובד של הפירצה "PLAINTEXT ידוע למחיצת הFIRM" עם הסבר [כאן](https://www.3dbrew.org/wiki/3DS_System_Flaws). +
+Technical Details (optional) +

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+
+{: .notice--info} ### What You Need -* A DSiWare Backup (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) +* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -20,6 +21,8 @@ This method of using Seedminer for further exploitation uses your `movable.sed` #### Section I - CFW Check +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + 1. תכבו את המכשיר 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button @@ -30,17 +33,7 @@ If you see a configuration menu, you already have CFW, and continuing with these #### Section II - Prep Work -1. תכבו את המכשיר -1. תכניסו את ה-SD שלכם למחשב -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card - - ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} - -#### Section III - Fredtool +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) @@ -53,19 +46,31 @@ If you see a configuration menu, you already have CFW, and continuing with these 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link +1. תכניסו את ה-SD שלכם למחשב 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` - + If the `Nintendo DSiWare` folder does not exist, create it inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` 1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder -1. תכניסו מחדש את כרטיס הSD שלכם לתוך המכשיר שלכם + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card + + ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} + +#### Section III - Overwriting DS Connection Settings + +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + 1. תפעילו את המכשיר 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Haxxxxxxxxx!" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title 1. Select "Copy", then select "OK" 1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio #### Section IV - Flipnote Exploit @@ -73,6 +78,8 @@ If you see a configuration menu, you already have CFW, and continuing with these If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} +In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer. + 1. Complete the initial setup process for the launched game until you reach the main menu + Select the left option whenever prompted during the setup process 1. Using the touch-screen, select the large left box, then select the box with an SD card icon @@ -85,7 +92,7 @@ If you would prefer a visual guide to this section, one is available [here](http 1. Tap the fourth box with the letter "A" in it 1. If the exploit was successful, your device will have loaded b9sTool 1. Using the D-Pad, move to "Install boot9strap" - + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to start over from Step 12 of Section III + + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III 1. Press (A), then press START and SELECT at the same time to begin the process 1. Once completed and the bottom screen says "done.", exit b9sTool, then power off your device + אולי תצטרכו לאלץ כיבוי על ידי החזקת כפתור ההפעלה @@ -94,6 +101,8 @@ If you would prefer a visual guide to this section, one is available [here](http #### Section V - Luma3DS Verification +Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. + 1. תכבו את המכשיר 1. תכניסו את ה-SD שלכם למחשב 1. Verify that a `luma` folder exists and that `config.ini` is inside of it @@ -106,13 +115,15 @@ At this point, your console will boot to Luma3DS by default. #### Section VI - Restoring DS Connection Settings -1. Copy the `42383841.bin` file from the `clean/` folder of the downloaded DSiWare archive (`output_(name).zip`) to the `Nintendo 3DS///Nintendo DSiWare/` folder on your SD card - + Replace the existing `42383841.bin` file +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one 1. תכניסו מחדש את כרטיס הSD שלכם לתוך המכשיר שלכם 1. תפעילו את המכשיר 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Nintendo DSi™" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title 1. Select "Copy", then select "OK" ___ diff --git a/_pages/he_IL/installing-boot9strap-(hbl-usm).txt b/_pages/he_IL/installing-boot9strap-(hbl-usm).txt index 67a1bf671c..224ca618b8 100644 --- a/_pages/he_IL/installing-boot9strap-(hbl-usm).txt +++ b/_pages/he_IL/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,16 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="תוכן העניינים" %} -### קריאה דרושה +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

As we already have Homebrew access, we can use slotTool to do this.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--danger} @@ -24,7 +27,10 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint #### חלק I - הכנות +In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. + 1. Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide + + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. Launch slotTool from the list of homebrew + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section 1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option @@ -36,22 +42,31 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint 1. Copy `usm.bin` from the unSAFE_MODE `.zip` to the root of your SD card 1. Put your SD card back into your console +![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} + #### Section II - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](https://uwuu.ca/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### חלק III - התקנת boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -65,6 +80,8 @@ At this point, your console will boot to Luma3DS by default. #### Section IV - Restoring WiFi Configuration Profiles +In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. תפעילו את Download Play 1. Wait until you see the two buttons + Do not press either of the buttons diff --git a/_pages/he_IL/installing-boot9strap-(soundhax).txt b/_pages/he_IL/installing-boot9strap-(soundhax).txt index 3d18b9def0..a39a3fae24 100644 --- a/_pages/he_IL/installing-boot9strap-(soundhax).txt +++ b/_pages/he_IL/installing-boot9strap-(soundhax).txt @@ -4,7 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="תוכן העניינים" %} -### קריאה דרושה +
+Technical Details (optional) +

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+
+{: .notice--info} + +### Compatibility Notes Soundhax (when combined with universal-otherapp) is compatible with versions 1.0.0 through 11.3.0 in all regions. @@ -21,6 +27,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### חלק I - הכנות +In this section, you will copy the files needed to trigger both Soundhax and universal-otherapp. + 1. תכבו את המכשיר 1. תכניסו את ה-SD שלכם למחשב 1. תעתיקו את קובץ האודיו עם סיומת "M4A" שמתאים לקונסולה שלכם ל-SD @@ -33,11 +41,16 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 1. תכניסו מחדש את כרטיס הSD שלכם לתוך המכשיר שלכם 1. תפעילו את המכשיר - ![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} #### חלק II - הפעלת SafeB9SInstaller +In this section, you will launch Soundhax through the Nintendo 3DS Sound app, which will use universal-otherapp to launch the boot9strap (custom firmware) installer. + 1. תכניסו מחדש את כרטיס הSD שלכם לתוך המכשיר שלכם 1. תפעילו את המכשיר 1. כנסו לנגן המוזיקה @@ -58,6 +71,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### חלק III - התקנת boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap 1. Once it is complete, press (A) to reboot your device 1. הקןנסולה שלכם צריכה לאתחל לתפריט ההגדרות של Luma3DS diff --git a/_pages/he_IL/installing-boot9strap-(usm).txt b/_pages/he_IL/installing-boot9strap-(usm).txt index f928770b9f..0abca28fb5 100644 --- a/_pages/he_IL/installing-boot9strap-(usm).txt +++ b/_pages/he_IL/installing-boot9strap-(usm).txt @@ -4,15 +4,17 @@ title: "Installing boot9strap (USM)" {% include toc title="תוכן העניינים" %} -### קריאה דרושה +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

We can do this using an existing exploit, BannerBomb3.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -29,6 +31,8 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will #### חלק I - הכנות +In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. + 1. If your device is powered on, power off your device 1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer 1. Upload your movable.sed using the "Choose File" option @@ -41,47 +45,51 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will 1. תעתיקו את`boot9strap.firm` ואת `boot9strap.firm.sha` מה `.zip` של boot9strap אל תיקיית `/boot9strap/`על כרטיס הSD שלכם 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card 1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - + ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }}) - {: .notice--info} - + ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} + ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card 1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. + 1. תכניסו מחדש את כרטיס הSD שלכם לתוך המכשיר שלכם 1. תפעילו את המכשיר 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Select "Inject haxx" +1. Press (A) to select "Inject haxx" + Your device will automatically power off #### Section III - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section IV - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -95,16 +103,17 @@ At this point, your console will boot to Luma3DS by default. #### Section V - Restoring WiFi Configuration Profiles +In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text -1. Select "Restore slots" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) +1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + Your device will automatically reboot 1. תכבו את המכשיר 1. תכניסו את ה-SD שלכם למחשב 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore ___ diff --git a/_pages/he_IL/seedminer.txt b/_pages/he_IL/seedminer.txt index f4dfa4cfb4..82c628684e 100644 --- a/_pages/he_IL/seedminer.txt +++ b/_pages/he_IL/seedminer.txt @@ -4,52 +4,54 @@ title: "Seedminer" {% include toc title="תוכן העניינים" %} -### קריאה דרושה +
+Technical Details (optional) +

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

+

For information on how Seedminer works, see this presentation.

+

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+
+{: .notice--info} -To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. +### Section I - Prep Work -For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). - -This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. - -### הנחיות - -#### חלק I - הכנות +In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. 1. תכניסו את ה-SD שלכם למחשב 1. Navigate to the `Nintendo 3DS` folder on your SD card -1. Copy the 32 character long name of the folder you see inside Nintendo 3DS - + Do not go inside any more folders - + If you see multiple 32 character long folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + + If you don't have a `Nintendo 3DS` folder, put your SD card into your 3DS and power it on so that the folder can be created +1. Copy the name of the 32-letter folder you see directly inside Nintendo 3DS + + This 32-letter name is system-specific and will be different for each console + + If you see multiple 32-letter folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + You can ignore the `private` folder if you have it - ![]({{ "/images/screenshots/id0-example.png" | absolute_url }}) + ![]({{ "/images/screenshots/seedminer/id0-example.png" | absolute_url }}) {: .notice--info} -1. Paste your 32 character long folder name into a document you can reference later - + This folder name is also known as your "ID0" +1. Paste your 32 character long folder name into [a document](/images/screenshots/seedminer/text-document.png) you can reference later + + This folder is known as your "ID0". Take note of this as this guide will refer to it as such later 1. תפעילו את המכשיר + Your SD card does not need to be inserted at this point 1. Go to your Friend List (the [orange Face Icon]({{ "/images/friend-list-icon.png" | absolute_url }}) in the top row of your HOME Menu) + If you receive an error and are kicked out of the menu, you either must create a new Mii or your device cannot connect to Nintendo's servers (due to a ban or connection issues) 1. Find your Mii profile, then find the "Friend Code" field on the top screen -#### Section II - Seedminer +### Section II - Seedminer + +In this section, you will use the Bruteforce Movable website to retrieve your device's encryption key in the form of `movable.sed`. 1. Open [Bruteforce Movable](https://seedminer.hacks.guide/) on your computer - + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) + If the site isn't working, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field - + Do not attempt to enter the ID0 by hand. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section + + Do not attempt to enter the ID0 manually, as it is easy to make a mistake. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section 1. Select "Go" + If the site immediately goes to step 4, the website has already correctly processed your bruteforce request. You can download your `movable.sed` file and continue to the next section. You do not need to re-add the bot -1. Use the "Register Friend" button on your device to add the bot's friend code as given by the website +1. Use the ["Register Friend" button](/images/screenshots/seedminer/register-friend.png) on your device to add the bot's friend code as given by the website + If prompted, the name that you give to the friend does not matter 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once 1. Once the site processes your information, the site will continue to `Step 2: Bruteforce` automatically 1. Wait for the remainder of the process to complete - + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour + + This is usually fast (1-5 minutes) + During this process, the bot you added may not show up on your 3DS. As long as the website updates, this is not an issue + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site @@ -57,7 +59,7 @@ This method uses a powerful graphics card to perform the calculations needed. A ___ -### Next Steps +### Next steps: Choose an exploit Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. diff --git a/_pages/hr_HR/bannerbomb3.txt b/_pages/hr_HR/bannerbomb3.txt index a0b1ef007e..5a46749529 100644 --- a/_pages/hr_HR/bannerbomb3.txt +++ b/_pages/hr_HR/bannerbomb3.txt @@ -4,11 +4,15 @@ title: "BannerBomb3" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

For a more technical explanation, see here.

+
+{: .notice--info} -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -20,6 +24,9 @@ If you have a Taiwanese console (indicated by a T after the system version), fol * Your `movable.sed` file from completing [Seedminer](seedminer) #### Section I - Prep Work + +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + 1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer 1. Upload your movable.sed using the "Choose File" option 1. Click "Build and Download" @@ -27,28 +34,31 @@ If you have a Taiwanese console (indicated by a T after the system version), fol 1. If your console is powered on, power off your console 1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from the BannerBomb3 `.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section +1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked 1. Power off your device 1. Insert your SD card into your computer -1. You should now have `42383841.bin` in SD root. This is the DSiWare backup you will use later in the guide -1. Navigate to `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card - + This `` will be the same one that you used in [Seedminer](seedminer) -1. Delete `F00D43D5.bin` from the Nintendo DSiWare folder and from your computer. This file will not be needed anymore +1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore + Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} diff --git a/_pages/hr_HR/finalizing-setup.txt b/_pages/hr_HR/finalizing-setup.txt index c5b41ec5b8..29ed5ffea6 100644 --- a/_pages/hr_HR/finalizing-setup.txt +++ b/_pages/hr_HR/finalizing-setup.txt @@ -20,6 +20,8 @@ On this page, we will make critical system file backups and install the followin It is not recommended to skip downloading any of these applications, as many of them will be used later on this page. At the end of this page, your SD card will be cleaned up by removing unnecessary installation files. {: .notice--warning} +### Compatibility Notes + If your **New 3DS** was on version 2.1.0 before following this guide, you should [restore your NAND backup](godmode9-usage#restoring-a-nand-backup) before continuing. {: .notice--warning} @@ -39,6 +41,8 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o #### Section I - Prep Work +In this section, you will copy the files necessary to follow the rest of the instructions on this page. + 1. Power off your device 1. Insert your SD card into your computer 1. Create a folder named `cias` on the root of your SD card if it does not already exist @@ -52,15 +56,20 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o 1. Reinsert your SD card into your device 1. Power on your device - ![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) - {: .notice--info} - ![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) - {: .notice--info} +The screenshots below indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. + +![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) +{: .notice--info} + -These screenshots indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. #### Section II - Updating the System +In this section, you will update your system to the latest version, which is safe to do with custom firmware. + 1. Update your device by going to System Settings, then "Other Settings", then going all the way to the right and using "System Update" + Updates while using B9S + Luma (what you have) are safe + The updater may display a message saying "Your system is up to date" instead of updating. This is normal if you are already up to date; continue with the next section @@ -69,6 +78,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section III - Homebrew Launcher +In this section, you will temporarily replace Download Play with Homebrew Launcher (which we need to launch FBI). Download Play will automatically go back to normal once you reboot your device. + 1. Launch the Download Play application (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. Wait until you see the `Nintendo 3DS` and `Nintendo DS` buttons 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu @@ -83,6 +94,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section IV - RTC and DSP Setup +In this section, you will sync your 3DS internal clock with the actual time and dump the sound firmware (which is necesssary for some homebrew software to use sound properly). + 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu 1. Select "Miscellaneous options" 1. Select "Dump DSP firmware" @@ -94,6 +107,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section V - Installing CIAs +In this section, you will install several useful homebrew applications to HOME Menu. + 1. Launch FBI from the list of homebrew 1. Navigate to `SD` -> `cias` 1. Select "\" @@ -102,6 +117,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VI - CTRNAND Luma3DS +In this section, you will use a script to copy some of Luma3DS's files to internal memory so that they can be accessed, even without an SD card inserted. + 1. Power off your device 1. Press and hold (Start), and while holding (Start), power on your device. This will launch GodMode9 + If you do not boot into GodMode9, ensure that `GodMode9.firm` is in `/luma/payloads/` and that `payloads` is correctly spelled @@ -118,6 +135,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VII - Cleanup SD Card +In this section, you will use a script to remove some unnecessary files from your SD card. + 1. Select "Cleanup SD Card" 1. When prompted, press (A) to proceed 1. Press (A) to continue @@ -125,6 +144,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VIII - Backup Essential Files +In this section, you will make backups of flies that can be used to recover from softwaer bricks or to recover data. + 1. Select "Backup Options" 1. Select "SysNAND Backup" 1. Press (A) to confirm @@ -159,7 +180,7 @@ You're done! Custom firmware is now fully configured on your device. Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! {: .notice--info} -#### Information and Notes +### Information and Notes {% capture notice-6 %} Here are some key combos that you should know: diff --git a/_pages/hr_HR/homebrew-launcher-(pichaxx).txt b/_pages/hr_HR/homebrew-launcher-(pichaxx).txt index 6348abc52a..aff6795262 100644 --- a/_pages/hr_HR/homebrew-launcher-(pichaxx).txt +++ b/_pages/hr_HR/homebrew-launcher-(pichaxx).txt @@ -4,9 +4,17 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. +
+{: .notice--info} -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE to run SafeB9SInstaller. +### Compatibility Notes + +These instructions work on USA, Europe, and Japan consoles as indicated by the letters U, E, or J after the system version. + +You will need a Nintendo Network ID to download Pokémon Picross. This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. {: .notice--warning} @@ -24,15 +32,8 @@ This process will overwrite your Pokémon Picross save file, if you have one. If #### Section I - Prep Work -1. Power on your device -1. Open the Nintendo eShop -1. Tap the Search icon (small magnifying glass) -1. Search for `picross` -1. Open the store page for Pokémon Picross -1. Download Pokémon Picross - + You can scan [this QR code](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=ESHOP://50010000037815&margin=0&qzone=1&size=400x400&ecc=L) using the Nintendo 3DS Camera for a direct link to the eShop app - + Your SD card must be inserted in your device to install Pokémon Picross -1. Power off your device +In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. + 1. Insert your SD card into your computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it @@ -40,8 +41,16 @@ This process will overwrite your Pokémon Picross save file, if you have one. If 1. Copy the `slotTool` folder from the unSAFE_MODE `.zip` to the `3ds` folder on your SD card 1. Copy the otherapp payload for your region/version from the unSAFE_MODE `.zip`'s `otherapps_with_CfgS` folder to the root of your SD card and rename it to `otherapp.bin` +![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }}) +{: .notice--info} + + #### Section II - PicHaxx +In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device. 1. Open [the PicHaxx Injector website](https://3ds.nhnarwhal.com/3dstools/pichaxx.php) on your computer 1. Select your `movable.sed` file 1. Select "Build and Download" diff --git a/_pages/hr_HR/installing-boot9strap-(fredtool).txt b/_pages/hr_HR/installing-boot9strap-(fredtool).txt index 78598ce783..1f7825ac28 100644 --- a/_pages/hr_HR/installing-boot9strap-(fredtool).txt +++ b/_pages/hr_HR/installing-boot9strap-(fredtool).txt @@ -4,15 +4,16 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Table of Contents" %} -### Required Reading - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, for example from BannerBomb or the DSiWare Dumper tool. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). +
+Technical Details (optional) +

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+
+{: .notice--info} ### What You Need -* A DSiWare Backup (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) +* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -20,6 +21,8 @@ This is a currently working implementation of the "FIRM partitions known-plainte #### Section I - CFW Check +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + 1. Power off your device 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button @@ -30,17 +33,7 @@ If you see a configuration menu, you already have CFW, and continuing with these #### Section II - Prep Work -1. Power off your device -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card - - ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} - -#### Section III - Fredtool +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) @@ -53,19 +46,31 @@ If you see a configuration menu, you already have CFW, and continuing with these 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link +1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` - + If the `Nintendo DSiWare` folder does not exist, create it inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` 1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder -1. Reinsert your SD card into your device + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card + + ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} + +#### Section III - Overwriting DS Connection Settings + +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Haxxxxxxxxx!" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title 1. Select "Copy", then select "OK" 1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio #### Section IV - Flipnote Exploit @@ -73,6 +78,8 @@ If you see a configuration menu, you already have CFW, and continuing with these If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} +In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer. + 1. Complete the initial setup process for the launched game until you reach the main menu + Select the left option whenever prompted during the setup process 1. Using the touch-screen, select the large left box, then select the box with an SD card icon @@ -85,7 +92,7 @@ If you would prefer a visual guide to this section, one is available [here](http 1. Tap the fourth box with the letter "A" in it 1. If the exploit was successful, your device will have loaded b9sTool 1. Using the D-Pad, move to "Install boot9strap" - + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to start over from Step 12 of Section III + + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III 1. Press (A), then press START and SELECT at the same time to begin the process 1. Once completed and the bottom screen says "done.", exit b9sTool, then power off your device + You may have to force power off by holding the power button @@ -94,6 +101,8 @@ If you would prefer a visual guide to this section, one is available [here](http #### Section V - Luma3DS Verification +Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. + 1. Power off your device 1. Insert your SD card into your computer 1. Verify that a `luma` folder exists and that `config.ini` is inside of it @@ -106,13 +115,15 @@ At this point, your console will boot to Luma3DS by default. #### Section VI - Restoring DS Connection Settings -1. Copy the `42383841.bin` file from the `clean/` folder of the downloaded DSiWare archive (`output_(name).zip`) to the `Nintendo 3DS///Nintendo DSiWare/` folder on your SD card - + Replace the existing `42383841.bin` file +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Nintendo DSi™" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title 1. Select "Copy", then select "OK" ___ diff --git a/_pages/hr_HR/installing-boot9strap-(hbl-usm).txt b/_pages/hr_HR/installing-boot9strap-(hbl-usm).txt index 142604d9b0..6c9a3f849c 100644 --- a/_pages/hr_HR/installing-boot9strap-(hbl-usm).txt +++ b/_pages/hr_HR/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,16 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

As we already have Homebrew access, we can use slotTool to do this.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--danger} @@ -24,7 +27,10 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint #### Section I - Prep Work +In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. + 1. Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide + + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. Launch slotTool from the list of homebrew + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section 1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option @@ -36,22 +42,31 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint 1. Copy `usm.bin` from the unSAFE_MODE `.zip` to the root of your SD card 1. Put your SD card back into your console +![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} + #### Section II - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](https://uwuu.ca/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section III - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -65,6 +80,8 @@ At this point, your console will boot to Luma3DS by default. #### Section IV - Restoring WiFi Configuration Profiles +In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch the Download Play application 1. Wait until you see the two buttons + Do not press either of the buttons diff --git a/_pages/hr_HR/installing-boot9strap-(soundhax).txt b/_pages/hr_HR/installing-boot9strap-(soundhax).txt index 2302a85291..d9c13f9bc7 100644 --- a/_pages/hr_HR/installing-boot9strap-(soundhax).txt +++ b/_pages/hr_HR/installing-boot9strap-(soundhax).txt @@ -4,7 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+
+{: .notice--info} + +### Compatibility Notes Soundhax (when combined with universal-otherapp) is compatible with versions 1.0.0 through 11.3.0 in all regions. @@ -21,6 +27,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Section I - Prep Work +In this section, you will copy the files needed to trigger both Soundhax and universal-otherapp. + 1. Power off your device 1. Insert your SD card into your computer 1. Copy the Soundhax `.m4a` to the root of your SD card @@ -33,11 +41,16 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 1. Reinsert your SD card into your device 1. Power on your device - ![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} #### Section II - Launching SafeB9SInstaller +In this section, you will launch Soundhax through the Nintendo 3DS Sound app, which will use universal-otherapp to launch the boot9strap (custom firmware) installer. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch Nintendo 3DS Sound @@ -58,6 +71,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Section III - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap 1. Once it is complete, press (A) to reboot your device 1. Your device should have rebooted into the Luma3DS configuration menu diff --git a/_pages/hr_HR/installing-boot9strap-(usm).txt b/_pages/hr_HR/installing-boot9strap-(usm).txt index 6e148372c2..b58fa784a2 100644 --- a/_pages/hr_HR/installing-boot9strap-(usm).txt +++ b/_pages/hr_HR/installing-boot9strap-(usm).txt @@ -4,15 +4,17 @@ title: "Installing boot9strap (USM)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

We can do this using an existing exploit, BannerBomb3.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -29,6 +31,8 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will #### Section I - Prep Work +In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. + 1. If your device is powered on, power off your device 1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer 1. Upload your movable.sed using the "Choose File" option @@ -41,47 +45,51 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will 1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card 1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - + ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }}) - {: .notice--info} - + ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} + ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card 1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Select "Inject haxx" +1. Press (A) to select "Inject haxx" + Your device will automatically power off #### Section III - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section IV - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -95,16 +103,17 @@ At this point, your console will boot to Luma3DS by default. #### Section V - Restoring WiFi Configuration Profiles +In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text -1. Select "Restore slots" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) +1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + Your device will automatically reboot 1. Power off your device 1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore ___ diff --git a/_pages/hr_HR/seedminer.txt b/_pages/hr_HR/seedminer.txt index 44fe68e7b6..871d46e5cd 100644 --- a/_pages/hr_HR/seedminer.txt +++ b/_pages/hr_HR/seedminer.txt @@ -4,52 +4,54 @@ title: "Seedminer" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

+

For information on how Seedminer works, see this presentation.

+

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+
+{: .notice--info} -To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. +### Section I - Prep Work -For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). - -This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. - -### Instructions - -#### Section I - Prep Work +In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. 1. Insert your SD card into your computer 1. Navigate to the `Nintendo 3DS` folder on your SD card -1. Copy the 32 character long name of the folder you see inside Nintendo 3DS - + Do not go inside any more folders - + If you see multiple 32 character long folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + + If you don't have a `Nintendo 3DS` folder, put your SD card into your 3DS and power it on so that the folder can be created +1. Copy the name of the 32-letter folder you see directly inside Nintendo 3DS + + This 32-letter name is system-specific and will be different for each console + + If you see multiple 32-letter folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + You can ignore the `private` folder if you have it - ![]({{ "/images/screenshots/id0-example.png" | absolute_url }}) + ![]({{ "/images/screenshots/seedminer/id0-example.png" | absolute_url }}) {: .notice--info} -1. Paste your 32 character long folder name into a document you can reference later - + This folder name is also known as your "ID0" +1. Paste your 32 character long folder name into [a document](/images/screenshots/seedminer/text-document.png) you can reference later + + This folder is known as your "ID0". Take note of this as this guide will refer to it as such later 1. Power on your device + Your SD card does not need to be inserted at this point 1. Go to your Friend List (the [orange Face Icon]({{ "/images/friend-list-icon.png" | absolute_url }}) in the top row of your HOME Menu) + If you receive an error and are kicked out of the menu, you either must create a new Mii or your device cannot connect to Nintendo's servers (due to a ban or connection issues) 1. Find your Mii profile, then find the "Friend Code" field on the top screen -#### Section II - Seedminer +### Section II - Seedminer + +In this section, you will use the Bruteforce Movable website to retrieve your device's encryption key in the form of `movable.sed`. 1. Open [Bruteforce Movable](https://seedminer.hacks.guide/) on your computer - + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) + If the site isn't working, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field - + Do not attempt to enter the ID0 by hand. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section + + Do not attempt to enter the ID0 manually, as it is easy to make a mistake. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section 1. Select "Go" + If the site immediately goes to step 4, the website has already correctly processed your bruteforce request. You can download your `movable.sed` file and continue to the next section. You do not need to re-add the bot -1. Use the "Register Friend" button on your device to add the bot's friend code as given by the website +1. Use the ["Register Friend" button](/images/screenshots/seedminer/register-friend.png) on your device to add the bot's friend code as given by the website + If prompted, the name that you give to the friend does not matter 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once 1. Once the site processes your information, the site will continue to `Step 2: Bruteforce` automatically 1. Wait for the remainder of the process to complete - + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour + + This is usually fast (1-5 minutes) + During this process, the bot you added may not show up on your 3DS. As long as the website updates, this is not an issue + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site @@ -57,7 +59,7 @@ This method uses a powerful graphics card to perform the calculations needed. A ___ -### Next Steps +### Next steps: Choose an exploit Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. diff --git a/_pages/hu_HU/bannerbomb3.txt b/_pages/hu_HU/bannerbomb3.txt index 856703def1..11051f1936 100644 --- a/_pages/hu_HU/bannerbomb3.txt +++ b/_pages/hu_HU/bannerbomb3.txt @@ -4,11 +4,15 @@ title: "BannerBomb3" {% include toc title="Tartalomjegyzék" %} -### Fontos tudnivalók +
+Technical Details (optional) +

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

For a more technical explanation, see here.

+
+{: .notice--info} -Ahhoz, hogy a rendszerből kinyerjük a DSiWare adatokat, egy hibát használunk ki a DSiWare adat kezelési ablakában, a rendszer beállításokban. - -Hogy ezt elérjük, szükségünk van a rendszer titkosítási kulcsára (movable.sed), hogy újra építsünk egy DSiWare mentést, aminek segítségével ki tudjuk nyerni a DSi Internet beállítások alkalmazást az SD kártyára. +### Compatibility Notes Az utasítások az Amerikai, Európai, Japán és Koreai régiójú konzolokon működnek, amik a rendszer verzió mögött egy U, E, J vagy K betű jelöl. @@ -20,6 +24,9 @@ Ha tajvani konzolod van (amit T betű jelez a rendszer verzió mögött), akkor * A `movable.sed` fájl a [Seedminer](seedminer)-ből #### I. rész - Előkészületek + +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + 1. Nyisd meg a [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) oldalt a számítógépeden 1. Töltsd fel a `movable.sed` fájlod a "Choose File" opcióval 1. Kattints a "Build and Download"-ra @@ -27,28 +34,31 @@ Ha tajvani konzolod van (amit T betű jelez a rendszer verzió mögött), akkor 1. Ha a konzolod be van kapcsolva, most kapcsold ki 1. Helyezd az SD kártyád a számítógépbe 1. Navigálj a `Nintendo 3DS` -> `` -> `` mappába az SD kártyádon - + Az `` ugyanaz, mint amit a [Seedminer](seedminer)-nél használtál - + Az `` egy 32 karakter hosszú nevű mappa az `` mappában + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Hozz létre egy `Nintendo DSiWare` nevű mappát az `` mappában + Ha már van mappád *és* van benne DSiWare mentés fájl (`<8-character-id>.bin`), másold őket a számítógépedre és töröld őket az SD kártyáról -1. Másold az `F00D43D5.bin` fájlt a `BannerBomb3.zip`-ből a `Nintendo DSiWare` mappába +1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### II. rész - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. + 1. Helyezd vissza az SD kártyát a készülékedbe 1. Kapcsold be a készüléked 1. Lépj be a "System Settings"-be a készülékeden -1. Navigálj ide: `Data Management` -> `DSiWare` -1. Kattints az SD kártya részre +1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + A rendszer most Magenta (rózsaszín/lila) színen fog világítani, és össze fog omlani. Ez azt jelenti, hogy működött 1. Kapcsold ki a készüléked 1. Helyezd az SD kártyád a számítógépbe -1. Most egy `42383841.bin` fájlnak kell lennie az SD kártya legfelső mappájában. Ez az a DSiWare mentés, amire később még szükséged lesz -1. Navigálj a `Nintendo 3DS` -> `` -> `<32 karakter hosszú azonosító>` -> `Nintendo DSiWare` mappába az SD kártyádon - + ez az `` ugyanaz, mint amit a [Seedminer](seedminer)-hez használtál -1. Töröld ki a `F00D43D5.bin` fájlt a DSiWare mappából és a számítógépedről. Ez nem fog kelleni többet +1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page +1. Navigálj a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` mappába az SD kártyán +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. Ez nem fog kelleni többet + Továbblépés a [Boot9strap telepítésére (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} diff --git a/_pages/hu_HU/finalizing-setup.txt b/_pages/hu_HU/finalizing-setup.txt index f13dcb9a9e..eb271b8b50 100644 --- a/_pages/hu_HU/finalizing-setup.txt +++ b/_pages/hu_HU/finalizing-setup.txt @@ -20,6 +20,8 @@ Ezen az oldalon kritikus rendszer mentéseket fogunk csinálni és a következő Nem ajánlott ezeket az alkalmazásokat nem letölteni, mert mindegyik még használva lesz ezen az oldalon. Ennek az oldalnak a végén az SD kártyádról el lesznek távolítva a felesleges telepítő fájlok. {: .notice--warning} +### Compatibility Notes + Ha az **új 3DS** konzolod a 2.1.0 verzión volt, a [NAND-ról készült bizonsági másolatot állítsd vissza](godmode9-usage#nand-ról-készült-bizonsági-másolat-visszaállítása) mielőtt tovább mennél. {: .notice--warning} @@ -39,6 +41,8 @@ Ha az előző egyedi firmware rendszered EmuNAND alapú volt és szeretnéd az E #### I. rész - Előkészületek +In this section, you will copy the files necessary to follow the rest of the instructions on this page. + 1. Kapcsold ki a készüléked 1. Helyezd az SD kártyád a számítógépbe 1. Hozz létre egy mappát `cias` néven az SD kártyád gyökerében, ha még nem létezik ilyen @@ -52,15 +56,20 @@ Ha az előző egyedi firmware rendszered EmuNAND alapú volt és szeretnéd az E 1. Tedd vissza az SD kártyád a készülékedbe 1. Kapcsold be a készülékedet - ![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) - {: .notice--info} - ![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) - {: .notice--info} +The screenshots below indicate the minimum SD card layout that is required to follow this page. Lehetnek extra fájljaid és mappáid az SD kártyádon, függően a korábbi telepítésedtől vagy metódustól, amit követtél. + +![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) +{: .notice--info} + -Ezek a képernyőképek mutatják az SD kártya minimális elrendezését ahhoz, hogy ezt az útmutatót követni tudd. Lehetnek extra fájljaid és mappáid az SD kártyádon, függően a korábbi telepítésedtől vagy metódustól, amit követtél. #### II. rész - A rendszer frissítése +In this section, you will update your system to the latest version, which is safe to do with custom firmware. + 1. Frissítsd az eszközödet következőképp. Lépj be a System Settings-be, majd az "Other settings"-be, ahol addig lépkedj jobbra, amíg a végére nem érsz. Itt válaszd a "System Update" opciót. + B9S és Luma használatakor (mint esetedben) biztonságosak a rendszerfrissítések + A frissítő elképzelhető, hogy megjeleníti a "Your system is up to date" üzenetet a frissítés helyett. Ez normális, ha már frissítettél; folytasd a következő szakasszal @@ -69,6 +78,8 @@ Ezek a képernyőképek mutatják az SD kártya minimális elrendezését ahhoz, #### III. rész - Homebrew Launcher +In this section, you will temporarily replace Download Play with Homebrew Launcher (which we need to launch FBI). Download Play will automatically go back to normal once you reboot your device. + 1. Indítsd el a Download Play alkalmazást (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. Várj, amíg `Nintendo 3DS` és `Nintendo DS` gombokat nem látsz 1. Nyomd le az (L) + (D-Pad le) + (Select) gombokat egyszerre a Rosalina menü megnyitásához @@ -83,6 +94,8 @@ Ezek a képernyőképek mutatják az SD kártya minimális elrendezését ahhoz, #### IV. rész - RTC és DSP telepítése +In this section, you will sync your 3DS internal clock with the actual time and dump the sound firmware (which is necesssary for some homebrew software to use sound properly). + 1. Nyomd le az (L) + (D-Pad le) + (Select) gombokat egyszerre a Rosalina menü megnyitásához 1. Válaszd ki a "Miscellaneous options"-t 1. Válaszd a "Dump DSP firmware" opciót @@ -94,6 +107,8 @@ Ezek a képernyőképek mutatják az SD kártya minimális elrendezését ahhoz, #### V. rész - CIA fájlok telepítése +In this section, you will install several useful homebrew applications to HOME Menu. + 1. Indítsd el az FBI-t a homebrew listából 1. Menj ide: `SD` -> `cias` 1. Válaszd ezt: "\" @@ -102,6 +117,8 @@ Ezek a képernyőképek mutatják az SD kártya minimális elrendezését ahhoz, #### VI. rész - Luma3DS telepítése CTRNAND-ba +In this section, you will use a script to copy some of Luma3DS's files to internal memory so that they can be accessed, even without an SD card inserted. + 1. Kapcsold ki a készüléked 1. Nyomd le és tartsd nyomva a (Start) gombot, és a (Start) nyomva tartása mellett kapcsold be az eszközödet. Ez elindítja a GodMode9-et + Ha nem bootolsz be GodMode9 módba, ellenőrizd, hogy, a `GodMode9.firm` megtalálható a `/luma/payloads/` könyvtárban és hogy a `payloads` helyesen van írva @@ -118,6 +135,8 @@ Ezek a képernyőképek mutatják az SD kártya minimális elrendezését ahhoz, #### VII. rész - Takarítás az SD kártyán +In this section, you will use a script to remove some unnecessary files from your SD card. + 1. Válaszd ezt: "Cleanup SD Card" 1. Amikor kéri, nyomd meg az (A) gombot a folytatáshoz 1. Nyomd meg az (A) gombot a folytatáshoz @@ -125,6 +144,8 @@ Ezek a képernyőképek mutatják az SD kártya minimális elrendezését ahhoz, #### VIII. rész - Backup Essential Files +In this section, you will make backups of flies that can be used to recover from softwaer bricks or to recover data. + 1. Válaszd ezt: "Backup Options" 1. Válaszd ezt: "SysNAND Backup" 1. Nyomd meg az (A) gombot a megerősítéshez @@ -159,7 +180,7 @@ Kész vagy! Az egyedi firmware most már teljesen be van állítva az eszközöd Szia! Szívesen veszünk visszajelzéseket az útmutatónk követéséről. Ha szeretnél segíteni, töltsd ki a kérdőívünket [itt](https://forms.gle/vZNoc4QLCz5MEXCK7) (csak angolul elérhető). Köszönjük! {: .notice--info} -#### Információk és jegyzetek +### Information and Notes {% capture notice-6 %} Néhány billentyű kombináció amit ismerned kell: diff --git a/_pages/hu_HU/homebrew-launcher-(pichaxx).txt b/_pages/hu_HU/homebrew-launcher-(pichaxx).txt index 9bd51a388d..d7dd16c76c 100644 --- a/_pages/hu_HU/homebrew-launcher-(pichaxx).txt +++ b/_pages/hu_HU/homebrew-launcher-(pichaxx).txt @@ -4,9 +4,17 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Tartalomjegyzék" %} -### Fontos tudnivalók +
+Technical Details (optional) +This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. +
+{: .notice--info} -Ez a metódusa Seedminer használatának további exploitolás céljából használja a `movable.sed` fájlt, hogy egy egyedi Pokémon Picross mentés fájlt írjon, amit már használhat az unSAFE_MODE a SafeB9Installer futtatására. +### Compatibility Notes + +These instructions work on USA, Europe, and Japan consoles as indicated by the letters U, E, or J after the system version. + +You will need a Nintendo Network ID to download Pokémon Picross. Ennek a folyamatnak a során a Pokémon Picross mentése felülírásra kerül, ha rendelkezel ilyennel. Ha szeretnéd megőrizni a Pokémon Picross játék adatod, készítened kell egy mentést a `00000001.sav` fájlról, mielőtt felülírnád. {: .notice--warning} @@ -24,15 +32,8 @@ Ennek a folyamatnak a során a Pokémon Picross mentése felülírásra kerül, #### I. rész - Előkészületek -1. Kapcsold be a készülékedet -1. Nyisd meg a Nintendo eShop-ot -1. Koppints a Search ikonra (kis nagyító) -1. Keress a `picross`-ra -1. Nyisd meg a Pokémon Picross áruház oldalát -1. Töltsd le a Pokémon Picross-t - + Beolvashatod [ezt a QR kódot](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=ESHOP://50010000037815&margin=0&qzone=1&size=400x400&ecc=L) a Nintendo 3DS Camera appal egy közvetlen linkért az eShop app-ra - + Az SD kártyád be kell legyen helyezve az eszközödbe a Pokémon Picross telepítéséhez -1. Kapcsold ki a készüléked +In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. + 1. Helyezd az SD kártyád a számítógépbe 1. Másold át a `boot.firm` és `boot.3dsx` fájlt a Luma3DS `.zip`-ből az SD kártya gyökerébe + Az SD kártya gyökere a kezdőkönyvtárt jelenti az SD kártyán, ahol látható a Nintendo 3DS könyvtár, de nem vagyunk benne @@ -40,8 +41,16 @@ Ennek a folyamatnak a során a Pokémon Picross mentése felülírásra kerül, 1. Másold át a `slotTool` mappát az unSAFE_MODE `.zip`-ből az SD kártya gyökerében található `3ds` mappába 1. Másold a régiódhoz tartozó otherapp payloadot az unSAFE_MODE `.zip` `otherapps_with_CfgS` mappájából az SD kártya gyökerébe, majd nevezd át `otherapp.bin` névre +![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }}) +{: .notice--info} + + #### II. rész - PicHaxx +In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device. 1. Nyisd meg [a PicHaxx Injector weboldalát](nhnarwhal.com/3dstools/pichaxx.php/) a számítógépen 1. Válaszd ki a `movable.sed` fájlod 1. Válaszd a "Build and Download" menüpontot diff --git a/_pages/hu_HU/installing-boot9strap-(fredtool).txt b/_pages/hu_HU/installing-boot9strap-(fredtool).txt index d8849ac5fe..ec5674ba3e 100644 --- a/_pages/hu_HU/installing-boot9strap-(fredtool).txt +++ b/_pages/hu_HU/installing-boot9strap-(fredtool).txt @@ -4,15 +4,16 @@ title: "Boot9strap telepítése (Fredtool)" {% include toc title="Tartalomjegyzék" %} -### Fontos tudnivalók - -Ez a metódusa a Seedminer használatának a további exploitoláshoz használja a `movable.sed` fájlod, hogy dekriptáljon egy DSiWare címet, azzal az céllal, hogy beinjektáljon egy exploitolható DSiWare címet a DS Download Play alkalmazásba. Ez igényli, hogy rendelkezzél egy DSiWare mentéssel, például a BannerBomb-ból vagy a DSiWare Dumper eszközből. - -Ez egy jelenleg működő megvalósítása a "FIRM partitions known-plaintext" néven ismert exploitnak, amiről részletesebben olvashatsz [itt](https://www.3dbrew.org/wiki/3DS_System_Flaws). +
+Technical Details (optional) +

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+
+{: .notice--info} ### Amire szükséged lesz -* Egy DSiWare mentésre (Kell, hogy legyen egy az SD kártya gyökerében a [BannerBomb3](bannerbomb3) lépesek alapján) +* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * A `movable.sed` fájlodra a [Seedminer](seedminer)-ből * A [Frogminer_save] legújabb kiadása (https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * A [b9sTool] legújabb kiadása (https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -20,6 +21,8 @@ Ez egy jelenleg működő megvalósítása a "FIRM partitions known-plaintext" n #### I. rész - CHF ellenőrzés +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + 1. Kapcsold ki a készüléked 1. Nyomd le és tartsd nyomva (Select) gombot 1. Kapcsold be az eszközöd, miközben nyomva tartod a (Select) gombot @@ -30,17 +33,7 @@ Ha a konfigurációs menüt látod, már van CFW-d és az útmutató folyatása #### II. rész - Előkészületek -1. Kapcsold ki a készüléked -1. Helyezd az SD kártyád a számítógépbe -1. Másold át a `boot.firm` és `boot.3dsx` fájlt a Luma3DS `.zip`-ből az SD kártya gyökerébe - + Az SD kártya gyökere a kezdőkönyvtárt jelenti az SD kártyán, ahol látható a Nintendo 3DS könyvtár, de nem vagyunk benne -1. Másold a `boot.nds` (B9STool) fájlt az SD kártyád gyökerébe -1. Másold át a `private` mappát a Frogminer_save `.zip`-ből az SD kártyád gyökerébe - - ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} - -#### III. rész - Fredtool +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. 1. Nyisd meg a [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec/) oldalt a számítógépeden 1. A "Username" mező alatt adj meg egy tetszőleges alfanumerikus nevet (nem lehet benne szóköz vagy speciális karakter) @@ -53,19 +46,31 @@ Ha a konfigurációs menüt látod, már van CFW-d és az útmutató folyatása 1. Kattints az első keresési találatra + Ennek kell a legutolsó időbélyeggel rendelkeznie 1. Kattints az "output_(name).zip" linkre +1. Helyezd az SD kártyád a számítógépbe 1. Navigálj a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` mappába az SD kártyán - + Az `` ugyanaz, mint amit a [Seedminer](seedminer)-nél használtál - + Az `` egy 32 karakter hosszú nevű mappa az `` mappában - + Ha a `Nintendo DSiWare` mappa nem létezik, hozd létre az `` mappában + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` 1. Másold a `42383841.bin` fájlt az `hax` mappájából a letöltött DSiWare csomagból (output_(name).zip) a `Nintendo DSiWare` mappába -1. Tedd vissza az SD kártyád a készülékedbe + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Másold át a `boot.firm` és `boot.3dsx` fájlt a Luma3DS `.zip`-ből az SD kártya gyökerébe + + Az SD kártya gyökere a kezdőkönyvtárt jelenti az SD kártyán, ahol látható a Nintendo 3DS könyvtár, de nem vagyunk benne +1. Másold a `boot.nds` (B9STool) fájlt az SD kártyád gyökerébe +1. Másold át a `private` mappát a Frogminer_save `.zip`-ből az SD kártyád gyökerébe + + ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} + +#### Section III - Overwriting DS Connection Settings + +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + 1. Kapcsold be a készülékedet 1. Lépj be a System Settings-be a készülékeden -1. Navigálj ide: `Data Management` -> `DSiWare` -1. Az "SD Card" szekcióban válaszd a "Haxxxxxxxxx!" címet +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title 1. Válaszd a "Copy"-t, majd az "OK"-t 1. Térj vissza a System Settings főmenüjébe -1. Navigálj az `Internet Settings` -> `Nintendo DS Connections` opcióhoz, majd válaszd az "OK"-t +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. Ha az exploit sikeres volt, a készülékednek ezt követően be kell töltenie a JPN verzióját a Flipnote Studio-nak #### IV. rész - Flipnote Exploit @@ -73,6 +78,8 @@ Ha a konfigurációs menüt látod, már van CFW-d és az útmutató folyatása Ha inkább egy vizuális útmutatót szeretnél ehhez a fejezethez, [itt](https://zoogie.github.io/web/flipnote_directions/) elérhető egy. {: .notice--info} +In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer. + 1. Fejezd be a kezdeti telepítését az elindított játéknak, amíg el nem éri a fő menüt + Válassza a bal opciót, ha kérdezi a telepítési folyamat során 1. Az érintőképernyőt használva válaszd ki a bal nagy dobozt, majd válaszd a dobozt az SD kártya ikonnal @@ -85,7 +92,7 @@ Ha inkább egy vizuális útmutatót szeretnél ehhez a fejezethez, [itt](https: 1. Nyomd meg a negyedik dobozt benne az "A" betűvel 1. Ha az exploit sikeres volt, a készülékedek ezt követően be kell töltenie a b9sTool-t 1. A D-Pad-dal menj az "Install boot9strap" opcióra - + Ha kihagytad ezt a lépést a rendszer a HOME Menübe kerülsz a boot9strap telepítése helyett, és elölről kell kezdened a 12. lépéstől a III. részben + + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III 1. Nyomj (A)-t majd ezt követően START-ot és SELECT-et egyszerre a folyamat elkezdéséhez 1. Ha végzett és az alsó képernyő azt mondja "done." lépj ki a b9sTool-ból, majd kapcsold ki eszközöd + Elképzelhető, hogy kényszerítened kell a leállást a bekapcsológomb lenyomva tartásával @@ -94,6 +101,8 @@ Ha inkább egy vizuális útmutatót szeretnél ehhez a fejezethez, [itt](https: #### V. rész - Luma3DS ellenőrzés +Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. + 1. Kapcsold ki a készüléked 1. Helyezd az SD kártyád a számítógépbe 1. Ellenőrizd, hogy a `luma` mappa létezik-e és hogy megtalálható-e benne a `config.ini` fájl @@ -106,13 +115,15 @@ Ezen a ponton a konzolod alapértelmezetten bebootol a Luma3DS-be. #### VI. rész - A DS Connection Settings visszaállítása -1. Másold a `42383841.bin` fájlt az `clean/` mappájából a letöltött DSiWare csomagnak (`output_(name).zip`) a `Nintendo 3DS///Nintendo DSiWare/` mappába az SD kártyán - + Írd felül a létező `42383841.bin` fájlt +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. + +1. Navigálj a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` mappába az SD kártyán +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one 1. Tedd vissza az SD kártyád a készülékedbe 1. Kapcsold be a készülékedet 1. Lépj be a System Settings-be a készülékeden -1. Navigálj ide: `Data Management` -> `DSiWare` -1. Az "SD Card" szekcióban válaszd a ""Nintendo DSi™" címet +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title 1. Válaszd a "Copy"-t, majd az "OK"-t ___ diff --git a/_pages/hu_HU/installing-boot9strap-(hbl-usm).txt b/_pages/hu_HU/installing-boot9strap-(hbl-usm).txt index 22226b8dc3..8d412a0f31 100644 --- a/_pages/hu_HU/installing-boot9strap-(hbl-usm).txt +++ b/_pages/hu_HU/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,16 @@ title: "Boot9strap telepítése (HBL-USM)" {% include toc title="Tartalomjegyzék" %} -### Fontos tudnivalók +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

As we already have Homebrew access, we can use slotTool to do this.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+
+{: .notice--info} -Ahhoz, hogy a SAFE_MODE-ot exploitálhassuk, be kell injektálnunk egy exploitált WiFi profilt. - -Mivel már van Homebrew hozzáférésünk, használhatjuk a slotTool-t erre a célra. - -Amint a WiFi profil injektálásra került, a SAFE_MODE-ot fogjuk használni, ami egy helyreállítás szolgáltatás, ami elérhető minden 3DS konzolon, hogy aktiválja az exploitolt WiFi profilt. +### Compatibility Notes Ha a (Jobb/Bell Vál), (D-Pad Fel) vagy az (A) gombod nem működik, csatlakozz a [Nintendo Homebrew csatornához Discord-on](https://discord.gg/MWxPgEp) és kérj segítséget, angolul. {: .notice--danger} @@ -24,7 +27,10 @@ Ha a (Jobb/Bell Vál), (D-Pad Fel) vagy az (A) gombod nem működik, csatlakozz #### I. rész - Előkészületek +In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. + 1. A konzolodnak bekapcsoltnak kell lennie, és a Homebrew Launchert mutatnia az előző rész alapján + + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. Indítsd el a slotTool-t a homebrew listából + Ha beragadsz a piros képernyőn, kapcsold ki erőltetve a konzolod a bekapcsoló gombjának 15 másodpercig nyomva tartásával, majd próbáld meg újra ezt a részt 1. Válaszd az "INSTALL exploit to wifi slots 1,2,3 & shutdown" opciót @@ -36,22 +42,31 @@ Ha a (Jobb/Bell Vál), (D-Pad Fel) vagy az (A) gombod nem működik, csatlakozz 1. Másold át a `usm.bin` fájlt az unSAFE_MODE `.zip`-ből az SD kártya gyökerébe 1. Tedd vissza az SD kártyád a készülékedbe +![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} + #### II. szakasz - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. Az eszközöd kikapcsolt állapotában tartsd nyomva a következő gombokat: (Bal Váll) + (Jobb Váll) + (D-Pad Fel) + (A), majd ezen gombok nyomva tartása mellett kapcsold be az eszközöd - + Tartsd nyomva a gombokat, amiíg a konzol be nem bootol a Safe Mode-ba + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + Ha többszöri próbálkozásra sem tudsz bejutni a Safe Mode-ba, valamelyik gombod hibás lehet. Ebben az esetben csatlakozz a [Nintendo Homebrew-hoz Discord-on](https://discord.gg/MWxPgEp) és kérj, támogatást angolul. 1. Nyomj "OK"-ot a frissítés elfogadásához + Nincs frissítés. Ez része az exploitnak 1. Nyomj az "I accept"-re a feltételek elfogadásához 1. A frissítés sikertelen lesz a `003-1099` hibakóddal. Ez az elvárt viselkedés 1. Amikor megkérdezésre kerül, hogy "Would you like to configure Internet settings?", válassz "Yes"-t -1. A következő menüben navigálj a `Connection 1` -> `Change Settings` -> `Next Page (jobb nyíl)` -> `Proxy Settings` -> `Detailed Setup` menüponthoz - + Itt egy [vizuális reprezentáció](https://uwuu.ca/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. Ha az exploit sikerrel járt, készüléked bebootolja a SafeB9SInstallert #### III. rész - boot9strap telepítése +In this section, you will install custom firmware onto your device. + 1. Ha kéri, akkor nyomd meg sorban azokat a gombokat, amiket kijelez a felső képernyőn, hogy telepíthesd a boot9strap-et + Ha felső képernyő üres, kapcsold ki az eszközödet, majd csináld újra a III. részt 1. Ha ez elkészült, nyomd meg az (A) gombot az eszközöd újraindításához @@ -65,6 +80,8 @@ Ezen a ponton a konzolod alapértelmezetten bebootol a Luma3DS-be. #### IV. rész - A WiFi Configuration Profiles visszaállítása +In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Indítsd el a Download Play alkalmazást 1. Várj, amíg két gombot nem látsz + Ne nyomd meg egyiket sem diff --git a/_pages/hu_HU/installing-boot9strap-(soundhax).txt b/_pages/hu_HU/installing-boot9strap-(soundhax).txt index d65c64ba1e..9ab51ad141 100644 --- a/_pages/hu_HU/installing-boot9strap-(soundhax).txt +++ b/_pages/hu_HU/installing-boot9strap-(soundhax).txt @@ -4,7 +4,13 @@ title: "Boot9strap telepítése (Soundhax)" {% include toc title="Tartalomjegyzék" %} -### Fontos tudnivalók +
+Technical Details (optional) +

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+
+{: .notice--info} + +### Compatibility Notes A Soundhax (amikor universal-otherapp-pal használjuk) kompatibilis az 1.0.0-s verziótól egészen a 11.3.0-ig minden régió esetén. @@ -21,6 +27,8 @@ A Soundhax (amikor universal-otherapp-pal használjuk) kompatibilis az 1.0.0-s v #### I. rész - Előkészületek +In this section, you will copy the files needed to trigger both Soundhax and universal-otherapp. + 1. Kapcsold ki a készüléked 1. Helyezd az SD kártyád a számítógépbe 1. Másold a Soundhax `.m4a` fájlját az SD kártyád gyökerébe @@ -33,11 +41,16 @@ A Soundhax (amikor universal-otherapp-pal használjuk) kompatibilis az 1.0.0-s v 1. Tedd vissza az SD kártyád a készülékedbe 1. Kapcsold be a készülékedet - ![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} #### II. rész - A SafeB9SInstaller indítása +In this section, you will launch Soundhax through the Nintendo 3DS Sound app, which will use universal-otherapp to launch the boot9strap (custom firmware) installer. + 1. Tedd vissza az SD kártyád a készülékedbe 1. Kapcsold be a készülékedet 1. Indítsd el a Nintendo 3DS Sound-ot @@ -58,6 +71,8 @@ A Soundhax (amikor universal-otherapp-pal használjuk) kompatibilis az 1.0.0-s v #### III. rész - boot9strap telepítése +In this section, you will install custom firmware onto your device. + 1. Ha kéri, akkor nyomd meg sorban azokat a gombokat, amiket kijelez a felső képernyőn, hogy telepíthesd a boot9strap-et 1. Ha ez elkészült, nyomd meg az (A) gombot az eszközöd újraindításához 1. A készülékednek az előzőekben a Luma3DS-be kellett bootolnia diff --git a/_pages/hu_HU/installing-boot9strap-(usm).txt b/_pages/hu_HU/installing-boot9strap-(usm).txt index 8aaddc5ab2..c7046a9dcb 100644 --- a/_pages/hu_HU/installing-boot9strap-(usm).txt +++ b/_pages/hu_HU/installing-boot9strap-(usm).txt @@ -4,15 +4,17 @@ title: "Boot9strap telepítése (USM)" {% include toc title="Tartalomjegyzék" %} -### Fontos tudnivalók +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

We can do this using an existing exploit, BannerBomb3.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

+
+{: .notice--info} -Ahhoz, hogy a SAFE_MODE-ot exploitálhassuk, be kell injektálnunk egy exploitált WiFi profilt. - -Ezt megtenni egy másik létező exploittal, a BannerBomb3-mal tudjuk. - -Hogy ezt elérjük, a rendszer titkosítási kulcsoddal (movable.sed) újra építünk egy DSiWare mentést, ami exploitolja a rendszert annak érdekében, hogy be tudjuk injektálni az exploitolt WiFi profilt a kapcsolatok listájára. - -Amint a WiFi profil injektálásra került, a SAFE_MODE-ot fogjuk használni, ami egy helyreállítás szolgáltatás, ami elérhető minden 3DS konzolon, hogy aktiválja az exploitolt WiFi profilt. +### Compatibility Notes Az utasítások az Amerikai, Európai, Japán és Koreai régiójú konzolokon működnek, amik a rendszer verzió mögött egy U, E, J vagy K betű jelöl. @@ -29,6 +31,8 @@ Ha a (Jobb/Bal Váll), (D-Pad Fel) vagy (A) gombjaid nem működnek, [a Seedmine #### I. rész - Előkészületek +In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. + 1. Ha a konzolod be van kapcsolva, most kapcsold ki 1. Nyisd meg az [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php/) oldalt a számítógépeden 1. Töltsd fel a `movable.sed` fájlod a "Choose File" opcióval @@ -41,47 +45,51 @@ Ha a (Jobb/Bal Váll), (D-Pad Fel) vagy (A) gombjaid nem működnek, [a Seedmine 1. Másold át a `boot9strap.firm` fájlt és a `boot9strap.firm.sha` fájlt a boot9strap `.zip` fájlból az SD kártyád `/boot9strap/` mappájába 1. Másold át a `SafeB9SInstaller.bin` fájlt a SafeB9SInstaller `.zip`-ből az SD kártyád gyökerébe 1. Másold át a `usm.bin` fájlt az `unSAFE_MODE.zip`-ből az SD kártya gyökerébe - + ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }}) - {: .notice--info} - + ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} + ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. Navigálj a `Nintendo 3DS` -> `` -> `` mappába az SD kártyádon - + Az `` ugyanaz, mint amit a [Seedminer](seedminer)-nél használtál - + Az `` egy 32 karakter hosszú nevű mappa az `` mappában + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Hozz létre egy `Nintendo DSiWare` nevű mappát az `` mappában + Ha már van mappád *és* van benne DSiWare mentés fájl (`<8-character-id>.bin`), másold őket a számítógépedre és töröld őket az SD kártyáról 1. Másold `F00D43D5.bin` fájlt az `unSAFE_MODE.zip`-ből a `Nintendo DSiWare` mappába - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### II. rész - BannerBomb3 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. + 1. Tedd vissza az SD kártyád a készülékedbe 1. Kapcsold be a készülékedet 1. Lépj be a System Settings-be a készülékeden -1. Navigálj ide: `Data Management` -> `DSiWare` -1. Kattints az SD kártya részre - + Az eszközödnek egy menüt kell mutatnia egy kevés szöveggel +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + Ha ez a lépés összeomlasztja az eszközödet, [folytasd a hibaelhárítási útmutatóval](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Válaszd az "Inject haxx" opciót +1. Press (A) to select "Inject haxx" + Az eszközöd automatikusan ki fog kapcsolni #### III. rész - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. Az eszközöd kikapcsolt állapotában tartsd nyomva a következő gombokat: (Bal Váll) + (Jobb Váll) + (D-Pad Fel) + (A), majd ezen gombok nyomva tartása mellett kapcsold be az eszközöd - + Tartsd nyomva a gombokat, amiíg a konzol be nem bootol a Safe Mode-ba + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + Ha többszöri próbálkozásra sem tudsz bejutni a Safe Mode-ba, valamelyik gombod hibás lehet. Ha ez a helyzet, akkor [a Seedminer alternatív ágát](bannerbomb3) kell követned. Ha támogatásra van szükséged az anyaggal kapcsolatosan, csatlakozz a [Nintendo Homebrew-hoz Discord-on](https://discord.gg/MWxPgEp) és kérj, angolul, támogatást. 1. Nyomj "OK"-ot a frissítés elfogadásához + Nincs frissítés. Ez része az exploitnak 1. Nyomj az "I accept"-re a feltételek elfogadásához 1. A frissítés sikertelen lesz a `003-1099` hibakóddal. Ez az elvárt viselkedés 1. Amikor megkérdezésre kerül, hogy "Would you like to configure Internet settings?", válassz "Yes"-t -1. A következő menüben navigálj a `Connection 1` -> `Change Settings` -> `Next Page (jobb nyíl)` -> `Proxy Settings` -> `Detailed Setup` menüponthoz - + Ez egy [vizuális reprezentáció](/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. Ha az exploit sikerrel járt, készüléked bebootolja a SafeB9SInstallert #### IV. rész - boot9strap telepítése +In this section, you will install custom firmware onto your device. + 1. Ha kéri, akkor nyomd meg sorban azokat a gombokat, amiket kijelez a felső képernyőn, hogy telepíthesd a boot9strap-et + Ha felső képernyő üres, kapcsold ki az eszközödet, majd csináld újra a III. részt 1. Ha ez elkészült, nyomd meg az (A) gombot az eszközöd újraindításához @@ -95,16 +103,17 @@ Ezen a ponton a konzolod alapértelmezetten bebootol a Luma3DS-be. #### V. rész - A WiFi Configuration Profiles visszaállítása +In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Lépj be a System Settings-be a készülékeden -1. Navigálj ide: `Data Management` -> `DSiWare` -1. Kattints az SD kártya részre - + Az eszközödnek egy menüt kell mutatnia egy kevés szöveggel -1. Válaszd a "Restore slots" opciót +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) +1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + Az eszközöd automatikusan újra fog indulni 1. Kapcsold ki a készüléked 1. Helyezd az SD kártyád a számítógépbe 1. Navigálj a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` mappába az SD kártyán -1. Töröld `F00D43D5.bin` fájlt a Nintendo DSiWare mappából +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. Ez nem fog kelleni többet ___ diff --git a/_pages/hu_HU/seedminer.txt b/_pages/hu_HU/seedminer.txt index 345d21ccd9..2d26d66bfa 100644 --- a/_pages/hu_HU/seedminer.txt +++ b/_pages/hu_HU/seedminer.txt @@ -4,52 +4,54 @@ title: "Seedminer" {% include toc title="Tartalomjegyzék" %} -### Fontos tudnivalók +
+Technical Details (optional) +

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

+

For information on how Seedminer works, see this presentation.

+

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+
+{: .notice--info} -A boot9strap telepítéséhez az eszközödre, megfejtjük az eszköz egyedi titkosító kulcsát. Ennek eléréséhez egy Seedminer nevű eszközt fogunk használni, hogy kiszámítsuk a készüléked adat titkosítási kulcsát (movable.sed). +### Section I - Prep Work -További információért arról, hogyan működik a Seedminer, nézd meg [ezt a prezentációt](https://zoogie.github.io/web/34⅕c3). - -Ez a módszer egy erős grafikus kártyát használ a szükséges számítások elvégzéséhez. Egy önkéntes által üzemeltetett webhely segít neked ebben a módszerben. - -### Lépések - -#### I. rész - Előkészületek +In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. 1. Helyezd az SD kártyád a számítógépbe 1. Lépj be az SD kártyád `Nintendo 3DS` könyvtárába -1. Másold le a 32 karakter hosszú nevét annak a mappának, amit látsz - + Nem menj beljebb több mappát - + Ha több 32 karakter hosszú nevű mappát látsz, kövesd [ezeket a lépéseket](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + + If you don't have a `Nintendo 3DS` folder, put your SD card into your 3DS and power it on so that the folder can be created +1. Copy the name of the 32-letter folder you see directly inside Nintendo 3DS + + This 32-letter name is system-specific and will be different for each console + + If you see multiple 32-letter folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + Figyelmen kívül hagyhatod a `private` mappát, ha rendelkezel vele - ![]({{ "/images/screenshots/id0-example.png" | absolute_url }}) + ![]({{ "/images/screenshots/seedminer/id0-example.png" | absolute_url }}) {: .notice--info} -1. Illeszd be a 32 karakter hosszú mappanevet egy tetszőleges fájlba, amit később elérsz - + Ez a mappa "ID0" néven is ismert +1. Paste your 32 character long folder name into [a document](/images/screenshots/seedminer/text-document.png) you can reference later + + This folder is known as your "ID0". Take note of this as this guide will refer to it as such later 1. Kapcsold be a készülékedet + Az SD kártyádnak nem kell behelyzve lennie ennél a pontnál 1. Válaszd a Friend List opciót (a [narancsszínű fej ikon]({{ "/images/friend-list-icon.png" | absolute_url }}) a HOME Menü felső sávján) + Ha hibaüzenetet kapsz, és visszadob a menübe, vagy új Mii-t kell csinálnod, vagy a konzolod nem tud csatlakozni a Nintendo szervereihez (kitiltás, vagy kapcsolódási hiba miatt) 1. Keresd meg a Mii profilodat, ott találod a "Friend Code" mezőt a felső képernyőn -#### II. rész - Seedminer +### Section II - Seedminer + +In this section, you will use the Bruteforce Movable website to retrieve your device's encryption key in the form of `movable.sed`. 1. Nyisd meg a [Bruteforce Movable](https://seedminer.hacks.guide/) oldalt a számítógépeden - + Ez az oldal képes automatizálni a `movable_part1.sed` előállítását (egy bot 3DS konzol segítségével), illetve a készüléked DSiWare titkosításának feltörését (egy önkéntes számítógépén futtatva a Seedminer-t) + Ha az oldal nem működik, csatlakozz a [Nintendo Homebrew Discord-on](https://discord.gg/MWxPgEp) csatornához, és kérj segítséget (angol nyelven) valakitől 1. Írd be a készüléked Friend Code-ját (szóközök és kötőjelek nélkül) a "Your friend code" mezőbe 1. Illeszd be a készüléked 32 karakter hosszú mappanevét a "Your ID0" mezőbe - + Ne próbáld meg kézzel beadni az ID0 kódot. Legyél biztos abban, hogy az ID0 helyes, azzal, hogy másolod és beilleszted onnan, ahova az előző részben elmentetted + + Do not attempt to enter the ID0 manually, as it is easy to make a mistake. Legyél biztos abban, hogy az ID0 helyes, azzal, hogy másolod és beilleszted onnan, ahova az előző részben elmentetted 1. Nyomd meg a "Go"-t + Ha az oldal azonnal a 4. lépésre ugrik, a weboldal már feldolgozta helyesen a bruteforce kérésedet. Letöltheted a `movable.sed` fájlod és folytathatod a következő fejezettel. Nem szükséges újra hozzáadnod a bot-ot -1. Használd a "Register Friend" gombot a készülékeden és add hozzá a bot weboldalon megadott Friend Code-ját +1. Use the ["Register Friend" button](/images/screenshots/seedminer/register-friend.png) on your device to add the bot's friend code as given by the website + Ha kérdezi a rendszer, a név amit megadsz a barátnak, az nem számít 1. Várj, amíg az oldal frissül + Ha nem így történik, várj néhány percet, mielőtt frissíted az oldalt még egyszer 1. Ha az oldal feldolgozta az információd, az oldal folytatni fogja a `Step 2: Bruteforce` lépéssel automatikusan 1. Várj a maradék folyamat befejezésére - + Ez általában gyors (1-5 perc) de néhány esetben fél óra is lehet + + This is usually fast (1-5 minutes) + Ez alatt a folyamat alatt, a bot, amit hozzáadtál nem biztos, hogy feltűnik a 3DS-eden. Egészen addig, amíg a weboldal frissül, ez nem probléma + Ha egy fél óra után is még mindig várakozol, csatlakozz a [Nintendo Homebrew Discord-on](https://discord.gg/MWxPgEp) csatornához, és kérj segítséget (angol nyelven) valakitől 1. Amikor a folyamat befejeződött, töltsd le a `movable.sed` fájlodat az oldalról @@ -57,7 +59,7 @@ Ez a módszer egy erős grafikus kártyát használ a szükséges számítások ___ -### Következő lépések +### Next steps: Choose an exploit Ha meg van az eszközöd titkosítási kulcsa (`movable.sed`) más exploitokkal együtt fogod használni az egyedi firmware telepítéséhez. diff --git a/_pages/id_ID/bannerbomb3.txt b/_pages/id_ID/bannerbomb3.txt index a0b1ef007e..5a46749529 100644 --- a/_pages/id_ID/bannerbomb3.txt +++ b/_pages/id_ID/bannerbomb3.txt @@ -4,11 +4,15 @@ title: "BannerBomb3" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

For a more technical explanation, see here.

