treewide: switch to Frogtool-nimhax

nimhax now integrated into Frogtool, which merges all hbl-common-exploits
This commit is contained in:
lifehackerhansol 2023-07-18 08:11:18 -07:00
parent c6df8a43dd
commit 3f20c71dfc
No known key found for this signature in database
GPG key ID: 80FB184AFC0B3B0E
9 changed files with 9 additions and 65 deletions

View file

@ -23,7 +23,7 @@ These instructions work on USA, Europe, Japan, and Korea region consoles as indi
### What You Need
* Your `movable.sed` file from completing Seedminer or nimhax
* Your `movable.sed` file from completing Seedminer
#### Section I - Prep Work

View file

@ -26,7 +26,7 @@ If you have a Taiwanese console (indicated by a T after the system version), fol
### What You Need
* Your `movable.sed` file from completing Seedminer or nimhax
* Your `movable.sed` file from completing Seedminer
#### Section I - Prep Work

View file

@ -1,47 +0,0 @@
---
title: "Dumping Movable (nimhax)"
---
{% include toc title="Table of Contents" %}
{% capture technical_info %}
<summary><em>Technical Details (optional)</em></summary>
To install boot9strap on your console, we derive your console's unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console.
For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit.
{% endcapture %}
<details>{{ technical_info | markdownify }}</details>
{: .notice--info}
### What You Need
* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file)
### Instructions
#### Section I - Prep Work
1. Power off your console
1. Insert your SD card into your computer
1. Copy the `nimhax` folder from the nimhax `.zip` to the `/3ds/` folder on your SD card
1. Reinsert your SD card into your console
1. Power on your console
![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }})
{: .notice--info}
#### Section II - nimhax
1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser)
1. Launch nimhax from the list of homebrew
1. If the exploit was successful, a `movable.sed` file will appear on the root of your SD card
### Next step: Frogtool
Once you have your console's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \
While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you're unable to use a torrent client.
Continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool))
{: .notice--primary}

View file

@ -76,4 +76,4 @@ In this section, you will see whether you can access Safe Mode on your console.
___
{% include_relative include/hbl-common-exploits-movable.txt %}
{% include_relative include/hbl-common-exploits.txt %}

View file

@ -76,4 +76,4 @@ In this section, you will see whether you can access Safe Mode on your console.
___
{% include_relative include/hbl-common-exploits-movable.txt %}
{% include_relative include/hbl-common-exploits.txt %}

View file

@ -1,9 +0,0 @@
### Next step: Choose an exploit
If the camera appeared in the previous section, Safe Mode is likely to be working on your console.
If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm))
{: .notice--primary}
If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool))
{: .notice--info}

View file

@ -5,5 +5,5 @@ If the camera appeared in the previous section, Safe Mode is likely to be workin
If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm))
{: .notice--primary}
If the camera did NOT appear, continue to [Dumping Movable (nimhax)](dumping-movable-(nimhax))
If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool))
{: .notice--info}

View file

@ -18,9 +18,8 @@ To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) link for `frog
### What You Need
* Your `movable.sed` file from completing Seedminer or nimhax on the root of your SD card
* <i class="fa fa-magnet" aria-hidden="true" title="This is a magnet link. Use a torrent client to download the file."></i> [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link)
* The latest release of [Frogtool](https://github.com/zoogie/Frogtool/releases/latest)
* The latest release of [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (direct download)
* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest)
#### Section I - CFW Check
@ -33,7 +32,9 @@ To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) link for `frog
1. Insert your SD card into your computer
1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
1. Copy `boot.nds` (b9sTool) from the b9sTool release `.zip` to the root of your SD card
1. Copy `Frogtool.3dsx` to the `/3ds/` folder on your SD card
1. Create a folder named `3ds` on the root of your SD card if it does not already exist
+ This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates
1. Copy the `Frogtool` folder from the Frogtool-nimhax `.zip` to the `/3ds/` folder on your SD card
1. Copy `frogcert.bin` to the root of your SD card
1. Reinsert your SD card into your console
1. Power on your console

View file

@ -26,7 +26,6 @@ sitemap: false
+ [Contribute](contribute)
+ [CTRTransfer](ctrtransfer)
+ [Dumping eShop DSiWare](dumping-eshop-dsiware)
+ [Dumping Movable (nimhax)](dumping-movable-(nimhax))
+ [Dumping Titles and Game Cartridges](dumping-titles-and-game-cartridges)
+ [F3 (Linux)](f3-(linux))
+ [F3X (Mac)](f3x-(mac))