Merge pull request #1825 from lilyuwuu/seedminer-update

Use seedminer->pichaxx+universal-otherapp->finalizing
This commit is contained in:
MechanicalDragon 2021-02-21 17:02:20 -08:00 committed by GitHub
commit 22b9bebbfb
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
4 changed files with 80 additions and 54 deletions

View file

@ -0,0 +1,69 @@
---
title: "Installing boot9strap (PicHaxx)"
---
{% include toc title="Table of Contents" %}
Seedminer-based methods have been replaced by easier, safer methods. Please return to [Get Started](get-started) unless you have a legitimate reason to follow this page (such as broken shoulder buttons).
{: .notice--warning}
### Required Reading
This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with universal-otherapp to run SafeB9SInstaller.
### What You Need
* The game "Pokémon Picross" (free on eShop)
* Your `movable.sed` file from completing [Seedminer](seedminer)
* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/latest)
* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/latest) *(`boot9strap-1.3.zip`; not the `devkit` file, not the `ntr` file)*
* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest)
* The latest release of [universal-otherapp](https://github.com/TuxSH/universal-otherapp/releases/latest)
### Instructions
#### Section I - Prep Work
1. Power off your device
1. Insert your SD card into your computer
1. Copy `otherapp.bin` to the root of your SD card
1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
1. Create a folder named `boot9strap` on the root of your SD card
1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card
1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card
#### Section II - PicHaxx
1. Open [the PicHaxx Injector website](https://3ds.nhnarwhal.com/3dstools/pichaxx.php) on your computer
1. Select your `movable.sed` file
1. Select "Build and Download"
1. Wait for the process to complete
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `title` -> `00040000` -> `0017c100` -> `data` on your SD card
+ The `<ID0>` will be the same one that you used in [Seedminer](seedminer)
+ The `<ID1>` is a 32 character long folder inside of the `<ID0>`
1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card
+ Overwrite the old save file when prompted
1. Reinsert your SD card into your device
1. Power on your device
1. Launch "Pokemon Picross"
1. If the exploit was successful, your device will have booted into SafeB9SInstaller
#### Section III - Installing boot9strap
1. Wait for all safety checks to complete
1. When prompted, input the key combo given to install boot9strap
1. Once it has completed, press (A) to reboot your device
#### Section IV - Configuring Luma3DS
1. Your device should have rebooted into the Luma3DS configuration menu
+ If you get a black screen, [follow this troubleshooting guide](troubleshooting#black-screen-on-sysnand-boot-after-installing-boot9strap)
1. Use the (A) button and the D-Pad to turn on the following:
+ **"Show NAND or user string in System Settings"**
1. Press (Start) to save and reboot
+ If you get an error, just continue the next page
___
### Continue to [Finalizing Setup](finalizing-setup)
{: .notice--primary}

View file

@ -1,44 +0,0 @@
---
title: "Legacy Methods"
---
{% include toc title="Table of Contents" %}
### Required Reading
There have been multiple improvements and advancements to methods for installing CFW over the last short while.
For this reason, it is recommended that you follow [Installing boot9strap (USM)](installing-boot9strap-(usm)) whenever possible.
However, "legacy" or outdated methods are kept here for various purposes. They will require that you have done [Seedminer](seedminer) first.
If you need help, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for assistance.
#### Section I - Compatibility Test
The following exploits make use of one of two DS-mode applications built into the 3DS: DS Internet Settings and DS Download Play.
If both DS Internet Settings and DS Download Play fail to work, you will have to repair them with [TWLFix-3DS](https://github.com/MechanicalDragon0687/TWLFix-3DS/releases/) using a homebrew entrypoint, such as PicHaxx.
#### DS Internet Settings Test (used for Fredtool)
1. Go to System Settings, then "Internet Settings", then "Nintendo DS Connections"
1. Press "OK"
1. If your device loads into a "Nintendo Wi-Fi Connection Setup" menu, the test was successful
+ If the screen stays black or appears to freeze, the test has failed
1. Exit this menu
#### DS Download Play Test (used for Frogtool)
1. Launch the Download Play application (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"})
1. Select "Nintendo DS"
1. If your device loads into a “Download software via DS Download Play” menu, the test was successful
+ If the screen stays black or appears to freeze, the test has failed
1. Exit this menu
___
1. [BannerBomb3](bannerbomb3): Seedminer + BannerBomb3 + Fredtool
+ This method is recommended if your shoulder buttons do not work
1. [PicHaxx](homebrew-launcher-(pichaxx)): Seedminer + PicHaxx + Frogtool
+ This method is recommended if your DSiWare Management menu crashes