+
+{: .notice--info} -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -20,6 +24,9 @@ If you have a Taiwanese console (indicated by a T after the system version), fol * Your `movable.sed` file from completing [Seedminer](seedminer) #### Section I - Prep Work + +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + 1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer 1. Upload your movable.sed using the "Choose File" option 1. Click "Build and Download" @@ -27,28 +34,31 @@ If you have a Taiwanese console (indicated by a T after the system version), fol 1. If your console is powered on, power off your console 1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from the BannerBomb3 `.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section +1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked 1. Power off your device 1. Insert your SD card into your computer -1. You should now have `42383841.bin` in SD root. This is the DSiWare backup you will use later in the guide -1. Navigate to `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card - + This `` will be the same one that you used in [Seedminer](seedminer) -1. Delete `F00D43D5.bin` from the Nintendo DSiWare folder and from your computer. This file will not be needed anymore +1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore + Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} diff --git a/_pages/id_ID/finalizing-setup.txt b/_pages/id_ID/finalizing-setup.txt index c5b41ec5b8..29ed5ffea6 100644 --- a/_pages/id_ID/finalizing-setup.txt +++ b/_pages/id_ID/finalizing-setup.txt @@ -20,6 +20,8 @@ On this page, we will make critical system file backups and install the followin It is not recommended to skip downloading any of these applications, as many of them will be used later on this page. At the end of this page, your SD card will be cleaned up by removing unnecessary installation files. {: .notice--warning} +### Compatibility Notes + If your **New 3DS** was on version 2.1.0 before following this guide, you should [restore your NAND backup](godmode9-usage#restoring-a-nand-backup) before continuing. {: .notice--warning} @@ -39,6 +41,8 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o #### Section I - Prep Work +In this section, you will copy the files necessary to follow the rest of the instructions on this page. + 1. Power off your device 1. Insert your SD card into your computer 1. Create a folder named `cias` on the root of your SD card if it does not already exist @@ -52,15 +56,20 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o 1. Reinsert your SD card into your device 1. Power on your device - ![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) - {: .notice--info} - ![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) - {: .notice--info} +The screenshots below indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. + +![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) +{: .notice--info} + -These screenshots indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. #### Section II - Updating the System +In this section, you will update your system to the latest version, which is safe to do with custom firmware. + 1. Update your device by going to System Settings, then "Other Settings", then going all the way to the right and using "System Update" + Updates while using B9S + Luma (what you have) are safe + The updater may display a message saying "Your system is up to date" instead of updating. This is normal if you are already up to date; continue with the next section @@ -69,6 +78,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section III - Homebrew Launcher +In this section, you will temporarily replace Download Play with Homebrew Launcher (which we need to launch FBI). Download Play will automatically go back to normal once you reboot your device. + 1. Launch the Download Play application (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. Wait until you see the `Nintendo 3DS` and `Nintendo DS` buttons 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu @@ -83,6 +94,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section IV - RTC and DSP Setup +In this section, you will sync your 3DS internal clock with the actual time and dump the sound firmware (which is necesssary for some homebrew software to use sound properly). + 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu 1. Select "Miscellaneous options" 1. Select "Dump DSP firmware" @@ -94,6 +107,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section V - Installing CIAs +In this section, you will install several useful homebrew applications to HOME Menu. + 1. Launch FBI from the list of homebrew 1. Navigate to `SD` -> `cias` 1. Select "\" @@ -102,6 +117,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VI - CTRNAND Luma3DS +In this section, you will use a script to copy some of Luma3DS's files to internal memory so that they can be accessed, even without an SD card inserted. + 1. Power off your device 1. Press and hold (Start), and while holding (Start), power on your device. This will launch GodMode9 + If you do not boot into GodMode9, ensure that `GodMode9.firm` is in `/luma/payloads/` and that `payloads` is correctly spelled @@ -118,6 +135,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VII - Cleanup SD Card +In this section, you will use a script to remove some unnecessary files from your SD card. + 1. Select "Cleanup SD Card" 1. When prompted, press (A) to proceed 1. Press (A) to continue @@ -125,6 +144,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VIII - Backup Essential Files +In this section, you will make backups of flies that can be used to recover from softwaer bricks or to recover data. + 1. Select "Backup Options" 1. Select "SysNAND Backup" 1. Press (A) to confirm @@ -159,7 +180,7 @@ You're done! Custom firmware is now fully configured on your device. Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! {: .notice--info} -#### Information and Notes +### Information and Notes {% capture notice-6 %} Here are some key combos that you should know: diff --git a/_pages/id_ID/homebrew-launcher-(pichaxx).txt b/_pages/id_ID/homebrew-launcher-(pichaxx).txt index 6348abc52a..aff6795262 100644 --- a/_pages/id_ID/homebrew-launcher-(pichaxx).txt +++ b/_pages/id_ID/homebrew-launcher-(pichaxx).txt @@ -4,9 +4,17 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. +
+{: .notice--info} -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE to run SafeB9SInstaller. +### Compatibility Notes + +These instructions work on USA, Europe, and Japan consoles as indicated by the letters U, E, or J after the system version. + +You will need a Nintendo Network ID to download Pokémon Picross. This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. {: .notice--warning} @@ -24,15 +32,8 @@ This process will overwrite your Pokémon Picross save file, if you have one. If #### Section I - Prep Work -1. Power on your device -1. Open the Nintendo eShop -1. Tap the Search icon (small magnifying glass) -1. Search for `picross` -1. Open the store page for Pokémon Picross -1. Download Pokémon Picross - + You can scan [this QR code](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=ESHOP://50010000037815&margin=0&qzone=1&size=400x400&ecc=L) using the Nintendo 3DS Camera for a direct link to the eShop app - + Your SD card must be inserted in your device to install Pokémon Picross -1. Power off your device +In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. + 1. Insert your SD card into your computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it @@ -40,8 +41,16 @@ This process will overwrite your Pokémon Picross save file, if you have one. If 1. Copy the `slotTool` folder from the unSAFE_MODE `.zip` to the `3ds` folder on your SD card 1. Copy the otherapp payload for your region/version from the unSAFE_MODE `.zip`'s `otherapps_with_CfgS` folder to the root of your SD card and rename it to `otherapp.bin` +![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }}) +{: .notice--info} + + #### Section II - PicHaxx +In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device. 1. Open [the PicHaxx Injector website](https://3ds.nhnarwhal.com/3dstools/pichaxx.php) on your computer 1. Select your `movable.sed` file 1. Select "Build and Download" diff --git a/_pages/id_ID/installing-boot9strap-(fredtool).txt b/_pages/id_ID/installing-boot9strap-(fredtool).txt index 78598ce783..1f7825ac28 100644 --- a/_pages/id_ID/installing-boot9strap-(fredtool).txt +++ b/_pages/id_ID/installing-boot9strap-(fredtool).txt @@ -4,15 +4,16 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Table of Contents" %} -### Required Reading - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, for example from BannerBomb or the DSiWare Dumper tool. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). +
+Technical Details (optional) +

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+
+{: .notice--info} ### What You Need -* A DSiWare Backup (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) +* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -20,6 +21,8 @@ This is a currently working implementation of the "FIRM partitions known-plainte #### Section I - CFW Check +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + 1. Power off your device 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button @@ -30,17 +33,7 @@ If you see a configuration menu, you already have CFW, and continuing with these #### Section II - Prep Work -1. Power off your device -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card - - ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} - -#### Section III - Fredtool +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) @@ -53,19 +46,31 @@ If you see a configuration menu, you already have CFW, and continuing with these 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link +1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` - + If the `Nintendo DSiWare` folder does not exist, create it inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` 1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder -1. Reinsert your SD card into your device + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card + + ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} + +#### Section III - Overwriting DS Connection Settings + +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Haxxxxxxxxx!" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title 1. Select "Copy", then select "OK" 1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio #### Section IV - Flipnote Exploit @@ -73,6 +78,8 @@ If you see a configuration menu, you already have CFW, and continuing with these If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} +In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer. + 1. Complete the initial setup process for the launched game until you reach the main menu + Select the left option whenever prompted during the setup process 1. Using the touch-screen, select the large left box, then select the box with an SD card icon @@ -85,7 +92,7 @@ If you would prefer a visual guide to this section, one is available [here](http 1. Tap the fourth box with the letter "A" in it 1. If the exploit was successful, your device will have loaded b9sTool 1. Using the D-Pad, move to "Install boot9strap" - + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to start over from Step 12 of Section III + + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III 1. Press (A), then press START and SELECT at the same time to begin the process 1. Once completed and the bottom screen says "done.", exit b9sTool, then power off your device + You may have to force power off by holding the power button @@ -94,6 +101,8 @@ If you would prefer a visual guide to this section, one is available [here](http #### Section V - Luma3DS Verification +Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. + 1. Power off your device 1. Insert your SD card into your computer 1. Verify that a `luma` folder exists and that `config.ini` is inside of it @@ -106,13 +115,15 @@ At this point, your console will boot to Luma3DS by default. #### Section VI - Restoring DS Connection Settings -1. Copy the `42383841.bin` file from the `clean/` folder of the downloaded DSiWare archive (`output_(name).zip`) to the `Nintendo 3DS///Nintendo DSiWare/` folder on your SD card - + Replace the existing `42383841.bin` file +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Nintendo DSi™" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title 1. Select "Copy", then select "OK" ___ diff --git a/_pages/id_ID/installing-boot9strap-(hbl-usm).txt b/_pages/id_ID/installing-boot9strap-(hbl-usm).txt index 142604d9b0..6c9a3f849c 100644 --- a/_pages/id_ID/installing-boot9strap-(hbl-usm).txt +++ b/_pages/id_ID/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,16 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

As we already have Homebrew access, we can use slotTool to do this.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--danger} @@ -24,7 +27,10 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint #### Section I - Prep Work +In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. + 1. Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide + + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. Launch slotTool from the list of homebrew + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section 1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option @@ -36,22 +42,31 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint 1. Copy `usm.bin` from the unSAFE_MODE `.zip` to the root of your SD card 1. Put your SD card back into your console +![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} + #### Section II - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](https://uwuu.ca/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section III - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -65,6 +80,8 @@ At this point, your console will boot to Luma3DS by default. #### Section IV - Restoring WiFi Configuration Profiles +In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch the Download Play application 1. Wait until you see the two buttons + Do not press either of the buttons diff --git a/_pages/id_ID/installing-boot9strap-(soundhax).txt b/_pages/id_ID/installing-boot9strap-(soundhax).txt index 2302a85291..d9c13f9bc7 100644 --- a/_pages/id_ID/installing-boot9strap-(soundhax).txt +++ b/_pages/id_ID/installing-boot9strap-(soundhax).txt @@ -4,7 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+
+{: .notice--info} + +### Compatibility Notes Soundhax (when combined with universal-otherapp) is compatible with versions 1.0.0 through 11.3.0 in all regions. @@ -21,6 +27,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Section I - Prep Work +In this section, you will copy the files needed to trigger both Soundhax and universal-otherapp. + 1. Power off your device 1. Insert your SD card into your computer 1. Copy the Soundhax `.m4a` to the root of your SD card @@ -33,11 +41,16 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 1. Reinsert your SD card into your device 1. Power on your device - ![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} #### Section II - Launching SafeB9SInstaller +In this section, you will launch Soundhax through the Nintendo 3DS Sound app, which will use universal-otherapp to launch the boot9strap (custom firmware) installer. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch Nintendo 3DS Sound @@ -58,6 +71,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Section III - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap 1. Once it is complete, press (A) to reboot your device 1. Your device should have rebooted into the Luma3DS configuration menu diff --git a/_pages/id_ID/installing-boot9strap-(usm).txt b/_pages/id_ID/installing-boot9strap-(usm).txt index 6e148372c2..b58fa784a2 100644 --- a/_pages/id_ID/installing-boot9strap-(usm).txt +++ b/_pages/id_ID/installing-boot9strap-(usm).txt @@ -4,15 +4,17 @@ title: "Installing boot9strap (USM)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

We can do this using an existing exploit, BannerBomb3.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -29,6 +31,8 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will #### Section I - Prep Work +In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. + 1. If your device is powered on, power off your device 1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer 1. Upload your movable.sed using the "Choose File" option @@ -41,47 +45,51 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will 1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card 1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - + ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }}) - {: .notice--info} - + ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} + ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card 1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Select "Inject haxx" +1. Press (A) to select "Inject haxx" + Your device will automatically power off #### Section III - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section IV - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -95,16 +103,17 @@ At this point, your console will boot to Luma3DS by default. #### Section V - Restoring WiFi Configuration Profiles +In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text -1. Select "Restore slots" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) +1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + Your device will automatically reboot 1. Power off your device 1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore ___ diff --git a/_pages/id_ID/seedminer.txt b/_pages/id_ID/seedminer.txt index 44fe68e7b6..871d46e5cd 100644 --- a/_pages/id_ID/seedminer.txt +++ b/_pages/id_ID/seedminer.txt @@ -4,52 +4,54 @@ title: "Seedminer" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

+

For information on how Seedminer works, see this presentation.

+

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+
+{: .notice--info} -To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. +### Section I - Prep Work -For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). - -This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. - -### Instructions - -#### Section I - Prep Work +In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. 1. Insert your SD card into your computer 1. Navigate to the `Nintendo 3DS` folder on your SD card -1. Copy the 32 character long name of the folder you see inside Nintendo 3DS - + Do not go inside any more folders - + If you see multiple 32 character long folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + + If you don't have a `Nintendo 3DS` folder, put your SD card into your 3DS and power it on so that the folder can be created +1. Copy the name of the 32-letter folder you see directly inside Nintendo 3DS + + This 32-letter name is system-specific and will be different for each console + + If you see multiple 32-letter folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + You can ignore the `private` folder if you have it - ![]({{ "/images/screenshots/id0-example.png" | absolute_url }}) + ![]({{ "/images/screenshots/seedminer/id0-example.png" | absolute_url }}) {: .notice--info} -1. Paste your 32 character long folder name into a document you can reference later - + This folder name is also known as your "ID0" +1. Paste your 32 character long folder name into [a document](/images/screenshots/seedminer/text-document.png) you can reference later + + This folder is known as your "ID0". Take note of this as this guide will refer to it as such later 1. Power on your device + Your SD card does not need to be inserted at this point 1. Go to your Friend List (the [orange Face Icon]({{ "/images/friend-list-icon.png" | absolute_url }}) in the top row of your HOME Menu) + If you receive an error and are kicked out of the menu, you either must create a new Mii or your device cannot connect to Nintendo's servers (due to a ban or connection issues) 1. Find your Mii profile, then find the "Friend Code" field on the top screen -#### Section II - Seedminer +### Section II - Seedminer + +In this section, you will use the Bruteforce Movable website to retrieve your device's encryption key in the form of `movable.sed`. 1. Open [Bruteforce Movable](https://seedminer.hacks.guide/) on your computer - + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) + If the site isn't working, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field - + Do not attempt to enter the ID0 by hand. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section + + Do not attempt to enter the ID0 manually, as it is easy to make a mistake. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section 1. Select "Go" + If the site immediately goes to step 4, the website has already correctly processed your bruteforce request. You can download your `movable.sed` file and continue to the next section. You do not need to re-add the bot -1. Use the "Register Friend" button on your device to add the bot's friend code as given by the website +1. Use the ["Register Friend" button](/images/screenshots/seedminer/register-friend.png) on your device to add the bot's friend code as given by the website + If prompted, the name that you give to the friend does not matter 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once 1. Once the site processes your information, the site will continue to `Step 2: Bruteforce` automatically 1. Wait for the remainder of the process to complete - + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour + + This is usually fast (1-5 minutes) + During this process, the bot you added may not show up on your 3DS. As long as the website updates, this is not an issue + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site @@ -57,7 +59,7 @@ This method uses a powerful graphics card to perform the calculations needed. A ___ -### Next Steps +### Next steps: Choose an exploit Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. diff --git a/_pages/it_IT/bannerbomb3.txt b/_pages/it_IT/bannerbomb3.txt index 2605702180..6822a5f5bf 100644 --- a/_pages/it_IT/bannerbomb3.txt +++ b/_pages/it_IT/bannerbomb3.txt @@ -4,11 +4,15 @@ title: "BannerBomb3" {% include toc title="Indice" %} -### Lettura necessaria +
+Technical Details (optional) +

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

For a more technical explanation, see here.

+
+{: .notice--info} -Per eseguire un dump dei DSiWare di sistema, approfittiamo di una falla di sicurezza nella sezione Gestione Nintendo DSiWare dell'applicazione Impostazioni della console. - -Per realizzare l'obiettivo, utilizziamo la chiave di cifratura della tua console (movable.sed) per generare un backup DSiWare che induce la console a creare un dump dell'applicazione Impostazioni Internet DSi nella directory principale della scheda SD. +### Compatibility Notes Queste istruzioni funzionano su console americane, europee, giapponesi e coreane, indicate rispettivamente dalle lettere U, E, J o K dopo la versione del sistema operativo. @@ -20,6 +24,9 @@ Se hai una console taiwanese (indicata da una T dopo la versione di sistema), se * Il tuo file `movable.sed` dalla sezione [Seedminer](seedminer) #### Sezione I - Preparazione + +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + 1. Avvia [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) sul tuo computer 1. Carica il tuo file movable.sed scegliendo l'opzione "Choose File" 1. Seleziona "Build and Download" @@ -27,28 +34,31 @@ Se hai una console taiwanese (indicata da una T dopo la versione di sistema), se 1. Se la tua console è accesa, spegnila 1. Inserisci la scheda SD nel tuo computer 1. Nella tua scheda SD, entra in `Nintendo 3DS` -> `` -> `` - + Questo `` sarà lo stesso che hai utilizzato in [Seedminer](seedminer) - + `` è una cartella dal nome lungo 32 caratteri all'interno di `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Crea una cartella chiamata `Nintendo DSiWare` all'interno di `` + Se hai già la cartella *e* sono già presenti dei file di backup DSiWare (`.bin`) all'interno, copiali sul PC e rimuovili dalla scheda SD -1. Copia il file `F00D43D5.bin` da `BannerBomb3.zip` nella cartella `Nintendo DSiWare` +1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Sezione II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. + 1. Reinserisci la scheda SD nella tua console 1. Accendi la console 1. Avvia "Impostazioni della console" -1. Entra in `Gestione dati` -> `DSiWare` -1. Clicca sulla sezione Scheda SD +1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + Lo schermo della console dovrebbe lampeggiare magenta (rosa/viola), per poi crashare qualche secondo dopo. Ciò significa che l'exploit ha avuto successo 1. Spegni il tuo 3DS 1. Inserisci la scheda SD nel tuo computer -1. Ora dovresti avere il file `42383841.bin` nella directory principale della scheda SD. Questo è il DSiWare di backup che utilizzerai più avanti nella guida -1. Nella tua scheda SD, entra in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` - + Questo `` sarà lo stesso che hai utilizzato in [Seedminer](seedminer) -1. Elimina il file `F0D43D5.bin` dalla cartella Nintendo DSiWare e dal tuo computer. Questo file non sarà più necessario +1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page +1. Nella tua scheda SD, entra in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. Questo file non sarà più necessario + + Prosegui con l'[Installazione di boot9strap (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} diff --git a/_pages/it_IT/finalizing-setup.txt b/_pages/it_IT/finalizing-setup.txt index bb0222b46a..05f858bbb4 100644 --- a/_pages/it_IT/finalizing-setup.txt +++ b/_pages/it_IT/finalizing-setup.txt @@ -20,6 +20,8 @@ In questa pagina realizzeremo backup di file di sistema critici e installeremo i È consigliato non saltare il download di alcuna di queste applicazioni, in quanto molte verranno utilizzate successivamente in questa stessa pagina. Al termine di questa pagina, la scheda SD verrà ripulita rimuovendo i file di installazione non più necessari. {: .notice--warning} +### Compatibility Notes + Se il tuo **New 3DS** era alla versione del software 2.1.0 prima di seguire questa guida, dovresti [ripristinare il tuo backup NAND](godmode9-usage#restoring-a-nand-backup) prima di continuare. {: .notice--warning} @@ -39,6 +41,8 @@ Se la tua precedente installazione CFW era basata su EmuNAND e desideri spostare #### Sezione I - Preparazione +In this section, you will copy the files necessary to follow the rest of the instructions on this page. + 1. Spegni il tuo 3DS 1. Inserisci la scheda SD nel tuo computer 1. Se assente, crea una cartella chiamata `cias` nella directory principale della tua scheda SD @@ -52,15 +56,20 @@ Se la tua precedente installazione CFW era basata su EmuNAND e desideri spostare 1. Reinserisci la scheda SD nella tua console 1. Accendi la console - ![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) - {: .notice--info} - ![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) - {: .notice--info} +The screenshots below indicate the minimum SD card layout that is required to follow this page. Potresti avere file o cartelle ulteriori nella tua scheda SD, a seconda della tua precedente configurazione o del metodo che hai seguito. + +![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) +{: .notice--info} + -Questi screenshot indicano la minima struttura che la scheda SD deve avere per proseguire in questa pagina. Potresti avere file o cartelle ulteriori nella tua scheda SD, a seconda della tua precedente configurazione o del metodo che hai seguito. #### Sezione II - Aggiornare il Sistema +In this section, you will update your system to the latest version, which is safe to do with custom firmware. + 1. Aggiorna la console andando su Impostazioni della console, poi "Impostazioni generali", infine scorri a destra e seleziona "Aggiornamento" + Gli aggiornamenti effettuati usando B9S + Luma (ora installato) sono sicuri + Potrebbe apparire il messaggio "Nella console è già presente il software di sistema più recente". È normale se hai già installato l'ultima versione; prosegui con la sezione successiva @@ -69,6 +78,8 @@ Questi screenshot indicano la minima struttura che la scheda SD deve avere per p #### Sezione III - Homebrew Launcher +In this section, you will temporarily replace Download Play with Homebrew Launcher (which we need to launch FBI). Download Play will automatically go back to normal once you reboot your device. + 1. Avvia l'applicazione "Modalità download" (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. Attendi finché non vedrai i pulsanti `Nintendo 3DS` e `Nintendo DS` 1. Premi simultaneamente i pulsanti (L) + (Giù) + (Select) per aprire il menu di Rosalina @@ -83,6 +94,8 @@ Questi screenshot indicano la minima struttura che la scheda SD deve avere per p #### Sezione IV - Installazione di RTC e DSP +In this section, you will sync your 3DS internal clock with the actual time and dump the sound firmware (which is necesssary for some homebrew software to use sound properly). + 1. Premi simultaneamente i pulsanti (L) + (Giù) + (Select) per aprire il menu di Rosalina 1. Seleziona "Miscellaneous options" 1. Seleziona "Dump DSP firmware" @@ -94,6 +107,8 @@ Questi screenshot indicano la minima struttura che la scheda SD deve avere per p #### Sezione V - Installazione dei CIA +In this section, you will install several useful homebrew applications to HOME Menu. + 1. Avvia FBI dalla lista degli homebrew disponibili 1. Entra nella cartella `SD` -> `cias` 1. Seleziona "\" @@ -102,6 +117,8 @@ Questi screenshot indicano la minima struttura che la scheda SD deve avere per p #### Sezione VI - CTRNAND Luma3DS +In this section, you will use a script to copy some of Luma3DS's files to internal memory so that they can be accessed, even without an SD card inserted. + 1. Spegni il tuo 3DS 1. Premi (Start) e accendi la console continuando a tenerlo premuto. Verrà avviato GodMode9 + Se GodMode9 non viene avviato, assicurati che il file `GodMode9.firm` sia in `/luma/payloads/` e che `payloads` sia scritto correttamente @@ -118,6 +135,8 @@ Questi screenshot indicano la minima struttura che la scheda SD deve avere per p #### Sezione VII - Pulizia della scheda SD +In this section, you will use a script to remove some unnecessary files from your SD card. + 1. Seleziona "Cleanup SD Card" 1. Quando richiesto, premi (A) per procedere 1. Premi il pulsante (A) per continuare @@ -125,6 +144,8 @@ Questi screenshot indicano la minima struttura che la scheda SD deve avere per p #### Sezione VIII - Backup dei File Essenziali +In this section, you will make backups of flies that can be used to recover from softwaer bricks or to recover data. + 1. Seleziona "Backup Options" 1. Seleziona "SysNAND Backup" 1. Premi (A) per confermare @@ -159,7 +180,7 @@ Hai finito! Il custom firmware nella tua console è stato completamente configur Ciao! Siamo interessati ad avere un feedback sull'esperienza complessiva sulla nostra guida. Se vuoi aiutarci, dai un'occhiata a [questo](https://forms.gle/vZNoc4QLCz5MEXCK7) sondaggio (disponibile solo in inglese). Grazie! {: .notice--info} -#### Informazioni e Note +### Information and Notes {% capture notice-6 %} Ecco alcune combinazioni di tasti che dovresti conoscere: diff --git a/_pages/it_IT/homebrew-launcher-(pichaxx).txt b/_pages/it_IT/homebrew-launcher-(pichaxx).txt index 23c82801b7..b16d01a914 100644 --- a/_pages/it_IT/homebrew-launcher-(pichaxx).txt +++ b/_pages/it_IT/homebrew-launcher-(pichaxx).txt @@ -4,9 +4,17 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Indice" %} -### Lettura necessaria +
+Technical Details (optional) +This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. +
+{: .notice--info} -Questo metodo usa Seedminer per servirsi ulteriormente del tuo file `movable.sed` e scrivere un file di salvataggio personalizzato per Pokémon Picross, che può essere utilizzato con unSAFE_MODE per avviare SafeB9SInstaller. +### Compatibility Notes + +These instructions work on USA, Europe, and Japan consoles as indicated by the letters U, E, or J after the system version. + +You will need a Nintendo Network ID to download Pokémon Picross. Questo processo sovrascriverà il tuo file di salvataggio per Pokémon Picross, se ne hai uno. Se desideri conservare i tuoi dati di gioco Pokémon Picross, dovresti fare un backup del tuo file `00000001.sav` prima di sovrascriverlo. {: .notice--warning} @@ -24,15 +32,8 @@ Questo processo sovrascriverà il tuo file di salvataggio per Pokémon Picross, #### Sezione I - Preparazione -1. Accendi la console -1. Avvia il Nintendo eShop -1. Tocca l'icona Cerca (la piccola lente d'ingrandimento) -1. Cerca `picross` -1. Apri la pagina del negozio di Pokémon Picross -1. Scarica Pokémon Picross - + Puoi scansionare [questo codice QR](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=ESHOP://50010000037815&margin=0&qzone=1&size=400x400&ecc=L) con la Camera Nintendo 3DS per accedere direttamente all'applicazione eShop - + La scheda SD deve essere inserita nella console per poter installare Pokémon Picross -1. Spegni il tuo 3DS +In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. + 1. Inserisci la scheda SD nel tuo computer 1. Copia i file `boot.firm` e `boot.3dsx` dall'archivio `.zip` di Luma3DS nella directory principale della tua scheda SD + La directory principale della scheda SD è la cartella della tua scheda SD in cui è possibile visualizzare la cartella Nintendo 3DS, ma non il suo interno @@ -40,8 +41,16 @@ Questo processo sovrascriverà il tuo file di salvataggio per Pokémon Picross, 1. Copia la cartella `slotTool` dall'archivio `.zip` di unSAFE_MODE nella cartella `3ds` della tua scheda SD 1. Copia il payload otherapp adatto alla tua regionalità/versione dalla cartella `otherapps_with_CfgS` dell'archivio `.zip` di unSAFE_MODE nella directory principale della tua scheda SD e rinominalo in `otherapp.bin` +![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }}) +{: .notice--info} + + #### Sezione II - PicHaxx +In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device. 1. Apri [il sito di PicHaxx Injector](https://3ds.nhnarwhal.com/3dstools/pichaxx.php) sul tuo computer 1. Seleziona il tuo file `movable.sed` 1. Seleziona "Build and Download" diff --git a/_pages/it_IT/installing-boot9strap-(fredtool).txt b/_pages/it_IT/installing-boot9strap-(fredtool).txt index 8edeaf5a4e..05f101afd5 100644 --- a/_pages/it_IT/installing-boot9strap-(fredtool).txt +++ b/_pages/it_IT/installing-boot9strap-(fredtool).txt @@ -4,15 +4,16 @@ title: "Installazione di boot9strap (Fredtool)" {% include toc title="Indice" %} -### Lettura necessaria - -Seedminer utilizza il tuo file `movable.sed` per decriptare un qualunque titolo DSiWare per iniettare una particolare applicazione DSiWare nell'applicazione Connessioni Nintendo DS. Questo richiede un backup DSiWare, ad esempio da BannerBomb o da DSiWare Dumper. - -Questa è un'implementazione funzionante dell'exploit del "testo in chiaro noto nelle partizioni FIRM" spiegato [qui](https://www.3dbrew.org/wiki/3DS_System_Flaws). +
+Technical Details (optional) +

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+
+{: .notice--info} ### Cosa serve -* Un backup DSiWare (dovresti averne uno nella directory principale della tua scheda SD per aver seguito [BannerBomb3](bannerbomb3)) +* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Il tuo file `movable.sed` dalla sezione [Seedminer](seedminer) * L'ultima versione di [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * L'ultima versione di [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -20,6 +21,8 @@ Questa è un'implementazione funzionante dell'exploit del "testo in chiaro noto #### Sezione I - Controllo del CFW +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + 1. Spegni il tuo 3DS 1. Premi il pulsante (Select) 1. Accendi la tua console continuando a tenere premuto il pulsante (Select) @@ -30,17 +33,7 @@ Se visualizzi un menu di configurazione, hai già un CFW e continuando con quest #### Sezione II - Preparazione -1. Spegni il tuo 3DS -1. Inserisci la scheda SD nel tuo computer -1. Copia i file `boot.firm` e `boot.3dsx` dall'archivio `.zip` di Luma3DS nella directory principale della tua scheda SD - + La directory principale della scheda SD è la cartella della tua scheda SD in cui è possibile visualizzare la cartella Nintendo 3DS, ma non il suo interno -1. Copia il file `boot.nds` (B9STool) nella directory principale della tua scheda SD -1. Copia la cartella `private` presente nell'archivio `.zip` di Frogminer_save nella directory principale della tua scheda SD - - ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} - -#### Sezione III - Fredtool +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. 1. Apri il sito [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) sul tuo computer 1. Sotto il campo "Username" inserisci un nome alfanumerico qualunque (senza spazi o caratteri speciali) @@ -53,19 +46,31 @@ Se visualizzi un menu di configurazione, hai già un CFW e continuando con quest 1. Clicca sul primo risultato della ricerca + Dovrebbe avere la data più recente 1. Clicca il link "output_(name).zip" +1. Inserisci la scheda SD nel tuo computer 1. Nella tua scheda SD, entra in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` - + Questo `` sarà lo stesso che hai utilizzato in [Seedminer](seedminer) - + `` è una cartella dal nome lungo 32 caratteri all'interno di `` - + Se la cartella `Nintendo DSiWare` non esiste, creala all'interno della cartella `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` 1. Copia il file `42383841.bin` dalla cartella `hax` dall'archivio DSiWare appena scaricato (`output_(name).zip`) nella cartella `Nintendo DSiWare` -1. Reinserisci la scheda SD nella tua console + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copia i file `boot.firm` e `boot.3dsx` dall'archivio `.zip` di Luma3DS nella directory principale della tua scheda SD + + La directory principale della scheda SD è la cartella della tua scheda SD in cui è possibile visualizzare la cartella Nintendo 3DS, ma non il suo interno +1. Copia il file `boot.nds` (B9STool) nella directory principale della tua scheda SD +1. Copia la cartella `private` presente nell'archivio `.zip` di Frogminer_save nella directory principale della tua scheda SD + + ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} + +#### Section III - Overwriting DS Connection Settings + +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + 1. Accendi la console 1. Avvia "Impostazioni della console" -1. Entra in `Gestione dati` -> `DSiWare` -1. Nella sezione "Scheda SD", scegli il titolo "Haxxxxxxxxx!" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title 1. Seleziona "Copia", quindi "OK" 1. Ritorna al menu principale delle Impostazioni della console -1. Vai su `Impostazioni Internet` -> `Connessioni Nintendo DS`, quindi seleziona "OK" +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. Se l'exploit ha avuto successo, la tua console avrà caricato la versione JPN di Flipnote Studio #### Sezione IV - Exploit Flipnote @@ -73,6 +78,8 @@ Se visualizzi un menu di configurazione, hai già un CFW e continuando con quest Se desideri una guida visiva per questa parte, è disponibile [qui](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} +In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer. + 1. Completa la configurazione iniziale del gioco finché non avrai raggiunto il menu principale + Seleziona l'opzione di sinistra quando richiesto durante la configurazione 1. Con il touch screen, seleziona il riquadro grande a sinistra, poi il riquadro con l'icona di una scheda SD @@ -85,7 +92,7 @@ Se desideri una guida visiva per questa parte, è disponibile [qui](https://zoog 1. Seleziona il quarto riquadro con la lettera "A" all'interno 1. Se l'exploit ha avuto successo, la tua console avrà caricato b9sTool 1. Usando il D-Pad, vai su "Install boot9strap" - + Se salti questo passaggio, la console si riavvierà nel menu HOME senza aver installato boot9strap, e sarà necessario ricominciare dal passo 12 della Sezione III + + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III 1. Premi (A), quindi premi START e SELECT contemporaneamente per avviare il processo 1. Al termine lo schermo inferiore presenterà la scritta "done.". Esci da b9sTool, quindi spegni la console + Potresti dover forzare lo spegnimento tenendo premuto il pulsante di accensione @@ -94,6 +101,8 @@ Se desideri una guida visiva per questa parte, è disponibile [qui](https://zoog #### Sezione V - Verifica di Luma3DS +Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. + 1. Spegni il tuo 3DS 1. Inserisci la scheda SD nel tuo computer 1. Assicurati che esista una cartella `luma` e che all'interno ci sia il file `config.ini` @@ -106,13 +115,15 @@ A questo punto, la console avvierà sempre Luma3DS. #### Sezione VI - Ripristino delle Impostazioni di Connessione DS -1. Copia il file `42383841.bin` dalla cartella `clean/` dall'archivio DSiWare appena scaricato (`output_(name).zip`) nella cartella `Nintendo 3DS///Nintendo DSiWare/` della tua scheda SD - + Sostituisci il file `423841.bin` esistente +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. + +1. Nella tua scheda SD, entra in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one 1. Reinserisci la scheda SD nella tua console 1. Accendi la console 1. Avvia "Impostazioni della console" -1. Entra in `Gestione dati` -> `DSiWare` -1. Nella sezione "Scheda SD", scegli il titolo "Nintendo DSi™" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title 1. Seleziona "Copia", quindi "OK" ___ diff --git a/_pages/it_IT/installing-boot9strap-(hbl-usm).txt b/_pages/it_IT/installing-boot9strap-(hbl-usm).txt index 4db5dba54a..f3e3e6656f 100644 --- a/_pages/it_IT/installing-boot9strap-(hbl-usm).txt +++ b/_pages/it_IT/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,16 @@ title: "Installazione di boot9strap (HBL-USM)" {% include toc title="Indice" %} -### Lettura necessaria +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

As we already have Homebrew access, we can use slotTool to do this.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+
+{: .notice--info} -Per sfruttare il firmware SAFE_MODE del nostro sistema, dobbiamo iniettare un profilo di connessione WiFi modificato. - -Poiché abbiamo già accesso agli Homebrew, possiamo approfittare di slotTool. - -Una volta inserito il profilo WiFi utilizzeremo SAFE_MODE, una funzionalità di ripristino presente su ogni console 3DS, per attivare il profilo WiFi modificato. +### Compatibility Notes Se i tuoi pulsanti (L/R), (Su) o (A) non funzionano, unisciti a [Nintendo Homebrew su Discord](https://discord.gg/MWxPgEp) e chiedi, in inglese, una mano. {: .notice--danger} @@ -24,7 +27,10 @@ Se i tuoi pulsanti (L/R), (Su) o (A) non funzionano, unisciti a [Nintendo Homebr #### Sezione I - Preparazione +In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. + 1. Dalla sezione precedente della guida, la console dovrebbe essere già accesa e visualizzare la schermata dell'Homebrew Launcher + + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. Avvia slotTool dalla lista degli homebrew disponibili + Se rimani bloccato su una schermata rossa, spegni forzatamente la console tenendo premuto il pulsante di accensione per quindici secondi, quindi ritenta questa sezione 1. Seleziona l'opzione "INSTALL exploit to wifi slots 1,2,3 & shutdown" @@ -36,22 +42,31 @@ Se i tuoi pulsanti (L/R), (Su) o (A) non funzionano, unisciti a [Nintendo Homebr 1. Copia il file `usm.bin` dall'archivio `.zip` di unSAFE_MODE nella directory principale della tua scheda SD 1. Reinserisci la scheda SD nella tua console +![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} + #### Sezione II - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. Con la console ancora spenta, tieni premuto i pulsanti (L) + (R) + (Su) + (A), dopodiché, tenendo premuti i pulsanti, accendi la console - + Mantieni premuti i pulsanti finché la console non si avvia in Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + Se dopo molteplici tentativi non riesci ancora ad entrare in Safe Mode, potresti avere uno dei pulsanti difettosi o rotti. In tal caso, puoi ricevere assistenza chiedendo, in inglese, nel [canale Discord di Nintendo Homebrew](https://discord.gg/MWxPgEp). 1. Premi "OK" per accettare l'aggiornamento + Non c'è alcun aggiornamento. Fa parte del procedimento 1. Premi "Accetto" per accettare i termini e le condizioni 1. L'aggiornamento fallirà, con codice di errore `003-1099`. Questo risultato è corretto 1. Alla richiesta "Vuoi configurare le Impostazioni internet?", seleziona "Sì" -1. Nel menu successivo, entra in `Connessione 1` -> `Modifica` -> pagina successiva (la freccia a destra) -> `Impostazioni proxy` -> `Impostazioni avanzate` - + Ecco una [rappresentazione visiva](https://uwuu.ca/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. Se l'exploit è andato a buon fine, la tua console avvierà SafeB9SInstaller #### Sezione III - Installazione di boot9strap +In this section, you will install custom firmware onto your device. + 1. Quando richiesto, inserisci la combinazione di tasti richiesta sullo schermo superiore per installare boot9strap + Se la schermata superiore è vuota, spegni la tua console e ripeti la Sezione III 1. Una volta completato il processo, premi (A) per riavviare la tua console @@ -65,6 +80,8 @@ A questo punto, la console avvierà sempre Luma3DS. #### Sezione IV - Ripristino dei Profili di Connessione WiFi +In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Avvia l'applicazione "Modalità download" 1. Attendi finché non vedrai i due pulsanti + Non premere alcun pulsante diff --git a/_pages/it_IT/installing-boot9strap-(soundhax).txt b/_pages/it_IT/installing-boot9strap-(soundhax).txt index 11702cbf33..688fd7c40f 100644 --- a/_pages/it_IT/installing-boot9strap-(soundhax).txt +++ b/_pages/it_IT/installing-boot9strap-(soundhax).txt @@ -4,7 +4,13 @@ title: "Installazione di boot9strap (Soundhax)" {% include toc title="Indice" %} -### Lettura necessaria +
+Technical Details (optional) +

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+
+{: .notice--info} + +### Compatibility Notes Soundhax (combinato a universal-otherapp) è compatibile con le versioni del software comprese tra 1.0.0 e 11.3.0 per tutte le regioni. @@ -21,6 +27,8 @@ Soundhax (combinato a universal-otherapp) è compatibile con le versioni del sof #### Sezione I - Preparazione +In this section, you will copy the files needed to trigger both Soundhax and universal-otherapp. + 1. Spegni il tuo 3DS 1. Inserisci la scheda SD nel tuo computer 1. Copia il file `.m4a`di Soundhax nella directory principale della tua scheda SD @@ -33,11 +41,16 @@ Soundhax (combinato a universal-otherapp) è compatibile con le versioni del sof 1. Reinserisci la scheda SD nella tua console 1. Accendi la console - ![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} #### Sezione II - Avvio di SafeB9SInstaller +In this section, you will launch Soundhax through the Nintendo 3DS Sound app, which will use universal-otherapp to launch the boot9strap (custom firmware) installer. + 1. Reinserisci la scheda SD nella tua console 1. Accendi la console 1. Avvia Sound Nintendo 3DS @@ -58,6 +71,8 @@ Soundhax (combinato a universal-otherapp) è compatibile con le versioni del sof #### Sezione III - Installazione di boot9strap +In this section, you will install custom firmware onto your device. + 1. Quando richiesto, inserisci la combinazione di tasti richiesta sullo schermo superiore per installare boot9strap 1. Una volta completato il processo, premi (A) per riavviare la tua console 1. La tua console dovrebbe riavviarsi all'interno del menu di configurazione di Luma3DS diff --git a/_pages/it_IT/installing-boot9strap-(usm).txt b/_pages/it_IT/installing-boot9strap-(usm).txt index fdb2c777cf..e61d2733e7 100644 --- a/_pages/it_IT/installing-boot9strap-(usm).txt +++ b/_pages/it_IT/installing-boot9strap-(usm).txt @@ -4,15 +4,17 @@ title: "Installazione di boot9strap (USM)" {% include toc title="Indice" %} -### Lettura necessaria +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

We can do this using an existing exploit, BannerBomb3.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

+
+{: .notice--info} -Per sfruttare il firmware SAFE_MODE del nostro sistema, dobbiamo iniettare un profilo di connessione WiFi modificato. - -Lo faremo utilizzando un exploit già esistente, BannerBomb3. - -Per realizzare l'obiettivo, utilizziamo la chiave di cifratura della tua console (movable.sed) per generare un backup DSiWare che induce la console a iniettare il profilo WiFi modificato nella tua lista di connessioni disponibili. - -Una volta inserito il profilo WiFi utilizzeremo SAFE_MODE, una funzionalità di ripristino presente su ogni console 3DS, per attivare il profilo WiFi modificato. +### Compatibility Notes Queste istruzioni funzionano su console americane, europee, giapponesi e coreane, indicate rispettivamente dalle lettere U, E, J o K dopo la versione del sistema operativo. @@ -29,6 +31,8 @@ Se i tuoi pulsanti (L/R), (Su) o (A) non funzionano, dovrai usare [una versione #### Sezione I - Preparazione +In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. + 1. Se la tua console è accesa, spegnila 1. Avvia [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) sul tuo computer 1. Carica il tuo file movable.sed scegliendo l'opzione "Choose File" @@ -41,47 +45,51 @@ Se i tuoi pulsanti (L/R), (Su) o (A) non funzionano, dovrai usare [una versione 1. Copia i file `boot9strap.firm` e `boot9strap.firm.sha` dall'archivio `.zip` di boot9strap nella cartella `/boot9strap/` della tua scheda SD 1. Copia il file `SafeB9SInstaller.bin` dall'archivio `.zip` di SafeB9SInstaller nella directory principale della tua scheda SD 1. Copia il file `usm.bin` da `unSAFE_MODE.zip` nella directory principale della tua scheda SD - + ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }}) - {: .notice--info} - + ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} + ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. Nella tua scheda SD, entra in `Nintendo 3DS` -> `` -> `` - + Questo `` sarà lo stesso che hai utilizzato in [Seedminer](seedminer) - + `` è una cartella dal nome lungo 32 caratteri all'interno di `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Crea una cartella chiamata `Nintendo DSiWare` all'interno di `` + Se hai già la cartella *e* sono già presenti dei file di backup DSiWare (`.bin`) all'interno, copiali sul PC e rimuovili dalla scheda SD 1. Copia il file `F00D43D5.bin` da `unSAFE_MODE.zip` nella cartella `Nintendo DSiWare` - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Sezione II - BannerBomb3 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. + 1. Reinserisci la scheda SD nella tua console 1. Accendi la console 1. Avvia "Impostazioni della console" -1. Entra in `Gestione dati` -> `DSiWare` -1. Clicca sulla sezione Scheda SD - + La tua console dovrebbe mostrare un menu con del testo +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + Se questo passaggio causa il crash della tua console, [segui questa guida per risolvere il problema](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Seleziona "Inject haxx" +1. Press (A) to select "Inject haxx" + La tua console si spegnerà automaticamente #### Sezione III - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. Con la console ancora spenta, tieni premuto i pulsanti (L) + (R) + (Su) + (A), dopodiché, tenendo premuti i pulsanti, accendi la console - + Mantieni premuti i pulsanti finché la console non si avvia in Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + Se dopo molteplici tentativi non riesci ancora ad entrare in Safe Mode, potresti avere uno dei pulsanti difettosi o rotti. In tal caso, dovrai seguire [un metodo alternativo di Seedminer](bannerbomb3). In questi casi, puoi ricevere assistenza chiedendo, in inglese, nel [canale Discord di Nintendo Homebrew](https://discord.gg/MWxPgEp). 1. Premi "OK" per accettare l'aggiornamento + Non c'è alcun aggiornamento. Fa parte del procedimento 1. Premi "Accetto" per accettare i termini e le condizioni 1. L'aggiornamento fallirà, con codice di errore `003-1099`. Questo risultato è corretto 1. Alla richiesta "Vuoi configurare le Impostazioni internet?", seleziona "Sì" -1. Nel menu successivo, entra in `Connessione 1` -> `Modifica` -> pagina successiva (la freccia a destra) -> `Impostazioni proxy` -> `Impostazioni avanzate` - + Ecco una [rappresentazione visiva](/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. Se l'exploit è andato a buon fine, la tua console avvierà SafeB9SInstaller #### Sezione IV - Installazione di boot9strap +In this section, you will install custom firmware onto your device. + 1. Quando richiesto, inserisci la combinazione di tasti richiesta sullo schermo superiore per installare boot9strap + Se la schermata superiore è vuota, spegni la tua console e ripeti la Sezione III 1. Una volta completato il processo, premi (A) per riavviare la tua console @@ -95,16 +103,17 @@ A questo punto, la console avvierà sempre Luma3DS. #### Sezione V - Ripristino dei Profili di Connessione WiFi +In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Avvia "Impostazioni della console" -1. Entra in `Gestione dati` -> `DSiWare` -1. Clicca sulla sezione Scheda SD - + La tua console dovrebbe mostrare un menu con del testo -1. Seleziona "Restore slots" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) +1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + La tua console si riavvierà automaticamente 1. Spegni il tuo 3DS 1. Inserisci la scheda SD nel tuo computer 1. Nella tua scheda SD, entra in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` -1. Elimina il file `F0D43D5.bin` dalla cartella Nintendo DSiWare +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. Questo file non sarà più necessario ___ diff --git a/_pages/it_IT/seedminer.txt b/_pages/it_IT/seedminer.txt index 8c2472e579..766bbdbb89 100644 --- a/_pages/it_IT/seedminer.txt +++ b/_pages/it_IT/seedminer.txt @@ -4,52 +4,54 @@ title: "Seedminer" {% include toc title="Indice" %} -### Lettura necessaria +
+Technical Details (optional) +

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

+

For information on how Seedminer works, see this presentation.

+

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+
+{: .notice--info} -Per installare boot9strap nella tua console, ne ricaviamo la sua univoca chiave di cifratura. Utilizzeremo perciò un'applicazione chiamata Seedminer per calcolare la chiave di cifratura dati (`movable.sed`) per la tua console. +### Section I - Prep Work -Per ulteriori informazioni sul funzionamento di Seedminer, è possibile consultare [questa presentazione](https://zoogie.github.io/web/34⅕c3). - -Questo metodo utilizza una scheda grafica di fascia alta per eseguire i calcoli necessari. Verrà usato un sito web gestito da volontari per assisterti in questo metodo. - -### Istruzioni - -#### Sezione I - Preparazione +In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. 1. Inserisci la scheda SD nel tuo computer 1. Entra nella cartella `Nintendo 3DS` della tua scheda SD -1. Copia la stringa di 32 caratteri del nome della cartella presente dentro il Nintendo 3DS - + Non entrare in ulteriori cartelle - + Se vedi più cartelle di 32 caratteri, segui [queste istruzioni](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + + If you don't have a `Nintendo 3DS` folder, put your SD card into your 3DS and power it on so that the folder can be created +1. Copy the name of the 32-letter folder you see directly inside Nintendo 3DS + + This 32-letter name is system-specific and will be different for each console + + If you see multiple 32-letter folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + Se presente, puoi ignorare la cartella `private` - ![]({{ "/images/screenshots/id0-example.png" | absolute_url }}) + ![]({{ "/images/screenshots/seedminer/id0-example.png" | absolute_url }}) {: .notice--info} -1. Incolla la stringa di 32 caratteri in un documento che potrai consultare più avanti - + Il nome di questa cartella è il tuo "ID0" +1. Paste your 32 character long folder name into [a document](/images/screenshots/seedminer/text-document.png) you can reference later + + This folder is known as your "ID0". Take note of this as this guide will refer to it as such later 1. Accendi la console + In questo momento non occorre che la scheda SD sia inserita 1. Accedi alla lista di amici (l'[icona con un viso arancione]({{ "/images/friend-list-icon.png" | absolute_url }}) nella riga superiore del menu HOME) + Se riscontri un errore e vieni rimandato al menu principale, o devi creare un nuovo Mii o la console non può connettersi ai server Nintendo (a causa di un ban o per problemi di connettività) 1. Sul tuo profilo Mii cerca il "Codice Amico" sullo schermo superiore -#### Sezione II - Seedminer +### Section II - Seedminer + +In this section, you will use the Bruteforce Movable website to retrieve your device's encryption key in the form of `movable.sed`. 1. Avvia [Bruteforce Movable](https://seedminer.hacks.guide/) sul tuo computer - + Questo sito permette il recupero automatico del file `movable_part1.sed` (utilizzando una console 3DS fittizia) e la decifrazione della chiave DSiWare della tua console (utilizzando Seedminer tramite il computer di un volontario) + Se il sito non funziona, entra nel [canale Discord di Nintendo Homebrew](https://discord.gg/MWxPgEp) (in Inglese) per richiedere assistenza 1. Inserisci il Codice Amico della tua console (senza spazi o trattini) nel campo "Your friend code" 1. Incolla il nome di 32 caratteri della cartella della tua console nel campo "Your ID0" - + Non inserire l'ID0 a mano. Assicurati che l'ID0 sia inserito correttamente copiandolo e incollandolo da dove lo hai salvato nella sezione precedente + + Do not attempt to enter the ID0 manually, as it is easy to make a mistake. Assicurati che l'ID0 sia inserito correttamente copiandolo e incollandolo da dove lo hai salvato nella sezione precedente 1. Seleziona "Go" + Se il sito va immediatamente al punto 4, la tua richiesta di bruteforce è già stata elaborata correttamente. Puoi scaricare il tuo file `movable.sed` e continuare con la prossima sezione. Non occorre aggiungere nuovamente il bot -1. Clicca sul pulsante "Registra amico" della tua console per aggiungere il codice amico del bot fornito dal sito +1. Use the ["Register Friend" button](/images/screenshots/seedminer/register-friend.png) on your device to add the bot's friend code as given by the website + Potrebbe venir richiesto di assegnare un nome all'amico, ma il nome scelto è irrilevante 1. Attendi l'aggiornamento del sito + Se la pagina non si aggiorna da sola, attendi qualche minuto prima di ricaricarla manualmente una singola volta 1. Quando il sito avrà elaborato le tue informazioni, avanzerà automaticamente a `Step 2: Bruteforce` 1. Attendi il termine del processo - + Di solito occorre poco tempo (tra 1 e 5 minuti), ma in alcuni casi potrebbe impiegare fino a mezz'ora + + This is usually fast (1-5 minutes) + Durante questo processo, il bot che hai aggiunto potrebbe non apparire sul tuo 3DS. Finché il sito web si aggiorna, non sarà un problema + Se dopo mezz'ora non è successo nulla, entra nel [canale Discord di Nintendo Homebrew](https://discord.gg/MWxPgEp) (in Inglese) per richiedere assistenza 1. Al termine del processo, scarica il tuo file `movable.sed` dal sito @@ -57,7 +59,7 @@ Questo metodo utilizza una scheda grafica di fascia alta per eseguire i calcoli ___ -### Passi successivi +### Next steps: Choose an exploit Una volta ottenuta la chiave di crittografia della tua console (`movable.sed`), la userai in combinazione ad altri exploit per installare un custom firmware sul tuo 3DS. diff --git a/_pages/ja_JP/bannerbomb3-fredtool-(twn).txt b/_pages/ja_JP/bannerbomb3-fredtool-(twn).txt index 2329416ba2..8527172194 100644 --- a/_pages/ja_JP/bannerbomb3-fredtool-(twn).txt +++ b/_pages/ja_JP/bannerbomb3-fredtool-(twn).txt @@ -102,7 +102,7 @@ If you see a configuration menu, you already have CFW, and continuing with these 1. 再度、SDカードを本体に挿入してください。 1. デバイスの電源を入れます 1. 「本体設定」を開きます。 -1. `データ管理` -> `DSiWare データ管理` に移動します +1. `データ管理` -> `DSiWare データ管理` の順に移ります。 1. Under the “SD Card” section, select the “Haxxxxxxxxx!” title 1. Select “Copy”, then select “OK” 1. Exit System Settings @@ -153,7 +153,7 @@ At this point, your console will boot to Luma3DS by default. 1. 再度、SDカードを本体に挿入してください。 1. デバイスの電源を入れます 1. 「本体設定」を開きます。 -1. `データ管理` -> `DSiWare データ管理` に移動します +1. `データ管理` -> `DSiWare データ管理` の順に移ります。 1. Under the “SD Card” section, select the “Haxxxxxxxxx!” title 1. Select “Copy”, then select “OK” 1. Exit System Settings diff --git a/_pages/ja_JP/bannerbomb3.txt b/_pages/ja_JP/bannerbomb3.txt index 8a78237ed1..a64d083664 100644 --- a/_pages/ja_JP/bannerbomb3.txt +++ b/_pages/ja_JP/bannerbomb3.txt @@ -4,11 +4,15 @@ title: "BannerBomb3" {% include toc title="目次" %} -### 必ずお読みください +
+Technical Details (optional) +

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

For a more technical explanation, see here.

