diff --git a/_pages/en_US/bannerbomb3-(legacy).md b/_pages/en_US/bannerbomb3-(legacy).md new file mode 100644 index 0000000000..3e918bc85c --- /dev/null +++ b/_pages/en_US/bannerbomb3-(legacy).md @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title="Table of Contents" %} + +{% capture technical_info %} +Technical Details (optional) + +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### Compatibility Notes + +These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. + +### What You Need + +* Your `movable.sed` file from completing Seedminer or nimhax + +#### Section I - Prep Work + +{% include_relative include/bb3-prep.md %} + +#### Section II - Hardware Button Check + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### Next steps: Choose an exploit + +If the camera appeared in the previous section, Safe Mode is likely to be working on your device. + +If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/en_US/bannerbomb3.txt b/_pages/en_US/bannerbomb3.txt index cf4f835512..70112f779b 100644 --- a/_pages/en_US/bannerbomb3.txt +++ b/_pages/en_US/bannerbomb3.txt @@ -30,29 +30,7 @@ If you have a Taiwanese console (indicated by a T after the system version), fol #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. - -1. Power off your device -1. Insert your SD card into your computer -1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer -1. Upload your movable.sed using the “Choose File” option -1. Click “Build and Download” - + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) -1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it - + This file does not need to be opened or extracted - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.md %} #### Section II - Hardware Button Check diff --git a/_pages/en_US/include/bb3-prep.md b/_pages/en_US/include/bb3-prep.md new file mode 100644 index 0000000000..0b0965f3de --- /dev/null +++ b/_pages/en_US/include/bb3-prep.md @@ -0,0 +1,23 @@ +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + +1. Power off your device +1. Insert your SD card into your computer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. Create a folder named `Nintendo DSiWare` inside of the `` + + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/en_US/include/fredtool-prep.md b/_pages/en_US/include/fredtool-prep.md new file mode 100644 index 0000000000..cff8aa806d --- /dev/null +++ b/_pages/en_US/include/fredtool-prep.md @@ -0,0 +1,29 @@ +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. + +1. Insert your SD card into your computer +1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer +1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. Click "Build" + + Wait a few seconds for the build process to complete +1. In the Build History section on the left, type the Username into the "Filter Builds" field +1. Click on the first search result + + This result should have the latest timestamp +1. Click the "output_(name).zip" link +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card +1. Reinsert your SD card into your device +1. Power on your device + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/en_US/include/fredtool-restore-dsconn.md b/_pages/en_US/include/fredtool-restore-dsconn.md new file mode 100644 index 0000000000..3057b3ac9d --- /dev/null +++ b/_pages/en_US/include/fredtool-restore-dsconn.md @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title +1. Select "Copy", then select "OK" diff --git a/_pages/en_US/include/fredtool-write-flipnote.md b/_pages/en_US/include/fredtool-write-flipnote.md new file mode 100644 index 0000000000..cb6f428624 --- /dev/null +++ b/_pages/en_US/include/fredtool-write-flipnote.md @@ -0,0 +1,11 @@ +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Select "Copy", then select "OK" +1. Return to main menu of the System Settings +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/en_US/installing-boot9strap-(fredtool).txt b/_pages/en_US/installing-boot9strap-(fredtool).txt index ea9d81c010..567ebda1ae 100644 --- a/_pages/en_US/installing-boot9strap-(fredtool).txt +++ b/_pages/en_US/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ### What You Need * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) #### Section I - CFW Check @@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana #### Section III - Prep Work -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Insert your SD card into your computer -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert your SD card into your device -1. Power on your device - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.md %} #### Section IV - Overwriting DS Connection Settings -In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. - -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Haxxxxxxxxx!" title - + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Select "Copy", then select "OK" -1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) -1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio - + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.md %} #### Section V - Flipnote Exploit @@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte #### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. - -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Nintendo DSi™" title -1. Select "Copy", then select "OK" +{% include_relative include/fredtool-restore-dsconn.md %} ___ + ### Continue to [Finalizing Setup](finalizing-setup) {: .notice--primary} diff --git a/_pages/en_US/installing-boot9strap-(fredtool-legacy).md b/_pages/en_US/installing-boot9strap-(fredtool-legacy).md new file mode 100644 index 0000000000..e592e063ba --- /dev/null +++ b/_pages/en_US/installing-boot9strap-(fredtool-legacy).md @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title="Table of Contents" %} + +{% capture technical_info %} +Technical Details (optional) + +To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +### What You Need + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) + +#### Section I - CFW Check + +{% include_relative include/cfw-check-fredtool.txt %} + +#### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically reboot +1. Power off your device + +#### Section III - Prep Work + +{% include_relative include/fredtool-prep.md %} + +#### Section IV - Overwriting DS Connection Settings + +{% include_relative include/fredtool-write-flipnote.md %} + +#### Section V - Flipnote Exploit + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### Section VI - Luma3DS Configuration + +1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### Section VII - Restoring DS Connection Settings + +{% include_relative include/fredtool-restore-dsconn.md %} + +___ + + +### Continue to [Finalizing Setup](finalizing-setup) +{: .notice--primary} diff --git a/_pages/en_US/seedminer-(mii).md b/_pages/en_US/seedminer-(mii).md new file mode 100644 index 0000000000..70b8604050 --- /dev/null +++ b/_pages/en_US/seedminer-(mii).md @@ -0,0 +1,82 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title="Table of Contents" %} + +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: + + Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) + + Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see https://3ds.hacks.guide/troubleshooting#seedminer if you have multiple) + + Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) + + Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{: .notice--warning} + +{% capture technical_info %} +Technical Details (optional) + +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### What you need + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### Section I - Prep Work + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/en_US/site-navigation.txt b/_pages/en_US/site-navigation.txt index a2135747ab..179a8a4b0b 100644 --- a/_pages/en_US/site-navigation.txt +++ b/_pages/en_US/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [A9LH to B9S](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) + [Credits](credits) + [Checking for CFW](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [Home](/) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) + [Installing boot9strap (Hardmod)](installing-boot9strap-(hardmod)) + [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [Region Changing](region-changing) + [Restoring / Updating CFW](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (TWN)](seedminer-(twn)) + [Troubleshooting](troubleshooting) + [Uninstall CFW](uninstall-cfw) diff --git a/assets/js/selecting.js b/assets/js/selecting.js index 8a823c3153..ca7227e776 100644 --- a/assets/js/selecting.js +++ b/assets/js/selecting.js @@ -121,6 +121,26 @@ function can_superskaterhax(major, minor, native, region, model) { return false; } +function can_miimine(major, minor, native, region, model) { + let do_redirect = false; + + if (major == 11) { + if (model == 0 && minor == 15) { + // KOR and TWN can do normal seedminer + // All other O3DS must Mii mine + if (region != "K" && region != "T") do_redirect = true; + } + else if (model == 1 && (minor == 14 || minor == 15)) { + // All other N3DS should system update + if (region == "U") do_redirect = true; + } + } + if (do_redirect) { + window.location.href = "seedminer-(mii)"; + return true; + } +} + // Seedminer, U/E/J/K region // only 11.16 can run Seedminer function can_seedminer(major, minor, native, region, model) { @@ -203,6 +223,7 @@ function redirect() { can_soundhax, can_ssloth, can_safecerthax, + can_miimine, can_seedminer, can_superskaterhax, ].some(func => func(major.value, minor.value, nver.value, region.value, model));