View file

@ -9,7 +9,7 @@ Seedminer-based methods have been replaced by easier, safer methods. Please retu
### Required Reading ### Required Reading
To install boot9strap on your device, we exploit an oversight in the security restrictions applied to "DSiWare" applications. To install boot9strap on your device, we derive your device's unique encryption key.
To accomplish this, we use a tool called Seedminer to calculate the DSiWare encryption key (`movable.sed`) for your device. We then use this DSiWare encryption key to decrypt a compatible DSiWare application and inject an exploit into it to run our own code (the exact exploit used will depend on your device's region). To accomplish this, we use a tool called Seedminer to calculate the DSiWare encryption key (`movable.sed`) for your device. We then use this DSiWare encryption key to decrypt a compatible DSiWare application and inject an exploit into it to run our own code (the exact exploit used will depend on your device's region).
@ -64,19 +64,20 @@ This method uses a powerful graphics card to perform the calculations needed. A
___ ___
#### Seedminer + unSAFE_MODE #### PicHaxx + universal-otherapp (Recommended)
This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the SAFE_MODE firmware present on all 3DS units. This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used in conjunction with universal-otherapp to install custom firmware.
This method is compatible with all regions except CHN and TWN, and requires working shoulder buttons. This route requires the Pokémon Picross application (free on eShop), and thus requires eShop access and a 3DS with a region of USA, EUR, or JPN.
Continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) Continue to [Installing boot9strap (PicHaxx)](installing-boot9strap-(pichaxx))
{: .notice--primary} {: .notice--primary}
___ #### BannerBomb3 + Fredtool
#### Legacy Methods This method of using Seedminer for further exploitation uses your `movable.sed` file to create a custom DSiWare backup that exploits the system to dump system DSiWare.
These methods are outdated and not recommended unless otherwise indicated. This route is only recommended if you are for some reason unable to follow the PicHaxx + universal-otherapp route.
[Legacy Methods](legacy-methods) Continue to [BannerBomb3](bannerbomb3)
{: .notice--warning}

View file

@ -52,12 +52,12 @@ sitemap: false
+ [Installing boot9strap (Hardmod)](installing-boot9strap-(hardmod)) + [Installing boot9strap (Hardmod)](installing-boot9strap-(hardmod))
+ [Installing boot9strap (MSET)](installing-boot9strap-(mset)) + [Installing boot9strap (MSET)](installing-boot9strap-(mset))
+ [Installing boot9strap (ntrboot)](installing-boot9strap-(ntrboot)) + [Installing boot9strap (ntrboot)](installing-boot9strap-(ntrboot))
+ [Installing boot9strap (PicHaxx)](installing-boot9strap-(pichaxx))
+ [Installing boot9strap (SafeB9SInstaller)](installing-boot9strap-(safeb9sinstaller)) + [Installing boot9strap (SafeB9SInstaller)](installing-boot9strap-(safeb9sinstaller))
+ [Installing boot9strap (safecerthax)](installing-boot9strap-(safecerthax)) + [Installing boot9strap (safecerthax)](installing-boot9strap-(safecerthax))
+ [Installing boot9strap (Soundhax)](installing-boot9strap-(soundhax)) + [Installing boot9strap (Soundhax)](installing-boot9strap-(soundhax))
+ [Installing boot9strap (SSLoth-Browser)](installing-boot9strap-(ssloth-browser)) + [Installing boot9strap (SSLoth-Browser)](installing-boot9strap-(ssloth-browser))
+ [Installing boot9strap (USM)](installing-boot9strap-(usm)) + [Installing boot9strap (USM)](installing-boot9strap-(usm))
+ [Legacy Methods](legacy-methods)
+ [Move EmuNAND](move-emunand) + [Move EmuNAND](move-emunand)
+ [ntrboot](ntrboot) + [ntrboot](ntrboot)
+ [Region Changing](region-changing) + [Region Changing](region-changing)