+
+{: .notice--info} -DSiWareシステムをダンプするために、本体設定アプリのDSiWare データ管理画面の脆弱性を使用します。 - -それを実現するため、システムの暗号化キー (movable.sed) を使用して、DSソフト用設定に脆弱性を仕込み、DSiWareのバックアップのダンプをSDカードのルートに作成します。 +### Compatibility Notes これらのガイドは、システムバージョン末尾にある「U、E、J、K」にあるように、米国、欧州、日本、韓国の端末で機能します。 @@ -20,6 +24,9 @@ If you have a Taiwanese console (indicated by a T after the system version), fol * [Seedminer](seedminer) より作成した、 `movable.sed` ファイル #### セクション I - 準備 + +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + 1. [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) をあなたのコンピューターで開いてください。 1. "ファイルを選択"から movable.sed ファイルをアップロードします。 1. 「Build and Download」をクリックしてください。 @@ -27,28 +34,31 @@ If you have a Taiwanese console (indicated by a T after the system version), fol 1. コンソールの電源が入っている場合は、コンソールの電源を切ります 1. パソコンにSDカードを入れます 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + ここでいう `` は先ほど [Seedminer](seedminer) で使用したものと同じです。 - + `` は ` ` の中の32文字の長いフォルダのことです。 + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. `F00D43D5.bin` ファイルを BannerBomb3`.zip` から `Nintendo DSiWare` フォルダーにコピーして下さい +1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### セクション II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. + 1. 再度、SDカードを本体に挿入してください。 1. デバイスの電源を入れます 1. デバイスの「本体設定」を開きます。 -1. `データ管理` -> `DSiWare データ管理` に移動します -1. SDカードをクリックします。 +1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + システムはマゼンダ(ピンク/パープル)色で点滅してから数秒でクラッシュするはずです。 それは成功したことを意味します。 1. 本体の電源を切ります。 1. パソコンにSDカードを入れます -1. SDカードのルートに `42383841.bin` が存在しているはずです。 このファイルは、DSiWareのバックアップとして、このあとのガイドで使用します。 -1. SDカードから、 `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` の順にフォルダを開きます。 - + ここでいう `` は先ほどあなたが [Seedminer](seedminer) で使用したものと同じです。 -1. パソコンとDSiWareフォルダから、 `F00D43D5.bin` を削除します。 このファイルはもう必要ありません。 +1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page +1. SDカードの`Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`へ移動します +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. このファイルはもう必要ありません。 + 引き続き [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) へ進んでください。 {: .notice--primary} diff --git a/_pages/ja_JP/finalizing-setup.txt b/_pages/ja_JP/finalizing-setup.txt index fb45ce98a1..cfe0b1945b 100644 --- a/_pages/ja_JP/finalizing-setup.txt +++ b/_pages/ja_JP/finalizing-setup.txt @@ -20,6 +20,8 @@ On this page, we will make critical system file backups and install the followin It is not recommended to skip downloading any of these applications, as many of them will be used later on this page. At the end of this page, your SD card will be cleaned up by removing unnecessary installation files. {: .notice--warning} +### Compatibility Notes + If your **New 3DS** was on version 2.1.0 before following this guide, you should [restore your NAND backup](godmode9-usage#restoring-a-nand-backup) before continuing. {: .notice--warning} @@ -39,6 +41,8 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o #### セクション I - 準備 +In this section, you will copy the files necessary to follow the rest of the instructions on this page. + 1. 本体の電源を切ります。 1. パソコンにSDカードを入れます 1. SDカード直下に `cias` フォルダが存在しない場合、作成します。 @@ -52,15 +56,20 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o 1. 再度、SDカードを本体に挿入してください。 1. デバイスの電源を入れます - ![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) - {: .notice--info} - ![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) - {: .notice--info} +The screenshots below indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. + +![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) +{: .notice--info} + -These screenshots indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. #### セクション II - システムの更新 +In this section, you will update your system to the latest version, which is safe to do with custom firmware. + 1. 「本体設定」→「その他の設定」を開き、1番右のページから「本体の更新」を行います + (今使っている) B9S + Luma を使用している状態での本体更新は安全です + 更新はせずに、「この本体は最新です。」と表示されます 本体の更新をすでにしている場合、これは当たり前のことです。次のステップの進んで下さい @@ -69,6 +78,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### セクション III - Homebrew Launcher +In this section, you will temporarily replace Download Play with Homebrew Launcher (which we need to launch FBI). Download Play will automatically go back to normal once you reboot your device. + 1. ダウンロードプレイを開いて下さい (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. Wait until you see the `Nintendo 3DS` and `Nintendo DS` buttons 1. (Lボタン) + (十字キー下) + (Select) を同時に押してRosalina menu を開きます @@ -83,6 +94,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section IV - RTC and DSP Setup +In this section, you will sync your 3DS internal clock with the actual time and dump the sound firmware (which is necesssary for some homebrew software to use sound properly). + 1. (Lボタン) + (十字キー下) + (Select) を同時に押してRosalina menu を開きます 1. "Miscellaneous options​"を選びます。 1. Select "Dump DSP firmware" @@ -94,6 +107,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section V - Installing CIAs +In this section, you will install several useful homebrew applications to HOME Menu. + 1. HomebrewメニューからFBIを起動します。 1. SDカードのciasフォルダに移動します 1. 「\」を選択します @@ -102,6 +117,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### セクション VI - CTRNAND Luma3DS +In this section, you will use a script to copy some of Luma3DS's files to internal memory so that they can be accessed, even without an SD card inserted. + 1. 本体の電源を切ります。 1. Press and hold (Start), and while holding (Start), power on your device. This will launch GodMode9 + If you do not boot into GodMode9, ensure that `GodMode9.firm` is in `/luma/payloads/` and that `payloads` is correctly spelled @@ -118,6 +135,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### セクション VII - SD カードのクリーンアップ +In this section, you will use a script to remove some unnecessary files from your SD card. + 1. "Cleanup SD Card"を選択します 1. メッセージが表示されたら、(A) ボタンを押して続行します 1. (A) で続行します @@ -125,6 +144,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### セクション VIII - 重要ファイルのバックアップ +In this section, you will make backups of flies that can be used to recover from softwaer bricks or to recover data. + 1. "Backup Options"を選択します 1. "SysNAND Backup"を選択します 1. (A) を押して確認します @@ -159,7 +180,7 @@ You're done! Custom firmware is now fully configured on your device. Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! {: .notice--info} -#### メモ +### Information and Notes {% capture notice-6 %} Here are some key combos that you should know: diff --git a/_pages/ja_JP/homebrew-launcher-(pichaxx).txt b/_pages/ja_JP/homebrew-launcher-(pichaxx).txt index 67999dabef..b09880abc9 100644 --- a/_pages/ja_JP/homebrew-launcher-(pichaxx).txt +++ b/_pages/ja_JP/homebrew-launcher-(pichaxx).txt @@ -4,9 +4,17 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="目次" %} -### 必読事項 +
+Technical Details (optional) +This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. +
+{: .notice--info} -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE to run SafeB9SInstaller. +### Compatibility Notes + +These instructions work on USA, Europe, and Japan consoles as indicated by the letters U, E, or J after the system version. + +You will need a Nintendo Network ID to download Pokémon Picross. This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. {: .notice--warning} @@ -24,15 +32,8 @@ This process will overwrite your Pokémon Picross save file, if you have one. If #### セクション I - 準備 -1. デバイスの電源を入れます -1. Open the Nintendo eShop -1. Tap the Search icon (small magnifying glass) -1. Search for `picross` -1. Open the store page for Pokémon Picross -1. Download Pokémon Picross - + You can scan [this QR code](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=ESHOP://50010000037815&margin=0&qzone=1&size=400x400&ecc=L) using the Nintendo 3DS Camera for a direct link to the eShop app - + Your SD card must be inserted in your device to install Pokémon Picross -1. 本体の電源を切ります。 +In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. + 1. パソコンにSDカードを入れます 1. `boot.firm` と `boot.3dsx` をLuma3DSの `.zip` からSDカードのルートにコピーします + SDカードのルートとは、Nintendo 3DSのフォルダなどがある最初の項目のことであり、フォルダの中ではありません。 @@ -40,8 +41,16 @@ This process will overwrite your Pokémon Picross save file, if you have one. If 1. Copy the `slotTool` folder from the unSAFE_MODE `.zip` to the `3ds` folder on your SD card 1. Copy the otherapp payload for your region/version from the unSAFE_MODE `.zip`'s `otherapps_with_CfgS` folder to the root of your SD card and rename it to `otherapp.bin` +![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }}) +{: .notice--info} + + #### セクション II - PicHaxx +In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device. 1. コンピュータで [the PicHaxx Injector website](https://3ds.nhnarwhal.com/3dstools/pichaxx.php)を開きます。 1. `movable.sed`ファイルを選択します 1. 「Build and Download」を選択します diff --git a/_pages/ja_JP/installing-boot9strap-(fredtool).txt b/_pages/ja_JP/installing-boot9strap-(fredtool).txt index d8972b2c74..6a1387a29d 100644 --- a/_pages/ja_JP/installing-boot9strap-(fredtool).txt +++ b/_pages/ja_JP/installing-boot9strap-(fredtool).txt @@ -4,15 +4,16 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="目次" %} -### 必読事項 - -この方法は、Seedminer による脆弱性を用いたあなたの `movable.sed` ファイルを、DSiWareタイトルを復号化し、脆弱性のあるDSiWareタイトルを「DSソフト用設定」アプリに挿入するために使用します。 ここでは、BannerBomb や the DSiWare Dumper toolなどを利用したDSiWareのバックアップファイルが必要です。 - -下記の方法はすべて「FIRM partitions known-plaintext」脆弱性の有効な活用です。詳しくは [こちら](https://www.3dbrew.org/wiki/3DS_System_Flaws) 。 +
+Technical Details (optional) +

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+
+{: .notice--info} ### 必要なもの -* A DSiWare Backup (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) +* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * [Seedminer](seedminer) より作成した、 `movable.sed` ファイル * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -20,6 +21,8 @@ title: "Installing boot9strap (Fredtool)" #### Section I - CFW Check +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + 1. 本体の電源を切ります。 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button @@ -30,17 +33,7 @@ If you see a configuration menu, you already have CFW, and continuing with these ####セクションⅡ-準備 -1. 本体の電源を切ります。 -1. パソコンにSDカードを入れます -1. `boot.firm` と `boot.3dsx` をLuma3DSの `.zip` からSDカードのルートにコピーします - + SDカードのルートとは、Nintendo 3DSのフォルダなどがある最初の項目のことであり、フォルダの中ではありません。 -1. SDカードのルートに`boot.nds` (B9STool) をコピーします -1. Frogminer_save `.zip`から`private`フォルダをSDカードのルートにコピーします - - ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} - -#### Section III - Fredtool +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) @@ -53,19 +46,31 @@ If you see a configuration menu, you already have CFW, and continuing with these 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link +1. パソコンにSDカードを入れます 1. SDカードの`Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`へ移動します - + ここでいう `` は先ほど [Seedminer](seedminer) で使用したものと同じです。 - + `` は ` ` の中の32文字の長いフォルダのことです。 - + `Nintendo DSiWare`フォルダが存在しない場合は、の中に作成します + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` 1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder -1. 再度、SDカードを本体に挿入してください。 + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. `boot.firm` と `boot.3dsx` をLuma3DSの `.zip` からSDカードのルートにコピーします + + SDカードのルートとは、Nintendo 3DSのフォルダなどがある最初の項目のことであり、フォルダの中ではありません。 +1. SDカードのルートに`boot.nds` (B9STool) をコピーします +1. Frogminer_save `.zip`から`private`フォルダをSDカードのルートにコピーします + + ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} + +#### Section III - Overwriting DS Connection Settings + +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + 1. デバイスの電源を入れます 1. 「本体設定」を開きます。 -1. `データ管理` -> `DSiWare データ管理` に移動します -1. 「SDカード」セクションで「Haxxxxxxxxx!」タイトルを選択します +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title 1. 「コピー」を選択し、「OK」を選択します 1. システム設定のメインメニューに戻ります -1. `インターネット設定` -> `Nintendo DS Connections` に移動し、"OK" を選択します。 +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. 完了した場合、日本語のうごくメモ帳が開きます #### Section IV - Flipnote Exploit @@ -73,6 +78,8 @@ If you see a configuration menu, you already have CFW, and continuing with these このセクションのビジュアルガイドをご希望の場合は、 [このリンク](https://zoogie.github.io/web/flipnote_directions/) からご利用いただけます。 {: .notice--info} +In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer. + 1. メインメニューに到達するまで、うごくメモ帳の初期設定プロセスを完了します + セットアッププロセス中にプロンプトが表示されるたびに左のオプションを選択します 1. タッチスクリーンを使用して、大きな左のボックスを選択し、SDカードアイコンのあるボックスを選択します @@ -85,7 +92,7 @@ If you see a configuration menu, you already have CFW, and continuing with these 1. 「A」の文字が入った4番目のボックスをタップしてください 1. エクスプロイトが成功した場合、お使いのデバイスは b9sTool をロードします。 1. 方向ボタンを使って「boot9strapのインストール(Install boot9strap)」に移動します - + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to start over from Step 12 of Section III + + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III 1. (A) を押し、同時にSTARTとSELECTを押してプロセスを開始します 1. 完了し、下の画面に「完了(done)」と表示されたら、b9sToolを終了し、デバイスの電源を切ってください + 電源ボタンを長押しして強制的に電源を切る必要があるかもしれません @@ -94,6 +101,8 @@ If you see a configuration menu, you already have CFW, and continuing with these #### Section V - Luma3DS Verification +Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. + 1. 本体の電源を切ります。 1. パソコンにSDカードを入れます 1. Verify that a `luma` folder exists and that `config.ini` is inside of it @@ -106,13 +115,15 @@ At this point, your console will boot to Luma3DS by default. #### Section VI - Restoring DS Connection Settings -1. Copy the `42383841.bin` file from the `clean/` folder of the downloaded DSiWare archive (`output_(name).zip`) to the `Nintendo 3DS///Nintendo DSiWare/` folder on your SD card - + 既存の `42383841.bin` ファイルを置き換えてください +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. + +1. SDカードの`Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`へ移動します +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one 1. 再度、SDカードを本体に挿入してください。 1. デバイスの電源を入れます 1. 「本体設定」を開きます。 -1. `データ管理` -> `DSiWare データ管理` に移動します -1. 「SDカード」セクションで「Nintendo DSi™」のタイトルを選択します +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title 1. 「コピー」を選択し、「OK」を選択します ___ diff --git a/_pages/ja_JP/installing-boot9strap-(hbl-usm).txt b/_pages/ja_JP/installing-boot9strap-(hbl-usm).txt index 63d667f34a..1bdb5104c3 100644 --- a/_pages/ja_JP/installing-boot9strap-(hbl-usm).txt +++ b/_pages/ja_JP/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,16 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="目次" %} -### 必読事項 +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

As we already have Homebrew access, we can use slotTool to do this.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+
+{: .notice--info} -SAFE_MODE を導入するために、開発されたWiFiプロファイルを入れる必要があります。 - -As we already have Homebrew access, we can use slotTool to do this. - -WiFiプロファイルを入れたら、SAFE_MODEを実行します。これは、WiFiプロファイルを有効にするために、すべての3DS本体に存在する回復機能です。 +### Compatibility Notes If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--danger} @@ -24,7 +27,10 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint #### セクション I - 準備 +In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. + 1. Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide + + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. Launch slotTool from the list of homebrew + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section 1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option @@ -36,22 +42,31 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint 1. Copy `usm.bin` from the unSAFE_MODE `.zip` to the root of your SD card 1. Put your SD card back into your console +![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} + #### Section II - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + 本体が起動するまでボタンをそのまま押し続けて下さい + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. 「OK」を押して更新を承認します + アップデートはありません。 そういう仕組みになっています 1. 「承諾」を押して利用規約に同意します 1. The update will eventually fail, with the error code `003-1099`. これもそうなるように仕込まれています 1. 「インターネット設定を設定しますか?」と聞かれたら、「はい」を選択します。 -1. 次の画面で、`接続先1`→`設定変更`→`右のページ(右矢印)`→`Proxyの設定`→`詳細設定` の順に進みます - + [この画像](https://uwuu.ca/images/safemode_highlighted.png)を参考にして下さい +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### セクション III - boot9strapをインストールする +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -65,6 +80,8 @@ At this point, your console will boot to Luma3DS by default. #### Section IV - Restoring WiFi Configuration Profiles +In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. 再度ダウンロードプレイアプリを開きます。 1. 画面が表示されるまで待ちます + Do not press either of the buttons diff --git a/_pages/ja_JP/installing-boot9strap-(soundhax).txt b/_pages/ja_JP/installing-boot9strap-(soundhax).txt index 76bac669cb..da96702fd4 100644 --- a/_pages/ja_JP/installing-boot9strap-(soundhax).txt +++ b/_pages/ja_JP/installing-boot9strap-(soundhax).txt @@ -4,7 +4,13 @@ title: "boot9strapの導入 (Soundhax)" {% include toc title="目次" %} -### 必読事項 +
+Technical Details (optional) +

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+
+{: .notice--info} + +### Compatibility Notes Soundhax (universal-otherappと組み合わせた場合) は、すべてのリージョンでバージョン 1.0.0 から 11.3.0 と互換性があります。 @@ -21,6 +27,8 @@ Soundhax (universal-otherappと組み合わせた場合) は、すべてのリ #### セクション I - 準備 +In this section, you will copy the files needed to trigger both Soundhax and universal-otherapp. + 1. 本体の電源を切ります。 1. パソコンにSDカードを入れます 1. SoundHaxの `.m4a` ファイルをSDカード直下にコピーします @@ -33,11 +41,16 @@ Soundhax (universal-otherappと組み合わせた場合) は、すべてのリ 1. 再度、SDカードを本体に挿入してください。 1. デバイスの電源を入れます - ![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} #### セクション II - SafeB9SInstallerを起動する +In this section, you will launch Soundhax through the Nintendo 3DS Sound app, which will use universal-otherapp to launch the boot9strap (custom firmware) installer. + 1. 再度、SDカードを本体に挿入してください。 1. デバイスの電源を入れます 1. ニンテンドー3DSサウンドを起動します @@ -58,6 +71,8 @@ Soundhax (universal-otherappと組み合わせた場合) は、すべてのリ #### セクション III - boot9strapをインストールする +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap 1. Once it is complete, press (A) to reboot your device 1. デバイスはLuma3DS設定メニューに再起動します diff --git a/_pages/ja_JP/installing-boot9strap-(usm).txt b/_pages/ja_JP/installing-boot9strap-(usm).txt index 8d9c7307dd..26d191ed13 100644 --- a/_pages/ja_JP/installing-boot9strap-(usm).txt +++ b/_pages/ja_JP/installing-boot9strap-(usm).txt @@ -4,15 +4,17 @@ title: "boot9strap(USM) の導入" {% include toc title="目次" %} -### 必ずお読みください +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

We can do this using an existing exploit, BannerBomb3.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

+
+{: .notice--info} -SAFE_MODE を導入するために、開発されたWiFiプロファイルを入れる必要があります。 - -既存のBannerBomb3を使用してこれを行うことができます。 - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -WiFiプロファイルを入れたら、SAFE_MODEを実行します。これは、WiFiプロファイルを有効にするために、すべての3DS本体に存在する回復機能です。 +### Compatibility Notes これらのガイドは、システムバージョン末尾にある「U、E、J、K」にあるように、米国、欧州、日本、韓国の端末で機能します。 @@ -29,6 +31,8 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will #### セクション I - 準備 +In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. + 1. 本体の電源が入っている場合、本体の電源を切ります 1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer 1. "ファイルを選択"から movable.sed ファイルをアップロードします。 @@ -41,47 +45,51 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will 1. `boot9strap.firm`と`boot9strap.firm.sha`を boot9strap `.zip` ファイルから解凍し、SD カードのboot9strapフォルダにコピーします。 1. SafeB9SInstaller `.zip` から`SafeB9SInstaller.bin`をSDカードのルートへコピーします 1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - + ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }}) - {: .notice--info} - + ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} + ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + ここでいう `` は先ほど [Seedminer](seedminer) で使用したものと同じです。 - + `` は ` ` の中の32文字の長いフォルダのことです。 + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card 1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### セクション II - BannerBomb3 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. + 1. 再度、SDカードを本体に挿入してください。 1. 本体の電源を入れます 1. 「本体設定」を開きます。 -1. `データ管理` -> `DSiWare データ管理` の順に移ります。 -1. SDカードをクリックします。 - + Your device should show a menu with some text +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Select "Inject haxx" +1. Press (A) to select "Inject haxx" + Your device will automatically power off #### セクション III - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + 本体が起動するまでボタンをそのまま押し続けて下さい + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. 「OK」を押して更新を承認します + アップデートはありません。 そういう仕組みになっています 1. 「承諾」を押して利用規約に同意します 1. The update will eventually fail, with the error code `003-1099`. これもそうなるように仕込まれています 1. 「インターネット設定を設定しますか?」と聞かれたら、「はい」を選択します。 -1. 次の画面で、`接続先1`→`設定変更`→`右のページ(右矢印)`→`Proxyの設定`→`詳細設定` の順に進みます - + This is a [visual representation](/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section IV - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -95,16 +103,17 @@ At this point, your console will boot to Luma3DS by default. #### Section V - Restoring WiFi Configuration Profiles +In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. 「本体設定」を開きます。 -1. `データ管理` -> `DSiWare データ管理` に移動します -1. SDカードをクリックします。 - + Your device should show a menu with some text -1. Select "Restore slots" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) +1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + Your device will automatically reboot 1. 本体の電源を切ります。 1. パソコンにSDカードを入れます 1. SDカードの`Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`へ移動します -1. Nintendo DSiWareフォルダから`F00D43D5.bin`を削除します +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. このファイルはもう必要ありません。 ___ diff --git a/_pages/ja_JP/seedminer.txt b/_pages/ja_JP/seedminer.txt index 7572d64cce..461da29dad 100644 --- a/_pages/ja_JP/seedminer.txt +++ b/_pages/ja_JP/seedminer.txt @@ -4,52 +4,54 @@ title: "Seedminer" {% include toc title="目次" %} -### 必読事項 +
+Technical Details (optional) +

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

+

For information on how Seedminer works, see this presentation.

+

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+
+{: .notice--info} -To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. +### Section I - Prep Work -For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). - -この方法には、必要な計算を強力なグラフィックボードで行う必要があります。 この方法であなたを支援するために、ボランティアがWebサイトを運営し支援しています。 - -### 手順 - -#### セクション I - 準備 +In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. 1. パソコンにSDカードを入れます 1. SDカードにある、`Nintendo 3DS` フォルダを開きます。 -1. 表示されている32文字のフォルダ名をコピーします。 - + まだそれ以上フォルダを展開しないでください - + If you see multiple 32 character long folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + + If you don't have a `Nintendo 3DS` folder, put your SD card into your 3DS and power it on so that the folder can be created +1. Copy the name of the 32-letter folder you see directly inside Nintendo 3DS + + This 32-letter name is system-specific and will be different for each console + + If you see multiple 32-letter folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + You can ignore the `private` folder if you have it - ![]({{ "/images/screenshots/id0-example.png" | absolute_url }}) + ![]({{ "/images/screenshots/seedminer/id0-example.png" | absolute_url }}) {: .notice--info} -1. コピーした32文字のフォルダ名を、後で分かるようにメモ帳などに貼り付けます。 - + このフォルダ名のことを一般に "ID0" と呼称します。 +1. Paste your 32 character long folder name into [a document](/images/screenshots/seedminer/text-document.png) you can reference later + + This folder is known as your "ID0". Take note of this as this guide will refer to it as such later 1. デバイスの電源を入れます + Your SD card does not need to be inserted at this point 1. Go to your Friend List (the [orange Face Icon]({{ "/images/friend-list-icon.png" | absolute_url }}) in the top row of your HOME Menu) + もしここでエラーが発生し、メニューから追い出された場合、新しいMiiを作成する必要があります。あるいはあなたの3DSは任天堂サーバーにアクセスできない状態です(Banされている、または接続自体の問題)。 1. 自分のMiiを探し、"フレンドコード"をトップ画面に表示します。 -#### セクション II - Seedminer +### Section II - Seedminer + +In this section, you will use the Bruteforce Movable website to retrieve your device's encryption key in the form of `movable.sed`. 1. Open [Bruteforce Movable](https://seedminer.hacks.guide/) on your computer - + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) + If the site isn't working, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field - + Do not attempt to enter the ID0 by hand. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section + + Do not attempt to enter the ID0 manually, as it is easy to make a mistake. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section 1. Select "Go" + If the site immediately goes to step 4, the website has already correctly processed your bruteforce request. You can download your `movable.sed` file and continue to the next section. You do not need to re-add the bot -1. Use the "Register Friend" button on your device to add the bot's friend code as given by the website +1. Use the ["Register Friend" button](/images/screenshots/seedminer/register-friend.png) on your device to add the bot's friend code as given by the website + If prompted, the name that you give to the friend does not matter 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once 1. Once the site processes your information, the site will continue to `Step 2: Bruteforce` automatically 1. Wait for the remainder of the process to complete - + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour + + This is usually fast (1-5 minutes) + During this process, the bot you added may not show up on your 3DS. As long as the website updates, this is not an issue + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site @@ -57,7 +59,7 @@ For information on how Seedminer works, see [this presentation](https://zoogie.g ___ -### Next Steps +### Next steps: Choose an exploit Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. diff --git a/_pages/ko_KR/bannerbomb3.txt b/_pages/ko_KR/bannerbomb3.txt index 306fdda54b..040f818a59 100644 --- a/_pages/ko_KR/bannerbomb3.txt +++ b/_pages/ko_KR/bannerbomb3.txt @@ -4,11 +4,15 @@ title: "BannerBomb3" {% include toc title="목차" %} -### 중요 +
+Technical Details (optional) +

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

For a more technical explanation, see here.

+
+{: .notice--info} -시스템 DSiWare를 덤프 하기 위해, DSiWare 데이터 관리 설정 창에 취약점을 악용합니다. - -이것은 시스템의 암호화 키 (movable.sed)를 이용해 DSiWare 백업을 만들어 DSi 인터넷 설정을 SD 카드 루트에 덤프할 수 있도록 만듭니다. +### Compatibility Notes 이 설명서는 미주, 유럽, 일본, 그리고 한국 지역 기기들 (시스템 버전 다음 글짜가 U, E, J, 아니면 K 인 경우) 와 호환됩니다. @@ -20,6 +24,9 @@ title: "BannerBomb3" * [Seedminer](seedminer)에서 받은 `movable.sed` 파일 #### 섹션 I - 준비 작업 + +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + 1. 컴퓨터에서 [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php)를 열어 주세요 1. "Choose File"를 선택하여 `movable.sed`를 업로드 해 주세요 1. "Build and Download"를 선택해 주세요 @@ -27,28 +34,31 @@ title: "BannerBomb3" 1. 기기의 전원이 켜져 있다면, 전원을 꺼 주세요 1. SD 카드를 컴퓨터에 삽입해 주세요 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + 이 ``는 [Seedminer](seedminer)에서 사용한 것과 같습니다 - + 이 ``은 `` 폴더 안에 존재하는 32 자리의 이름을 갖춘 폴더 입니다 + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. `F00D43D5.bin` 파일을 BannerBomb3 `.zip` 에서 `Nintendo DSiWare` 폴더로 복사해 주세요 +1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### 섹션 II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. + 1. SD 카드를 기기에 다시 삽입해 주세요 1. 기기를 시작해 주세요 1. 기기에서 본체 설정을 열어 주세요 -1. `데이터 관리` -> `DSiWare` 메뉴를 열어 주세요 -1. SD 카드 섹션을 열어 주세요 +1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + 기기가 마젠타 (분홍/보라)색이 번쩍 하다가 몇 초 후 크래시 할 겁니다. 이것은 재대로 됐다는 뜻 입니다 1. 기기를 종료해 주세요 1. SD 카드를 컴퓨터에 삽입해 주세요 -1. SD 카드 루트에 `42383841.bin`이 존재할 겁니다. 이것이 나중에 사용할 DSiWare 백업 파일 입니다 -1. SD 카드의 `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` 폴더로 이동해 주세요 - + 이 ``는 [Seedminer](seedminer)에서 사용한 것과 같습니다 -1. `F00D43D5.bin` 파일을 Nintendo DSiWare 폴더와 PC에서 지워 주세요. 더 이상 이 파일은 필요가 없습니다 +1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page +1. SD 카드의 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 폴더로 이동해 주세요 +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. 더 이상 이 파일은 필요가 없습니다 + [boot9strap 설치 (Fredtool)](installing-boot9strap-(fredtool))로 계속 {: .notice--primary} diff --git a/_pages/ko_KR/finalizing-setup.txt b/_pages/ko_KR/finalizing-setup.txt index 8745a4a40e..c73622d62c 100644 --- a/_pages/ko_KR/finalizing-setup.txt +++ b/_pages/ko_KR/finalizing-setup.txt @@ -20,6 +20,8 @@ title: "마무리 단계" 이 페이지에서 위 앱들 중의 대부분을 사용하기 때문에, 다운로드를 스킵하는 것은 권장하지 않습니다. 이 페이지의 끝에서, 불필요한 설치 파일들을 지움으로써 당신의 SD 카드를 정리할 것입니다. {: .notice--warning} +### Compatibility Notes + 만약 이 가이드를 따르기 전의 **New 3DS** 가 펌웨어 버전 2.1.0이었다면, 진행하기 전에 [NAND 백업을 복원](godmode9-usage#restoring-a-nand-backup)해야 합니다. {: .notice--warning} @@ -39,6 +41,8 @@ title: "마무리 단계" #### 섹션 I - 준비 작업 +In this section, you will copy the files necessary to follow the rest of the instructions on this page. + 1. 기기를 종료해 주세요 1. SD 카드를 컴퓨터에 삽입해 주세요 1. SD 카드의 루트에 `cias` 폴더가 없을 경우 폴더를 만들어 주세요 @@ -52,15 +56,20 @@ title: "마무리 단계" 1. SD 카드를 기기에 다시 삽입해 주세요 1. 기기를 시작해 주세요 - ![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) - {: .notice--info} - ![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) - {: .notice--info} +The screenshots below indicate the minimum SD card layout that is required to follow this page. 이전에 따른 방법에 따라, SD 카드에 추가 파일과 폴더가 있을 수 있습니다. + +![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) +{: .notice--info} + -이 스크린샷들은 이 가이드를 따랐을 때의 최소한의 SD 카드 레이아웃을 표시합니다. 이전에 따른 방법에 따라, SD 카드에 추가 파일과 폴더가 있을 수 있습니다. #### 섹션 II - 시스템 업데이트 +In this section, you will update your system to the latest version, which is safe to do with custom firmware. + 1. 본체 설정의 "기타 설정"에서 가장 오른쪽에 있는 "본체 업데이트"를 선택해 기기를 업데이트해 주세요. + boot9strap과 Luma을 이용한 (지금 가지고 계신 버전) 업데이트는 안전합니다 + 이 작업에서 "이 본체는 이미 최신 버전으로 업데이트되어 있습니다" 라는 메세지가 표시 될 수 가 있습니다. 이미 최신 버전이였다면, 이것은 문제가 아니며, 다음 섹션으로 넘어가 주시기 바랍니다 @@ -69,6 +78,8 @@ title: "마무리 단계" #### 섹션 III - Homebrew Launcher +In this section, you will temporarily replace Download Play with Homebrew Launcher (which we need to launch FBI). Download Play will automatically go back to normal once you reboot your device. + 1. 다운로드 플레이 앱을 실행해 주세요 (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. `Nintendo 3DS` 하고 `Nintendo DS` 버튼이 표시 될 때까지 기다려 주세요 1. (L 어깨) + (십자 Down) + (Select) 을 동시에 눌러서 Rosalina 메뉴를 실행해 주세요 @@ -83,6 +94,8 @@ title: "마무리 단계" #### 섹션 IV - RTC 및 DSP 설정 +In this section, you will sync your 3DS internal clock with the actual time and dump the sound firmware (which is necesssary for some homebrew software to use sound properly). + 1. (L 어깨) + (십자 Down) + (Select) 을 동시에 눌러서 Rosalina 메뉴를 실행해 주세요 1. "Miscellaneous options"을 선택해 주세요 1. "Dump DSP firmware"를 선택해 주세요 @@ -94,6 +107,8 @@ title: "마무리 단계" #### 섹션 V - CIA 설치 +In this section, you will install several useful homebrew applications to HOME Menu. + 1. 홈브류 목록에서 FBI를 실행해 주세요 1. `SD` -> `cias`로 이동해 주세요 1. "\"를 선택해 주세요 @@ -102,6 +117,8 @@ title: "마무리 단계" #### 섹션 VI - CTRNAND Luma3DS +In this section, you will use a script to copy some of Luma3DS's files to internal memory so that they can be accessed, even without an SD card inserted. + 1. 기기를 종료해 주세요 1. (Start)를 길게 누르고, 이 상태에서 전원을 켜 주세요. GodMode9이 실행 될 겁니다 + 만약 GodMode9이 실행되지 않을 경우, `GodMode9.firm`이 `/luma/payloads/` 에 존재를 확인하고, `payloads`가 정확히 쓰여 있음을 확인해 주시기 바랍니다 @@ -118,6 +135,8 @@ title: "마무리 단계" #### 섹션 VII - SD 카드 정리하기 +In this section, you will use a script to remove some unnecessary files from your SD card. + 1. "Cleanup SD Card"를 선택해 주세요 1. 프롬프트가 뜨면, (A) 를 눌러서 진행해 주세요 1. (A)를 눌러 진행해 주세요 @@ -125,6 +144,8 @@ title: "마무리 단계" #### 섹션 VIII - 중요 파일 백업 +In this section, you will make backups of flies that can be used to recover from softwaer bricks or to recover data. + 1. "Backup Options"를 선택해 주세요 1. "SysNAND Backup"을 선택해 주세요 1. (A)를 눌러 확인해 주세요 @@ -159,7 +180,7 @@ ___ 안녕하세요! 저희는 이 가이드를 따른 경험에 데한 설문조사를 진행하고 있습니다. 원하신다면, 이 [설문조사](https://forms.gle/vZNoc4QLCz5MEXCK7) (영어로만 가능)을 확인해 주세요. 감사합니다! {: .notice--info} -#### 정보와 메모 +### Information and Notes {% capture notice-6 %} 알아야 할 몇몇 버튼 콤보들이 있습니다: diff --git a/_pages/ko_KR/homebrew-launcher-(pichaxx).txt b/_pages/ko_KR/homebrew-launcher-(pichaxx).txt index e4d9727b90..de9130bcc6 100644 --- a/_pages/ko_KR/homebrew-launcher-(pichaxx).txt +++ b/_pages/ko_KR/homebrew-launcher-(pichaxx).txt @@ -4,9 +4,17 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="목차" %} -### 중요 +
+Technical Details (optional) +This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. +
+{: .notice--info} -더 깊은 모딩을 위한 Seedminer의 이 사용법은, 포켓몬 피크로스의 커스텀 세이브 파일을 `movable.sed` 파일을 사용해서 작성해, unSAFE_MODE과 같이 사용해 SafeB9SInstaller를 실행하는 방식입니다. +### Compatibility Notes + +These instructions work on USA, Europe, and Japan consoles as indicated by the letters U, E, or J after the system version. + +You will need a Nintendo Network ID to download Pokémon Picross. 이 과정은, 만약 이미 있다면, Pokémon Picross 저장 데이터를 덮어쓸 것 입니다. 이 저장 데이터를 보존하고 싶으시다면 `00000001.sav` 파일을 백업 해 주시는 것을 권장합니다. {: .notice--warning} @@ -24,15 +32,8 @@ title: "Homebrew Launcher (PicHaxx)" #### 섹션 I - 준비 작업 -1. 기기를 시작해 주세요 -1. 닌텐도 eShop을 열어 주세요 -1. 검색 아이콘 (작은 돋보기 마크)을 눌러 주세요 -1. `피크로스`를 검색하세요 -1. 포켓몬 피크로스의 페이지를 열어 주세요 -1. 포켓몬 피크로스를 다운로드하세요 - + 닌텐도 3DS 카메라를 사용해서 [이 QR 코드](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=ESHOP://50010000037815&margin=0&qzone=1&size=400x400&ecc=L)를 스캔해서 eShop 내 게임 페이지로 이동할 수 있습니다 - + 포켓몬 피크로스를 설치하려면 SD 카드가 들어가 있어야 합니다 -1. 기기를 종료해 주세요 +In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. + 1. SD 카드를 컴퓨터에 삽입해 주세요 1. Luma3DS `.zip`안에 있는 `boot.firm`과 `boot.3dsx`를 SD 카드의 루트에 복사해 주세요 + SD 카드의 루트는 SD 카드를 열 때 보이는 디렉토리이고, Nintendo 3DS 폴더가 보이지만 그 안에 않 들어가 있는 상태의 폴더 입니다 @@ -40,8 +41,16 @@ title: "Homebrew Launcher (PicHaxx)" 1. unSAFE_MODE `.zip`안에 있는 `slotTool` 폴더를 SD 카드의 `3ds` 폴더에 복사해 주세요 1. Copy the otherapp payload for your region/version from the unSAFE_MODE `.zip`'s `otherapps_with_CfgS` folder to the root of your SD card and rename it to `otherapp.bin` +![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }}) +{: .notice--info} + + #### 섹션 II - PicHaxx +In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device. 1. [PicHaxx 인젝터 웹사이트](https://3ds.nhnarwhal.com/3dstools/pichaxx.php)를 컴퓨터에서 열어 주세요 1. `movable.sed` 파일을 선택해 주세요 1. "Build and Download"를 선택해 주세요 diff --git a/_pages/ko_KR/installing-boot9strap-(fredtool).txt b/_pages/ko_KR/installing-boot9strap-(fredtool).txt index 2844eb469d..5d071dfdf4 100644 --- a/_pages/ko_KR/installing-boot9strap-(fredtool).txt +++ b/_pages/ko_KR/installing-boot9strap-(fredtool).txt @@ -4,15 +4,16 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="목차" %} -### 중요 - -이 방식은 Seedminer에서 얻은 `movable.sed` 파일을 사용해 어느 DSiWare 타이틀을 해독해 익스플로잇 가능한 DSiWare 타이틀을 DS 소프트웨어용 인터넷 설정에 주입합니다. 이 과정은 DSiWare 백업이 필요합니다. (예: BannerBomb3에서 받은 파일) - -이 작업은 [이곳](https://www.3dbrew.org/wiki/3DS_System_Flaws)에 자세히 설명되어 있는 "FIRM partitions known-plaintext" 익스플로잇을 구현한 작업입니다. +
+Technical Details (optional) +

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+
+{: .notice--info} ### 준비물 -* A DSiWare Backup (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) +* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * [Seedminer](seedminer)에서 받은 `movable.sed` 파일 * 최신 버전의 [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest`) (`Frogminer_save.zip`) * 최신 버전의 [b9sTool](https://github.com/zoogie/b9sTool/releases/latest`) (`boot.nds`) @@ -20,6 +21,8 @@ title: "Installing boot9strap (Fredtool)" #### 섹션 I - CFW 확인 +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + 1. 기기를 종료해 주세요 1. (Select) 버튼을 길게 눌러 주세요 1. (Select) 버튼을 계속 눌러 있는 상태에서 기기의 전원을 켜 주세요 @@ -30,17 +33,7 @@ title: "Installing boot9strap (Fredtool)" #### 섹션 II - 준비 작업 -1. 기기를 종료해 주세요 -1. SD 카드를 컴퓨터에 삽입해 주세요 -1. Luma3DS `.zip`안에 있는 `boot.firm`과 `boot.3dsx`를 SD 카드의 루트에 복사해 주세요 - + SD 카드의 루트는 SD 카드를 열 때 보이는 디렉토리이고, Nintendo 3DS 폴더가 보이지만 그 안에 않 들어가 있는 상태의 폴더 입니다 -1. 'boot.nds' (B9STool) 파일을 SD 카드의 루트에 복사해 주세요 -1. SD 카드의 루트로 Frogminer_save `.zip`안에 압축이 되있는 `private` 폴더를 복사해 주세요 - - ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} - -##### 섹션 III - Fredtool +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. "Username"에 영어/숫자를 사용한 이름을 아무거나 입력해 주세요 (스페이스나 특수 문자는 사용 불가) @@ -53,19 +46,31 @@ title: "Installing boot9strap (Fredtool)" 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link +1. SD 카드를 컴퓨터에 삽입해 주세요 1. SD 카드의 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 폴더로 이동해 주세요 - + 이 ``는 [Seedminer](seedminer)에서 사용한 것과 같습니다 - + 이 ``은 `` 폴더 안에 존재하는 32 자리의 이름을 갖춘 폴더 입니다 - + `Nintendo DSiWare` 폴더가 존재하지 않다면, `` 폴더 안에 생성해 주세요 + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` 1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder -1. SD 카드를 기기에 다시 삽입해 주세요 + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Luma3DS `.zip`안에 있는 `boot.firm`과 `boot.3dsx`를 SD 카드의 루트에 복사해 주세요 + + SD 카드의 루트는 SD 카드를 열 때 보이는 디렉토리이고, Nintendo 3DS 폴더가 보이지만 그 안에 않 들어가 있는 상태의 폴더 입니다 +1. 'boot.nds' (B9STool) 파일을 SD 카드의 루트에 복사해 주세요 +1. SD 카드의 루트로 Frogminer_save `.zip`안에 압축이 되있는 `private` 폴더를 복사해 주세요 + + ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} + +#### Section III - Overwriting DS Connection Settings + +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + 1. 기기를 시작해 주세요 1. 기기에서 본체 설정을 열어 주세요 -1. `데이터 관리` -> `DSiWare` 메뉴를 열어 주세요 -1. "SD 카드" 섹션에서 "Haxxxxxxxxx!" 타이틀을 선택해 주세요 +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title 1. "Copy"를 선택한 후 "OK"를 선택해 주세요 1. 본체 설정의 메인 메뉴로 돌아가 주세요 -1. `인터넷 설정` -> `DS 소프트웨어용 설정`으로 들어가 "OK"를 선택해 주세요 +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. 만약 익스플로잇이 성공적이었다면, 기기는 JPN 버전의 Flipnote Studio를 실행할 겁니다 #### 섹션 IV - Flipnote 익스플로잇 @@ -73,6 +78,8 @@ title: "Installing boot9strap (Fredtool)" 만약 이 섹션의 비주얼 가이드를 선호한다면, [여기서] (https://zoogie.github.io/web/flipnote_directions/) 그 중 하나를 보실 수가 있습니다. {: .notice--info} +In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer. + 1. 메인 메뉴로 갈 때까지의 초기 설정을 완료하세요 + 만약 설정 중 선택이 표시될 시는 왼쪽을 선택해 주세요 1. 터치 스크린을 사용해서, 오른쪽의 큰 버튼을 선택하고, 그 후 SD 카드 아이콘이 붙은 버튼을 선택해 주세요 @@ -85,7 +92,7 @@ title: "Installing boot9strap (Fredtool)" 1. "A"가 들어가 있는 네 번째 버튼을 눌러 주세요 1. 익스플로잇이 성공적이었다면 b9sTool을 실행했을 것입니다 1. 십자 패드를 사용해서, "Install boot9strap"으로 이동해 주세요. - + 이 스텝을 놓쳤다면, 시스템은 boot9strap을 설치하는 대신 HOME 메뉴로 나갈 것이고, 다시 DS 소프트웨어용 설정을 열어서 섹션 III의 처음부터 시작해야 할 것입니다 + + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III 1. (A) 버튼을 누른 후, START와 SELECT를 동시에 눌러 작업을 실행해 주세요 1. 완료되고 아래 화면에 "done."이라고 표시되면, b9sTool를 종료하고 기기의 전원을 꺼 주세요 + 전원버튼을 계속 눌러 강제종료를 해야 할 수도 있습니다 @@ -94,6 +101,8 @@ title: "Installing boot9strap (Fredtool)" #### 섹션 V - Luma3DS 검증 +Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. + 1. 기기를 종료해 주세요 1. SD 카드를 컴퓨터에 삽입해 주세요 1. Verify that a `luma` folder exists and that `config.ini` is inside of it @@ -106,13 +115,15 @@ title: "Installing boot9strap (Fredtool)" #### 섹션 VI - DS 소프트웨어용 설정 복구 -1. Copy the `42383841.bin` file from the `clean/` folder of the downloaded DSiWare archive (`output_(name).zip`) to the `Nintendo 3DS///Nintendo DSiWare/` folder on your SD card - + 이미 존재하는 `43383841.bin` 파일을 덮어씌워 주세요 +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. + +1. SD 카드의 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 폴더로 이동해 주세요 +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one 1. SD 카드를 기기에 다시 삽입해 주세요 1. 기기를 시작해 주세요 1. 기기에서 본체 설정을 열어 주세요 -1. `데이터 관리` -> `DSiWare` 메뉴를 열어 주세요 -1. "SD 카드" 섹션에서 "Nintendo DSi™" 타이틀을 선택해 주세요 +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title 1. "Copy"를 선택한 후 "OK"를 선택해 주세요 ___ diff --git a/_pages/ko_KR/installing-boot9strap-(hbl-usm).txt b/_pages/ko_KR/installing-boot9strap-(hbl-usm).txt index cac763856c..d5e6b11d35 100644 --- a/_pages/ko_KR/installing-boot9strap-(hbl-usm).txt +++ b/_pages/ko_KR/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,16 @@ title: "boot9strap 설치 (HBL-USM)" {% include toc title="목차" %} -### 중요 +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

As we already have Homebrew access, we can use slotTool to do this.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+
+{: .notice--info} -SAFE_MODE 펌웨어를 해킹하기 위해, 익스플로잇이 되어있는 Wi-Fi 프로필을 설치해야 합니다. - -As we already have Homebrew access, we can use slotTool to do this. - -그 후, 시스템 복구 모드, SAFE_MODE를 사용해 인터넷 설정을 활용화 시킵니다. +### Compatibility Notes If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--danger} @@ -24,7 +27,10 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint #### 섹션 I - 준비 작업 +In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. + 1. Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide + + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. 홈브류 목록에서 slotTool를 실행해 주세요 + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section 1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option @@ -36,22 +42,31 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint 1. `unSAFE_MODE.zip` 안에 있는 `usm.bin`을 SD 카드의 루트에 복사해 주세요 1. SD 카드를 기기에 다시 삽입해 주세요 +![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} + #### 섹션 II - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. 전원이 꺼져 있는 상태에서 (L 어깨) + (R 어깨) + (십자 Up) + (A) 를 길게 눌르고, 누르는 상태에서 전원을 켜 주세요 - + 안전 모드로 부팅 될 때 까지 버튼들을 눌러 주세요 + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. "OK"를 선택해서 업데이트를 확인해 주세요 + 실제로 업데이트를 하는 것은 아닙니다. 이것은 익스플로잇의 일부입니다 1. "동의함"를 눌러서 이용 약관에 동의해 주세요 1. 이 업데이트는 에러 코드 `003-1099` 와 같이 실패를 할 겁니다. 이것은 의도적 행동입니다 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. 이 화면에서, `접솔 경로 1` -> `설정 변경` -> `다음 페이지 (오른쪽 화살표)` -> `Proxy 설정` -> `세부 설정` 으로 이동해 주세요 - + [이 (영어) 사진](https://uwuu.ca/images/safemode_highlighted.png)처럼 하시면 됩니다 +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. 익스플로잇이 성공적이었다면 SafeB9SInstaller로 부팅되었을 것입니다 #### 섹션 III - boot9strap 설치하기 +In this section, you will install custom firmware onto your device. + 1. 메시지가 나타나면, boot9strap을 설치하기 위하여 화면에 주어진 키 조합을 입력해 주세요 + 만약 위 화면에 반응이 없다면, 기기의 전원을 꺼 주시고 섹션 III를 다시 시도해 주세요 1. 작업이 완료되면, (A) 를 눌려 기기를 재부팅해 주세요 @@ -65,6 +80,8 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint #### 섹션 IV - Wi-Fi 프로필 복구 +In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. 다운로드 플레이 앱을 실행해 주세요 1. 두 가지의 버튼이 화면에 뜰 때까지 기다려 주세요 + Do not press either of the buttons diff --git a/_pages/ko_KR/installing-boot9strap-(soundhax).txt b/_pages/ko_KR/installing-boot9strap-(soundhax).txt index edac315969..d2069e24b6 100644 --- a/_pages/ko_KR/installing-boot9strap-(soundhax).txt +++ b/_pages/ko_KR/installing-boot9strap-(soundhax).txt @@ -4,7 +4,13 @@ title: "boot9strap 설치 (Soundhax)" {% include toc title="목차" %} -### 중요 +
+Technical Details (optional) +

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+
+{: .notice--info} + +### Compatibility Notes Soundhax는 (universal-otherapp과 사용할 때) 모든 지역의 1.0.0 이상 11.3.0이하에 사용 가능합니다. @@ -21,6 +27,8 @@ Soundhax는 (universal-otherapp과 사용할 때) 모든 지역의 1.0.0 이상 #### 섹션 I - 준비 작업 +In this section, you will copy the files needed to trigger both Soundhax and universal-otherapp. + 1. 기기를 종료해 주세요 1. SD 카드를 컴퓨터에 삽입해 주세요 1. Soundhax `.m4a`를 SD 카드의 루트에 복사해 주세요 @@ -33,11 +41,16 @@ Soundhax는 (universal-otherapp과 사용할 때) 모든 지역의 1.0.0 이상 1. SD 카드를 기기에 다시 삽입해 주세요 1. 기기를 시작해 주세요 - ![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} #### 섹션 II - SafeB9SInstaller 실행 +In this section, you will launch Soundhax through the Nintendo 3DS Sound app, which will use universal-otherapp to launch the boot9strap (custom firmware) installer. + 1. SD 카드를 기기에 다시 삽입해 주세요 1. 기기를 시작해 주세요 1. 닌텐도 3DS 사운드 앱을 실행해 주세요 @@ -58,6 +71,8 @@ Soundhax는 (universal-otherapp과 사용할 때) 모든 지역의 1.0.0 이상 #### 섹션 III - boot9strap 설치하기 +In this section, you will install custom firmware onto your device. + 1. 메시지가 나타나면, boot9strap을 설치하기 위하여 화면에 주어진 키 조합을 입력해 주세요 1. 작업이 완료되면, (A) 를 눌려 기기를 재부팅해 주세요 1. 기기는 Luma3DS 구성 메뉴로 부팅되었을 겁니다 diff --git a/_pages/ko_KR/installing-boot9strap-(usm).txt b/_pages/ko_KR/installing-boot9strap-(usm).txt index d3af503d59..64ef10a862 100644 --- a/_pages/ko_KR/installing-boot9strap-(usm).txt +++ b/_pages/ko_KR/installing-boot9strap-(usm).txt @@ -4,15 +4,17 @@ title: "boot9strap 설치 (USM)" {% include toc title="목차" %} -### 중요 +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

We can do this using an existing exploit, BannerBomb3.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

+
+{: .notice--info} -SAFE_MODE 펌웨어를 해킹하기 위해, 익스플로잇이 되어있는 Wi-Fi 프로필을 설치해야 합니다. - -이미 존재하는 BannerBomb3 익스플로잇을 사용해 이걸 할 수 있습니다. - -이것은 시스템의 암호화 키 (movable.sed)를 이용해 DSiWare 백업을 만들고, 이걸 사용해 인터넷 설정에 익스플로잇을 설치할 수 있도록 만듭니다. - -그 후, 시스템 복구 모드, SAFE_MODE를 사용해 인터넷 설정을 활용화 시킵니다. +### Compatibility Notes 이 설명서는 미주, 유럽, 일본, 그리고 한국 지역 기기들 (시스템 버전 다음 글짜가 U, E, J, 아니면 K 인 경우) 와 호환됩니다. @@ -29,6 +31,8 @@ SAFE_MODE 펌웨어를 해킹하기 위해, 익스플로잇이 되어있는 Wi-F #### 섹션 I - 준비 작업 +In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. + 1. 기기의 전원이 켜져 있다면, 전원을 꺼 주세요 1. 컴퓨터에서 [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) 를 열어 주세요 1. "Choose File"를 선택하여 `movable.sed`를 업로드 해 주세요 @@ -41,47 +45,51 @@ SAFE_MODE 펌웨어를 해킹하기 위해, 익스플로잇이 되어있는 Wi-F 1. SD 카드에 있는 `/boot9strap/` 폴더에 boot9strap `.zip` 파일 안에 압축되있는 `boot9strap.firm`과 `boot9strap.firm.sha`을 복사해 주세요 1. SafeB9SInstaller `.zip`의 `SafeB9SInstaller.bin`을 SD 카드의 루트로 복사해 주세요 1. `unSAFE_MODE.zip` 안에 있는 `usm.bin`을 SD 카드의 루트에 복사해 주세요 - + ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }}) - {: .notice--info} - + ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} + ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. SD 카드의 `Nintendo 3DS` -> `` -> `` 폴더로 이동해 주세요 - + 이 ``는 [Seedminer](seedminer)에서 사용한 것과 같습니다 - + 이 ``은 `` 폴더 안에 존재하는 32 자리의 이름을 갖춘 폴더 입니다 + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. `` 폴더에 `Nintendo DSiWare` 폴더를 생성해 주세요 + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card 1. `F00D43D5.bin` 파일을 `unSAFE_MODE.zip` 에서 `Nintendo DSiWare` 폴더로 복사해 주세요 - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### 섹션 II - BannerBomb3 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. + 1. SD 카드를 기기에 다시 삽입해 주세요 1. 기기를 시작해 주세요 1. 기기에서 본체 설정을 열어 주세요 -1. `데이터 관리` -> `DSiWare` 메뉴를 열어 주세요 -1. SD 카드 섹션을 열어 주세요 - + 화면에 메뉴가 표시될 겁니다 +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. "Inject haxx"를 선택해 주세요 +1. Press (A) to select "Inject haxx" + 기기가 자동으로 종료될 겁니다 #### 섹션 III - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. 전원이 꺼져 있는 상태에서 (L 어깨) + (R 어깨) + (십자 Up) + (A) 를 길게 눌르고, 누르는 상태에서 전원을 켜 주세요 - + 안전 모드로 부팅 될 때 까지 버튼들을 눌러 주세요 + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). 이 방법에 도움이 필요하다면, [Discord의 Nintendo Homebrew](https://discord.gg/MWxPgEp)에서 영어로 도움을 요청해 주세요. 1. "OK"를 선택해서 업데이트를 확인해 주세요 + 실제로 업데이트를 하는 것은 아닙니다. 이것은 익스플로잇의 일부입니다 1. "동의함"를 눌러서 이용 약관에 동의해 주세요 1. 이 업데이트는 에러 코드 `003-1099` 와 같이 실패를 할 겁니다. 이것은 의도적 행동입니다 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. 이 화면에서, `접솔 경로 1` -> `설정 변경` -> `다음 페이지 (오른쪽 화살표)` -> `Proxy 설정` -> `세부 설정` 으로 이동해 주세요 - + [이 (영어) 사진](https://uwuu.ca/images/safemode_highlighted.png)처럼 하시면 됩니다 +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. 익스플로잇이 성공적이었다면 SafeB9SInstaller로 부팅되었을 것입니다 #### 섹션 IV - boot9strap 설치 +In this section, you will install custom firmware onto your device. + 1. 메시지가 나타나면, boot9strap을 설치하기 위하여 화면에 주어진 키 조합을 입력해 주세요 + 만약 위 화면에 반응이 없다면, 기기의 전원을 꺼 주시고 섹션 III를 다시 시도해 주세요 1. 작업이 완료되면, (A) 를 눌려 기기를 재부팅해 주세요 @@ -95,16 +103,17 @@ SAFE_MODE 펌웨어를 해킹하기 위해, 익스플로잇이 되어있는 Wi-F #### 섹션 V - Wi-Fi 프로필 복구 +In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. 기기에서 본체 설정을 열어 주세요 -1. `데이터 관리` -> `DSiWare` 메뉴를 열어 주세요 -1. SD 카드 섹션을 열어 주세요 - + 화면에 메뉴가 표시될 겁니다 -1. "Restore slots"를 선택해 주세요 +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) +1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + 기기가 자동으로 재부팅될 겁니다 1. 기기를 종료해 주세요 1. SD 카드를 컴퓨터에 삽입해 주세요 1. SD 카드의 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 폴더로 이동해 주세요 -1. `Nintendo DSiWare` 폴더 내 `F00D43D5.bin` 파일을 삭제해 주세요 +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. 더 이상 이 파일은 필요가 없습니다 ___ diff --git a/_pages/ko_KR/seedminer.txt b/_pages/ko_KR/seedminer.txt index b31a693855..3ca925b468 100644 --- a/_pages/ko_KR/seedminer.txt +++ b/_pages/ko_KR/seedminer.txt @@ -4,52 +4,54 @@ title: "Seedminer" {% include toc title="목차" %} -### 중요 +
+Technical Details (optional) +

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

+

For information on how Seedminer works, see this presentation.

+

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+
+{: .notice--info} -boot9Strap을 설치하려면 우선 각 기기의 고유 암호화 키를 알아내야합니다. 그러기 위해서 이 가이드에서는 Seedminer을 사용해 그 암호화 키 (movable.sed) 를 계산해낼 것입니다. +### Section I - Prep Work -Seedminer이 정확히 어떻게 작동하는지 더 배우고싶다면 [이 프레젠테이션](https://zoogie.github.io/web/34⅕c3) 을 참고할 수 있습니다. - -이 방법은 원래 혼자 할 경우 강력한 계산력을 가진 그래픽카드를 사용해야 합니다. 이 가이드에서는 다른 사람들이 기부하는 계산력을 제공하는 웹사이트를 사용할 것입니다. - -### 진행 방법 - -#### 섹션 I - 준비 작업 +In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. 1. SD 카드를 컴퓨터에 삽입해 주세요 1. SD 카드의 `Nintendo 3DS` 폴더를 열어 주세요 -1. `Nintendo 3DS` 폴더 내 32글자의 폴더 이름을 복사해 주세요 - + 다른 폴더 안에 들어가지 마세요 - + 만약 32-자리 폴더가 여러 개 보인다면 [이 설명서](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) 를 따르세요. + + If you don't have a `Nintendo 3DS` folder, put your SD card into your 3DS and power it on so that the folder can be created +1. Copy the name of the 32-letter folder you see directly inside Nintendo 3DS + + This 32-letter name is system-specific and will be different for each console + + If you see multiple 32-letter folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + `private` 이라는 폴더가 있다면 무시하세요. - ![]({{ "/images/screenshots/id0-example.png" | absolute_url }}) + ![]({{ "/images/screenshots/seedminer/id0-example.png" | absolute_url }}) {: .notice--info} -1. 32글자 폴더 이름을 문서 어딘가에 저장해 주세요 (나중에 사용하도록) - + 이 이름을 "ID0"라고도 부릅니다 +1. Paste your 32 character long folder name into [a document](/images/screenshots/seedminer/text-document.png) you can reference later + + This folder is known as your "ID0". Take note of this as this guide will refer to it as such later 1. 기기를 시작해 주세요 + SD 카드는 아직 삽입할 필요는 없습니다 1. 친구 목록 (홈 메뉴 맨 위에 있는 [노란 얼굴 아이콘]({{ "/images/friend-list-icon.png" | absolute_url }})) 을 눌러 주세요 + 만일 오류가 발생하고 메뉴 밖으로 튕겨져 나갔더라면, 기기가 닌텐도의 서버에 연결하지 못했기 때문입니다.(기기 밴 또는 연결 문제로 인하여) 1. 본인에 Mii 프로필로 이동하고, 위 화면에 "친구 코드"를 확인해 주세요 -#### 섹션 II - Seedminer +### Section II - Seedminer + +In this section, you will use the Bruteforce Movable website to retrieve your device's encryption key in the form of `movable.sed`. 1. 컴퓨터에서 [Bruteforce Movable](https://seedminer.hacks.guide/)를 열어 주세요 - + 이 웹사이트는 자원봉사자들의 계산력을 이용해 자동으로 `movable_part1.sed` 를 찾아내서 해당 기기의 암호화된 DSiWare를 뚫습니다 + 만약 이 사이트가 안된다면, [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp)에서 영어로 물어보세요. "Bruteforce Movable is not working. Could someone help me?"정도 질문이 적당할 것 입니다 1. 기기의 친구 코드 (스페이스 및 대시 없이) 를 "Your friend code" 입력란에 입력해 주세요 1. 이전 단계들 중에서 찾았던 32글자짜리 폴더의 이름을 "Your ID0" 칸에 입력해 주세요 - + 그 ID0를 손으로 입력하지 말아 주세요. 그 ID0가 확실하게 정확히 들어갔다고 확신할수있도록 그 ID0를 그대로 복사 붙여넣기 해 주세요 + + Do not attempt to enter the ID0 manually, as it is easy to make a mistake. 그 ID0가 확실하게 정확히 들어갔다고 확신할수있도록 그 ID0를 그대로 복사 붙여넣기 해 주세요 1. "Go"를 선택해 주세요 + 만약 사이트가 그대로 4단계로 진행했다면, 이미 사이트가 요청을 처리 했다는 의미 입니다. `movable.sed` 파일을 다운로드 하고 다음 섹션으로 진행하시면 됩니다. 봇을 추가 할 필요는 없습니다 -1. Use the "Register Friend" button on your device to add the bot's friend code as given by the website +1. Use the ["Register Friend" button](/images/screenshots/seedminer/register-friend.png) on your device to add the bot's friend code as given by the website + If prompted, the name that you give to the friend does not matter 1. 사이트가 업데이트 할 때까지 기다려 주세요 + 만약 업데이트가 않되면, 몇 분 정도 기다린 후 페이지를 새로 고쳐 주세요 1. 사이트가 정보를 수집한 후, 자동으로 `Step 2: Bruteforce`로 진행할 것 입니다 1. 나머지 과정이 완료될 때까지 기다려 주세요 - + 이 작업은 보통 1-5분 정도 걸리는데, 상황에 따라 30분 걸릴 수도 있습니다 + + This is usually fast (1-5 minutes) + 이 과정을 하는 동안 봇이 기기에 표시가 안 될수도 있습니다. 웹사이트가 계속 업데이트 하는 경우, 이것은 문제가 아닙니다 + 만약 30분이 지나서도 완료가 안된다면, [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp)에서 영어로 물어보세요. "Bruteforce Movable is not working. Could someone help me?"정도 질문이 적당할 것 입니다 1. 과정이 끝나면, `movable.sed` 파일을 다운로드 해 주세요 @@ -57,7 +59,7 @@ Seedminer이 정확히 어떻게 작동하는지 더 배우고싶다면 [이 프 ___ -### 다음 단계 +### Next steps: Choose an exploit 기기의 암호화 키 (`movable.sed`)를 구한 후, 이것을 다른 익스플로잇하고 함깨 사용해 커스텀 펌웨어를 설치할 것 입니다. diff --git a/_pages/ms_MY/bannerbomb3.txt b/_pages/ms_MY/bannerbomb3.txt index e5cd15deb6..ca32bd1e1a 100644 --- a/_pages/ms_MY/bannerbomb3.txt +++ b/_pages/ms_MY/bannerbomb3.txt @@ -4,11 +4,15 @@ title: "BannerBomb3" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

For a more technical explanation, see here.

+
+{: .notice--info} -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -20,6 +24,9 @@ If you have a Taiwanese console (indicated by a T after the system version), fol * Your `movable.sed` file from completing [Seedminer](seedminer) #### Section I - Prep Work + +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + 1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer 1. Upload your movable.sed using the "Choose File" option 1. Click "Build and Download" @@ -27,28 +34,31 @@ If you have a Taiwanese console (indicated by a T after the system version), fol 1. If your console is powered on, power off your console 1. Pasang kad SD anda ke dalam komputer 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from the BannerBomb3 `.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section +1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked 1. Power off your device 1. Pasang kad SD anda ke dalam komputer -1. You should now have `42383841.bin` in SD root. This is the DSiWare backup you will use later in the guide -1. Navigate to `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card - + This `` will be the same one that you used in [Seedminer](seedminer) -1. Delete `F00D43D5.bin` from the Nintendo DSiWare folder and from your computer. This file will not be needed anymore +1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore + Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} diff --git a/_pages/ms_MY/finalizing-setup.txt b/_pages/ms_MY/finalizing-setup.txt index 1ab0a4b392..a490663630 100644 --- a/_pages/ms_MY/finalizing-setup.txt +++ b/_pages/ms_MY/finalizing-setup.txt @@ -20,6 +20,8 @@ On this page, we will make critical system file backups and install the followin It is not recommended to skip downloading any of these applications, as many of them will be used later on this page. At the end of this page, your SD card will be cleaned up by removing unnecessary installation files. {: .notice--warning} +### Compatibility Notes + If your **New 3DS** was on version 2.1.0 before following this guide, you should [restore your NAND backup](godmode9-usage#restoring-a-nand-backup) before continuing. {: .notice--warning} @@ -39,6 +41,8 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o #### Section I - Prep Work +In this section, you will copy the files necessary to follow the rest of the instructions on this page. + 1. Power off your device 1. Pasang kad SD anda ke dalam komputer 1. Create a folder named `cias` on the root of your SD card if it does not already exist @@ -52,15 +56,20 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o 1. Reinsert your SD card into your device 1. Power on your device - ![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) - {: .notice--info} - ![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) - {: .notice--info} +The screenshots below indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. + +![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) +{: .notice--info} + -These screenshots indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. #### Section II - Updating the System +In this section, you will update your system to the latest version, which is safe to do with custom firmware. + 1. Update your device by going to System Settings, then "Other Settings", then going all the way to the right and using "System Update" + Updates while using B9S + Luma (what you have) are safe + The updater may display a message saying "Your system is up to date" instead of updating. This is normal if you are already up to date; continue with the next section @@ -69,6 +78,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section III - Homebrew Launcher +In this section, you will temporarily replace Download Play with Homebrew Launcher (which we need to launch FBI). Download Play will automatically go back to normal once you reboot your device. + 1. Launch the Download Play application (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. Wait until you see the `Nintendo 3DS` and `Nintendo DS` buttons 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu @@ -83,6 +94,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section IV - RTC and DSP Setup +In this section, you will sync your 3DS internal clock with the actual time and dump the sound firmware (which is necesssary for some homebrew software to use sound properly). + 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu 1. Select "Miscellaneous options" 1. Select "Dump DSP firmware" @@ -94,6 +107,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section V - Installing CIAs +In this section, you will install several useful homebrew applications to HOME Menu. + 1. Launch FBI from the list of homebrew 1. Navigate to `SD` -> `cias` 1. Select "\" @@ -102,6 +117,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VI - CTRNAND Luma3DS +In this section, you will use a script to copy some of Luma3DS's files to internal memory so that they can be accessed, even without an SD card inserted. + 1. Power off your device 1. Press and hold (Start), and while holding (Start), power on your device. This will launch GodMode9 + If you do not boot into GodMode9, ensure that `GodMode9.firm` is in `/luma/payloads/` and that `payloads` is correctly spelled @@ -118,6 +135,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VII - Cleanup SD Card +In this section, you will use a script to remove some unnecessary files from your SD card. + 1. Select "Cleanup SD Card" 1. When prompted, press (A) to proceed 1. Tekan (A) untuk meneruskan @@ -125,6 +144,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VIII - Backup Essential Files +In this section, you will make backups of flies that can be used to recover from softwaer bricks or to recover data. + 1. Select "Backup Options" 1. Select "SysNAND Backup" 1. Tekan (A) untuk pengesahan @@ -159,7 +180,7 @@ You're done! Custom firmware is now fully configured on your device. Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! {: .notice--info} -#### Information and Notes +### Information and Notes {% capture notice-6 %} Here are some key combos that you should know: diff --git a/_pages/ms_MY/homebrew-launcher-(pichaxx).txt b/_pages/ms_MY/homebrew-launcher-(pichaxx).txt index 9f523eeffa..d8499ced8e 100644 --- a/_pages/ms_MY/homebrew-launcher-(pichaxx).txt +++ b/_pages/ms_MY/homebrew-launcher-(pichaxx).txt @@ -4,9 +4,17 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. +
+{: .notice--info} -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE to run SafeB9SInstaller. +### Compatibility Notes + +These instructions work on USA, Europe, and Japan consoles as indicated by the letters U, E, or J after the system version. + +You will need a Nintendo Network ID to download Pokémon Picross. This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. {: .notice--warning} @@ -24,15 +32,8 @@ This process will overwrite your Pokémon Picross save file, if you have one. If #### Section I - Prep Work -1. Power on your device -1. Open the Nintendo eShop -1. Tap the Search icon (small magnifying glass) -1. Search for `picross` -1. Open the store page for Pokémon Picross -1. Download Pokémon Picross - + You can scan [this QR code](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=ESHOP://50010000037815&margin=0&qzone=1&size=400x400&ecc=L) using the Nintendo 3DS Camera for a direct link to the eShop app - + Your SD card must be inserted in your device to install Pokémon Picross -1. Power off your device +In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. + 1. Pasang kad SD anda ke dalam komputer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it @@ -40,8 +41,16 @@ This process will overwrite your Pokémon Picross save file, if you have one. If 1. Copy the `slotTool` folder from the unSAFE_MODE `.zip` to the `3ds` folder on your SD card 1. Copy the otherapp payload for your region/version from the unSAFE_MODE `.zip`'s `otherapps_with_CfgS` folder to the root of your SD card and rename it to `otherapp.bin` +![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }}) +{: .notice--info} + + #### Section II - PicHaxx +In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device. 1. Open [the PicHaxx Injector website](https://3ds.nhnarwhal.com/3dstools/pichaxx.php) on your computer 1. Select your `movable.sed` file 1. Select "Build and Download" diff --git a/_pages/ms_MY/installing-boot9strap-(fredtool).txt b/_pages/ms_MY/installing-boot9strap-(fredtool).txt index 4070518e75..60161e0b86 100644 --- a/_pages/ms_MY/installing-boot9strap-(fredtool).txt +++ b/_pages/ms_MY/installing-boot9strap-(fredtool).txt @@ -4,15 +4,16 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Table of Contents" %} -### Required Reading - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, for example from BannerBomb or the DSiWare Dumper tool. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). +
+Technical Details (optional) +

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+
+{: .notice--info} ### What You Need -* A DSiWare Backup (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) +* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -20,6 +21,8 @@ This is a currently working implementation of the "FIRM partitions known-plainte #### Section I - CFW Check +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + 1. Power off your device 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button @@ -30,17 +33,7 @@ If you see a configuration menu, you already have CFW, and continuing with these #### Section II - Prep Work -1. Power off your device -1. Pasang kad SD anda ke dalam komputer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card - - ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} - -#### Section III - Fredtool +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) @@ -53,19 +46,31 @@ If you see a configuration menu, you already have CFW, and continuing with these 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link +1. Pasang kad SD anda ke dalam komputer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` - + If the `Nintendo DSiWare` folder does not exist, create it inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` 1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder -1. Reinsert your SD card into your device + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card + + ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} + +#### Section III - Overwriting DS Connection Settings + +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Haxxxxxxxxx!" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title 1. Select "Copy", then select "OK" 1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio #### Section IV - Flipnote Exploit @@ -73,6 +78,8 @@ If you see a configuration menu, you already have CFW, and continuing with these If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} +In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer. + 1. Complete the initial setup process for the launched game until you reach the main menu + Select the left option whenever prompted during the setup process 1. Using the touch-screen, select the large left box, then select the box with an SD card icon @@ -85,7 +92,7 @@ If you would prefer a visual guide to this section, one is available [here](http 1. Tap the fourth box with the letter "A" in it 1. If the exploit was successful, your device will have loaded b9sTool 1. Using the D-Pad, move to "Install boot9strap" - + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to start over from Step 12 of Section III + + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III 1. Press (A), then press START and SELECT at the same time to begin the process 1. Once completed and the bottom screen says "done.", exit b9sTool, then power off your device + You may have to force power off by holding the power button @@ -94,6 +101,8 @@ If you would prefer a visual guide to this section, one is available [here](http #### Section V - Luma3DS Verification +Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. + 1. Power off your device 1. Pasang kad SD anda ke dalam komputer 1. Verify that a `luma` folder exists and that `config.ini` is inside of it @@ -106,13 +115,15 @@ At this point, your console will boot to Luma3DS by default. #### Section VI - Restoring DS Connection Settings -1. Copy the `42383841.bin` file from the `clean/` folder of the downloaded DSiWare archive (`output_(name).zip`) to the `Nintendo 3DS///Nintendo DSiWare/` folder on your SD card - + Replace the existing `42383841.bin` file +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Nintendo DSi™" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title 1. Select "Copy", then select "OK" ___ diff --git a/_pages/ms_MY/installing-boot9strap-(hbl-usm).txt b/_pages/ms_MY/installing-boot9strap-(hbl-usm).txt index 5d8c9ac40f..511676f867 100644 --- a/_pages/ms_MY/installing-boot9strap-(hbl-usm).txt +++ b/_pages/ms_MY/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,16 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

As we already have Homebrew access, we can use slotTool to do this.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--danger} @@ -24,7 +27,10 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint #### Section I - Prep Work +In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. + 1. Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide + + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. Launch slotTool from the list of homebrew + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section 1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option @@ -36,22 +42,31 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint 1. Copy `usm.bin` from the unSAFE_MODE `.zip` to the root of your SD card 1. Put your SD card back into your console +![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} + #### Section II - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](https://uwuu.ca/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section III - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -65,6 +80,8 @@ At this point, your console will boot to Luma3DS by default. #### Section IV - Restoring WiFi Configuration Profiles +In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch the Download Play application 1. Wait until you see the two buttons + Do not press either of the buttons diff --git a/_pages/ms_MY/installing-boot9strap-(soundhax).txt b/_pages/ms_MY/installing-boot9strap-(soundhax).txt index 638702fa71..b1521480a4 100644 --- a/_pages/ms_MY/installing-boot9strap-(soundhax).txt +++ b/_pages/ms_MY/installing-boot9strap-(soundhax).txt @@ -4,7 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+
+{: .notice--info} + +### Compatibility Notes Soundhax (when combined with universal-otherapp) is compatible with versions 1.0.0 through 11.3.0 in all regions. @@ -21,6 +27,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Section I - Prep Work +In this section, you will copy the files needed to trigger both Soundhax and universal-otherapp. + 1. Power off your device 1. Pasang kad SD anda ke dalam komputer 1. Copy the Soundhax `.m4a` to the root of your SD card @@ -33,11 +41,16 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 1. Reinsert your SD card into your device 1. Power on your device - ![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} #### Section II - Launching SafeB9SInstaller +In this section, you will launch Soundhax through the Nintendo 3DS Sound app, which will use universal-otherapp to launch the boot9strap (custom firmware) installer. + 1. Reinsert your SD card into your device 1. Power on your device 1. Buka Nintendo 3DS Sound @@ -58,6 +71,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Section III - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap 1. Once it is complete, press (A) to reboot your device 1. Your device should have rebooted into the Luma3DS configuration menu diff --git a/_pages/ms_MY/installing-boot9strap-(usm).txt b/_pages/ms_MY/installing-boot9strap-(usm).txt index 70a3179bff..7b8503879c 100644 --- a/_pages/ms_MY/installing-boot9strap-(usm).txt +++ b/_pages/ms_MY/installing-boot9strap-(usm).txt @@ -4,15 +4,17 @@ title: "Installing boot9strap (USM)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

We can do this using an existing exploit, BannerBomb3.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -29,6 +31,8 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will #### Section I - Prep Work +In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. + 1. If your device is powered on, power off your device 1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer 1. Upload your movable.sed using the "Choose File" option @@ -41,47 +45,51 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will 1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card 1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - + ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }}) - {: .notice--info} - + ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} + ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card 1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Select "Inject haxx" +1. Press (A) to select "Inject haxx" + Your device will automatically power off #### Section III - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section IV - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -95,16 +103,17 @@ At this point, your console will boot to Luma3DS by default. #### Section V - Restoring WiFi Configuration Profiles +In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text -1. Select "Restore slots" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) +1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + Your device will automatically reboot 1. Power off your device 1. Pasang kad SD anda ke dalam komputer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore ___ diff --git a/_pages/ms_MY/seedminer.txt b/_pages/ms_MY/seedminer.txt index 7cbf0221ac..e108ca2e36 100644 --- a/_pages/ms_MY/seedminer.txt +++ b/_pages/ms_MY/seedminer.txt @@ -4,52 +4,54 @@ title: "Seedminer" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

+

For information on how Seedminer works, see this presentation.

+

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+
+{: .notice--info} -To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. +### Section I - Prep Work -For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). - -This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. - -### Instructions - -#### Section I - Prep Work +In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. 1. Pasang kad SD anda ke dalam komputer 1. Navigate to the `Nintendo 3DS` folder on your SD card -1. Copy the 32 character long name of the folder you see inside Nintendo 3DS - + Do not go inside any more folders - + If you see multiple 32 character long folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + + If you don't have a `Nintendo 3DS` folder, put your SD card into your 3DS and power it on so that the folder can be created +1. Copy the name of the 32-letter folder you see directly inside Nintendo 3DS + + This 32-letter name is system-specific and will be different for each console + + If you see multiple 32-letter folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + You can ignore the `private` folder if you have it - ![]({{ "/images/screenshots/id0-example.png" | absolute_url }}) + ![]({{ "/images/screenshots/seedminer/id0-example.png" | absolute_url }}) {: .notice--info} -1. Paste your 32 character long folder name into a document you can reference later - + This folder name is also known as your "ID0" +1. Paste your 32 character long folder name into [a document](/images/screenshots/seedminer/text-document.png) you can reference later + + This folder is known as your "ID0". Take note of this as this guide will refer to it as such later 1. Power on your device + Your SD card does not need to be inserted at this point 1. Go to your Friend List (the [orange Face Icon]({{ "/images/friend-list-icon.png" | absolute_url }}) in the top row of your HOME Menu) + If you receive an error and are kicked out of the menu, you either must create a new Mii or your device cannot connect to Nintendo's servers (due to a ban or connection issues) 1. Find your Mii profile, then find the "Friend Code" field on the top screen -#### Section II - Seedminer +### Section II - Seedminer + +In this section, you will use the Bruteforce Movable website to retrieve your device's encryption key in the form of `movable.sed`. 1. Open [Bruteforce Movable](https://seedminer.hacks.guide/) on your computer - + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) + If the site isn't working, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field - + Do not attempt to enter the ID0 by hand. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section + + Do not attempt to enter the ID0 manually, as it is easy to make a mistake. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section 1. Select "Go" + If the site immediately goes to step 4, the website has already correctly processed your bruteforce request. You can download your `movable.sed` file and continue to the next section. You do not need to re-add the bot -1. Use the "Register Friend" button on your device to add the bot's friend code as given by the website +1. Use the ["Register Friend" button](/images/screenshots/seedminer/register-friend.png) on your device to add the bot's friend code as given by the website + If prompted, the name that you give to the friend does not matter 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once 1. Once the site processes your information, the site will continue to `Step 2: Bruteforce` automatically 1. Wait for the remainder of the process to complete - + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour + + This is usually fast (1-5 minutes) + During this process, the bot you added may not show up on your 3DS. As long as the website updates, this is not an issue + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site @@ -57,7 +59,7 @@ This method uses a powerful graphics card to perform the calculations needed. A ___ -### Next Steps +### Next steps: Choose an exploit Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. diff --git a/_pages/nl_NL/bannerbomb3.txt b/_pages/nl_NL/bannerbomb3.txt index eeffc1c704..6e4b6c88ce 100644 --- a/_pages/nl_NL/bannerbomb3.txt +++ b/_pages/nl_NL/bannerbomb3.txt @@ -4,11 +4,15 @@ title: "BannerBomb3" {% include toc title="Inhoudsopgave" %} -### Verplicht te lezen +
+Technical Details (optional) +

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

For a more technical explanation, see here.

+
+{: .notice--info} -Om DSiWare die op het systeem staat te dumpen naar de SD-kaart, maken we gebruik van een fout in het DSiWare Data Management venster van de Settings applicatie. - -Om dit te bereiken, gebruiken we de encryptiesleutel van je systeem (movable.sed) om een DSiWare back-up te maken die het systeem exploiteert om de DSi Internet Settings applicatie naar de hoofdmap van je SD-kaart te dumpen. +### Compatibility Notes Deze instructies werken aan de consoles van de VS, Europa, Japan en Korea zoals aangegeven in de letters U, E, J, of K na de systeemversie. @@ -20,6 +24,9 @@ Als je een Taiwanese console hebt (aangegeven door een T na de systeemversie), v * Je `movable.sed` bestand van het voltooien van [Seedminer](seedminer) #### Deel I - Voorbereiding + +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + 1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) op je computer 1. Upload je movable.sed met de "Choose File" optie 1. Selecteer "Build and Download" @@ -27,28 +34,31 @@ Als je een Taiwanese console hebt (aangegeven door een T na de systeemversie), v 1. Als je console aanstaat, zet hem dan uit 1. Plaats je SD-kaart in je computer 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` zal dezelfde zijn die je bij deze stap hebt gebruikt: [Seedminer](seedminer) - + `` is een reeks van 32 characters lang en bevindt zich in de map van de `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Kopieer het `F00D43D5.bin` bestand van de BannerBomb3 `.zip` naar de `Nintendo DSiWare` map +1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Deel II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. + 1. Stop je SD-kaart terug in je 3DS 1. Zet je 3DS aan 1. Open Systeem Instellingen op je 3DS -1. Navigeer naar `Data Management` -> `DSiWare` -1. Klik op de SD-kaart sectie +1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + Je 3DS zou Magenta (roze/paars) moeten flashen en vervolgens een paar seconden later moeten crashen. Dit betekent dat het heeft gewerkt 1. Schakel je 3DS uit 1. Plaats je SD kaart in je computer -1. Je zou nu het `42383841.bin` bestand op de hoofdmap van je SD-kaart moeten hebben. Dit is de DSiWare backup die je later in de handleiding zal gebruiken -1. Navigeer naar `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` op je SD-kaart - + Dit `` zal dezelfde zijn als in [Seedminer](seedminer) -1. Verwijder `F00D43D5.bin` uit de Nintendo DSiWare map en van je computer. Dit bestand is niet meer nodig +1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page +1. Navigeer naar `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` op je SD-kaart +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. Dit bestand is niet meer nodig + Ga door met [boot9strap installeren (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} diff --git a/_pages/nl_NL/finalizing-setup.txt b/_pages/nl_NL/finalizing-setup.txt index 3b70301612..1a9b060a03 100644 --- a/_pages/nl_NL/finalizing-setup.txt +++ b/_pages/nl_NL/finalizing-setup.txt @@ -20,6 +20,8 @@ Op deze pagina zullen we een belangrijke back-up maken van de systeembestanden e Het is niet aan te raden om het downloaden van een van deze applicaties over te slaan, omdat velen van hen later op deze pagina zullen worden gebruikt. Aan het einde van deze pagina wordt je SD-kaart opgeschoond door onnodige installatiebestanden te verwijderen. {: .notice--warning} +### Compatibility Notes + Als je **New 3DS** versie 2.1.0 was voor het volgen van deze handleiding, moet je je [NAND-backup herstellen](godmode9-usage#restoring-a-nand-backup) voordat je verder gaat. {: .notice--warning} @@ -39,6 +41,8 @@ Als je vorige CFW setup was gebaseerd op EmuNAND en je wilt de inhoud van je Emu #### Deel I - Voorbereiding +In this section, you will copy the files necessary to follow the rest of the instructions on this page. + 1. Schakel je 3DS uit 1. Plaats je SD kaart in je computer 1. Maak een nieuwe map genaamd `cias` in de hooofdmap van je SD kaart, indien deze nog niet aanwezig is @@ -52,15 +56,20 @@ Als je vorige CFW setup was gebaseerd op EmuNAND en je wilt de inhoud van je Emu 1. Stop je SD kaart terug in je 3DS 1. Zet je 3DS aan - ![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) - {: .notice--info} - ![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) - {: .notice--info} +The screenshots below indicate the minimum SD card layout that is required to follow this page. Je hebt mogelijk extra bestanden of mappen op je SD-kaart, afhankelijk van je vorige setup of de methode die je hebt gevolgd. + +![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) +{: .notice--info} + -Deze screenshots geven de minimale SD-kaart layout aan die nodig is om deze pagina te volgen. Je hebt mogelijk extra bestanden of mappen op je SD-kaart, afhankelijk van je vorige setup of de methode die je hebt gevolgd. #### Deel II - Het systeem bijwerken +In this section, you will update your system to the latest version, which is safe to do with custom firmware. + 1. Update je 3DS door naar System Settings en dan naar "Algemene Instellingen" te gaan. Ga in dat menu helemaal naar rechts en klik op "Systeemupdate" + Updaten terwijl je gebruik maakt van B9S + Luma (wat jij hebt) is veilig + De updater kan een bericht weergeven met de woorden "Your system is up to date" in plaats van te updaten. Dit is normaal als je al up to date bent; ga door met het volgende deel @@ -69,6 +78,8 @@ Deze screenshots geven de minimale SD-kaart layout aan die nodig is om deze pagi #### Deel III - Homebrew Launcher +In this section, you will temporarily replace Download Play with Homebrew Launcher (which we need to launch FBI). Download Play will automatically go back to normal once you reboot your device. + 1. Start de Download Play applicatie (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. Wacht tot je de 'Nintendo 3DS' en 'Nintendo DS' knoppen ziet 1. Druk tegelijkertijd op (L) + (Down) + (Select) om het Rosalina menu te openen @@ -83,6 +94,8 @@ Deze screenshots geven de minimale SD-kaart layout aan die nodig is om deze pagi #### Deel IV - RTC en DSP Setup +In this section, you will sync your 3DS internal clock with the actual time and dump the sound firmware (which is necesssary for some homebrew software to use sound properly). + 1. Druk tegelijkertijd op (L) + (Down) + (Select) om het Rosalina menu te openen 1. Selecteer "Miscellaneous options" 1. Selecteer "Dump DSP firmware" @@ -94,6 +107,8 @@ Deze screenshots geven de minimale SD-kaart layout aan die nodig is om deze pagi #### Deel V - CIAs installeren +In this section, you will install several useful homebrew applications to HOME Menu. + 1. Start FBI uit de lijst met homebrew 1. Navigeer naar `SD` -> `cias` 1. Selecteer "\" @@ -102,6 +117,8 @@ Deze screenshots geven de minimale SD-kaart layout aan die nodig is om deze pagi ### Deel VI - CTRNAND Luma3DS +In this section, you will use a script to copy some of Luma3DS's files to internal memory so that they can be accessed, even without an SD card inserted. + 1. Schakel je 3DS uit 1. Terwijl je (Start) ingedrukt houdt, zet je jouw apparaat aan. Dit zal GodMode9 starten + Als je niet in GodMode9 opstart, zorg er dan voor dat `GodMode9.firm` in `/luma/payloads/` is en dat `payloads` correct gespeld is @@ -118,6 +135,8 @@ Deze screenshots geven de minimale SD-kaart layout aan die nodig is om deze pagi #### Deel VIII - SD-kaart opschonen +In this section, you will use a script to remove some unnecessary files from your SD card. + 1. Selecteer "Cleanup SD Card" 1. Wanneer dit gevraagd wordt, druk op (A) om verder te gaan 1. Druk op (A) om door te gaan @@ -125,6 +144,8 @@ Deze screenshots geven de minimale SD-kaart layout aan die nodig is om deze pagi #### Deel VIII - Backups maken van essentiële bestanden +In this section, you will make backups of flies that can be used to recover from softwaer bricks or to recover data. + 1. Selecteer "Back-up Options" 1. Selecteer "SysNAND Backup" 1. Druk op (A) om te bevestigen @@ -159,7 +180,7 @@ Je bent klaar! Custom firmware is nu volledig geconfigureerd op je apparaat. Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! {: .notice--info} -#### Informatie en notities +### Information and Notes {% capture notice-6 %} Hier zijn enkele belangrijke combos die je zou moeten kennen: diff --git a/_pages/nl_NL/homebrew-launcher-(pichaxx).txt b/_pages/nl_NL/homebrew-launcher-(pichaxx).txt index a6e8cdb1f7..914c994677 100644 --- a/_pages/nl_NL/homebrew-launcher-(pichaxx).txt +++ b/_pages/nl_NL/homebrew-launcher-(pichaxx).txt @@ -4,9 +4,17 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Inhoudsopgave" %} -### Verplicht te lezen +
+Technical Details (optional) +This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. +
+{: .notice--info} -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE to run SafeB9SInstaller. +### Compatibility Notes + +These instructions work on USA, Europe, and Japan consoles as indicated by the letters U, E, or J after the system version. + +You will need a Nintendo Network ID to download Pokémon Picross. Dit proces zal je Pokémon Picross save bestand overschrijven, als je er een hebt. Als je je Pokémon Picross save bestand wilt behouden, moet je een back-up maken van je `00000001.sav` bestand voordat je het overschrijft. {: .notice--warning} @@ -24,15 +32,8 @@ Dit proces zal je Pokémon Picross save bestand overschrijven, als je er een heb #### Deel I - Voorbereiding -1. Zet je 3DS aan -1. Open de Nintendo eShop -1. Tik op het zoek pictogram (kleine vergrootglas) -1. Zoek naar `picross` -1. Open de winkelpagina voor Pokémon Picross -1. Download Pokémon Picross - + Je kunt [deze QR-code](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=ESHOP://50010000037815&margin=0&qzone=1&size=400x400&ecc=L) scannen met de Nintendo 3DS Camera voor een directe link naar de eShop app - + Je SD-kaart moet in je apparaat geplaatst worden om Pokémon Picross te installeren -1. Schakel je 3DS uit +In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. + 1. Plaats je SD kaart in je computer 1. Kopieer `boot.firm` en `boot.3dsx` van de Luma3DS `.zip` naar de hoofdmap van je SD-kaart + De hoofdmap van de SD-kaart verwijst naar de bovenste map van de SD-kaart, waarin je alle mappen op de SD-kaart kunt zien, waaronder de Nintendo 3DS map, zonder je in de Nintendo 3DS map te bevinden @@ -40,8 +41,16 @@ Dit proces zal je Pokémon Picross save bestand overschrijven, als je er een heb 1. Copy the `slotTool` folder from the unSAFE_MODE `.zip` to the `3ds` folder on your SD card 1. Copy the otherapp payload for your region/version from the unSAFE_MODE `.zip`'s `otherapps_with_CfgS` folder to the root of your SD card and rename it to `otherapp.bin` +![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }}) +{: .notice--info} + + #### Deel II - PicHaxx +In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device. 1. Open [de PicHaxx Injector website](https://3ds.nhnarwhal.com/3dstools/pichaxx.php) op je computer 1. Selecteer jouw `movable.sed` bestand 1. Selecteer "Build and Download" diff --git a/_pages/nl_NL/installing-boot9strap-(fredtool).txt b/_pages/nl_NL/installing-boot9strap-(fredtool).txt index 9e8f4728e6..737c6795b7 100644 --- a/_pages/nl_NL/installing-boot9strap-(fredtool).txt +++ b/_pages/nl_NL/installing-boot9strap-(fredtool).txt @@ -4,15 +4,16 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Inhoudsopgave" %} -### Verplicht te lezen - -Deze methode zal Seedminer gebruiken voor verder gebruik te maken van je `movable.sed` bestand om een DSiWare titel te decoderen voor het injecteren van een DSiWare titel in de DS Internet instellingen, om zo verdere toegang te krijgen tot jouw 3DS. Dit vereist een DSiWare backup, bijvoorbeeld van BannerBomb of DSiWare Dumper tool. - -Dit is een momenteel werkende uitvoering van de "FIRM partitions known-plaintext" exploit, waarvan je [hier](https://www.3dbrew.org/wiki/3DS_System_Flaws) de details kunt vinden. +
+Technical Details (optional) +

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+
+{: .notice--info} ### Wat je nodig hebt -* Een DSiWare Backup (je zou er een moeten hebben op de hoofdmap van je SD-kaart, van het volgen van [BannerBomb3](bannerbomb3)) +* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * je `movable.sed` bestand van het voltooien van [Seedminer](seedminer) * De nieuwste versie van [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * De nieuwste versie van [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -20,6 +21,8 @@ Dit is een momenteel werkende uitvoering van de "FIRM partitions known-plaintext #### Deel I - CFW Controle +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + 1. Schakel je 3DS uit 1. Houd de (Select) knop ingedrukt 1. Zet je 3DS aan terwijl je de (Select) knop ingedrukt houdt @@ -30,17 +33,7 @@ Als je een configuratiemenu ziet, heb je al CFW en zal het doorgaan met deze ins #### Deel II - Voorbereiding -1. Schakel je 3DS uit -1. Plaats je SD kaart in je computer -1. Kopieer `boot.firm` en `boot.3dsx` van de Luma3DS `.zip` naar de hoofdmap van je SD-kaart - + De hoofdmap van de SD-kaart verwijst naar de bovenste map van de SD-kaart, waarin je alle mappen op de SD-kaart kunt zien, waaronder de Nintendo 3DS map, zonder je in de Nintendo 3DS map te bevinden -1. Kopieer `boot.nds` (B9STool) naar de hoofdmap van je SD-kaart -1. Kopieer de `private` map van de Frogminer_save `.zip` naar de hoofdmap van je SD-kaart - - ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} - -#### Deel III - Fredtool +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. 1. Open de [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website op je computer 1. Voer een alfanumerieke naam in onder het "Username" veld (geen spaties of speciale tekens) @@ -53,19 +46,31 @@ Als je een configuratiemenu ziet, heb je al CFW en zal het doorgaan met deze ins 1. Click on the first search result + This result should have the latest timestamp 1. Klik op de "output_(name).zip" link +1. Plaats je SD kaart in je computer 1. Navigeer naar `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` op je SD-kaart - + `` zal dezelfde zijn die je bij deze stap hebt gebruikt: [Seedminer](seedminer) - + `` is een reeks van 32 characters lang en bevindt zich in de map van de `` - + Als de `Nintendo DSiWare` map niet bestaat, maak deze dan aan in de `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` 1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder -1. Stop je SD kaart terug in je 3DS + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Kopieer `boot.firm` en `boot.3dsx` van de Luma3DS `.zip` naar de hoofdmap van je SD-kaart + + De hoofdmap van de SD-kaart verwijst naar de bovenste map van de SD-kaart, waarin je alle mappen op de SD-kaart kunt zien, waaronder de Nintendo 3DS map, zonder je in de Nintendo 3DS map te bevinden +1. Kopieer `boot.nds` (B9STool) naar de hoofdmap van je SD-kaart +1. Kopieer de `private` map van de Frogminer_save `.zip` naar de hoofdmap van je SD-kaart + + ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} + +#### Section III - Overwriting DS Connection Settings + +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + 1. Zet je 3DS aan 1. Open System Settings op je apparaat -1. Navigeer naar `Data Management` -> `DSiWare` -1. Onder de "SD-kaart" sectie, selecteer de ""Haxxxxxxxxx!" titel +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title 1. Selecteer "Copy" en selecteer dan "OK" 1. Ga terug naar het hoofdmenu van System Settings -1. Navigeer naar `Internet Settings` -> `Nintendo DS Connections`, selecteer dan "OK" +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. Als de exploit successful was, zal jouw 3DS de JPN versie van Flipnote Studio hebben opgestart #### Deel IV - Flipnote Exploit @@ -73,6 +78,8 @@ Als je een configuratiemenu ziet, heb je al CFW en zal het doorgaan met deze ins Als je liever een visuele handleiding hebt in dit deel, is er [hier](https://zoogie.github.io/web/flipnote_directions/) een te vinden. {: .notice--info} +In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer. + 1. Voltooi de initiële installatie van het opgestarte spel tot je het hoofdmenu hebt bereikt + Selecteer de linkeroptie wanneer dit word gevraagt tijdens het installatieproces 1. Met behulp van het touchscreen, selecteer je het grote linker vak en selecteer je het vak met een SD-kaart icoon @@ -85,7 +92,7 @@ Als je liever een visuele handleiding hebt in dit deel, is er [hier](https://zoo 1. Tik op het vierde vak met de letter "A" erin 1. Als de exploit succesvol was, zal je 3DS b9sTool opstarten 1. Met behulp van de D-Pad, navigeer naar "install boot9strap" - + Als je deze stap mist, zal het systeem terug gaan naar het HOME Menu in plaats van boot9strap te installeren en moet je opnieuw beginnen vanaf stap 12 van deel III + + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III 1. Druk op (A), druk dan op START en SELECT op het zelfde moment om het proces te starten 1. Eenmaal voltooid en het onderste scherm "done" toont, sluit dan b9sTool en schakel je 3DS uit + Mogelijk moet je de power knop een tijdje inhouden om zo je console uit te zetten @@ -94,6 +101,8 @@ Als je liever een visuele handleiding hebt in dit deel, is er [hier](https://zoo #### Deel V - Luma3DS verificatie +Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. + 1. Schakel je 3DS uit 1. Plaats je SD kaart in je computer 1. Controleer dat een `luma` map bestaat en dat `config.ini` erin zit @@ -106,13 +115,15 @@ Op dit moment zal je console standaard opstarten naar Luma3DS. #### Deel VI - DS Connection Settings herstellen -1. Copy the `42383841.bin` file from the `clean/` folder of the downloaded DSiWare archive (`output_(name).zip`) to the `Nintendo 3DS///Nintendo DSiWare/` folder on your SD card - + Vervang het bestaande `42383841.bin` bestand +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. + +1. Navigeer naar `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` op je SD-kaart +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one 1. Stop je SD kaart terug in je 3DS 1. Zet je 3DS aan 1. Open System Settings op je apparaat -1. Navigeer naar `Data Management` -> `DSiWare` -1. Onder de "SD Card" sectie, selecteer je de "Nintendo DSi™" titel +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title 1. Selecteer "Copy" en selecteer dan "OK" ___ diff --git a/_pages/nl_NL/installing-boot9strap-(hbl-usm).txt b/_pages/nl_NL/installing-boot9strap-(hbl-usm).txt index adaf7062fd..fb01bac985 100644 --- a/_pages/nl_NL/installing-boot9strap-(hbl-usm).txt +++ b/_pages/nl_NL/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,16 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Inhoudsopgave" %} -### Verplicht te lezen +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

As we already have Homebrew access, we can use slotTool to do this.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+
+{: .notice--info} -Om gebruik te kunnen maken van de SAFE_MODE firmware van ons systeem, moeten we een exploit wifi-profiel injecteren. - -As we already have Homebrew access, we can use slotTool to do this. - -Wanneer het wifi profiel geïnjecteerd is, gebruiken we SAFE_MODE, een herstelfunctie beschikbaar op alle 3DS consoles, om het exploited wifi profiel te activeren. +### Compatibility Notes If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--danger} @@ -24,7 +27,10 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint #### Deel I - Voorbereiding +In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. + 1. Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide + + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. Launch slotTool from the list of homebrew + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section 1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option @@ -36,22 +42,31 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint 1. Copy `usm.bin` from the unSAFE_MODE `.zip` to the root of your SD card 1. Put your SD card back into your console +![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} + #### Section II - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Blijf de knoppen ingedrukt houden totdat het apparaat opstart in Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Druk op "OK" om de update te accepteren + Er is geen update. Dit is deel van de exploit 1. Druk op "I accept" om de algemene voorwaarden te accepteren 1. De update zal uiteindelijk mislukken, met de foutcode `003-1099`. Dit is verwacht gedrag 1. Wanneer gevraagd wordt "Would you like to configure Internet settings?" selecteer dan "Yes" -1. In het volgende menu, navigeer naar `Connection 1` -> `Change Settings` -> `Next Page (rechter pijl)` -> `Proxy Settings` -> `Detailed Setup` - + Dit is een [visuele weergave](https://uwuu.ca/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. Als de exploit succesvol was, zal je SafeB9SInstaller hebben opgestart #### Deel III - Boot9strap installeren +In this section, you will install custom firmware onto your device. + 1. Wanneer daarom wordt gevraagd, voer de toetsencombinatie op het bovenste scherm in om boot9strap te installeren + Als het bovenste scherm leeg is, schakel je apparaat uit en herdoe Deel III 1. Zodra het voltooid is, druk op (A) om je apparaat opnieuw op te starten @@ -65,6 +80,8 @@ Op dit moment zal je console standaard opstarten naar Luma3DS. #### Section IV - Restoring WiFi Configuration Profiles +In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Open de Download Play app 1. Wacht tot je de twee knoppen ziet + Do not press either of the buttons diff --git a/_pages/nl_NL/installing-boot9strap-(soundhax).txt b/_pages/nl_NL/installing-boot9strap-(soundhax).txt index df7fcd51bb..d206a0ad5c 100644 --- a/_pages/nl_NL/installing-boot9strap-(soundhax).txt +++ b/_pages/nl_NL/installing-boot9strap-(soundhax).txt @@ -4,7 +4,13 @@ title: "Boot9strap installeren (Soundhax)" {% include toc title="Inhoudsopgave" %} -### Verplicht te lezen +
+Technical Details (optional) +

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+
+{: .notice--info} + +### Compatibility Notes Soundhax (wanneer gecombineerd met universal-otherapp) is compatibel met versies 1.0.0 tot en met 11.3.0 in alle regio's. @@ -21,6 +27,8 @@ Soundhax (wanneer gecombineerd met universal-otherapp) is compatibel met versies #### Deel I - Voorbereiding +In this section, you will copy the files needed to trigger both Soundhax and universal-otherapp. + 1. Schakel je 3DS uit 1. Plaats je SD kaart in je computer 1. Kopieer de Soundhax `.m4a` naar de hoofdmap van je SD-kaart @@ -33,11 +41,16 @@ Soundhax (wanneer gecombineerd met universal-otherapp) is compatibel met versies 1. Stop je SD kaart terug in je 3DS 1. Zet je 3DS aan - ![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} #### Deel II - SafeB9SInstaller starten +In this section, you will launch Soundhax through the Nintendo 3DS Sound app, which will use universal-otherapp to launch the boot9strap (custom firmware) installer. + 1. Stop je SD-kaart terug in je 3DS 1. Zet je 3DS aan 1. Start Nintendo 3DS Sound @@ -58,6 +71,8 @@ Soundhax (wanneer gecombineerd met universal-otherapp) is compatibel met versies #### Deel III - Boot9strap installeren +In this section, you will install custom firmware onto your device. + 1. Wanneer daarom wordt gevraagd, voer de toetsencombinatie op het bovenste scherm in om boot9strap te installeren 1. Zodra het voltooid is, druk op (A) om je apparaat opnieuw op te starten 1. Je apparaat zou opnieuw moeten opgestart zijn naar het configuratiemenu van Luma3DS diff --git a/_pages/nl_NL/installing-boot9strap-(usm).txt b/_pages/nl_NL/installing-boot9strap-(usm).txt index 5f23ca0766..986a47d1db 100644 --- a/_pages/nl_NL/installing-boot9strap-(usm).txt +++ b/_pages/nl_NL/installing-boot9strap-(usm).txt @@ -4,15 +4,17 @@ title: "Boot9strap installeren (USM)" {% include toc title="Inhoudsopgave" %} -### Verplicht te lezen +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

We can do this using an existing exploit, BannerBomb3.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

+
+{: .notice--info} -Om gebruik te kunnen maken van de SAFE_MODE firmware van ons systeem, moeten we een exploit wifi-profiel injecteren. - -We kunnen dit doen met een bestaande exploit, BannerBomb3. - -Om dit te bereiken, gebruiken we de encryptiesleutel van uw systeem (movable.sed) om een DSiWare back-up te maken die het systeem exploïteert om het wifi-profiel in je connectielijst te injecteren. - -Wanneer het wifi profiel geïnjecteerd is, gebruiken we SAFE_MODE, een herstelfunctie beschikbaar op alle 3DS consoles, om het exploited wifi profiel te activeren. +### Compatibility Notes Deze instructies werken aan de consoles van de VS, Europa, Japan en Korea zoals aangegeven in de letters U, E, J, of K na de systeemversie. @@ -29,6 +31,8 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will #### Deel I - Voorbereiding +In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. + 1. Als je 3DS aanstaat, zet hem dan af 1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) op je computer 1. Upload je movable.sed met de "Choose File" optie @@ -41,47 +45,51 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will 1. Kopieer `boot9strap.firm` en `boot9strap.firm.sha` van de boot9strap `.zip` naar de `/boot9strap/` map op je SD-kaart 1. Kopieer `SafeB9SInstaller.bin` van de SafeB9SInstaller `.zip` naar de hoofdmap van je SD-kaart 1. Kopieer `usm.bin` van de `unSAFE_MODE.zip` naar de hoofdmap van je SD-kaart - + ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }}) - {: .notice--info} - + ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} + ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` zal dezelfde zijn die je bij deze stap hebt gebruikt: [Seedminer](seedminer) - + `` is een reeks van 32 characters lang en bevindt zich in de map van de `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card 1. Kopieer het `F00D43D5.bin` bestand van `unSAFE_MODE.zip` naar de `Nintendo DSiWare` map - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Deel II - BannerBomb3 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. + 1. Stop je SD-kaart terug in je 3DS 1. Zet je 3DS aan 1. Open Systeeminstellingen op je apparaat -1. Navigeer naar `Data Management` -> `DSiWare` -1. Klik op de SD-kaart tab - + Je apparaat zou een menu met tekst moeten tonen +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Selecteer "Inject haxx" +1. Press (A) to select "Inject haxx" + Je apparaat zal automatisch uitschakelen #### Deel III - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Blijf de knoppen ingedrukt houden totdat het apparaat opstart in Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Druk op "OK" om de update te accepteren + Er is geen update. Dit is deel van de exploit 1. Druk op "I accept" om de algemene voorwaarden te accepteren 1. De update zal uiteindelijk mislukken, met de foutcode `003-1099`. Dit is verwacht gedrag 1. Wanneer gevraagd wordt "Would you like to configure Internet settings?" selecteer dan "Yes" -1. In het volgende menu, navigeer naar `Connection 1` -> `Change Settings` -> `Next Page (rechter pijl)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. Als de exploit succesvol was, zal je SafeB9SInstaller hebben opgestart #### Deel IV - Boot9strap installeren +In this section, you will install custom firmware onto your device. + 1. Wanneer daarom wordt gevraagd, voer de toetsencombinatie op het bovenste scherm in om boot9strap te installeren + Als het bovenste scherm leeg is, schakel je apparaat uit en herdoe Deel III 1. Zodra het voltooid is, druk op (A) om je apparaat opnieuw op te starten @@ -95,16 +103,17 @@ Op dit moment zal je console standaard opstarten naar Luma3DS. #### Deel V - Wifi-configuratie profielen herstellen +In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Open System Settings op je apparaat -1. Navigeer naar `Data Management` -> `DSiWare` -1. Klik op de SD-kaart sectie - + Je apparaat zou een menu met tekst moeten tonen -1. Selecteer "Restore slots" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) +1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + Your device will automatically reboot 1. Schakel je 3DS uit 1. Plaats je SD kaart in je computer 1. Navigeer naar `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` op je SD-kaart -1. Verwijder `F00D43D5.bin` uit je Nintendo DSiWare map +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. Dit bestand is niet meer nodig ___ diff --git a/_pages/nl_NL/seedminer.txt b/_pages/nl_NL/seedminer.txt index 2ebf82b256..c9cbcd9b74 100644 --- a/_pages/nl_NL/seedminer.txt +++ b/_pages/nl_NL/seedminer.txt @@ -4,52 +4,54 @@ title: "Seedminer" {% include toc title="Inhoudsopgave" %} -### Verplicht te lezen +
+Technical Details (optional) +

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

+

For information on how Seedminer works, see this presentation.

+

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+
+{: .notice--info} -Om boot9strap te installeren op je apparaat moeten we de unieke encryptiesleutel van je apparaat achterhalen. Om dit te bereiken, gebruiken we Seedminer om de encryptiesleutel te berekenen (movable.sed) voor je 3DS. +### Section I - Prep Work -Voor meer informatie over hoe Seedminer werk, zie [deze presentatie](https://zoogie.github.io/web/34⅕c3). - -Deze methode gebruikt een krachtige grafische kaart om de benodigde berekeningen uit te voeren. Een website die door vrijwilligers wordt uitgebaat wordt gebruikt om je te helpen met deze methode. - -### Instructies - -#### Deel I - Voorbereiding +In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. 1. Plaats je SD-kaart in je computer 1. Ga naar de `Nintendo 3DS` map op je SD-kaart -1. Kopieer de 32-tekens lange naam van de map die je ziet in de Nintendo 3DS map - + Ga niet binnen in andere mappen - + Als je meerdere mappen ziet met 32-tekens lange namen, volg dan [deze instructies](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-map) + + If you don't have a `Nintendo 3DS` folder, put your SD card into your 3DS and power it on so that the folder can be created +1. Copy the name of the 32-letter folder you see directly inside Nintendo 3DS + + This 32-letter name is system-specific and will be different for each console + + If you see multiple 32-letter folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + Je kunt de `private` map negeren als je deze hebt - ![]({{ "/images/screenshots/id0-example.png" | absolute_url }}) + ![]({{ "/images/screenshots/seedminer/id0-example.png" | absolute_url }}) {: .notice--info} -1. Plak je 32-tekens lange mapnaam in een document dat we later kunnen gebruiken - + Deze mapnaam staat ook bekend als je "ID0" +1. Paste your 32 character long folder name into [a document](/images/screenshots/seedminer/text-document.png) you can reference later + + This folder is known as your "ID0". Take note of this as this guide will refer to it as such later 1. Zet je 3DS aan + Je SD-kaart hoeft niet geplaatst te worden op dit moment 1. Ga naar je Friend List (het oranje gezichsticoontje]({{ "/images/friend-list-icon.png" | absolute_url }}) op de bovenste rij van je HOME Menu) + Als je een error krijgt en uit het menu wordt gegooid, moet je een nieuwe Mii maken of kan je 3DS niet met Nintendo's servers verbinden (door een ban of connectie problemen) 1. Zoek je Mii profiel, zoek dan naar het "Friend Code" veld op het bovenste scherm -#### Deel II - Seedminer +### Section II - Seedminer + +In this section, you will use the Bruteforce Movable website to retrieve your device's encryption key in the form of `movable.sed`. 1. Open [Bruteforce Movable](https://seedminer.hacks.guide/) on your computer - + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) + If the site isn't working, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field - + Do not attempt to enter the ID0 by hand. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section + + Do not attempt to enter the ID0 manually, as it is easy to make a mistake. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section 1. Select "Go" + If the site immediately goes to step 4, the website has already correctly processed your bruteforce request. You can download your `movable.sed` file and continue to the next section. You do not need to re-add the bot -1. Use the "Register Friend" button on your device to add the bot's friend code as given by the website +1. Use the ["Register Friend" button](/images/screenshots/seedminer/register-friend.png) on your device to add the bot's friend code as given by the website + If prompted, the name that you give to the friend does not matter 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once 1. Once the site processes your information, the site will continue to `Step 2: Bruteforce` automatically 1. Wait for the remainder of the process to complete - + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour + + This is usually fast (1-5 minutes) + During this process, the bot you added may not show up on your 3DS. As long as the website updates, this is not an issue + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site @@ -57,7 +59,7 @@ Deze methode gebruikt een krachtige grafische kaart om de benodigde berekeningen ___ -### Volgende stappen +### Next steps: Choose an exploit Zodra je de encryptiesleutel (`movable.sed`) hebt, zal je deze gebruiken in combinatie met andere exploits om custom firmware te installeren op je 3DS. diff --git a/_pages/no_NO/bannerbomb3.txt b/_pages/no_NO/bannerbomb3.txt index 9f1d358dce..417795b8b9 100644 --- a/_pages/no_NO/bannerbomb3.txt +++ b/_pages/no_NO/bannerbomb3.txt @@ -4,11 +4,15 @@ title: "BannerBomb3" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

For a more technical explanation, see here.

+
+{: .notice--info} -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -20,6 +24,9 @@ If you have a Taiwanese console (indicated by a T after the system version), fol * Your `movable.sed` file from completing [Seedminer](seedminer) #### Section I - Prep Work + +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + 1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer 1. Upload your movable.sed using the "Choose File" option 1. Click "Build and Download" @@ -27,28 +34,31 @@ If you have a Taiwanese console (indicated by a T after the system version), fol 1. If your console is powered on, power off your console 1. Sett inn SD-kortet i datamaskinen din 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from the BannerBomb3 `.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. + 1. Sett inn SD-kortet i konsollen igjen 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section +1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked 1. Slå av enheten 1. Sett inn SD-kortet i datamaskinen din -1. You should now have `42383841.bin` in SD root. This is the DSiWare backup you will use later in the guide -1. Navigate to `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card - + This `` will be the same one that you used in [Seedminer](seedminer) -1. Delete `F00D43D5.bin` from the Nintendo DSiWare folder and from your computer. This file will not be needed anymore +1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore + Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} diff --git a/_pages/no_NO/finalizing-setup.txt b/_pages/no_NO/finalizing-setup.txt index 426cac5684..21366ca934 100644 --- a/_pages/no_NO/finalizing-setup.txt +++ b/_pages/no_NO/finalizing-setup.txt @@ -20,6 +20,8 @@ On this page, we will make critical system file backups and install the followin It is not recommended to skip downloading any of these applications, as many of them will be used later on this page. At the end of this page, your SD card will be cleaned up by removing unnecessary installation files. {: .notice--warning} +### Compatibility Notes + If your **New 3DS** was on version 2.1.0 before following this guide, you should [restore your NAND backup](godmode9-usage#restoring-a-nand-backup) before continuing. {: .notice--warning} @@ -39,6 +41,8 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o #### Section I - Prep Work +In this section, you will copy the files necessary to follow the rest of the instructions on this page. + 1. Slå av enheten 1. Sett inn SD-kortet i datamaskinen din 1. Opprett en mappe kalt `cias` på roten av SD-kortet hvis den ikke allerede er der @@ -52,15 +56,20 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o 1. Sett inn SD-kortet i konsollen igjen 1. Power on your device - ![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) - {: .notice--info} - ![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) - {: .notice--info} +The screenshots below indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. + +![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) +{: .notice--info} + -These screenshots indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. #### Section II - Updating the System +In this section, you will update your system to the latest version, which is safe to do with custom firmware. + 1. Oppdater konsollen ved å gå til Systeminnstillinger, deretter "Other Settings", så helt til høyre og start "System Update" + Oppdateringer mens du bruker B9S + Luma (det du har) er trygt + The updater may display a message saying "Your system is up to date" instead of updating. This is normal if you are already up to date; continue with the next section @@ -69,6 +78,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section III - Homebrew Launcher +In this section, you will temporarily replace Download Play with Homebrew Launcher (which we need to launch FBI). Download Play will automatically go back to normal once you reboot your device. + 1. Launch the Download Play application (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. Wait until you see the `Nintendo 3DS` and `Nintendo DS` buttons 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu @@ -83,6 +94,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section IV - RTC and DSP Setup +In this section, you will sync your 3DS internal clock with the actual time and dump the sound firmware (which is necesssary for some homebrew software to use sound properly). + 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu 1. Select "Miscellaneous options" 1. Select "Dump DSP firmware" @@ -94,6 +107,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section V - Installing CIAs +In this section, you will install several useful homebrew applications to HOME Menu. + 1. Launch FBI from the list of homebrew 1. Navigér til `SD` -> `cias` 1. Velg "\" @@ -102,6 +117,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VI - CTRNAND Luma3DS +In this section, you will use a script to copy some of Luma3DS's files to internal memory so that they can be accessed, even without an SD card inserted. + 1. Slå av enheten 1. Press and hold (Start), and while holding (Start), power on your device. This will launch GodMode9 + If you do not boot into GodMode9, ensure that `GodMode9.firm` is in `/luma/payloads/` and that `payloads` is correctly spelled @@ -118,6 +135,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VII - Cleanup SD Card +In this section, you will use a script to remove some unnecessary files from your SD card. + 1. Select "Cleanup SD Card" 1. When prompted, press (A) to proceed 1. Trykk (A) for å fortsette @@ -125,6 +144,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VIII - Backup Essential Files +In this section, you will make backups of flies that can be used to recover from softwaer bricks or to recover data. + 1. Select "Backup Options" 1. Select "SysNAND Backup" 1. Trykk (A) for å bekrefte @@ -159,7 +180,7 @@ You're done! Custom firmware is now fully configured on your device. Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! {: .notice--info} -#### Information and Notes +### Information and Notes {% capture notice-6 %} Here are some key combos that you should know: diff --git a/_pages/no_NO/homebrew-launcher-(pichaxx).txt b/_pages/no_NO/homebrew-launcher-(pichaxx).txt index b7c7f1ad55..a03319e1bd 100644 --- a/_pages/no_NO/homebrew-launcher-(pichaxx).txt +++ b/_pages/no_NO/homebrew-launcher-(pichaxx).txt @@ -4,9 +4,17 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. +
+{: .notice--info} -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE to run SafeB9SInstaller. +### Compatibility Notes + +These instructions work on USA, Europe, and Japan consoles as indicated by the letters U, E, or J after the system version. + +You will need a Nintendo Network ID to download Pokémon Picross. This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. {: .notice--warning} @@ -24,15 +32,8 @@ This process will overwrite your Pokémon Picross save file, if you have one. If #### Section I - Prep Work -1. Power on your device -1. Open the Nintendo eShop -1. Tap the Search icon (small magnifying glass) -1. Search for `picross` -1. Open the store page for Pokémon Picross -1. Download Pokémon Picross - + You can scan [this QR code](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=ESHOP://50010000037815&margin=0&qzone=1&size=400x400&ecc=L) using the Nintendo 3DS Camera for a direct link to the eShop app - + Your SD card must be inserted in your device to install Pokémon Picross -1. Slå av enheten +In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. + 1. Sett inn SD-kortet i datamaskinen din 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it @@ -40,8 +41,16 @@ This process will overwrite your Pokémon Picross save file, if you have one. If 1. Copy the `slotTool` folder from the unSAFE_MODE `.zip` to the `3ds` folder on your SD card 1. Copy the otherapp payload for your region/version from the unSAFE_MODE `.zip`'s `otherapps_with_CfgS` folder to the root of your SD card and rename it to `otherapp.bin` +![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }}) +{: .notice--info} + + #### Section II - PicHaxx +In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device. 1. Open [the PicHaxx Injector website](https://3ds.nhnarwhal.com/3dstools/pichaxx.php) on your computer 1. Select your `movable.sed` file 1. Select "Build and Download" diff --git a/_pages/no_NO/installing-boot9strap-(fredtool).txt b/_pages/no_NO/installing-boot9strap-(fredtool).txt index 8bad054e7d..8c0e2604b3 100644 --- a/_pages/no_NO/installing-boot9strap-(fredtool).txt +++ b/_pages/no_NO/installing-boot9strap-(fredtool).txt @@ -4,15 +4,16 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Table of Contents" %} -### Required Reading - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, for example from BannerBomb or the DSiWare Dumper tool. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). +
+Technical Details (optional) +

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+
+{: .notice--info} ### What You Need -* A DSiWare Backup (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) +* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -20,6 +21,8 @@ This is a currently working implementation of the "FIRM partitions known-plainte #### Section I - CFW Check +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + 1. Slå av enheten 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button @@ -30,17 +33,7 @@ If you see a configuration menu, you already have CFW, and continuing with these #### Section II - Prep Work -1. Slå av enheten -1. Sett inn SD-kortet i datamaskinen din -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card - - ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} - -#### Section III - Fredtool +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) @@ -53,19 +46,31 @@ If you see a configuration menu, you already have CFW, and continuing with these 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link +1. Sett inn SD-kortet i datamaskinen din 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` - + If the `Nintendo DSiWare` folder does not exist, create it inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` 1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder -1. Sett inn SD-kortet i konsollen igjen + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card + + ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} + +#### Section III - Overwriting DS Connection Settings + +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Haxxxxxxxxx!" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title 1. Select "Copy", then select "OK" 1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio #### Section IV - Flipnote Exploit @@ -73,6 +78,8 @@ If you see a configuration menu, you already have CFW, and continuing with these If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} +In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer. + 1. Complete the initial setup process for the launched game until you reach the main menu + Select the left option whenever prompted during the setup process 1. Using the touch-screen, select the large left box, then select the box with an SD card icon @@ -85,7 +92,7 @@ If you would prefer a visual guide to this section, one is available [here](http 1. Tap the fourth box with the letter "A" in it 1. If the exploit was successful, your device will have loaded b9sTool 1. Using the D-Pad, move to "Install boot9strap" - + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to start over from Step 12 of Section III + + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III 1. Press (A), then press START and SELECT at the same time to begin the process 1. Once completed and the bottom screen says "done.", exit b9sTool, then power off your device + You may have to force power off by holding the power button @@ -94,6 +101,8 @@ If you would prefer a visual guide to this section, one is available [here](http #### Section V - Luma3DS Verification +Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. + 1. Slå av enheten 1. Sett inn SD-kortet i datamaskinen din 1. Verify that a `luma` folder exists and that `config.ini` is inside of it @@ -106,13 +115,15 @@ At this point, your console will boot to Luma3DS by default. #### Section VI - Restoring DS Connection Settings -1. Copy the `42383841.bin` file from the `clean/` folder of the downloaded DSiWare archive (`output_(name).zip`) to the `Nintendo 3DS///Nintendo DSiWare/` folder on your SD card - + Replace the existing `42383841.bin` file +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one 1. Sett inn SD-kortet i konsollen igjen 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Nintendo DSi™" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title 1. Select "Copy", then select "OK" ___ diff --git a/_pages/no_NO/installing-boot9strap-(hbl-usm).txt b/_pages/no_NO/installing-boot9strap-(hbl-usm).txt index 0d4a2bee65..d3b6013f76 100644 --- a/_pages/no_NO/installing-boot9strap-(hbl-usm).txt +++ b/_pages/no_NO/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,16 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

As we already have Homebrew access, we can use slotTool to do this.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--danger} @@ -24,7 +27,10 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint #### Section I - Prep Work +In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. + 1. Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide + + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. Launch slotTool from the list of homebrew + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section 1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option @@ -36,22 +42,31 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint 1. Copy `usm.bin` from the unSAFE_MODE `.zip` to the root of your SD card 1. Put your SD card back into your console +![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} + #### Section II - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](https://uwuu.ca/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section III - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -65,6 +80,8 @@ At this point, your console will boot to Luma3DS by default. #### Section IV - Restoring WiFi Configuration Profiles +In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch the Download Play application 1. Wait until you see the two buttons + Do not press either of the buttons diff --git a/_pages/no_NO/installing-boot9strap-(soundhax).txt b/_pages/no_NO/installing-boot9strap-(soundhax).txt index e69b08698a..0035080b2a 100644 --- a/_pages/no_NO/installing-boot9strap-(soundhax).txt +++ b/_pages/no_NO/installing-boot9strap-(soundhax).txt @@ -4,7 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+
+{: .notice--info} + +### Compatibility Notes Soundhax (when combined with universal-otherapp) is compatible with versions 1.0.0 through 11.3.0 in all regions. @@ -21,6 +27,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Section I - Prep Work +In this section, you will copy the files needed to trigger both Soundhax and universal-otherapp. + 1. Slå av enheten 1. Sett inn SD-kortet i datamaskinen din 1. Copy the Soundhax `.m4a` to the root of your SD card @@ -33,11 +41,16 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 1. Sett inn SD-kortet i konsollen igjen 1. Power on your device - ![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} #### Section II - Launching SafeB9SInstaller +In this section, you will launch Soundhax through the Nintendo 3DS Sound app, which will use universal-otherapp to launch the boot9strap (custom firmware) installer. + 1. Sett inn SD-kortet i konsollen igjen 1. Power on your device 1. Åpne Nintendo 3DS Sound @@ -58,6 +71,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Section III - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap 1. Once it is complete, press (A) to reboot your device 1. Your device should have rebooted into the Luma3DS configuration menu diff --git a/_pages/no_NO/installing-boot9strap-(usm).txt b/_pages/no_NO/installing-boot9strap-(usm).txt index c9e095584f..894bb89acd 100644 --- a/_pages/no_NO/installing-boot9strap-(usm).txt +++ b/_pages/no_NO/installing-boot9strap-(usm).txt @@ -4,15 +4,17 @@ title: "Installing boot9strap (USM)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

We can do this using an existing exploit, BannerBomb3.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -29,6 +31,8 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will #### Section I - Prep Work +In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. + 1. If your device is powered on, power off your device 1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer 1. Upload your movable.sed using the "Choose File" option @@ -41,47 +45,51 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will 1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card 1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - + ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }}) - {: .notice--info} - + ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} + ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card 1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. + 1. Sett inn SD-kortet i konsollen igjen 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Select "Inject haxx" +1. Press (A) to select "Inject haxx" + Your device will automatically power off #### Section III - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section IV - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -95,16 +103,17 @@ At this point, your console will boot to Luma3DS by default. #### Section V - Restoring WiFi Configuration Profiles +In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text -1. Select "Restore slots" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) +1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + Your device will automatically reboot 1. Slå av enheten 1. Sett inn SD-kortet i datamaskinen din 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore ___ diff --git a/_pages/no_NO/seedminer.txt b/_pages/no_NO/seedminer.txt index 7bc400ae58..a2cb46ae35 100644 --- a/_pages/no_NO/seedminer.txt +++ b/_pages/no_NO/seedminer.txt @@ -4,52 +4,54 @@ title: "Seedminer" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

+

For information on how Seedminer works, see this presentation.

+

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+
+{: .notice--info} -To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. +### Section I - Prep Work -For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). - -This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. - -### Instructions - -#### Section I - Prep Work +In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. 1. Sett inn SD-kortet i datamaskinen din 1. Navigate to the `Nintendo 3DS` folder on your SD card -1. Copy the 32 character long name of the folder you see inside Nintendo 3DS - + Do not go inside any more folders - + If you see multiple 32 character long folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + + If you don't have a `Nintendo 3DS` folder, put your SD card into your 3DS and power it on so that the folder can be created +1. Copy the name of the 32-letter folder you see directly inside Nintendo 3DS + + This 32-letter name is system-specific and will be different for each console + + If you see multiple 32-letter folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + You can ignore the `private` folder if you have it - ![]({{ "/images/screenshots/id0-example.png" | absolute_url }}) + ![]({{ "/images/screenshots/seedminer/id0-example.png" | absolute_url }}) {: .notice--info} -1. Paste your 32 character long folder name into a document you can reference later - + This folder name is also known as your "ID0" +1. Paste your 32 character long folder name into [a document](/images/screenshots/seedminer/text-document.png) you can reference later + + This folder is known as your "ID0". Take note of this as this guide will refer to it as such later 1. Power on your device + Your SD card does not need to be inserted at this point 1. Go to your Friend List (the [orange Face Icon]({{ "/images/friend-list-icon.png" | absolute_url }}) in the top row of your HOME Menu) + If you receive an error and are kicked out of the menu, you either must create a new Mii or your device cannot connect to Nintendo's servers (due to a ban or connection issues) 1. Find your Mii profile, then find the "Friend Code" field on the top screen -#### Section II - Seedminer +### Section II - Seedminer + +In this section, you will use the Bruteforce Movable website to retrieve your device's encryption key in the form of `movable.sed`. 1. Open [Bruteforce Movable](https://seedminer.hacks.guide/) on your computer - + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) + If the site isn't working, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field - + Do not attempt to enter the ID0 by hand. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section + + Do not attempt to enter the ID0 manually, as it is easy to make a mistake. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section 1. Select "Go" + If the site immediately goes to step 4, the website has already correctly processed your bruteforce request. You can download your `movable.sed` file and continue to the next section. You do not need to re-add the bot -1. Use the "Register Friend" button on your device to add the bot's friend code as given by the website +1. Use the ["Register Friend" button](/images/screenshots/seedminer/register-friend.png) on your device to add the bot's friend code as given by the website + If prompted, the name that you give to the friend does not matter 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once 1. Once the site processes your information, the site will continue to `Step 2: Bruteforce` automatically 1. Wait for the remainder of the process to complete - + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour + + This is usually fast (1-5 minutes) + During this process, the bot you added may not show up on your 3DS. As long as the website updates, this is not an issue + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site @@ -57,7 +59,7 @@ This method uses a powerful graphics card to perform the calculations needed. A ___ -### Next Steps +### Next steps: Choose an exploit Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. diff --git a/_pages/pl_PL/bannerbomb3.txt b/_pages/pl_PL/bannerbomb3.txt index 00982e97dc..8d95f9244b 100644 --- a/_pages/pl_PL/bannerbomb3.txt +++ b/_pages/pl_PL/bannerbomb3.txt @@ -4,11 +4,15 @@ title: "BannerBomb3" {% include toc title="Spis Treści" %} -### Wymagana Lektura +
+Technical Details (optional) +

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

For a more technical explanation, see here.

+
+{: .notice--info} -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -20,6 +24,9 @@ If you have a Taiwanese console (indicated by a T after the system version), fol * Twojego pliku `movable.sed` z ukończenia [Seedminer](seedminer) #### Sekcja I - Przygotowanie + +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + 1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer 1. Upload your movable.sed using the "Choose File" option 1. Click "Build and Download" @@ -27,28 +34,31 @@ If you have a Taiwanese console (indicated by a T after the system version), fol 1. If your console is powered on, power off your console 1. Włóż kartę SD do komputera 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from the BannerBomb3 `.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. + 1. Włóż ponownie kartę SD do konsoli 1. Włącz konsolę 1. Uruchom "System Settings" na twoim urządzeniu -1. Przejdź do `Data Management` -> `DSiWare` -1. Click on the SD Card section +1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked 1. Wyłącz konsolę 1. Włóż kartę SD do komputera -1. You should now have `42383841.bin` in SD root. This is the DSiWare backup you will use later in the guide -1. Przejdź kolejno do katalogów `Nintendo 3DS` -> `` -> `<32-znakowe-id>` -> `Nintendo DSiWare` na karcie SD - + Twoje `` będzie takie samo jak te użyte przez Ciebie w [Seedminer](seedminer) -1. Delete `F00D43D5.bin` from the Nintendo DSiWare folder and from your computer. This file will not be needed anymore +1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore + Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} diff --git a/_pages/pl_PL/finalizing-setup.txt b/_pages/pl_PL/finalizing-setup.txt index 581d933cbc..4c376523e1 100644 --- a/_pages/pl_PL/finalizing-setup.txt +++ b/_pages/pl_PL/finalizing-setup.txt @@ -20,6 +20,8 @@ On this page, we will make critical system file backups and install the followin It is not recommended to skip downloading any of these applications, as many of them will be used later on this page. At the end of this page, your SD card will be cleaned up by removing unnecessary installation files. {: .notice--warning} +### Compatibility Notes + If your **New 3DS** was on version 2.1.0 before following this guide, you should [restore your NAND backup](godmode9-usage#restoring-a-nand-backup) before continuing. {: .notice--warning} @@ -39,6 +41,8 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o #### Sekcja I - Przygotowanie +In this section, you will copy the files necessary to follow the rest of the instructions on this page. + 1. Wyłącz konsolę 1. Włóż kartę SD do komputera 1. Stwórz folder o nazwie `cias` w katalogu głównym karty SD, jeśli jeszcze nie istnieje @@ -52,15 +56,20 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o 1. Włóż ponownie kartę SD do konsoli 1. Włącz konsolę - ![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) - {: .notice--info} - ![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) - {: .notice--info} +The screenshots below indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. + +![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) +{: .notice--info} + -These screenshots indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. #### Sekcja II - Aktualizacja Systemu +In this section, you will update your system to the latest version, which is safe to do with custom firmware. + 1. Zaktualizuj swoją konsolę wchodząc w System Settings i "Other Settings". Następnie przejedź na sam koniec w prawo i użyj "System Update" + Aktualizacje podczas używania B9S + Luma (tego co masz) są bezpieczne + The updater may display a message saying "Your system is up to date" instead of updating. This is normal if you are already up to date; continue with the next section @@ -69,6 +78,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Sekcja III - Homebrew Launcher +In this section, you will temporarily replace Download Play with Homebrew Launcher (which we need to launch FBI). Download Play will automatically go back to normal once you reboot your device. + 1. Uruchom aplikację "Download Play" (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. Wait until you see the `Nintendo 3DS` and `Nintendo DS` buttons 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu @@ -83,6 +94,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section IV - RTC and DSP Setup +In this section, you will sync your 3DS internal clock with the actual time and dump the sound firmware (which is necesssary for some homebrew software to use sound properly). + 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu 1. Wybierz "Miscellaneous options" 1. Select "Dump DSP firmware" @@ -94,6 +107,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section V - Installing CIAs +In this section, you will install several useful homebrew applications to HOME Menu. + 1. Uruchom FBI z listy Homebrew 1. Przejdź do `SD` -> `cias` 1. Wybierz "\" @@ -102,6 +117,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Sekcja VI - CTRNAND Luma3DS +In this section, you will use a script to copy some of Luma3DS's files to internal memory so that they can be accessed, even without an SD card inserted. + 1. Wyłącz konsolę 1. Press and hold (Start), and while holding (Start), power on your device. This will launch GodMode9 + If you do not boot into GodMode9, ensure that `GodMode9.firm` is in `/luma/payloads/` and that `payloads` is correctly spelled @@ -118,6 +135,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Sekcja VII - Czyszczenie Karty SD +In this section, you will use a script to remove some unnecessary files from your SD card. + 1. Wybierz "Cleanup SD Card" 1. Kiedy zostaniesz poproszony, naciśnij (A) aby kontynuować 1. Naciśnij (A), aby kontynuować @@ -125,6 +144,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Sekcja VIII - Kopia Zapasowa Niezbędnych Plików +In this section, you will make backups of flies that can be used to recover from softwaer bricks or to recover data. + 1. Wybierz "Backup Options" 1. Wybierz "SysNAND Backup" 1. Naciśnij (A) aby potwierdzić @@ -159,7 +180,7 @@ You're done! Custom firmware is now fully configured on your device. Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! {: .notice--info} -#### Uwagi i Informacje +### Information and Notes {% capture notice-6 %} Here are some key combos that you should know: diff --git a/_pages/pl_PL/homebrew-launcher-(pichaxx).txt b/_pages/pl_PL/homebrew-launcher-(pichaxx).txt index 9393501cb4..5e722d8bc2 100644 --- a/_pages/pl_PL/homebrew-launcher-(pichaxx).txt +++ b/_pages/pl_PL/homebrew-launcher-(pichaxx).txt @@ -4,9 +4,17 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Spis Treści" %} -### Wymagana Lektura +
+Technical Details (optional) +This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. +
+{: .notice--info} -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE to run SafeB9SInstaller. +### Compatibility Notes + +These instructions work on USA, Europe, and Japan consoles as indicated by the letters U, E, or J after the system version. + +You will need a Nintendo Network ID to download Pokémon Picross. This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. {: .notice--warning} @@ -24,15 +32,8 @@ This process will overwrite your Pokémon Picross save file, if you have one. If #### Sekcja I - Przygotowanie -1. Włącz konsolę -1. Open the Nintendo eShop -1. Tap the Search icon (small magnifying glass) -1. Search for `picross` -1. Open the store page for Pokémon Picross -1. Download Pokémon Picross - + You can scan [this QR code](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=ESHOP://50010000037815&margin=0&qzone=1&size=400x400&ecc=L) using the Nintendo 3DS Camera for a direct link to the eShop app - + Your SD card must be inserted in your device to install Pokémon Picross -1. Wyłącz konsolę +In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. + 1. Włóż kartę SD do komputera 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it @@ -40,8 +41,16 @@ This process will overwrite your Pokémon Picross save file, if you have one. If 1. Copy the `slotTool` folder from the unSAFE_MODE `.zip` to the `3ds` folder on your SD card 1. Copy the otherapp payload for your region/version from the unSAFE_MODE `.zip`'s `otherapps_with_CfgS` folder to the root of your SD card and rename it to `otherapp.bin` +![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }}) +{: .notice--info} + + #### Section II - PicHaxx +In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device. 1. Open [the PicHaxx Injector website](https://3ds.nhnarwhal.com/3dstools/pichaxx.php) on your computer 1. Wybierz swój plik `movable.sed` 1. Select "Build and Download" diff --git a/_pages/pl_PL/installing-boot9strap-(fredtool).txt b/_pages/pl_PL/installing-boot9strap-(fredtool).txt index c504abf8f3..36fd77d2ba 100644 --- a/_pages/pl_PL/installing-boot9strap-(fredtool).txt +++ b/_pages/pl_PL/installing-boot9strap-(fredtool).txt @@ -4,15 +4,16 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Spis Treści" %} -### Wymagana Lektura - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, for example from BannerBomb or the DSiWare Dumper tool. - -To obecnie działająca implementacja luki: "FIRM partitions known-plaintext" szczegółowo opisanej [tutaj] (https://www.3dbrew.org/wiki/3DS_System_Flaws). +
+Technical Details (optional) +

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+
+{: .notice--info} ### Czego Potrzebujesz -* A DSiWare Backup (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) +* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Twojego pliku `movable.sed` z ukończenia [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -20,6 +21,8 @@ To obecnie działająca implementacja luki: "FIRM partitions known-plaintext" sz #### Section I - CFW Check +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + 1. Wyłącz konsolę 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button @@ -30,17 +33,7 @@ If you see a configuration menu, you already have CFW, and continuing with these #### Sekcja II - Przygotowanie -1. Wyłącz konsolę -1. Włóż kartę SD do komputera -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Skopiuj plik `boot.nds` (B9STool) do katalogu głównego karty SD -1. Skopiuj folder `private` z katalogu Frogminer_save `.zip` do głównego katalogu Twojej karty SD - - ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} - -#### Section III - Fredtool +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) @@ -53,19 +46,31 @@ If you see a configuration menu, you already have CFW, and continuing with these 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link +1. Włóż kartę SD do komputera 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` - + If the `Nintendo DSiWare` folder does not exist, create it inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` 1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder -1. Włóż ponownie kartę SD do konsoli + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Skopiuj plik `boot.nds` (B9STool) do katalogu głównego karty SD +1. Skopiuj folder `private` z katalogu Frogminer_save `.zip` do głównego katalogu Twojej karty SD + + ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} + +#### Section III - Overwriting DS Connection Settings + +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + 1. Włącz konsolę 1. Uruchom "System Settings" na twoim urządzeniu -1. Przejdź do `Data Management` -> `DSiWare` -1. W sekcji "SD Card" wybierz aplikację "Haxxxxxxxxx!" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title 1. Wybierz "Copy", a następnie "OK" 1. Wróć do głównego menu System Settings (ustawień systemowych) -1. Przejdź do `Internet Settings` -> `Nintendo DS Connections`, następnie naciśnij "OK" +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. Jeżeli exploit zadziałał, na urządzeniu uruchomi się Japońska wersja Flipnote Studio #### Section IV - Flipnote Exploit @@ -73,6 +78,8 @@ If you see a configuration menu, you already have CFW, and continuing with these Jeśli wolisz skorzystać z obrazkowego poradnika dotyczącego tej sekcji przejdź [tutaj](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} +In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer. + 1. Przejdź przez proces konfiguracji wstępnej aplikacji dopóki nie dojdziesz do głównego menu + Jeśli będziesz miał wybór, zawsze wybieraj opcję po lewej stronie ekranu 1. Używając ekranu dotykowego, wybierz duży lewy kwadrat, następnie wybierz kwadrat z ikoną karty SD @@ -85,7 +92,7 @@ Jeśli wolisz skorzystać z obrazkowego poradnika dotyczącego tej sekcji przejd 1. Wciśnij czwarty przycisk, na którym widnieje litera "A" 1. Jeżeli exploit zadziałał poprawnie, na Twoim urządzeniu został załadowany b9sTool 1. Using the D-Pad, move to "Install boot9strap" - + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to start over from Step 12 of Section III + + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III 1. Press (A), then press START and SELECT at the same time to begin the process 1. Once completed and the bottom screen says "done.", exit b9sTool, then power off your device + Możliwe, że będziesz musiał wymusić wyłączenie 3DS'a poprzez przytrzymanie przycisku zasilania @@ -94,6 +101,8 @@ Jeśli wolisz skorzystać z obrazkowego poradnika dotyczącego tej sekcji przejd #### Section V - Luma3DS Verification +Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. + 1. Wyłącz konsolę 1. Włóż kartę SD do komputera 1. Verify that a `luma` folder exists and that `config.ini` is inside of it @@ -106,13 +115,15 @@ At this point, your console will boot to Luma3DS by default. #### Section VI - Restoring DS Connection Settings -1. Copy the `42383841.bin` file from the `clean/` folder of the downloaded DSiWare archive (`output_(name).zip`) to the `Nintendo 3DS///Nintendo DSiWare/` folder on your SD card - + Nadpisz istniejący plik `42383841.bin` +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one 1. Włóż ponownie kartę SD do konsoli 1. Włącz konsolę 1. Uruchom "System Settings" na twoim urządzeniu -1. Przejdź do `Data Management` -> `DSiWare` -1. W sekcji "SD Card", wybierz aplikację "Nintendo DSi™" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title 1. Wybierz "Copy", a następnie "OK" ___ diff --git a/_pages/pl_PL/installing-boot9strap-(hbl-usm).txt b/_pages/pl_PL/installing-boot9strap-(hbl-usm).txt index 1506765148..8fefe59d17 100644 --- a/_pages/pl_PL/installing-boot9strap-(hbl-usm).txt +++ b/_pages/pl_PL/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,16 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Spis Treści" %} -### Wymagana Lektura +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

As we already have Homebrew access, we can use slotTool to do this.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--danger} @@ -24,7 +27,10 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint #### Sekcja I - Przygotowanie +In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. + 1. Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide + + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. Launch slotTool from the list of homebrew + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section 1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option @@ -36,22 +42,31 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint 1. Copy `usm.bin` from the unSAFE_MODE `.zip` to the root of your SD card 1. Put your SD card back into your console +![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} + #### Section II - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](https://uwuu.ca/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Sekcja III - Instalacja boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -65,6 +80,8 @@ At this point, your console will boot to Luma3DS by default. #### Section IV - Restoring WiFi Configuration Profiles +In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Uruchom aplikację Download Play 1. Wait until you see the two buttons + Do not press either of the buttons diff --git a/_pages/pl_PL/installing-boot9strap-(soundhax).txt b/_pages/pl_PL/installing-boot9strap-(soundhax).txt index fb17a212f1..03c49efb1f 100644 --- a/_pages/pl_PL/installing-boot9strap-(soundhax).txt +++ b/_pages/pl_PL/installing-boot9strap-(soundhax).txt @@ -4,7 +4,13 @@ title: "Instalacja boot9strap (Soundhax)" {% include toc title="Spis Treści" %} -### Wymagana Lektura +
+Technical Details (optional) +

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+
+{: .notice--info} + +### Compatibility Notes Soundhax (when combined with universal-otherapp) is compatible with versions 1.0.0 through 11.3.0 in all regions. @@ -21,6 +27,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Sekcja I - Przygotowanie +In this section, you will copy the files needed to trigger both Soundhax and universal-otherapp. + 1. Wyłącz konsolę 1. Włóż kartę SD do komputera 1. Skopiuj Soundhax `.m4a` do głównego katalogu twojej karty SD @@ -33,11 +41,16 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 1. Włóż ponownie kartę SD do konsoli 1. Włącz konsolę - ![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} #### Sekcja II - Uruchamianie SafeB9SInstaller +In this section, you will launch Soundhax through the Nintendo 3DS Sound app, which will use universal-otherapp to launch the boot9strap (custom firmware) installer. + 1. Włóż ponownie kartę SD do konsoli 1. Włącz konsolę 1. Uruchom aplikację Nintendo 3DS Sound @@ -58,6 +71,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Sekcja III - Instalacja boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap 1. Once it is complete, press (A) to reboot your device 1. Twoje urządzenie powinno uruchomić się ponownie i załadować menu konfiguracji Luma3DS diff --git a/_pages/pl_PL/installing-boot9strap-(usm).txt b/_pages/pl_PL/installing-boot9strap-(usm).txt index 45839ede71..53dceeda72 100644 --- a/_pages/pl_PL/installing-boot9strap-(usm).txt +++ b/_pages/pl_PL/installing-boot9strap-(usm).txt @@ -4,15 +4,17 @@ title: "Installing boot9strap (USM)" {% include toc title="Spis Treści" %} -### Wymagana Lektura +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

We can do this using an existing exploit, BannerBomb3.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -29,6 +31,8 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will #### Sekcja I - Przygotowanie +In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. + 1. If your device is powered on, power off your device 1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer 1. Upload your movable.sed using the "Choose File" option @@ -41,47 +45,51 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will 1. Skopiuj `boot9strap.firm` i `boot9strap.firm.sha` z boot9strap `.zip` do folderu `/boot9strap/` na karcie SD 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card 1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - + ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }}) - {: .notice--info} - + ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} + ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card 1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. + 1. Włóż ponownie kartę SD do konsoli 1. Włącz konsolę 1. Uruchom "System Settings" na twoim urządzeniu -1. Przejdź do `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Select "Inject haxx" +1. Press (A) to select "Inject haxx" + Your device will automatically power off #### Section III - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section IV - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -95,16 +103,17 @@ At this point, your console will boot to Luma3DS by default. #### Section V - Restoring WiFi Configuration Profiles +In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Uruchom "System Settings" na twoim urządzeniu -1. Przejdź do `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text -1. Select "Restore slots" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) +1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + Your device will automatically reboot 1. Wyłącz konsolę 1. Włóż kartę SD do komputera 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore ___ diff --git a/_pages/pl_PL/seedminer.txt b/_pages/pl_PL/seedminer.txt index 0be32171c5..5abd0c908a 100644 --- a/_pages/pl_PL/seedminer.txt +++ b/_pages/pl_PL/seedminer.txt @@ -4,52 +4,54 @@ title: "Seedminer" {% include toc title="Spis Treści" %} -### Wymagana Lektura +
+Technical Details (optional) +

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

+

For information on how Seedminer works, see this presentation.

+

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+
+{: .notice--info} -To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. +### Section I - Prep Work -For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). - -Metoda ta wymaga użycia wydajnej karty graficznej, aby wykonać potrzebne obliczenia. Strona prowadzona przez wolontariuszy zostanie użyta w celu pomocy Ci z tą metodą. - -### Instrukcje - -#### Sekcja I - Przygotowanie +In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. 1. Włóż kartę SD do komputera 1. Przejdź do folderu `Nintendo 3DS` na karcie SD -1. Skopiuj 32 znakową nazwę folderu który widzisz w folderze Nintendo 3DS - + Nie wchodź w żadne inne foldery - + If you see multiple 32 character long folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + + If you don't have a `Nintendo 3DS` folder, put your SD card into your 3DS and power it on so that the folder can be created +1. Copy the name of the 32-letter folder you see directly inside Nintendo 3DS + + This 32-letter name is system-specific and will be different for each console + + If you see multiple 32-letter folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + You can ignore the `private` folder if you have it - ![]({{ "/images/screenshots/id0-example.png" | absolute_url }}) + ![]({{ "/images/screenshots/seedminer/id0-example.png" | absolute_url }}) {: .notice--info} -1. Wklej skopiowaną 32 znakową nazwę folderu do np. notatnika i zapisz w łatwo dostępnym miejscu na komputerze - + Nazwa folderu, która została skopiowana to Twoje tzw. "ID0" +1. Paste your 32 character long folder name into [a document](/images/screenshots/seedminer/text-document.png) you can reference later + + This folder is known as your "ID0". Take note of this as this guide will refer to it as such later 1. Włącz konsolę + Your SD card does not need to be inserted at this point 1. Go to your Friend List (the [orange Face Icon]({{ "/images/friend-list-icon.png" | absolute_url }}) in the top row of your HOME Menu) + If you receive an error and are kicked out of the menu, you either must create a new Mii or your device cannot connect to Nintendo's servers (due to a ban or connection issues) 1. Wejdź na profil swojego Mii, a następnie znajdź pole "Friend Code" na górnym ekranie -#### Section II - Seedminer +### Section II - Seedminer + +In this section, you will use the Bruteforce Movable website to retrieve your device's encryption key in the form of `movable.sed`. 1. Open [Bruteforce Movable](https://seedminer.hacks.guide/) on your computer - + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) + If the site isn't working, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field - + Do not attempt to enter the ID0 by hand. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section + + Do not attempt to enter the ID0 manually, as it is easy to make a mistake. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section 1. Select "Go" + If the site immediately goes to step 4, the website has already correctly processed your bruteforce request. You can download your `movable.sed` file and continue to the next section. You do not need to re-add the bot -1. Use the "Register Friend" button on your device to add the bot's friend code as given by the website +1. Use the ["Register Friend" button](/images/screenshots/seedminer/register-friend.png) on your device to add the bot's friend code as given by the website + If prompted, the name that you give to the friend does not matter 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once 1. Once the site processes your information, the site will continue to `Step 2: Bruteforce` automatically 1. Wait for the remainder of the process to complete - + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour + + This is usually fast (1-5 minutes) + During this process, the bot you added may not show up on your 3DS. As long as the website updates, this is not an issue + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site @@ -57,7 +59,7 @@ Metoda ta wymaga użycia wydajnej karty graficznej, aby wykonać potrzebne oblic ___ -### Next Steps +### Next steps: Choose an exploit Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. diff --git a/_pages/pt_BR/bannerbomb3.txt b/_pages/pt_BR/bannerbomb3.txt index 5ffa8fb08f..a88f8f8d51 100644 --- a/_pages/pt_BR/bannerbomb3.txt +++ b/_pages/pt_BR/bannerbomb3.txt @@ -4,11 +4,15 @@ title: "BannerBomb3" {% include toc title="Tabela de Conteúdo" %} -### Leitura Obrigatória +
+Technical Details (optional) +

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

For a more technical explanation, see here.

+
+{: .notice--info} -Para copiar o sistema DSiWare, nos executamos um exploit na janela do Gerenciador de Dados do DSiWare no aplicativo Configuração do Console. - -Para alcançar isso, usamos a sua chave de encriptação (movable.sed) para montar um backup do DSiWare que faz um exploit no sistema com o objetivo fazer um dump das Conexões Nintendo DS para a raíz do SD. +### Compatibility Notes Essas instruções funcionam nas versões de consoles EUA, Europa, Japão e Coréia, indicadas pelas letras U, E, J ou K após a versão do sistema. @@ -20,6 +24,9 @@ Se você tiver um console tailandês (indicado por um T após a versão do siste Seu arquivo 'movable.sed' baixado ao completar o processo [Seedminer](seedminer) #### Seção I - Preparação + +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + 1. Abra [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) no seu computador 1. Envie seu movable.sed usando a opção "Choose File" 1. Clique em "Build and Download" @@ -27,28 +34,31 @@ Seu arquivo 'movable.sed' baixado ao completar o processo [Seedminer](seedminer) 1. Se seu console estiver ligado, desligue-o 1. Insira o cartão SD no seu computador 1. Navegue até `Nintendo 3DS` -> `` ->` em seu cartão SD - + O `` será o mesmo que você usou em [Seedminer](seedminer) - + O `` é uma pasta de 32 caracteres dentro do `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Crie uma pasta chamada `Nintendo DSiWare` dentro do `` + Se você já teve a pasta *e* já existe algum arquivo de backup de DSiWare existente (`. dentro) dentro, copie-os para seu PC e remova-os do seu cartão SD -1. Copie o arquivo `F00D43D5.bin` do `.zip` do BannerBomb3 para a pasta `Nintendo DSiWare` +1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Seção II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. + 1. Reinsira seu cartão SD no seu dispositivo 1. Ligue o seu dispositivo 1. Abra a Configuração do Console em seu dispositivo -1. Vá até `Gerenciador de Dados` -> `DSiWare` -1. Clique na seção do cartão SD +1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + Seu sistema deve piscar na cor Magenta (rosa/roxo) e então travar alguns segundos depois. Isso significa que funcionou 1. Desligue o seu dispositivo 1. Insira o cartão SD no seu computador -1. Você agora deveria ter um arquivo `42383841.bin` na raíz do seu cartão SD. Esse é o arquivo de backup do DSiWare que você usará mais adiante nesse guia -1. Navegue até `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` no seu cartão SD - + Este `` é o mesmo que você usou em [Seedminer](seedminer) -1. Apague o arquivo `F00D43D5.bin` da pasta Nintendo DSiWare e também do seu computador. Esse arquivo não será mais necessário +1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page +1. Navegue até `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` no seu cartão SD +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. Esse arquivo não será mais necessário + Continue em [Instalando boot9strap (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} diff --git a/_pages/pt_BR/finalizing-setup.txt b/_pages/pt_BR/finalizing-setup.txt index b8274fcdb1..b78b22c4a6 100644 --- a/_pages/pt_BR/finalizing-setup.txt +++ b/_pages/pt_BR/finalizing-setup.txt @@ -20,6 +20,8 @@ Nesta página, faremos backups de arquivos críticos do sistema e instalaremos o Não é recomendável ignorar o download de qualquer um desses aplicativos, já que muitos deles serão usados mais tarde nesta página. No final desta página, seu cartão SD será limpo através da remoção arquivos de instalação desnecessários. {: .notice--warning} +### Compatibility Notes + Se o seu **New 3DS** estava na versão 2.1.0 antes de seguir este guia, você deve [restaurar o seu backup da NAND](godmode9-usage#restoring-a-nand-backup) antes de continuar. {: .notice--warning} @@ -39,6 +41,8 @@ Se a sua instalação do CFW anterior era baseada em EmuNAND e você deseja move #### Seção I - Preparação +In this section, you will copy the files necessary to follow the rest of the instructions on this page. + 1. Desligue seu dispositivo 1. Insira o cartão SD no seu computador 1. Crie uma pasta chamada `cias` na raiz do seu cartão SD se ela ainda não existir @@ -52,15 +56,20 @@ Se a sua instalação do CFW anterior era baseada em EmuNAND e você deseja move 1. Reinsira seu cartão SD no seu dispositivo 1. Ligue o seu dispositivo - ![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) - {: .notice--info} - ![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) - {: .notice--info} +The screenshots below indicate the minimum SD card layout that is required to follow this page. Você pode ter arquivos ou pastas extras no seu cartão SD, dependendo da sua instalação anterior ou do método que você seguiu. + +![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) +{: .notice--info} + -Estas capturas de tela indicam o layout mínimo do cartão SD que é necessário para seguir esta página. Você pode ter arquivos ou pastas extras no seu cartão SD, dependendo da sua instalação anterior ou do método que você seguiu. #### Seção II - Atualização do Sistema +In this section, you will update your system to the latest version, which is safe to do with custom firmware. + 1. Atualize seu dispositivo indo em Configuração do console, depois "Outras Configurações, depois indo para a direita até o final e selecionando "Atualização" + Atualizações feitas enquanto usa B9S + Luma (o que você tem) são seguras + O atualizador pode exibir uma mensagem dizendo "Seu sistema está atualizado" ao invés de atualizar. Isso é normal se você já está atualizado; continue com a próxima seção @@ -69,6 +78,8 @@ Estas capturas de tela indicam o layout mínimo do cartão SD que é necessário #### Seção III - Homebrew Launcher +In this section, you will temporarily replace Download Play with Homebrew Launcher (which we need to launch FBI). Download Play will automatically go back to normal once you reboot your device. + 1. Abra o aplicativo Download Play (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. Aguarde até ver os botões `Nintendo 3DS` e `Nintendo DS` 1. Aperte (Gatilho Esquerdo) + (D-pad pra baixo) + (Select) ao mesmo tempo para abrir o menu Rosalina @@ -83,6 +94,8 @@ Estas capturas de tela indicam o layout mínimo do cartão SD que é necessário #### Seção IV - Configuração do RTC e DSP +In this section, you will sync your 3DS internal clock with the actual time and dump the sound firmware (which is necesssary for some homebrew software to use sound properly). + 1. Aperte (Gatilho Esquerdo) + (D-pad pra baixo) + (Select) ao mesmo tempo para abrir o menu Rosalina 1. Selecione "Miscellaneous options" 1. Selecione "Dump DSP firmware" @@ -94,6 +107,8 @@ Estas capturas de tela indicam o layout mínimo do cartão SD que é necessário #### Seção V - Instalando CIAs +In this section, you will install several useful homebrew applications to HOME Menu. + 1. Abra o FBI da lista de homebrews 1. Navegue para `SD` -> `cias` 1. Selecione "\" @@ -102,6 +117,8 @@ Estas capturas de tela indicam o layout mínimo do cartão SD que é necessário #### Seção VI - Luma3DS no CTRNAND +In this section, you will use a script to copy some of Luma3DS's files to internal memory so that they can be accessed, even without an SD card inserted. + 1. Desligue seu dispositivo 1. Pressione e segure (Start), e enquanto segura (Start), ligue seu dispositivo. Isso vai inicializar o GodMode9 + Se você não inicializar no GodMode9, certifique-se que `GodMode9.firm` esteja em `/luma/payloads/` e que `payloads` esteja corretamente escrito @@ -118,6 +135,8 @@ Estas capturas de tela indicam o layout mínimo do cartão SD que é necessário #### Seção VII - Limpando o cartão SD +In this section, you will use a script to remove some unnecessary files from your SD card. + 1. Selecione "Cleanup SD Card" 1. Quando solicitado, aperte (A) para prosseguir 1. Aperte (A) para continuar @@ -125,6 +144,8 @@ Estas capturas de tela indicam o layout mínimo do cartão SD que é necessário #### Seção VIII - Backup de arquivos essenciais +In this section, you will make backups of flies that can be used to recover from softwaer bricks or to recover data. + 1. Selecione "Backup Options" 1. Selecione "SysNAND Backup" 1. Aperte (A) para confirmar @@ -159,7 +180,7 @@ Você terminou! Custom firmware agora está totalmente configurado no seu dispos Olá! Estamos interessados em comentários sobre a experiência geral do nosso guia. Se você quiser ajudar, confira a pesquisa [aqui](https://forms.gle/vZNoc4QLCz5MEXCK7) (disponível somente em inglês). Obrigado! {: .notice--info} -#### Notas e informações +### Information and Notes {% capture notice-6 %} Aqui estão alguns combos que você deve saber: diff --git a/_pages/pt_BR/homebrew-launcher-(pichaxx).txt b/_pages/pt_BR/homebrew-launcher-(pichaxx).txt index 162c7d7de3..3a4eba3079 100644 --- a/_pages/pt_BR/homebrew-launcher-(pichaxx).txt +++ b/_pages/pt_BR/homebrew-launcher-(pichaxx).txt @@ -4,9 +4,17 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Tabela de Conteúdo" %} -### Leitura Obrigatória +
+Technical Details (optional) +This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. +
+{: .notice--info} -Este método de usar o Seedminer para exploiting usa seu `movable.sed` para escrever um save personalizado para Pokémon Picross, que pode então ser usado com unSAFE_MODE para executar SafeB9SInstaller. +### Compatibility Notes + +These instructions work on USA, Europe, and Japan consoles as indicated by the letters U, E, or J after the system version. + +You will need a Nintendo Network ID to download Pokémon Picross. Esse processo irá substituir seu save de Pokémon Picross, se você tiver um. Se você deseja preservar seus dados, você deve fazer um backup de seu arquivo `00000001.sav` antes de substituí-lo. {: .notice--warning} @@ -24,15 +32,8 @@ Esse processo irá substituir seu save de Pokémon Picross, se você tiver um. S #### Seção I - Preparação -1. Ligue o seu dispositivo -1. Abra a Nintendo eShop -1. Toque no ícone Pesquisar (pequena lupa) -1. Procure por `picross` -1. Abra a página da loja para Pokémon Picross -1. Instale Pokémon Picross - + Você pode escanear [este código QR](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=ESHOP://50010000037815&margin=0&qzone=1&size=400x400&ecc=L) usando a Câmera Nintendo 3DS para um link direto para o aplicativo na eShop - + Seu cartão SD deve estar inserido no seu dispositivo para instalar o Pokémon Picross -1. Desligue seu dispositivo +In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. + 1. Insira o cartão SD no seu computador 1. Copie `boot.firm` e `boot.3dsx` do `.zip` do Luma3DS para a raiz do seu cartão SD + A raiz do cartão SD refere-se ao diretório inicial no seu cartão SD onde você pode ver a pasta Nintendo 3DS, mas não está dentro dela @@ -40,8 +41,16 @@ Esse processo irá substituir seu save de Pokémon Picross, se você tiver um. S 1. Copie a pasta `slotTool` do `.zip` unSAFE_MODE para a pasta `3ds` no seu cartão SD 1. Copie o payload do otherapp de sua região/versão do unSAFE_MODE `.zip` da pasta `otherapps_with_CfgS` para a raiz do seu cartão SD e renomeie para `otherapp.bin` +![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }}) +{: .notice--info} + + #### Seção II - PicHaxx +In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device. 1. Abra [o site do PicHaxx Injector](https://3ds.nhnarwhal.com/3dstools/pichaxx.php) no seu computador 1. Selecione o seu arquivo `movable.sed` 1. Selecione "Build and Download" diff --git a/_pages/pt_BR/installing-boot9strap-(fredtool).txt b/_pages/pt_BR/installing-boot9strap-(fredtool).txt index 7436422a79..0c6e8c4540 100644 --- a/_pages/pt_BR/installing-boot9strap-(fredtool).txt +++ b/_pages/pt_BR/installing-boot9strap-(fredtool).txt @@ -4,15 +4,16 @@ title: "Instalando boot9strap (Fredtool)" {% include toc title="Tabela de Conteúdo" %} -### Leitura Obrigatória - -Este método de usar o Seedminer para exploiting usa seu arquivo `movable.sed` para descriptografar qualquer aplicativo DSiWare para fins de injetar um título de DSiWare exploitable nas Configurações de Internet do DS. Isto requer que você tenha um backup do DSiWare, por exemplo, do BannerBomb ou DSiWare Dumper tool. - -Esta é uma implementação funcional do exploit "FIRM partitions known-plaintext" detalhado [aqui](https://www.3dbrew.org/wiki/3DS_System_Flaws). +
+Technical Details (optional) +

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+
+{: .notice--info} ### O que é necessário -* Um backup do DSiWare (Você deve ter um na raiz do seu cartão SD após completar [BannerBomb3](bannerbomb3)) +* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Seu arquivo `movable.sed` de completar [Seedminer](seedminer) * A versão mais recente do [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * A versão mais recente do [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -20,6 +21,8 @@ Esta é uma implementação funcional do exploit "FIRM partitions known-plaintex #### Seção I - Checando por CFW +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + 1. Desligue seu dispositivo 1. Segure o botão (Select) 1. Ligue seu dispositivo enquanto segura o botão (Select) @@ -30,17 +33,7 @@ Se você ver um menu de configuração, você já tem CFW e continuar com estas ### Seção II - Preparação -1. Desligue seu dispositivo -1. Insira o cartão SD no seu computador -1. Copie `boot.firm` e `boot.3dsx` do `.zip` do Luma3DS para a raiz do seu cartão SD - + A raiz do cartão SD refere-se ao diretório inicial no seu cartão SD onde você pode ver a pasta Nintendo 3DS, mas não está dentro dela -1. Copie `boot.nds` (B9STool) para a raiz o seu cartão SD -1. Copie a pasta `private` do `.zip` do Frogminer_save para a raiz do seu cartão SD - - ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} - -#### Seção III - Fredtool +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. 1. Abra o site [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) no seu computador 1. Sob o campo "Username", digite qualquer nome alfanumérico (sem espaços ou caracteres especiais) @@ -53,19 +46,31 @@ Se você ver um menu de configuração, você já tem CFW e continuar com estas 1. Click on the first search result + This result should have the latest timestamp 1. Clique no link "output_(nome).zip" +1. Insira o cartão SD no seu computador 1. Navegue até `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` no seu cartão SD - + O `` será o mesmo que você usou em [Seedminer](seedminer) - + O `` é uma pasta de 32 caracteres dentro do `` - Se a pasta `Nintendo DSiWare` não existir, crie-a dentro da pasta `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` 1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder -1. Reinsira seu cartão SD no seu dispositivo + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copie `boot.firm` e `boot.3dsx` do `.zip` do Luma3DS para a raiz do seu cartão SD + + A raiz do cartão SD refere-se ao diretório inicial no seu cartão SD onde você pode ver a pasta Nintendo 3DS, mas não está dentro dela +1. Copie `boot.nds` (B9STool) para a raiz o seu cartão SD +1. Copie a pasta `private` do `.zip` do Frogminer_save para a raiz do seu cartão SD + + ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} + +#### Section III - Overwriting DS Connection Settings + +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + 1. Ligue o seu dispositivo 1. Abra a Configuração do Console em seu dispositivo -1. Navegue para `Gerenciamento de Dados` -> `DSiWare` -1. Na seção "Cartão SD", selecione o aplicativo "Haxxxxxxxxxxx!" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title 1. Selecione "Copy", então selecione "OK" 1. Retorne ao menu principal da Configuração do Console -1. Navegue até `Configurações da Internet` -> `Conexões Nintendo DS`, então selecione "OK" +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. Se o exploit foi bem sucedido, seu dispositivo irá abrir a versão JPN do Flipnote Studio #### Seção IV - Flipnote Exploit @@ -73,6 +78,8 @@ Se você ver um menu de configuração, você já tem CFW e continuar com estas Caso você prefira um guia visual para esta seção, há um disponível [aqui](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} +In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer. + 1. Complete o processo inicial para o jogo até você chegar no menu principal + Selecione a opção da esquerda sempre que solicitado durante o processo de instalação 1. Usando a touch-screen, selecione a caixa grande da esquerda, então selecione uma caixa com um ícone que parece um cartão SD @@ -85,7 +92,7 @@ Caso você prefira um guia visual para esta seção, há um disponível [aqui](h 1. Toque na quarta caixa com a letra "A" nela 1. Se o exploit for bem sucedido, seu dispositivo irá abrir o b9sTool 1. Usando os botões direcionais, mova para "Install boot9strap" - + Se você perder este passo, o sistema irá sair para o Menu HOME ao invés de instalar o boot9strap e você precisará abrir o DS Download Play e reiniciar essa seção desde o início + + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III 1. Pressione (A), depois pressione START e SELECT ao mesmo tempo para iniciar o processo 1. Quando for concluído e a tela inferior dizer "done", saia do b9sTool, então desligue o seu dispositivo + Você pode ter que forçar o desligamento segurando o botão power @@ -94,6 +101,8 @@ Caso você prefira um guia visual para esta seção, há um disponível [aqui](h #### Seção V - Verificação do Luma3DS +Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. + 1. Desligue seu dispositivo 1. Insira o cartão SD no seu computador 1. Verifique se a pasta `luma` existe e se `config.ini` está dentro dela @@ -106,13 +115,15 @@ Neste momento, o seu console iniciará no Luma3DS por padrão. #### Seção VI - Restaurando as Conexões Nintendo DS -1. Copy the `42383841.bin` file from the `clean/` folder of the downloaded DSiWare archive (`output_(name).zip`) to the `Nintendo 3DS///Nintendo DSiWare/` folder on your SD card - + Substitua o arquivo `42383841.bin` existente +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. + +1. Navegue até `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` no seu cartão SD +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one 1. Reinsira seu cartão SD no seu dispositivo 1. Ligue o seu dispositivo 1. Abra a Configuração do Console em seu dispositivo -1. Navegue para `Gerenciamento de Dados` -> `DSiWare` -1. Na seção "Cartão SD", selecione o aplicativo "Nintendo DSi™" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title 1. Selecione "Copy", então selecione "OK" ___ diff --git a/_pages/pt_BR/installing-boot9strap-(hbl-usm).txt b/_pages/pt_BR/installing-boot9strap-(hbl-usm).txt index d0d278ae9f..8f500e85d6 100644 --- a/_pages/pt_BR/installing-boot9strap-(hbl-usm).txt +++ b/_pages/pt_BR/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,16 @@ title: "Instalando boot9strap (HBL-USM)" {% include toc title="Tabela de Conteúdo" %} -### Leitura Obrigatória +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

As we already have Homebrew access, we can use slotTool to do this.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+
+{: .notice--info} -Para executar o exploit no firmware SAFE_MODE do nosso sistema, precisamos injetar um perfil de Wi-Fi exploited. - -Como já temos acesso a Homebrew, podemos usar o slotTool para fazer isso. - -Assim que o perfil Wi-Fi for injetado, usaremos o SAFE_MODE, que é um recurso de recuperação presente em todos os consoles 3DS, para ativar o perfil de Wi-Fi exploited. +### Compatibility Notes Se os seus botões (Gatilho Direito/Esquerdo), (D-Pad pra Cima) ou (A) não funcionarem, entre no [Discord do Nintendo Homebrew](https://discord.gg/MWxPgEp) e pergunte, em inglês, para obter ajuda. {: .notice--danger} @@ -24,7 +27,10 @@ Se os seus botões (Gatilho Direito/Esquerdo), (D-Pad pra Cima) ou (A) não func #### Seção I - Preparação +In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. + 1. Seu console deve estar ligado e mostrando o Homebrew Launcher da parte anterior do guia + + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. Abra o slotTool da lista de homebrew + Se você ficar preso numa tela vermelha, force o desligamento do console, segurando o botão liga/desliga por quinze segundos, e tente novamente esta seção 1. Selecione a opção "INSTALL exploit to wifi slots 1,2,3 & shutdown" @@ -36,22 +42,31 @@ Se os seus botões (Gatilho Direito/Esquerdo), (D-Pad pra Cima) ou (A) não func 1. Copie `usm.bin` do `.zip` do unSAFE_MODE para a raiz do seu cartão SD 1. Coloque seu cartão SD de volta no seu console +![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} + #### Seção II - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. Com o seu dispositivo ainda desligado, segure os seguintes botões: (Gatilho Esquerdo) + (Gatilho Direito) + (Botão Direcional para Cima) + (A), e enquanto segura esses botões juntos, ligue seu dispositivo - + Continue segurando os botões até o dispositivo iniciar no Modo de Segurança + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + Caso não consiga entrar no Modo de Segurança após várias tentativas, um de seus botões pode estar falhando ou quebrado. Se for esse o caso, junte-se ao [Discord do Nintendo Homebrew](https://discord.gg/MWxPgEp) e peça ajuda, em Inglês. 1. Pressione "OK" para aceitar a atualização + Não há atualização. Isto faz parte do exploit 1. Pressione "Eu aceito" para aceitar os termos e condições 1. A atualização eventualmente falhará, com o código de erro `003-1099`. Isto é intencional 1. Quando solicitado "Você gostaria de configurar as configurações de Internet?", selecione "Sim" -1. No menu a seguir, navegue até `Conexão 1` -> `Alterar configurações` -> `Próxima página (seta direita)` -> `Configurações de proxy` -> `Configuração Avançada` - + Esta é uma [representação visual](https://uwu.ca/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. Se o exploit for bem sucedido, seu dispositivo será inicializado no SafeB9SInstaller #### Seção III - Instalando o boot9strap +In this section, you will install custom firmware onto your device. + 1. Quando solicitado, aperte a sequência de botões fornecida na tela superior para instalar o boot9strap + Se a tela superior estiver vazia, desligue seu dispositivo e refaça a Seção III 1. Quando concluído, aperte (A) para reiniciar o seu dispositivo @@ -65,6 +80,8 @@ Neste momento, o seu console iniciará no Luma3DS por padrão. #### Seção IV - Restaurando os Perfis de Configuração de Wi-Fi +In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Inicie o aplicativo Download Play 1. Aguarde até que você veja os dois botões + Não pressione nenhum dos botões diff --git a/_pages/pt_BR/installing-boot9strap-(soundhax).txt b/_pages/pt_BR/installing-boot9strap-(soundhax).txt index f96cf65d9b..76b999218a 100644 --- a/_pages/pt_BR/installing-boot9strap-(soundhax).txt +++ b/_pages/pt_BR/installing-boot9strap-(soundhax).txt @@ -4,7 +4,13 @@ title: "Instalando boot9strap (Soundhax)" {% include toc title="Tabela de Conteúdo" %} -### Leitura Obrigatória +
+Technical Details (optional) +

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+
+{: .notice--info} + +### Compatibility Notes Soundhax (quando combinado com universal-otherapp) é compatível com as versões 1.0.0 a 11.3.0 em todas as regiões. @@ -21,6 +27,8 @@ Soundhax (quando combinado com universal-otherapp) é compatível com as versõe #### Seção I - Preparação +In this section, you will copy the files needed to trigger both Soundhax and universal-otherapp. + 1. Desligue seu dispositivo 1. Insira o cartão SD no seu computador 1. Copie o Soundhax `.m4a` para a raiz do seu cartão SD @@ -33,11 +41,16 @@ Soundhax (quando combinado com universal-otherapp) é compatível com as versõe 1. Reinsira seu cartão SD no seu dispositivo 1. Ligue o seu dispositivo - ![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} #### Seção II - Iniciando o SafeB9SInstaller +In this section, you will launch Soundhax through the Nintendo 3DS Sound app, which will use universal-otherapp to launch the boot9strap (custom firmware) installer. + 1. Reinsira seu cartão SD no seu dispositivo 1. Ligue o seu dispositivo 1. Abra o Som Nintendo 3DS @@ -58,6 +71,8 @@ Soundhax (quando combinado com universal-otherapp) é compatível com as versõe #### Seção III - Instalando o boot9strap +In this section, you will install custom firmware onto your device. + 1. Quando solicitado, aperte a sequência de botões fornecida na tela superior para instalar o boot9strap 1. Quando concluído, aperte (A) para reiniciar o seu dispositivo 1. Seu dispositivo deve ter reiniciado no menu de configuração de Luma3DS diff --git a/_pages/pt_BR/installing-boot9strap-(usm).txt b/_pages/pt_BR/installing-boot9strap-(usm).txt index a25a7fd446..f9c16f0f80 100644 --- a/_pages/pt_BR/installing-boot9strap-(usm).txt +++ b/_pages/pt_BR/installing-boot9strap-(usm).txt @@ -4,15 +4,17 @@ title: "Instalando boot9strap (USM)" {% include toc title="Tabela de Conteúdo" %} -### Leitura Obrigatória +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

We can do this using an existing exploit, BannerBomb3.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

+
+{: .notice--info} -Para executar o exploit no firmware SAFE_MODE do nosso sistema, precisamos injetar um perfil de Wi-Fi exploited. - -Podemos fazê-lo com um exploit existente, BannerBomb3. - -Para fazer isso, usamos a chave de criptografia do seu sistema (movable.sed) para construir um backup de DSiWare que executa um exploit no sistema para injetar o perfil Wi-Fi exploited na sua lista de conexões. - -Assim que o perfil Wi-Fi for injetado, usaremos o SAFE_MODE, que é um recurso de recuperação presente em todos os consoles 3DS, para ativar o perfil de Wi-Fi exploited. +### Compatibility Notes Essas instruções funcionam nas versões de consoles EUA, Europa, Japão e Coréia, indicadas pelas letras U, E, J ou K após a versão do sistema. @@ -29,6 +31,8 @@ Se os seus botões (Gatilho Esquerdo/Direito), (Botão direcional pra cima), ou #### Seção I - Preparação +In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. + 1. Se seu dispositivo estiver ligado, desligue seu dispositivo 1. Abra [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) no seu computador 1. Envie seu movable.sed usando a opção "Choose File" @@ -41,47 +45,51 @@ Se os seus botões (Gatilho Esquerdo/Direito), (Botão direcional pra cima), ou 1. Copie o `boot9strap.firm` e o `boot9strap.firm.sha` do `.zip` do boot9strap para a pasta `/boot9strap/` no seu cartão SD 1. Copie `SafeB9SInstaller.bin` do `.zip` do SafeB9SInstaller para a raiz do seu cartão SD 1. Copie `usm.bin` do `unSAFE_MODE.zip` para a raiz do seu cartão SD - + ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }}) - {: .notice--info} - + ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} + ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. Navegue até `Nintendo 3DS` -> `` ->` em seu cartão SD - + O `` será o mesmo que você usou em [Seedminer](seedminer) - + O `` é uma pasta de 32 caracteres dentro do `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Crie uma pasta chamada `Nintendo DSiWare` dentro do `` + Se você já teve a pasta *e* já existe algum arquivo de backup de DSiWare existente (`. dentro) dentro, copie-os para seu PC e remova-os do seu cartão SD 1. Copie o arquivo `F00D43D5.bin` do `unSAFE_MODE.zip` para a pasta `Nintendo DSiWare` - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Seção II - BannerBomb3 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. + 1. Reinsira seu cartão SD no seu dispositivo 1. Ligue o seu dispositivo 1. Abra a Configuração do Console em seu dispositivo -1. Navegue para `Gerenciador de Dados` -> `DSiWare` -1. Clique na seção do cartão SD - + Seu dispositivo deve mostrar um menu com algum texto +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + Se esta etapa fazer com que seu dispositivo trave, [siga este guia de troubleshooting](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Selecione "Inject haxx" +1. Press (A) to select "Inject haxx" + Seu dispositivo será desligado automaticamente #### Seção III - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. Com o seu dispositivo ainda desligado, segure os seguintes botões: (Gatilho Esquerdo) + (Gatilho Direito) + (Botão Direcional para Cima) + (A), e enquanto segura esses botões juntos, ligue seu dispositivo - + Continue segurando os botões até o dispositivo iniciar o Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + Caso não consiga entrar no Modo de Segurança após várias tentativas, um de seus botões pode estar falhando ou quebrado. Se esse for o caso, você precisará seguir [um ramo alternativo de Seedminer](bannerbomb3). Para obter ajuda com isso, entre no [Discord do Nintendo Homebrew](https://discord.gg/MWxPgEp) e peça, em inglês, por ajuda. 1. Pressione "OK" para aceitar a atualização + Não há atualização. Isto faz parte do exploit 1. Pressione "Eu aceito" para aceitar os termos e condições 1. A atualização eventualmente falhará, com o código de erro `003-1099`. Isto é intencional 1. Quando solicitado "Você gostaria de configurar as configurações de Internet?", selecione "Sim" -1. No menu a seguir, navegue até `Conexão 1` -> `Alterar configurações` -> `Próxima página (seta direita)` -> `Configurações de proxy` -> `Configuração Avançada` - + Esta é uma [representação visual](https://uwu.ca/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. Se o exploit for bem sucedido, seu dispositivo será inicializado no SafeB9SInstaller #### Seção IV - Instalando o boot9strap +In this section, you will install custom firmware onto your device. + 1. Quando solicitado, aperte a sequência de botões fornecida na tela superior para instalar o boot9strap + Se a tela superior estiver vazia, desligue seu dispositivo e refaça a Seção III 1. Quando concluído, aperte (A) para reiniciar o seu dispositivo @@ -95,16 +103,17 @@ Neste momento, o seu console iniciará no Luma3DS por padrão. #### Seção V - Restaurando os Perfis de Configuração de Wi-Fi +In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Abra a Configuração do Console em seu dispositivo -1. Navegue para `Gerenciamento de Dados` -> `DSiWare` -1. Clique na seção do cartão SD - + Seu dispositivo deve mostrar um menu com algum texto -1. Selecione "Restore slots" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) +1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + Seu dispositivo será reiniciado automaticamente 1. Desligue seu dispositivo 1. Insira o cartão SD no seu computador 1. Navegue até `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` no seu cartão SD -1. Apague `F00D43D5.bin` da sua pasta Nintendo DSiWare +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. Esse arquivo não será mais necessário ___ diff --git a/_pages/pt_BR/seedminer.txt b/_pages/pt_BR/seedminer.txt index b1b2d5e2a2..b8783f8218 100644 --- a/_pages/pt_BR/seedminer.txt +++ b/_pages/pt_BR/seedminer.txt @@ -4,52 +4,54 @@ title: "Seedminer" {% include toc title="Tabela de Conteúdo" %} -### Leitura Obrigatória +
+Technical Details (optional) +

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

+

For information on how Seedminer works, see this presentation.

+

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+
+{: .notice--info} -Para instalar o boot9strap em seu dispositivo, nós derivamos a chave de criptografia exclusiva do seu dispositivo. Para fazer isso, usamos uma ferramenta chamada Seedminer para calcular a chave de criptografia de dados (movable.sed) do seu dispositivo. +### Section I - Prep Work -Para mais informações sobre como Seedminer funciona, veja [esta apresentação](https://zoogie.github.io/web/34⅕c3). - -Esse método usufrui de uma poderosa placa de vídeo para realizar os cálculos necessários. Um website voluntário é utilizado com o propósito de te ajudar com esse método. - -### Instruções - -#### Seção I - Preparação +In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. 1. Insira o cartão SD no seu computador 1. Vá até a pasta `Nintendo 3DS` no seu cartão SD -1. Copie o nome de 32 caracteres da pasta que você vê imediatamente após abrir a pasta Nintendo 3DS - + Não entre em mais pastas depois dessa - + Se você ver múltiplas pastas longas de 32 caracteres, siga [estas instruções](troubleshooting#multiple-folder-names-in-nintendo-3ds-folder) + + If you don't have a `Nintendo 3DS` folder, put your SD card into your 3DS and power it on so that the folder can be created +1. Copy the name of the 32-letter folder you see directly inside Nintendo 3DS + + This 32-letter name is system-specific and will be different for each console + + If you see multiple 32-letter folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + Você pode ignorar a pasta `private` se ela está presente - ![]({{ "/images/screenshots/id0-example.png" | absolute_url }}) + ![]({{ "/images/screenshots/seedminer/id0-example.png" | absolute_url }}) {: .notice--info} -1. Copie o nome de 32 caracteres dessa pasta em um lugar seguro onde você possa acessar mais tarde - + Esse nome também é conhecido como o seu "ID0" +1. Paste your 32 character long folder name into [a document](/images/screenshots/seedminer/text-document.png) you can reference later + + This folder is known as your "ID0". Take note of this as this guide will refer to it as such later 1. Ligue o seu dispositivo + Seu cartão SD não precisa ser inserido neste momento 1. Vá para sua lista de amigos (o [ícone de rosto laranja]({{ "/images/friend-list-icon.png" | absolute_url }}) na linha superior do seu Menu HOME) + Se você receber um erro e for expulso do menu, você deve criar um novo Mii ou seu dispositivo não pode se conectar aos servidores da Nintendo (devido a um banimento ou problemas de conexão) 1. Vá até o perfil do seu Mii e então encontre o seu Código de Amigo na tela superior -#### Seção II - Seedminer +### Section II - Seedminer + +In this section, you will use the Bruteforce Movable website to retrieve your device's encryption key in the form of `movable.sed`. 1. Abra [Bruteforce Movable](https://seedminer.hacks.guide/) no seu computador - + Este site pode automatizar a obtenção do arquivo `movable_part1.sed` (usando o console 3DS de um robô) e a quebra da encriptação do DSiWare do seu dispositivo (usando o computador de um voluntário para rodar o Seedminer) + Se o site não estiver funcionando, entre no [Discord do Nintendo Homebrew](https://discord.gg/MWxPgEp) e pergunte (em Inglês) para alguém lá te ajudar 1. Insira o Código de Amigo do seu dispositivo (sem espaços ou traços) dentro do campo "Your friend code" 1. Cole o nome da pasta de 32 caracteres do seu dispositivo no campo "Your ID0" - + Não tente escrever o seu ID0 à mão. Assegure-se de que o seu ID0 esteja inserido corretamente copiando-o e colando-o de onde você o salvou na seção anterior + + Do not attempt to enter the ID0 manually, as it is easy to make a mistake. Assegure-se de que o seu ID0 esteja inserido corretamente copiando-o e colando-o de onde você o salvou na seção anterior 1. Selecione "Go" + Se o site ir imediatamente para a "Step 4", o site já processou corretamente sua solicitação de bruteforce. Você pode baixar o seu arquivo `movable.sed` e continuar para a próxima seção. Você não precisa adicionar novamente o bot -1. Use o botão "Registrar Amigo" no seu dispositivo para adicionar o friend code do bot conforme dado pelo site +1. Use the ["Register Friend" button](/images/screenshots/seedminer/register-friend.png) on your device to add the bot's friend code as given by the website + Se for solicitado, o nome que você dá ao amigo não importa 1. Espere que o site atualize + Se não atualizar, espere mais alguns minutos antes de recarregar a página 1. Assim que o site processar suas informações, o site continuará para `Step 2: Bruteforce` automaticamente 1. Aguarde a finalização do restante do processo - + Isso é geralmente rápido (1-5 minutos), mas em alguns casos, pode levar até meia hora + + This is usually fast (1-5 minutes) + Durante esse processo, o bot que você adicionou poderá não aparecer no seu 3DS. Enquanto o site atualizar, isso não é um problema + Se você ainda está esperando após o período de meia hora, entre no [Discord do Nintendo Homebrew](https://discord.gg/MWxPgEp) e pergunte (em Inglês) para alguém te ajudar 1. Quando o processo for concluído, baixe seu arquivo `movable.sed` do site @@ -57,7 +59,7 @@ Esse método usufrui de uma poderosa placa de vídeo para realizar os cálculos ___ -### Próximos passos +### Next steps: Choose an exploit Assim que você tiver a chave de criptografia do seu dispositivo (`movable.sed`), você o usará em conjunto com outros exploits para instalar custom firmware no seu 3DS. diff --git a/_pages/pt_PT/bannerbomb3.txt b/_pages/pt_PT/bannerbomb3.txt index c17aabae18..5a46749529 100644 --- a/_pages/pt_PT/bannerbomb3.txt +++ b/_pages/pt_PT/bannerbomb3.txt @@ -4,11 +4,15 @@ title: "BannerBomb3" {% include toc title="Table of Contents" %} -### Leitura Obrigatória +
+Technical Details (optional) +

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

For a more technical explanation, see here.

+
+{: .notice--info} -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -20,6 +24,9 @@ If you have a Taiwanese console (indicated by a T after the system version), fol * Your `movable.sed` file from completing [Seedminer](seedminer) #### Section I - Prep Work + +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + 1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer 1. Upload your movable.sed using the "Choose File" option 1. Click "Build and Download" @@ -27,28 +34,31 @@ If you have a Taiwanese console (indicated by a T after the system version), fol 1. If your console is powered on, power off your console 1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from the BannerBomb3 `.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section +1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked 1. Power off your device 1. Insert your SD card into your computer -1. You should now have `42383841.bin` in SD root. This is the DSiWare backup you will use later in the guide -1. Navigate to `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card - + This `` will be the same one that you used in [Seedminer](seedminer) -1. Delete `F00D43D5.bin` from the Nintendo DSiWare folder and from your computer. This file will not be needed anymore +1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore + Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} diff --git a/_pages/pt_PT/finalizing-setup.txt b/_pages/pt_PT/finalizing-setup.txt index 9305d4f9f4..7cb223b169 100644 --- a/_pages/pt_PT/finalizing-setup.txt +++ b/_pages/pt_PT/finalizing-setup.txt @@ -20,6 +20,8 @@ On this page, we will make critical system file backups and install the followin It is not recommended to skip downloading any of these applications, as many of them will be used later on this page. At the end of this page, your SD card will be cleaned up by removing unnecessary installation files. {: .notice--warning} +### Compatibility Notes + If your **New 3DS** was on version 2.1.0 before following this guide, you should [restore your NAND backup](godmode9-usage#restoring-a-nand-backup) before continuing. {: .notice--warning} @@ -39,6 +41,8 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o #### Section I - Prep Work +In this section, you will copy the files necessary to follow the rest of the instructions on this page. + 1. Power off your device 1. Insert your SD card into your computer 1. Create a folder named `cias` on the root of your SD card if it does not already exist @@ -52,15 +56,20 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o 1. Reinsert your SD card into your device 1. Power on your device - ![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) - {: .notice--info} - ![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) - {: .notice--info} +The screenshots below indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. + +![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) +{: .notice--info} + -These screenshots indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. #### Section II - Updating the System +In this section, you will update your system to the latest version, which is safe to do with custom firmware. + 1. Update your device by going to System Settings, then "Other Settings", then going all the way to the right and using "System Update" + Updates while using B9S + Luma (what you have) are safe + The updater may display a message saying "Your system is up to date" instead of updating. This is normal if you are already up to date; continue with the next section @@ -69,6 +78,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section III - Homebrew Launcher +In this section, you will temporarily replace Download Play with Homebrew Launcher (which we need to launch FBI). Download Play will automatically go back to normal once you reboot your device. + 1. Launch the Download Play application (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. Wait until you see the `Nintendo 3DS` and `Nintendo DS` buttons 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu @@ -83,6 +94,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section IV - RTC and DSP Setup +In this section, you will sync your 3DS internal clock with the actual time and dump the sound firmware (which is necesssary for some homebrew software to use sound properly). + 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu 1. Select "Miscellaneous options" 1. Select "Dump DSP firmware" @@ -94,6 +107,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section V - Installing CIAs +In this section, you will install several useful homebrew applications to HOME Menu. + 1. Launch FBI from the list of homebrew 1. Navigate to `SD` -> `cias` 1. Select "\" @@ -102,6 +117,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VI - CTRNAND Luma3DS +In this section, you will use a script to copy some of Luma3DS's files to internal memory so that they can be accessed, even without an SD card inserted. + 1. Power off your device 1. Press and hold (Start), and while holding (Start), power on your device. This will launch GodMode9 + If you do not boot into GodMode9, ensure that `GodMode9.firm` is in `/luma/payloads/` and that `payloads` is correctly spelled @@ -118,6 +135,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VII - Cleanup SD Card +In this section, you will use a script to remove some unnecessary files from your SD card. + 1. Select "Cleanup SD Card" 1. When prompted, press (A) to proceed 1. Press (A) to continue @@ -125,6 +144,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VIII - Backup Essential Files +In this section, you will make backups of flies that can be used to recover from softwaer bricks or to recover data. + 1. Select "Backup Options" 1. Select "SysNAND Backup" 1. Pressiona (A) para confirmar @@ -159,7 +180,7 @@ You're done! Custom firmware is now fully configured on your device. Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! {: .notice--info} -#### Information and Notes +### Information and Notes {% capture notice-6 %} Here are some key combos that you should know: diff --git a/_pages/pt_PT/homebrew-launcher-(pichaxx).txt b/_pages/pt_PT/homebrew-launcher-(pichaxx).txt index 46f16df1b1..aff6795262 100644 --- a/_pages/pt_PT/homebrew-launcher-(pichaxx).txt +++ b/_pages/pt_PT/homebrew-launcher-(pichaxx).txt @@ -4,9 +4,17 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Table of Contents" %} -### Leitura Obrigatória +
+Technical Details (optional) +This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. +
+{: .notice--info} -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE to run SafeB9SInstaller. +### Compatibility Notes + +These instructions work on USA, Europe, and Japan consoles as indicated by the letters U, E, or J after the system version. + +You will need a Nintendo Network ID to download Pokémon Picross. This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. {: .notice--warning} @@ -24,15 +32,8 @@ This process will overwrite your Pokémon Picross save file, if you have one. If #### Section I - Prep Work -1. Power on your device -1. Open the Nintendo eShop -1. Tap the Search icon (small magnifying glass) -1. Search for `picross` -1. Open the store page for Pokémon Picross -1. Download Pokémon Picross - + You can scan [this QR code](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=ESHOP://50010000037815&margin=0&qzone=1&size=400x400&ecc=L) using the Nintendo 3DS Camera for a direct link to the eShop app - + Your SD card must be inserted in your device to install Pokémon Picross -1. Power off your device +In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. + 1. Insert your SD card into your computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it @@ -40,8 +41,16 @@ This process will overwrite your Pokémon Picross save file, if you have one. If 1. Copy the `slotTool` folder from the unSAFE_MODE `.zip` to the `3ds` folder on your SD card 1. Copy the otherapp payload for your region/version from the unSAFE_MODE `.zip`'s `otherapps_with_CfgS` folder to the root of your SD card and rename it to `otherapp.bin` +![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }}) +{: .notice--info} + + #### Section II - PicHaxx +In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device. 1. Open [the PicHaxx Injector website](https://3ds.nhnarwhal.com/3dstools/pichaxx.php) on your computer 1. Select your `movable.sed` file 1. Select "Build and Download" diff --git a/_pages/pt_PT/installing-boot9strap-(fredtool).txt b/_pages/pt_PT/installing-boot9strap-(fredtool).txt index 0113f93ffa..1f7825ac28 100644 --- a/_pages/pt_PT/installing-boot9strap-(fredtool).txt +++ b/_pages/pt_PT/installing-boot9strap-(fredtool).txt @@ -4,15 +4,16 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Table of Contents" %} -### Leitura Obrigatória - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, for example from BannerBomb or the DSiWare Dumper tool. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). +
+Technical Details (optional) +

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+
+{: .notice--info} ### What You Need -* A DSiWare Backup (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) +* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -20,6 +21,8 @@ This is a currently working implementation of the "FIRM partitions known-plainte #### Section I - CFW Check +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + 1. Power off your device 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button @@ -30,17 +33,7 @@ If you see a configuration menu, you already have CFW, and continuing with these #### Section II - Prep Work -1. Power off your device -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card - - ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} - -#### Section III - Fredtool +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) @@ -53,19 +46,31 @@ If you see a configuration menu, you already have CFW, and continuing with these 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link +1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` - + If the `Nintendo DSiWare` folder does not exist, create it inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` 1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder -1. Reinsert your SD card into your device + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card + + ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} + +#### Section III - Overwriting DS Connection Settings + +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Haxxxxxxxxx!" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title 1. Select "Copy", then select "OK" 1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio #### Section IV - Flipnote Exploit @@ -73,6 +78,8 @@ If you see a configuration menu, you already have CFW, and continuing with these If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} +In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer. + 1. Complete the initial setup process for the launched game until you reach the main menu + Select the left option whenever prompted during the setup process 1. Using the touch-screen, select the large left box, then select the box with an SD card icon @@ -85,7 +92,7 @@ If you would prefer a visual guide to this section, one is available [here](http 1. Tap the fourth box with the letter "A" in it 1. If the exploit was successful, your device will have loaded b9sTool 1. Using the D-Pad, move to "Install boot9strap" - + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to start over from Step 12 of Section III + + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III 1. Press (A), then press START and SELECT at the same time to begin the process 1. Once completed and the bottom screen says "done.", exit b9sTool, then power off your device + You may have to force power off by holding the power button @@ -94,6 +101,8 @@ If you would prefer a visual guide to this section, one is available [here](http #### Section V - Luma3DS Verification +Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. + 1. Power off your device 1. Insert your SD card into your computer 1. Verify that a `luma` folder exists and that `config.ini` is inside of it @@ -106,13 +115,15 @@ At this point, your console will boot to Luma3DS by default. #### Section VI - Restoring DS Connection Settings -1. Copy the `42383841.bin` file from the `clean/` folder of the downloaded DSiWare archive (`output_(name).zip`) to the `Nintendo 3DS///Nintendo DSiWare/` folder on your SD card - + Replace the existing `42383841.bin` file +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Nintendo DSi™" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title 1. Select "Copy", then select "OK" ___ diff --git a/_pages/pt_PT/installing-boot9strap-(hbl-usm).txt b/_pages/pt_PT/installing-boot9strap-(hbl-usm).txt index 0e540d2112..6c9a3f849c 100644 --- a/_pages/pt_PT/installing-boot9strap-(hbl-usm).txt +++ b/_pages/pt_PT/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,16 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Table of Contents" %} -### Leitura Obrigatória +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

As we already have Homebrew access, we can use slotTool to do this.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--danger} @@ -24,7 +27,10 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint #### Section I - Prep Work +In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. + 1. Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide + + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. Launch slotTool from the list of homebrew + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section 1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option @@ -36,22 +42,31 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint 1. Copy `usm.bin` from the unSAFE_MODE `.zip` to the root of your SD card 1. Put your SD card back into your console +![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} + #### Section II - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](https://uwuu.ca/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section III - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -65,6 +80,8 @@ At this point, your console will boot to Luma3DS by default. #### Section IV - Restoring WiFi Configuration Profiles +In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch the Download Play application 1. Wait until you see the two buttons + Do not press either of the buttons diff --git a/_pages/pt_PT/installing-boot9strap-(soundhax).txt b/_pages/pt_PT/installing-boot9strap-(soundhax).txt index b6193800a3..b15630b79f 100644 --- a/_pages/pt_PT/installing-boot9strap-(soundhax).txt +++ b/_pages/pt_PT/installing-boot9strap-(soundhax).txt @@ -4,7 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Table of Contents" %} -### Leitura Obrigatória +
+Technical Details (optional) +

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+
+{: .notice--info} + +### Compatibility Notes Soundhax (when combined with universal-otherapp) is compatible with versions 1.0.0 through 11.3.0 in all regions. @@ -21,6 +27,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Section I - Prep Work +In this section, you will copy the files needed to trigger both Soundhax and universal-otherapp. + 1. Power off your device 1. Insert your SD card into your computer 1. Copy the Soundhax `.m4a` to the root of your SD card @@ -33,11 +41,16 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 1. Reinsert your SD card into your device 1. Power on your device - ![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} #### Section II - Launching SafeB9SInstaller +In this section, you will launch Soundhax through the Nintendo 3DS Sound app, which will use universal-otherapp to launch the boot9strap (custom firmware) installer. + 1. Reinsert your SD card into your device 1. Power on your device 1. Abre a aplicação Som Nintendo 3DS @@ -58,6 +71,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Section III - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap 1. Once it is complete, press (A) to reboot your device 1. Your device should have rebooted into the Luma3DS configuration menu diff --git a/_pages/pt_PT/installing-boot9strap-(usm).txt b/_pages/pt_PT/installing-boot9strap-(usm).txt index 5115df6a6a..b58fa784a2 100644 --- a/_pages/pt_PT/installing-boot9strap-(usm).txt +++ b/_pages/pt_PT/installing-boot9strap-(usm).txt @@ -4,15 +4,17 @@ title: "Installing boot9strap (USM)" {% include toc title="Table of Contents" %} -### Leitura Obrigatória +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

We can do this using an existing exploit, BannerBomb3.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -29,6 +31,8 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will #### Section I - Prep Work +In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. + 1. If your device is powered on, power off your device 1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer 1. Upload your movable.sed using the "Choose File" option @@ -41,47 +45,51 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will 1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card 1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - + ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }}) - {: .notice--info} - + ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} + ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card 1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Select "Inject haxx" +1. Press (A) to select "Inject haxx" + Your device will automatically power off #### Section III - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section IV - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -95,16 +103,17 @@ At this point, your console will boot to Luma3DS by default. #### Section V - Restoring WiFi Configuration Profiles +In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text -1. Select "Restore slots" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) +1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + Your device will automatically reboot 1. Power off your device 1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore ___ diff --git a/_pages/pt_PT/seedminer.txt b/_pages/pt_PT/seedminer.txt index 17b756662b..871d46e5cd 100644 --- a/_pages/pt_PT/seedminer.txt +++ b/_pages/pt_PT/seedminer.txt @@ -4,52 +4,54 @@ title: "Seedminer" {% include toc title="Table of Contents" %} -### Leitura Obrigatória +
+Technical Details (optional) +

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

+

For information on how Seedminer works, see this presentation.

+

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+
+{: .notice--info} -To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. +### Section I - Prep Work -For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). - -This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. - -### Instructions - -#### Section I - Prep Work +In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. 1. Insert your SD card into your computer 1. Navigate to the `Nintendo 3DS` folder on your SD card -1. Copy the 32 character long name of the folder you see inside Nintendo 3DS - + Do not go inside any more folders - + If you see multiple 32 character long folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + + If you don't have a `Nintendo 3DS` folder, put your SD card into your 3DS and power it on so that the folder can be created +1. Copy the name of the 32-letter folder you see directly inside Nintendo 3DS + + This 32-letter name is system-specific and will be different for each console + + If you see multiple 32-letter folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + You can ignore the `private` folder if you have it - ![]({{ "/images/screenshots/id0-example.png" | absolute_url }}) + ![]({{ "/images/screenshots/seedminer/id0-example.png" | absolute_url }}) {: .notice--info} -1. Paste your 32 character long folder name into a document you can reference later - + This folder name is also known as your "ID0" +1. Paste your 32 character long folder name into [a document](/images/screenshots/seedminer/text-document.png) you can reference later + + This folder is known as your "ID0". Take note of this as this guide will refer to it as such later 1. Power on your device + Your SD card does not need to be inserted at this point 1. Go to your Friend List (the [orange Face Icon]({{ "/images/friend-list-icon.png" | absolute_url }}) in the top row of your HOME Menu) + If you receive an error and are kicked out of the menu, you either must create a new Mii or your device cannot connect to Nintendo's servers (due to a ban or connection issues) 1. Find your Mii profile, then find the "Friend Code" field on the top screen -#### Section II - Seedminer +### Section II - Seedminer + +In this section, you will use the Bruteforce Movable website to retrieve your device's encryption key in the form of `movable.sed`. 1. Open [Bruteforce Movable](https://seedminer.hacks.guide/) on your computer - + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) + If the site isn't working, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field - + Do not attempt to enter the ID0 by hand. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section + + Do not attempt to enter the ID0 manually, as it is easy to make a mistake. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section 1. Select "Go" + If the site immediately goes to step 4, the website has already correctly processed your bruteforce request. You can download your `movable.sed` file and continue to the next section. You do not need to re-add the bot -1. Use the "Register Friend" button on your device to add the bot's friend code as given by the website +1. Use the ["Register Friend" button](/images/screenshots/seedminer/register-friend.png) on your device to add the bot's friend code as given by the website + If prompted, the name that you give to the friend does not matter 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once 1. Once the site processes your information, the site will continue to `Step 2: Bruteforce` automatically 1. Wait for the remainder of the process to complete - + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour + + This is usually fast (1-5 minutes) + During this process, the bot you added may not show up on your 3DS. As long as the website updates, this is not an issue + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site @@ -57,7 +59,7 @@ This method uses a powerful graphics card to perform the calculations needed. A ___ -### Next Steps +### Next steps: Choose an exploit Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. diff --git a/_pages/ro_RO/bannerbomb3.txt b/_pages/ro_RO/bannerbomb3.txt index 91f6b06be4..a6824be585 100644 --- a/_pages/ro_RO/bannerbomb3.txt +++ b/_pages/ro_RO/bannerbomb3.txt @@ -4,11 +4,15 @@ title: "BannerBomb3" {% include toc title="Cuprins" %} -### Lectură obligatorie +
+Technical Details (optional) +

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

For a more technical explanation, see here.

+
+{: .notice--info} -Pentru a descărca DSiWare de sistem, vom exploata o eroare din fereastra DSiWare Data Management de la aplicația Settings. - -Pentru a îndeplini asta, vom folosi cheia de criptare a sistemului dumneavoastră (movable.sed) pentru a construi o copie de rezervă DSiWare care exploatează sistemul pentru a descărca aplicația DSi Internet Settings către rădăcina cardului SD. +### Compatibility Notes Aceste instrucțiuni funcționează pe consolele din regiunea SUA, Europa, Japonia și Coreea, indicate de literele U, E, J, sau K după versiunea de sistem. @@ -20,6 +24,9 @@ If you have a Taiwanese console (indicated by a T after the system version), fol * Fișierul 'movable.sed' de la completarea lui [Seedminer](seedminer) #### Secțiunea I - Preparații + +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + 1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer 1. Încărcați fișierul movable.sed folosind opțiunea "Choose File" 1. Click "Build and Download" @@ -27,28 +34,31 @@ If you have a Taiwanese console (indicated by a T after the system version), fol 1. Dacă dispozitivul este pornit, închideți-l 1. Introduceți cardul SD în calculator 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from the BannerBomb3 `.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. + 1. Reintroduceți cardul SD în dispozitivul dumneavoastră 1. Porniți dispozitivul 1. Porniți System Settings pe consolă -1. Navigați spre `Data Management` -> `DSiWare` -1. Faceți click pe secțiunea SD Card +1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + Dispozitivul ar trebui să clipească culoarea magenta (roz/purpuriu) și apoi să facă crash câteva secunde mai târziu. Asta înseamnă că a funcționat 1. Închideți dispozitivul 1. Introduceți cardul SD în calculator -1. Acum ar trebui să aveți `42383841.bin` în rădăcina cardului SD. Aceasta este copia de rezervă DSiWare pe care o veți folosi mai târziu în ghid -1. Navigați spre `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` pe cardul SD - + Acest `` va fi la fel ca cel care l-ați folosit în [Seedminer](seedminer) -1. Ștergeți `F00D43D5.bin` din folderul Nintendo DSiWare și din calculator. Acest fișier nu mai este necesar +1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page +1. Navigați spre `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` pe cardul SD +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. Acest fișier nu mai este necesar + Continuați la [Instalând boot9strap (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} diff --git a/_pages/ro_RO/finalizing-setup.txt b/_pages/ro_RO/finalizing-setup.txt index a999bbfb87..d50335a049 100644 --- a/_pages/ro_RO/finalizing-setup.txt +++ b/_pages/ro_RO/finalizing-setup.txt @@ -20,6 +20,8 @@ On this page, we will make critical system file backups and install the followin It is not recommended to skip downloading any of these applications, as many of them will be used later on this page. At the end of this page, your SD card will be cleaned up by removing unnecessary installation files. {: .notice--warning} +### Compatibility Notes + If your **New 3DS** was on version 2.1.0 before following this guide, you should [restore your NAND backup](godmode9-usage#restoring-a-nand-backup) before continuing. {: .notice--warning} @@ -39,6 +41,8 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o #### Secțiunea I - Preparații +In this section, you will copy the files necessary to follow the rest of the instructions on this page. + 1. Închideți dispozitivul 1. Introduceți cardul SD în calculator 1. Creați un folder numit `cias` în rădăcina cardului SD dacă nu există deja @@ -52,15 +56,20 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o 1. Reintroduceți cardul SD în dispozitivul dumneavoastră 1. Porniți dispozitivul - ![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) - {: .notice--info} - ![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) - {: .notice--info} +The screenshots below indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. + +![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) +{: .notice--info} + -These screenshots indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. #### Secțiunea II - Actualizând sistemul +In this section, you will update your system to the latest version, which is safe to do with custom firmware. + 1. Actualizați dispozitivul mergând în System Settings, apoi "Other Settings", apoi mergeți spre colțul drept și folosiți "System Update" + Actualizările în timp ce folosiți B9S + Luma (ce aveți) sunt sigure + Actualizatorul poate afișa un mesaj care zice "Your system is up to date" în loc să se actualizeze. Acest lucru este normal dacă sunteți deja la zi; continuați în următoarea secțiune @@ -69,6 +78,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Secțiunea III - Homebrew Launcher +In this section, you will temporarily replace Download Play with Homebrew Launcher (which we need to launch FBI). Download Play will automatically go back to normal once you reboot your device. + 1. Lansați aplicația Download Play (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. Wait until you see the `Nintendo 3DS` and `Nintendo DS` buttons 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu @@ -83,6 +94,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section IV - RTC and DSP Setup +In this section, you will sync your 3DS internal clock with the actual time and dump the sound firmware (which is necesssary for some homebrew software to use sound properly). + 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu 1. Selectați "Miscellaneous options" 1. Select "Dump DSP firmware" @@ -94,6 +107,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section V - Installing CIAs +In this section, you will install several useful homebrew applications to HOME Menu. + 1. Lansați FBI din lista de homebrew 1. Navigați spre `SD` -> `cias` 1. Selectați "\" @@ -102,6 +117,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Secțiunea VI - CTRNAND Luma3DS +In this section, you will use a script to copy some of Luma3DS's files to internal memory so that they can be accessed, even without an SD card inserted. + 1. Închideți dispozitivul 1. Press and hold (Start), and while holding (Start), power on your device. This will launch GodMode9 + If you do not boot into GodMode9, ensure that `GodMode9.firm` is in `/luma/payloads/` and that `payloads` is correctly spelled @@ -118,6 +135,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Secțiunea VII - Curățarea cardului SD +In this section, you will use a script to remove some unnecessary files from your SD card. + 1. Selectaţi "Cleanup SD Card" 1. Când vi se solicită, apăsaţi (A) pentru a continua 1. Apăsați (A) pentru a continua @@ -125,6 +144,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Secţiunea VIII - Copie de rezervă fişierelor esenţiale +In this section, you will make backups of flies that can be used to recover from softwaer bricks or to recover data. + 1. Selectaţi "Backup Options" 1. Selecciona "SysNAND Backup" 1. Apăsați (A) pentru a confirma @@ -159,7 +180,7 @@ You're done! Custom firmware is now fully configured on your device. Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! {: .notice--info} -#### Informaţii şi Note +### Information and Notes {% capture notice-6 %} Here are some key combos that you should know: diff --git a/_pages/ro_RO/homebrew-launcher-(pichaxx).txt b/_pages/ro_RO/homebrew-launcher-(pichaxx).txt index f938261462..1664b521cd 100644 --- a/_pages/ro_RO/homebrew-launcher-(pichaxx).txt +++ b/_pages/ro_RO/homebrew-launcher-(pichaxx).txt @@ -4,9 +4,17 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Cuprins" %} -### Lectură obligatorie +
+Technical Details (optional) +This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. +
+{: .notice--info} -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE to run SafeB9SInstaller. +### Compatibility Notes + +These instructions work on USA, Europe, and Japan consoles as indicated by the letters U, E, or J after the system version. + +You will need a Nintendo Network ID to download Pokémon Picross. This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. {: .notice--warning} @@ -24,15 +32,8 @@ This process will overwrite your Pokémon Picross save file, if you have one. If #### Secțiunea I - Preparații -1. Porniți dispozitivul -1. Open the Nintendo eShop -1. Tap the Search icon (small magnifying glass) -1. Search for `picross` -1. Open the store page for Pokémon Picross -1. Download Pokémon Picross - + You can scan [this QR code](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=ESHOP://50010000037815&margin=0&qzone=1&size=400x400&ecc=L) using the Nintendo 3DS Camera for a direct link to the eShop app - + Your SD card must be inserted in your device to install Pokémon Picross -1. Închideți dispozitivul +In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. + 1. Introduceți cardul SD în calculator 1. Copiați `boot.firm` și `boot.3dsx` de la Luma3DS `.zip` pe rădăcina cardului SD + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it @@ -40,8 +41,16 @@ This process will overwrite your Pokémon Picross save file, if you have one. If 1. Copy the `slotTool` folder from the unSAFE_MODE `.zip` to the `3ds` folder on your SD card 1. Copy the otherapp payload for your region/version from the unSAFE_MODE `.zip`'s `otherapps_with_CfgS` folder to the root of your SD card and rename it to `otherapp.bin` +![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }}) +{: .notice--info} + + #### Secțiunea II - PicHaxx +In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device. 1. Open [the PicHaxx Injector website](https://3ds.nhnarwhal.com/3dstools/pichaxx.php) on your computer 1. Selectaţi fişierul `movable.sed` 1. Selectați "Build and Download" (Construiește și descarcă) diff --git a/_pages/ro_RO/installing-boot9strap-(fredtool).txt b/_pages/ro_RO/installing-boot9strap-(fredtool).txt index e035361144..11cdeba953 100644 --- a/_pages/ro_RO/installing-boot9strap-(fredtool).txt +++ b/_pages/ro_RO/installing-boot9strap-(fredtool).txt @@ -4,15 +4,16 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Cuprins" %} -### Lectură obligatorie - -Această metodă de a folosi Seedminer pentru mai multă exploatare utilizează fişierul `movable.sed` pentru a decripta orice titlu de DSiWare cu scopul de a injecta un titlu DSiWare exploatabil în aplicaţia DS Internet Settings. Aceasta are nevoie de o copie de rezervă DSiWare, de exemplu de la BannerBomb sau unealta DSiWare Dumper. - -Acest lucru este în prezent o implementare a exploit-ului "Partiții FIRM de text simplu" detaliat [aici](https://www.3dbrew.org/wiki/3DS_System_Flaws). +
+Technical Details (optional) +

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+
+{: .notice--info} ### Ce aveți nevoie -* A DSiWare Backup (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) +* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Fișierul 'movable.sed' de la completarea lui [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -20,6 +21,8 @@ Acest lucru este în prezent o implementare a exploit-ului "Partiții FIRM de te #### Section I - CFW Check +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + 1. Închideți dispozitivul 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button @@ -30,17 +33,7 @@ If you see a configuration menu, you already have CFW, and continuing with these #### Secțiunea II - Preparații -1. Închideți dispozitivul -1. Introduceți cardul SD în calculator -1. Copiați `boot.firm` și `boot.3dsx` de la Luma3DS `.zip` pe rădăcina cardului SD - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copiați `boot.nds` (B9STool) în rădăcina cardului SD -1. Copiați folderul `private` de pe arhiva Frogminer_save `.zip` în rădăcina cardului SD - - ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} - -#### Section III - Fredtool +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) @@ -53,19 +46,31 @@ If you see a configuration menu, you already have CFW, and continuing with these 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link +1. Introduceți cardul SD în calculator 1. Navigați spre `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` pe cardul SD - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` - + If the `Nintendo DSiWare` folder does not exist, create it inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` 1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder -1. Reintroduceți cardul SD în dispozitivul dumneavoastră + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copiați `boot.firm` și `boot.3dsx` de la Luma3DS `.zip` pe rădăcina cardului SD + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copiați `boot.nds` (B9STool) în rădăcina cardului SD +1. Copiați folderul `private` de pe arhiva Frogminer_save `.zip` în rădăcina cardului SD + + ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} + +#### Section III - Overwriting DS Connection Settings + +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + 1. Porniți dispozitivul 1. Porniți System Settings pe consolă -1. Navigați spre `Data Management` -> `DSiWare` -1. În secţiunea "SD Card", selectați titlul "Haxxxxxxxxx!" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title 1. Selectaţi "Copy", apoi selectaţi "OK" 1. Reveniți la meniul principal de System Settings -1. Navigați spre `Internet Settings` -> `Nintendo DS Connections`, apoi selectați "OK" +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. În cazul în care exploit-ul a mers, dispozitivul va încărca versiunea JPN de Flipnote Studio #### Section IV - Flipnote Exploit @@ -73,6 +78,8 @@ If you see a configuration menu, you already have CFW, and continuing with these Dacă preferați un ghid vizual pentru aceasta secțiune, deja este disponibil unul [aici](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} +In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer. + 1. Finalizați procesul de configurare iniţială pentru jocul lansat până când ajungeți la meniul principal + Selectaţi opţiunea stângă ori de câte ori se solicită în timpul procesului de instalare 1. Folosind ecranul tactil, selectaţi căsuța mare din stânga, apoi selectaţi căsuța cu o pictogramă de card SD @@ -85,7 +92,7 @@ Dacă preferați un ghid vizual pentru aceasta secțiune, deja este disponibil u 1. Atingeţi căsuța a patra cu litera "A" în ea 1. În cazul în care exploit-ul a mers, dispozitivul va încărca b9sTool 1. Folosind D-Padul, selectați "Install boot9strap" - + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to start over from Step 12 of Section III + + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III 1. Apăsați (A), apoi apăsați START și SELECT în același timp pentru a începe procedeul 1. Odată completat și cu ecranul inferior zicând "done.", ieșiți din b9sTool, apoi închideți dispozitivul + Este posibil să aveţi nevoie să forțați oprirea dispozitivului apăsând butonul de pornire @@ -94,6 +101,8 @@ Dacă preferați un ghid vizual pentru aceasta secțiune, deja este disponibil u #### Section V - Luma3DS Verification +Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. + 1. Închideți dispozitivul 1. Introduceți cardul SD în calculator 1. Verify that a `luma` folder exists and that `config.ini` is inside of it @@ -106,13 +115,15 @@ At this point, your console will boot to Luma3DS by default. #### Section VI - Restoring DS Connection Settings -1. Copy the `42383841.bin` file from the `clean/` folder of the downloaded DSiWare archive (`output_(name).zip`) to the `Nintendo 3DS///Nintendo DSiWare/` folder on your SD card - + Înlocuiţi fişierul existent `42383841.bin +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. + +1. Navigați spre `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` pe cardul SD +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one 1. Reintroduceți cardul SD în dispozitivul dumneavoastră 1. Porniți dispozitivul 1. Porniți System Settings pe consolă -1. Navigați spre `Data Management` -> `DSiWare` -1. Sub secțiunea "SD Card", alegeți titlul "Nintendo DSi™" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title 1. Selectaţi "Copy", apoi selectaţi "OK" ___ diff --git a/_pages/ro_RO/installing-boot9strap-(hbl-usm).txt b/_pages/ro_RO/installing-boot9strap-(hbl-usm).txt index c3854430da..8ff365ef57 100644 --- a/_pages/ro_RO/installing-boot9strap-(hbl-usm).txt +++ b/_pages/ro_RO/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,16 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Cuprins" %} -### Lectură obligatorie +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

As we already have Homebrew access, we can use slotTool to do this.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--danger} @@ -24,7 +27,10 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint #### Secțiunea I - Preparații +In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. + 1. Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide + + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. Launch slotTool from the list of homebrew + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section 1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option @@ -36,22 +42,31 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint 1. Copy `usm.bin` from the unSAFE_MODE `.zip` to the root of your SD card 1. Put your SD card back into your console +![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} + #### Section II - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](https://uwuu.ca/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Secțiunea III - Instalând boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -65,6 +80,8 @@ At this point, your console will boot to Luma3DS by default. #### Section IV - Restoring WiFi Configuration Profiles +In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Lansați aplicația Download Play 1. Așteptați până când vedeți două butoane + Do not press either of the buttons diff --git a/_pages/ro_RO/installing-boot9strap-(soundhax).txt b/_pages/ro_RO/installing-boot9strap-(soundhax).txt index 505397bf16..a421e2c3fb 100644 --- a/_pages/ro_RO/installing-boot9strap-(soundhax).txt +++ b/_pages/ro_RO/installing-boot9strap-(soundhax).txt @@ -4,7 +4,13 @@ title: "Instalând boot9strap (Soundhax)" {% include toc title="Cuprins" %} -### Lectură obligatorie +
+Technical Details (optional) +

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+
+{: .notice--info} + +### Compatibility Notes Soundhax (when combined with universal-otherapp) is compatible with versions 1.0.0 through 11.3.0 in all regions. @@ -21,6 +27,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Secțiunea I - Preparații +In this section, you will copy the files needed to trigger both Soundhax and universal-otherapp. + 1. Închideți dispozitivul 1. Introduceți cardul SD în calculator 1. Copiați fișierul Soundhax `.m4a` în rădăcina cardului SD @@ -33,11 +41,16 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 1. Reintroduceți cardul SD în dispozitivul dumneavoastră 1. Porniți dispozitivul - ![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} #### Secțiunea II - Lansând SafeB9SInstaller +In this section, you will launch Soundhax through the Nintendo 3DS Sound app, which will use universal-otherapp to launch the boot9strap (custom firmware) installer. + 1. Reintroduceți cardul SD în dispozitivul dumneavoastră 1. Porniți dispozitivul 1. Lansați Nintendo 3DS Sound @@ -58,6 +71,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Secțiunea III - Instalând boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap 1. Once it is complete, press (A) to reboot your device 1. Dispozitivul dumneavoastră ar trebui să fi repornit în meniul de configurare Luma3DS diff --git a/_pages/ro_RO/installing-boot9strap-(usm).txt b/_pages/ro_RO/installing-boot9strap-(usm).txt index e5ef0b81b0..ff4f3fab3a 100644 --- a/_pages/ro_RO/installing-boot9strap-(usm).txt +++ b/_pages/ro_RO/installing-boot9strap-(usm).txt @@ -4,15 +4,17 @@ title: "Installing boot9strap (USM)" {% include toc title="Cuprins" %} -### Lectură obligatorie +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

We can do this using an existing exploit, BannerBomb3.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes Aceste instrucțiuni funcționează pe consolele din regiunea SUA, Europa, Japonia și Coreea, indicate de literele U, E, J, sau K după versiunea de sistem. @@ -29,6 +31,8 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will #### Secțiunea I - Preparații +In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. + 1. If your device is powered on, power off your device 1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer 1. Încărcați fișierul movable.sed folosind opțiunea "Choose File" @@ -41,47 +45,51 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will 1. Copiați `boot9strap.firm` și `boot9strap.firm.sha` din arhiva `.zip` boot9strap în folderul `/boot9strap/` de pe cardul SD 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card 1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - + ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }}) - {: .notice--info} - + ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} + ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card 1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. + 1. Reintroduceți cardul SD în dispozitivul dumneavoastră 1. Porniți dispozitivul 1. Porniți System Settings pe consolă -1. Navigați spre `Data Management` -> `DSiWare` -1. Faceți click pe secțiunea SD Card - + Your device should show a menu with some text +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Select "Inject haxx" +1. Press (A) to select "Inject haxx" + Your device will automatically power off #### Section III - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section IV - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -95,16 +103,17 @@ At this point, your console will boot to Luma3DS by default. #### Section V - Restoring WiFi Configuration Profiles +In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Porniți System Settings pe consolă -1. Navigați spre `Data Management` -> `DSiWare` -1. Faceți click pe secțiunea SD Card - + Your device should show a menu with some text -1. Select "Restore slots" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) +1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + Your device will automatically reboot 1. Închideți dispozitivul 1. Introduceți cardul SD în calculator 1. Navigați spre `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` pe cardul SD -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. Acest fișier nu mai este necesar ___ diff --git a/_pages/ro_RO/seedminer.txt b/_pages/ro_RO/seedminer.txt index ab467a7bbf..5f351423d9 100644 --- a/_pages/ro_RO/seedminer.txt +++ b/_pages/ro_RO/seedminer.txt @@ -4,52 +4,54 @@ title: "Seedminer" {% include toc title="Cuprins" %} -### Lectură obligatorie +
+Technical Details (optional) +

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

+

For information on how Seedminer works, see this presentation.

+

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+
+{: .notice--info} -To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. +### Section I - Prep Work -For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). - -Această metodă folosește o placă video puternică pentru a realiza calculele necesare. Pentru a vă ajuta în această metodă, se va folosi un site sprijinit de voluntari. - -### Instrucțiuni - -#### Secțiunea I - Preparații +In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. 1. Introduceți cardul SD în calculator 1. Navigați către folderul `Nintendo 3DS` pe cardul SD -1. Copiați numele lung de 32 de caractere al folderului care îl vedeți în Nintendo 3DS - + Nu accesați în alte foldere - + If you see multiple 32 character long folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + + If you don't have a `Nintendo 3DS` folder, put your SD card into your 3DS and power it on so that the folder can be created +1. Copy the name of the 32-letter folder you see directly inside Nintendo 3DS + + This 32-letter name is system-specific and will be different for each console + + If you see multiple 32-letter folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + You can ignore the `private` folder if you have it - ![]({{ "/images/screenshots/id0-example.png" | absolute_url }}) + ![]({{ "/images/screenshots/seedminer/id0-example.png" | absolute_url }}) {: .notice--info} -1. Lipiţi numele lung al folderului de 32 de caractere într-un document pe care îl puteți referenția mai târziu - + Acest nume de folder este de asemenea cunoscut ca "ID0" al dispozitivului +1. Paste your 32 character long folder name into [a document](/images/screenshots/seedminer/text-document.png) you can reference later + + This folder is known as your "ID0". Take note of this as this guide will refer to it as such later 1. Porniți dispozitivul + Your SD card does not need to be inserted at this point 1. Go to your Friend List (the [orange Face Icon]({{ "/images/friend-list-icon.png" | absolute_url }}) in the top row of your HOME Menu) + If you receive an error and are kicked out of the menu, you either must create a new Mii or your device cannot connect to Nintendo's servers (due to a ban or connection issues) 1. Găsiți profilul de Mii, apoi găsiţi câmpul "Friend Code" de pe ecranul superior -#### Section II - Seedminer +### Section II - Seedminer + +In this section, you will use the Bruteforce Movable website to retrieve your device's encryption key in the form of `movable.sed`. 1. Open [Bruteforce Movable](https://seedminer.hacks.guide/) on your computer - + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) + If the site isn't working, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field - + Do not attempt to enter the ID0 by hand. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section + + Do not attempt to enter the ID0 manually, as it is easy to make a mistake. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section 1. Select "Go" + If the site immediately goes to step 4, the website has already correctly processed your bruteforce request. You can download your `movable.sed` file and continue to the next section. You do not need to re-add the bot -1. Use the "Register Friend" button on your device to add the bot's friend code as given by the website +1. Use the ["Register Friend" button](/images/screenshots/seedminer/register-friend.png) on your device to add the bot's friend code as given by the website + If prompted, the name that you give to the friend does not matter 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once 1. Once the site processes your information, the site will continue to `Step 2: Bruteforce` automatically 1. Wait for the remainder of the process to complete - + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour + + This is usually fast (1-5 minutes) + During this process, the bot you added may not show up on your 3DS. As long as the website updates, this is not an issue + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site @@ -57,7 +59,7 @@ Această metodă folosește o placă video puternică pentru a realiza calculele ___ -### Next Steps +### Next steps: Choose an exploit Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. diff --git a/_pages/ru_RU/bannerbomb3.txt b/_pages/ru_RU/bannerbomb3.txt index 939aba0a20..58086b4b22 100644 --- a/_pages/ru_RU/bannerbomb3.txt +++ b/_pages/ru_RU/bannerbomb3.txt @@ -4,11 +4,15 @@ title: "BannerBomb3" {% include toc title="Содержание" %} -### Обязательно к прочтению +
+Technical Details (optional) +

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

For a more technical explanation, see here.

+
+{: .notice--info} -Чтобы получить дамп системного DSiWare приложения, мы воспользуемся уязвимостью в разделе Управление данными DSiWare внутри приложения Настройки. - -Для этого мы используем ключ шифрования вашей консоли (movable.sed), чтобы создать бэкап DSiWare, который при помощи уязвимости в системе позволит создать дамп приложения DSi Internet Settings в корне SD-карты. +### Compatibility Notes Эти инструкции работают на консолях регионов USA, Europe, Japan и Korea. На регион консоли указывает буква U, E, J или K после версии прошивки. @@ -20,6 +24,9 @@ If you have a Taiwanese console (indicated by a T after the system version), fol * Ваш файл `movable.sed`, полученный на странице [Seedminer](seedminer) #### Часть I - Подготовительные работы + +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + 1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer 1. Загрузите свой movable.sed, используя опцию "Выберите файл" 1. Click "Build and Download" @@ -27,28 +34,31 @@ If you have a Taiwanese console (indicated by a T after the system version), fol 1. Если консоль включена, выключите консоль 1. Вставьте SD-карту в компьютер 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from the BannerBomb3 `.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Часть II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. + 1. Вставьте SD-карту обратно в консоль 1. Включите консоль 1. Откройте Системные настройки на вашей консоли -1. Перейдите в `Управление данными` -> `DSiWare` -1. Перейдите в раздел Карта microSD +1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + Экран должен мигнуть розовым (ярко-фиолетовым), через несколько секунд приложение закроется с ошибкой. Это означает, что эксплойт сработал 1. Выключите консоль 1. Вставьте SD-карту в компьютер -1. Теперь у вас должен быть файл `42383841.bin` в корне SD-карты. Это бэкап DSiWare, который вы будете использовать позже в руководстве -1. Перейдите в папку `Nintendo 3DS` -> `` -> `<32-значный-id>` -> `Nintendo DSiWare` на SD-карте - + `` будет таким же, как и на странице [Seedminer](seedminer) -1. Удалите `F00D43D5.bin` из папки Nintendo DSiWare и с вашего компьютера. Этот файл больше не нужен +1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page +1. Перейдите в папку `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` на SD-карте +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. Этот файл больше не нужен + Следующий шаг: [Установка boot9strap (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} diff --git a/_pages/ru_RU/finalizing-setup.txt b/_pages/ru_RU/finalizing-setup.txt index ab123375ee..78ce6886f7 100644 --- a/_pages/ru_RU/finalizing-setup.txt +++ b/_pages/ru_RU/finalizing-setup.txt @@ -20,6 +20,8 @@ On this page, we will make critical system file backups and install the followin It is not recommended to skip downloading any of these applications, as many of them will be used later on this page. At the end of this page, your SD card will be cleaned up by removing unnecessary installation files. {: .notice--warning} +### Compatibility Notes + If your **New 3DS** was on version 2.1.0 before following this guide, you should [restore your NAND backup](godmode9-usage#restoring-a-nand-backup) before continuing. {: .notice--warning} @@ -39,6 +41,8 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o #### Часть I - Подготовительные работы +In this section, you will copy the files necessary to follow the rest of the instructions on this page. + 1. Выключите консоль 1. Вставьте SD-карту в компьютер 1. Создайте папку `cias` в корне SD-карты, если таковой нет @@ -52,15 +56,20 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o 1. Вставьте SD-карту обратно в консоль 1. Включите консоль - ![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) - {: .notice--info} - ![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) - {: .notice--info} +The screenshots below indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. + +![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) +{: .notice--info} + -These screenshots indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. #### Часть II - Обновление системы +In this section, you will update your system to the latest version, which is safe to do with custom firmware. + 1. Обновите прошивку консоли, зайдя в Системные настройки (System Settings), затем "Прочие настройки" (Other Settings), затем листайте вправо до конца и выберите пункт "Обновление" (System Update) + Обновление консоли с установленным B9S + Luma (установленых у вас) безопасно + Вместо начала процесса обновления может появиться сообщение "Система обновлена". Это нормально, если вы уже на последней версии прошивки; переходите к следующей части @@ -69,6 +78,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Часть III - Homebrew Launcher +In this section, you will temporarily replace Download Play with Homebrew Launcher (which we need to launch FBI). Download Play will automatically go back to normal once you reboot your device. + 1. Запустите приложение Загружаемая игра (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. Wait until you see the `Nintendo 3DS` and `Nintendo DS` buttons 1. Нажмите (L) + (Вниз) + (Select) одновременно чтобы открыть меню Rosalina @@ -83,6 +94,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section IV - RTC and DSP Setup +In this section, you will sync your 3DS internal clock with the actual time and dump the sound firmware (which is necesssary for some homebrew software to use sound properly). + 1. Нажмите (L) + (Вниз) + (Select) одновременно чтобы открыть меню Rosalina 1. Выберите "Miscellaneous options" 1. Select "Dump DSP firmware" @@ -94,6 +107,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section V - Installing CIAs +In this section, you will install several useful homebrew applications to HOME Menu. + 1. Выберите FBI в списке homebrew 1. Перейдите в `SD` -> `cias` 1. Выберите "\" @@ -102,6 +117,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Часть VI - CTRNAND Luma3DS +In this section, you will use a script to copy some of Luma3DS's files to internal memory so that they can be accessed, even without an SD card inserted. + 1. Выключите консоль 1. Press and hold (Start), and while holding (Start), power on your device. This will launch GodMode9 + If you do not boot into GodMode9, ensure that `GodMode9.firm` is in `/luma/payloads/` and that `payloads` is correctly spelled @@ -118,6 +135,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Часть VII - Очистка SD-карты +In this section, you will use a script to remove some unnecessary files from your SD card. + 1. Выберите "Cleanup SD Card" 1. При появлении запроса, нажмите (A) для продолжения 1. Нажмите (A), чтобы продолжить @@ -125,6 +144,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Часть VIII - Бэкап важных файлов +In this section, you will make backups of flies that can be used to recover from softwaer bricks or to recover data. + 1. Выберите "Backup Options" 1. Выберите "SysNAND Backup" 1. Нажмите (A) для подтверждения @@ -159,7 +180,7 @@ You're done! Custom firmware is now fully configured on your device. Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! {: .notice--info} -#### Информация и замечания +### Information and Notes {% capture notice-6 %} Here are some key combos that you should know: diff --git a/_pages/ru_RU/homebrew-launcher-(pichaxx).txt b/_pages/ru_RU/homebrew-launcher-(pichaxx).txt index 2a61e2fff1..1a81da30f6 100644 --- a/_pages/ru_RU/homebrew-launcher-(pichaxx).txt +++ b/_pages/ru_RU/homebrew-launcher-(pichaxx).txt @@ -4,9 +4,17 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Содержание" %} -### Обязательно к прочтению +
+Technical Details (optional) +This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. +
+{: .notice--info} -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE to run SafeB9SInstaller. +### Compatibility Notes + +These instructions work on USA, Europe, and Japan consoles as indicated by the letters U, E, or J after the system version. + +You will need a Nintendo Network ID to download Pokémon Picross. This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. {: .notice--warning} @@ -24,15 +32,8 @@ This process will overwrite your Pokémon Picross save file, if you have one. If #### Часть I - Подготовительные работы -1. Включите консоль -1. Open the Nintendo eShop -1. Tap the Search icon (small magnifying glass) -1. Search for `picross` -1. Open the store page for Pokémon Picross -1. Download Pokémon Picross - + You can scan [this QR code](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=ESHOP://50010000037815&margin=0&qzone=1&size=400x400&ecc=L) using the Nintendo 3DS Camera for a direct link to the eShop app - + Your SD card must be inserted in your device to install Pokémon Picross -1. Выключите консоль +In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. + 1. Вставьте SD-карту в компьютер 1. Скопируйте файлы `boot.firm` и `boot.3dsx` из `.zip-архива` Luma3DS в корень SD-карты + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it @@ -40,8 +41,16 @@ This process will overwrite your Pokémon Picross save file, if you have one. If 1. Copy the `slotTool` folder from the unSAFE_MODE `.zip` to the `3ds` folder on your SD card 1. Copy the otherapp payload for your region/version from the unSAFE_MODE `.zip`'s `otherapps_with_CfgS` folder to the root of your SD card and rename it to `otherapp.bin` +![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }}) +{: .notice--info} + + #### Часть II - PicHaxx +In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device. 1. Open [the PicHaxx Injector website](https://3ds.nhnarwhal.com/3dstools/pichaxx.php) on your computer 1. Выберите свой файл `movable.sed` 1. Выберите "Build and Download" diff --git a/_pages/ru_RU/installing-boot9strap-(fredtool).txt b/_pages/ru_RU/installing-boot9strap-(fredtool).txt index f767d147d3..d53a50512e 100644 --- a/_pages/ru_RU/installing-boot9strap-(fredtool).txt +++ b/_pages/ru_RU/installing-boot9strap-(fredtool).txt @@ -4,15 +4,16 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Содержание" %} -### Обязательно к прочтению - -Этот метод дальнейшей эксплуатации Seedminer использует ваш файл `movable.sed` для расшифровки любого тайтла DSiWare в целях инъекции уязвимого тайтла DSiWare в приложение DS Internet Settings. Этот метод требует наличия бэкапа DSiWare, полученного с помощью BannerBomb или DSiWare Dumper. - -Это рабочая реализация эксплойта "FIRM partitions known-plaintext". Подробнее о нем [здесь](https://www.3dbrew.org/wiki/3DS_System_Flaws) (англ.). +
+Technical Details (optional) +

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+
+{: .notice--info} ### Что понадобится -* A DSiWare Backup (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) +* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Ваш файл `movable.sed`, полученный на странице [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -20,6 +21,8 @@ title: "Installing boot9strap (Fredtool)" #### Section I - CFW Check +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + 1. Выключите консоль 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button @@ -30,17 +33,7 @@ If you see a configuration menu, you already have CFW, and continuing with these #### Часть II - Подготовка -1. Выключите консоль -1. Вставьте SD-карту в компьютер -1. Скопируйте файлы `boot.firm` и `boot.3dsx` из `.zip-архива` Luma3DS в корень SD-карты - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Скопируйте `boot.nds` (B9STool) в корень SD-карты -1. Скопируйте папку `private` из `.zip-архива` Frogminer_save в корень SD-карты - - ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} - -#### Section III - Fredtool +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) @@ -53,19 +46,31 @@ If you see a configuration menu, you already have CFW, and continuing with these 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link +1. Вставьте SD-карту в компьютер 1. Перейдите в папку `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` на SD-карте - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` - + If the `Nintendo DSiWare` folder does not exist, create it inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` 1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder -1. Вставьте SD-карту обратно в консоль + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Скопируйте файлы `boot.firm` и `boot.3dsx` из `.zip-архива` Luma3DS в корень SD-карты + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Скопируйте `boot.nds` (B9STool) в корень SD-карты +1. Скопируйте папку `private` из `.zip-архива` Frogminer_save в корень SD-карты + + ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} + +#### Section III - Overwriting DS Connection Settings + +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + 1. Включите консоль 1. Откройте Системные настройки на вашей консоли -1. Перейдите в `Управление данными` -> `DSiWare` -1. На вкладке "Карта SD" выберите тайтл "Haxxxxxxxxx!" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title 1. Выберите "Копировать", затем "OK" 1. Вернитесь в главное меню Системных настроек -1. Перейдите в `Интернет-настройки` -> `Подключения Nintendo DS`, затем нажмите "OK" +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. Если эксплойт сработал корректно, запустится японская версия Flipnote Studio #### Section IV - Flipnote Exploit @@ -73,6 +78,8 @@ If you see a configuration menu, you already have CFW, and continuing with these Если вы предпочитаете визуальное руководство вместо этой части, оно доступно [здесь](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} +In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer. + 1. Пройдите процесс первоначальной настройки в запущенной игре, пока не попадете в главное меню + Выберите опцию слева при появлении запроса во время процесса настройки 1. С помощью сенсорного экрана нажмите на большой значок слева, затем на значок с SD-картой @@ -85,7 +92,7 @@ If you see a configuration menu, you already have CFW, and continuing with these 1. Нажмите на четвертый значок с буквой "A" 1. Если эксплойт сработал корректно, запустится b9sTool 1. Используя крестовину, выберите "Install boot9strap" - + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to start over from Step 12 of Section III + + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III 1. Нажмите (A), затем нажмите START и SELECT одновременно, чтобы начать процесс 1. После завершения процесса и появления на нижнем экране надписи "done.", выйдите из b9sTool, затем выключите консоль + При необходимости выключите консоль принудительно, удерживая кнопку питания @@ -94,6 +101,8 @@ If you see a configuration menu, you already have CFW, and continuing with these #### Section V - Luma3DS Verification +Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. + 1. Выключите консоль 1. Вставьте SD-карту в компьютер 1. Verify that a `luma` folder exists and that `config.ini` is inside of it @@ -106,13 +115,15 @@ At this point, your console will boot to Luma3DS by default. #### Section VI - Restoring DS Connection Settings -1. Copy the `42383841.bin` file from the `clean/` folder of the downloaded DSiWare archive (`output_(name).zip`) to the `Nintendo 3DS///Nintendo DSiWare/` folder on your SD card - + Замените существующий файл `42383841.bin` +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. + +1. Перейдите в папку `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` на SD-карте +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one 1. Вставьте SD-карту обратно в консоль 1. Включите консоль 1. Откройте Системные настройки на вашей консоли -1. Перейдите в `Управление данными` -> `DSiWare` -1. На вкладке "Карта SD" выберите тайтл "Nintendo DSi™" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title 1. Выберите "Копировать", затем "OK" ___ diff --git a/_pages/ru_RU/installing-boot9strap-(hbl-usm).txt b/_pages/ru_RU/installing-boot9strap-(hbl-usm).txt index 058b1438e4..a37585903f 100644 --- a/_pages/ru_RU/installing-boot9strap-(hbl-usm).txt +++ b/_pages/ru_RU/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,16 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Содержание" %} -### Обязательно к прочтению +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

As we already have Homebrew access, we can use slotTool to do this.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+
+{: .notice--info} -Для того, чтобы использовать уязвимость в SAFE_MODE прошивке консоли, нам нужно внедрить модифицированный WiFi профиль. - -As we already have Homebrew access, we can use slotTool to do this. - -После того, как профиль Wi-Fi будет внедрен, мы используем SAFE_MODE, функцию восстановления, которая присутствует на всех консолях 3DS, для активации модифицированного WiFi профиля. +### Compatibility Notes If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--danger} @@ -24,7 +27,10 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint #### Часть I - Подготовительные работы +In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. + 1. Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide + + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. Launch slotTool from the list of homebrew + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section 1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option @@ -36,22 +42,31 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint 1. Copy `usm.bin` from the unSAFE_MODE `.zip` to the root of your SD card 1. Put your SD card back into your console +![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} + #### Section II - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Нажмите "OK" чтобы начать обновление + Обновления не будет. Это часть эксплойта 1. Нажмите "Я принимаю" чтобы принять условия 1. The update will eventually fail, with the error code `003-1099`. Это ожидаемое поведение 1. При запросе "Выполнить Интернет-настройки?", выберите "Выполнить" -1. В следующем меню перейдите в `Связь 1` -> `Изменить настройки` -> `Следующая страница (стрелка вправо)` -> `Настройки прокси` -> `Подробнее` - + This is a [visual representation](https://uwuu.ca/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Часть III - Установка boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -65,6 +80,8 @@ At this point, your console will boot to Luma3DS by default. #### Section IV - Restoring WiFi Configuration Profiles +In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Запустите приложение Загружаемая игра 1. Дождитесь появления двух кнопок + Do not press either of the buttons diff --git a/_pages/ru_RU/installing-boot9strap-(soundhax).txt b/_pages/ru_RU/installing-boot9strap-(soundhax).txt index 0604decb95..350db12413 100644 --- a/_pages/ru_RU/installing-boot9strap-(soundhax).txt +++ b/_pages/ru_RU/installing-boot9strap-(soundhax).txt @@ -4,7 +4,13 @@ title: "Установка boot9strap (Soundhax)" {% include toc title="Содержание" %} -### Обязательно к прочтению +
+Technical Details (optional) +

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+
+{: .notice--info} + +### Compatibility Notes Soundhax (when combined with universal-otherapp) is compatible with versions 1.0.0 through 11.3.0 in all regions. @@ -21,6 +27,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Часть I - Подготовительные работы +In this section, you will copy the files needed to trigger both Soundhax and universal-otherapp. + 1. Выключите консоль 1. Вставьте SD-карту в компьютер 1. Скопируйте Soundhax `.m4a` в корень вашей SD-карты @@ -33,11 +41,16 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 1. Вставьте SD-карту обратно в консоль 1. Включите консоль - ![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} #### Часть II - Запуск SafeB9SInstaller +In this section, you will launch Soundhax through the Nintendo 3DS Sound app, which will use universal-otherapp to launch the boot9strap (custom firmware) installer. + 1. Вставьте SD-карту обратно в консоль 1. Включите консоль 1. Запустите приложение Звук Nintendo 3DS (Nintendo 3DS Sound) @@ -58,6 +71,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Часть III - Установка boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap 1. Once it is complete, press (A) to reboot your device 1. Ваша консоль должна перезагрузиться в меню конфигурации Luma3DS diff --git a/_pages/ru_RU/installing-boot9strap-(usm).txt b/_pages/ru_RU/installing-boot9strap-(usm).txt index 0dee773dcc..a584371d0b 100644 --- a/_pages/ru_RU/installing-boot9strap-(usm).txt +++ b/_pages/ru_RU/installing-boot9strap-(usm).txt @@ -4,15 +4,17 @@ title: "Установка boot9strap (USM)" {% include toc title="Содержание" %} -### Обязательно к прочтению +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

We can do this using an existing exploit, BannerBomb3.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

+
+{: .notice--info} -Для того, чтобы использовать уязвимость в SAFE_MODE прошивке консоли, нам нужно внедрить модифицированный WiFi профиль. - -Мы можем сделать это, используя существующий эксплойт, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -После того, как профиль Wi-Fi будет внедрен, мы используем SAFE_MODE, функцию восстановления, которая присутствует на всех консолях 3DS, для активации модифицированного WiFi профиля. +### Compatibility Notes Эти инструкции работают на консолях регионов USA, Europe, Japan и Korea. На регион консоли указывает буква U, E, J или K после версии прошивки. @@ -29,6 +31,8 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will #### Часть I - Подготовительные работы +In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. + 1. If your device is powered on, power off your device 1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer 1. Загрузите свой movable.sed, используя опцию "Выберите файл" @@ -41,47 +45,51 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will 1. Скопируйте `boot9strap.firm` и `boot9strap.firm.sha` из `.zip-архива` boot9strap в папку `/boot9strap/` в корне SD-карты 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card 1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - + ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }}) - {: .notice--info} - + ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} + ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card 1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Часть II - BannerBomb3 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. + 1. Вставьте SD-карту обратно в консоль 1. Включите консоль 1. Откройте Системные настройки на вашей консоли -1. Перейдите в `Управление данными` -> `DSiWare` -1. Перейдите в раздел Карта microSD - + Your device should show a menu with some text +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Select "Inject haxx" +1. Press (A) to select "Inject haxx" + Your device will automatically power off #### Часть III - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Нажмите "OK" чтобы начать обновление + Обновления не будет. Это часть эксплойта 1. Нажмите "Я принимаю" чтобы принять условия 1. The update will eventually fail, with the error code `003-1099`. Это ожидаемое поведение 1. При запросе "Выполнить Интернет-настройки?", выберите "Выполнить" -1. В следующем меню перейдите в `Связь 1` -> `Изменить настройки` -> `Следующая страница (стрелка вправо)` -> `Настройки прокси` -> `Подробнее` - + This is a [visual representation](/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section IV - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -95,16 +103,17 @@ At this point, your console will boot to Luma3DS by default. #### Section V - Restoring WiFi Configuration Profiles +In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Откройте Системные настройки на вашей консоли -1. Перейдите в `Управление данными` -> `DSiWare` -1. Перейдите в раздел Карта microSD - + Your device should show a menu with some text -1. Select "Restore slots" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) +1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + Your device will automatically reboot 1. Выключите консоль 1. Вставьте SD-карту в компьютер 1. Перейдите в папку `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` на SD-карте -1. Удалите `F00D43D5.bin` из папки Nintendo DSiWare +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. Этот файл больше не нужен ___ diff --git a/_pages/ru_RU/seedminer.txt b/_pages/ru_RU/seedminer.txt index abdacfbe42..e97d0defcf 100644 --- a/_pages/ru_RU/seedminer.txt +++ b/_pages/ru_RU/seedminer.txt @@ -4,52 +4,54 @@ title: "Seedminer" {% include toc title="Содержание" %} -### Обязательно к прочтению +
+Technical Details (optional) +

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

+

For information on how Seedminer works, see this presentation.

+

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+
+{: .notice--info} -To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. +### Section I - Prep Work -For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). - -Этот метод использует мощную видеокарту для выполнения необходимых вычислений. Веб-сайт, поддерживаемый волонтерами, используется для оказания вам помощи с этим методом. - -### Инструкция - -#### Часть I - Подготовительные работы +In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. 1. Вставьте SD-карту в компьютер 1. Перейдите в папку `Nintendo 3DS` на SD-карте -1. Скопируйте имя папки из 32 символов, которую вы видите внутри папки Nintendo 3DS - + Не заходите дальше внутрь других папок - + If you see multiple 32 character long folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + + If you don't have a `Nintendo 3DS` folder, put your SD card into your 3DS and power it on so that the folder can be created +1. Copy the name of the 32-letter folder you see directly inside Nintendo 3DS + + This 32-letter name is system-specific and will be different for each console + + If you see multiple 32-letter folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + You can ignore the `private` folder if you have it - ![]({{ "/images/screenshots/id0-example.png" | absolute_url }}) + ![]({{ "/images/screenshots/seedminer/id0-example.png" | absolute_url }}) {: .notice--info} -1. Вставьте имя папки из 32 символов в документ, к которому вы сможете обратиться позже - + Имя этой папки также известно как ваш "ID0" +1. Paste your 32 character long folder name into [a document](/images/screenshots/seedminer/text-document.png) you can reference later + + This folder is known as your "ID0". Take note of this as this guide will refer to it as such later 1. Включите консоль + Your SD card does not need to be inserted at this point 1. Go to your Friend List (the [orange Face Icon]({{ "/images/friend-list-icon.png" | absolute_url }}) in the top row of your HOME Menu) + If you receive an error and are kicked out of the menu, you either must create a new Mii or your device cannot connect to Nintendo's servers (due to a ban or connection issues) 1. Найдите свой профиль Mii, затем найдите поле "Код друга" на верхнем экране -#### Section II - Seedminer +### Section II - Seedminer + +In this section, you will use the Bruteforce Movable website to retrieve your device's encryption key in the form of `movable.sed`. 1. Open [Bruteforce Movable](https://seedminer.hacks.guide/) on your computer - + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) + If the site isn't working, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field - + Do not attempt to enter the ID0 by hand. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section + + Do not attempt to enter the ID0 manually, as it is easy to make a mistake. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section 1. Select "Go" + If the site immediately goes to step 4, the website has already correctly processed your bruteforce request. You can download your `movable.sed` file and continue to the next section. You do not need to re-add the bot -1. Use the "Register Friend" button on your device to add the bot's friend code as given by the website +1. Use the ["Register Friend" button](/images/screenshots/seedminer/register-friend.png) on your device to add the bot's friend code as given by the website + If prompted, the name that you give to the friend does not matter 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once 1. Once the site processes your information, the site will continue to `Step 2: Bruteforce` automatically 1. Wait for the remainder of the process to complete - + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour + + This is usually fast (1-5 minutes) + During this process, the bot you added may not show up on your 3DS. As long as the website updates, this is not an issue + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site @@ -57,7 +59,7 @@ For information on how Seedminer works, see [this presentation](https://zoogie.g ___ -### Next Steps +### Next steps: Choose an exploit Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. diff --git a/_pages/sv_SE/bannerbomb3.txt b/_pages/sv_SE/bannerbomb3.txt index a17abbf5bd..4105739a69 100644 --- a/_pages/sv_SE/bannerbomb3.txt +++ b/_pages/sv_SE/bannerbomb3.txt @@ -4,11 +4,15 @@ title: "BannerBomb3" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

For a more technical explanation, see here.

+
+{: .notice--info} -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -20,6 +24,9 @@ If you have a Taiwanese console (indicated by a T after the system version), fol * Your `movable.sed` file from completing [Seedminer](seedminer) #### Section I - Prep Work + +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + 1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer 1. Upload your movable.sed using the "Choose File" option 1. Click "Build and Download" @@ -27,28 +34,31 @@ If you have a Taiwanese console (indicated by a T after the system version), fol 1. If your console is powered on, power off your console 1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from the BannerBomb3 `.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. + 1. Sätt tillbaka ditt SD-kort i din enhet 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section +1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked 1. Stäng av din enhet 1. Insert your SD card into your computer -1. You should now have `42383841.bin` in SD root. This is the DSiWare backup you will use later in the guide -1. Navigate to `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card - + This `` will be the same one that you used in [Seedminer](seedminer) -1. Delete `F00D43D5.bin` from the Nintendo DSiWare folder and from your computer. This file will not be needed anymore +1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore + Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} diff --git a/_pages/sv_SE/finalizing-setup.txt b/_pages/sv_SE/finalizing-setup.txt index 4c84ef511c..88ba505319 100644 --- a/_pages/sv_SE/finalizing-setup.txt +++ b/_pages/sv_SE/finalizing-setup.txt @@ -20,6 +20,8 @@ On this page, we will make critical system file backups and install the followin It is not recommended to skip downloading any of these applications, as many of them will be used later on this page. At the end of this page, your SD card will be cleaned up by removing unnecessary installation files. {: .notice--warning} +### Compatibility Notes + If your **New 3DS** was on version 2.1.0 before following this guide, you should [restore your NAND backup](godmode9-usage#restoring-a-nand-backup) before continuing. {: .notice--warning} @@ -39,6 +41,8 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o #### Section I - Prep Work +In this section, you will copy the files necessary to follow the rest of the instructions on this page. + 1. Stäng av din enhet 1. Insert your SD card into your computer 1. Skapa en mapp vid namn `cias` i roten av ditt SD-kort om den inte redan finns @@ -52,15 +56,20 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o 1. Sätt tillbaka ditt SD-kort i din enhet 1. Power on your device - ![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) - {: .notice--info} - ![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) - {: .notice--info} +The screenshots below indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. + +![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) +{: .notice--info} + -These screenshots indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. #### Section II - Updating the System +In this section, you will update your system to the latest version, which is safe to do with custom firmware. + 1. Update your device by going to System Settings, then "Other Settings", then going all the way to the right and using "System Update" + Updates while using B9S + Luma (what you have) are safe + The updater may display a message saying "Your system is up to date" instead of updating. This is normal if you are already up to date; continue with the next section @@ -69,6 +78,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section III - Homebrew Launcher +In this section, you will temporarily replace Download Play with Homebrew Launcher (which we need to launch FBI). Download Play will automatically go back to normal once you reboot your device. + 1. Launch the Download Play application (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. Wait until you see the `Nintendo 3DS` and `Nintendo DS` buttons 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu @@ -83,6 +94,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section IV - RTC and DSP Setup +In this section, you will sync your 3DS internal clock with the actual time and dump the sound firmware (which is necesssary for some homebrew software to use sound properly). + 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu 1. Select "Miscellaneous options" 1. Select "Dump DSP firmware" @@ -94,6 +107,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section V - Installing CIAs +In this section, you will install several useful homebrew applications to HOME Menu. + 1. Launch FBI from the list of homebrew 1. Navigate to `SD` -> `cias` 1. Select "\" @@ -102,6 +117,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VI - CTRNAND Luma3DS +In this section, you will use a script to copy some of Luma3DS's files to internal memory so that they can be accessed, even without an SD card inserted. + 1. Stäng av din enhet 1. Press and hold (Start), and while holding (Start), power on your device. This will launch GodMode9 + If you do not boot into GodMode9, ensure that `GodMode9.firm` is in `/luma/payloads/` and that `payloads` is correctly spelled @@ -118,6 +135,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VII - Cleanup SD Card +In this section, you will use a script to remove some unnecessary files from your SD card. + 1. Select "Cleanup SD Card" 1. When prompted, press (A) to proceed 1. Press (A) to continue @@ -125,6 +144,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VIII - Backup Essential Files +In this section, you will make backups of flies that can be used to recover from softwaer bricks or to recover data. + 1. Select "Backup Options" 1. Select "SysNAND Backup" 1. Press (A) to confirm @@ -159,7 +180,7 @@ You're done! Custom firmware is now fully configured on your device. Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! {: .notice--info} -#### Information and Notes +### Information and Notes {% capture notice-6 %} Here are some key combos that you should know: diff --git a/_pages/sv_SE/homebrew-launcher-(pichaxx).txt b/_pages/sv_SE/homebrew-launcher-(pichaxx).txt index eeba590c22..2958e11e24 100644 --- a/_pages/sv_SE/homebrew-launcher-(pichaxx).txt +++ b/_pages/sv_SE/homebrew-launcher-(pichaxx).txt @@ -4,9 +4,17 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. +
+{: .notice--info} -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE to run SafeB9SInstaller. +### Compatibility Notes + +These instructions work on USA, Europe, and Japan consoles as indicated by the letters U, E, or J after the system version. + +You will need a Nintendo Network ID to download Pokémon Picross. This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. {: .notice--warning} @@ -24,15 +32,8 @@ This process will overwrite your Pokémon Picross save file, if you have one. If #### Section I - Prep Work -1. Power on your device -1. Open the Nintendo eShop -1. Tap the Search icon (small magnifying glass) -1. Search for `picross` -1. Open the store page for Pokémon Picross -1. Download Pokémon Picross - + You can scan [this QR code](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=ESHOP://50010000037815&margin=0&qzone=1&size=400x400&ecc=L) using the Nintendo 3DS Camera for a direct link to the eShop app - + Your SD card must be inserted in your device to install Pokémon Picross -1. Stäng av din enhet +In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. + 1. Insert your SD card into your computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it @@ -40,8 +41,16 @@ This process will overwrite your Pokémon Picross save file, if you have one. If 1. Copy the `slotTool` folder from the unSAFE_MODE `.zip` to the `3ds` folder on your SD card 1. Copy the otherapp payload for your region/version from the unSAFE_MODE `.zip`'s `otherapps_with_CfgS` folder to the root of your SD card and rename it to `otherapp.bin` +![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }}) +{: .notice--info} + + #### Section II - PicHaxx +In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device. 1. Open [the PicHaxx Injector website](https://3ds.nhnarwhal.com/3dstools/pichaxx.php) on your computer 1. Select your `movable.sed` file 1. Select "Build and Download" diff --git a/_pages/sv_SE/installing-boot9strap-(fredtool).txt b/_pages/sv_SE/installing-boot9strap-(fredtool).txt index bb31e03a72..f3fa4501f4 100644 --- a/_pages/sv_SE/installing-boot9strap-(fredtool).txt +++ b/_pages/sv_SE/installing-boot9strap-(fredtool).txt @@ -4,15 +4,16 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Table of Contents" %} -### Required Reading - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, for example from BannerBomb or the DSiWare Dumper tool. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). +
+Technical Details (optional) +

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+
+{: .notice--info} ### What You Need -* A DSiWare Backup (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) +* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -20,6 +21,8 @@ This is a currently working implementation of the "FIRM partitions known-plainte #### Section I - CFW Check +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + 1. Stäng av din enhet 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button @@ -30,17 +33,7 @@ If you see a configuration menu, you already have CFW, and continuing with these #### Section II - Prep Work -1. Stäng av din enhet -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card - - ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} - -#### Section III - Fredtool +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) @@ -53,19 +46,31 @@ If you see a configuration menu, you already have CFW, and continuing with these 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link +1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` - + If the `Nintendo DSiWare` folder does not exist, create it inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` 1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder -1. Sätt tillbaka ditt SD-kort i din enhet + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card + + ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} + +#### Section III - Overwriting DS Connection Settings + +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Haxxxxxxxxx!" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title 1. Select "Copy", then select "OK" 1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio #### Section IV - Flipnote Exploit @@ -73,6 +78,8 @@ If you see a configuration menu, you already have CFW, and continuing with these If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} +In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer. + 1. Complete the initial setup process for the launched game until you reach the main menu + Select the left option whenever prompted during the setup process 1. Using the touch-screen, select the large left box, then select the box with an SD card icon @@ -85,7 +92,7 @@ If you would prefer a visual guide to this section, one is available [here](http 1. Tap the fourth box with the letter "A" in it 1. If the exploit was successful, your device will have loaded b9sTool 1. Using the D-Pad, move to "Install boot9strap" - + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to start over from Step 12 of Section III + + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III 1. Press (A), then press START and SELECT at the same time to begin the process 1. Once completed and the bottom screen says "done.", exit b9sTool, then power off your device + You may have to force power off by holding the power button @@ -94,6 +101,8 @@ If you would prefer a visual guide to this section, one is available [here](http #### Section V - Luma3DS Verification +Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. + 1. Stäng av din enhet 1. Insert your SD card into your computer 1. Verify that a `luma` folder exists and that `config.ini` is inside of it @@ -106,13 +115,15 @@ At this point, your console will boot to Luma3DS by default. #### Section VI - Restoring DS Connection Settings -1. Copy the `42383841.bin` file from the `clean/` folder of the downloaded DSiWare archive (`output_(name).zip`) to the `Nintendo 3DS///Nintendo DSiWare/` folder on your SD card - + Replace the existing `42383841.bin` file +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one 1. Sätt tillbaka ditt SD-kort i din enhet 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Nintendo DSi™" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title 1. Select "Copy", then select "OK" ___ diff --git a/_pages/sv_SE/installing-boot9strap-(hbl-usm).txt b/_pages/sv_SE/installing-boot9strap-(hbl-usm).txt index 142604d9b0..6c9a3f849c 100644 --- a/_pages/sv_SE/installing-boot9strap-(hbl-usm).txt +++ b/_pages/sv_SE/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,16 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

As we already have Homebrew access, we can use slotTool to do this.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--danger} @@ -24,7 +27,10 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint #### Section I - Prep Work +In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. + 1. Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide + + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. Launch slotTool from the list of homebrew + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section 1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option @@ -36,22 +42,31 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint 1. Copy `usm.bin` from the unSAFE_MODE `.zip` to the root of your SD card 1. Put your SD card back into your console +![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} + #### Section II - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](https://uwuu.ca/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section III - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -65,6 +80,8 @@ At this point, your console will boot to Luma3DS by default. #### Section IV - Restoring WiFi Configuration Profiles +In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch the Download Play application 1. Wait until you see the two buttons + Do not press either of the buttons diff --git a/_pages/sv_SE/installing-boot9strap-(soundhax).txt b/_pages/sv_SE/installing-boot9strap-(soundhax).txt index d0d586b0f5..fe95e556be 100644 --- a/_pages/sv_SE/installing-boot9strap-(soundhax).txt +++ b/_pages/sv_SE/installing-boot9strap-(soundhax).txt @@ -4,7 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+
+{: .notice--info} + +### Compatibility Notes Soundhax (when combined with universal-otherapp) is compatible with versions 1.0.0 through 11.3.0 in all regions. @@ -21,6 +27,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Section I - Prep Work +In this section, you will copy the files needed to trigger both Soundhax and universal-otherapp. + 1. Stäng av din enhet 1. Insert your SD card into your computer 1. Copy the Soundhax `.m4a` to the root of your SD card @@ -33,11 +41,16 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 1. Sätt tillbaka ditt SD-kort i din enhet 1. Power on your device - ![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} #### Section II - Launching SafeB9SInstaller +In this section, you will launch Soundhax through the Nintendo 3DS Sound app, which will use universal-otherapp to launch the boot9strap (custom firmware) installer. + 1. Sätt tillbaka ditt SD-kort i din enhet 1. Power on your device 1. Launch Nintendo 3DS Sound @@ -58,6 +71,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Section III - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap 1. Once it is complete, press (A) to reboot your device 1. Your device should have rebooted into the Luma3DS configuration menu diff --git a/_pages/sv_SE/installing-boot9strap-(usm).txt b/_pages/sv_SE/installing-boot9strap-(usm).txt index c3a8ad2643..4c1fbb512f 100644 --- a/_pages/sv_SE/installing-boot9strap-(usm).txt +++ b/_pages/sv_SE/installing-boot9strap-(usm).txt @@ -4,15 +4,17 @@ title: "Installing boot9strap (USM)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

We can do this using an existing exploit, BannerBomb3.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -29,6 +31,8 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will #### Section I - Prep Work +In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. + 1. If your device is powered on, power off your device 1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer 1. Upload your movable.sed using the "Choose File" option @@ -41,47 +45,51 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will 1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card 1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - + ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }}) - {: .notice--info} - + ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} + ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card 1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. + 1. Sätt tillbaka ditt SD-kort i din enhet 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Select "Inject haxx" +1. Press (A) to select "Inject haxx" + Your device will automatically power off #### Section III - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section IV - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -95,16 +103,17 @@ At this point, your console will boot to Luma3DS by default. #### Section V - Restoring WiFi Configuration Profiles +In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text -1. Select "Restore slots" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) +1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + Your device will automatically reboot 1. Stäng av din enhet 1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore ___ diff --git a/_pages/sv_SE/seedminer.txt b/_pages/sv_SE/seedminer.txt index 44fe68e7b6..871d46e5cd 100644 --- a/_pages/sv_SE/seedminer.txt +++ b/_pages/sv_SE/seedminer.txt @@ -4,52 +4,54 @@ title: "Seedminer" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

+

For information on how Seedminer works, see this presentation.

+

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+
+{: .notice--info} -To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. +### Section I - Prep Work -For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). - -This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. - -### Instructions - -#### Section I - Prep Work +In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. 1. Insert your SD card into your computer 1. Navigate to the `Nintendo 3DS` folder on your SD card -1. Copy the 32 character long name of the folder you see inside Nintendo 3DS - + Do not go inside any more folders - + If you see multiple 32 character long folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + + If you don't have a `Nintendo 3DS` folder, put your SD card into your 3DS and power it on so that the folder can be created +1. Copy the name of the 32-letter folder you see directly inside Nintendo 3DS + + This 32-letter name is system-specific and will be different for each console + + If you see multiple 32-letter folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + You can ignore the `private` folder if you have it - ![]({{ "/images/screenshots/id0-example.png" | absolute_url }}) + ![]({{ "/images/screenshots/seedminer/id0-example.png" | absolute_url }}) {: .notice--info} -1. Paste your 32 character long folder name into a document you can reference later - + This folder name is also known as your "ID0" +1. Paste your 32 character long folder name into [a document](/images/screenshots/seedminer/text-document.png) you can reference later + + This folder is known as your "ID0". Take note of this as this guide will refer to it as such later 1. Power on your device + Your SD card does not need to be inserted at this point 1. Go to your Friend List (the [orange Face Icon]({{ "/images/friend-list-icon.png" | absolute_url }}) in the top row of your HOME Menu) + If you receive an error and are kicked out of the menu, you either must create a new Mii or your device cannot connect to Nintendo's servers (due to a ban or connection issues) 1. Find your Mii profile, then find the "Friend Code" field on the top screen -#### Section II - Seedminer +### Section II - Seedminer + +In this section, you will use the Bruteforce Movable website to retrieve your device's encryption key in the form of `movable.sed`. 1. Open [Bruteforce Movable](https://seedminer.hacks.guide/) on your computer - + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) + If the site isn't working, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field - + Do not attempt to enter the ID0 by hand. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section + + Do not attempt to enter the ID0 manually, as it is easy to make a mistake. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section 1. Select "Go" + If the site immediately goes to step 4, the website has already correctly processed your bruteforce request. You can download your `movable.sed` file and continue to the next section. You do not need to re-add the bot -1. Use the "Register Friend" button on your device to add the bot's friend code as given by the website +1. Use the ["Register Friend" button](/images/screenshots/seedminer/register-friend.png) on your device to add the bot's friend code as given by the website + If prompted, the name that you give to the friend does not matter 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once 1. Once the site processes your information, the site will continue to `Step 2: Bruteforce` automatically 1. Wait for the remainder of the process to complete - + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour + + This is usually fast (1-5 minutes) + During this process, the bot you added may not show up on your 3DS. As long as the website updates, this is not an issue + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site @@ -57,7 +59,7 @@ This method uses a powerful graphics card to perform the calculations needed. A ___ -### Next Steps +### Next steps: Choose an exploit Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. diff --git a/_pages/th_TH/bannerbomb3.txt b/_pages/th_TH/bannerbomb3.txt index a0b1ef007e..5a46749529 100644 --- a/_pages/th_TH/bannerbomb3.txt +++ b/_pages/th_TH/bannerbomb3.txt @@ -4,11 +4,15 @@ title: "BannerBomb3" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

For a more technical explanation, see here.

+
+{: .notice--info} -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -20,6 +24,9 @@ If you have a Taiwanese console (indicated by a T after the system version), fol * Your `movable.sed` file from completing [Seedminer](seedminer) #### Section I - Prep Work + +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + 1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer 1. Upload your movable.sed using the "Choose File" option 1. Click "Build and Download" @@ -27,28 +34,31 @@ If you have a Taiwanese console (indicated by a T after the system version), fol 1. If your console is powered on, power off your console 1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from the BannerBomb3 `.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section +1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked 1. Power off your device 1. Insert your SD card into your computer -1. You should now have `42383841.bin` in SD root. This is the DSiWare backup you will use later in the guide -1. Navigate to `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card - + This `` will be the same one that you used in [Seedminer](seedminer) -1. Delete `F00D43D5.bin` from the Nintendo DSiWare folder and from your computer. This file will not be needed anymore +1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore + Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} diff --git a/_pages/th_TH/finalizing-setup.txt b/_pages/th_TH/finalizing-setup.txt index c5b41ec5b8..29ed5ffea6 100644 --- a/_pages/th_TH/finalizing-setup.txt +++ b/_pages/th_TH/finalizing-setup.txt @@ -20,6 +20,8 @@ On this page, we will make critical system file backups and install the followin It is not recommended to skip downloading any of these applications, as many of them will be used later on this page. At the end of this page, your SD card will be cleaned up by removing unnecessary installation files. {: .notice--warning} +### Compatibility Notes + If your **New 3DS** was on version 2.1.0 before following this guide, you should [restore your NAND backup](godmode9-usage#restoring-a-nand-backup) before continuing. {: .notice--warning} @@ -39,6 +41,8 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o #### Section I - Prep Work +In this section, you will copy the files necessary to follow the rest of the instructions on this page. + 1. Power off your device 1. Insert your SD card into your computer 1. Create a folder named `cias` on the root of your SD card if it does not already exist @@ -52,15 +56,20 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o 1. Reinsert your SD card into your device 1. Power on your device - ![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) - {: .notice--info} - ![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) - {: .notice--info} +The screenshots below indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. + +![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) +{: .notice--info} + -These screenshots indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. #### Section II - Updating the System +In this section, you will update your system to the latest version, which is safe to do with custom firmware. + 1. Update your device by going to System Settings, then "Other Settings", then going all the way to the right and using "System Update" + Updates while using B9S + Luma (what you have) are safe + The updater may display a message saying "Your system is up to date" instead of updating. This is normal if you are already up to date; continue with the next section @@ -69,6 +78,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section III - Homebrew Launcher +In this section, you will temporarily replace Download Play with Homebrew Launcher (which we need to launch FBI). Download Play will automatically go back to normal once you reboot your device. + 1. Launch the Download Play application (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. Wait until you see the `Nintendo 3DS` and `Nintendo DS` buttons 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu @@ -83,6 +94,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section IV - RTC and DSP Setup +In this section, you will sync your 3DS internal clock with the actual time and dump the sound firmware (which is necesssary for some homebrew software to use sound properly). + 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu 1. Select "Miscellaneous options" 1. Select "Dump DSP firmware" @@ -94,6 +107,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section V - Installing CIAs +In this section, you will install several useful homebrew applications to HOME Menu. + 1. Launch FBI from the list of homebrew 1. Navigate to `SD` -> `cias` 1. Select "\" @@ -102,6 +117,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VI - CTRNAND Luma3DS +In this section, you will use a script to copy some of Luma3DS's files to internal memory so that they can be accessed, even without an SD card inserted. + 1. Power off your device 1. Press and hold (Start), and while holding (Start), power on your device. This will launch GodMode9 + If you do not boot into GodMode9, ensure that `GodMode9.firm` is in `/luma/payloads/` and that `payloads` is correctly spelled @@ -118,6 +135,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VII - Cleanup SD Card +In this section, you will use a script to remove some unnecessary files from your SD card. + 1. Select "Cleanup SD Card" 1. When prompted, press (A) to proceed 1. Press (A) to continue @@ -125,6 +144,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VIII - Backup Essential Files +In this section, you will make backups of flies that can be used to recover from softwaer bricks or to recover data. + 1. Select "Backup Options" 1. Select "SysNAND Backup" 1. Press (A) to confirm @@ -159,7 +180,7 @@ You're done! Custom firmware is now fully configured on your device. Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! {: .notice--info} -#### Information and Notes +### Information and Notes {% capture notice-6 %} Here are some key combos that you should know: diff --git a/_pages/th_TH/homebrew-launcher-(pichaxx).txt b/_pages/th_TH/homebrew-launcher-(pichaxx).txt index 6348abc52a..aff6795262 100644 --- a/_pages/th_TH/homebrew-launcher-(pichaxx).txt +++ b/_pages/th_TH/homebrew-launcher-(pichaxx).txt @@ -4,9 +4,17 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. +
+{: .notice--info} -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE to run SafeB9SInstaller. +### Compatibility Notes + +These instructions work on USA, Europe, and Japan consoles as indicated by the letters U, E, or J after the system version. + +You will need a Nintendo Network ID to download Pokémon Picross. This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. {: .notice--warning} @@ -24,15 +32,8 @@ This process will overwrite your Pokémon Picross save file, if you have one. If #### Section I - Prep Work -1. Power on your device -1. Open the Nintendo eShop -1. Tap the Search icon (small magnifying glass) -1. Search for `picross` -1. Open the store page for Pokémon Picross -1. Download Pokémon Picross - + You can scan [this QR code](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=ESHOP://50010000037815&margin=0&qzone=1&size=400x400&ecc=L) using the Nintendo 3DS Camera for a direct link to the eShop app - + Your SD card must be inserted in your device to install Pokémon Picross -1. Power off your device +In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. + 1. Insert your SD card into your computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it @@ -40,8 +41,16 @@ This process will overwrite your Pokémon Picross save file, if you have one. If 1. Copy the `slotTool` folder from the unSAFE_MODE `.zip` to the `3ds` folder on your SD card 1. Copy the otherapp payload for your region/version from the unSAFE_MODE `.zip`'s `otherapps_with_CfgS` folder to the root of your SD card and rename it to `otherapp.bin` +![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }}) +{: .notice--info} + + #### Section II - PicHaxx +In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device. 1. Open [the PicHaxx Injector website](https://3ds.nhnarwhal.com/3dstools/pichaxx.php) on your computer 1. Select your `movable.sed` file 1. Select "Build and Download" diff --git a/_pages/th_TH/installing-boot9strap-(fredtool).txt b/_pages/th_TH/installing-boot9strap-(fredtool).txt index 78598ce783..1f7825ac28 100644 --- a/_pages/th_TH/installing-boot9strap-(fredtool).txt +++ b/_pages/th_TH/installing-boot9strap-(fredtool).txt @@ -4,15 +4,16 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Table of Contents" %} -### Required Reading - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, for example from BannerBomb or the DSiWare Dumper tool. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). +
+Technical Details (optional) +

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+
+{: .notice--info} ### What You Need -* A DSiWare Backup (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) +* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -20,6 +21,8 @@ This is a currently working implementation of the "FIRM partitions known-plainte #### Section I - CFW Check +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + 1. Power off your device 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button @@ -30,17 +33,7 @@ If you see a configuration menu, you already have CFW, and continuing with these #### Section II - Prep Work -1. Power off your device -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card - - ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} - -#### Section III - Fredtool +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) @@ -53,19 +46,31 @@ If you see a configuration menu, you already have CFW, and continuing with these 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link +1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` - + If the `Nintendo DSiWare` folder does not exist, create it inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` 1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder -1. Reinsert your SD card into your device + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card + + ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} + +#### Section III - Overwriting DS Connection Settings + +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Haxxxxxxxxx!" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title 1. Select "Copy", then select "OK" 1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio #### Section IV - Flipnote Exploit @@ -73,6 +78,8 @@ If you see a configuration menu, you already have CFW, and continuing with these If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} +In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer. + 1. Complete the initial setup process for the launched game until you reach the main menu + Select the left option whenever prompted during the setup process 1. Using the touch-screen, select the large left box, then select the box with an SD card icon @@ -85,7 +92,7 @@ If you would prefer a visual guide to this section, one is available [here](http 1. Tap the fourth box with the letter "A" in it 1. If the exploit was successful, your device will have loaded b9sTool 1. Using the D-Pad, move to "Install boot9strap" - + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to start over from Step 12 of Section III + + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III 1. Press (A), then press START and SELECT at the same time to begin the process 1. Once completed and the bottom screen says "done.", exit b9sTool, then power off your device + You may have to force power off by holding the power button @@ -94,6 +101,8 @@ If you would prefer a visual guide to this section, one is available [here](http #### Section V - Luma3DS Verification +Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. + 1. Power off your device 1. Insert your SD card into your computer 1. Verify that a `luma` folder exists and that `config.ini` is inside of it @@ -106,13 +115,15 @@ At this point, your console will boot to Luma3DS by default. #### Section VI - Restoring DS Connection Settings -1. Copy the `42383841.bin` file from the `clean/` folder of the downloaded DSiWare archive (`output_(name).zip`) to the `Nintendo 3DS///Nintendo DSiWare/` folder on your SD card - + Replace the existing `42383841.bin` file +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Nintendo DSi™" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title 1. Select "Copy", then select "OK" ___ diff --git a/_pages/th_TH/installing-boot9strap-(hbl-usm).txt b/_pages/th_TH/installing-boot9strap-(hbl-usm).txt index 142604d9b0..6c9a3f849c 100644 --- a/_pages/th_TH/installing-boot9strap-(hbl-usm).txt +++ b/_pages/th_TH/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,16 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

As we already have Homebrew access, we can use slotTool to do this.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--danger} @@ -24,7 +27,10 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint #### Section I - Prep Work +In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. + 1. Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide + + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. Launch slotTool from the list of homebrew + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section 1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option @@ -36,22 +42,31 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint 1. Copy `usm.bin` from the unSAFE_MODE `.zip` to the root of your SD card 1. Put your SD card back into your console +![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} + #### Section II - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](https://uwuu.ca/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section III - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -65,6 +80,8 @@ At this point, your console will boot to Luma3DS by default. #### Section IV - Restoring WiFi Configuration Profiles +In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch the Download Play application 1. Wait until you see the two buttons + Do not press either of the buttons diff --git a/_pages/th_TH/installing-boot9strap-(soundhax).txt b/_pages/th_TH/installing-boot9strap-(soundhax).txt index 2302a85291..d9c13f9bc7 100644 --- a/_pages/th_TH/installing-boot9strap-(soundhax).txt +++ b/_pages/th_TH/installing-boot9strap-(soundhax).txt @@ -4,7 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+
+{: .notice--info} + +### Compatibility Notes Soundhax (when combined with universal-otherapp) is compatible with versions 1.0.0 through 11.3.0 in all regions. @@ -21,6 +27,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Section I - Prep Work +In this section, you will copy the files needed to trigger both Soundhax and universal-otherapp. + 1. Power off your device 1. Insert your SD card into your computer 1. Copy the Soundhax `.m4a` to the root of your SD card @@ -33,11 +41,16 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 1. Reinsert your SD card into your device 1. Power on your device - ![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} #### Section II - Launching SafeB9SInstaller +In this section, you will launch Soundhax through the Nintendo 3DS Sound app, which will use universal-otherapp to launch the boot9strap (custom firmware) installer. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch Nintendo 3DS Sound @@ -58,6 +71,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Section III - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap 1. Once it is complete, press (A) to reboot your device 1. Your device should have rebooted into the Luma3DS configuration menu diff --git a/_pages/th_TH/installing-boot9strap-(usm).txt b/_pages/th_TH/installing-boot9strap-(usm).txt index 6e148372c2..b58fa784a2 100644 --- a/_pages/th_TH/installing-boot9strap-(usm).txt +++ b/_pages/th_TH/installing-boot9strap-(usm).txt @@ -4,15 +4,17 @@ title: "Installing boot9strap (USM)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

We can do this using an existing exploit, BannerBomb3.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -29,6 +31,8 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will #### Section I - Prep Work +In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. + 1. If your device is powered on, power off your device 1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer 1. Upload your movable.sed using the "Choose File" option @@ -41,47 +45,51 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will 1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card 1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - + ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }}) - {: .notice--info} - + ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} + ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card 1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Select "Inject haxx" +1. Press (A) to select "Inject haxx" + Your device will automatically power off #### Section III - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section IV - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -95,16 +103,17 @@ At this point, your console will boot to Luma3DS by default. #### Section V - Restoring WiFi Configuration Profiles +In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text -1. Select "Restore slots" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) +1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + Your device will automatically reboot 1. Power off your device 1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore ___ diff --git a/_pages/th_TH/seedminer.txt b/_pages/th_TH/seedminer.txt index 44fe68e7b6..871d46e5cd 100644 --- a/_pages/th_TH/seedminer.txt +++ b/_pages/th_TH/seedminer.txt @@ -4,52 +4,54 @@ title: "Seedminer" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

+

For information on how Seedminer works, see this presentation.

+

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+
+{: .notice--info} -To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. +### Section I - Prep Work -For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). - -This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. - -### Instructions - -#### Section I - Prep Work +In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. 1. Insert your SD card into your computer 1. Navigate to the `Nintendo 3DS` folder on your SD card -1. Copy the 32 character long name of the folder you see inside Nintendo 3DS - + Do not go inside any more folders - + If you see multiple 32 character long folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + + If you don't have a `Nintendo 3DS` folder, put your SD card into your 3DS and power it on so that the folder can be created +1. Copy the name of the 32-letter folder you see directly inside Nintendo 3DS + + This 32-letter name is system-specific and will be different for each console + + If you see multiple 32-letter folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + You can ignore the `private` folder if you have it - ![]({{ "/images/screenshots/id0-example.png" | absolute_url }}) + ![]({{ "/images/screenshots/seedminer/id0-example.png" | absolute_url }}) {: .notice--info} -1. Paste your 32 character long folder name into a document you can reference later - + This folder name is also known as your "ID0" +1. Paste your 32 character long folder name into [a document](/images/screenshots/seedminer/text-document.png) you can reference later + + This folder is known as your "ID0". Take note of this as this guide will refer to it as such later 1. Power on your device + Your SD card does not need to be inserted at this point 1. Go to your Friend List (the [orange Face Icon]({{ "/images/friend-list-icon.png" | absolute_url }}) in the top row of your HOME Menu) + If you receive an error and are kicked out of the menu, you either must create a new Mii or your device cannot connect to Nintendo's servers (due to a ban or connection issues) 1. Find your Mii profile, then find the "Friend Code" field on the top screen -#### Section II - Seedminer +### Section II - Seedminer + +In this section, you will use the Bruteforce Movable website to retrieve your device's encryption key in the form of `movable.sed`. 1. Open [Bruteforce Movable](https://seedminer.hacks.guide/) on your computer - + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) + If the site isn't working, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field - + Do not attempt to enter the ID0 by hand. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section + + Do not attempt to enter the ID0 manually, as it is easy to make a mistake. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section 1. Select "Go" + If the site immediately goes to step 4, the website has already correctly processed your bruteforce request. You can download your `movable.sed` file and continue to the next section. You do not need to re-add the bot -1. Use the "Register Friend" button on your device to add the bot's friend code as given by the website +1. Use the ["Register Friend" button](/images/screenshots/seedminer/register-friend.png) on your device to add the bot's friend code as given by the website + If prompted, the name that you give to the friend does not matter 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once 1. Once the site processes your information, the site will continue to `Step 2: Bruteforce` automatically 1. Wait for the remainder of the process to complete - + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour + + This is usually fast (1-5 minutes) + During this process, the bot you added may not show up on your 3DS. As long as the website updates, this is not an issue + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site @@ -57,7 +59,7 @@ This method uses a powerful graphics card to perform the calculations needed. A ___ -### Next Steps +### Next steps: Choose an exploit Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. diff --git a/_pages/tr_TR/bannerbomb3.txt b/_pages/tr_TR/bannerbomb3.txt index db0891de7e..9fb706ad61 100644 --- a/_pages/tr_TR/bannerbomb3.txt +++ b/_pages/tr_TR/bannerbomb3.txt @@ -4,11 +4,15 @@ title: "BannerBomb3" {% include toc title = "İçindekiler"%} -### Okumanız Gerekli +
+Technical Details (optional) +

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

For a more technical explanation, see here.

+
+{: .notice--info} -Sistem DSiWare dosyasını çıkartabilmek için Settings (Ayarlar) uygulamasında bulunan DSiWare Data Management (DSiWare Veri Yönetimi) kısmındaki bir açıktan yararlanıyoruz. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -20,6 +24,9 @@ If you have a Taiwanese console (indicated by a T after the system version), fol * Your `movable.sed` file from completing [Seedminer](seedminer) #### Section I - Prep Work + +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + 1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer 1. Upload your movable.sed using the "Choose File" option 1. Click "Build and Download" @@ -27,28 +34,31 @@ If you have a Taiwanese console (indicated by a T after the system version), fol 1. If your console is powered on, power off your console 1. SD kartınızı bilgisayarınıza takın 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from the BannerBomb3 `.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. + 1. SD kartınızı cihazınıza tekrar takın 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section +1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked 1. Cihazınızı kapatın 1. SD kartınızı bilgisayarınıza takın -1. You should now have `42383841.bin` in SD root. This is the DSiWare backup you will use later in the guide -1. Navigate to `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card - + This `` will be the same one that you used in [Seedminer](seedminer) -1. Delete `F00D43D5.bin` from the Nintendo DSiWare folder and from your computer. This file will not be needed anymore +1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore + Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} diff --git a/_pages/tr_TR/finalizing-setup.txt b/_pages/tr_TR/finalizing-setup.txt index eb89be112e..39b76a8f07 100644 --- a/_pages/tr_TR/finalizing-setup.txt +++ b/_pages/tr_TR/finalizing-setup.txt @@ -20,6 +20,8 @@ On this page, we will make critical system file backups and install the followin It is not recommended to skip downloading any of these applications, as many of them will be used later on this page. At the end of this page, your SD card will be cleaned up by removing unnecessary installation files. {: .notice--warning} +### Compatibility Notes + If your **New 3DS** was on version 2.1.0 before following this guide, you should [restore your NAND backup](godmode9-usage#restoring-a-nand-backup) before continuing. {: .notice--warning} @@ -39,6 +41,8 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o #### Section I - Prep Work +In this section, you will copy the files necessary to follow the rest of the instructions on this page. + 1. Cihazınızı kapatın 1. SD kartınızı bilgisayarınıza takın 1. SD kartınızın ana dizininde eğer yoksa `cias` isminde klasör oluşturun @@ -52,15 +56,20 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o 1. SD kartınızı cihazınıza tekrar takın 1. Power on your device - ![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) - {: .notice--info} - ![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) - {: .notice--info} +The screenshots below indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. + +![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) +{: .notice--info} + -These screenshots indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. #### Section II - Updating the System +In this section, you will update your system to the latest version, which is safe to do with custom firmware. + 1. Update your device by going to System Settings, then "Other Settings", then going all the way to the right and using "System Update" + Updates while using B9S + Luma (what you have) are safe + The updater may display a message saying "Your system is up to date" instead of updating. This is normal if you are already up to date; continue with the next section @@ -69,6 +78,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section III - Homebrew Launcher +In this section, you will temporarily replace Download Play with Homebrew Launcher (which we need to launch FBI). Download Play will automatically go back to normal once you reboot your device. + 1. Launch the Download Play application (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. Wait until you see the `Nintendo 3DS` and `Nintendo DS` buttons 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu @@ -83,6 +94,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section IV - RTC and DSP Setup +In this section, you will sync your 3DS internal clock with the actual time and dump the sound firmware (which is necesssary for some homebrew software to use sound properly). + 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu 1. Select "Miscellaneous options" 1. Select "Dump DSP firmware" @@ -94,6 +107,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section V - Installing CIAs +In this section, you will install several useful homebrew applications to HOME Menu. + 1. Launch FBI from the list of homebrew 1. Navigate to `SD` -> `cias` 1. "\" 'i seçin @@ -102,6 +117,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VI - CTRNAND Luma3DS +In this section, you will use a script to copy some of Luma3DS's files to internal memory so that they can be accessed, even without an SD card inserted. + 1. Cihazınızı kapatın 1. Press and hold (Start), and while holding (Start), power on your device. This will launch GodMode9 + If you do not boot into GodMode9, ensure that `GodMode9.firm` is in `/luma/payloads/` and that `payloads` is correctly spelled @@ -118,6 +135,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VII - Cleanup SD Card +In this section, you will use a script to remove some unnecessary files from your SD card. + 1. Select "Cleanup SD Card" 1. When prompted, press (A) to proceed 1. Devam etmek için (A) basın @@ -125,6 +144,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VIII - Backup Essential Files +In this section, you will make backups of flies that can be used to recover from softwaer bricks or to recover data. + 1. Select "Backup Options" 1. Select "SysNAND Backup" 1. Onaylamak için (A) basın @@ -159,7 +180,7 @@ You're done! Custom firmware is now fully configured on your device. Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! {: .notice--info} -#### Information and Notes +### Information and Notes {% capture notice-6 %} Here are some key combos that you should know: diff --git a/_pages/tr_TR/homebrew-launcher-(pichaxx).txt b/_pages/tr_TR/homebrew-launcher-(pichaxx).txt index 882e9f595c..c90ab72bf5 100644 --- a/_pages/tr_TR/homebrew-launcher-(pichaxx).txt +++ b/_pages/tr_TR/homebrew-launcher-(pichaxx).txt @@ -4,9 +4,17 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title = "İçindekiler"%} -### Okumanız Gerekli +
+Technical Details (optional) +This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. +
+{: .notice--info} -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE to run SafeB9SInstaller. +### Compatibility Notes + +These instructions work on USA, Europe, and Japan consoles as indicated by the letters U, E, or J after the system version. + +You will need a Nintendo Network ID to download Pokémon Picross. This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. {: .notice--warning} @@ -24,15 +32,8 @@ This process will overwrite your Pokémon Picross save file, if you have one. If #### Section I - Prep Work -1. Power on your device -1. Open the Nintendo eShop -1. Tap the Search icon (small magnifying glass) -1. Search for `picross` -1. Open the store page for Pokémon Picross -1. Download Pokémon Picross - + You can scan [this QR code](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=ESHOP://50010000037815&margin=0&qzone=1&size=400x400&ecc=L) using the Nintendo 3DS Camera for a direct link to the eShop app - + Your SD card must be inserted in your device to install Pokémon Picross -1. Cihazınızı kapatın +In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. + 1. SD kartınızı bilgisayarınıza takın 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it @@ -40,8 +41,16 @@ This process will overwrite your Pokémon Picross save file, if you have one. If 1. Copy the `slotTool` folder from the unSAFE_MODE `.zip` to the `3ds` folder on your SD card 1. Copy the otherapp payload for your region/version from the unSAFE_MODE `.zip`'s `otherapps_with_CfgS` folder to the root of your SD card and rename it to `otherapp.bin` +![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }}) +{: .notice--info} + + #### Section II - PicHaxx +In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device. 1. Open [the PicHaxx Injector website](https://3ds.nhnarwhal.com/3dstools/pichaxx.php) on your computer 1. Select your `movable.sed` file 1. Select "Build and Download" diff --git a/_pages/tr_TR/installing-boot9strap-(fredtool).txt b/_pages/tr_TR/installing-boot9strap-(fredtool).txt index 0b90505c96..2cfb0934bb 100644 --- a/_pages/tr_TR/installing-boot9strap-(fredtool).txt +++ b/_pages/tr_TR/installing-boot9strap-(fredtool).txt @@ -4,15 +4,16 @@ title: "Installing boot9strap (Fredtool)" {% include toc title = "İçindekiler"%} -### Okumanız Gerekli - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, for example from BannerBomb or the DSiWare Dumper tool. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). +
+Technical Details (optional) +

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+
+{: .notice--info} ### What You Need -* A DSiWare Backup (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) +* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -20,6 +21,8 @@ This is a currently working implementation of the "FIRM partitions known-plainte #### Section I - CFW Check +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + 1. Cihazınızı kapatın 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button @@ -30,17 +33,7 @@ If you see a configuration menu, you already have CFW, and continuing with these #### Section II - Prep Work -1. Cihazınızı kapatın -1. SD kartınızı bilgisayarınıza takın -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card - - ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} - -#### Section III - Fredtool +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) @@ -53,19 +46,31 @@ If you see a configuration menu, you already have CFW, and continuing with these 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link +1. SD kartınızı bilgisayarınıza takın 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` - + If the `Nintendo DSiWare` folder does not exist, create it inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` 1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder -1. SD kartınızı cihazınıza tekrar takın + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card + + ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} + +#### Section III - Overwriting DS Connection Settings + +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Haxxxxxxxxx!" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title 1. Select "Copy", then select "OK" 1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio #### Section IV - Flipnote Exploit @@ -73,6 +78,8 @@ If you see a configuration menu, you already have CFW, and continuing with these If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} +In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer. + 1. Complete the initial setup process for the launched game until you reach the main menu + Select the left option whenever prompted during the setup process 1. Using the touch-screen, select the large left box, then select the box with an SD card icon @@ -85,7 +92,7 @@ If you would prefer a visual guide to this section, one is available [here](http 1. Tap the fourth box with the letter "A" in it 1. If the exploit was successful, your device will have loaded b9sTool 1. Using the D-Pad, move to "Install boot9strap" - + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to start over from Step 12 of Section III + + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III 1. Press (A), then press START and SELECT at the same time to begin the process 1. Once completed and the bottom screen says "done.", exit b9sTool, then power off your device + You may have to force power off by holding the power button @@ -94,6 +101,8 @@ If you would prefer a visual guide to this section, one is available [here](http #### Section V - Luma3DS Verification +Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. + 1. Cihazınızı kapatın 1. SD kartınızı bilgisayarınıza takın 1. Verify that a `luma` folder exists and that `config.ini` is inside of it @@ -106,13 +115,15 @@ At this point, your console will boot to Luma3DS by default. #### Section VI - Restoring DS Connection Settings -1. Copy the `42383841.bin` file from the `clean/` folder of the downloaded DSiWare archive (`output_(name).zip`) to the `Nintendo 3DS///Nintendo DSiWare/` folder on your SD card - + Replace the existing `42383841.bin` file +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one 1. SD kartınızı cihazınıza tekrar takın 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Nintendo DSi™" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title 1. Select "Copy", then select "OK" ___ diff --git a/_pages/tr_TR/installing-boot9strap-(hbl-usm).txt b/_pages/tr_TR/installing-boot9strap-(hbl-usm).txt index c2a4ba0fe6..9995673128 100644 --- a/_pages/tr_TR/installing-boot9strap-(hbl-usm).txt +++ b/_pages/tr_TR/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,16 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title = "İçindekiler"%} -### Okumanız Gerekli +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

As we already have Homebrew access, we can use slotTool to do this.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--danger} @@ -24,7 +27,10 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint #### Section I - Prep Work +In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. + 1. Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide + + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. Launch slotTool from the list of homebrew + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section 1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option @@ -36,22 +42,31 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint 1. Copy `usm.bin` from the unSAFE_MODE `.zip` to the root of your SD card 1. Put your SD card back into your console +![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} + #### Section II - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](https://uwuu.ca/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section III - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -65,6 +80,8 @@ At this point, your console will boot to Luma3DS by default. #### Section IV - Restoring WiFi Configuration Profiles +In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch the Download Play application 1. Wait until you see the two buttons + Do not press either of the buttons diff --git a/_pages/tr_TR/installing-boot9strap-(soundhax).txt b/_pages/tr_TR/installing-boot9strap-(soundhax).txt index 70e39309e7..788abfe080 100644 --- a/_pages/tr_TR/installing-boot9strap-(soundhax).txt +++ b/_pages/tr_TR/installing-boot9strap-(soundhax).txt @@ -4,7 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title = "İçindekiler"%} -### Okumanız Gerekli +
+Technical Details (optional) +

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+
+{: .notice--info} + +### Compatibility Notes Soundhax (when combined with universal-otherapp) is compatible with versions 1.0.0 through 11.3.0 in all regions. @@ -21,6 +27,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Section I - Prep Work +In this section, you will copy the files needed to trigger both Soundhax and universal-otherapp. + 1. Cihazınızı kapatın 1. SD kartınızı bilgisayarınıza takın 1. Copy the Soundhax `.m4a` to the root of your SD card @@ -33,11 +41,16 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 1. SD kartınızı cihazınıza tekrar takın 1. Power on your device - ![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} #### Section II - Launching SafeB9SInstaller +In this section, you will launch Soundhax through the Nintendo 3DS Sound app, which will use universal-otherapp to launch the boot9strap (custom firmware) installer. + 1. SD kartınızı cihazınıza tekrar takın 1. Power on your device 1. Cihazınızdan Nintendo 3DS Sound uygulamasını çalıştırın @@ -58,6 +71,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Section III - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap 1. Once it is complete, press (A) to reboot your device 1. Your device should have rebooted into the Luma3DS configuration menu diff --git a/_pages/tr_TR/installing-boot9strap-(usm).txt b/_pages/tr_TR/installing-boot9strap-(usm).txt index e5201c1d71..014c4bf320 100644 --- a/_pages/tr_TR/installing-boot9strap-(usm).txt +++ b/_pages/tr_TR/installing-boot9strap-(usm).txt @@ -4,15 +4,17 @@ title: "Installing boot9strap (USM)" {% include toc title = "İçindekiler"%} -### Okumanız Gerekli +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

We can do this using an existing exploit, BannerBomb3.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -29,6 +31,8 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will #### Section I - Prep Work +In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. + 1. If your device is powered on, power off your device 1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer 1. Upload your movable.sed using the "Choose File" option @@ -41,47 +45,51 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will 1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card 1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - + ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }}) - {: .notice--info} - + ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} + ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card 1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. + 1. SD kartınızı cihazınıza tekrar takın 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Select "Inject haxx" +1. Press (A) to select "Inject haxx" + Your device will automatically power off #### Section III - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section IV - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -95,16 +103,17 @@ At this point, your console will boot to Luma3DS by default. #### Section V - Restoring WiFi Configuration Profiles +In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text -1. Select "Restore slots" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) +1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + Your device will automatically reboot 1. Cihazınızı kapatın 1. SD kartınızı bilgisayarınıza takın 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore ___ diff --git a/_pages/tr_TR/seedminer.txt b/_pages/tr_TR/seedminer.txt index 9d794bb950..8c49bbace2 100644 --- a/_pages/tr_TR/seedminer.txt +++ b/_pages/tr_TR/seedminer.txt @@ -4,52 +4,54 @@ title: "Seedminer" {% include toc title = "İçindekiler"%} -### Okumanız Gerekli +
+Technical Details (optional) +

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

+

For information on how Seedminer works, see this presentation.

+

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+
+{: .notice--info} -To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. +### Section I - Prep Work -For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). - -This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. - -### Instructions - -#### Section I - Prep Work +In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. 1. SD kartınızı bilgisayarınıza takın 1. Navigate to the `Nintendo 3DS` folder on your SD card -1. Copy the 32 character long name of the folder you see inside Nintendo 3DS - + Do not go inside any more folders - + If you see multiple 32 character long folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + + If you don't have a `Nintendo 3DS` folder, put your SD card into your 3DS and power it on so that the folder can be created +1. Copy the name of the 32-letter folder you see directly inside Nintendo 3DS + + This 32-letter name is system-specific and will be different for each console + + If you see multiple 32-letter folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + You can ignore the `private` folder if you have it - ![]({{ "/images/screenshots/id0-example.png" | absolute_url }}) + ![]({{ "/images/screenshots/seedminer/id0-example.png" | absolute_url }}) {: .notice--info} -1. Paste your 32 character long folder name into a document you can reference later - + This folder name is also known as your "ID0" +1. Paste your 32 character long folder name into [a document](/images/screenshots/seedminer/text-document.png) you can reference later + + This folder is known as your "ID0". Take note of this as this guide will refer to it as such later 1. Power on your device + Your SD card does not need to be inserted at this point 1. Go to your Friend List (the [orange Face Icon]({{ "/images/friend-list-icon.png" | absolute_url }}) in the top row of your HOME Menu) + If you receive an error and are kicked out of the menu, you either must create a new Mii or your device cannot connect to Nintendo's servers (due to a ban or connection issues) 1. Find your Mii profile, then find the "Friend Code" field on the top screen -#### Section II - Seedminer +### Section II - Seedminer + +In this section, you will use the Bruteforce Movable website to retrieve your device's encryption key in the form of `movable.sed`. 1. Open [Bruteforce Movable](https://seedminer.hacks.guide/) on your computer - + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) + If the site isn't working, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field - + Do not attempt to enter the ID0 by hand. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section + + Do not attempt to enter the ID0 manually, as it is easy to make a mistake. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section 1. Select "Go" + If the site immediately goes to step 4, the website has already correctly processed your bruteforce request. You can download your `movable.sed` file and continue to the next section. You do not need to re-add the bot -1. Use the "Register Friend" button on your device to add the bot's friend code as given by the website +1. Use the ["Register Friend" button](/images/screenshots/seedminer/register-friend.png) on your device to add the bot's friend code as given by the website + If prompted, the name that you give to the friend does not matter 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once 1. Once the site processes your information, the site will continue to `Step 2: Bruteforce` automatically 1. Wait for the remainder of the process to complete - + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour + + This is usually fast (1-5 minutes) + During this process, the bot you added may not show up on your 3DS. As long as the website updates, this is not an issue + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site @@ -57,7 +59,7 @@ This method uses a powerful graphics card to perform the calculations needed. A ___ -### Next Steps +### Next steps: Choose an exploit Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. diff --git a/_pages/uk_UA/bannerbomb3.txt b/_pages/uk_UA/bannerbomb3.txt index a0b1ef007e..5a46749529 100644 --- a/_pages/uk_UA/bannerbomb3.txt +++ b/_pages/uk_UA/bannerbomb3.txt @@ -4,11 +4,15 @@ title: "BannerBomb3" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

For a more technical explanation, see here.

+
+{: .notice--info} -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -20,6 +24,9 @@ If you have a Taiwanese console (indicated by a T after the system version), fol * Your `movable.sed` file from completing [Seedminer](seedminer) #### Section I - Prep Work + +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + 1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer 1. Upload your movable.sed using the "Choose File" option 1. Click "Build and Download" @@ -27,28 +34,31 @@ If you have a Taiwanese console (indicated by a T after the system version), fol 1. If your console is powered on, power off your console 1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from the BannerBomb3 `.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section +1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked 1. Power off your device 1. Insert your SD card into your computer -1. You should now have `42383841.bin` in SD root. This is the DSiWare backup you will use later in the guide -1. Navigate to `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card - + This `` will be the same one that you used in [Seedminer](seedminer) -1. Delete `F00D43D5.bin` from the Nintendo DSiWare folder and from your computer. This file will not be needed anymore +1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore + Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} diff --git a/_pages/uk_UA/finalizing-setup.txt b/_pages/uk_UA/finalizing-setup.txt index c5b41ec5b8..29ed5ffea6 100644 --- a/_pages/uk_UA/finalizing-setup.txt +++ b/_pages/uk_UA/finalizing-setup.txt @@ -20,6 +20,8 @@ On this page, we will make critical system file backups and install the followin It is not recommended to skip downloading any of these applications, as many of them will be used later on this page. At the end of this page, your SD card will be cleaned up by removing unnecessary installation files. {: .notice--warning} +### Compatibility Notes + If your **New 3DS** was on version 2.1.0 before following this guide, you should [restore your NAND backup](godmode9-usage#restoring-a-nand-backup) before continuing. {: .notice--warning} @@ -39,6 +41,8 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o #### Section I - Prep Work +In this section, you will copy the files necessary to follow the rest of the instructions on this page. + 1. Power off your device 1. Insert your SD card into your computer 1. Create a folder named `cias` on the root of your SD card if it does not already exist @@ -52,15 +56,20 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o 1. Reinsert your SD card into your device 1. Power on your device - ![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) - {: .notice--info} - ![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) - {: .notice--info} +The screenshots below indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. + +![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) +{: .notice--info} + -These screenshots indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. #### Section II - Updating the System +In this section, you will update your system to the latest version, which is safe to do with custom firmware. + 1. Update your device by going to System Settings, then "Other Settings", then going all the way to the right and using "System Update" + Updates while using B9S + Luma (what you have) are safe + The updater may display a message saying "Your system is up to date" instead of updating. This is normal if you are already up to date; continue with the next section @@ -69,6 +78,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section III - Homebrew Launcher +In this section, you will temporarily replace Download Play with Homebrew Launcher (which we need to launch FBI). Download Play will automatically go back to normal once you reboot your device. + 1. Launch the Download Play application (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. Wait until you see the `Nintendo 3DS` and `Nintendo DS` buttons 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu @@ -83,6 +94,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section IV - RTC and DSP Setup +In this section, you will sync your 3DS internal clock with the actual time and dump the sound firmware (which is necesssary for some homebrew software to use sound properly). + 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu 1. Select "Miscellaneous options" 1. Select "Dump DSP firmware" @@ -94,6 +107,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section V - Installing CIAs +In this section, you will install several useful homebrew applications to HOME Menu. + 1. Launch FBI from the list of homebrew 1. Navigate to `SD` -> `cias` 1. Select "\" @@ -102,6 +117,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VI - CTRNAND Luma3DS +In this section, you will use a script to copy some of Luma3DS's files to internal memory so that they can be accessed, even without an SD card inserted. + 1. Power off your device 1. Press and hold (Start), and while holding (Start), power on your device. This will launch GodMode9 + If you do not boot into GodMode9, ensure that `GodMode9.firm` is in `/luma/payloads/` and that `payloads` is correctly spelled @@ -118,6 +135,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VII - Cleanup SD Card +In this section, you will use a script to remove some unnecessary files from your SD card. + 1. Select "Cleanup SD Card" 1. When prompted, press (A) to proceed 1. Press (A) to continue @@ -125,6 +144,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VIII - Backup Essential Files +In this section, you will make backups of flies that can be used to recover from softwaer bricks or to recover data. + 1. Select "Backup Options" 1. Select "SysNAND Backup" 1. Press (A) to confirm @@ -159,7 +180,7 @@ You're done! Custom firmware is now fully configured on your device. Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! {: .notice--info} -#### Information and Notes +### Information and Notes {% capture notice-6 %} Here are some key combos that you should know: diff --git a/_pages/uk_UA/homebrew-launcher-(pichaxx).txt b/_pages/uk_UA/homebrew-launcher-(pichaxx).txt index 6348abc52a..aff6795262 100644 --- a/_pages/uk_UA/homebrew-launcher-(pichaxx).txt +++ b/_pages/uk_UA/homebrew-launcher-(pichaxx).txt @@ -4,9 +4,17 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. +
+{: .notice--info} -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE to run SafeB9SInstaller. +### Compatibility Notes + +These instructions work on USA, Europe, and Japan consoles as indicated by the letters U, E, or J after the system version. + +You will need a Nintendo Network ID to download Pokémon Picross. This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. {: .notice--warning} @@ -24,15 +32,8 @@ This process will overwrite your Pokémon Picross save file, if you have one. If #### Section I - Prep Work -1. Power on your device -1. Open the Nintendo eShop -1. Tap the Search icon (small magnifying glass) -1. Search for `picross` -1. Open the store page for Pokémon Picross -1. Download Pokémon Picross - + You can scan [this QR code](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=ESHOP://50010000037815&margin=0&qzone=1&size=400x400&ecc=L) using the Nintendo 3DS Camera for a direct link to the eShop app - + Your SD card must be inserted in your device to install Pokémon Picross -1. Power off your device +In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. + 1. Insert your SD card into your computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it @@ -40,8 +41,16 @@ This process will overwrite your Pokémon Picross save file, if you have one. If 1. Copy the `slotTool` folder from the unSAFE_MODE `.zip` to the `3ds` folder on your SD card 1. Copy the otherapp payload for your region/version from the unSAFE_MODE `.zip`'s `otherapps_with_CfgS` folder to the root of your SD card and rename it to `otherapp.bin` +![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }}) +{: .notice--info} + + #### Section II - PicHaxx +In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device. 1. Open [the PicHaxx Injector website](https://3ds.nhnarwhal.com/3dstools/pichaxx.php) on your computer 1. Select your `movable.sed` file 1. Select "Build and Download" diff --git a/_pages/uk_UA/installing-boot9strap-(fredtool).txt b/_pages/uk_UA/installing-boot9strap-(fredtool).txt index 78598ce783..1f7825ac28 100644 --- a/_pages/uk_UA/installing-boot9strap-(fredtool).txt +++ b/_pages/uk_UA/installing-boot9strap-(fredtool).txt @@ -4,15 +4,16 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Table of Contents" %} -### Required Reading - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, for example from BannerBomb or the DSiWare Dumper tool. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). +
+Technical Details (optional) +

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+
+{: .notice--info} ### What You Need -* A DSiWare Backup (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) +* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -20,6 +21,8 @@ This is a currently working implementation of the "FIRM partitions known-plainte #### Section I - CFW Check +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + 1. Power off your device 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button @@ -30,17 +33,7 @@ If you see a configuration menu, you already have CFW, and continuing with these #### Section II - Prep Work -1. Power off your device -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card - - ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} - -#### Section III - Fredtool +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) @@ -53,19 +46,31 @@ If you see a configuration menu, you already have CFW, and continuing with these 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link +1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` - + If the `Nintendo DSiWare` folder does not exist, create it inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` 1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder -1. Reinsert your SD card into your device + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card + + ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} + +#### Section III - Overwriting DS Connection Settings + +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Haxxxxxxxxx!" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title 1. Select "Copy", then select "OK" 1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio #### Section IV - Flipnote Exploit @@ -73,6 +78,8 @@ If you see a configuration menu, you already have CFW, and continuing with these If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} +In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer. + 1. Complete the initial setup process for the launched game until you reach the main menu + Select the left option whenever prompted during the setup process 1. Using the touch-screen, select the large left box, then select the box with an SD card icon @@ -85,7 +92,7 @@ If you would prefer a visual guide to this section, one is available [here](http 1. Tap the fourth box with the letter "A" in it 1. If the exploit was successful, your device will have loaded b9sTool 1. Using the D-Pad, move to "Install boot9strap" - + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to start over from Step 12 of Section III + + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III 1. Press (A), then press START and SELECT at the same time to begin the process 1. Once completed and the bottom screen says "done.", exit b9sTool, then power off your device + You may have to force power off by holding the power button @@ -94,6 +101,8 @@ If you would prefer a visual guide to this section, one is available [here](http #### Section V - Luma3DS Verification +Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. + 1. Power off your device 1. Insert your SD card into your computer 1. Verify that a `luma` folder exists and that `config.ini` is inside of it @@ -106,13 +115,15 @@ At this point, your console will boot to Luma3DS by default. #### Section VI - Restoring DS Connection Settings -1. Copy the `42383841.bin` file from the `clean/` folder of the downloaded DSiWare archive (`output_(name).zip`) to the `Nintendo 3DS///Nintendo DSiWare/` folder on your SD card - + Replace the existing `42383841.bin` file +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Nintendo DSi™" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title 1. Select "Copy", then select "OK" ___ diff --git a/_pages/uk_UA/installing-boot9strap-(hbl-usm).txt b/_pages/uk_UA/installing-boot9strap-(hbl-usm).txt index 142604d9b0..6c9a3f849c 100644 --- a/_pages/uk_UA/installing-boot9strap-(hbl-usm).txt +++ b/_pages/uk_UA/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,16 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

As we already have Homebrew access, we can use slotTool to do this.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--danger} @@ -24,7 +27,10 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint #### Section I - Prep Work +In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. + 1. Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide + + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. Launch slotTool from the list of homebrew + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section 1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option @@ -36,22 +42,31 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint 1. Copy `usm.bin` from the unSAFE_MODE `.zip` to the root of your SD card 1. Put your SD card back into your console +![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} + #### Section II - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](https://uwuu.ca/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section III - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -65,6 +80,8 @@ At this point, your console will boot to Luma3DS by default. #### Section IV - Restoring WiFi Configuration Profiles +In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch the Download Play application 1. Wait until you see the two buttons + Do not press either of the buttons diff --git a/_pages/uk_UA/installing-boot9strap-(soundhax).txt b/_pages/uk_UA/installing-boot9strap-(soundhax).txt index 2302a85291..d9c13f9bc7 100644 --- a/_pages/uk_UA/installing-boot9strap-(soundhax).txt +++ b/_pages/uk_UA/installing-boot9strap-(soundhax).txt @@ -4,7 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+
+{: .notice--info} + +### Compatibility Notes Soundhax (when combined with universal-otherapp) is compatible with versions 1.0.0 through 11.3.0 in all regions. @@ -21,6 +27,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Section I - Prep Work +In this section, you will copy the files needed to trigger both Soundhax and universal-otherapp. + 1. Power off your device 1. Insert your SD card into your computer 1. Copy the Soundhax `.m4a` to the root of your SD card @@ -33,11 +41,16 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 1. Reinsert your SD card into your device 1. Power on your device - ![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} #### Section II - Launching SafeB9SInstaller +In this section, you will launch Soundhax through the Nintendo 3DS Sound app, which will use universal-otherapp to launch the boot9strap (custom firmware) installer. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch Nintendo 3DS Sound @@ -58,6 +71,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Section III - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap 1. Once it is complete, press (A) to reboot your device 1. Your device should have rebooted into the Luma3DS configuration menu diff --git a/_pages/uk_UA/installing-boot9strap-(usm).txt b/_pages/uk_UA/installing-boot9strap-(usm).txt index 6e148372c2..b58fa784a2 100644 --- a/_pages/uk_UA/installing-boot9strap-(usm).txt +++ b/_pages/uk_UA/installing-boot9strap-(usm).txt @@ -4,15 +4,17 @@ title: "Installing boot9strap (USM)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

We can do this using an existing exploit, BannerBomb3.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -29,6 +31,8 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will #### Section I - Prep Work +In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. + 1. If your device is powered on, power off your device 1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer 1. Upload your movable.sed using the "Choose File" option @@ -41,47 +45,51 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will 1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card 1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - + ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }}) - {: .notice--info} - + ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} + ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card 1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Select "Inject haxx" +1. Press (A) to select "Inject haxx" + Your device will automatically power off #### Section III - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section IV - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -95,16 +103,17 @@ At this point, your console will boot to Luma3DS by default. #### Section V - Restoring WiFi Configuration Profiles +In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text -1. Select "Restore slots" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) +1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + Your device will automatically reboot 1. Power off your device 1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore ___ diff --git a/_pages/uk_UA/seedminer.txt b/_pages/uk_UA/seedminer.txt index 44fe68e7b6..871d46e5cd 100644 --- a/_pages/uk_UA/seedminer.txt +++ b/_pages/uk_UA/seedminer.txt @@ -4,52 +4,54 @@ title: "Seedminer" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

+

For information on how Seedminer works, see this presentation.

+

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+
+{: .notice--info} -To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. +### Section I - Prep Work -For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). - -This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. - -### Instructions - -#### Section I - Prep Work +In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. 1. Insert your SD card into your computer 1. Navigate to the `Nintendo 3DS` folder on your SD card -1. Copy the 32 character long name of the folder you see inside Nintendo 3DS - + Do not go inside any more folders - + If you see multiple 32 character long folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + + If you don't have a `Nintendo 3DS` folder, put your SD card into your 3DS and power it on so that the folder can be created +1. Copy the name of the 32-letter folder you see directly inside Nintendo 3DS + + This 32-letter name is system-specific and will be different for each console + + If you see multiple 32-letter folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + You can ignore the `private` folder if you have it - ![]({{ "/images/screenshots/id0-example.png" | absolute_url }}) + ![]({{ "/images/screenshots/seedminer/id0-example.png" | absolute_url }}) {: .notice--info} -1. Paste your 32 character long folder name into a document you can reference later - + This folder name is also known as your "ID0" +1. Paste your 32 character long folder name into [a document](/images/screenshots/seedminer/text-document.png) you can reference later + + This folder is known as your "ID0". Take note of this as this guide will refer to it as such later 1. Power on your device + Your SD card does not need to be inserted at this point 1. Go to your Friend List (the [orange Face Icon]({{ "/images/friend-list-icon.png" | absolute_url }}) in the top row of your HOME Menu) + If you receive an error and are kicked out of the menu, you either must create a new Mii or your device cannot connect to Nintendo's servers (due to a ban or connection issues) 1. Find your Mii profile, then find the "Friend Code" field on the top screen -#### Section II - Seedminer +### Section II - Seedminer + +In this section, you will use the Bruteforce Movable website to retrieve your device's encryption key in the form of `movable.sed`. 1. Open [Bruteforce Movable](https://seedminer.hacks.guide/) on your computer - + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) + If the site isn't working, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field - + Do not attempt to enter the ID0 by hand. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section + + Do not attempt to enter the ID0 manually, as it is easy to make a mistake. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section 1. Select "Go" + If the site immediately goes to step 4, the website has already correctly processed your bruteforce request. You can download your `movable.sed` file and continue to the next section. You do not need to re-add the bot -1. Use the "Register Friend" button on your device to add the bot's friend code as given by the website +1. Use the ["Register Friend" button](/images/screenshots/seedminer/register-friend.png) on your device to add the bot's friend code as given by the website + If prompted, the name that you give to the friend does not matter 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once 1. Once the site processes your information, the site will continue to `Step 2: Bruteforce` automatically 1. Wait for the remainder of the process to complete - + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour + + This is usually fast (1-5 minutes) + During this process, the bot you added may not show up on your 3DS. As long as the website updates, this is not an issue + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site @@ -57,7 +59,7 @@ This method uses a powerful graphics card to perform the calculations needed. A ___ -### Next Steps +### Next steps: Choose an exploit Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. diff --git a/_pages/vi_VN/bannerbomb3.txt b/_pages/vi_VN/bannerbomb3.txt index a0b1ef007e..5a46749529 100644 --- a/_pages/vi_VN/bannerbomb3.txt +++ b/_pages/vi_VN/bannerbomb3.txt @@ -4,11 +4,15 @@ title: "BannerBomb3" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

For a more technical explanation, see here.

+
+{: .notice--info} -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -20,6 +24,9 @@ If you have a Taiwanese console (indicated by a T after the system version), fol * Your `movable.sed` file from completing [Seedminer](seedminer) #### Section I - Prep Work + +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + 1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer 1. Upload your movable.sed using the "Choose File" option 1. Click "Build and Download" @@ -27,28 +34,31 @@ If you have a Taiwanese console (indicated by a T after the system version), fol 1. If your console is powered on, power off your console 1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from the BannerBomb3 `.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section +1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked 1. Power off your device 1. Insert your SD card into your computer -1. You should now have `42383841.bin` in SD root. This is the DSiWare backup you will use later in the guide -1. Navigate to `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card - + This `` will be the same one that you used in [Seedminer](seedminer) -1. Delete `F00D43D5.bin` from the Nintendo DSiWare folder and from your computer. This file will not be needed anymore +1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore + Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} diff --git a/_pages/vi_VN/finalizing-setup.txt b/_pages/vi_VN/finalizing-setup.txt index c5b41ec5b8..29ed5ffea6 100644 --- a/_pages/vi_VN/finalizing-setup.txt +++ b/_pages/vi_VN/finalizing-setup.txt @@ -20,6 +20,8 @@ On this page, we will make critical system file backups and install the followin It is not recommended to skip downloading any of these applications, as many of them will be used later on this page. At the end of this page, your SD card will be cleaned up by removing unnecessary installation files. {: .notice--warning} +### Compatibility Notes + If your **New 3DS** was on version 2.1.0 before following this guide, you should [restore your NAND backup](godmode9-usage#restoring-a-nand-backup) before continuing. {: .notice--warning} @@ -39,6 +41,8 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o #### Section I - Prep Work +In this section, you will copy the files necessary to follow the rest of the instructions on this page. + 1. Power off your device 1. Insert your SD card into your computer 1. Create a folder named `cias` on the root of your SD card if it does not already exist @@ -52,15 +56,20 @@ If your previous CFW setup was EmuNAND-based and you wish to move the contents o 1. Reinsert your SD card into your device 1. Power on your device - ![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) - {: .notice--info} - ![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) - {: .notice--info} +The screenshots below indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. + +![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) +{: .notice--info} + -These screenshots indicate the minimum SD card layout that is required to follow this page. You may have extra files or folders on your SD card, depending on your previous setup or the method that you followed. #### Section II - Updating the System +In this section, you will update your system to the latest version, which is safe to do with custom firmware. + 1. Update your device by going to System Settings, then "Other Settings", then going all the way to the right and using "System Update" + Updates while using B9S + Luma (what you have) are safe + The updater may display a message saying "Your system is up to date" instead of updating. This is normal if you are already up to date; continue with the next section @@ -69,6 +78,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section III - Homebrew Launcher +In this section, you will temporarily replace Download Play with Homebrew Launcher (which we need to launch FBI). Download Play will automatically go back to normal once you reboot your device. + 1. Launch the Download Play application (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. Wait until you see the `Nintendo 3DS` and `Nintendo DS` buttons 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu @@ -83,6 +94,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section IV - RTC and DSP Setup +In this section, you will sync your 3DS internal clock with the actual time and dump the sound firmware (which is necesssary for some homebrew software to use sound properly). + 1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu 1. Select "Miscellaneous options" 1. Select "Dump DSP firmware" @@ -94,6 +107,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section V - Installing CIAs +In this section, you will install several useful homebrew applications to HOME Menu. + 1. Launch FBI from the list of homebrew 1. Navigate to `SD` -> `cias` 1. Select "\" @@ -102,6 +117,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VI - CTRNAND Luma3DS +In this section, you will use a script to copy some of Luma3DS's files to internal memory so that they can be accessed, even without an SD card inserted. + 1. Power off your device 1. Press and hold (Start), and while holding (Start), power on your device. This will launch GodMode9 + If you do not boot into GodMode9, ensure that `GodMode9.firm` is in `/luma/payloads/` and that `payloads` is correctly spelled @@ -118,6 +135,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VII - Cleanup SD Card +In this section, you will use a script to remove some unnecessary files from your SD card. + 1. Select "Cleanup SD Card" 1. When prompted, press (A) to proceed 1. Press (A) to continue @@ -125,6 +144,8 @@ These screenshots indicate the minimum SD card layout that is required to follow #### Section VIII - Backup Essential Files +In this section, you will make backups of flies that can be used to recover from softwaer bricks or to recover data. + 1. Select "Backup Options" 1. Select "SysNAND Backup" 1. Press (A) to confirm @@ -159,7 +180,7 @@ You're done! Custom firmware is now fully configured on your device. Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! {: .notice--info} -#### Information and Notes +### Information and Notes {% capture notice-6 %} Here are some key combos that you should know: diff --git a/_pages/vi_VN/homebrew-launcher-(pichaxx).txt b/_pages/vi_VN/homebrew-launcher-(pichaxx).txt index 6348abc52a..aff6795262 100644 --- a/_pages/vi_VN/homebrew-launcher-(pichaxx).txt +++ b/_pages/vi_VN/homebrew-launcher-(pichaxx).txt @@ -4,9 +4,17 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. +
+{: .notice--info} -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE to run SafeB9SInstaller. +### Compatibility Notes + +These instructions work on USA, Europe, and Japan consoles as indicated by the letters U, E, or J after the system version. + +You will need a Nintendo Network ID to download Pokémon Picross. This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. {: .notice--warning} @@ -24,15 +32,8 @@ This process will overwrite your Pokémon Picross save file, if you have one. If #### Section I - Prep Work -1. Power on your device -1. Open the Nintendo eShop -1. Tap the Search icon (small magnifying glass) -1. Search for `picross` -1. Open the store page for Pokémon Picross -1. Download Pokémon Picross - + You can scan [this QR code](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=ESHOP://50010000037815&margin=0&qzone=1&size=400x400&ecc=L) using the Nintendo 3DS Camera for a direct link to the eShop app - + Your SD card must be inserted in your device to install Pokémon Picross -1. Power off your device +In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. + 1. Insert your SD card into your computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it @@ -40,8 +41,16 @@ This process will overwrite your Pokémon Picross save file, if you have one. If 1. Copy the `slotTool` folder from the unSAFE_MODE `.zip` to the `3ds` folder on your SD card 1. Copy the otherapp payload for your region/version from the unSAFE_MODE `.zip`'s `otherapps_with_CfgS` folder to the root of your SD card and rename it to `otherapp.bin` +![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }}) +{: .notice--info} + + #### Section II - PicHaxx +In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device. 1. Open [the PicHaxx Injector website](https://3ds.nhnarwhal.com/3dstools/pichaxx.php) on your computer 1. Select your `movable.sed` file 1. Select "Build and Download" diff --git a/_pages/vi_VN/installing-boot9strap-(fredtool).txt b/_pages/vi_VN/installing-boot9strap-(fredtool).txt index 78598ce783..1f7825ac28 100644 --- a/_pages/vi_VN/installing-boot9strap-(fredtool).txt +++ b/_pages/vi_VN/installing-boot9strap-(fredtool).txt @@ -4,15 +4,16 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Table of Contents" %} -### Required Reading - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, for example from BannerBomb or the DSiWare Dumper tool. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). +
+Technical Details (optional) +

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+
+{: .notice--info} ### What You Need -* A DSiWare Backup (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) +* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -20,6 +21,8 @@ This is a currently working implementation of the "FIRM partitions known-plainte #### Section I - CFW Check +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + 1. Power off your device 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button @@ -30,17 +33,7 @@ If you see a configuration menu, you already have CFW, and continuing with these #### Section II - Prep Work -1. Power off your device -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card - - ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} - -#### Section III - Fredtool +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) @@ -53,19 +46,31 @@ If you see a configuration menu, you already have CFW, and continuing with these 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link +1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` - + If the `Nintendo DSiWare` folder does not exist, create it inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` 1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder -1. Reinsert your SD card into your device + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card + + ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} + +#### Section III - Overwriting DS Connection Settings + +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Haxxxxxxxxx!" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title 1. Select "Copy", then select "OK" 1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio #### Section IV - Flipnote Exploit @@ -73,6 +78,8 @@ If you see a configuration menu, you already have CFW, and continuing with these If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} +In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer. + 1. Complete the initial setup process for the launched game until you reach the main menu + Select the left option whenever prompted during the setup process 1. Using the touch-screen, select the large left box, then select the box with an SD card icon @@ -85,7 +92,7 @@ If you would prefer a visual guide to this section, one is available [here](http 1. Tap the fourth box with the letter "A" in it 1. If the exploit was successful, your device will have loaded b9sTool 1. Using the D-Pad, move to "Install boot9strap" - + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to start over from Step 12 of Section III + + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III 1. Press (A), then press START and SELECT at the same time to begin the process 1. Once completed and the bottom screen says "done.", exit b9sTool, then power off your device + You may have to force power off by holding the power button @@ -94,6 +101,8 @@ If you would prefer a visual guide to this section, one is available [here](http #### Section V - Luma3DS Verification +Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. + 1. Power off your device 1. Insert your SD card into your computer 1. Verify that a `luma` folder exists and that `config.ini` is inside of it @@ -106,13 +115,15 @@ At this point, your console will boot to Luma3DS by default. #### Section VI - Restoring DS Connection Settings -1. Copy the `42383841.bin` file from the `clean/` folder of the downloaded DSiWare archive (`output_(name).zip`) to the `Nintendo 3DS///Nintendo DSiWare/` folder on your SD card - + Replace the existing `42383841.bin` file +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Nintendo DSi™" title +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title 1. Select "Copy", then select "OK" ___ diff --git a/_pages/vi_VN/installing-boot9strap-(hbl-usm).txt b/_pages/vi_VN/installing-boot9strap-(hbl-usm).txt index 142604d9b0..6c9a3f849c 100644 --- a/_pages/vi_VN/installing-boot9strap-(hbl-usm).txt +++ b/_pages/vi_VN/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,16 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

As we already have Homebrew access, we can use slotTool to do this.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--danger} @@ -24,7 +27,10 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint #### Section I - Prep Work +In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. + 1. Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide + + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. Launch slotTool from the list of homebrew + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section 1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option @@ -36,22 +42,31 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint 1. Copy `usm.bin` from the unSAFE_MODE `.zip` to the root of your SD card 1. Put your SD card back into your console +![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} + #### Section II - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](https://uwuu.ca/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section III - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -65,6 +80,8 @@ At this point, your console will boot to Luma3DS by default. #### Section IV - Restoring WiFi Configuration Profiles +In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch the Download Play application 1. Wait until you see the two buttons + Do not press either of the buttons diff --git a/_pages/vi_VN/installing-boot9strap-(soundhax).txt b/_pages/vi_VN/installing-boot9strap-(soundhax).txt index 2302a85291..d9c13f9bc7 100644 --- a/_pages/vi_VN/installing-boot9strap-(soundhax).txt +++ b/_pages/vi_VN/installing-boot9strap-(soundhax).txt @@ -4,7 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+
+{: .notice--info} + +### Compatibility Notes Soundhax (when combined with universal-otherapp) is compatible with versions 1.0.0 through 11.3.0 in all regions. @@ -21,6 +27,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Section I - Prep Work +In this section, you will copy the files needed to trigger both Soundhax and universal-otherapp. + 1. Power off your device 1. Insert your SD card into your computer 1. Copy the Soundhax `.m4a` to the root of your SD card @@ -33,11 +41,16 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 1. Reinsert your SD card into your device 1. Power on your device - ![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} #### Section II - Launching SafeB9SInstaller +In this section, you will launch Soundhax through the Nintendo 3DS Sound app, which will use universal-otherapp to launch the boot9strap (custom firmware) installer. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch Nintendo 3DS Sound @@ -58,6 +71,8 @@ Soundhax (when combined with universal-otherapp) is compatible with versions 1.0 #### Section III - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap 1. Once it is complete, press (A) to reboot your device 1. Your device should have rebooted into the Luma3DS configuration menu diff --git a/_pages/vi_VN/installing-boot9strap-(usm).txt b/_pages/vi_VN/installing-boot9strap-(usm).txt index 6e148372c2..b58fa784a2 100644 --- a/_pages/vi_VN/installing-boot9strap-(usm).txt +++ b/_pages/vi_VN/installing-boot9strap-(usm).txt @@ -4,15 +4,17 @@ title: "Installing boot9strap (USM)" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

We can do this using an existing exploit, BannerBomb3.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

+
+{: .notice--info} -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. +### Compatibility Notes These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. @@ -29,6 +31,8 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will #### Section I - Prep Work +In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. + 1. If your device is powered on, power off your device 1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer 1. Upload your movable.sed using the "Choose File" option @@ -41,47 +45,51 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will 1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card 1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - + ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }}) - {: .notice--info} - + ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} + ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + The `` will be the same one that you used in [Seedminer](seedminer) - + The `` is a 32 character long folder inside of the `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card 1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### Section II - BannerBomb3 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. + 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Select "Inject haxx" +1. Press (A) to select "Inject haxx" + Your device will automatically power off #### Section III - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions 1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour 1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` - + This is a [visual representation](/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. If the exploit was successful, your device will have booted into SafeB9SInstaller #### Section IV - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. When prompted, input the key combo given on the top screen to install boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device @@ -95,16 +103,17 @@ At this point, your console will boot to Luma3DS by default. #### Section V - Restoring WiFi Configuration Profiles +In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your device should show a menu with some text -1. Select "Restore slots" +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) +1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + Your device will automatically reboot 1. Power off your device 1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore ___ diff --git a/_pages/vi_VN/seedminer.txt b/_pages/vi_VN/seedminer.txt index 44fe68e7b6..871d46e5cd 100644 --- a/_pages/vi_VN/seedminer.txt +++ b/_pages/vi_VN/seedminer.txt @@ -4,52 +4,54 @@ title: "Seedminer" {% include toc title="Table of Contents" %} -### Required Reading +
+Technical Details (optional) +

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

+

For information on how Seedminer works, see this presentation.

+

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+
+{: .notice--info} -To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. +### Section I - Prep Work -For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). - -This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. - -### Instructions - -#### Section I - Prep Work +In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. 1. Insert your SD card into your computer 1. Navigate to the `Nintendo 3DS` folder on your SD card -1. Copy the 32 character long name of the folder you see inside Nintendo 3DS - + Do not go inside any more folders - + If you see multiple 32 character long folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + + If you don't have a `Nintendo 3DS` folder, put your SD card into your 3DS and power it on so that the folder can be created +1. Copy the name of the 32-letter folder you see directly inside Nintendo 3DS + + This 32-letter name is system-specific and will be different for each console + + If you see multiple 32-letter folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + You can ignore the `private` folder if you have it - ![]({{ "/images/screenshots/id0-example.png" | absolute_url }}) + ![]({{ "/images/screenshots/seedminer/id0-example.png" | absolute_url }}) {: .notice--info} -1. Paste your 32 character long folder name into a document you can reference later - + This folder name is also known as your "ID0" +1. Paste your 32 character long folder name into [a document](/images/screenshots/seedminer/text-document.png) you can reference later + + This folder is known as your "ID0". Take note of this as this guide will refer to it as such later 1. Power on your device + Your SD card does not need to be inserted at this point 1. Go to your Friend List (the [orange Face Icon]({{ "/images/friend-list-icon.png" | absolute_url }}) in the top row of your HOME Menu) + If you receive an error and are kicked out of the menu, you either must create a new Mii or your device cannot connect to Nintendo's servers (due to a ban or connection issues) 1. Find your Mii profile, then find the "Friend Code" field on the top screen -#### Section II - Seedminer +### Section II - Seedminer + +In this section, you will use the Bruteforce Movable website to retrieve your device's encryption key in the form of `movable.sed`. 1. Open [Bruteforce Movable](https://seedminer.hacks.guide/) on your computer - + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) + If the site isn't working, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field - + Do not attempt to enter the ID0 by hand. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section + + Do not attempt to enter the ID0 manually, as it is easy to make a mistake. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section 1. Select "Go" + If the site immediately goes to step 4, the website has already correctly processed your bruteforce request. You can download your `movable.sed` file and continue to the next section. You do not need to re-add the bot -1. Use the "Register Friend" button on your device to add the bot's friend code as given by the website +1. Use the ["Register Friend" button](/images/screenshots/seedminer/register-friend.png) on your device to add the bot's friend code as given by the website + If prompted, the name that you give to the friend does not matter 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once 1. Once the site processes your information, the site will continue to `Step 2: Bruteforce` automatically 1. Wait for the remainder of the process to complete - + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour + + This is usually fast (1-5 minutes) + During this process, the bot you added may not show up on your 3DS. As long as the website updates, this is not an issue + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site @@ -57,7 +59,7 @@ This method uses a powerful graphics card to perform the calculations needed. A ___ -### Next Steps +### Next steps: Choose an exploit Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. diff --git a/_pages/zh_CN/bannerbomb3-fredtool-(twn).txt b/_pages/zh_CN/bannerbomb3-fredtool-(twn).txt index c0149c90fe..46807a7a74 100644 --- a/_pages/zh_CN/bannerbomb3-fredtool-(twn).txt +++ b/_pages/zh_CN/bannerbomb3-fredtool-(twn).txt @@ -51,10 +51,10 @@ title: "BannerBomb3 + Fredtool(仅港台版)" 1. 于“Username”一行,填入一个你的英文名(不带空格或特殊字符) 1. 于“MovableSed”一行,点击“Browse...”(选择文件)上传你的 `movable.sed` 文件 1. 点击 “Build” - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp + + 等待片刻,直到构建完成 +1. 将你的名字输入左边的 Build History 菜单中的 Filter Builds 一栏 +1. 点击第一个搜索结果 + + 它应该是所有显示的结果中时间最新的那一个 1. 点击 "output_(<你的名字>).zip" 的链接 1. 打开内存卡的 `Nintendo 3DS` -> `` -> `` 文件夹 + 这个 `` 和你在 [Seedminer](seedminer) 章节中打开的一样 @@ -90,12 +90,12 @@ title: "BannerBomb3 + Fredtool(仅港台版)" + 你也许需要填一个其他的名字来和先前 BannerBomb3 步骤中下载到的区别开来。 1. 于 “DSiBin” 一行,点击“Browse...”(选择文件)来上传先前的 `42383821.bin` 文件。 1. 于“MovableSed”一行,点击“Browse...”(选择文件)上传你的 `movable.sed` 文件 -1. 于“InjectionTarget”,设置注入对象为 `DSdownloadplay`(*不是* memorypit) +1. 于“InjectionTarget”,设置注入对象为 `DSdownloadplay`(**不是带有** memorypit 字串的那个) 1. 点击 “Build” - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp + + 等待片刻,直到构建完成 +1. 将你的名字输入左边的 Build History 菜单中的 Filter Builds 一栏 +1. 点击第一个搜索结果 + + 它应该是所有显示的结果中时间最新的那一个 1. 点击 "output_(<你的名字>).zip" 的链接 1. 打开内存卡的 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 文件夹 1. 从下载的 DSiWare 压缩包 (`output_(<你的名字>).zip`) 里的 `hax` 文件夹复制 `484E4441.bin` 到 `Nintendo DSiWare` 文件夹 diff --git a/_pages/zh_CN/bannerbomb3.txt b/_pages/zh_CN/bannerbomb3.txt index dd9d12beb2..d3eabeb9fa 100644 --- a/_pages/zh_CN/bannerbomb3.txt +++ b/_pages/zh_CN/bannerbomb3.txt @@ -4,11 +4,15 @@ title: "BannerBomb3" {% include toc title="目录内容" %} -### 重要事项 +
+Technical Details (optional) +

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

For a more technical explanation, see here.

+
+{: .notice--info} -我们使用了一个在 3DS 系统设置应用程序的 DSiWare 数据管理窗口中的一个漏洞来导出系统的 DSiWare 软件。 - -为了做到这一点,我们将使用你主机的系统加密密钥(movable.sed)来构建一个可被利用的 DSiWare 系统备份,以便将 DSi 互联网设置应用程序导出到 SD 卡的根目录。 +### Compatibility Notes 这些操作可在美、欧、日、韩版的主机上工作,你可通过系统版本号末尾的 U,E,J,K 字符来区分主机版本。 @@ -20,6 +24,9 @@ title: "BannerBomb3" * 你在 [Seedminer](seedminer) 步骤中获得的 `movable.sed` 文件 #### 第一步 – 准备工作 + +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + 1. 在你的电脑上打开 [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) 1. 点击 “选择文件” 选项,然后选择你的 movable.sed 上传 1. 点击 “Build and Download” @@ -27,28 +34,31 @@ title: "BannerBomb3" 1. 如果你的主机已经被你开机了,那么将其关机 1. 将你的 SD 卡插入到电脑 1. 打开内存卡的 `Nintendo 3DS` -> `` -> `` 文件夹 - + 这个 `` 和你在 [Seedminer](seedminer) 章节中打开的一样 - + `` 是一个在 `` 文件夹内,另一个 32 位字符长的文件夹 + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. 在 `` 文件夹内创建一个名为 `Nintendo DSiWare` 的文件夹 + 如果这个位置已经存在了这个文件夹,**且**有一些名为 `<8位ID>.bin` 文件(DSiWare 备份文件)在里面,请将它们备份到电脑上,然后从 SD 卡中移除这些文件 -1. 从 BannerBomb3 `.zip` 压缩文件中解压 `F00D43D5.bin` 到你 SD 卡的 `Nintendo DSiWare` 文件夹下 +1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### 第二步 – BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. + 1. 将 SD 卡重新插入你的主机 1. 启动你的主机 1. 启动你主机上的 “系统设置(System settings)” -1. 进入到 `数据管理(Data Management)` -> `DSiWare` -1. 点击 SD 卡部分 +1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + 你的主机屏幕应该会开始品红色(粉色 / 紫色)的闪烁,然后在几秒钟后崩溃。 这意味着它生效了 1. 将主机关机 1. 将你的 SD 卡插入到电脑 -1. 现在你主机的 SD 卡根目录下应该会出现一个叫做 `42383841.bin` 的文件。 这是 DSiWare 的备份,稍后将在指南中使用 -1. 进入到 `Nintendo 3DS` -> `` -> `<32位字符ID>` -> `Nintendo DSiWare` 文件夹 - + 这个 `` 和你在 [Seedminer](seedminer) 章节中使用的一样 -1. 从 Nintento DSiWare 文件夹和电脑中删除`F00D43D5.bin`。 此文件之后不再需要使用 +1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page +1. 打开内存卡的 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 文件夹 +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. 此文件之后不再需要使用 + 继续至[安装 boot9strap(通过Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} diff --git a/_pages/zh_CN/finalizing-setup.txt b/_pages/zh_CN/finalizing-setup.txt index c22a37fedf..6e460ea44a 100644 --- a/_pages/zh_CN/finalizing-setup.txt +++ b/_pages/zh_CN/finalizing-setup.txt @@ -20,6 +20,8 @@ boot9strap 将会在 NAND 里的内容加载完成后启动 `boot.firm` 文件 建议不要跳过下载以上列出的任何程序,因为等会就需要用到它们 我们将在本页结尾处清理你在破解过程中产生的无用文件。 {: .notice--warning} +### Compatibility Notes + 如果你的 **New 3DS** 的系统在很早以前通过某些手段降级到了 2.1.0,则你应该在继续前先[还原你的 NAND 备份](godmode9-usage#restoring-a-nand-backup)。 {: .notice--warning} @@ -39,6 +41,8 @@ boot9strap 将会在 NAND 里的内容加载完成后启动 `boot.firm` 文件 #### 第一步 – 准备工作 +In this section, you will copy the files necessary to follow the rest of the instructions on this page. + 1. 将主机关机 1. 将你的 SD 卡插入电脑 1. 检查你的 SD 卡根目录是否有一个叫 `cias` 的文件夹,如果没有则手动新建一个 @@ -52,15 +56,20 @@ boot9strap 将会在 NAND 里的内容加载完成后启动 `boot.firm` 文件 1. 将 SD 卡重新插入主机 1. 启动你的主机 - ![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) - {: .notice--info} - ![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) - {: .notice--info} +The screenshots below indicate the minimum SD card layout that is required to follow this page. 你的 SD 卡中可能会多出一些文件或者文件夹,取决于你先前做了什么教程。 + +![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) +{: .notice--info} + -以上截图为遵循本页面步骤 SD 卡所需的文件及文件夹。 你的 SD 卡中可能会多出一些文件或者文件夹,取决于你先前做了什么教程。 #### 第二步 – 更新系统 +In this section, you will update your system to the latest version, which is safe to do with custom firmware. + 1. 进入 “系统设置(System Settings)”,接着点击“其他设置(Other Settings)”,然后移动到最右边,点击“系统升级(System Update)”来升级你的主机 + 你使用 B9S 和 Luma 时升级系统是安全的 + 更新程序可能会提示“你的系统已经是最新了”而不会继续更新 如果你已经更新到了最新,这是正常的;请继续下一节 @@ -69,6 +78,8 @@ boot9strap 将会在 NAND 里的内容加载完成后启动 `boot.firm` 文件 #### 第三步 – 进入 Homebrew Launcher +In this section, you will temporarily replace Download Play with Homebrew Launcher (which we need to launch FBI). Download Play will automatically go back to normal once you reboot your device. + 1. 启动“下载通信(Download Play)”程序 (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. 等到你看到 `Nintendo 3DS` 和 `Nintendo DS` 按钮 1. 同时按下 “L” + “↓” + “Select” 键来打开 Rosalina 菜单 @@ -83,6 +94,8 @@ boot9strap 将会在 NAND 里的内容加载完成后启动 `boot.firm` 文件 #### 第四步 — 调整 RTC 及 DSP +In this section, you will sync your 3DS internal clock with the actual time and dump the sound firmware (which is necesssary for some homebrew software to use sound properly). + 1. 同时按下 “L” + “↓” + “Select” 键来打开 Rosalina 菜单 1. 选择 “Miscellaneous options” 1. 选择“Dump DSP firmware” @@ -94,6 +107,8 @@ boot9strap 将会在 NAND 里的内容加载完成后启动 `boot.firm` 文件 #### 第五步 – 安装CIA +In this section, you will install several useful homebrew applications to HOME Menu. + 1. 从自制程序列表中找到并启动 FBI 1. 进入到 `SD` -> `cias` 1. 选择 “\” @@ -102,6 +117,8 @@ boot9strap 将会在 NAND 里的内容加载完成后启动 `boot.firm` 文件 #### 第六步 – 将 Luma3DS 复制到 CTRNAND +In this section, you will use a script to copy some of Luma3DS's files to internal memory so that they can be accessed, even without an SD card inserted. + 1. 将主机关机 1. 按住 “START” 键,然后将主机开机。 这会启动 GodMode9 + 如果没有进入 GodMode9,请确保 `GodMode9.firm` 放在了 `/luma/payloads/` 中,并确保 `payloads` 正确拼写。 @@ -118,6 +135,8 @@ boot9strap 将会在 NAND 里的内容加载完成后启动 `boot.firm` 文件 #### 第七步 – 清理 SD 卡 +In this section, you will use a script to remove some unnecessary files from your SD card. + 1. 选择 “Cleanup SD Card” 1. 出现提示时,按 “A” 键继续 1. 按 “A” 键继续 @@ -125,6 +144,8 @@ boot9strap 将会在 NAND 里的内容加载完成后启动 `boot.firm` 文件 #### 第七节 – 备份基础文件 +In this section, you will make backups of flies that can be used to recover from softwaer bricks or to recover data. + 1. 选择 “Backup Options” 1. 选择 “SysNAND Backup” 1. 按 “A” 确认 @@ -159,7 +180,7 @@ ___ 你好呀!~ 我们正在探索提升整体手册体验的方法。 如果你愿意帮助我们,请在[这里](https://forms.gle/vZNoc4QLCz5MEXCK7)填写一份问卷调查(仅限使用英文)。 谢谢! {: .notice--info} -#### 信息与注意事项 +### Information and Notes {% capture notice-6 %} 以下是你可能会用到的一些快捷键: diff --git a/_pages/zh_CN/homebrew-launcher-(pichaxx).txt b/_pages/zh_CN/homebrew-launcher-(pichaxx).txt index f8ca06795a..e25933acfc 100644 --- a/_pages/zh_CN/homebrew-launcher-(pichaxx).txt +++ b/_pages/zh_CN/homebrew-launcher-(pichaxx).txt @@ -4,9 +4,17 @@ title: "启动 Homebrew Launcher(通过 PicHaxx)" {% include toc title="目录内容" %} -### 重要事项 +
+Technical Details (optional) +This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. +
+{: .notice--info} -此方法使用 Seedminer 来取得你的 `movable.sed` 文件,然后更进一步地利用漏洞,将为《宝可梦:绘图方块》(Pokémon Picross)自制的存档写入游戏,然后利用 unSAFE_MODE 启动 SafeB9SInstaller。 +### Compatibility Notes + +These instructions work on USA, Europe, and Japan consoles as indicated by the letters U, E, or J after the system version. + +You will need a Nintendo Network ID to download Pokémon Picross. 这个操作会覆盖《宝可梦:绘图方块》中的游戏存档。 如果你想保留你的游戏存档,则你应该在覆盖前备份 `00000001.sav` 文件。 {: .notice--warning} @@ -24,15 +32,8 @@ title: "启动 Homebrew Launcher(通过 PicHaxx)" #### 第一步 – 准备工作 -1. 启动你的主机 -1. 打开 Nintendo eShop -1. 点击搜索 (小放大镜图标) -1. 搜索 `picross`(日文:ポケモンピクロス) -1. 打开《宝可梦:绘图方块》的商品页面 -1. 下载《宝可梦:绘图方块》 - + 你可以用 3DS 的相机直接扫[这个二维码](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=ESHOP://50010000037815&margin=0&qzone=1&size=400x400&ecc=L)来进入到 eShop 中的对应页面 - + 你必须插入一张 SD 卡到主机中才能安装《宝可梦:绘图方块》。 -1. 将主机关机 +In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. + 1. 将你的 SD 卡插入到电脑 1. 解压 Luma3DS `.zip` 里的 `boot.firm` 和 `boot.3dsx` 到你 SD 卡的根目录 + 根目录指的是你点进 SD 卡看到的目录,你可以在这个目录下看到 Nintendo 3DS 文件夹,但请不要点进去 @@ -40,8 +41,16 @@ title: "启动 Homebrew Launcher(通过 PicHaxx)" 1. 从 unSAFE_MODE `.zip` 中复制出 `slotTool` 文件夹到你的 SD 卡的 `3ds` 文件夹 1. 下载最新版本的 [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest),从文件中解压 `otherapps_with_CfgS` 文件夹,然后将里面对应你主机型号和区域的 `.bin` 文件复制到 SD 卡的根目录,并改名为 `otherapp.bin`。 +![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }}) +{: .notice--info} + + #### 第二步 – PicHaxx +In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device. 1. 在你的电脑上打开 [PicHaxx 注入器网页](https://3ds.nhnarwhal.com/3dstools/pichaxx.php) 1. 上传你的 `movable.sed` 文件 1. 选择 “构建并下载(Build and Download)” diff --git a/_pages/zh_CN/installing-boot9strap-(fredtool).txt b/_pages/zh_CN/installing-boot9strap-(fredtool).txt index 96856a6cf0..9c229b82c0 100644 --- a/_pages/zh_CN/installing-boot9strap-(fredtool).txt +++ b/_pages/zh_CN/installing-boot9strap-(fredtool).txt @@ -4,15 +4,16 @@ title: "安装 boot9strap(通过 Fredtool)" {% include toc title="目录内容" %} -### 重要事项 - -本章节 Seedminer 将使用你的 `movable.sed` 文件来解密所有的 DSiWare 程序,以便在3DS中内置的 DS 网络设定中注入修改后的 DSiWare 程序。 这个操作需要你有任何的 DSiWare 备份,比如 BannerBomb 或 DSiWare Dumper 工具导出的。 - -本教程是使用 “FIRM partitions known-plaintext” 漏洞来进行破解的, 欲知相关资料请查阅[这里](https://www.3dbrew.org/wiki/3DS_System_Flaws)。 +
+Technical Details (optional) +

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+
+{: .notice--info} ### 你需要准备点啥? -* 一个 DSiWare 备份文件(你在做完 [BannerBomb3](bannerbomb3) 之后根目录应该有了一个) +* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * 你在 [Seedminer](seedminer) 步骤中获得的 `movable.sed` 文件 * 最新版本的 [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest)(下载 `Frogminer_save.zip`) * 最新版本的 [b9sTool](https://github.com/zoogie/b9sTool/releases/latest)(下载 `boot.nds`) @@ -20,6 +21,8 @@ title: "安装 boot9strap(通过 Fredtool)" #### 第一步 – 检查自制固件 +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + 1. 将主机关机 1. 按住 “Select” 键 1. 在按住 “Select” 键的同时按下电源键开机 @@ -30,8 +33,25 @@ title: "安装 boot9strap(通过 Fredtool)" #### 第二步 – 准备工作 -1. 将主机关机 +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. + +1. 在电脑上打开 [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) 站点 +1. 于“Username”一行,填入一个你的英文名(不带空格或特殊字符) +1. 于 “DSiBin” 一行,点击“Browse...”(选择文件)来上传先前的 `42383841.bin` 文件 +1. 于“MovableSed”一行,点击“Browse...”(选择文件)上传你的 `movable.sed` 文件 +1. 于“InjectionTarget”一行,设置注入对象为 `DSinternet`(**不是带有** memorypit 字串的那个) +1. 点击 “Build” + + 等待片刻,直到构建完成 +1. 将你的名字输入左边的 Build History 菜单中的 Filter Builds 一栏 +1. 点击第一个搜索结果 + + 它应该是所有显示的结果中时间最新的那一个 +1. 点击 "output_(<你的名字>).zip" 的链接 1. 将你的 SD 卡插入到电脑 +1. 打开内存卡的 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 文件夹 + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. 从下载的 DSiWare 压缩包 (`output_(<你的名字>).zip`) 里的 `hax` 文件夹复制 `42383841.bin` 到 `Nintendo DSiWare` 文件夹 + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} 1. 解压 Luma3DS `.zip` 里的 `boot.firm` 和 `boot.3dsx` 到你 SD 卡的根目录 + 根目录指的是你点进 SD 卡看到的目录,你可以在这个目录下看到 Nintendo 3DS 文件夹,但请不要点进去 1. 复制 `boot.nds` (B9STool)到你的 SD 卡根目录 @@ -40,32 +60,17 @@ title: "安装 boot9strap(通过 Fredtool)" ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### 第三步 – Fredtool +#### Section III - Overwriting DS Connection Settings + +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. -1. 在电脑上打开 [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) 站点 -1. 于“Username”一行,填入一个你的英文名(不带空格或特殊字符) -1. Under the "DSiBin" field, upload your `42383841.bin` file using the first "Browse..." option -1. 于“MovableSed”一行,点击“Browse...”(选择文件)上传你的 `movable.sed` 文件 -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. 点击 “Build” - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. 点击 "output_(<你的名字>).zip" 的链接 -1. 打开内存卡的 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 文件夹 - + 这个 `` 和你在 [Seedminer](seedminer) 章节中打开的一样 - + `` 是一个在 `` 文件夹内,另一个 32 位字符长的文件夹 - + 如果里面没有 `Nintendo DSiWare` 文件夹,请在 `` 文件夹内创建它 -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder -1. 将 SD 卡重新插入你的主机 1. 启动你的主机 1. 启动你主机上的 “系统设置(System settings)” -1. 进入到 `数据管理(Data Management)` -> `DSiWare` -1. 在 “SD Card” 一栏,选择 “Haxxxxxxxxx!” 应用 +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title 1. 选择 “Copy” ,然后选择 “OK” 1. 返回系统设置的主菜单 -1. 移动到 `“网络设置(Internet Settings)”` -> `“任天堂 DS 连接(Nintendo DS Connections)”`,然后选择 “OK” +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. 如果漏洞执行成功,你的主机将进入到日版的“うごくメモ帳 (Flipnote Studio)” #### 第四步 – 触发 Flipnote 漏洞 @@ -73,6 +78,8 @@ title: "安装 boot9strap(通过 Fredtool)" 如果你需要图片帮助,请点击 [这里](https://zoogie.github.io/web/flipnote_directions/)。 {: .notice--info} +In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer. + 1. 完成游戏的初始设置,直到进入主菜单为止 + 在出现提示时,选择左边的 “我不需要(いらない)” 选项 1. 使用触摸屏点击 “メモを見る” 并选择 “SD カード” @@ -85,7 +92,7 @@ title: "安装 boot9strap(通过 Fredtool)" 1. 点击第四个带有 “A” 的框 1. 如果漏洞成功执行,你的主机将会进入到 b9sTool 1. 使用十字键将光标移动至“Install boot9starp” - + 如果你漏了这步,系统将重启到桌面而非安装 boot9strap,你需要重新从本页教程第三步下的第12步开始 + + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III 1. 按下 “A” 键,然后同时按下 START 键和 SELECT 键来开始安装 1. 一旦下屏显示 “done.” ,那么安装就已经完成了。退出b9stool ,然后关机 + 你可能需要长按电源键强制关机 @@ -94,6 +101,8 @@ title: "安装 boot9strap(通过 Fredtool)" #### 第五步 – 验证 Luma3DS +Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. + 1. 将主机关机 1. 将你的 SD 卡插入到电脑 1. 检查 `luma` 文件夹是否存在,再检查里面是否有 `config.ini` 文件。 @@ -106,13 +115,15 @@ title: "安装 boot9strap(通过 Fredtool)" #### 第六步 – 还原 “DS 连接设置(DS Connection Settings)” -1. Copy the `42383841.bin` file from the `clean/` folder of the downloaded DSiWare archive (`output_(name).zip`) to the `Nintendo 3DS///Nintendo DSiWare/` folder on your SD card - + 请替换现有的 `42383841.bin` 文件 -1. 将SD卡重新插入你的主机 +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. + +1. 打开内存卡的 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 文件夹 +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. 将 SD 卡重新插入你的主机 1. 启动你的主机 1. 启动你主机上的 “系统设置(System settings)” -1. 进入到 `数据管理(Data Management)` -> `DSiWare` -1. 在 “SD卡(SD Card)” 一栏,选择 “Nintendo DSi™” 应用 +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title 1. 选择 “Copy” ,然后选择 “OK” ___ diff --git a/_pages/zh_CN/installing-boot9strap-(hbl-usm).txt b/_pages/zh_CN/installing-boot9strap-(hbl-usm).txt index 59f6f64b4b..f7c0e18b90 100644 --- a/_pages/zh_CN/installing-boot9strap-(hbl-usm).txt +++ b/_pages/zh_CN/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,16 @@ title: "安装 boot9strap(通过 HBL-USM)" {% include toc title="目录内容" %} -### 重要事项 +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

As we already have Homebrew access, we can use slotTool to do this.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+
+{: .notice--info} -为了破解系统的 SAFE_MODE 固件,我们需要注入一个已被破解的 WiFi 配置文件到主机中。 - -现在我们能够使用 Homebrew 程序了,接下来我们会利用它进入 slotTool 继续破解下去。 - -一旦 WiFi 配置文件被注入,我们将会使用到 SAFE_MODE 来继续此教程。SAVE_MODE 是一个所有的 3DS 主机都存在的修复功能,之后它将用于激活被破解的 WiFi 配置文件。 +### Compatibility Notes 如果你的 LR↑A 键其中有一个坏掉了,请加入 [Nintendo Homebrew Discord 服务器](https://discord.gg/MWxPgEp)然后以英文寻求帮助。(请注意,如果你身处中国大陆,访问 Discord 可能需要科学上网),你也可以到译者的 [QQ 群](https://stray-soul.com/index.php/qqgroup)寻求帮助,群号为 942052497。 {: .notice--danger} @@ -24,7 +27,10 @@ title: "安装 boot9strap(通过 HBL-USM)" #### 第一步 – 准备工作 +In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. + 1. 你的主机现在应该在本教程的前一部分打开了 Homebrew Launcher 了 + + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. 从自制程序列表中找到并启动 slotTool + 如果你的主机卡在了红屏,请长按住电源键来强制关机,然后重试本步骤 1. 选择 “INSTALL exploit to wifi slots 1,2,3 & shutdown” 选项 @@ -36,22 +42,31 @@ title: "安装 boot9strap(通过 HBL-USM)" 1. 从 unSAFE_MODE `.zip` 复制 `usm.bin` 到 SD 卡的根目录 1. 将 SD 卡插回主机 +![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} + #### 第二步 – unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. 将你的主机置于关机状态,按住 L + R + ↑ + A 四个按键,然后按下电源键 - + 按住这几个按钮,直到主机进入安全模式 + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + 如果你试了很多次依然无法进入安全模式,则也许这四个按键中有一个按错了,或是坏掉了。 如果确实如此,请加入 [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) 并使用英文求助。(请注意,如果你身处中国大陆,访问 Discord 可能需要科学上网),你也可以到译者的 [QQ 群](https://stray-soul.site/index.php/qqgroup)寻求帮助,群号为 942052497。 1. 点击 “OK” 来允许更新 + 这个步骤实际上不存在更新。 这只是触发漏洞的一部分 1. 点击 “I accept(我同意/同意する)” 1. 更新最终将失败,然后报出 `003-1099` 的错误。 这是剧本中的一部分 1. 当系统问你“你想要配置互联网设置吗?(Would you like to configure Internet settings?)”时,点击 “Yes” -1. 在接下来出现的菜单中,进入到 `连接点 1(Connection 1)` -> `更改设置(Change Settings)` -> `下一页(右箭头)` -> `代理设置(Proxy Settings)` -> `详细设置(Detailed Setup)` - + 这里有一份[演示图像](https://uwuu.ca/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. 如果漏洞执行成功,你的主机将会进入到 SafeB9SInstaller #### 第三步 – 安装 boot9strap +In this section, you will install custom firmware onto your device. + 1. 出现提示时,按照上屏的提示输入按键组合来安装 boot9strap + 如果上屏白屏,则请强制关机然后重做第三步 1. 安装完成后,按下 “A” 键重启主机 @@ -65,6 +80,8 @@ title: "安装 boot9strap(通过 HBL-USM)" #### 第四步 – 还原 WiFi 配置文件 +In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. 运行“下载通信(Download Play)”程序 1. 等到你看到两个按钮 + 不要按任何按键 diff --git a/_pages/zh_CN/installing-boot9strap-(soundhax).txt b/_pages/zh_CN/installing-boot9strap-(soundhax).txt index c5bb1b8a2e..5b3f63be35 100644 --- a/_pages/zh_CN/installing-boot9strap-(soundhax).txt +++ b/_pages/zh_CN/installing-boot9strap-(soundhax).txt @@ -4,7 +4,13 @@ title: "安装 boot9strap(通过 Soundhax)" {% include toc title="目录内容" %} -### 重要事项 +
+Technical Details (optional) +

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+
+{: .notice--info} + +### Compatibility Notes Soundhax(和 universal-otherapp 一起使用时)与所有区域 1.0.0 至 11.3.0 系统版本的主机兼容。 @@ -21,6 +27,8 @@ Soundhax(和 universal-otherapp 一起使用时)与所有区域 1.0.0 至 11 #### 第一步 – 准备工作 +In this section, you will copy the files needed to trigger both Soundhax and universal-otherapp. + 1. 将主机关机 1. 将你的 SD 卡插入到电脑 1. 复制 Soundhax 的 `.m4a` 文件到你的 SD 卡根目录下 @@ -33,11 +41,16 @@ Soundhax(和 universal-otherapp 一起使用时)与所有区域 1.0.0 至 11 1. 将 SD 卡重新插入你的主机 1. 启动你的主机 - ![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} #### 第二步 – 启动 SafeB9SInstaller +In this section, you will launch Soundhax through the Nintendo 3DS Sound app, which will use universal-otherapp to launch the boot9strap (custom firmware) installer. + 1. 将 SD 卡重新插入你的主机 1. 启动你的主机 1. 启动 “任天堂 3DS 音乐(Nintendo 3DS Sound)” @@ -58,6 +71,8 @@ Soundhax(和 universal-otherapp 一起使用时)与所有区域 1.0.0 至 11 #### 第三步 – 安装 boot9strap +In this section, you will install custom firmware onto your device. + 1. 出现提示时,按照上屏的提示输入按键组合来安装 boot9strap 1. 安装完成后,按下 “A” 键重启主机 1. 你的主机将会在重启后进入至 Luma3DS 配置菜单中 diff --git a/_pages/zh_CN/installing-boot9strap-(usm).txt b/_pages/zh_CN/installing-boot9strap-(usm).txt index 5ea47c2f4d..98616d8c30 100644 --- a/_pages/zh_CN/installing-boot9strap-(usm).txt +++ b/_pages/zh_CN/installing-boot9strap-(usm).txt @@ -4,15 +4,17 @@ title: "安装 boot9strap(通过 USM)" {% include toc title="目录内容" %} -### 重要事项 +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

We can do this using an existing exploit, BannerBomb3.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

+
+{: .notice--info} -为了破解系统的 SAFE_MODE 固件,我们需要注入一个已被破解的 WiFi 配置文件到主机中。 - -我们可以利用 BannerBomb3 这个现有的漏洞进行以下操作。 - -为了做到这一点,我们使用了你的主机系统中的加密密钥(movable.sed)来构建一个 DSiWare 备份,以便于将被破解的 WiFi 配置文件注入到 WiFi 接入点列表。 - -一旦 WiFi 配置文件被注入,我们将会使用到 SAFE_MODE 来继续此教程。SAVE_MODE 是一个所有的 3DS 主机都存在的修复功能,之后它将用于激活被破解的 WiFi 配置文件。 +### Compatibility Notes 这些操作可在美、欧、日、韩版的主机上工作,你可通过系统版本号末尾的 U,E,J,K 字符来区分主机版本。 @@ -29,6 +31,8 @@ title: "安装 boot9strap(通过 USM)" #### 第一步 – 准备工作 +In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. + 1. 如果你的主机已经被你开机了,那么将其关机 1. 在你的电脑上打开 [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) 1. 点击 “选择文件” 选项,然后选择你的 movable.sed 上传 @@ -41,47 +45,51 @@ title: "安装 boot9strap(通过 USM)" 1. 从boot9strap `.zip` 文件中复制 `boot9strap.firm` 和 `boot9strap.firm.sha` 到你SD卡的 `/boot9strap/` 文件夹中 1. 从 SafeB9SInstaller `.zip` 压缩包中复制 `SafeB9SInstaller.bin` 到 SD 卡根目录下 1. 从 `unSAFE_MODE.zip` 复制 `usm.bin` 到 SD 卡的根目录 - + ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }}) - {: .notice--info} - + ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} + ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. 打开内存卡的 `Nintendo 3DS` -> `` -> `` 文件夹 - + 这个 `` 和你在 [Seedminer](seedminer) 章节中打开的一样 - + `` 是一个在 `` 文件夹内,另一个 32 位字符长的文件夹 + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. 在 `` 文件夹内创建一个名为 `Nintendo DSiWare` 的文件夹 + 如果这个位置已经存在了这个文件夹,**且**有一些名为 `<8位ID>.bin` 文件(DSiWare 备份文件)在里面,请将它们备份到电脑上,然后从 SD 卡中移除这些文件 1. 从 `unSAFE_MODE.zip` 压缩文件中解压 `F00D43D5.bin` 到 `Nintendo DSiWare` 文件夹下 - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### 第二步 – BannerBomb3 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. + 1. 将SD卡重新插入你的主机 1. 启动你的主机 1. 启动你主机上的 “系统设置(System settings)” -1. 进入到 `数据管理(Data Management)` -> `DSiWare` -1. 点击 SD 卡部分 - + 主机应该会显示一个菜单 +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + 如果做完这步之后你的主机崩溃了,[请参照此故障排查](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu)。 -1. 选择 “Inject haxx” +1. Press (A) to select "Inject haxx" + 主机将会自动关机 #### 第三步 – unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. 将你的主机置于关机状态,按住 L + R + ↑ + A 四个按键,然后按下电源键 - + 按住这几个按钮,直到主机进入安全模式 + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + 如果你试了很多次依然无法进入安全模式,则也许这四个按键中有一个按错了,或是坏掉了。 如果确实如此,则请更换 [Seedminer 的另一种方法](bannerbomb3)。 如需帮助,请加入 [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) 并使用英文求助。(请注意,如果你身处中国大陆,访问 Discord 可能需要科学上网),你也可以到译者的 [QQ 群](https://stray-soul.site/index.php/qqgroup)寻求帮助,群号为 942052497。 1. 点击 “OK” 来允许更新 + 这个步骤实际上不存在更新。 这只是触发漏洞的一部分 1. 点击 “I accept(我同意/同意する)” 1. 更新最终将失败,然后报出 `003-1099` 的错误。 这是剧本中的一部分 1. 当系统问你“你想要配置互联网设置吗?(Would you like to configure Internet settings?)”时,点击 “Yes” -1. 在接下来出现的菜单中,进入到 `连接点 1(Connection 1)` -> `更改设置(Change Settings)` -> `下一页(右箭头)` -> `代理设置(Proxy Settings)` -> `详细设置(Detailed Setup)` - + 这里有一份[演示图像](/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. 如果漏洞执行成功,你的主机将会进入到 SafeB9SInstaller #### 第四步 – 安装 boot9strap +In this section, you will install custom firmware onto your device. + 1. 出现提示时,按照上屏的提示输入按键组合来安装 boot9strap + 如果上屏白屏,则请强制关机然后重做第三步 1. 安装完成后,按下 “A” 键重启主机 @@ -95,16 +103,17 @@ title: "安装 boot9strap(通过 USM)" #### 第五步 – 还原 WiFi 配置文件 +In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. 启动你主机上的 “系统设置(System settings)” -1. 进入到 `数据管理(Data Management)` -> `DSiWare` -1. 点击 SD 卡部分 - + 主机应该会显示一个菜单 -1. 选择 “Restore slots” +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) +1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + 主机将会自动重启 1. 将主机关机 1. 将你的 SD 卡插入到电脑 1. 打开内存卡的 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 文件夹 -1. 删除 Nintendo DSiWare 文件夹中的 `F00D43D5.bin` 文件 +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. 此文件之后不再需要使用 ___ diff --git a/_pages/zh_CN/seedminer.txt b/_pages/zh_CN/seedminer.txt index 8ccb86e56c..5bad51c35a 100644 --- a/_pages/zh_CN/seedminer.txt +++ b/_pages/zh_CN/seedminer.txt @@ -4,52 +4,54 @@ title: "Seedminer" {% include toc title="内容目录" %} -### 重要事项 +
+Technical Details (optional) +

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

+

For information on how Seedminer works, see this presentation.

+

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+
+{: .notice--info} -为了在你的主机上安装 boot9strap,我们需要获得你主机上的唯一加密密钥。 为了做到这点,我们使用了一个叫 Seedminer 的工具来计算你主机的数据加密密钥(movable.sed)。 +### Section I - Prep Work -如果想要了解 Seedminer 是怎么工作的,请参见此[介绍资料](https://zoogie.github.io/web/34⅕c3)。 - -本教程需要利用一个高性能的显卡来进行一些计算。 不过有一个志愿者网站可以帮助你做需要显卡的步骤。 - -### 操作步骤 - -#### 第一步 – 准备工作 +In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. 1. 将你的 SD 卡插入到电脑 1. 打开你 SD 卡的 `Nintendo 3DS` 文件夹 -1. 复制你在 Nintendo 3DS 文件夹内看到的 32 位字符文件夹的名称 - + 不要再点进任何文件夹 - + 如果你看到了多个 32 位字符长的文件夹,请[参考这些步骤](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder)来解决 + + If you don't have a `Nintendo 3DS` folder, put your SD card into your 3DS and power it on so that the folder can be created +1. Copy the name of the 32-letter folder you see directly inside Nintendo 3DS + + This 32-letter name is system-specific and will be different for each console + + If you see multiple 32-letter folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + 如果只是多了个 `private` 文件夹,则你可以忽略它 - ![]({{ "/images/screenshots/id0-example.png" | absolute_url }}) + ![]({{ "/images/screenshots/seedminer/id0-example.png" | absolute_url }}) {: .notice--info} -1. 将这个 32 位的字符串粘贴到记事本中,等一下会用到它 - + 这个文件夹名也称作 “ID0” +1. Paste your 32 character long folder name into [a document](/images/screenshots/seedminer/text-document.png) you can reference later + + This folder is known as your "ID0". Take note of this as this guide will refer to it as such later 1. 启动你的主机 + 此时不需要插入 SD 卡 1. 开启你的好友列表(主菜单中最上方的[橙色的笑脸]({{ "/images/friend-list-icon.png" | absolute_url }})) + 如果出现错误信息并被踢回到主菜单,则你需要创建一个 Mii 形象或你的主机无法连接到任天堂服务器(由于封禁或网络问题) 1. 找到你的 Mii 个人形象,然后在上屏寻找你的“朋友代码(Friend Code)” -#### 第二步 – Seedminer +### Section II - Seedminer + +In this section, you will use the Bruteforce Movable website to retrieve your device's encryption key in the form of `movable.sed`. 1. 在你的电脑上打开 [Bruteforce Movable](https://seedminer.hacks.guide/) - + 这个网站可以自动替你获取 `movable_part1.sed` 文件(通过一台自动操控的 3DS),并破解你主机的 DSiWare 加密 (通过某志愿者的电脑运行 Seedminer 取得) + 如果网站功能无法使用,请加入 [Nintendo Homebrew Discord 服务器](https://discord.gg/MWxPgEp) 并使用英文请求帮助。(请注意,如果你身处中国大陆,访问 Discord 可能需要科学上网)你也可以到译者的 [QQ 群](https://stray-soul.site/index.php/qqgroup)寻求帮助,群号为942052497 1. 在 “Your friend code” 选项填入你主机的 “好友代码(Friend Code)”(只要数字,不要填入空格或破折号) 1. 在 “Your ID0” 栏位粘贴之前复制的 32 位长的文件夹名 - + 不要尝试手输 ID0。 确保那是你在上一节中复制并粘贴的 ID0 以防复制错了 + + Do not attempt to enter the ID0 manually, as it is easy to make a mistake. 确保那是你在上一节中复制并粘贴的 ID0 以防复制错了 1. 点击 “Go” + 如果网站直接跳到了 step 4,则代表网站先前已经完成过你的破解请求了。 你可以直接下载 `movable.sed` 然后继续下一步。 你无需再次添加机器人 -1. 使用“添加好友(Register Friend)”按钮添加网站给出的机器人的好友代码 +1. Use the ["Register Friend" button](/images/screenshots/seedminer/register-friend.png) on your device to add the bot's friend code as given by the website + 如果提示输入一个昵称,请随便输入一个 1. 等待网站更新 + 如果一直没有更新,请在刷新网页前等待几分钟。 1. 处理信息完毕后,网页将自动进行至 “`Step 2: Brutefforce`” 1. 等待其完成步骤中的其余部分 - + 这通常是很快的(1~5 分钟左右),但是在某些情况下可能会需要长达半小时 + + This is usually fast (1-5 minutes) + 在这个过程中,你之前添加的机器人好友可能不会在你的 3DS 上面展示 不过只要网站还在更新,这就不是个问题 + 如果你已经等待了半个小时,那么请加入 [Nintendo Homebrew Discord 服务器](https://discord.gg/MWxPgEp) 并使用英文求助。你也可以到译者的 [QQ 群](https://stray-soul.site/index.php/qqgroup)寻求帮助,群号为 942052497 1. 等待程序自动完成后,从站点下载 `movable.sed` 文件 @@ -57,7 +59,7 @@ title: "Seedminer" ___ -### 下一步 +### Next steps: Choose an exploit 一旦得到了你主机的加密密钥(`movable.sed`)后,你将需要选一个方法使用它来触发 3DS 系统漏洞,并利用漏洞来安装自制固件。 diff --git a/_pages/zh_TW/bannerbomb3.txt b/_pages/zh_TW/bannerbomb3.txt index ade7078f0f..7458fc748f 100644 --- a/_pages/zh_TW/bannerbomb3.txt +++ b/_pages/zh_TW/bannerbomb3.txt @@ -4,11 +4,15 @@ title: "BannerBomb3" {% include toc title="條目內容" %} -### 必讀事項 +
+Technical Details (optional) +

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

For a more technical explanation, see here.

+
+{: .notice--info} -為了導出系統的 DSiWare 軟體, 我們使用了在系統設定內的 DSiWare 數據管理視窗的一個漏洞。 - -為了做到這一點,我們將使用你裝置的系統加密金鑰 (movable.sed) 來建構一個可使用的 DSiWare 系統備份,以便將 DSi 網路設定程式導出到 SD 卡的根目錄。 +### Compatibility Notes 這些操作在美、歐、日、韓版可用,可透過系統版本號末尾的 「U、E、J、K」 字元來辨別。 @@ -20,6 +24,9 @@ title: "BannerBomb3" * 您自 [Seedminer](seedminer) 步驟中所取得的 `movable.sed` 檔案 #### 第一節 — 準備工作 + +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + 1. 於您的電腦中開啟 [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) 1. 點選「Choose File」,並選取您的 movable.sed 檔案 1. 點選『Build and Download』 @@ -27,28 +34,31 @@ title: "BannerBomb3" 1. 如果您的主機正處於開機狀態,那麼請將其關機 1. 將 SD 卡插入至電腦中 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + 此 `` 字串將與您在 [Seedminer](seedminer) 中所使用的字串一樣 - + 此 `` 字串指的是 `` 內 32 字元的資料夾名稱 + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. 解壓 `BannerBomb3.zip` 內的 `F00D43D5.bin` 到 `Nintendo DSiWare` 資料夾中 +1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### 第二節 — BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. + 1. 將 SD 卡插回主機中 1. 啟動您的主機 1. 於您主機上啟動系統設定 (System Settings) -1. 移動至 `檔案管理 (Data Management)` -> `DSiWare` -1. 點擊 SD 卡 部分 +1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + 您的主機螢幕應該會開始品紅色(粉色 / 紫色)的閃爍,隨後幾秒當機並重啟。 這代表此漏洞成功執行了。 1. 關閉您的主機 1. 將 SD 卡插入至電腦中 -1. 現在您主機的 SD 卡根目錄下應該會出現一個叫做 `42383841.bin` 的檔案。 這是 DSiWare 的備份,您將在之後用到它 -1. 於您的 SD 卡中,移動至 `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` - + 此 `` 字串將與您在 [Seedminer](seedminer) 中所使用的字串一樣 -1. 從 Nintendo DSiWare 資料夾與您的電腦上刪除 `F00D43D5.bin` 檔案。 這個檔案之後不再需要了 +1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page +1. 於您的 SD 卡中,移動至 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. 這個檔案之後不再需要了 + 繼續至[安裝 boot9strap (透過 Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} diff --git a/_pages/zh_TW/finalizing-setup.txt b/_pages/zh_TW/finalizing-setup.txt index 368f590d15..17cbb26831 100644 --- a/_pages/zh_TW/finalizing-setup.txt +++ b/_pages/zh_TW/finalizing-setup.txt @@ -20,6 +20,8 @@ title: "完成安裝" 建議不要跳過下載以上這些自製軟體,因為它們將在此頁面稍後使用。 在本頁結束時,我們將清理 SD 卡以刪除不必要的安裝檔案。 {: .notice--warning} +### Compatibility Notes + If your **New 3DS** was on version 2.1.0 before following this guide, you should [restore your NAND backup](godmode9-usage#restoring-a-nand-backup) before continuing. {: .notice--warning} @@ -39,6 +41,8 @@ If your **New 3DS** was on version 2.1.0 before following this guide, you should #### 第一節 — 準備工作 +In this section, you will copy the files necessary to follow the rest of the instructions on this page. + 1. 關閉您的主機 1. 將 SD 卡插入至電腦中 1. 在 SD 卡的根目錄底下,建立一個新資料夾 `cias` @@ -52,15 +56,20 @@ If your **New 3DS** was on version 2.1.0 before following this guide, you should 1. 將 SD 卡插回主機中 1. 啟動您的主機 - ![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) - {: .notice--info} - ![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) - {: .notice--info} +The screenshots below indicate the minimum SD card layout that is required to follow this page. 您可能在遵循其他頁面指示中會有一些多的資料夾及檔案在您的 SD 卡中。 + +![]({{ "/images/screenshots/finalizing-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/godmode9-location.png" | absolute_url }}) +{: .notice--info} + -以上截圖為遵循本頁面步驟所需的 SD 卡檔案及資料夾。 您可能在遵循其他頁面指示中會有一些多的資料夾及檔案在您的 SD 卡中。 #### 第二節 — 更新系統 +In this section, you will update your system to the latest version, which is safe to do with custom firmware. + 1. 到主機主選單中更新您的主機,到『系統設置 (System Settings)』、『其他設置 (Other Settings)』底下選擇『系統更新 (System Update)』 + 在安裝 B9S + Luma 後,進行系統更新是很安全的 + 升級程式可能會告訴你『你的主機已經是最新系统了』而不是繼續升級 如您已經升級到了最新的話,這是正常的;請繼續下面的步驟 @@ -69,6 +78,8 @@ If your **New 3DS** was on version 2.1.0 before following this guide, you should #### 第三節 — Homebrew Launcher +In this section, you will temporarily replace Download Play with Homebrew Launcher (which we need to launch FBI). Download Play will automatically go back to normal once you reboot your device. + 1. 啟動『下載通信(Download Play)』程式 (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. 等到你看到 `Nintendo 3DS` 和 `Nintendo DS` 按鈕 1. 同時按下『L』+『下』+『Select』鍵以啟動 Rosalina 選單 @@ -83,6 +94,8 @@ If your **New 3DS** was on version 2.1.0 before following this guide, you should #### 第四節 — 設定內部時間 (RTC) 及 DSP +In this section, you will sync your 3DS internal clock with the actual time and dump the sound firmware (which is necesssary for some homebrew software to use sound properly). + 1. 同時按下『L』+『下』+『Select』鍵以啟動 Rosalina 選單 1. 選擇『Miscellaneous options』 1. 選擇『Dump DSP firmware』 @@ -94,6 +107,8 @@ If your **New 3DS** was on version 2.1.0 before following this guide, you should #### 第五節 — 安裝 CIA 檔案 +In this section, you will install several useful homebrew applications to HOME Menu. + 1. 於 Homebrew 清單內啟動 FBI 管理器 1. 移動至 `SD` -> `cias` 1. 選擇『\』 @@ -102,6 +117,8 @@ If your **New 3DS** was on version 2.1.0 before following this guide, you should #### 第六節 — 安裝 Luma3DS 至 CTRNAND +In this section, you will use a script to copy some of Luma3DS's files to internal memory so that they can be accessed, even without an SD card inserted. + 1. 關閉您的主機 1. 按下並按住「Start」鍵,按住按鈕的同時,將您的主機開機。 這將會啟動 GodMode9 + 如果沒有進入 GodMode9,請確保 `GodMode9.firm` 檔案已存在於 `/luma/payloads/` 資料夾中,並確保 `payload` 沒有拼錯。 @@ -118,6 +135,8 @@ If your **New 3DS** was on version 2.1.0 before following this guide, you should #### 第七節 — 清理 SD 卡 +In this section, you will use a script to remove some unnecessary files from your SD card. + 1. 選擇『Cleanup SD Card』 1. 如提示時,按下『A』繼續 1. 按『A』 繼續 @@ -125,6 +144,8 @@ If your **New 3DS** was on version 2.1.0 before following this guide, you should #### 第八節 — 備份重要檔案 +In this section, you will make backups of flies that can be used to recover from softwaer bricks or to recover data. + 1. 選擇『Backup Options』 1. 選擇『SysNAND Backup』 1. 按 『A』 確認 @@ -159,7 +180,7 @@ ___ Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! {: .notice--info} -#### 額外訊息以及注意事項 +### Information and Notes {% capture notice-6 %} 以下是你該注意的快捷鍵: diff --git a/_pages/zh_TW/homebrew-launcher-(pichaxx).txt b/_pages/zh_TW/homebrew-launcher-(pichaxx).txt index 01210cd1b9..1fa9367c34 100644 --- a/_pages/zh_TW/homebrew-launcher-(pichaxx).txt +++ b/_pages/zh_TW/homebrew-launcher-(pichaxx).txt @@ -4,9 +4,17 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="條目內容" %} -### 必讀事項 +
+Technical Details (optional) +This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. +
+{: .notice--info} -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE to run SafeB9SInstaller. +### Compatibility Notes + +These instructions work on USA, Europe, and Japan consoles as indicated by the letters U, E, or J after the system version. + +You will need a Nintendo Network ID to download Pokémon Picross. This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. {: .notice--warning} @@ -24,15 +32,8 @@ This process will overwrite your Pokémon Picross save file, if you have one. If #### 第一節 — 準備工作 -1. 啟動您的主機 -1. 啟動 Nintendo eShop -1. 點選搜尋 (放大鏡圖示) -1. 搜尋 `picross`(日文:ポケモンピクロス) -1. 打開『寶可夢繪圖方塊 (Pokémon Picross)』的商品頁面 -1. 下载『寶可夢繪圖方塊 (Pokémon Picross)』 - + 您也可以透過主機的相機掃取[此二維碼](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=ESHOP://50010000037815&margin=0&qzone=1&size=400x400&ecc=L)在 eShop 中開啟本遊戲的連結 - + 你必須插入一張 SD 卡到主機中才能安裝『寶可夢繪圖方塊 (Pokémon Picross)』。 -1. 關閉您的主機 +In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. + 1. 將 SD 卡插入至電腦中 1. 解壓 Luma3DS `.zip` 內的 `boot.firm` 及 `boot.3dsx` 到 SD 卡的根目錄底下 + 「SD 卡的根目錄」指的是你的 SD 卡含有 Nintendo 3DS 資料夾的目錄,而非該資料夾內部 @@ -40,8 +41,16 @@ This process will overwrite your Pokémon Picross save file, if you have one. If 1. Copy the `slotTool` folder from the unSAFE_MODE `.zip` to the `3ds` folder on your SD card 1. Copy the otherapp payload for your region/version from the unSAFE_MODE `.zip`'s `otherapps_with_CfgS` folder to the root of your SD card and rename it to `otherapp.bin` +![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/slottool-folder.png" | absolute_url }}) +{: .notice--info} + + #### 第二節 — PicHaxx +In this section, you will create a hacked Pokémon Picross save file that, when used, will load the Homebrew Launcher on your device. 1. 在您的電腦中開啟 [PicHaxx 植入器](https://3ds.nhnarwhal.com/3dstools/pichaxx.php) 1. 上傳您的 `movable.sed` 檔案 1. 選擇『構建並下載 (Build and Download)』 diff --git a/_pages/zh_TW/installing-boot9strap-(fredtool).txt b/_pages/zh_TW/installing-boot9strap-(fredtool).txt index 59511e598f..9270f0d3e3 100644 --- a/_pages/zh_TW/installing-boot9strap-(fredtool).txt +++ b/_pages/zh_TW/installing-boot9strap-(fredtool).txt @@ -4,15 +4,16 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="條目內容" %} -### 必讀事項 - -Seedminer 將透過您的 `movable.sed` 檔案來解密您主機上任何 DSiWare 的程式,以便在 DS 網路設定中注入修改後的 DSiWare 程式。 這需要您有 DSiWare 的 備份檔,比如利用 BannerBomb 或 DSiWare Dumper 工具導出的。 - -此方法是透過『FIRM partitions known-plaintext』漏洞所達成的。詳情請見[此](https://www.3dbrew.org/wiki/3DS_System_Flaws)。 +
+Technical Details (optional) +

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+
+{: .notice--info} ### 必備項目 -* A DSiWare Backup (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) +* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * 您自 [Seedminer](seedminer) 步驟中所取得的 `movable.sed` 檔案 * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -20,6 +21,8 @@ Seedminer 將透過您的 `movable.sed` 檔案來解密您主機上任何 DSiWar #### 第一節 — 檢查自製韌體 +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + 1. 關閉您的主機 1. 按住「Select」鍵 1. 在開機時按住「Select」鍵 @@ -30,17 +33,7 @@ If you see a configuration menu, you already have CFW, and continuing with these #### 第二節 — 準備工作 -1. 關閉您的主機 -1. 將 SD 卡插入至電腦中 -1. 解壓 Luma3DS `.zip` 內的 `boot.firm` 及 `boot.3dsx` 到 SD 卡的根目錄底下 - + 「SD 卡的根目錄」指的是你的 SD 卡含有 Nintendo 3DS 資料夾的目錄,而非該資料夾內部 -1. 將 `boot.nds` (B9STool) 複製到 SD 卡根目錄中 -1. 解壓 Frogminer_save `.zip` 中的 `private` 資料夾到 SD 卡的根目錄底下 - - ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} - -#### 第三節 — Fredtool +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. 1. 在電腦上開啟 [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) @@ -53,19 +46,31 @@ If you see a configuration menu, you already have CFW, and continuing with these 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link +1. 將 SD 卡插入至電腦中 1. 於您的 SD 卡中,移動至 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` - + 此 `` 字串將與您在 [Seedminer](seedminer) 中所使用的字串一樣 - + 此 `` 字串指的是 `` 內 32 字元的資料夾名稱 - + 如果沒有 `Nintendo DSiWare` 資料夾,請在 `` 資料夾內建立它 + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` 1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder -1. 將 SD 卡插回主機中 + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. 解壓 Luma3DS `.zip` 內的 `boot.firm` 及 `boot.3dsx` 到 SD 卡的根目錄底下 + + 「SD 卡的根目錄」指的是你的 SD 卡含有 Nintendo 3DS 資料夾的目錄,而非該資料夾內部 +1. 將 `boot.nds` (B9STool) 複製到 SD 卡根目錄中 +1. 解壓 Frogminer_save `.zip` 中的 `private` 資料夾到 SD 卡的根目錄底下 + + ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} + +#### Section III - Overwriting DS Connection Settings + +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + 1. 啟動您的主機 1. 於您主機上啟動系統設定 (System Settings) -1. 移動至 `檔案管理 (Data Management)` -> `DSiWare` -1. 在 SD 卡欄位中選擇『Haxxxxxxxxx!』程式 +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title 1. 選擇『複製 (Copy)』並選擇『OK』 1. 回到系統設定主選單 -1. 移動至『網路設定 (Internet Settings)』中的『任天堂 DS 連線 (Nintendo DS Connections)』並選擇『OK』 +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. 如果漏洞成功執行,您的主機將自動啟動『うごくメモ帳 (Flipnote Studio)』 ##### 第四節 — Flipnote 漏洞 @@ -73,6 +78,8 @@ If you see a configuration menu, you already have CFW, and continuing with these 如果您需要圖片幫助請見[此](https://zoogie.github.io/web/flipnote_directions/)。 {: .notice--info} +In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer. + 1. 完成遊戲的初始設定直到出現遊戲主選單為止 + 在設定過程中出現提示時,選擇左方的『いらない』選項 1. 選擇觸控螢幕左方的『メモを見る』並選擇『SD カード』 @@ -85,7 +92,7 @@ If you see a configuration menu, you already have CFW, and continuing with these 1. 選擇第四項含有字母『A』的選項 1. 如果漏洞成功執行,您的主機將自動載入 b9sTool 1. 使用方向鍵移動至『Install boot9starp』 - + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to start over from Step 12 of Section III + + If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III 1. 按下『A』,然後同時按下 START 鍵和 SELECT 鍵 1. 一旦下方螢幕提示『done.』,那麼就已經完成了,退出 b9stool 並關閉主機 + 您可能得按住電源紐強制關機 @@ -94,6 +101,8 @@ If you see a configuration menu, you already have CFW, and continuing with these #### Section V - Luma3DS Verification +Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. + 1. 關閉您的主機 1. 將 SD 卡插入至電腦中 1. Verify that a `luma` folder exists and that `config.ini` is inside of it @@ -106,13 +115,15 @@ At this point, your console will boot to Luma3DS by default. #### 第六節 — 還原 DS 連線設定 -1. Copy the `42383841.bin` file from the `clean/` folder of the downloaded DSiWare archive (`output_(name).zip`) to the `Nintendo 3DS///Nintendo DSiWare/` folder on your SD card - + 複寫現有的`42383841.bin`檔案 +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. + +1. 於您的 SD 卡中,移動至 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one 1. 將 SD 卡插回主機中 1. 啟動您的主機 1. 於您主機上啟動系統設定 (System Settings) -1. 移動至 `檔案管理 (Data Management)` -> `DSiWare` -1. 在 SD 卡欄位中選擇『Nintendo DSi™』程式 +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title 1. 選擇『複製 (Copy)』並選擇『OK』 ___ diff --git a/_pages/zh_TW/installing-boot9strap-(hbl-usm).txt b/_pages/zh_TW/installing-boot9strap-(hbl-usm).txt index 93b8670dad..10bf13eae2 100644 --- a/_pages/zh_TW/installing-boot9strap-(hbl-usm).txt +++ b/_pages/zh_TW/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,16 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="條目內容" %} -### 必讀事項 +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

As we already have Homebrew access, we can use slotTool to do this.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+
+{: .notice--info} -為了破解系統的 SAFE_MODE 韌體,我們需先注入一個已被破解的 WiFi 設定檔至主機中。 - -As we already have Homebrew access, we can use slotTool to do this. - -一旦 WiFi 設定檔被注入,我們將會使用到 SAFE_MODE 來繼續此教學。 SAVE_MODE 是一個所有的 3DS 主機都存在的修復功能,我們之後將用它來啟動已修改後的 WiFi 設定檔。 +### Compatibility Notes If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--danger} @@ -24,7 +27,10 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint #### 第一節 — 準備工作 +In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. + 1. Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide + + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. Launch slotTool from the list of homebrew + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section 1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option @@ -36,22 +42,31 @@ If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nint 1. Copy `usm.bin` from the unSAFE_MODE `.zip` to the root of your SD card 1. Put your SD card back into your console +![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} + #### Section II - unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + 持續按住按鈕直到主機重啟至安全模式中 + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. 按下『OK』以允許更新 + 此步驟將不會進行任何更新, 這只是觸發漏洞的一部分。 1. 按下「I accept(我同意/同意します)」鍵以接受聲明條款 1. The update will eventually fail, with the error code `003-1099`. 這也是觸發漏洞的一部分 1. 當系統提示您『你想要配置網路設置嗎? (Would you like to configure Internet settings?)』時,點選『Yes』 -1. 在接下來出現的選單中,移動至 `連接點 1(Connection 1)` -> `更改設定(Change Settings)` -> `下一頁 (右箭頭)` -> `代理設置(Proxy Settings)` -> `詳細設置(Detailed Setup)` - + 如[本圖中所示](https://uwuu.ca/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. 如果一切成功的話,您將自動進入 SafeB9SInstaller #### 第三節 — 安裝 boot9strap +In this section, you will install custom firmware onto your device. + 1. 出現提示時,輸入上方螢幕所顯示的按鍵組合以安裝 boot9strap + If the top screen is blank, power off your device and re-do Section III 1. 過程結束後,按下『A』重啟主機 @@ -65,6 +80,8 @@ At this point, your console will boot to Luma3DS by default. #### Section IV - Restoring WiFi Configuration Profiles +In this section, you will enter the Homebrew Launcher (this time using custom firmware) so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. 啟動『下載通信 (Download Play)』程式 1. 等到你看到兩個按鍵 + Do not press either of the buttons diff --git a/_pages/zh_TW/installing-boot9strap-(soundhax).txt b/_pages/zh_TW/installing-boot9strap-(soundhax).txt index 945cbf78f5..4aee47065c 100644 --- a/_pages/zh_TW/installing-boot9strap-(soundhax).txt +++ b/_pages/zh_TW/installing-boot9strap-(soundhax).txt @@ -4,7 +4,13 @@ title: "安裝 boot9strap (透過 Soundhax)" {% include toc title="條目內容" %} -### 必讀事項 +
+Technical Details (optional) +

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+
+{: .notice--info} + +### Compatibility Notes Soundhax (與 universal-otherapp 使用時) 可與韌體版本 1.0.0 至 11.3.0 的歐、日、韓、美版主機相容。 @@ -21,6 +27,8 @@ Soundhax (與 universal-otherapp 使用時) 可與韌體版本 1.0.0 至 11.3.0 #### 第一節 — 準備工作 +In this section, you will copy the files needed to trigger both Soundhax and universal-otherapp. + 1. 關閉您的主機 1. 將 SD 卡插入至電腦中 1. 複製 Soundhax `.m4a` 至 SD 卡的根目錄底下 @@ -33,11 +41,16 @@ Soundhax (與 universal-otherapp 使用時) 可與韌體版本 1.0.0 至 11.3.0 1. 將 SD 卡插回主機中 1. 啟動您的主機 - ![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/uosoundhax-root-layout.png" | absolute_url }}) +{: .notice--info} + +![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) +{: .notice--info} #### 第二節 — 啟動 SafeB9SInstaller +In this section, you will launch Soundhax through the Nintendo 3DS Sound app, which will use universal-otherapp to launch the boot9strap (custom firmware) installer. + 1. 將 SD 卡插回主機中 1. 啟動您的主機 1. 啟動『任天堂 3DS 音樂(Nintendo 3DS Sound)』程式 @@ -58,6 +71,8 @@ Soundhax (與 universal-otherapp 使用時) 可與韌體版本 1.0.0 至 11.3.0 #### 第三節 — 安裝 boot9strap +In this section, you will install custom firmware onto your device. + 1. 出現提示時,輸入上方螢幕所顯示的按鍵組合以安裝 boot9strap 1. 過程結束後,按下『A』重啟主機 1. 您的主機將會重啟至 Luma3DS 設定選單中 diff --git a/_pages/zh_TW/installing-boot9strap-(usm).txt b/_pages/zh_TW/installing-boot9strap-(usm).txt index 58676f1d7c..b217ed5742 100644 --- a/_pages/zh_TW/installing-boot9strap-(usm).txt +++ b/_pages/zh_TW/installing-boot9strap-(usm).txt @@ -4,15 +4,17 @@ title: "安裝 boot9strap (透過 USM)" {% include toc title="條目內容" %} -### 必讀事項 +
+Technical Details (optional) +

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

+

We can do this using an existing exploit, BannerBomb3.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

+

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

+

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

+
+{: .notice--info} -為了破解系統的 SAFE_MODE 韌體,我們需先注入一個已被破解的 WiFi 設定檔至主機中。 - -我們可以利用 BannerBomb3 這個現有的漏洞進行以下操作。 - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -一旦 WiFi 設定檔被注入,我們將會使用到 SAFE_MODE 來繼續此教學。 SAVE_MODE 是一個所有的 3DS 主機都存在的修復功能,我們之後將用它來啟動已修改後的 WiFi 設定檔。 +### Compatibility Notes 這些操作在美、歐、日、韓版可用,可透過系統版本號末尾的 「U、E、J、K」 字元來辨別。 @@ -29,6 +31,8 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will #### 第一節 — 準備工作 +In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. + 1. 如果您的主機正處於開機狀態,那麼請將其關機 1. 於您的電腦中開啟 [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) 1. 點選「Choose File」,並選取您的 movable.sed 檔案 @@ -41,47 +45,51 @@ If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will 1. 解壓 boot9strap `.zip` 的 `boot9strap.firm` 及 `boot9strap.firm.sha` 檔案至 SD 卡的 `/boot9strap/` 資料夾中 1. 將 SafeB9SInstaller `.zip` 中的 `SafeB9SInstaller.bin` 複製到 SD 卡的根目錄 1. 解壓 `unSAFE_MODE.zip` 內的 `usm.bin` 到 SD 卡的根目錄底下 - + ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }}) - {: .notice--info} - + ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} + ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + 此 `` 字串將與您在 [Seedminer](seedminer) 中所使用的字串一樣 - + 此 `` 字串指的是 `` 內 32 字元的資料夾名稱 + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card 1. 解壓 `unSAFE_MODE.zip` 內的 `F00D43D5.bin` 到 `Nintendo DSiWare` 資料夾中 - ![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }}) - {: .notice--info} +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} #### 第二節 — BannerBomb3 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. + 1. 將 SD 卡插回主機中 1. 啟動您的主機 1. 於您主機上啟動系統設定 (System Settings) -1. 移動至 `檔案管理 (Data Management)` -> `DSiWare` -1. 點擊 SD 卡 部分 - + 主機應該會顯示一個選單 +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. 選擇『Inject haxx』 +1. Press (A) to select "Inject haxx" + 主機將會自動關機 #### 第三節 — unSAFE_MODE +In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. + 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + 持續按住按鈕直到主機重啟至安全模式中 + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. 按下『OK』以允許更新 + 此步驟將不會進行任何更新, 這只是觸發漏洞的一部分。 1. 按下「I accept(我同意/同意します)」鍵以接受聲明條款 1. The update will eventually fail, with the error code `003-1099`. 這也是觸發漏洞的一部分 1. 當系統提示您『你想要配置網路設置嗎? (Would you like to configure Internet settings?)』時,點選『Yes』 -1. 在接下來出現的選單中,移動至 `連接點 1(Connection 1)` -> `更改設定(Change Settings)` -> `下一頁 (右箭頭)` -> `代理設置(Proxy Settings)` -> `詳細設置(Detailed Setup)` - + This is a [visual representation](/images/safemode_highlighted.png) +1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. 如果一切成功的話,您將自動進入 SafeB9SInstaller #### Section IV - Installing boot9strap +In this section, you will install custom firmware onto your device. + 1. 出現提示時,輸入上方螢幕所顯示的按鍵組合以安裝 boot9strap + If the top screen is blank, power off your device and re-do Section III 1. 過程結束後,按下『A』重啟主機 @@ -95,16 +103,17 @@ At this point, your console will boot to Luma3DS by default. #### Section V - Restoring WiFi Configuration Profiles +In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. + 1. 於您主機上啟動系統設定 (System Settings) -1. 移動至 `檔案管理 (Data Management)` -> `DSiWare` -1. 點擊 SD 卡 部分 - + 主機應該會顯示一個選單 -1. 選擇『Restore slots』 +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) +1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + Your device will automatically reboot 1. 關閉您的主機 1. 將 SD 卡插入至電腦中 1. 於您的 SD 卡中,移動至 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` -1. 刪除 Nintendo DSiWare 資料夾下的 `F00D43D5.bin` 檔案 +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. 這個檔案之後不再需要了 ___ diff --git a/_pages/zh_TW/seedminer.txt b/_pages/zh_TW/seedminer.txt index bdf1af3b56..ca3eb9301a 100644 --- a/_pages/zh_TW/seedminer.txt +++ b/_pages/zh_TW/seedminer.txt @@ -4,52 +4,54 @@ title: "Seedminer" {% include toc title="條目內容" %} -### 必讀事項 +
+Technical Details (optional) +

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

+

For information on how Seedminer works, see this presentation.

+

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+
+{: .notice--info} -為安裝 boot9strap,我們將需要使用您主機特有的加密金鑰。 為達成這點,我們將透過一項稱為 Seedminer 的工具來計算您裝置中所持有的加密金鑰 (movable.sed)。 +### Section I - Prep Work -如果想知道 Seedminer 怎麼運作的,請見該[投影片](https://zoogie.github.io/web/34⅕c3)。 - -本方法需要使用高性能的顯卡來進行些許的計算。 不過有個網站可以幫你做這些需要顯卡的工作。 - -### 操作說明 - -#### 第一節 — 準備工作 +In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. 1. 將 SD 卡插入至電腦中 1. 移動至 SD 卡的 `Nintendo 3DS` 資料夾中 -1. 複製您在Nintendo 3DS 資料夾看到的32個字元長的資料夾名稱 - + 請不要再點擊任何一個資料夾 - + If you see multiple 32 character long folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + + If you don't have a `Nintendo 3DS` folder, put your SD card into your 3DS and power it on so that the folder can be created +1. Copy the name of the 32-letter folder you see directly inside Nintendo 3DS + + This 32-letter name is system-specific and will be different for each console + + If you see multiple 32-letter folders, follow [these instructions](troubleshooting#multiple-long-folder-names-in-nintendo-3ds-folder) + You can ignore the `private` folder if you have it - ![]({{ "/images/screenshots/id0-example.png" | absolute_url }}) + ![]({{ "/images/screenshots/seedminer/id0-example.png" | absolute_url }}) {: .notice--info} -1. 將該 32 字元字串複製至記事本中;等一下會用到它 - + 這個資料夾名稱也就是我們所謂的『ID0』 +1. Paste your 32 character long folder name into [a document](/images/screenshots/seedminer/text-document.png) you can reference later + + This folder is known as your "ID0". Take note of this as this guide will refer to it as such later 1. 啟動您的主機 + 暫時還不需要插入您的 SD 卡 1. 開啟您的好友清單 (HOME 主選單中最上方的[橘色笑臉圖示]({{ "/images/friend-list-icon.png" | absolute_url }})) + 如果您遇到錯誤訊息且從清單中被踢回主選單,那麼您必須先創立一個 Mii,或者您的主機無法連線至任天堂伺服器 (您的主機可能已被封殺或有網路連線之問題) 1. 選擇您的 Mii 個人檔案,並找尋您的好友代碼 -#### 第二節 — Seedminer +### Section II - Seedminer + +In this section, you will use the Bruteforce Movable website to retrieve your device's encryption key in the form of `movable.sed`. 1. Open [Bruteforce Movable](https://seedminer.hacks.guide/) on your computer - + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) + If the site isn't working, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field - + Do not attempt to enter the ID0 by hand. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section + + Do not attempt to enter the ID0 manually, as it is easy to make a mistake. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section 1. Select "Go" + If the site immediately goes to step 4, the website has already correctly processed your bruteforce request. You can download your `movable.sed` file and continue to the next section. You do not need to re-add the bot -1. Use the "Register Friend" button on your device to add the bot's friend code as given by the website +1. Use the ["Register Friend" button](/images/screenshots/seedminer/register-friend.png) on your device to add the bot's friend code as given by the website + If prompted, the name that you give to the friend does not matter 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once 1. Once the site processes your information, the site will continue to `Step 2: Bruteforce` automatically 1. Wait for the remainder of the process to complete - + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour + + This is usually fast (1-5 minutes) + During this process, the bot you added may not show up on your 3DS. As long as the website updates, this is not an issue + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site @@ -57,7 +59,7 @@ title: "Seedminer" ___ -### 下一步 +### Next steps: Choose an exploit Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS.