diff --git a/_pages/af_ZA/installing-boot9strap-(fredtool).txt b/_pages/af_ZA/installing-boot9strap-(fredtool).txt deleted file mode 100644 index 46eedbe264..0000000000 --- a/_pages/af_ZA/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,102 +0,0 @@ ---- -title: "Installing Boot9strap (Fredtool)" ---- - -{% include toc title="Table of Contents" %} - -### Required Reading - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, for example from BannerBomb or the DSiWare Dumper tool. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -### What You Need - -* A DSiWare Backup (such as the one on SD root from [BannerBomb3](bannerbomb3) or [DSiWare Dumper](dsidumper)) -* Your `movable.sed` file from completing [Seedminer](seedminer) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) -* The latest release of [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) - -#### Section I - Prep Work - -1. Power off your device -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Copy `boot.nds` (B9STool) to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card - -#### Section II - Fredtool - -1. Open [Fredtool](https://fredtool.bruteforcemovable.com/) on your computer -1. Select your `movable.sed` file for the "Your movable.sed" field -1. Select your DSiWare Backup (`<8-character-id>.bin`) file for the "Your dsiware.bin" field -1. Complete the "I'm not a robot" captcha -1. Select "Start" -1. Wait for the process to complete -1. When the process has completed, download your modified DSiWare archive from the site - + This file contains 2 dsiware backup files, one clean (unmodified) and one hax (exploited) -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + This `` will be the same one that you used in [Seedminer](seedminer) - + This `` folder will be another 32 letter/number folder inside the `` folder - + If the `Nintendo DSiWare` folder does not exist, create it inside the `` folder -1. Copy the `42383841.bin` file from the `output/hax/` folder of the downloaded DSiWare archive (`fredtool_output.zip`) to the `Nintendo DSiWare` folder -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Haxxxxxxxxx!" title -1. Select "Copy", then select "OK" -1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" -1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio - -#### Section III - Flipnote Exploit - -If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). -{: .notice--info} - -1. Complete the initial setup process for the launched game until you reach the main menu - + Select the left option whenever prompted during the setup process -1. Using the touch-screen, select the large left box, then select the box with an SD card icon -1. Once the menu loads, select the face icon, then the bottom right icon to continue -1. Press (X) or (UP) on the D-Pad depending on which is shown on the top screen -1. Select the second button along the top with a film-reel icon -1. Scroll right until reel "3/3" is selected -1. Tap the third box with the letter "A" in it -1. Scroll left until reel "1/3" is selected -1. Tap the fourth box with the letter "A" in it -1. If the exploit was successful, your device will have loaded b9sTool -1. Using the D-Pad, move to "Install boot9strap" - + If you miss this step, the system will exit to home menu instead of installing boot9strap and you will need to open Nintendo DS Connections and start over from the beginning of Section III -1. Press (A), then press START and SELECT at the same time to begin the process -1. Once completed and the bottom screen says "done.", exit b9sTool, then power off your device - + You may have to force power off by holding the power button - + If you see the Luma Configuration screen, continue with the guide without powering off - -#### Section IV - Configuring Luma3DS - -1. Boot your device while holding (Select) to launch the Luma configuration menu - + If you encounter issues launching the Luma configuration menu, [follow this troubleshooting guide](https://github.com/zoogie/b9sTool/blob/master/TROUBLESHOOTING.md) -1. Use the (A) button and the D-Pad to turn on the following: - + **"Show NAND or user string in System Settings"** -1. Press (Start) to save and reboot - + Your device should load the Home Menu after a short delay. If you get a black screen lasting longer than 5 minutes, [follow this troubleshooting guide](troubleshooting#black-screen-on-sysnand-boot-after-installing-boot9strap) - -#### Section V - Restoring DS Connection Settings - -1. Power off your device -1. Insert your SD card into your computer -1. Copy the `42383841.bin` file from the `output/clean/` folder of the downloaded DSiWare archive (`fredtool_output.zip`) to the `Nintendo 3DS//<32-character-id>/Nintendo DSiWare/` folder on your SD card - + Replace the existing `42383841.bin` file -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Nintendo DSi™" title -1. Select "Copy", then select "OK" - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/af_ZA/installing-boot9strap-(usm).txt b/_pages/af_ZA/installing-boot9strap-(usm).txt deleted file mode 100644 index 079b370df0..0000000000 --- a/_pages/af_ZA/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,92 +0,0 @@ ---- -title: "Installing boot9strap (USM)" ---- - -{% include toc title="Table of Contents" %} - -### Required Reading - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile to your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. - -If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, you will need to use a [Legacy Method](legacy-methods). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--danger} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer](seedminer) -* The latest release archive for [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) - -#### Section I - Prep Work - -1. Open [unSAFE_MODE-bb3 tool](https://usm.bruteforcemovable.com/) on your computer - + If this site is nonfunctional, try using [this one](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) -1. Upload your movable.sed using the "Choose File" option -1. Click "Download unSAFE_MODE-bb3 archive" - + This will download an exploit DSiWare called `F00D43D5.bin` and a SAFE_MODE exploit data file called `usm.bin` inside of a zip folder (`unSAFE_MODE-bb3.zip`) -1. If your console is powered on, power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Copy `usm.bin` from the USM archive (`unSAFE_MODE-bb3.zip`) to the root of your SD card -1. Navigate to `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card - + This `` will be the same one that you used in [Seedminer](seedminer) - + If `Nintendo DSiWare` does not exist, create it -1. If there are any existing DSiWare backup files (`<8-character-id>.bin`) in this folder, move them to your PC - + This will leave you with an empty Nintendo DSiWare folder. Moving the files to your PC ensures you don't delete any intentional backups -1. Copy the `F00D43D5.bin` file from the USM archive (`unSAFE_MODE-bb3.zip`) to the `Nintendo DSiWare` folder - -#### Section II - BannerBomb3 - -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your bottom screen should flash Red and then the system will reboot to home menu a few seconds later. This means the exploit profile was successfully copied - + If the bottom screen does not flash Red, the exploit profile was not copied and you will not be able to complete the next section. Ensure that your files are properly placed, then try again -1. Power off your device - -#### Section III - unSAFE_MODE - -1. With your system still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), then press (Power) - + Release the buttons after a few seconds. Your console will boot into Safe Mode -1. Press "OK" to accept the update - + There is no update. This is part of the exploit -1. Press "I accept" to accept the terms and conditions -1. The update will eventually fail, with error code `003-1099`. This is intended behaviour -1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` -1. Once you see `B9S install SUCCESS` on the top screen, press any button to reboot to Luma Configuration - -#### Section IV - Configuring Luma3DS - -1. Your device should automatically show the Luma Configuration menu -1. Use the (A) button and the D-Pad to turn on the following: - + **"Show NAND or user string in System Settings"** -1. Press (Start) to save and reboot - + Your device should load the Home Menu after a short delay. If you get a black screen lasting longer than 5 minutes, [follow this troubleshooting guide](troubleshooting#black-screen-on-sysnand-boot-after-installing-boot9strap) - -#### Section V - Restoring WiFi Configuration Profiles - -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your bottom screen should flash Green and then the system will reboot to home menu a few seconds later. This means your WiFi configuration profiles were successfully restored -1. Power your system off -1. Insert your SD card into your computer -1. Navigate to `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card - + This `` will be the same one that you used in [Seedminer](seedminer) -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Continue to Finalizing Setup - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/ar_SA/dumping-movable-(nimhax).txt b/_pages/ar_SA/dumping-movable-(nimhax).txt deleted file mode 100644 index 69f3d011d3..0000000000 --- a/_pages/ar_SA/dumping-movable-(nimhax).txt +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: "Dumping Movable (nimhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -To install boot9strap on your console, we derive your console's unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console. - -For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need - -* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy the `nimhax` folder from the nimhax `.zip` to the `/3ds/` folder on your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) -{: .notice--info} - -#### Section II - nimhax - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch nimhax from the list of homebrew -1. If the exploit was successful, a `movable.sed` file will appear on the root of your SD card - -### Next step: Frogtool - -Once you have your console's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \ -While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you're unable to use a torrent client. - -Continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--primary} diff --git a/_pages/ar_SA/homebrew-launcher-(freakyhax).txt b/_pages/ar_SA/homebrew-launcher-(freakyhax).txt deleted file mode 100644 index 028cee82a4..0000000000 --- a/_pages/ar_SA/homebrew-launcher-(freakyhax).txt +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: "Homebrew Launcher (freakyhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[freakyhax](https://plutooo.github.io/freakyhax/) is an exploit for the game Freakyforms Deluxe discovered and released by [plutooo](https://github.com/plutooo). It works on versions 9.0.0 through 11.17.0 on EUR, USA and JPN region consoles. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -### What You Need - -+ A EUR/USA/JPN copy of Freakyforms Deluxe (eShop or cartridge) -+ The latest release of [freakyhax](https://github.com/plutooo/freakyhax/releases/latest) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy all files and folders inside the `/build//exploit/` folder from the freakyhax `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - freakyhax - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch Freakyforms Deluxe -1. In the game menu, select `Play -> Camera -> Load a QR code` -1. Select the QR code -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/ar_SA/homebrew-launcher-(ninjhax2-dx).txt b/_pages/ar_SA/homebrew-launcher-(ninjhax2-dx).txt deleted file mode 100644 index 2d8032745c..0000000000 --- a/_pages/ar_SA/homebrew-launcher-(ninjhax2-dx).txt +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "Homebrew Launcher (ninjhax2-dx)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[Ninjhax2](https://github.com/smealum/ninjhax2.x) is an exploit for the game "Cubic Ninja" made by [smealum](https://github.com/smealum). This page uses an updated version of ninjhax by [zoogie](https://github.com/zoogie) called [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx), which supports 11.17.0. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -This process will overwrite your Cubic Ninja save file, if you have one. -{: .notice--warning} - -### What You Need -* The game "Cubic Ninja" -* The latest release of [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx/releases) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `Launcher.dat` from the folder appropriate for your console from the ninjhax2-dx `.zip` file to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - -#### Section II - ninjhax2-dx -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Cubic Ninja" once and select "Create" - + If prompted, delete all data -1. Select "QR Code" -1. Select "Scan QR Code" -1. On your PC, open the browser and go to [ninjhax2-dx website](https://zoogie.github.io/web/nh2dx/) -1. Select your console's region and hardware -1. On your console, scan the QR code - + If the game exits to the HOME Menu, then the exploit has installed correctly -1. Launch "Cubic Ninja" again -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/ar_SA/homebrew-launcher-(pichaxx).txt b/_pages/ar_SA/homebrew-launcher-(pichaxx).txt deleted file mode 100644 index a58df498f5..0000000000 --- a/_pages/ar_SA/homebrew-launcher-(pichaxx).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (PicHaxx)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[PicHaxx](https://github.com/zoogie/pichaxx) is an exploit for the game Pokémon Picross released by [zoogie](https://github.com/zoogie), originally discovered and [demonstrated](https://twitter.com/mrnbayoh/status/744899681663258624) by [MrNbaYoh](https://github.com/MrNbaYoh). - -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Pokémon Picross" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Pokémon Picross -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Prep Work - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card - -![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - PicHaxx - -In this section, you will create a hacked Pokémon Picross save file that, when loaded, will run the Homebrew Launcher on your console. - -1. Open [the PicHaxx Injector website](https://3dstools.nhnarwhal.com/#/pichaxx) on your computer -1. Select your `movable.sed` file -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `0017c100` -> `data` on your SD card - + The `` will be the same one that you used in Seedminer - + The `` is a 32 character long folder inside of the `` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted - - ![]({{ "/images/screenshots/pichaxx-save-location.png" | absolute_url }}) - {: .notice--info} - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Pokémon Picross" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher - + If you get an error message, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-pichaxx) -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/ar_SA/homebrew-launcher-(smilehax-iie).txt b/_pages/ar_SA/homebrew-launcher-(smilehax-iie).txt deleted file mode 100644 index 08cd5865c0..0000000000 --- a/_pages/ar_SA/homebrew-launcher-(smilehax-iie).txt +++ /dev/null @@ -1,70 +0,0 @@ ---- -title: "Homebrew Launcher (smilehax-IIe)" ---- - -{% include toc title="Table of Contents" %} - -This set of instructions does not support the Japanese version of SmileBASIC. -{: .notice--warning} - -{% capture technical_info %} -Technical Details (optional) -[smilehax-IIe](https://github.com/zoogie/smilehax-IIe) is an exploit for the game "SmileBASIC" made by zoogie, compatible with system versions 9.0.0 through 11.17.0 for USA/EUR/JPN region consoles. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need -+ The game "SmileBASIC" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install SmileBASIC -+ The latest release of [smilehax-IIe](https://github.com/zoogie/smilehax-IIe/releases/download/v1.1/Release_sh2e_v1.1.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Transfer the `.wav` for your region from the Release_sh2e `.zip` to a device that can play `.wav` files, for example a phone -1. Copy the petitcom `.icn` for your region to the root of your SD card - -#### Section II - smilehax - -1. Launch SmileBASIC - + Update the game if prompted -1. Select the "Publish/Download Projects" option -1. Select the "Download (Receive) using Public Key" option -1. Press the "Yes" button -1. Enter the Public Key "NJEQK3A4" using the on-screen keyboard -1. Press the "Yes" button to confirm the download of PMODEM141 -1. Press "OK", then "Back", then "Browse Projects" -1. Select PMODEM141, then press "Select File" -1. Select PMODEM141.PRG, then press "OK", then "Yes" to execute it -1. Select RECEIVE FILE SIMPLEX -1. Prepare the device you use to play the `.wav` file -1. Keep your console about a foot from the `.wav` file playing devices' speaker and use a reasonable (not loud) volume to play the `.wav` -1. Now select 300BPS, then play the `.wav` file -1. When it finishes, press "Yes", then press "OK" -1. Press the START button -1. Select the SH2E-xxx.TXT file, then press OK, then "Yes" to execute it - + If you get kicked back into menu, make sure you're using the latest version of SmileBASIC -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/ar_SA/homebrew-launcher-(steelhax).txt b/_pages/ar_SA/homebrew-launcher-(steelhax).txt deleted file mode 100644 index 9b8dace5a3..0000000000 --- a/_pages/ar_SA/homebrew-launcher-(steelhax).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (Steelhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Steel Diver: Sub Wars, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Steel Diver: Sub Wars save file, if you have one. If you wish to preserve your Steel Diver: Sub Wars game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Steel Diver: Sub Wars" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Steel Diver: Sub Wars -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Steelhax](/assets/steelhax-release.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Prep Work - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the `steelhax` folder from the `Steelhax-release.zip` to the root of your SD card -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - Steelminer - -In this section, you will create a hacked Steel Diver: Sub Wars save file that, when used, will load the Homebrew Launcher on your console. - -1. Launch "Steel Diver: Sub Wars" once and select a Mii to initialize your save file - + Decline the game update when prompted - + If you have already updated the game, use the Data Management menu of the System Settings to delete the update -1. Exit "Steel Diver: Sub Wars" -1. Power off your console -1. Insert your SD card into your computer -1. Open [the SteelHax Save Tool website](https://3dstools.nhnarwhal.com/#/steelhax) on your computer -1. Select your `movable.sed` file -1. Select your region based on your console -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `<8-character-region>` -> `data` on your SD card - + **EUR Region**: `000d7e00` - + **JPN Region**: `000d7c00` - + **USA Region**: `000d7d00` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Steel Diver: Sub Wars" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/ar_SA/homebrew-launcher-(super-skaterhax).txt b/_pages/ar_SA/homebrew-launcher-(super-skaterhax).txt deleted file mode 100644 index 5895c4f64b..0000000000 --- a/_pages/ar_SA/homebrew-launcher-(super-skaterhax).txt +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: "Homebrew Launcher (super-skaterhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see [here](https://github.com/zoogie/super-skaterhax). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -Super-skaterhax (when used to launch the Homebrew Launcher) is compatible with New models on version 11.16.0 in all regions, and 11.17.0 in the EUR, JPN and USA regions. - -The instructions provided only apply to the New 3DS, New 3DS XL, and New 2DS XL. Please ensure that the console you are modding is a New 3DS, New 3DS XL, or New 2DS XL before continuing. -{: .notice--warning} - -### What You Need - -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* The latest release of [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (the release `.zip` file) - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger both super-skaterhax and the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy everything inside the folder for your console's region (and also system version if the region is USA) in the super-skaterhax `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/skater-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - super-skaterhax - -In this section, you will visit the browser exploit webpage, which will launch the Homebrew Launcher. - -If you haven't already, make sure you have a working Internet connection set up on your console. -{: .notice--info} - -1. On the HOME Menu, press the Left and Right shoulder buttons at the same time to open the camera - + If you are unable to open the camera, open the Internet Browser and manually type the URL instead (`https://zoogie.github.io/web/super/` for EUR/USA/JPN, `https://zoogie.github.io/web/korea` for KOR) -1. Tap the QR code button and scan one of the following QR codes for your console's region [here](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png) - + If you get a security certificate warning, press (A) to allow the connection -1. Press the (Select) button to open the bookmark tab - + If your (Select) button does not respond, tap the star icon on the bottom-left corner of the screen -1. Tap "Bookmark this page" -1. Press (B) once to return to the browser -1. Press (Start) to open the context menu - + If your (Start) button does not respond, tap the 3-line menu on the bottom-right corner of the screen -1. Tap on "Settings" -1. Tap on "Delete Cookies" -1. Press (A) to continue -1. Press (Home) to return to the HOME Menu, then immediately press (A) to launch the browser again -1. Select the "GO GO!" button on the top screen - + If any prompts appear, approve all of them - + If your console freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your console freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section - + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/ar_SA/include/fredtool-prep.txt b/_pages/ar_SA/include/fredtool-prep.txt deleted file mode 100644 index bd910b24de..0000000000 --- a/_pages/ar_SA/include/fredtool-prep.txt +++ /dev/null @@ -1,29 +0,0 @@ -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Insert your SD card into your computer -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} \ No newline at end of file diff --git a/_pages/ar_SA/include/hbl-common-exploits-movable.txt b/_pages/ar_SA/include/hbl-common-exploits-movable.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/ar_SA/include/hbl-common-exploits-movable.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/ar_SA/include/hbl-common-exploits.txt b/_pages/ar_SA/include/hbl-common-exploits.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/ar_SA/include/hbl-common-exploits.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/ar_SA/installing-boot9strap-(fredtool).txt b/_pages/ar_SA/installing-boot9strap-(fredtool).txt deleted file mode 100644 index a06a1259f2..0000000000 --- a/_pages/ar_SA/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer](seedminer) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/ar_SA/installing-boot9strap-(fredtool-legacy).txt b/_pages/ar_SA/installing-boot9strap-(fredtool-legacy).txt deleted file mode 100644 index 7e88fb51b4..0000000000 --- a/_pages/ar_SA/installing-boot9strap-(fredtool-legacy).txt +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool, Legacy)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. - -Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/ar_SA/installing-boot9strap-(frogtool).txt b/_pages/ar_SA/installing-boot9strap-(frogtool).txt deleted file mode 100644 index 063799fcc6..0000000000 --- a/_pages/ar_SA/installing-boot9strap-(frogtool).txt +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Installing boot9strap (Frogtool)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see "DSiWare_Exports CTCert verification" and "FIRM partitions known-plaintext" [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - - -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) link for `frogcert.bin` on this page, you will need a torrent client like [qBittorrent](https://www.qbittorrent.org/download.php) or [Deluge](http://dev.deluge-torrent.org/wiki/Download). -{: .notice--warning} - -### What You Need - -* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link) -* The latest release of [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (direct download) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Copy `boot.nds` (b9sTool) from the b9sTool release `.zip` to the root of your SD card -1. Create a folder named `3ds` on the root of your SD card if it does not already exist - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy the `Frogtool` folder from the Frogtool-nimhax `.zip` to the `/3ds/` folder on your SD card -1. Copy `frogcert.bin` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section III - Patching DS Download Play - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch Frogtool from the list of homebrew -1. Select the "INJECT patched DS Download Play" option -1. Frogtool will automatically run and inject the JPN version of Flipnote Studio into your DS Download Play -1. Once this operation has finished, read the screens and check if the process was successful -1. Tap the touch screen, then select "BOOT patched DS Download Play" -1. If the exploit was successful, your console will have loaded the JPN version of Flipnote Studio - + If you get stuck on a black screen, follow [this](https://wiki.hacks.guide/wiki/3DS:TWLFix#Userland_(PicHaxx,_Steelhax,_etc.)-0) page, then try again - -#### Section IV - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsdlp" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Download Play - -1. Launch the Download Play application -1. Wait until you see the two buttons - + Do not press either of the buttons -1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu -1. Select "Miscellaneous options" -1. Select "Switch the hb. title to the current app." -1. Press (B) to continue -1. Press (B) to return to the Rosalina main menu -1. Press (B) to exit the Rosalina menu -1. Press (Home), then close Download Play -1. Relaunch the Download Play application -1. Your console should load the Homebrew Launcher -1. Launch Frogtool from the list of homebrew -1. Select the "RESTORE clean DS Download Play" option -1. Once this operation has finished, read the screens and check if the process was successful - + If there are any errors or missing files, correct the problem and try again -1. If the process was successful, tap the touch screen, then press START to exit -1. Power off your console - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/ar_SA/installing-boot9strap-(hbl-usm).txt b/_pages/ar_SA/installing-boot9strap-(hbl-usm).txt deleted file mode 100644 index de8dad596a..0000000000 --- a/_pages/ar_SA/installing-boot9strap-(hbl-usm).txt +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "Installing boot9strap (HBL-USM)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--danger} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) (direct download) - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. Then, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Insert your SD card into your computer -1. Create a folder named `boot9strap` on the root of your SD card -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the RELEASE `.zip` to the `/boot9strap/` folder on your SD card -1. Create a folder named `3ds` on the root of your SD card if it does not already exist - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy `slotTool.3dsx` from the `slotTool` folder inside the RELEASE `.zip` to the `/3ds/` folder on your SD card -1. Copy `usm.bin` from the RELEASE `.zip` to the root folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch slotTool from the list of homebrew - + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section -1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option - + You will see some on-screen text and then your system will shut down - -![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section III - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section IV - Restoring WiFi Configuration Profiles - -{% include_relative include/remove-usm-slottool.txt %} - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/ar_SA/installing-boot9strap-(usm).txt b/_pages/ar_SA/installing-boot9strap-(usm).txt deleted file mode 100644 index 9dcede6ffe..0000000000 --- a/_pages/ar_SA/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: "Installing boot9strap (USM)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. - -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--warning} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* [usm.bin](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) - - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. - -1. Your SD card should be inserted in your computer -1. Copy `usm.bin` to the root of your SD card -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Create a folder named `boot9strap` on the root of your SD card -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card - -![]({{ "/images/screenshots/usm/usm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If the BB3 multihax menu doesn't open, [follow this troubleshooting guide](troubleshooting#bannerbomb3) - + If the BB3 multihax menu says "cfw installed already", you already have custom firmware and should continue from [here](checking-for-cfw) -1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" - + Your console will automatically power off -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Internet Settings` -> `Connection Settings` -1. Ensure that all three connections are named "Haaaaaaaxxxxxxxxx..." - + Do NOT change these settings! - + If all three connections are NOT all named "Haaaaaaaxxxxxxxxx...", STOP! Something went wrong in this section and MUST be fixed before you can continue -1. Power off your console - -#### Section III - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section IV - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section V - Restoring WiFi Configuration Profiles - -In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. - -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" - + Your console will automatically reboot -1. Power off your console -1. Insert your SD card into your computer -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/bg_BG/dumping-movable-(nimhax).txt b/_pages/bg_BG/dumping-movable-(nimhax).txt deleted file mode 100644 index 69f3d011d3..0000000000 --- a/_pages/bg_BG/dumping-movable-(nimhax).txt +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: "Dumping Movable (nimhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -To install boot9strap on your console, we derive your console's unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console. - -For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need - -* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy the `nimhax` folder from the nimhax `.zip` to the `/3ds/` folder on your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) -{: .notice--info} - -#### Section II - nimhax - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch nimhax from the list of homebrew -1. If the exploit was successful, a `movable.sed` file will appear on the root of your SD card - -### Next step: Frogtool - -Once you have your console's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \ -While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you're unable to use a torrent client. - -Continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--primary} diff --git a/_pages/bg_BG/homebrew-launcher-(freakyhax).txt b/_pages/bg_BG/homebrew-launcher-(freakyhax).txt deleted file mode 100644 index 028cee82a4..0000000000 --- a/_pages/bg_BG/homebrew-launcher-(freakyhax).txt +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: "Homebrew Launcher (freakyhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[freakyhax](https://plutooo.github.io/freakyhax/) is an exploit for the game Freakyforms Deluxe discovered and released by [plutooo](https://github.com/plutooo). It works on versions 9.0.0 through 11.17.0 on EUR, USA and JPN region consoles. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -### What You Need - -+ A EUR/USA/JPN copy of Freakyforms Deluxe (eShop or cartridge) -+ The latest release of [freakyhax](https://github.com/plutooo/freakyhax/releases/latest) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy all files and folders inside the `/build//exploit/` folder from the freakyhax `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - freakyhax - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch Freakyforms Deluxe -1. In the game menu, select `Play -> Camera -> Load a QR code` -1. Select the QR code -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/bg_BG/homebrew-launcher-(ninjhax2-dx).txt b/_pages/bg_BG/homebrew-launcher-(ninjhax2-dx).txt deleted file mode 100644 index 2d8032745c..0000000000 --- a/_pages/bg_BG/homebrew-launcher-(ninjhax2-dx).txt +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "Homebrew Launcher (ninjhax2-dx)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[Ninjhax2](https://github.com/smealum/ninjhax2.x) is an exploit for the game "Cubic Ninja" made by [smealum](https://github.com/smealum). This page uses an updated version of ninjhax by [zoogie](https://github.com/zoogie) called [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx), which supports 11.17.0. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -This process will overwrite your Cubic Ninja save file, if you have one. -{: .notice--warning} - -### What You Need -* The game "Cubic Ninja" -* The latest release of [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx/releases) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `Launcher.dat` from the folder appropriate for your console from the ninjhax2-dx `.zip` file to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - -#### Section II - ninjhax2-dx -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Cubic Ninja" once and select "Create" - + If prompted, delete all data -1. Select "QR Code" -1. Select "Scan QR Code" -1. On your PC, open the browser and go to [ninjhax2-dx website](https://zoogie.github.io/web/nh2dx/) -1. Select your console's region and hardware -1. On your console, scan the QR code - + If the game exits to the HOME Menu, then the exploit has installed correctly -1. Launch "Cubic Ninja" again -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/bg_BG/homebrew-launcher-(pichaxx).txt b/_pages/bg_BG/homebrew-launcher-(pichaxx).txt deleted file mode 100644 index a58df498f5..0000000000 --- a/_pages/bg_BG/homebrew-launcher-(pichaxx).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (PicHaxx)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[PicHaxx](https://github.com/zoogie/pichaxx) is an exploit for the game Pokémon Picross released by [zoogie](https://github.com/zoogie), originally discovered and [demonstrated](https://twitter.com/mrnbayoh/status/744899681663258624) by [MrNbaYoh](https://github.com/MrNbaYoh). - -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Pokémon Picross" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Pokémon Picross -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Prep Work - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card - -![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - PicHaxx - -In this section, you will create a hacked Pokémon Picross save file that, when loaded, will run the Homebrew Launcher on your console. - -1. Open [the PicHaxx Injector website](https://3dstools.nhnarwhal.com/#/pichaxx) on your computer -1. Select your `movable.sed` file -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `0017c100` -> `data` on your SD card - + The `` will be the same one that you used in Seedminer - + The `` is a 32 character long folder inside of the `` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted - - ![]({{ "/images/screenshots/pichaxx-save-location.png" | absolute_url }}) - {: .notice--info} - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Pokémon Picross" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher - + If you get an error message, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-pichaxx) -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/bg_BG/homebrew-launcher-(smilehax-iie).txt b/_pages/bg_BG/homebrew-launcher-(smilehax-iie).txt deleted file mode 100644 index 08cd5865c0..0000000000 --- a/_pages/bg_BG/homebrew-launcher-(smilehax-iie).txt +++ /dev/null @@ -1,70 +0,0 @@ ---- -title: "Homebrew Launcher (smilehax-IIe)" ---- - -{% include toc title="Table of Contents" %} - -This set of instructions does not support the Japanese version of SmileBASIC. -{: .notice--warning} - -{% capture technical_info %} -Technical Details (optional) -[smilehax-IIe](https://github.com/zoogie/smilehax-IIe) is an exploit for the game "SmileBASIC" made by zoogie, compatible with system versions 9.0.0 through 11.17.0 for USA/EUR/JPN region consoles. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need -+ The game "SmileBASIC" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install SmileBASIC -+ The latest release of [smilehax-IIe](https://github.com/zoogie/smilehax-IIe/releases/download/v1.1/Release_sh2e_v1.1.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Transfer the `.wav` for your region from the Release_sh2e `.zip` to a device that can play `.wav` files, for example a phone -1. Copy the petitcom `.icn` for your region to the root of your SD card - -#### Section II - smilehax - -1. Launch SmileBASIC - + Update the game if prompted -1. Select the "Publish/Download Projects" option -1. Select the "Download (Receive) using Public Key" option -1. Press the "Yes" button -1. Enter the Public Key "NJEQK3A4" using the on-screen keyboard -1. Press the "Yes" button to confirm the download of PMODEM141 -1. Press "OK", then "Back", then "Browse Projects" -1. Select PMODEM141, then press "Select File" -1. Select PMODEM141.PRG, then press "OK", then "Yes" to execute it -1. Select RECEIVE FILE SIMPLEX -1. Prepare the device you use to play the `.wav` file -1. Keep your console about a foot from the `.wav` file playing devices' speaker and use a reasonable (not loud) volume to play the `.wav` -1. Now select 300BPS, then play the `.wav` file -1. When it finishes, press "Yes", then press "OK" -1. Press the START button -1. Select the SH2E-xxx.TXT file, then press OK, then "Yes" to execute it - + If you get kicked back into menu, make sure you're using the latest version of SmileBASIC -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/bg_BG/homebrew-launcher-(steelhax).txt b/_pages/bg_BG/homebrew-launcher-(steelhax).txt deleted file mode 100644 index 9b8dace5a3..0000000000 --- a/_pages/bg_BG/homebrew-launcher-(steelhax).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (Steelhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Steel Diver: Sub Wars, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Steel Diver: Sub Wars save file, if you have one. If you wish to preserve your Steel Diver: Sub Wars game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Steel Diver: Sub Wars" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Steel Diver: Sub Wars -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Steelhax](/assets/steelhax-release.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Prep Work - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the `steelhax` folder from the `Steelhax-release.zip` to the root of your SD card -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - Steelminer - -In this section, you will create a hacked Steel Diver: Sub Wars save file that, when used, will load the Homebrew Launcher on your console. - -1. Launch "Steel Diver: Sub Wars" once and select a Mii to initialize your save file - + Decline the game update when prompted - + If you have already updated the game, use the Data Management menu of the System Settings to delete the update -1. Exit "Steel Diver: Sub Wars" -1. Power off your console -1. Insert your SD card into your computer -1. Open [the SteelHax Save Tool website](https://3dstools.nhnarwhal.com/#/steelhax) on your computer -1. Select your `movable.sed` file -1. Select your region based on your console -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `<8-character-region>` -> `data` on your SD card - + **EUR Region**: `000d7e00` - + **JPN Region**: `000d7c00` - + **USA Region**: `000d7d00` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Steel Diver: Sub Wars" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/bg_BG/homebrew-launcher-(super-skaterhax).txt b/_pages/bg_BG/homebrew-launcher-(super-skaterhax).txt deleted file mode 100644 index 5895c4f64b..0000000000 --- a/_pages/bg_BG/homebrew-launcher-(super-skaterhax).txt +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: "Homebrew Launcher (super-skaterhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see [here](https://github.com/zoogie/super-skaterhax). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -Super-skaterhax (when used to launch the Homebrew Launcher) is compatible with New models on version 11.16.0 in all regions, and 11.17.0 in the EUR, JPN and USA regions. - -The instructions provided only apply to the New 3DS, New 3DS XL, and New 2DS XL. Please ensure that the console you are modding is a New 3DS, New 3DS XL, or New 2DS XL before continuing. -{: .notice--warning} - -### What You Need - -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* The latest release of [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (the release `.zip` file) - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger both super-skaterhax and the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy everything inside the folder for your console's region (and also system version if the region is USA) in the super-skaterhax `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/skater-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - super-skaterhax - -In this section, you will visit the browser exploit webpage, which will launch the Homebrew Launcher. - -If you haven't already, make sure you have a working Internet connection set up on your console. -{: .notice--info} - -1. On the HOME Menu, press the Left and Right shoulder buttons at the same time to open the camera - + If you are unable to open the camera, open the Internet Browser and manually type the URL instead (`https://zoogie.github.io/web/super/` for EUR/USA/JPN, `https://zoogie.github.io/web/korea` for KOR) -1. Tap the QR code button and scan one of the following QR codes for your console's region [here](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png) - + If you get a security certificate warning, press (A) to allow the connection -1. Press the (Select) button to open the bookmark tab - + If your (Select) button does not respond, tap the star icon on the bottom-left corner of the screen -1. Tap "Bookmark this page" -1. Press (B) once to return to the browser -1. Press (Start) to open the context menu - + If your (Start) button does not respond, tap the 3-line menu on the bottom-right corner of the screen -1. Tap on "Settings" -1. Tap on "Delete Cookies" -1. Press (A) to continue -1. Press (Home) to return to the HOME Menu, then immediately press (A) to launch the browser again -1. Select the "GO GO!" button on the top screen - + If any prompts appear, approve all of them - + If your console freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your console freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section - + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/bg_BG/include/fredtool-prep.txt b/_pages/bg_BG/include/fredtool-prep.txt deleted file mode 100644 index bd910b24de..0000000000 --- a/_pages/bg_BG/include/fredtool-prep.txt +++ /dev/null @@ -1,29 +0,0 @@ -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Insert your SD card into your computer -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} \ No newline at end of file diff --git a/_pages/bg_BG/include/hbl-common-exploits-movable.txt b/_pages/bg_BG/include/hbl-common-exploits-movable.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/bg_BG/include/hbl-common-exploits-movable.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/bg_BG/include/hbl-common-exploits.txt b/_pages/bg_BG/include/hbl-common-exploits.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/bg_BG/include/hbl-common-exploits.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/bg_BG/installing-boot9strap-(fredtool).txt b/_pages/bg_BG/installing-boot9strap-(fredtool).txt deleted file mode 100644 index a06a1259f2..0000000000 --- a/_pages/bg_BG/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer](seedminer) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/bg_BG/installing-boot9strap-(fredtool-legacy).txt b/_pages/bg_BG/installing-boot9strap-(fredtool-legacy).txt deleted file mode 100644 index 7e88fb51b4..0000000000 --- a/_pages/bg_BG/installing-boot9strap-(fredtool-legacy).txt +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool, Legacy)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. - -Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/bg_BG/installing-boot9strap-(frogtool).txt b/_pages/bg_BG/installing-boot9strap-(frogtool).txt deleted file mode 100644 index 063799fcc6..0000000000 --- a/_pages/bg_BG/installing-boot9strap-(frogtool).txt +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Installing boot9strap (Frogtool)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see "DSiWare_Exports CTCert verification" and "FIRM partitions known-plaintext" [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - - -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) link for `frogcert.bin` on this page, you will need a torrent client like [qBittorrent](https://www.qbittorrent.org/download.php) or [Deluge](http://dev.deluge-torrent.org/wiki/Download). -{: .notice--warning} - -### What You Need - -* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link) -* The latest release of [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (direct download) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Copy `boot.nds` (b9sTool) from the b9sTool release `.zip` to the root of your SD card -1. Create a folder named `3ds` on the root of your SD card if it does not already exist - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy the `Frogtool` folder from the Frogtool-nimhax `.zip` to the `/3ds/` folder on your SD card -1. Copy `frogcert.bin` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section III - Patching DS Download Play - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch Frogtool from the list of homebrew -1. Select the "INJECT patched DS Download Play" option -1. Frogtool will automatically run and inject the JPN version of Flipnote Studio into your DS Download Play -1. Once this operation has finished, read the screens and check if the process was successful -1. Tap the touch screen, then select "BOOT patched DS Download Play" -1. If the exploit was successful, your console will have loaded the JPN version of Flipnote Studio - + If you get stuck on a black screen, follow [this](https://wiki.hacks.guide/wiki/3DS:TWLFix#Userland_(PicHaxx,_Steelhax,_etc.)-0) page, then try again - -#### Section IV - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsdlp" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Download Play - -1. Launch the Download Play application -1. Wait until you see the two buttons - + Do not press either of the buttons -1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu -1. Select "Miscellaneous options" -1. Select "Switch the hb. title to the current app." -1. Press (B) to continue -1. Press (B) to return to the Rosalina main menu -1. Press (B) to exit the Rosalina menu -1. Press (Home), then close Download Play -1. Relaunch the Download Play application -1. Your console should load the Homebrew Launcher -1. Launch Frogtool from the list of homebrew -1. Select the "RESTORE clean DS Download Play" option -1. Once this operation has finished, read the screens and check if the process was successful - + If there are any errors or missing files, correct the problem and try again -1. If the process was successful, tap the touch screen, then press START to exit -1. Power off your console - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/bg_BG/installing-boot9strap-(hbl-usm).txt b/_pages/bg_BG/installing-boot9strap-(hbl-usm).txt deleted file mode 100644 index de8dad596a..0000000000 --- a/_pages/bg_BG/installing-boot9strap-(hbl-usm).txt +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "Installing boot9strap (HBL-USM)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--danger} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) (direct download) - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. Then, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Insert your SD card into your computer -1. Create a folder named `boot9strap` on the root of your SD card -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the RELEASE `.zip` to the `/boot9strap/` folder on your SD card -1. Create a folder named `3ds` on the root of your SD card if it does not already exist - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy `slotTool.3dsx` from the `slotTool` folder inside the RELEASE `.zip` to the `/3ds/` folder on your SD card -1. Copy `usm.bin` from the RELEASE `.zip` to the root folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch slotTool from the list of homebrew - + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section -1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option - + You will see some on-screen text and then your system will shut down - -![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section III - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section IV - Restoring WiFi Configuration Profiles - -{% include_relative include/remove-usm-slottool.txt %} - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/bg_BG/installing-boot9strap-(usm).txt b/_pages/bg_BG/installing-boot9strap-(usm).txt deleted file mode 100644 index 9dcede6ffe..0000000000 --- a/_pages/bg_BG/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: "Installing boot9strap (USM)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. - -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--warning} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* [usm.bin](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) - - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. - -1. Your SD card should be inserted in your computer -1. Copy `usm.bin` to the root of your SD card -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Create a folder named `boot9strap` on the root of your SD card -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card - -![]({{ "/images/screenshots/usm/usm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If the BB3 multihax menu doesn't open, [follow this troubleshooting guide](troubleshooting#bannerbomb3) - + If the BB3 multihax menu says "cfw installed already", you already have custom firmware and should continue from [here](checking-for-cfw) -1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" - + Your console will automatically power off -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Internet Settings` -> `Connection Settings` -1. Ensure that all three connections are named "Haaaaaaaxxxxxxxxx..." - + Do NOT change these settings! - + If all three connections are NOT all named "Haaaaaaaxxxxxxxxx...", STOP! Something went wrong in this section and MUST be fixed before you can continue -1. Power off your console - -#### Section III - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section IV - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section V - Restoring WiFi Configuration Profiles - -In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. - -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" - + Your console will automatically reboot -1. Power off your console -1. Insert your SD card into your computer -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/ca_ES/dumping-movable-(nimhax).txt b/_pages/ca_ES/dumping-movable-(nimhax).txt deleted file mode 100644 index 69f3d011d3..0000000000 --- a/_pages/ca_ES/dumping-movable-(nimhax).txt +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: "Dumping Movable (nimhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -To install boot9strap on your console, we derive your console's unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console. - -For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need - -* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy the `nimhax` folder from the nimhax `.zip` to the `/3ds/` folder on your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) -{: .notice--info} - -#### Section II - nimhax - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch nimhax from the list of homebrew -1. If the exploit was successful, a `movable.sed` file will appear on the root of your SD card - -### Next step: Frogtool - -Once you have your console's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \ -While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you're unable to use a torrent client. - -Continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--primary} diff --git a/_pages/ca_ES/homebrew-launcher-(freakyhax).txt b/_pages/ca_ES/homebrew-launcher-(freakyhax).txt deleted file mode 100644 index 028cee82a4..0000000000 --- a/_pages/ca_ES/homebrew-launcher-(freakyhax).txt +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: "Homebrew Launcher (freakyhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[freakyhax](https://plutooo.github.io/freakyhax/) is an exploit for the game Freakyforms Deluxe discovered and released by [plutooo](https://github.com/plutooo). It works on versions 9.0.0 through 11.17.0 on EUR, USA and JPN region consoles. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -### What You Need - -+ A EUR/USA/JPN copy of Freakyforms Deluxe (eShop or cartridge) -+ The latest release of [freakyhax](https://github.com/plutooo/freakyhax/releases/latest) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy all files and folders inside the `/build//exploit/` folder from the freakyhax `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - freakyhax - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch Freakyforms Deluxe -1. In the game menu, select `Play -> Camera -> Load a QR code` -1. Select the QR code -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/ca_ES/homebrew-launcher-(ninjhax2-dx).txt b/_pages/ca_ES/homebrew-launcher-(ninjhax2-dx).txt deleted file mode 100644 index 2d8032745c..0000000000 --- a/_pages/ca_ES/homebrew-launcher-(ninjhax2-dx).txt +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "Homebrew Launcher (ninjhax2-dx)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[Ninjhax2](https://github.com/smealum/ninjhax2.x) is an exploit for the game "Cubic Ninja" made by [smealum](https://github.com/smealum). This page uses an updated version of ninjhax by [zoogie](https://github.com/zoogie) called [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx), which supports 11.17.0. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -This process will overwrite your Cubic Ninja save file, if you have one. -{: .notice--warning} - -### What You Need -* The game "Cubic Ninja" -* The latest release of [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx/releases) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `Launcher.dat` from the folder appropriate for your console from the ninjhax2-dx `.zip` file to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - -#### Section II - ninjhax2-dx -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Cubic Ninja" once and select "Create" - + If prompted, delete all data -1. Select "QR Code" -1. Select "Scan QR Code" -1. On your PC, open the browser and go to [ninjhax2-dx website](https://zoogie.github.io/web/nh2dx/) -1. Select your console's region and hardware -1. On your console, scan the QR code - + If the game exits to the HOME Menu, then the exploit has installed correctly -1. Launch "Cubic Ninja" again -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/ca_ES/homebrew-launcher-(pichaxx).txt b/_pages/ca_ES/homebrew-launcher-(pichaxx).txt deleted file mode 100644 index a58df498f5..0000000000 --- a/_pages/ca_ES/homebrew-launcher-(pichaxx).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (PicHaxx)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[PicHaxx](https://github.com/zoogie/pichaxx) is an exploit for the game Pokémon Picross released by [zoogie](https://github.com/zoogie), originally discovered and [demonstrated](https://twitter.com/mrnbayoh/status/744899681663258624) by [MrNbaYoh](https://github.com/MrNbaYoh). - -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Pokémon Picross" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Pokémon Picross -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Prep Work - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card - -![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - PicHaxx - -In this section, you will create a hacked Pokémon Picross save file that, when loaded, will run the Homebrew Launcher on your console. - -1. Open [the PicHaxx Injector website](https://3dstools.nhnarwhal.com/#/pichaxx) on your computer -1. Select your `movable.sed` file -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `0017c100` -> `data` on your SD card - + The `` will be the same one that you used in Seedminer - + The `` is a 32 character long folder inside of the `` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted - - ![]({{ "/images/screenshots/pichaxx-save-location.png" | absolute_url }}) - {: .notice--info} - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Pokémon Picross" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher - + If you get an error message, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-pichaxx) -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/ca_ES/homebrew-launcher-(smilehax-iie).txt b/_pages/ca_ES/homebrew-launcher-(smilehax-iie).txt deleted file mode 100644 index 08cd5865c0..0000000000 --- a/_pages/ca_ES/homebrew-launcher-(smilehax-iie).txt +++ /dev/null @@ -1,70 +0,0 @@ ---- -title: "Homebrew Launcher (smilehax-IIe)" ---- - -{% include toc title="Table of Contents" %} - -This set of instructions does not support the Japanese version of SmileBASIC. -{: .notice--warning} - -{% capture technical_info %} -Technical Details (optional) -[smilehax-IIe](https://github.com/zoogie/smilehax-IIe) is an exploit for the game "SmileBASIC" made by zoogie, compatible with system versions 9.0.0 through 11.17.0 for USA/EUR/JPN region consoles. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need -+ The game "SmileBASIC" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install SmileBASIC -+ The latest release of [smilehax-IIe](https://github.com/zoogie/smilehax-IIe/releases/download/v1.1/Release_sh2e_v1.1.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Transfer the `.wav` for your region from the Release_sh2e `.zip` to a device that can play `.wav` files, for example a phone -1. Copy the petitcom `.icn` for your region to the root of your SD card - -#### Section II - smilehax - -1. Launch SmileBASIC - + Update the game if prompted -1. Select the "Publish/Download Projects" option -1. Select the "Download (Receive) using Public Key" option -1. Press the "Yes" button -1. Enter the Public Key "NJEQK3A4" using the on-screen keyboard -1. Press the "Yes" button to confirm the download of PMODEM141 -1. Press "OK", then "Back", then "Browse Projects" -1. Select PMODEM141, then press "Select File" -1. Select PMODEM141.PRG, then press "OK", then "Yes" to execute it -1. Select RECEIVE FILE SIMPLEX -1. Prepare the device you use to play the `.wav` file -1. Keep your console about a foot from the `.wav` file playing devices' speaker and use a reasonable (not loud) volume to play the `.wav` -1. Now select 300BPS, then play the `.wav` file -1. When it finishes, press "Yes", then press "OK" -1. Press the START button -1. Select the SH2E-xxx.TXT file, then press OK, then "Yes" to execute it - + If you get kicked back into menu, make sure you're using the latest version of SmileBASIC -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/ca_ES/homebrew-launcher-(steelhax).txt b/_pages/ca_ES/homebrew-launcher-(steelhax).txt deleted file mode 100644 index 9b8dace5a3..0000000000 --- a/_pages/ca_ES/homebrew-launcher-(steelhax).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (Steelhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Steel Diver: Sub Wars, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Steel Diver: Sub Wars save file, if you have one. If you wish to preserve your Steel Diver: Sub Wars game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Steel Diver: Sub Wars" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Steel Diver: Sub Wars -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Steelhax](/assets/steelhax-release.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Prep Work - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the `steelhax` folder from the `Steelhax-release.zip` to the root of your SD card -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - Steelminer - -In this section, you will create a hacked Steel Diver: Sub Wars save file that, when used, will load the Homebrew Launcher on your console. - -1. Launch "Steel Diver: Sub Wars" once and select a Mii to initialize your save file - + Decline the game update when prompted - + If you have already updated the game, use the Data Management menu of the System Settings to delete the update -1. Exit "Steel Diver: Sub Wars" -1. Power off your console -1. Insert your SD card into your computer -1. Open [the SteelHax Save Tool website](https://3dstools.nhnarwhal.com/#/steelhax) on your computer -1. Select your `movable.sed` file -1. Select your region based on your console -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `<8-character-region>` -> `data` on your SD card - + **EUR Region**: `000d7e00` - + **JPN Region**: `000d7c00` - + **USA Region**: `000d7d00` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Steel Diver: Sub Wars" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/ca_ES/homebrew-launcher-(super-skaterhax).txt b/_pages/ca_ES/homebrew-launcher-(super-skaterhax).txt deleted file mode 100644 index 5895c4f64b..0000000000 --- a/_pages/ca_ES/homebrew-launcher-(super-skaterhax).txt +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: "Homebrew Launcher (super-skaterhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see [here](https://github.com/zoogie/super-skaterhax). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -Super-skaterhax (when used to launch the Homebrew Launcher) is compatible with New models on version 11.16.0 in all regions, and 11.17.0 in the EUR, JPN and USA regions. - -The instructions provided only apply to the New 3DS, New 3DS XL, and New 2DS XL. Please ensure that the console you are modding is a New 3DS, New 3DS XL, or New 2DS XL before continuing. -{: .notice--warning} - -### What You Need - -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* The latest release of [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (the release `.zip` file) - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger both super-skaterhax and the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy everything inside the folder for your console's region (and also system version if the region is USA) in the super-skaterhax `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/skater-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - super-skaterhax - -In this section, you will visit the browser exploit webpage, which will launch the Homebrew Launcher. - -If you haven't already, make sure you have a working Internet connection set up on your console. -{: .notice--info} - -1. On the HOME Menu, press the Left and Right shoulder buttons at the same time to open the camera - + If you are unable to open the camera, open the Internet Browser and manually type the URL instead (`https://zoogie.github.io/web/super/` for EUR/USA/JPN, `https://zoogie.github.io/web/korea` for KOR) -1. Tap the QR code button and scan one of the following QR codes for your console's region [here](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png) - + If you get a security certificate warning, press (A) to allow the connection -1. Press the (Select) button to open the bookmark tab - + If your (Select) button does not respond, tap the star icon on the bottom-left corner of the screen -1. Tap "Bookmark this page" -1. Press (B) once to return to the browser -1. Press (Start) to open the context menu - + If your (Start) button does not respond, tap the 3-line menu on the bottom-right corner of the screen -1. Tap on "Settings" -1. Tap on "Delete Cookies" -1. Press (A) to continue -1. Press (Home) to return to the HOME Menu, then immediately press (A) to launch the browser again -1. Select the "GO GO!" button on the top screen - + If any prompts appear, approve all of them - + If your console freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your console freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section - + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/ca_ES/include/fredtool-prep.txt b/_pages/ca_ES/include/fredtool-prep.txt deleted file mode 100644 index bd910b24de..0000000000 --- a/_pages/ca_ES/include/fredtool-prep.txt +++ /dev/null @@ -1,29 +0,0 @@ -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Insert your SD card into your computer -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} \ No newline at end of file diff --git a/_pages/ca_ES/include/hbl-common-exploits-movable.txt b/_pages/ca_ES/include/hbl-common-exploits-movable.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/ca_ES/include/hbl-common-exploits-movable.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/ca_ES/include/hbl-common-exploits.txt b/_pages/ca_ES/include/hbl-common-exploits.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/ca_ES/include/hbl-common-exploits.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/ca_ES/installing-boot9strap-(fredtool).txt b/_pages/ca_ES/installing-boot9strap-(fredtool).txt deleted file mode 100644 index a06a1259f2..0000000000 --- a/_pages/ca_ES/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer](seedminer) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/ca_ES/installing-boot9strap-(fredtool-legacy).txt b/_pages/ca_ES/installing-boot9strap-(fredtool-legacy).txt deleted file mode 100644 index 7e88fb51b4..0000000000 --- a/_pages/ca_ES/installing-boot9strap-(fredtool-legacy).txt +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool, Legacy)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. - -Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/ca_ES/installing-boot9strap-(frogtool).txt b/_pages/ca_ES/installing-boot9strap-(frogtool).txt deleted file mode 100644 index 063799fcc6..0000000000 --- a/_pages/ca_ES/installing-boot9strap-(frogtool).txt +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Installing boot9strap (Frogtool)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see "DSiWare_Exports CTCert verification" and "FIRM partitions known-plaintext" [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - - -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) link for `frogcert.bin` on this page, you will need a torrent client like [qBittorrent](https://www.qbittorrent.org/download.php) or [Deluge](http://dev.deluge-torrent.org/wiki/Download). -{: .notice--warning} - -### What You Need - -* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link) -* The latest release of [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (direct download) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Copy `boot.nds` (b9sTool) from the b9sTool release `.zip` to the root of your SD card -1. Create a folder named `3ds` on the root of your SD card if it does not already exist - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy the `Frogtool` folder from the Frogtool-nimhax `.zip` to the `/3ds/` folder on your SD card -1. Copy `frogcert.bin` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section III - Patching DS Download Play - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch Frogtool from the list of homebrew -1. Select the "INJECT patched DS Download Play" option -1. Frogtool will automatically run and inject the JPN version of Flipnote Studio into your DS Download Play -1. Once this operation has finished, read the screens and check if the process was successful -1. Tap the touch screen, then select "BOOT patched DS Download Play" -1. If the exploit was successful, your console will have loaded the JPN version of Flipnote Studio - + If you get stuck on a black screen, follow [this](https://wiki.hacks.guide/wiki/3DS:TWLFix#Userland_(PicHaxx,_Steelhax,_etc.)-0) page, then try again - -#### Section IV - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsdlp" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Download Play - -1. Launch the Download Play application -1. Wait until you see the two buttons - + Do not press either of the buttons -1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu -1. Select "Miscellaneous options" -1. Select "Switch the hb. title to the current app." -1. Press (B) to continue -1. Press (B) to return to the Rosalina main menu -1. Press (B) to exit the Rosalina menu -1. Press (Home), then close Download Play -1. Relaunch the Download Play application -1. Your console should load the Homebrew Launcher -1. Launch Frogtool from the list of homebrew -1. Select the "RESTORE clean DS Download Play" option -1. Once this operation has finished, read the screens and check if the process was successful - + If there are any errors or missing files, correct the problem and try again -1. If the process was successful, tap the touch screen, then press START to exit -1. Power off your console - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/ca_ES/installing-boot9strap-(hbl-usm).txt b/_pages/ca_ES/installing-boot9strap-(hbl-usm).txt deleted file mode 100644 index de8dad596a..0000000000 --- a/_pages/ca_ES/installing-boot9strap-(hbl-usm).txt +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "Installing boot9strap (HBL-USM)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--danger} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) (direct download) - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. Then, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Insert your SD card into your computer -1. Create a folder named `boot9strap` on the root of your SD card -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the RELEASE `.zip` to the `/boot9strap/` folder on your SD card -1. Create a folder named `3ds` on the root of your SD card if it does not already exist - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy `slotTool.3dsx` from the `slotTool` folder inside the RELEASE `.zip` to the `/3ds/` folder on your SD card -1. Copy `usm.bin` from the RELEASE `.zip` to the root folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch slotTool from the list of homebrew - + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section -1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option - + You will see some on-screen text and then your system will shut down - -![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section III - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section IV - Restoring WiFi Configuration Profiles - -{% include_relative include/remove-usm-slottool.txt %} - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/ca_ES/installing-boot9strap-(usm).txt b/_pages/ca_ES/installing-boot9strap-(usm).txt deleted file mode 100644 index 9dcede6ffe..0000000000 --- a/_pages/ca_ES/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: "Installing boot9strap (USM)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. - -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--warning} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* [usm.bin](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) - - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. - -1. Your SD card should be inserted in your computer -1. Copy `usm.bin` to the root of your SD card -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Create a folder named `boot9strap` on the root of your SD card -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card - -![]({{ "/images/screenshots/usm/usm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If the BB3 multihax menu doesn't open, [follow this troubleshooting guide](troubleshooting#bannerbomb3) - + If the BB3 multihax menu says "cfw installed already", you already have custom firmware and should continue from [here](checking-for-cfw) -1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" - + Your console will automatically power off -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Internet Settings` -> `Connection Settings` -1. Ensure that all three connections are named "Haaaaaaaxxxxxxxxx..." - + Do NOT change these settings! - + If all three connections are NOT all named "Haaaaaaaxxxxxxxxx...", STOP! Something went wrong in this section and MUST be fixed before you can continue -1. Power off your console - -#### Section III - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section IV - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section V - Restoring WiFi Configuration Profiles - -In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. - -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" - + Your console will automatically reboot -1. Power off your console -1. Insert your SD card into your computer -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/cs_CZ/dumping-movable-(nimhax).txt b/_pages/cs_CZ/dumping-movable-(nimhax).txt deleted file mode 100644 index 69f3d011d3..0000000000 --- a/_pages/cs_CZ/dumping-movable-(nimhax).txt +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: "Dumping Movable (nimhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -To install boot9strap on your console, we derive your console's unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console. - -For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need - -* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy the `nimhax` folder from the nimhax `.zip` to the `/3ds/` folder on your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) -{: .notice--info} - -#### Section II - nimhax - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch nimhax from the list of homebrew -1. If the exploit was successful, a `movable.sed` file will appear on the root of your SD card - -### Next step: Frogtool - -Once you have your console's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \ -While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you're unable to use a torrent client. - -Continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--primary} diff --git a/_pages/cs_CZ/homebrew-launcher-(freakyhax).txt b/_pages/cs_CZ/homebrew-launcher-(freakyhax).txt deleted file mode 100644 index 028cee82a4..0000000000 --- a/_pages/cs_CZ/homebrew-launcher-(freakyhax).txt +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: "Homebrew Launcher (freakyhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[freakyhax](https://plutooo.github.io/freakyhax/) is an exploit for the game Freakyforms Deluxe discovered and released by [plutooo](https://github.com/plutooo). It works on versions 9.0.0 through 11.17.0 on EUR, USA and JPN region consoles. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -### What You Need - -+ A EUR/USA/JPN copy of Freakyforms Deluxe (eShop or cartridge) -+ The latest release of [freakyhax](https://github.com/plutooo/freakyhax/releases/latest) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy all files and folders inside the `/build//exploit/` folder from the freakyhax `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - freakyhax - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch Freakyforms Deluxe -1. In the game menu, select `Play -> Camera -> Load a QR code` -1. Select the QR code -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/cs_CZ/homebrew-launcher-(ninjhax2-dx).txt b/_pages/cs_CZ/homebrew-launcher-(ninjhax2-dx).txt deleted file mode 100644 index 2d8032745c..0000000000 --- a/_pages/cs_CZ/homebrew-launcher-(ninjhax2-dx).txt +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "Homebrew Launcher (ninjhax2-dx)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[Ninjhax2](https://github.com/smealum/ninjhax2.x) is an exploit for the game "Cubic Ninja" made by [smealum](https://github.com/smealum). This page uses an updated version of ninjhax by [zoogie](https://github.com/zoogie) called [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx), which supports 11.17.0. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -This process will overwrite your Cubic Ninja save file, if you have one. -{: .notice--warning} - -### What You Need -* The game "Cubic Ninja" -* The latest release of [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx/releases) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `Launcher.dat` from the folder appropriate for your console from the ninjhax2-dx `.zip` file to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - -#### Section II - ninjhax2-dx -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Cubic Ninja" once and select "Create" - + If prompted, delete all data -1. Select "QR Code" -1. Select "Scan QR Code" -1. On your PC, open the browser and go to [ninjhax2-dx website](https://zoogie.github.io/web/nh2dx/) -1. Select your console's region and hardware -1. On your console, scan the QR code - + If the game exits to the HOME Menu, then the exploit has installed correctly -1. Launch "Cubic Ninja" again -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/cs_CZ/homebrew-launcher-(pichaxx).txt b/_pages/cs_CZ/homebrew-launcher-(pichaxx).txt deleted file mode 100644 index a58df498f5..0000000000 --- a/_pages/cs_CZ/homebrew-launcher-(pichaxx).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (PicHaxx)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[PicHaxx](https://github.com/zoogie/pichaxx) is an exploit for the game Pokémon Picross released by [zoogie](https://github.com/zoogie), originally discovered and [demonstrated](https://twitter.com/mrnbayoh/status/744899681663258624) by [MrNbaYoh](https://github.com/MrNbaYoh). - -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Pokémon Picross" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Pokémon Picross -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Prep Work - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card - -![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - PicHaxx - -In this section, you will create a hacked Pokémon Picross save file that, when loaded, will run the Homebrew Launcher on your console. - -1. Open [the PicHaxx Injector website](https://3dstools.nhnarwhal.com/#/pichaxx) on your computer -1. Select your `movable.sed` file -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `0017c100` -> `data` on your SD card - + The `` will be the same one that you used in Seedminer - + The `` is a 32 character long folder inside of the `` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted - - ![]({{ "/images/screenshots/pichaxx-save-location.png" | absolute_url }}) - {: .notice--info} - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Pokémon Picross" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher - + If you get an error message, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-pichaxx) -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/cs_CZ/homebrew-launcher-(smilehax-iie).txt b/_pages/cs_CZ/homebrew-launcher-(smilehax-iie).txt deleted file mode 100644 index 08cd5865c0..0000000000 --- a/_pages/cs_CZ/homebrew-launcher-(smilehax-iie).txt +++ /dev/null @@ -1,70 +0,0 @@ ---- -title: "Homebrew Launcher (smilehax-IIe)" ---- - -{% include toc title="Table of Contents" %} - -This set of instructions does not support the Japanese version of SmileBASIC. -{: .notice--warning} - -{% capture technical_info %} -Technical Details (optional) -[smilehax-IIe](https://github.com/zoogie/smilehax-IIe) is an exploit for the game "SmileBASIC" made by zoogie, compatible with system versions 9.0.0 through 11.17.0 for USA/EUR/JPN region consoles. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need -+ The game "SmileBASIC" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install SmileBASIC -+ The latest release of [smilehax-IIe](https://github.com/zoogie/smilehax-IIe/releases/download/v1.1/Release_sh2e_v1.1.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Transfer the `.wav` for your region from the Release_sh2e `.zip` to a device that can play `.wav` files, for example a phone -1. Copy the petitcom `.icn` for your region to the root of your SD card - -#### Section II - smilehax - -1. Launch SmileBASIC - + Update the game if prompted -1. Select the "Publish/Download Projects" option -1. Select the "Download (Receive) using Public Key" option -1. Press the "Yes" button -1. Enter the Public Key "NJEQK3A4" using the on-screen keyboard -1. Press the "Yes" button to confirm the download of PMODEM141 -1. Press "OK", then "Back", then "Browse Projects" -1. Select PMODEM141, then press "Select File" -1. Select PMODEM141.PRG, then press "OK", then "Yes" to execute it -1. Select RECEIVE FILE SIMPLEX -1. Prepare the device you use to play the `.wav` file -1. Keep your console about a foot from the `.wav` file playing devices' speaker and use a reasonable (not loud) volume to play the `.wav` -1. Now select 300BPS, then play the `.wav` file -1. When it finishes, press "Yes", then press "OK" -1. Press the START button -1. Select the SH2E-xxx.TXT file, then press OK, then "Yes" to execute it - + If you get kicked back into menu, make sure you're using the latest version of SmileBASIC -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/cs_CZ/homebrew-launcher-(steelhax).txt b/_pages/cs_CZ/homebrew-launcher-(steelhax).txt deleted file mode 100644 index 9b8dace5a3..0000000000 --- a/_pages/cs_CZ/homebrew-launcher-(steelhax).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (Steelhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Steel Diver: Sub Wars, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Steel Diver: Sub Wars save file, if you have one. If you wish to preserve your Steel Diver: Sub Wars game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Steel Diver: Sub Wars" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Steel Diver: Sub Wars -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Steelhax](/assets/steelhax-release.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Prep Work - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the `steelhax` folder from the `Steelhax-release.zip` to the root of your SD card -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - Steelminer - -In this section, you will create a hacked Steel Diver: Sub Wars save file that, when used, will load the Homebrew Launcher on your console. - -1. Launch "Steel Diver: Sub Wars" once and select a Mii to initialize your save file - + Decline the game update when prompted - + If you have already updated the game, use the Data Management menu of the System Settings to delete the update -1. Exit "Steel Diver: Sub Wars" -1. Power off your console -1. Insert your SD card into your computer -1. Open [the SteelHax Save Tool website](https://3dstools.nhnarwhal.com/#/steelhax) on your computer -1. Select your `movable.sed` file -1. Select your region based on your console -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `<8-character-region>` -> `data` on your SD card - + **EUR Region**: `000d7e00` - + **JPN Region**: `000d7c00` - + **USA Region**: `000d7d00` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Steel Diver: Sub Wars" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/cs_CZ/homebrew-launcher-(super-skaterhax).txt b/_pages/cs_CZ/homebrew-launcher-(super-skaterhax).txt deleted file mode 100644 index 5895c4f64b..0000000000 --- a/_pages/cs_CZ/homebrew-launcher-(super-skaterhax).txt +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: "Homebrew Launcher (super-skaterhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see [here](https://github.com/zoogie/super-skaterhax). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -Super-skaterhax (when used to launch the Homebrew Launcher) is compatible with New models on version 11.16.0 in all regions, and 11.17.0 in the EUR, JPN and USA regions. - -The instructions provided only apply to the New 3DS, New 3DS XL, and New 2DS XL. Please ensure that the console you are modding is a New 3DS, New 3DS XL, or New 2DS XL before continuing. -{: .notice--warning} - -### What You Need - -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* The latest release of [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (the release `.zip` file) - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger both super-skaterhax and the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy everything inside the folder for your console's region (and also system version if the region is USA) in the super-skaterhax `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/skater-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - super-skaterhax - -In this section, you will visit the browser exploit webpage, which will launch the Homebrew Launcher. - -If you haven't already, make sure you have a working Internet connection set up on your console. -{: .notice--info} - -1. On the HOME Menu, press the Left and Right shoulder buttons at the same time to open the camera - + If you are unable to open the camera, open the Internet Browser and manually type the URL instead (`https://zoogie.github.io/web/super/` for EUR/USA/JPN, `https://zoogie.github.io/web/korea` for KOR) -1. Tap the QR code button and scan one of the following QR codes for your console's region [here](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png) - + If you get a security certificate warning, press (A) to allow the connection -1. Press the (Select) button to open the bookmark tab - + If your (Select) button does not respond, tap the star icon on the bottom-left corner of the screen -1. Tap "Bookmark this page" -1. Press (B) once to return to the browser -1. Press (Start) to open the context menu - + If your (Start) button does not respond, tap the 3-line menu on the bottom-right corner of the screen -1. Tap on "Settings" -1. Tap on "Delete Cookies" -1. Press (A) to continue -1. Press (Home) to return to the HOME Menu, then immediately press (A) to launch the browser again -1. Select the "GO GO!" button on the top screen - + If any prompts appear, approve all of them - + If your console freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your console freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section - + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/cs_CZ/include/fredtool-prep.txt b/_pages/cs_CZ/include/fredtool-prep.txt deleted file mode 100644 index bd910b24de..0000000000 --- a/_pages/cs_CZ/include/fredtool-prep.txt +++ /dev/null @@ -1,29 +0,0 @@ -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Insert your SD card into your computer -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} \ No newline at end of file diff --git a/_pages/cs_CZ/include/hbl-common-exploits-movable.txt b/_pages/cs_CZ/include/hbl-common-exploits-movable.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/cs_CZ/include/hbl-common-exploits-movable.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/cs_CZ/include/hbl-common-exploits.txt b/_pages/cs_CZ/include/hbl-common-exploits.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/cs_CZ/include/hbl-common-exploits.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/cs_CZ/installing-boot9strap-(fredtool).txt b/_pages/cs_CZ/installing-boot9strap-(fredtool).txt deleted file mode 100644 index a06a1259f2..0000000000 --- a/_pages/cs_CZ/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer](seedminer) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/cs_CZ/installing-boot9strap-(fredtool-legacy).txt b/_pages/cs_CZ/installing-boot9strap-(fredtool-legacy).txt deleted file mode 100644 index 7e88fb51b4..0000000000 --- a/_pages/cs_CZ/installing-boot9strap-(fredtool-legacy).txt +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool, Legacy)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. - -Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/cs_CZ/installing-boot9strap-(frogtool).txt b/_pages/cs_CZ/installing-boot9strap-(frogtool).txt deleted file mode 100644 index 063799fcc6..0000000000 --- a/_pages/cs_CZ/installing-boot9strap-(frogtool).txt +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Installing boot9strap (Frogtool)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see "DSiWare_Exports CTCert verification" and "FIRM partitions known-plaintext" [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - - -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) link for `frogcert.bin` on this page, you will need a torrent client like [qBittorrent](https://www.qbittorrent.org/download.php) or [Deluge](http://dev.deluge-torrent.org/wiki/Download). -{: .notice--warning} - -### What You Need - -* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link) -* The latest release of [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (direct download) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Copy `boot.nds` (b9sTool) from the b9sTool release `.zip` to the root of your SD card -1. Create a folder named `3ds` on the root of your SD card if it does not already exist - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy the `Frogtool` folder from the Frogtool-nimhax `.zip` to the `/3ds/` folder on your SD card -1. Copy `frogcert.bin` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section III - Patching DS Download Play - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch Frogtool from the list of homebrew -1. Select the "INJECT patched DS Download Play" option -1. Frogtool will automatically run and inject the JPN version of Flipnote Studio into your DS Download Play -1. Once this operation has finished, read the screens and check if the process was successful -1. Tap the touch screen, then select "BOOT patched DS Download Play" -1. If the exploit was successful, your console will have loaded the JPN version of Flipnote Studio - + If you get stuck on a black screen, follow [this](https://wiki.hacks.guide/wiki/3DS:TWLFix#Userland_(PicHaxx,_Steelhax,_etc.)-0) page, then try again - -#### Section IV - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsdlp" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Download Play - -1. Launch the Download Play application -1. Wait until you see the two buttons - + Do not press either of the buttons -1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu -1. Select "Miscellaneous options" -1. Select "Switch the hb. title to the current app." -1. Press (B) to continue -1. Press (B) to return to the Rosalina main menu -1. Press (B) to exit the Rosalina menu -1. Press (Home), then close Download Play -1. Relaunch the Download Play application -1. Your console should load the Homebrew Launcher -1. Launch Frogtool from the list of homebrew -1. Select the "RESTORE clean DS Download Play" option -1. Once this operation has finished, read the screens and check if the process was successful - + If there are any errors or missing files, correct the problem and try again -1. If the process was successful, tap the touch screen, then press START to exit -1. Power off your console - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/cs_CZ/installing-boot9strap-(hbl-usm).txt b/_pages/cs_CZ/installing-boot9strap-(hbl-usm).txt deleted file mode 100644 index de8dad596a..0000000000 --- a/_pages/cs_CZ/installing-boot9strap-(hbl-usm).txt +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "Installing boot9strap (HBL-USM)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--danger} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) (direct download) - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. Then, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Insert your SD card into your computer -1. Create a folder named `boot9strap` on the root of your SD card -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the RELEASE `.zip` to the `/boot9strap/` folder on your SD card -1. Create a folder named `3ds` on the root of your SD card if it does not already exist - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy `slotTool.3dsx` from the `slotTool` folder inside the RELEASE `.zip` to the `/3ds/` folder on your SD card -1. Copy `usm.bin` from the RELEASE `.zip` to the root folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch slotTool from the list of homebrew - + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section -1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option - + You will see some on-screen text and then your system will shut down - -![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section III - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section IV - Restoring WiFi Configuration Profiles - -{% include_relative include/remove-usm-slottool.txt %} - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/cs_CZ/installing-boot9strap-(usm).txt b/_pages/cs_CZ/installing-boot9strap-(usm).txt deleted file mode 100644 index 9dcede6ffe..0000000000 --- a/_pages/cs_CZ/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: "Installing boot9strap (USM)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. - -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--warning} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* [usm.bin](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) - - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. - -1. Your SD card should be inserted in your computer -1. Copy `usm.bin` to the root of your SD card -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Create a folder named `boot9strap` on the root of your SD card -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card - -![]({{ "/images/screenshots/usm/usm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If the BB3 multihax menu doesn't open, [follow this troubleshooting guide](troubleshooting#bannerbomb3) - + If the BB3 multihax menu says "cfw installed already", you already have custom firmware and should continue from [here](checking-for-cfw) -1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" - + Your console will automatically power off -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Internet Settings` -> `Connection Settings` -1. Ensure that all three connections are named "Haaaaaaaxxxxxxxxx..." - + Do NOT change these settings! - + If all three connections are NOT all named "Haaaaaaaxxxxxxxxx...", STOP! Something went wrong in this section and MUST be fixed before you can continue -1. Power off your console - -#### Section III - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section IV - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section V - Restoring WiFi Configuration Profiles - -In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. - -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" - + Your console will automatically reboot -1. Power off your console -1. Insert your SD card into your computer -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/da_DK/installing-boot9strap-(fredtool).txt b/_pages/da_DK/installing-boot9strap-(fredtool).txt deleted file mode 100644 index 46eedbe264..0000000000 --- a/_pages/da_DK/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,102 +0,0 @@ ---- -title: "Installing Boot9strap (Fredtool)" ---- - -{% include toc title="Table of Contents" %} - -### Required Reading - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, for example from BannerBomb or the DSiWare Dumper tool. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -### What You Need - -* A DSiWare Backup (such as the one on SD root from [BannerBomb3](bannerbomb3) or [DSiWare Dumper](dsidumper)) -* Your `movable.sed` file from completing [Seedminer](seedminer) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) -* The latest release of [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) - -#### Section I - Prep Work - -1. Power off your device -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Copy `boot.nds` (B9STool) to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card - -#### Section II - Fredtool - -1. Open [Fredtool](https://fredtool.bruteforcemovable.com/) on your computer -1. Select your `movable.sed` file for the "Your movable.sed" field -1. Select your DSiWare Backup (`<8-character-id>.bin`) file for the "Your dsiware.bin" field -1. Complete the "I'm not a robot" captcha -1. Select "Start" -1. Wait for the process to complete -1. When the process has completed, download your modified DSiWare archive from the site - + This file contains 2 dsiware backup files, one clean (unmodified) and one hax (exploited) -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + This `` will be the same one that you used in [Seedminer](seedminer) - + This `` folder will be another 32 letter/number folder inside the `` folder - + If the `Nintendo DSiWare` folder does not exist, create it inside the `` folder -1. Copy the `42383841.bin` file from the `output/hax/` folder of the downloaded DSiWare archive (`fredtool_output.zip`) to the `Nintendo DSiWare` folder -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Haxxxxxxxxx!" title -1. Select "Copy", then select "OK" -1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" -1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio - -#### Section III - Flipnote Exploit - -If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). -{: .notice--info} - -1. Complete the initial setup process for the launched game until you reach the main menu - + Select the left option whenever prompted during the setup process -1. Using the touch-screen, select the large left box, then select the box with an SD card icon -1. Once the menu loads, select the face icon, then the bottom right icon to continue -1. Press (X) or (UP) on the D-Pad depending on which is shown on the top screen -1. Select the second button along the top with a film-reel icon -1. Scroll right until reel "3/3" is selected -1. Tap the third box with the letter "A" in it -1. Scroll left until reel "1/3" is selected -1. Tap the fourth box with the letter "A" in it -1. If the exploit was successful, your device will have loaded b9sTool -1. Using the D-Pad, move to "Install boot9strap" - + If you miss this step, the system will exit to home menu instead of installing boot9strap and you will need to open Nintendo DS Connections and start over from the beginning of Section III -1. Press (A), then press START and SELECT at the same time to begin the process -1. Once completed and the bottom screen says "done.", exit b9sTool, then power off your device - + You may have to force power off by holding the power button - + If you see the Luma Configuration screen, continue with the guide without powering off - -#### Section IV - Configuring Luma3DS - -1. Boot your device while holding (Select) to launch the Luma configuration menu - + If you encounter issues launching the Luma configuration menu, [follow this troubleshooting guide](https://github.com/zoogie/b9sTool/blob/master/TROUBLESHOOTING.md) -1. Use the (A) button and the D-Pad to turn on the following: - + **"Show NAND or user string in System Settings"** -1. Press (Start) to save and reboot - + Your device should load the Home Menu after a short delay. If you get a black screen lasting longer than 5 minutes, [follow this troubleshooting guide](troubleshooting#black-screen-on-sysnand-boot-after-installing-boot9strap) - -#### Section V - Restoring DS Connection Settings - -1. Power off your device -1. Insert your SD card into your computer -1. Copy the `42383841.bin` file from the `output/clean/` folder of the downloaded DSiWare archive (`fredtool_output.zip`) to the `Nintendo 3DS//<32-character-id>/Nintendo DSiWare/` folder on your SD card - + Replace the existing `42383841.bin` file -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Nintendo DSi™" title -1. Select "Copy", then select "OK" - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/da_DK/installing-boot9strap-(usm).txt b/_pages/da_DK/installing-boot9strap-(usm).txt deleted file mode 100644 index 079b370df0..0000000000 --- a/_pages/da_DK/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,92 +0,0 @@ ---- -title: "Installing boot9strap (USM)" ---- - -{% include toc title="Table of Contents" %} - -### Required Reading - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile to your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. - -If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, you will need to use a [Legacy Method](legacy-methods). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--danger} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer](seedminer) -* The latest release archive for [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) - -#### Section I - Prep Work - -1. Open [unSAFE_MODE-bb3 tool](https://usm.bruteforcemovable.com/) on your computer - + If this site is nonfunctional, try using [this one](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) -1. Upload your movable.sed using the "Choose File" option -1. Click "Download unSAFE_MODE-bb3 archive" - + This will download an exploit DSiWare called `F00D43D5.bin` and a SAFE_MODE exploit data file called `usm.bin` inside of a zip folder (`unSAFE_MODE-bb3.zip`) -1. If your console is powered on, power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Copy `usm.bin` from the USM archive (`unSAFE_MODE-bb3.zip`) to the root of your SD card -1. Navigate to `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card - + This `` will be the same one that you used in [Seedminer](seedminer) - + If `Nintendo DSiWare` does not exist, create it -1. If there are any existing DSiWare backup files (`<8-character-id>.bin`) in this folder, move them to your PC - + This will leave you with an empty Nintendo DSiWare folder. Moving the files to your PC ensures you don't delete any intentional backups -1. Copy the `F00D43D5.bin` file from the USM archive (`unSAFE_MODE-bb3.zip`) to the `Nintendo DSiWare` folder - -#### Section II - BannerBomb3 - -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your bottom screen should flash Red and then the system will reboot to home menu a few seconds later. This means the exploit profile was successfully copied - + If the bottom screen does not flash Red, the exploit profile was not copied and you will not be able to complete the next section. Ensure that your files are properly placed, then try again -1. Power off your device - -#### Section III - unSAFE_MODE - -1. With your system still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), then press (Power) - + Release the buttons after a few seconds. Your console will boot into Safe Mode -1. Press "OK" to accept the update - + There is no update. This is part of the exploit -1. Press "I accept" to accept the terms and conditions -1. The update will eventually fail, with error code `003-1099`. This is intended behaviour -1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` -1. Once you see `B9S install SUCCESS` on the top screen, press any button to reboot to Luma Configuration - -#### Section IV - Configuring Luma3DS - -1. Your device should automatically show the Luma Configuration menu -1. Use the (A) button and the D-Pad to turn on the following: - + **"Show NAND or user string in System Settings"** -1. Press (Start) to save and reboot - + Your device should load the Home Menu after a short delay. If you get a black screen lasting longer than 5 minutes, [follow this troubleshooting guide](troubleshooting#black-screen-on-sysnand-boot-after-installing-boot9strap) - -#### Section V - Restoring WiFi Configuration Profiles - -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your bottom screen should flash Green and then the system will reboot to home menu a few seconds later. This means your WiFi configuration profiles were successfully restored -1. Power your system off -1. Insert your SD card into your computer -1. Navigate to `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card - + This `` will be the same one that you used in [Seedminer](seedminer) -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Continue to Finalizing Setup - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/de_DE/dumping-movable-(nimhax).txt b/_pages/de_DE/dumping-movable-(nimhax).txt deleted file mode 100644 index 2d2d00731e..0000000000 --- a/_pages/de_DE/dumping-movable-(nimhax).txt +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: "Movable dumpen (nimhax)" ---- - -{% include toc title="Inhalt" %} - -{% capture technical_info %} -Technische Details (optional) - -To install boot9strap on your console, we derive your console's unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console. - -Für eine technischere Erklärung, siehe [hier](https://github.com/luigoalma/nimhax/) für mehr Informationen über den nimhax Exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Was du brauchst - -* Die neueste Version von [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (die nimhax `.zip` Datei) - -### Anleitung - -#### Abschnitt I - Vorbereitungen - -1. Power off your console -1. Stecke deine SD-Karte in deinen Computer -1. Kopiere den `nimhax` Ordner aus der nimhax `.zip` in den `3ds` Ordner auf deiner SD-Karte -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) -{: .notice--info} - -#### Section II - nimhax - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch nimhax from the list of homebrew -1. If the exploit was successful, a `movable.sed` file will appear on the root of your SD card - -### Next step: Frogtool - -Once you have your console's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \ -While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you're unable to use a torrent client. - -Continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--primary} diff --git a/_pages/de_DE/homebrew-launcher-(freakyhax).txt b/_pages/de_DE/homebrew-launcher-(freakyhax).txt deleted file mode 100644 index 4da75632e9..0000000000 --- a/_pages/de_DE/homebrew-launcher-(freakyhax).txt +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: "Homebrew Launcher (freakyhax)" ---- - -{% include toc title="Inhalt" %} - -{% capture technical_info %} -Technische Details (optional) -[freakyhax](https://plutooo.github.io/freakyhax/) is an exploit for the game Freakyforms Deluxe discovered and released by [plutooo](https://github.com/plutooo). It works on versions 9.0.0 through 11.17.0 on EUR, USA and JPN region consoles. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -### Was du brauchst - -+ A EUR/USA/JPN copy of Freakyforms Deluxe (eShop or cartridge) -+ The latest release of [freakyhax](https://github.com/plutooo/freakyhax/releases/latest) -* Die neueste Version von [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (die Luma3DS `.zip` Datei) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Anleitung - -#### Abschnitt I - Vorbereitungen - -1. Power off your console -1. Stecke deine SD-Karte in deinen Computer -1. Copy all files and folders inside the `/build//exploit/` folder from the freakyhax `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - freakyhax - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch Freakyforms Deluxe -1. In the game menu, select `Play -> Camera -> Load a QR code` -1. Select the QR code -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/de_DE/homebrew-launcher-(ninjhax2-dx).txt b/_pages/de_DE/homebrew-launcher-(ninjhax2-dx).txt deleted file mode 100644 index a6e746375d..0000000000 --- a/_pages/de_DE/homebrew-launcher-(ninjhax2-dx).txt +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "Homebrew Launcher (ninjhax2-dx)" ---- - -{% include toc title="Inhalt" %} - -{% capture technical_info %} -Technische Details (optional) -[Ninjhax2](https://github.com/smealum/ninjhax2.x) is an exploit for the game "Cubic Ninja" made by [smealum](https://github.com/smealum). This page uses an updated version of ninjhax by [zoogie](https://github.com/zoogie) called [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx), which supports 11.17.0. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -This process will overwrite your Cubic Ninja save file, if you have one. -{: .notice--warning} - -### Was du brauchst -* The game "Cubic Ninja" -* The latest release of [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx/releases) -* Die neueste Version von [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (die Luma3DS `.zip` Datei) - -### Anleitung - -#### Abschnitt I - Vorbereitungen - -1. Power off your console -1. Stecke deine SD-Karte in deinen Computer -1. Copy `Launcher.dat` from the folder appropriate for your console from the ninjhax2-dx `.zip` file to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - -#### Section II - ninjhax2-dx -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Cubic Ninja" once and select "Create" - + If prompted, delete all data -1. Select "QR Code" -1. Select "Scan QR Code" -1. On your PC, open the browser and go to [ninjhax2-dx website](https://zoogie.github.io/web/nh2dx/) -1. Select your console's region and hardware -1. On your console, scan the QR code - + If the game exits to the HOME Menu, then the exploit has installed correctly -1. Launch "Cubic Ninja" again -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/de_DE/homebrew-launcher-(pichaxx).txt b/_pages/de_DE/homebrew-launcher-(pichaxx).txt deleted file mode 100644 index 09ff5b1556..0000000000 --- a/_pages/de_DE/homebrew-launcher-(pichaxx).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (PicHaxx)" ---- - -{% include toc title="Inhalt" %} - -{% capture technical_info %} -Technische Details (optional) -[PicHaxx](https://github.com/zoogie/pichaxx) is an exploit for the game Pokémon Picross released by [zoogie](https://github.com/zoogie), originally discovered and [demonstrated](https://twitter.com/mrnbayoh/status/744899681663258624) by [MrNbaYoh](https://github.com/MrNbaYoh). - -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### Was du brauchst - -+ The game "Pokémon Picross" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Pokémon Picross -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Anleitung - -#### Abschnitt I - Vorbereitungen - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Stecke deine SD-Karte in deinen Computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card - -![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - PicHaxx - -In this section, you will create a hacked Pokémon Picross save file that, when loaded, will run the Homebrew Launcher on your console. - -1. Open [the PicHaxx Injector website](https://3dstools.nhnarwhal.com/#/pichaxx) on your computer -1. Select your `movable.sed` file -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `0017c100` -> `data` on your SD card - + The `` will be the same one that you used in Seedminer - + Die `` ist ein 32 Zeichen langer Ordner innerhalb der `` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted - - ![]({{ "/images/screenshots/pichaxx-save-location.png" | absolute_url }}) - {: .notice--info} - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Pokémon Picross" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher - + If you get an error message, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-pichaxx) -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/de_DE/homebrew-launcher-(smilehax-iie).txt b/_pages/de_DE/homebrew-launcher-(smilehax-iie).txt deleted file mode 100644 index 9f87a9df02..0000000000 --- a/_pages/de_DE/homebrew-launcher-(smilehax-iie).txt +++ /dev/null @@ -1,70 +0,0 @@ ---- -title: "Homebrew Launcher (smilehax-IIe)" ---- - -{% include toc title="Inhalt" %} - -This set of instructions does not support the Japanese version of SmileBASIC. -{: .notice--warning} - -{% capture technical_info %} -Technische Details (optional) -[smilehax-IIe](https://github.com/zoogie/smilehax-IIe) is an exploit for the game "SmileBASIC" made by zoogie, compatible with system versions 9.0.0 through 11.17.0 for USA/EUR/JPN region consoles. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Was du brauchst -+ The game "SmileBASIC" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install SmileBASIC -+ The latest release of [smilehax-IIe](https://github.com/zoogie/smilehax-IIe/releases/download/v1.1/Release_sh2e_v1.1.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Anleitung - -#### Abschnitt I - Vorbereitungen - -1. Power off your console -1. Stecke deine SD-Karte in deinen Computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Transfer the `.wav` for your region from the Release_sh2e `.zip` to a device that can play `.wav` files, for example a phone -1. Copy the petitcom `.icn` for your region to the root of your SD card - -#### Section II - smilehax - -1. Launch SmileBASIC - + Update the game if prompted -1. Select the "Publish/Download Projects" option -1. Select the "Download (Receive) using Public Key" option -1. Press the "Yes" button -1. Enter the Public Key "NJEQK3A4" using the on-screen keyboard -1. Press the "Yes" button to confirm the download of PMODEM141 -1. Press "OK", then "Back", then "Browse Projects" -1. Select PMODEM141, then press "Select File" -1. Select PMODEM141.PRG, then press "OK", then "Yes" to execute it -1. Select RECEIVE FILE SIMPLEX -1. Prepare the device you use to play the `.wav` file -1. Keep your console about a foot from the `.wav` file playing devices' speaker and use a reasonable (not loud) volume to play the `.wav` -1. Now select 300BPS, then play the `.wav` file -1. When it finishes, press "Yes", then press "OK" -1. Press the START button -1. Select the SH2E-xxx.TXT file, then press OK, then "Yes" to execute it - + If you get kicked back into menu, make sure you're using the latest version of SmileBASIC -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/de_DE/homebrew-launcher-(steelhax).txt b/_pages/de_DE/homebrew-launcher-(steelhax).txt deleted file mode 100644 index fd075c0ce2..0000000000 --- a/_pages/de_DE/homebrew-launcher-(steelhax).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (Steelhax)" ---- - -{% include toc title="Inhalt" %} - -{% capture technical_info %} -Technische Details (optional) -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Steel Diver: Sub Wars, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Steel Diver: Sub Wars save file, if you have one. If you wish to preserve your Steel Diver: Sub Wars game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### Was du brauchst - -+ The game "Steel Diver: Sub Wars" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Steel Diver: Sub Wars -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Steelhax](/assets/steelhax-release.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Anleitung - -#### Abschnitt I - Vorbereitungen - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Stecke deine SD-Karte in deinen Computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the `steelhax` folder from the `Steelhax-release.zip` to the root of your SD card -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - Steelminer - -In this section, you will create a hacked Steel Diver: Sub Wars save file that, when used, will load the Homebrew Launcher on your console. - -1. Launch "Steel Diver: Sub Wars" once and select a Mii to initialize your save file - + Decline the game update when prompted - + If you have already updated the game, use the Data Management menu of the System Settings to delete the update -1. Exit "Steel Diver: Sub Wars" -1. Power off your console -1. Stecke deine SD-Karte in deinen Computer -1. Open [the SteelHax Save Tool website](https://3dstools.nhnarwhal.com/#/steelhax) on your computer -1. Select your `movable.sed` file -1. Select your region based on your console -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `<8-character-region>` -> `data` on your SD card - + **EUR Region**: `000d7e00` - + **JPN Region**: `000d7c00` - + **USA Region**: `000d7d00` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Steel Diver: Sub Wars" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/de_DE/homebrew-launcher-(super-skaterhax).txt b/_pages/de_DE/homebrew-launcher-(super-skaterhax).txt deleted file mode 100644 index 48c7556286..0000000000 --- a/_pages/de_DE/homebrew-launcher-(super-skaterhax).txt +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: "Homebrew Launcher (super-skaterhax)" ---- - -{% include toc title="Inhalt" %} - -{% capture technical_info %} -Technische Details (optional) -For technical details on the exploits that you will be using on this page, see [here](https://github.com/zoogie/super-skaterhax). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Kompatibilitätshinweise - -Super-skaterhax (when used to launch the Homebrew Launcher) is compatible with New models on version 11.16.0 in all regions, and 11.17.0 in the EUR, JPN and USA regions. - -The instructions provided only apply to the New 3DS, New 3DS XL, and New 2DS XL. Please ensure that the console you are modding is a New 3DS, New 3DS XL, or New 2DS XL before continuing. -{: .notice--warning} - -### Was du brauchst - -* Die neueste Version von [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (die Luma3DS `.zip` Datei) -* The latest release of [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (the release `.zip` file) - -#### Abschnitt I - Vorbereitungen - -In this section, you will copy the files needed to trigger both super-skaterhax and the Homebrew Launcher. - -1. Power off your console -1. Stecke deine SD-Karte in deinen Computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy everything inside the folder for your console's region (and also system version if the region is USA) in the super-skaterhax `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/skater-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - super-skaterhax - -In this section, you will visit the browser exploit webpage, which will launch the Homebrew Launcher. - -If you haven't already, make sure you have a working Internet connection set up on your console. -{: .notice--info} - -1. On the HOME Menu, press the Left and Right shoulder buttons at the same time to open the camera - + If you are unable to open the camera, open the Internet Browser and manually type the URL instead (`https://zoogie.github.io/web/super/` for EUR/USA/JPN, `https://zoogie.github.io/web/korea` for KOR) -1. Tap the QR code button and scan one of the following QR codes for your console's region [here](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png) - + If you get a security certificate warning, press (A) to allow the connection -1. Press the (Select) button to open the bookmark tab - + If your (Select) button does not respond, tap the star icon on the bottom-left corner of the screen -1. Tap "Bookmark this page" -1. Press (B) once to return to the browser -1. Press (Start) to open the context menu - + If your (Start) button does not respond, tap the 3-line menu on the bottom-right corner of the screen -1. Tap on "Settings" -1. Tap on "Delete Cookies" -1. Drücke (A), um fortzufahren -1. Press (Home) to return to the HOME Menu, then immediately press (A) to launch the browser again -1. Select the "GO GO!" button on the top screen - + If any prompts appear, approve all of them - + If your console freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your console freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section - + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/de_DE/include/fredtool-prep.txt b/_pages/de_DE/include/fredtool-prep.txt deleted file mode 100644 index d5de81bfa4..0000000000 --- a/_pages/de_DE/include/fredtool-prep.txt +++ /dev/null @@ -1,29 +0,0 @@ -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Stecke deine SD-Karte in deinen Computer -1. Öffne die [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) Webseite auf deinem Computer -1. Bei dem "Username" Feld, gib irgendeinen normalen Namen (keine Leerzeichen oder Sonderzeichen) an -1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option -1. Wähle beim "MovableSed" Feld deine `movable.sed` Datei mit der "Browse..." Option aus -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Drücke auf "Build" - + Warte ein paar Sekunden, bis der Erstellungsprozess abgeschlossen ist -1. Gib im Abschnitt Build-Verlauf links den Benutzernamen in das "suchen" Feld ein -1. Klicke das erste Suchergebnis - + Dieses Ergebnis sollte das neuste sein -1. Drücke auf den "output_(name).zip" Link -1. Navigiere zu `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` auf deiner SD-Karte - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Kopiere den `private` Ordner von der Frogminer_save `.zip` in das Stammverzeichnis deiner SD-Karte -1. Reinsert your SD card into your console -1. Power on your console - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} \ No newline at end of file diff --git a/_pages/de_DE/include/hbl-common-exploits-movable.txt b/_pages/de_DE/include/hbl-common-exploits-movable.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/de_DE/include/hbl-common-exploits-movable.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/de_DE/include/hbl-common-exploits.txt b/_pages/de_DE/include/hbl-common-exploits.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/de_DE/include/hbl-common-exploits.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/de_DE/installing-boot9strap-(fredtool).txt b/_pages/de_DE/installing-boot9strap-(fredtool).txt deleted file mode 100644 index e93a652a28..0000000000 --- a/_pages/de_DE/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool)" ---- - -{% include toc title="Inhalt" %} - -{% capture technical_info %} -Technische Details (optional) - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### Was du brauchst - -* Deine `movable.sed` Datei vom [Seedminer](seedminer) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) -* Die neueste Version von [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (die Luma3DS `.zip` Datei) - -#### Abschnitt I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Abschnitt V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Fortfahren mit [Setup fertigstellen](finalizing-setup) -{: .notice--primary} diff --git a/_pages/de_DE/installing-boot9strap-(fredtool-legacy).txt b/_pages/de_DE/installing-boot9strap-(fredtool-legacy).txt deleted file mode 100644 index 4fd2307d37..0000000000 --- a/_pages/de_DE/installing-boot9strap-(fredtool-legacy).txt +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool, Legacy)" ---- - -{% include toc title="Inhalt" %} - -{% capture technical_info %} -Technische Details (optional) - -Um ein DSiWare-Backup erstellen zu können, nutzen wir eine Schwachstelle im DSiWare-Datenverwaltungs-Fenster der Systemeinstellungen aus. - -Um das zu erreichen, werden wir die Verschlüsselung (movable.sed) nutzen, um ein DSiWare-Backup zu erstellen, das das System dazu bringen wird, die DSi Internet Einstellungs-Software zur SD-Karte zu kopieren. - -Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### Was du brauchst - -* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) -* Die neueste Version von [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (die Luma3DS `.zip` Datei) - -#### Abschnitt I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Abschnitt V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Fortfahren mit [Setup fertigstellen](finalizing-setup) -{: .notice--primary} diff --git a/_pages/de_DE/installing-boot9strap-(frogtool).txt b/_pages/de_DE/installing-boot9strap-(frogtool).txt deleted file mode 100644 index 08de010eec..0000000000 --- a/_pages/de_DE/installing-boot9strap-(frogtool).txt +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Installing boot9strap (Frogtool)" ---- - -{% include toc title="Inhalt" %} - -{% capture technical_info %} -Technische Details (optional) -For technical details on the exploits that you will be using on this page, see "DSiWare_Exports CTCert verification" and "FIRM partitions known-plaintext" [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - - -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) link for `frogcert.bin` on this page, you will need a torrent client like [qBittorrent](https://www.qbittorrent.org/download.php) or [Deluge](http://dev.deluge-torrent.org/wiki/Download). -{: .notice--warning} - -### Was du brauchst - -* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link) -* The latest release of [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (direct download) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) - -#### Abschnitt I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Abschnitt II - Vorbereitungen - -1. Power off your console -1. Stecke deine SD-Karte in deinen Computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Copy `boot.nds` (b9sTool) from the b9sTool release `.zip` to the root of your SD card -1. Erstelle einen Ordner namens `3ds` im Stammverzeichnis deiner SD-Karte falls er noch nicht existiert - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy the `Frogtool` folder from the Frogtool-nimhax `.zip` to the `/3ds/` folder on your SD card -1. Copy `frogcert.bin` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section III - Patching DS Download Play - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch Frogtool from the list of homebrew -1. Select the "INJECT patched DS Download Play" option -1. Frogtool will automatically run and inject the JPN version of Flipnote Studio into your DS Download Play -1. Once this operation has finished, read the screens and check if the process was successful -1. Tap the touch screen, then select "BOOT patched DS Download Play" -1. If the exploit was successful, your console will have loaded the JPN version of Flipnote Studio - + If you get stuck on a black screen, follow [this](https://wiki.hacks.guide/wiki/3DS:TWLFix#Userland_(PicHaxx,_Steelhax,_etc.)-0) page, then try again - -#### Section IV - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsdlp" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Abschnitt VII - DS Download-Spiel wiederherstellen - -1. Starte die Download-Spiel Anwendung -1. Warte bis du die zwei Knöpfe siehst - + Drücke keine der Tasten -1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu -1. Wähle "Miscellaneous options" -1. Wähle "Switch the hb. title to the current app." -1. Drücke (B) um fortzufahren -1. Drücke (B), um zum Rosalina-Hauptmenü zurückzukehren -1. Drücke (B), um das Rosalina-Menü zu schließen -1. Drücke (Home) und schließe die Download-Spiel Anwendung -1. Starte die Download-Spiel Anwendung erneut -1. Your console should load the Homebrew Launcher -1. Launch Frogtool from the list of homebrew -1. Select the "RESTORE clean DS Download Play" option -1. Once this operation has finished, read the screens and check if the process was successful - + If there are any errors or missing files, correct the problem and try again -1. If the process was successful, tap the touch screen, then press START to exit -1. Power off your console - -___ - -### Fortfahren mit [Setup fertigstellen](finalizing-setup) -{: .notice--primary} diff --git a/_pages/de_DE/installing-boot9strap-(hbl-usm).txt b/_pages/de_DE/installing-boot9strap-(hbl-usm).txt deleted file mode 100644 index fc82f1d360..0000000000 --- a/_pages/de_DE/installing-boot9strap-(hbl-usm).txt +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "Installing boot9strap (HBL-USM)" ---- - -{% include toc title="Inhalt" %} - -{% capture technical_info %} -Technische Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Kompatibilitätshinweise - -If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--danger} - -### Was du brauchst - -* Die neueste Version vom [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (Direkter Download) -* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) (direct download) - -#### Abschnitt I - Vorbereitungen - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. Then, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Stecke deine SD-Karte in deinen Computer -1. Erstelle einen Ordner namens `boot9strap` im Stammverzeichnis deiner SD-Karte -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the RELEASE `.zip` to the `/boot9strap/` folder on your SD card -1. Erstelle einen Ordner namens `3ds` im Stammverzeichnis deiner SD-Karte falls er noch nicht existiert - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy `slotTool.3dsx` from the `slotTool` folder inside the RELEASE `.zip` to the `/3ds/` folder on your SD card -1. Copy `usm.bin` from the RELEASE `.zip` to the root folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Starte slotTool aus der Liste der Homebrew-Anwendungen - + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section -1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option - + You will see some on-screen text and then your system will shut down - -![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Schritt III - boot9strap installieren - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section IV - Restoring WiFi Configuration Profiles - -{% include_relative include/remove-usm-slottool.txt %} - -___ - -### Fortfahren mit [Setup fertigstellen](finalizing-setup) -{: .notice--primary} diff --git a/_pages/de_DE/installing-boot9strap-(usm).txt b/_pages/de_DE/installing-boot9strap-(usm).txt deleted file mode 100644 index 09df29c1ba..0000000000 --- a/_pages/de_DE/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: "boot9strap installieren (USM)" ---- - -{% include toc title="Inhalt" %} - -{% capture technical_info %} -Technische Details (optional) - -Um die SAFE_MODE Firmware unseres Systems auszunutzen, müssen wir ein präpariertes WiFi-Profil einfügen. - -Wir können dies mit einem bestehenden Exploit, BannerBomb3, tun. - -Um dies zu erreichen, verwenden wir den Verschlüsselungsschlüssel deines Systems (movable.sed). Dieser Key wird benötigt, um ein DSiWare-Backup zu erstellen, welches das System ausnutzt, um das ausgenutzte WiFi-Profil in deine Verbindungsliste zu injizieren. - -Wenn das WiFi-Profil injiziert wurde, nutzen wir SAFE_MODE, ein Recovery-Feature, welches auf allen 3DS Konsolen existiert, um das präperierte WiFi-Profil zu aktivieren. - -Für eine mehr technische Erklärung, lies die folgenden Links für Informationen zu den BannerBomb3 und unSAFE_MODE Exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Kompatibilitätshinweise - -Diese Anleitung funktioniert mit den folgenden Konsolenregionen: USA, Europa, Japan und Korea, welche anhand den Buchstaben U, E, J oder K nach der Systemversion erkennbar sind. - -Wenn deine (Rechts/Links-Schulter), (Steuerkreuz oben) oder (A) Tasten nicht funktionieren, musst du [einem alternativen Zweig von Seedminer](installing-boot9strap-(fredtool)) folgen. Um Hilfe in dieser Angelegenheit zu erhalten, trete dem [Nintendo Homebrew auf Discord](https://discord.gg/MWxPgEp) bei und frage in Englisch nach Hilfe. -{: .notice--warning} - -### Was du benötigst - -* Die neueste Version vom [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (Direkter Download) -* Die neueste Version von [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (Direkter Download) -* Die neueste Version von [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (die Luma3DS `.zip` Datei) -* [usm.bin](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direkter Download) - - -#### Abschnitt I - Vorbereitungen - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. - -1. Deine SD-Karte sollte in deinem Computer eingesteckt sein -1. Kopiere `usm.bin` in das Stammverzeichnis deiner SD-Karte -1. Kopiere `boot.firm` und `boot.3dsx` von der Luma3DS `.zip` in das Stammverzeichnis deiner SD-Karte - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Erstelle einen Ordner namens `boot9strap` im Stammverzeichnis deiner SD-Karte -1. Kopiere `boot9strap.firm` und `boot9strap.firm.sha` aus der boot9strap `.zip` in den `/boot9strap/`-Ordner auf deiner SD-Karte -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card - -![]({{ "/images/screenshots/usm/usm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If the BB3 multihax menu doesn't open, [follow this troubleshooting guide](troubleshooting#bannerbomb3) - + If the BB3 multihax menu says "cfw installed already", you already have custom firmware and should continue from [here](checking-for-cfw) -1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" - + Your console will automatically power off -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Internet Settings` -> `Connection Settings` -1. Ensure that all three connections are named "Haaaaaaaxxxxxxxxx..." - + Do NOT change these settings! - + If all three connections are NOT all named "Haaaaaaaxxxxxxxxx...", STOP! Something went wrong in this section and MUST be fixed before you can continue -1. Power off your console - -#### Section III - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section IV - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section V - Restoring WiFi Configuration Profiles - -In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. - -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" - + Your console will automatically reboot -1. Power off your console -1. Stecke deine SD-Karte in deinen Computer -1. Navigiere zu `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` auf deiner SD-Karte -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore - -___ - -### Fortfahren mit [Setup fertigstellen](finalizing-setup) -{: .notice--primary} diff --git a/_pages/el_GR/dumping-movable-(nimhax).txt b/_pages/el_GR/dumping-movable-(nimhax).txt deleted file mode 100644 index 6b3e453c92..0000000000 --- a/_pages/el_GR/dumping-movable-(nimhax).txt +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: "Dumping Movable (nimhax)" ---- - -{% include toc title="Πίνακας περιεχομένων" %} - -{% capture technical_info %} -Technical Details (optional) - -To install boot9strap on your console, we derive your console's unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console. - -For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need - -* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Εισάγετε την κάρτα SD στον υπολογιστή σας -1. Copy the `nimhax` folder from the nimhax `.zip` to the `/3ds/` folder on your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) -{: .notice--info} - -#### Section II - nimhax - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch nimhax from the list of homebrew -1. If the exploit was successful, a `movable.sed` file will appear on the root of your SD card - -### Next step: Frogtool - -Once you have your console's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \ -While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you're unable to use a torrent client. - -Continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--primary} diff --git a/_pages/el_GR/homebrew-launcher-(freakyhax).txt b/_pages/el_GR/homebrew-launcher-(freakyhax).txt deleted file mode 100644 index 0a1d1cef1c..0000000000 --- a/_pages/el_GR/homebrew-launcher-(freakyhax).txt +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: "Homebrew Launcher (freakyhax)" ---- - -{% include toc title="Πίνακας περιεχομένων" %} - -{% capture technical_info %} -Technical Details (optional) -[freakyhax](https://plutooo.github.io/freakyhax/) is an exploit for the game Freakyforms Deluxe discovered and released by [plutooo](https://github.com/plutooo). It works on versions 9.0.0 through 11.17.0 on EUR, USA and JPN region consoles. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -### What You Need - -+ A EUR/USA/JPN copy of Freakyforms Deluxe (eShop or cartridge) -+ The latest release of [freakyhax](https://github.com/plutooo/freakyhax/releases/latest) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Εισάγετε την κάρτα SD στον υπολογιστή σας -1. Copy all files and folders inside the `/build//exploit/` folder from the freakyhax `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - freakyhax - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch Freakyforms Deluxe -1. In the game menu, select `Play -> Camera -> Load a QR code` -1. Select the QR code -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/el_GR/homebrew-launcher-(ninjhax2-dx).txt b/_pages/el_GR/homebrew-launcher-(ninjhax2-dx).txt deleted file mode 100644 index 01603d3e47..0000000000 --- a/_pages/el_GR/homebrew-launcher-(ninjhax2-dx).txt +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "Homebrew Launcher (ninjhax2-dx)" ---- - -{% include toc title="Πίνακας περιεχομένων" %} - -{% capture technical_info %} -Technical Details (optional) -[Ninjhax2](https://github.com/smealum/ninjhax2.x) is an exploit for the game "Cubic Ninja" made by [smealum](https://github.com/smealum). This page uses an updated version of ninjhax by [zoogie](https://github.com/zoogie) called [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx), which supports 11.17.0. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -This process will overwrite your Cubic Ninja save file, if you have one. -{: .notice--warning} - -### What You Need -* The game "Cubic Ninja" -* The latest release of [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx/releases) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Εισάγετε την κάρτα SD στον υπολογιστή σας -1. Copy `Launcher.dat` from the folder appropriate for your console from the ninjhax2-dx `.zip` file to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - -#### Section II - ninjhax2-dx -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Cubic Ninja" once and select "Create" - + If prompted, delete all data -1. Select "QR Code" -1. Select "Scan QR Code" -1. On your PC, open the browser and go to [ninjhax2-dx website](https://zoogie.github.io/web/nh2dx/) -1. Select your console's region and hardware -1. On your console, scan the QR code - + If the game exits to the HOME Menu, then the exploit has installed correctly -1. Launch "Cubic Ninja" again -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/el_GR/homebrew-launcher-(pichaxx).txt b/_pages/el_GR/homebrew-launcher-(pichaxx).txt deleted file mode 100644 index e1f5cad39f..0000000000 --- a/_pages/el_GR/homebrew-launcher-(pichaxx).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (PicHaxx)" ---- - -{% include toc title="Πίνακας περιεχομένων" %} - -{% capture technical_info %} -Technical Details (optional) -[PicHaxx](https://github.com/zoogie/pichaxx) is an exploit for the game Pokémon Picross released by [zoogie](https://github.com/zoogie), originally discovered and [demonstrated](https://twitter.com/mrnbayoh/status/744899681663258624) by [MrNbaYoh](https://github.com/MrNbaYoh). - -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Pokémon Picross" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Pokémon Picross -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Prep Work - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Εισάγετε την κάρτα SD στον υπολογιστή σας -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card - -![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - PicHaxx - -In this section, you will create a hacked Pokémon Picross save file that, when loaded, will run the Homebrew Launcher on your console. - -1. Open [the PicHaxx Injector website](https://3dstools.nhnarwhal.com/#/pichaxx) on your computer -1. Select your `movable.sed` file -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `0017c100` -> `data` on your SD card - + The `` will be the same one that you used in Seedminer - + The `` is a 32 character long folder inside of the `` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted - - ![]({{ "/images/screenshots/pichaxx-save-location.png" | absolute_url }}) - {: .notice--info} - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Pokémon Picross" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher - + If you get an error message, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-pichaxx) -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/el_GR/homebrew-launcher-(smilehax-iie).txt b/_pages/el_GR/homebrew-launcher-(smilehax-iie).txt deleted file mode 100644 index 4f8e64783b..0000000000 --- a/_pages/el_GR/homebrew-launcher-(smilehax-iie).txt +++ /dev/null @@ -1,70 +0,0 @@ ---- -title: "Homebrew Launcher (smilehax-IIe)" ---- - -{% include toc title="Πίνακας περιεχομένων" %} - -This set of instructions does not support the Japanese version of SmileBASIC. -{: .notice--warning} - -{% capture technical_info %} -Technical Details (optional) -[smilehax-IIe](https://github.com/zoogie/smilehax-IIe) is an exploit for the game "SmileBASIC" made by zoogie, compatible with system versions 9.0.0 through 11.17.0 for USA/EUR/JPN region consoles. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need -+ The game "SmileBASIC" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install SmileBASIC -+ The latest release of [smilehax-IIe](https://github.com/zoogie/smilehax-IIe/releases/download/v1.1/Release_sh2e_v1.1.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Εισάγετε την κάρτα SD στον υπολογιστή σας -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Transfer the `.wav` for your region from the Release_sh2e `.zip` to a device that can play `.wav` files, for example a phone -1. Copy the petitcom `.icn` for your region to the root of your SD card - -#### Section II - smilehax - -1. Launch SmileBASIC - + Update the game if prompted -1. Select the "Publish/Download Projects" option -1. Select the "Download (Receive) using Public Key" option -1. Press the "Yes" button -1. Enter the Public Key "NJEQK3A4" using the on-screen keyboard -1. Press the "Yes" button to confirm the download of PMODEM141 -1. Press "OK", then "Back", then "Browse Projects" -1. Select PMODEM141, then press "Select File" -1. Select PMODEM141.PRG, then press "OK", then "Yes" to execute it -1. Select RECEIVE FILE SIMPLEX -1. Prepare the device you use to play the `.wav` file -1. Keep your console about a foot from the `.wav` file playing devices' speaker and use a reasonable (not loud) volume to play the `.wav` -1. Now select 300BPS, then play the `.wav` file -1. When it finishes, press "Yes", then press "OK" -1. Press the START button -1. Select the SH2E-xxx.TXT file, then press OK, then "Yes" to execute it - + If you get kicked back into menu, make sure you're using the latest version of SmileBASIC -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/el_GR/homebrew-launcher-(steelhax).txt b/_pages/el_GR/homebrew-launcher-(steelhax).txt deleted file mode 100644 index 19ef5b83e3..0000000000 --- a/_pages/el_GR/homebrew-launcher-(steelhax).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (Steelhax)" ---- - -{% include toc title="Πίνακας περιεχομένων" %} - -{% capture technical_info %} -Technical Details (optional) -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Steel Diver: Sub Wars, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Steel Diver: Sub Wars save file, if you have one. If you wish to preserve your Steel Diver: Sub Wars game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Steel Diver: Sub Wars" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Steel Diver: Sub Wars -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Steelhax](/assets/steelhax-release.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Prep Work - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Εισάγετε την κάρτα SD στον υπολογιστή σας -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the `steelhax` folder from the `Steelhax-release.zip` to the root of your SD card -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - Steelminer - -In this section, you will create a hacked Steel Diver: Sub Wars save file that, when used, will load the Homebrew Launcher on your console. - -1. Launch "Steel Diver: Sub Wars" once and select a Mii to initialize your save file - + Decline the game update when prompted - + If you have already updated the game, use the Data Management menu of the System Settings to delete the update -1. Exit "Steel Diver: Sub Wars" -1. Power off your console -1. Εισάγετε την κάρτα SD στον υπολογιστή σας -1. Open [the SteelHax Save Tool website](https://3dstools.nhnarwhal.com/#/steelhax) on your computer -1. Select your `movable.sed` file -1. Select your region based on your console -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `<8-character-region>` -> `data` on your SD card - + **EUR Region**: `000d7e00` - + **JPN Region**: `000d7c00` - + **USA Region**: `000d7d00` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Steel Diver: Sub Wars" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/el_GR/homebrew-launcher-(super-skaterhax).txt b/_pages/el_GR/homebrew-launcher-(super-skaterhax).txt deleted file mode 100644 index 06a728bc2b..0000000000 --- a/_pages/el_GR/homebrew-launcher-(super-skaterhax).txt +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: "Homebrew Launcher (super-skaterhax)" ---- - -{% include toc title="Πίνακας περιεχομένων" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see [here](https://github.com/zoogie/super-skaterhax). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -Super-skaterhax (when used to launch the Homebrew Launcher) is compatible with New models on version 11.16.0 in all regions, and 11.17.0 in the EUR, JPN and USA regions. - -The instructions provided only apply to the New 3DS, New 3DS XL, and New 2DS XL. Please ensure that the console you are modding is a New 3DS, New 3DS XL, or New 2DS XL before continuing. -{: .notice--warning} - -### What You Need - -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* The latest release of [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (the release `.zip` file) - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger both super-skaterhax and the Homebrew Launcher. - -1. Power off your console -1. Εισάγετε την κάρτα SD στον υπολογιστή σας -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy everything inside the folder for your console's region (and also system version if the region is USA) in the super-skaterhax `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/skater-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - super-skaterhax - -In this section, you will visit the browser exploit webpage, which will launch the Homebrew Launcher. - -If you haven't already, make sure you have a working Internet connection set up on your console. -{: .notice--info} - -1. On the HOME Menu, press the Left and Right shoulder buttons at the same time to open the camera - + If you are unable to open the camera, open the Internet Browser and manually type the URL instead (`https://zoogie.github.io/web/super/` for EUR/USA/JPN, `https://zoogie.github.io/web/korea` for KOR) -1. Tap the QR code button and scan one of the following QR codes for your console's region [here](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png) - + If you get a security certificate warning, press (A) to allow the connection -1. Press the (Select) button to open the bookmark tab - + If your (Select) button does not respond, tap the star icon on the bottom-left corner of the screen -1. Tap "Bookmark this page" -1. Press (B) once to return to the browser -1. Press (Start) to open the context menu - + If your (Start) button does not respond, tap the 3-line menu on the bottom-right corner of the screen -1. Tap on "Settings" -1. Tap on "Delete Cookies" -1. Press (A) to continue -1. Press (Home) to return to the HOME Menu, then immediately press (A) to launch the browser again -1. Select the "GO GO!" button on the top screen - + If any prompts appear, approve all of them - + If your console freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your console freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section - + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/el_GR/include/fredtool-prep.txt b/_pages/el_GR/include/fredtool-prep.txt deleted file mode 100644 index b4e0fd0570..0000000000 --- a/_pages/el_GR/include/fredtool-prep.txt +++ /dev/null @@ -1,29 +0,0 @@ -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Εισάγετε την κάρτα SD στον υπολογιστή σας -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} \ No newline at end of file diff --git a/_pages/el_GR/include/hbl-common-exploits-movable.txt b/_pages/el_GR/include/hbl-common-exploits-movable.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/el_GR/include/hbl-common-exploits-movable.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/el_GR/include/hbl-common-exploits.txt b/_pages/el_GR/include/hbl-common-exploits.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/el_GR/include/hbl-common-exploits.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/el_GR/installing-boot9strap-(fredtool).txt b/_pages/el_GR/installing-boot9strap-(fredtool).txt deleted file mode 100644 index 82b5a552c0..0000000000 --- a/_pages/el_GR/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool)" ---- - -{% include toc title="Πίνακας περιεχομένων" %} - -{% capture technical_info %} -Technical Details (optional) - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer](seedminer) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/el_GR/installing-boot9strap-(fredtool-legacy).txt b/_pages/el_GR/installing-boot9strap-(fredtool-legacy).txt deleted file mode 100644 index 45c67651b1..0000000000 --- a/_pages/el_GR/installing-boot9strap-(fredtool-legacy).txt +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool, Legacy)" ---- - -{% include toc title="Πίνακας περιεχομένων" %} - -{% capture technical_info %} -Technical Details (optional) - -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. - -Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/el_GR/installing-boot9strap-(frogtool).txt b/_pages/el_GR/installing-boot9strap-(frogtool).txt deleted file mode 100644 index 7edeaace3e..0000000000 --- a/_pages/el_GR/installing-boot9strap-(frogtool).txt +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Installing boot9strap (Frogtool)" ---- - -{% include toc title="Πίνακας περιεχομένων" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see "DSiWare_Exports CTCert verification" and "FIRM partitions known-plaintext" [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - - -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) link for `frogcert.bin` on this page, you will need a torrent client like [qBittorrent](https://www.qbittorrent.org/download.php) or [Deluge](http://dev.deluge-torrent.org/wiki/Download). -{: .notice--warning} - -### What You Need - -* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link) -* The latest release of [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (direct download) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - Prep Work - -1. Power off your console -1. Εισάγετε την κάρτα SD στον υπολογιστή σας -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Copy `boot.nds` (b9sTool) from the b9sTool release `.zip` to the root of your SD card -1. Create a folder named `3ds` on the root of your SD card if it does not already exist - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy the `Frogtool` folder from the Frogtool-nimhax `.zip` to the `/3ds/` folder on your SD card -1. Copy `frogcert.bin` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section III - Patching DS Download Play - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch Frogtool from the list of homebrew -1. Select the "INJECT patched DS Download Play" option -1. Frogtool will automatically run and inject the JPN version of Flipnote Studio into your DS Download Play -1. Once this operation has finished, read the screens and check if the process was successful -1. Tap the touch screen, then select "BOOT patched DS Download Play" -1. If the exploit was successful, your console will have loaded the JPN version of Flipnote Studio - + If you get stuck on a black screen, follow [this](https://wiki.hacks.guide/wiki/3DS:TWLFix#Userland_(PicHaxx,_Steelhax,_etc.)-0) page, then try again - -#### Section IV - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsdlp" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Download Play - -1. Launch the Download Play application -1. Wait until you see the two buttons - + Do not press either of the buttons -1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu -1. Select "Miscellaneous options" -1. Select "Switch the hb. title to the current app." -1. Press (B) to continue -1. Press (B) to return to the Rosalina main menu -1. Press (B) to exit the Rosalina menu -1. Press (Home), then close Download Play -1. Relaunch the Download Play application -1. Your console should load the Homebrew Launcher -1. Launch Frogtool from the list of homebrew -1. Select the "RESTORE clean DS Download Play" option -1. Once this operation has finished, read the screens and check if the process was successful - + If there are any errors or missing files, correct the problem and try again -1. If the process was successful, tap the touch screen, then press START to exit -1. Power off your console - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/el_GR/installing-boot9strap-(hbl-usm).txt b/_pages/el_GR/installing-boot9strap-(hbl-usm).txt deleted file mode 100644 index 861658e447..0000000000 --- a/_pages/el_GR/installing-boot9strap-(hbl-usm).txt +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "Installing boot9strap (HBL-USM)" ---- - -{% include toc title="Πίνακας περιεχομένων" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--danger} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) (direct download) - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. Then, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Εισάγετε την κάρτα SD στον υπολογιστή σας -1. Create a folder named `boot9strap` on the root of your SD card -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the RELEASE `.zip` to the `/boot9strap/` folder on your SD card -1. Create a folder named `3ds` on the root of your SD card if it does not already exist - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy `slotTool.3dsx` from the `slotTool` folder inside the RELEASE `.zip` to the `/3ds/` folder on your SD card -1. Copy `usm.bin` from the RELEASE `.zip` to the root folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch slotTool from the list of homebrew - + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section -1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option - + You will see some on-screen text and then your system will shut down - -![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section III - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section IV - Restoring WiFi Configuration Profiles - -{% include_relative include/remove-usm-slottool.txt %} - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/el_GR/installing-boot9strap-(usm).txt b/_pages/el_GR/installing-boot9strap-(usm).txt deleted file mode 100644 index 104d1319b5..0000000000 --- a/_pages/el_GR/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: "Installing boot9strap (USM)" ---- - -{% include toc title="Πίνακας περιεχομένων" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. - -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--warning} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* [usm.bin](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) - - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. - -1. Your SD card should be inserted in your computer -1. Copy `usm.bin` to the root of your SD card -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Create a folder named `boot9strap` on the root of your SD card -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card - -![]({{ "/images/screenshots/usm/usm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If the BB3 multihax menu doesn't open, [follow this troubleshooting guide](troubleshooting#bannerbomb3) - + If the BB3 multihax menu says "cfw installed already", you already have custom firmware and should continue from [here](checking-for-cfw) -1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" - + Your console will automatically power off -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Internet Settings` -> `Connection Settings` -1. Ensure that all three connections are named "Haaaaaaaxxxxxxxxx..." - + Do NOT change these settings! - + If all three connections are NOT all named "Haaaaaaaxxxxxxxxx...", STOP! Something went wrong in this section and MUST be fixed before you can continue -1. Power off your console - -#### Section III - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section IV - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section V - Restoring WiFi Configuration Profiles - -In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. - -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" - + Your console will automatically reboot -1. Power off your console -1. Εισάγετε την κάρτα SD στον υπολογιστή σας -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/en_PT/dumping-movable-(nimhax).txt b/_pages/en_PT/dumping-movable-(nimhax).txt deleted file mode 100644 index 45ecc2d734..0000000000 --- a/_pages/en_PT/dumping-movable-(nimhax).txt +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: "Dumping Movable (nimhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -To install boot9strap on your console, we derive your console's unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console. - -For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need - -* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert ye SD card into ye computer -1. Copy the `nimhax` folder from the nimhax `.zip` to the `/3ds/` folder on your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) -{: .notice--info} - -#### Section II - nimhax - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch nimhax from the list of homebrew -1. If the exploit was successful, a `movable.sed` file will appear on the root of your SD card - -### Next step: Frogtool - -Once you have your console's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \ -While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you're unable to use a torrent client. - -Continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--primary} diff --git a/_pages/en_PT/homebrew-launcher-(freakyhax).txt b/_pages/en_PT/homebrew-launcher-(freakyhax).txt deleted file mode 100644 index cfb4e85746..0000000000 --- a/_pages/en_PT/homebrew-launcher-(freakyhax).txt +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: "Homebrew Launcher (freakyhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[freakyhax](https://plutooo.github.io/freakyhax/) is an exploit for the game Freakyforms Deluxe discovered and released by [plutooo](https://github.com/plutooo). It works on versions 9.0.0 through 11.17.0 on EUR, USA and JPN region consoles. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -### What You Need - -+ A EUR/USA/JPN copy of Freakyforms Deluxe (eShop or cartridge) -+ The latest release of [freakyhax](https://github.com/plutooo/freakyhax/releases/latest) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert ye SD card into ye computer -1. Copy all files and folders inside the `/build//exploit/` folder from the freakyhax `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - freakyhax - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch Freakyforms Deluxe -1. In the game menu, select `Play -> Camera -> Load a QR code` -1. Select the QR code -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/en_PT/homebrew-launcher-(ninjhax2-dx).txt b/_pages/en_PT/homebrew-launcher-(ninjhax2-dx).txt deleted file mode 100644 index 2d9bde011e..0000000000 --- a/_pages/en_PT/homebrew-launcher-(ninjhax2-dx).txt +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "Homebrew Launcher (ninjhax2-dx)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[Ninjhax2](https://github.com/smealum/ninjhax2.x) is an exploit for the game "Cubic Ninja" made by [smealum](https://github.com/smealum). This page uses an updated version of ninjhax by [zoogie](https://github.com/zoogie) called [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx), which supports 11.17.0. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -This process will overwrite your Cubic Ninja save file, if you have one. -{: .notice--warning} - -### What You Need -* The game "Cubic Ninja" -* The latest release of [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx/releases) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert ye SD card into ye computer -1. Copy `Launcher.dat` from the folder appropriate for your console from the ninjhax2-dx `.zip` file to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - -#### Section II - ninjhax2-dx -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Cubic Ninja" once and select "Create" - + If prompted, delete all data -1. Select "QR Code" -1. Select "Scan QR Code" -1. On your PC, open the browser and go to [ninjhax2-dx website](https://zoogie.github.io/web/nh2dx/) -1. Select your console's region and hardware -1. On your console, scan the QR code - + If the game exits to the HOME Menu, then the exploit has installed correctly -1. Launch "Cubic Ninja" again -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/en_PT/homebrew-launcher-(pichaxx).txt b/_pages/en_PT/homebrew-launcher-(pichaxx).txt deleted file mode 100644 index 864c5ae4b7..0000000000 --- a/_pages/en_PT/homebrew-launcher-(pichaxx).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (PicHaxx)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[PicHaxx](https://github.com/zoogie/pichaxx) is an exploit for the game Pokémon Picross released by [zoogie](https://github.com/zoogie), originally discovered and [demonstrated](https://twitter.com/mrnbayoh/status/744899681663258624) by [MrNbaYoh](https://github.com/MrNbaYoh). - -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Pokémon Picross" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Pokémon Picross -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Prep Work - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Insert ye SD card into ye computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card - -![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - PicHaxx - -In this section, you will create a hacked Pokémon Picross save file that, when loaded, will run the Homebrew Launcher on your console. - -1. Open [the PicHaxx Injector website](https://3dstools.nhnarwhal.com/#/pichaxx) on your computer -1. Select your `movable.sed` file -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `0017c100` -> `data` on your SD card - + The `` will be the same one that you used in Seedminer - + The `` is a 32 character long folder inside of the `` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted - - ![]({{ "/images/screenshots/pichaxx-save-location.png" | absolute_url }}) - {: .notice--info} - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Pokémon Picross" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher - + If you get an error message, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-pichaxx) -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/en_PT/homebrew-launcher-(smilehax-iie).txt b/_pages/en_PT/homebrew-launcher-(smilehax-iie).txt deleted file mode 100644 index 7ece8ec79a..0000000000 --- a/_pages/en_PT/homebrew-launcher-(smilehax-iie).txt +++ /dev/null @@ -1,70 +0,0 @@ ---- -title: "Homebrew Launcher (smilehax-IIe)" ---- - -{% include toc title="Table of Contents" %} - -This set of instructions does not support the Japanese version of SmileBASIC. -{: .notice--warning} - -{% capture technical_info %} -Technical Details (optional) -[smilehax-IIe](https://github.com/zoogie/smilehax-IIe) is an exploit for the game "SmileBASIC" made by zoogie, compatible with system versions 9.0.0 through 11.17.0 for USA/EUR/JPN region consoles. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need -+ The game "SmileBASIC" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install SmileBASIC -+ The latest release of [smilehax-IIe](https://github.com/zoogie/smilehax-IIe/releases/download/v1.1/Release_sh2e_v1.1.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert ye SD card into ye computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Transfer the `.wav` for your region from the Release_sh2e `.zip` to a device that can play `.wav` files, for example a phone -1. Copy the petitcom `.icn` for your region to the root of your SD card - -#### Section II - smilehax - -1. Launch SmileBASIC - + Update the game if prompted -1. Select the "Publish/Download Projects" option -1. Select the "Download (Receive) using Public Key" option -1. Press the "Yes" button -1. Enter the Public Key "NJEQK3A4" using the on-screen keyboard -1. Press the "Yes" button to confirm the download of PMODEM141 -1. Press "OK", then "Back", then "Browse Projects" -1. Select PMODEM141, then press "Select File" -1. Select PMODEM141.PRG, then press "OK", then "Yes" to execute it -1. Select RECEIVE FILE SIMPLEX -1. Prepare the device you use to play the `.wav` file -1. Keep your console about a foot from the `.wav` file playing devices' speaker and use a reasonable (not loud) volume to play the `.wav` -1. Now select 300BPS, then play the `.wav` file -1. When it finishes, press "Yes", then press "OK" -1. Press the START button -1. Select the SH2E-xxx.TXT file, then press OK, then "Yes" to execute it - + If you get kicked back into menu, make sure you're using the latest version of SmileBASIC -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/en_PT/homebrew-launcher-(steelhax).txt b/_pages/en_PT/homebrew-launcher-(steelhax).txt deleted file mode 100644 index 6836aa4605..0000000000 --- a/_pages/en_PT/homebrew-launcher-(steelhax).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (Steelhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Steel Diver: Sub Wars, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Steel Diver: Sub Wars save file, if you have one. If you wish to preserve your Steel Diver: Sub Wars game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Steel Diver: Sub Wars" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Steel Diver: Sub Wars -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Steelhax](/assets/steelhax-release.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Prep Work - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Insert ye SD card into ye computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the `steelhax` folder from the `Steelhax-release.zip` to the root of your SD card -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - Steelminer - -In this section, you will create a hacked Steel Diver: Sub Wars save file that, when used, will load the Homebrew Launcher on your console. - -1. Launch "Steel Diver: Sub Wars" once and select a Mii to initialize your save file - + Decline the game update when prompted - + If you have already updated the game, use the Data Management menu of the System Settings to delete the update -1. Exit "Steel Diver: Sub Wars" -1. Power off your console -1. Insert ye SD card into ye computer -1. Open [the SteelHax Save Tool website](https://3dstools.nhnarwhal.com/#/steelhax) on your computer -1. Select your `movable.sed` file -1. Select your region based on your console -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `<8-character-region>` -> `data` on your SD card - + **EUR Region**: `000d7e00` - + **JPN Region**: `000d7c00` - + **USA Region**: `000d7d00` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Steel Diver: Sub Wars" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/en_PT/homebrew-launcher-(super-skaterhax).txt b/_pages/en_PT/homebrew-launcher-(super-skaterhax).txt deleted file mode 100644 index c18534bb5e..0000000000 --- a/_pages/en_PT/homebrew-launcher-(super-skaterhax).txt +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: "Homebrew Launcher (super-skaterhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see [here](https://github.com/zoogie/super-skaterhax). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -Super-skaterhax (when used to launch the Homebrew Launcher) is compatible with New models on version 11.16.0 in all regions, and 11.17.0 in the EUR, JPN and USA regions. - -The instructions provided only apply to the New 3DS, New 3DS XL, and New 2DS XL. Please ensure that the console you are modding is a New 3DS, New 3DS XL, or New 2DS XL before continuing. -{: .notice--warning} - -### What You Need - -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* The latest release of [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (the release `.zip` file) - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger both super-skaterhax and the Homebrew Launcher. - -1. Power off your console -1. Insert ye SD card into ye computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy everything inside the folder for your console's region (and also system version if the region is USA) in the super-skaterhax `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/skater-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - super-skaterhax - -In this section, you will visit the browser exploit webpage, which will launch the Homebrew Launcher. - -If you haven't already, make sure you have a working Internet connection set up on your console. -{: .notice--info} - -1. On the HOME Menu, press the Left and Right shoulder buttons at the same time to open the camera - + If you are unable to open the camera, open the Internet Browser and manually type the URL instead (`https://zoogie.github.io/web/super/` for EUR/USA/JPN, `https://zoogie.github.io/web/korea` for KOR) -1. Tap the QR code button and scan one of the following QR codes for your console's region [here](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png) - + If you get a security certificate warning, press (A) to allow the connection -1. Press the (Select) button to open the bookmark tab - + If your (Select) button does not respond, tap the star icon on the bottom-left corner of the screen -1. Tap "Bookmark this page" -1. Press (B) once to return to the browser -1. Press (Start) to open the context menu - + If your (Start) button does not respond, tap the 3-line menu on the bottom-right corner of the screen -1. Tap on "Settings" -1. Tap on "Delete Cookies" -1. Press (A) to continue -1. Press (Home) to return to the HOME Menu, then immediately press (A) to launch the browser again -1. Select the "GO GO!" button on the top screen - + If any prompts appear, approve all of them - + If your console freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your console freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section - + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/en_PT/include/fredtool-prep.txt b/_pages/en_PT/include/fredtool-prep.txt deleted file mode 100644 index 2fa350b7ee..0000000000 --- a/_pages/en_PT/include/fredtool-prep.txt +++ /dev/null @@ -1,29 +0,0 @@ -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Insert ye SD card into ye computer -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} \ No newline at end of file diff --git a/_pages/en_PT/include/hbl-common-exploits-movable.txt b/_pages/en_PT/include/hbl-common-exploits-movable.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/en_PT/include/hbl-common-exploits-movable.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/en_PT/include/hbl-common-exploits.txt b/_pages/en_PT/include/hbl-common-exploits.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/en_PT/include/hbl-common-exploits.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/en_PT/installing-boot9strap-(fredtool).txt b/_pages/en_PT/installing-boot9strap-(fredtool).txt deleted file mode 100644 index a06a1259f2..0000000000 --- a/_pages/en_PT/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer](seedminer) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/en_PT/installing-boot9strap-(fredtool-legacy).txt b/_pages/en_PT/installing-boot9strap-(fredtool-legacy).txt deleted file mode 100644 index 7e88fb51b4..0000000000 --- a/_pages/en_PT/installing-boot9strap-(fredtool-legacy).txt +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool, Legacy)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. - -Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/en_PT/installing-boot9strap-(frogtool).txt b/_pages/en_PT/installing-boot9strap-(frogtool).txt deleted file mode 100644 index c68378e547..0000000000 --- a/_pages/en_PT/installing-boot9strap-(frogtool).txt +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Installing boot9strap (Frogtool)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see "DSiWare_Exports CTCert verification" and "FIRM partitions known-plaintext" [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - - -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) link for `frogcert.bin` on this page, you will need a torrent client like [qBittorrent](https://www.qbittorrent.org/download.php) or [Deluge](http://dev.deluge-torrent.org/wiki/Download). -{: .notice--warning} - -### What You Need - -* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link) -* The latest release of [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (direct download) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - Prep Work - -1. Power off your console -1. Insert ye SD card into ye computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Copy `boot.nds` (b9sTool) from the b9sTool release `.zip` to the root of your SD card -1. Create a folder named `3ds` on the root of your SD card if it does not already exist - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy the `Frogtool` folder from the Frogtool-nimhax `.zip` to the `/3ds/` folder on your SD card -1. Copy `frogcert.bin` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section III - Patching DS Download Play - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch Frogtool from the list of homebrew -1. Select the "INJECT patched DS Download Play" option -1. Frogtool will automatically run and inject the JPN version of Flipnote Studio into your DS Download Play -1. Once this operation has finished, read the screens and check if the process was successful -1. Tap the touch screen, then select "BOOT patched DS Download Play" -1. If the exploit was successful, your console will have loaded the JPN version of Flipnote Studio - + If you get stuck on a black screen, follow [this](https://wiki.hacks.guide/wiki/3DS:TWLFix#Userland_(PicHaxx,_Steelhax,_etc.)-0) page, then try again - -#### Section IV - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsdlp" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Download Play - -1. Launch th' Download Play application -1. Wait until you see the two buttons - + Do not press either of the buttons -1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu -1. Select "Miscellaneous options" -1. Select "Switch the hb. title to the current app." -1. Press (B) to continue -1. Press (B) to return to the Rosalina main menu -1. Press (B) to exit the Rosalina menu -1. Press (Home), then close Download Play -1. Relaunch the Download Play application -1. Your console should load the Homebrew Launcher -1. Launch Frogtool from the list of homebrew -1. Select the "RESTORE clean DS Download Play" option -1. Once this operation has finished, read the screens and check if the process was successful - + If there are any errors or missing files, correct the problem and try again -1. If the process was successful, tap the touch screen, then press START to exit -1. Power off your console - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/en_PT/installing-boot9strap-(hbl-usm).txt b/_pages/en_PT/installing-boot9strap-(hbl-usm).txt deleted file mode 100644 index 3ce463f9c6..0000000000 --- a/_pages/en_PT/installing-boot9strap-(hbl-usm).txt +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "Installing boot9strap (HBL-USM)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--danger} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) (direct download) - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. Then, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Insert ye SD card into ye computer -1. Create a folder named `boot9strap` on th' root 'o ye SD card -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the RELEASE `.zip` to the `/boot9strap/` folder on your SD card -1. Create a folder named `3ds` on the root of your SD card if it does not already exist - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy `slotTool.3dsx` from the `slotTool` folder inside the RELEASE `.zip` to the `/3ds/` folder on your SD card -1. Copy `usm.bin` from the RELEASE `.zip` to the root folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch slotTool from the list of homebrew - + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section -1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option - + You will see some on-screen text and then your system will shut down - -![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section III - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section IV - Restoring WiFi Configuration Profiles - -{% include_relative include/remove-usm-slottool.txt %} - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/en_PT/installing-boot9strap-(usm).txt b/_pages/en_PT/installing-boot9strap-(usm).txt deleted file mode 100644 index a0d461ddbf..0000000000 --- a/_pages/en_PT/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: "Installing boot9strap (USM)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. - -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--warning} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* [usm.bin](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) - - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. - -1. Your SD card should be inserted in your computer -1. Copy `usm.bin` to the root of your SD card -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Create a folder named `boot9strap` on th' root 'o ye SD card -1. Copy `boot9strap.firm` 'n `boot9strap.firm.sha` from th' boot9strap `.zip` to th' `/boot9strap/` folder on ye SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card - -![]({{ "/images/screenshots/usm/usm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If the BB3 multihax menu doesn't open, [follow this troubleshooting guide](troubleshooting#bannerbomb3) - + If the BB3 multihax menu says "cfw installed already", you already have custom firmware and should continue from [here](checking-for-cfw) -1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" - + Your console will automatically power off -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Internet Settings` -> `Connection Settings` -1. Ensure that all three connections are named "Haaaaaaaxxxxxxxxx..." - + Do NOT change these settings! - + If all three connections are NOT all named "Haaaaaaaxxxxxxxxx...", STOP! Something went wrong in this section and MUST be fixed before you can continue -1. Power off your console - -#### Section III - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section IV - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section V - Restoring WiFi Configuration Profiles - -In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. - -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" - + Your console will automatically reboot -1. Power off your console -1. Insert ye SD card into ye computer -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/es_ES/dumping-movable-(nimhax).txt b/_pages/es_ES/dumping-movable-(nimhax).txt deleted file mode 100644 index 49358d54f8..0000000000 --- a/_pages/es_ES/dumping-movable-(nimhax).txt +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: "Dumping Movable (nimhax)" ---- - -{% include toc title="Tabla de contenidos" %} - -{% capture technical_info %} -Technical Details (optional) - -To install boot9strap on your console, we derive your console's unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console. - -For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Qué necesitas - -* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file) - -### Instrucciones - -#### Sección I - Preparativos - -1. Power off your console -1. Inserta tu tarjeta SD en tu computadora -1. Copy the `nimhax` folder from the nimhax `.zip` to the `/3ds/` folder on your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) -{: .notice--info} - -#### Section II - nimhax - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch nimhax from the list of homebrew -1. If the exploit was successful, a `movable.sed` file will appear on the root of your SD card - -### Next step: Frogtool - -Once you have your console's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \ -While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you're unable to use a torrent client. - -Continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--primary} diff --git a/_pages/es_ES/homebrew-launcher-(freakyhax).txt b/_pages/es_ES/homebrew-launcher-(freakyhax).txt deleted file mode 100644 index ab9648e6af..0000000000 --- a/_pages/es_ES/homebrew-launcher-(freakyhax).txt +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: "Homebrew Launcher (freakyhax)" ---- - -{% include toc title="Tabla de contenidos" %} - -{% capture technical_info %} -Technical Details (optional) -[freakyhax](https://plutooo.github.io/freakyhax/) is an exploit for the game Freakyforms Deluxe discovered and released by [plutooo](https://github.com/plutooo). It works on versions 9.0.0 through 11.17.0 on EUR, USA and JPN region consoles. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -### Qué necesitas - -+ A EUR/USA/JPN copy of Freakyforms Deluxe (eShop or cartridge) -+ The latest release of [freakyhax](https://github.com/plutooo/freakyhax/releases/latest) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instrucciones - -#### Sección I - Preparativos - -1. Power off your console -1. Inserta tu tarjeta SD en tu computadora -1. Copy all files and folders inside the `/build//exploit/` folder from the freakyhax `.zip` to the root of your SD card - + La raíz de tu tarjeta SD se refiere al primer directorio de la tarjeta, donde puedes ver la carpeta Nintendo 3DS pero no estás dentro de ella -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copia los archivos `boot.firm` y `boot.3dsx` desde el `.zip` de Luma3DS a la raíz de tu tarjeta SD -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - freakyhax - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch Freakyforms Deluxe -1. In the game menu, select `Play -> Camera -> Load a QR code` -1. Select the QR code -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/es_ES/homebrew-launcher-(ninjhax2-dx).txt b/_pages/es_ES/homebrew-launcher-(ninjhax2-dx).txt deleted file mode 100644 index a8a0efb870..0000000000 --- a/_pages/es_ES/homebrew-launcher-(ninjhax2-dx).txt +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "Homebrew Launcher (ninjhax2-dx)" ---- - -{% include toc title="Tabla de contenidos" %} - -{% capture technical_info %} -Technical Details (optional) -[Ninjhax2](https://github.com/smealum/ninjhax2.x) is an exploit for the game "Cubic Ninja" made by [smealum](https://github.com/smealum). This page uses an updated version of ninjhax by [zoogie](https://github.com/zoogie) called [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx), which supports 11.17.0. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -This process will overwrite your Cubic Ninja save file, if you have one. -{: .notice--warning} - -### Qué necesitas -* The game "Cubic Ninja" -* The latest release of [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx/releases) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -### Instrucciones - -#### Sección I - Preparativos - -1. Power off your console -1. Inserta tu tarjeta SD en tu computadora -1. Copy `Launcher.dat` from the folder appropriate for your console from the ninjhax2-dx `.zip` file to the root of your SD card - + La raíz de tu tarjeta SD se refiere al primer directorio de la tarjeta, donde puedes ver la carpeta Nintendo 3DS pero no estás dentro de ella -1. Copia los archivos `boot.firm` y `boot.3dsx` desde el `.zip` de Luma3DS a la raíz de tu tarjeta SD - -#### Section II - ninjhax2-dx -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Cubic Ninja" once and select "Create" - + If prompted, delete all data -1. Select "QR Code" -1. Select "Scan QR Code" -1. On your PC, open the browser and go to [ninjhax2-dx website](https://zoogie.github.io/web/nh2dx/) -1. Select your console's region and hardware -1. On your console, scan the QR code - + If the game exits to the HOME Menu, then the exploit has installed correctly -1. Launch "Cubic Ninja" again -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/es_ES/homebrew-launcher-(pichaxx).txt b/_pages/es_ES/homebrew-launcher-(pichaxx).txt deleted file mode 100644 index 150ee8ab32..0000000000 --- a/_pages/es_ES/homebrew-launcher-(pichaxx).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (PicHaxx)" ---- - -{% include toc title="Tabla de contenidos" %} - -{% capture technical_info %} -Technical Details (optional) -[PicHaxx](https://github.com/zoogie/pichaxx) is an exploit for the game Pokémon Picross released by [zoogie](https://github.com/zoogie), originally discovered and [demonstrated](https://twitter.com/mrnbayoh/status/744899681663258624) by [MrNbaYoh](https://github.com/MrNbaYoh). - -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### Qué necesitas - -+ The game "Pokémon Picross" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Pokémon Picross -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instrucciones - -#### Sección I - Preparativos - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Inserta tu tarjeta SD en tu computadora -1. Copia los archivos `boot.firm` y `boot.3dsx` desde el `.zip` de Luma3DS a la raíz de tu tarjeta SD - + La raíz de tu tarjeta SD se refiere al primer directorio de la tarjeta, donde puedes ver la carpeta Nintendo 3DS pero no estás dentro de ella -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card - -![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - PicHaxx - -In this section, you will create a hacked Pokémon Picross save file that, when loaded, will run the Homebrew Launcher on your console. - -1. Open [the PicHaxx Injector website](https://3dstools.nhnarwhal.com/#/pichaxx) on your computer -1. Select your `movable.sed` file -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `0017c100` -> `data` on your SD card - + The `` will be the same one that you used in Seedminer - + El `` es una carpeta con un nombre compuesto por 32 caracteres, dentro de `` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted - - ![]({{ "/images/screenshots/pichaxx-save-location.png" | absolute_url }}) - {: .notice--info} - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Pokémon Picross" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher - + If you get an error message, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-pichaxx) -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/es_ES/homebrew-launcher-(smilehax-iie).txt b/_pages/es_ES/homebrew-launcher-(smilehax-iie).txt deleted file mode 100644 index 23cd2d1b46..0000000000 --- a/_pages/es_ES/homebrew-launcher-(smilehax-iie).txt +++ /dev/null @@ -1,70 +0,0 @@ ---- -title: "Homebrew Launcher (smilehax-IIe)" ---- - -{% include toc title="Tabla de contenidos" %} - -This set of instructions does not support the Japanese version of SmileBASIC. -{: .notice--warning} - -{% capture technical_info %} -Technical Details (optional) -[smilehax-IIe](https://github.com/zoogie/smilehax-IIe) is an exploit for the game "SmileBASIC" made by zoogie, compatible with system versions 9.0.0 through 11.17.0 for USA/EUR/JPN region consoles. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Qué necesitas -+ The game "SmileBASIC" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install SmileBASIC -+ The latest release of [smilehax-IIe](https://github.com/zoogie/smilehax-IIe/releases/download/v1.1/Release_sh2e_v1.1.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instrucciones - -#### Sección I - Preparativos - -1. Power off your console -1. Inserta tu tarjeta SD en tu computadora -1. Copia los archivos `boot.firm` y `boot.3dsx` desde el `.zip` de Luma3DS a la raíz de tu tarjeta SD - + La raíz de tu tarjeta SD se refiere al primer directorio de la tarjeta, donde puedes ver la carpeta Nintendo 3DS pero no estás dentro de ella -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Transfer the `.wav` for your region from the Release_sh2e `.zip` to a device that can play `.wav` files, for example a phone -1. Copy the petitcom `.icn` for your region to the root of your SD card - -#### Section II - smilehax - -1. Launch SmileBASIC - + Update the game if prompted -1. Select the "Publish/Download Projects" option -1. Select the "Download (Receive) using Public Key" option -1. Press the "Yes" button -1. Enter the Public Key "NJEQK3A4" using the on-screen keyboard -1. Press the "Yes" button to confirm the download of PMODEM141 -1. Press "OK", then "Back", then "Browse Projects" -1. Select PMODEM141, then press "Select File" -1. Select PMODEM141.PRG, then press "OK", then "Yes" to execute it -1. Select RECEIVE FILE SIMPLEX -1. Prepare the device you use to play the `.wav` file -1. Keep your console about a foot from the `.wav` file playing devices' speaker and use a reasonable (not loud) volume to play the `.wav` -1. Now select 300BPS, then play the `.wav` file -1. When it finishes, press "Yes", then press "OK" -1. Press the START button -1. Select the SH2E-xxx.TXT file, then press OK, then "Yes" to execute it - + If you get kicked back into menu, make sure you're using the latest version of SmileBASIC -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/es_ES/homebrew-launcher-(steelhax).txt b/_pages/es_ES/homebrew-launcher-(steelhax).txt deleted file mode 100644 index 5d365c689c..0000000000 --- a/_pages/es_ES/homebrew-launcher-(steelhax).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (Steelhax)" ---- - -{% include toc title="Tabla de contenidos" %} - -{% capture technical_info %} -Technical Details (optional) -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Steel Diver: Sub Wars, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Steel Diver: Sub Wars save file, if you have one. If you wish to preserve your Steel Diver: Sub Wars game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### Qué necesitas - -+ The game "Steel Diver: Sub Wars" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Steel Diver: Sub Wars -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Steelhax](/assets/steelhax-release.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instrucciones - -#### Sección I - Preparativos - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Inserta tu tarjeta SD en tu computadora -1. Copia los archivos `boot.firm` y `boot.3dsx` desde el `.zip` de Luma3DS a la raíz de tu tarjeta SD - + La raíz de tu tarjeta SD se refiere al primer directorio de la tarjeta, donde puedes ver la carpeta Nintendo 3DS pero no estás dentro de ella -1. Copy the `steelhax` folder from the `Steelhax-release.zip` to the root of your SD card -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - Steelminer - -In this section, you will create a hacked Steel Diver: Sub Wars save file that, when used, will load the Homebrew Launcher on your console. - -1. Launch "Steel Diver: Sub Wars" once and select a Mii to initialize your save file - + Decline the game update when prompted - + If you have already updated the game, use the Data Management menu of the System Settings to delete the update -1. Exit "Steel Diver: Sub Wars" -1. Power off your console -1. Inserta tu tarjeta SD en tu computadora -1. Open [the SteelHax Save Tool website](https://3dstools.nhnarwhal.com/#/steelhax) on your computer -1. Select your `movable.sed` file -1. Select your region based on your console -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `<8-character-region>` -> `data` on your SD card - + **EUR Region**: `000d7e00` - + **JPN Region**: `000d7c00` - + **USA Region**: `000d7d00` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Steel Diver: Sub Wars" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/es_ES/homebrew-launcher-(super-skaterhax).txt b/_pages/es_ES/homebrew-launcher-(super-skaterhax).txt deleted file mode 100644 index f3d5a22fe5..0000000000 --- a/_pages/es_ES/homebrew-launcher-(super-skaterhax).txt +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: "Homebrew Launcher (super-skaterhax)" ---- - -{% include toc title="Tabla de contenidos" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see [here](https://github.com/zoogie/super-skaterhax). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -Super-skaterhax (when used to launch the Homebrew Launcher) is compatible with New models on version 11.16.0 in all regions, and 11.17.0 in the EUR, JPN and USA regions. - -The instructions provided only apply to the New 3DS, New 3DS XL, and New 2DS XL. Please ensure that the console you are modding is a New 3DS, New 3DS XL, or New 2DS XL before continuing. -{: .notice--warning} - -### Qué necesitas - -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* The latest release of [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (the release `.zip` file) - -#### Sección I - Preparativos - -In this section, you will copy the files needed to trigger both super-skaterhax and the Homebrew Launcher. - -1. Power off your console -1. Inserta tu tarjeta SD en tu computadora -1. Copia los archivos `boot.firm` y `boot.3dsx` desde el `.zip` de Luma3DS a la raíz de tu tarjeta SD - + La raíz de tu tarjeta SD se refiere al primer directorio de la tarjeta, donde puedes ver la carpeta Nintendo 3DS pero no estás dentro de ella -1. Copy everything inside the folder for your console's region (and also system version if the region is USA) in the super-skaterhax `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/skater-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - super-skaterhax - -In this section, you will visit the browser exploit webpage, which will launch the Homebrew Launcher. - -If you haven't already, make sure you have a working Internet connection set up on your console. -{: .notice--info} - -1. On the HOME Menu, press the Left and Right shoulder buttons at the same time to open the camera - + If you are unable to open the camera, open the Internet Browser and manually type the URL instead (`https://zoogie.github.io/web/super/` for EUR/USA/JPN, `https://zoogie.github.io/web/korea` for KOR) -1. Tap the QR code button and scan one of the following QR codes for your console's region [here](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png) - + If you get a security certificate warning, press (A) to allow the connection -1. Press the (Select) button to open the bookmark tab - + If your (Select) button does not respond, tap the star icon on the bottom-left corner of the screen -1. Tap "Bookmark this page" -1. Press (B) once to return to the browser -1. Press (Start) to open the context menu - + If your (Start) button does not respond, tap the 3-line menu on the bottom-right corner of the screen -1. Tap on "Settings" -1. Tap on "Delete Cookies" -1. Presiona (A) para continuar -1. Press (Home) to return to the HOME Menu, then immediately press (A) to launch the browser again -1. Select the "GO GO!" button on the top screen - + If any prompts appear, approve all of them - + If your console freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your console freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section - + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/es_ES/include/fredtool-prep.txt b/_pages/es_ES/include/fredtool-prep.txt deleted file mode 100644 index cb1504de9b..0000000000 --- a/_pages/es_ES/include/fredtool-prep.txt +++ /dev/null @@ -1,29 +0,0 @@ -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Inserta tu tarjeta SD en tu computadora -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Ve a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` en tu tarjeta SD - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copia los archivos `boot.firm` y `boot.3dsx` desde el `.zip` de Luma3DS a la raíz de tu tarjeta SD - + La raíz de tu tarjeta SD se refiere al primer directorio de la tarjeta, donde puedes ver la carpeta Nintendo 3DS pero no estás dentro de ella -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copia la carpeta `private` contenida en el `.zip` de Frogminer_save a la raíz de tu tarjeta SD -1. Reinsert your SD card into your console -1. Power on your console - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} \ No newline at end of file diff --git a/_pages/es_ES/include/hbl-common-exploits-movable.txt b/_pages/es_ES/include/hbl-common-exploits-movable.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/es_ES/include/hbl-common-exploits-movable.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/es_ES/include/hbl-common-exploits.txt b/_pages/es_ES/include/hbl-common-exploits.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/es_ES/include/hbl-common-exploits.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/es_ES/installing-boot9strap-(fredtool).txt b/_pages/es_ES/installing-boot9strap-(fredtool).txt deleted file mode 100644 index 6824007f00..0000000000 --- a/_pages/es_ES/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool)" ---- - -{% include toc title="Tabla de contenidos" %} - -{% capture technical_info %} -Technical Details (optional) - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### Qué necesitas - -* Tu archivo `movable.sed` proveniente de haber completado [Seedminer](seedminer) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Sección I - Verificación de CFW - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Sección II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continúa en [Finalizar instalación](finalizing-setup) -{: .notice--primary} diff --git a/_pages/es_ES/installing-boot9strap-(fredtool-legacy).txt b/_pages/es_ES/installing-boot9strap-(fredtool-legacy).txt deleted file mode 100644 index 0dd63bb373..0000000000 --- a/_pages/es_ES/installing-boot9strap-(fredtool-legacy).txt +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool, Legacy)" ---- - -{% include toc title="Tabla de contenidos" %} - -{% capture technical_info %} -Technical Details (optional) - -Para volcar una aplicación DSiWare del sistema, aprovecharemos un fallo en la ventana de Gestión de datos DSiWare de la aplicación Configuración. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. - -Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### Qué necesitas - -* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Sección I - Verificación de CFW - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Sección II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continúa en [Finalizar instalación](finalizing-setup) -{: .notice--primary} diff --git a/_pages/es_ES/installing-boot9strap-(frogtool).txt b/_pages/es_ES/installing-boot9strap-(frogtool).txt deleted file mode 100644 index a2a1ad1402..0000000000 --- a/_pages/es_ES/installing-boot9strap-(frogtool).txt +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Installing boot9strap (Frogtool)" ---- - -{% include toc title="Tabla de contenidos" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see "DSiWare_Exports CTCert verification" and "FIRM partitions known-plaintext" [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - - -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) link for `frogcert.bin` on this page, you will need a torrent client like [qBittorrent](https://www.qbittorrent.org/download.php) or [Deluge](http://dev.deluge-torrent.org/wiki/Download). -{: .notice--warning} - -### Qué necesitas - -* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link) -* The latest release of [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (direct download) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) - -#### Sección I - Verificación de CFW - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Sección II - Preparativos - -1. Power off your console -1. Inserta tu tarjeta SD en tu computadora -1. Copia los archivos `boot.firm` y `boot.3dsx` desde el `.zip` de Luma3DS a la raíz de tu tarjeta SD -1. Copy `boot.nds` (b9sTool) from the b9sTool release `.zip` to the root of your SD card -1. Crea una carpeta llamada `3ds` en la raíz de tu tarjeta SD, si aún no existe - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy the `Frogtool` folder from the Frogtool-nimhax `.zip` to the `/3ds/` folder on your SD card -1. Copy `frogcert.bin` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section III - Patching DS Download Play - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch Frogtool from the list of homebrew -1. Select the "INJECT patched DS Download Play" option -1. Frogtool will automatically run and inject the JPN version of Flipnote Studio into your DS Download Play -1. Once this operation has finished, read the screens and check if the process was successful -1. Tap the touch screen, then select "BOOT patched DS Download Play" -1. If the exploit was successful, your console will have loaded the JPN version of Flipnote Studio - + If you get stuck on a black screen, follow [this](https://wiki.hacks.guide/wiki/3DS:TWLFix#Userland_(PicHaxx,_Steelhax,_etc.)-0) page, then try again - -#### Section IV - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsdlp" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Download Play - -1. Inicia la aplicación de Modo Descarga -1. Espera hasta que veas los dos botones - + Do not press either of the buttons -1. Presiona (Left Shoulder) + (Abajo) + (Select) a la vez para abrir el menú de Rosalina -1. Selecciona "Miscellaneous options" -1. Selecciona "Switch the hb. title to the current app." -1. Presiona (B) para continuar -1. Presiona (B) para regresar al menú principal de Rosalina -1. Presiona (B) para salir del menú de Rosalina -1. Presiona (Home), luego cierra la aplicación de Modo Descarga -1. Relaunch the Download Play application -1. Your console should load the Homebrew Launcher -1. Launch Frogtool from the list of homebrew -1. Select the "RESTORE clean DS Download Play" option -1. Once this operation has finished, read the screens and check if the process was successful - + If there are any errors or missing files, correct the problem and try again -1. If the process was successful, tap the touch screen, then press START to exit -1. Power off your console - -___ - -### Continúa en [Finalizar instalación](finalizing-setup) -{: .notice--primary} diff --git a/_pages/es_ES/installing-boot9strap-(hbl-usm).txt b/_pages/es_ES/installing-boot9strap-(hbl-usm).txt deleted file mode 100644 index 92dd02cb38..0000000000 --- a/_pages/es_ES/installing-boot9strap-(hbl-usm).txt +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "Installing boot9strap (HBL-USM)" ---- - -{% include toc title="Tabla de contenidos" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--danger} - -### Qué necesitas - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) (direct download) - -#### Sección I - Preparativos - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. Then, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Inserta tu tarjeta SD en tu computadora -1. Crea una carpeta llamada `boot9strap` en la raíz de tu tarjeta SD -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the RELEASE `.zip` to the `/boot9strap/` folder on your SD card -1. Crea una carpeta llamada `3ds` en la raíz de tu tarjeta SD, si aún no existe - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy `slotTool.3dsx` from the `slotTool` folder inside the RELEASE `.zip` to the `/3ds/` folder on your SD card -1. Copy `usm.bin` from the RELEASE `.zip` to the root folder on your SD card -1. Copia `SafeB9SInstaller.bin` desde el `.zip` de SafeB9SInstaller a la raíz de tu tarjeta SD -1. Reinsert your SD card into your console -1. Power on your console -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch slotTool from the list of homebrew - + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section -1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option - + You will see some on-screen text and then your system will shut down - -![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Sección III - Instalar boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section IV - Restoring WiFi Configuration Profiles - -{% include_relative include/remove-usm-slottool.txt %} - -___ - -### Continúa en [Finalizar instalación](finalizing-setup) -{: .notice--primary} diff --git a/_pages/es_ES/installing-boot9strap-(usm).txt b/_pages/es_ES/installing-boot9strap-(usm).txt deleted file mode 100644 index 3d6699f3ed..0000000000 --- a/_pages/es_ES/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: "Instalar boot9strap (USM)" ---- - -{% include toc title="Tabla de contenidos" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -Estas instrucciones funcionan en consolas de las regiones USA, Europa, Japón y Corea, indicado por las letras U, E, J o K después de la versión del sistema. - -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--warning} - -### Qué necesitas - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* [usm.bin](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) - - -#### Sección I - Preparativos - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. - -1. Your SD card should be inserted in your computer -1. Copy `usm.bin` to the root of your SD card -1. Copia los archivos `boot.firm` y `boot.3dsx` desde el `.zip` de Luma3DS a la raíz de tu tarjeta SD - + La raíz de tu tarjeta SD se refiere al primer directorio de la tarjeta, donde puedes ver la carpeta Nintendo 3DS pero no estás dentro de ella -1. Crea una carpeta llamada `boot9strap` en la raíz de tu tarjeta SD -1. Copia `boot9strap.firm` y `boot9strap.firm.sha` desde el `.zip` de `boot9strap` a la carpeta `/boot9strap/` en tu tarjeta SD -1. Copia `SafeB9SInstaller.bin` desde el `.zip` de SafeB9SInstaller a la raíz de tu tarjeta SD - -![]({{ "/images/screenshots/usm/usm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Sección II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If the BB3 multihax menu doesn't open, [follow this troubleshooting guide](troubleshooting#bannerbomb3) - + If the BB3 multihax menu says "cfw installed already", you already have custom firmware and should continue from [here](checking-for-cfw) -1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" - + Your console will automatically power off -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Internet Settings` -> `Connection Settings` -1. Ensure that all three connections are named "Haaaaaaaxxxxxxxxx..." - + Do NOT change these settings! - + If all three connections are NOT all named "Haaaaaaaxxxxxxxxx...", STOP! Something went wrong in this section and MUST be fixed before you can continue -1. Power off your console - -#### Sección III - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section IV - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section V - Restoring WiFi Configuration Profiles - -In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. - -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" - + Your console will automatically reboot -1. Power off your console -1. Inserta tu tarjeta SD en tu computadora -1. Ve a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` en tu tarjeta SD -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. Este archivo ya no será necesario - -___ - -### Continúa en [Finalizar instalación](finalizing-setup) -{: .notice--primary} diff --git a/_pages/et_EE/installing-boot9strap-(fredtool).txt b/_pages/et_EE/installing-boot9strap-(fredtool).txt deleted file mode 100644 index 46eedbe264..0000000000 --- a/_pages/et_EE/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,102 +0,0 @@ ---- -title: "Installing Boot9strap (Fredtool)" ---- - -{% include toc title="Table of Contents" %} - -### Required Reading - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, for example from BannerBomb or the DSiWare Dumper tool. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -### What You Need - -* A DSiWare Backup (such as the one on SD root from [BannerBomb3](bannerbomb3) or [DSiWare Dumper](dsidumper)) -* Your `movable.sed` file from completing [Seedminer](seedminer) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) -* The latest release of [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) - -#### Section I - Prep Work - -1. Power off your device -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Copy `boot.nds` (B9STool) to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card - -#### Section II - Fredtool - -1. Open [Fredtool](https://fredtool.bruteforcemovable.com/) on your computer -1. Select your `movable.sed` file for the "Your movable.sed" field -1. Select your DSiWare Backup (`<8-character-id>.bin`) file for the "Your dsiware.bin" field -1. Complete the "I'm not a robot" captcha -1. Select "Start" -1. Wait for the process to complete -1. When the process has completed, download your modified DSiWare archive from the site - + This file contains 2 dsiware backup files, one clean (unmodified) and one hax (exploited) -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + This `` will be the same one that you used in [Seedminer](seedminer) - + This `` folder will be another 32 letter/number folder inside the `` folder - + If the `Nintendo DSiWare` folder does not exist, create it inside the `` folder -1. Copy the `42383841.bin` file from the `output/hax/` folder of the downloaded DSiWare archive (`fredtool_output.zip`) to the `Nintendo DSiWare` folder -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Haxxxxxxxxx!" title -1. Select "Copy", then select "OK" -1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" -1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio - -#### Section III - Flipnote Exploit - -If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). -{: .notice--info} - -1. Complete the initial setup process for the launched game until you reach the main menu - + Select the left option whenever prompted during the setup process -1. Using the touch-screen, select the large left box, then select the box with an SD card icon -1. Once the menu loads, select the face icon, then the bottom right icon to continue -1. Press (X) or (UP) on the D-Pad depending on which is shown on the top screen -1. Select the second button along the top with a film-reel icon -1. Scroll right until reel "3/3" is selected -1. Tap the third box with the letter "A" in it -1. Scroll left until reel "1/3" is selected -1. Tap the fourth box with the letter "A" in it -1. If the exploit was successful, your device will have loaded b9sTool -1. Using the D-Pad, move to "Install boot9strap" - + If you miss this step, the system will exit to home menu instead of installing boot9strap and you will need to open Nintendo DS Connections and start over from the beginning of Section III -1. Press (A), then press START and SELECT at the same time to begin the process -1. Once completed and the bottom screen says "done.", exit b9sTool, then power off your device - + You may have to force power off by holding the power button - + If you see the Luma Configuration screen, continue with the guide without powering off - -#### Section IV - Configuring Luma3DS - -1. Boot your device while holding (Select) to launch the Luma configuration menu - + If you encounter issues launching the Luma configuration menu, [follow this troubleshooting guide](https://github.com/zoogie/b9sTool/blob/master/TROUBLESHOOTING.md) -1. Use the (A) button and the D-Pad to turn on the following: - + **"Show NAND or user string in System Settings"** -1. Press (Start) to save and reboot - + Your device should load the Home Menu after a short delay. If you get a black screen lasting longer than 5 minutes, [follow this troubleshooting guide](troubleshooting#black-screen-on-sysnand-boot-after-installing-boot9strap) - -#### Section V - Restoring DS Connection Settings - -1. Power off your device -1. Insert your SD card into your computer -1. Copy the `42383841.bin` file from the `output/clean/` folder of the downloaded DSiWare archive (`fredtool_output.zip`) to the `Nintendo 3DS//<32-character-id>/Nintendo DSiWare/` folder on your SD card - + Replace the existing `42383841.bin` file -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Nintendo DSi™" title -1. Select "Copy", then select "OK" - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/et_EE/installing-boot9strap-(usm).txt b/_pages/et_EE/installing-boot9strap-(usm).txt deleted file mode 100644 index 079b370df0..0000000000 --- a/_pages/et_EE/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,92 +0,0 @@ ---- -title: "Installing boot9strap (USM)" ---- - -{% include toc title="Table of Contents" %} - -### Required Reading - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile to your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. - -If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, you will need to use a [Legacy Method](legacy-methods). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--danger} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer](seedminer) -* The latest release archive for [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) - -#### Section I - Prep Work - -1. Open [unSAFE_MODE-bb3 tool](https://usm.bruteforcemovable.com/) on your computer - + If this site is nonfunctional, try using [this one](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) -1. Upload your movable.sed using the "Choose File" option -1. Click "Download unSAFE_MODE-bb3 archive" - + This will download an exploit DSiWare called `F00D43D5.bin` and a SAFE_MODE exploit data file called `usm.bin` inside of a zip folder (`unSAFE_MODE-bb3.zip`) -1. If your console is powered on, power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Copy `usm.bin` from the USM archive (`unSAFE_MODE-bb3.zip`) to the root of your SD card -1. Navigate to `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card - + This `` will be the same one that you used in [Seedminer](seedminer) - + If `Nintendo DSiWare` does not exist, create it -1. If there are any existing DSiWare backup files (`<8-character-id>.bin`) in this folder, move them to your PC - + This will leave you with an empty Nintendo DSiWare folder. Moving the files to your PC ensures you don't delete any intentional backups -1. Copy the `F00D43D5.bin` file from the USM archive (`unSAFE_MODE-bb3.zip`) to the `Nintendo DSiWare` folder - -#### Section II - BannerBomb3 - -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your bottom screen should flash Red and then the system will reboot to home menu a few seconds later. This means the exploit profile was successfully copied - + If the bottom screen does not flash Red, the exploit profile was not copied and you will not be able to complete the next section. Ensure that your files are properly placed, then try again -1. Power off your device - -#### Section III - unSAFE_MODE - -1. With your system still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), then press (Power) - + Release the buttons after a few seconds. Your console will boot into Safe Mode -1. Press "OK" to accept the update - + There is no update. This is part of the exploit -1. Press "I accept" to accept the terms and conditions -1. The update will eventually fail, with error code `003-1099`. This is intended behaviour -1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` -1. Once you see `B9S install SUCCESS` on the top screen, press any button to reboot to Luma Configuration - -#### Section IV - Configuring Luma3DS - -1. Your device should automatically show the Luma Configuration menu -1. Use the (A) button and the D-Pad to turn on the following: - + **"Show NAND or user string in System Settings"** -1. Press (Start) to save and reboot - + Your device should load the Home Menu after a short delay. If you get a black screen lasting longer than 5 minutes, [follow this troubleshooting guide](troubleshooting#black-screen-on-sysnand-boot-after-installing-boot9strap) - -#### Section V - Restoring WiFi Configuration Profiles - -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your bottom screen should flash Green and then the system will reboot to home menu a few seconds later. This means your WiFi configuration profiles were successfully restored -1. Power your system off -1. Insert your SD card into your computer -1. Navigate to `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card - + This `` will be the same one that you used in [Seedminer](seedminer) -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Continue to Finalizing Setup - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/fi_FI/dumping-movable-(nimhax).txt b/_pages/fi_FI/dumping-movable-(nimhax).txt deleted file mode 100644 index 6cceed9481..0000000000 --- a/_pages/fi_FI/dumping-movable-(nimhax).txt +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: "Dumping Movable (nimhax)" ---- - -{% include toc title="Sisällysluettelo" %} - -{% capture technical_info %} -Technical Details (optional) - -To install boot9strap on your console, we derive your console's unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console. - -For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Tarpeet - -* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file) - -### Ohjeet - -#### Vaihe I – Valmistelut - -1. Power off your console -1. Aseta SD-korttisi tietokoneeseesi -1. Copy the `nimhax` folder from the nimhax `.zip` to the `/3ds/` folder on your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) -{: .notice--info} - -#### Section II - nimhax - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch nimhax from the list of homebrew -1. If the exploit was successful, a `movable.sed` file will appear on the root of your SD card - -### Next step: Frogtool - -Once you have your console's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \ -While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you're unable to use a torrent client. - -Continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--primary} diff --git a/_pages/fi_FI/homebrew-launcher-(freakyhax).txt b/_pages/fi_FI/homebrew-launcher-(freakyhax).txt deleted file mode 100644 index e81c4224c1..0000000000 --- a/_pages/fi_FI/homebrew-launcher-(freakyhax).txt +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: "Homebrew Launcher (freakyhax)" ---- - -{% include toc title="Sisällysluettelo" %} - -{% capture technical_info %} -Technical Details (optional) -[freakyhax](https://plutooo.github.io/freakyhax/) is an exploit for the game Freakyforms Deluxe discovered and released by [plutooo](https://github.com/plutooo). It works on versions 9.0.0 through 11.17.0 on EUR, USA and JPN region consoles. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -### Tarpeet - -+ A EUR/USA/JPN copy of Freakyforms Deluxe (eShop or cartridge) -+ The latest release of [freakyhax](https://github.com/plutooo/freakyhax/releases/latest) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Ohjeet - -#### Vaihe I – Valmistelut - -1. Power off your console -1. Aseta SD-korttisi tietokoneeseesi -1. Copy all files and folders inside the `/build//exploit/` folder from the freakyhax `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - freakyhax - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch Freakyforms Deluxe -1. In the game menu, select `Play -> Camera -> Load a QR code` -1. Select the QR code -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/fi_FI/homebrew-launcher-(ninjhax2-dx).txt b/_pages/fi_FI/homebrew-launcher-(ninjhax2-dx).txt deleted file mode 100644 index c0d1992d6c..0000000000 --- a/_pages/fi_FI/homebrew-launcher-(ninjhax2-dx).txt +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "Homebrew Launcher (ninjhax2-dx)" ---- - -{% include toc title="Sisällysluettelo" %} - -{% capture technical_info %} -Technical Details (optional) -[Ninjhax2](https://github.com/smealum/ninjhax2.x) is an exploit for the game "Cubic Ninja" made by [smealum](https://github.com/smealum). This page uses an updated version of ninjhax by [zoogie](https://github.com/zoogie) called [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx), which supports 11.17.0. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -This process will overwrite your Cubic Ninja save file, if you have one. -{: .notice--warning} - -### Tarpeet -* The game "Cubic Ninja" -* The latest release of [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx/releases) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -### Ohjeet - -#### Vaihe I – Valmistelut - -1. Power off your console -1. Aseta SD-korttisi tietokoneeseesi -1. Copy `Launcher.dat` from the folder appropriate for your console from the ninjhax2-dx `.zip` file to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - -#### Section II - ninjhax2-dx -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Cubic Ninja" once and select "Create" - + If prompted, delete all data -1. Select "QR Code" -1. Select "Scan QR Code" -1. On your PC, open the browser and go to [ninjhax2-dx website](https://zoogie.github.io/web/nh2dx/) -1. Select your console's region and hardware -1. On your console, scan the QR code - + If the game exits to the HOME Menu, then the exploit has installed correctly -1. Launch "Cubic Ninja" again -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/fi_FI/homebrew-launcher-(pichaxx).txt b/_pages/fi_FI/homebrew-launcher-(pichaxx).txt deleted file mode 100644 index 0051b3d932..0000000000 --- a/_pages/fi_FI/homebrew-launcher-(pichaxx).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (PicHaxx)" ---- - -{% include toc title="Sisällysluettelo" %} - -{% capture technical_info %} -Technical Details (optional) -[PicHaxx](https://github.com/zoogie/pichaxx) is an exploit for the game Pokémon Picross released by [zoogie](https://github.com/zoogie), originally discovered and [demonstrated](https://twitter.com/mrnbayoh/status/744899681663258624) by [MrNbaYoh](https://github.com/MrNbaYoh). - -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### Tarpeet - -+ The game "Pokémon Picross" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Pokémon Picross -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Ohjeet - -#### Vaihe I – Valmistelut - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Aseta SD-korttisi tietokoneeseesi -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card - -![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - PicHaxx - -In this section, you will create a hacked Pokémon Picross save file that, when loaded, will run the Homebrew Launcher on your console. - -1. Open [the PicHaxx Injector website](https://3dstools.nhnarwhal.com/#/pichaxx) on your computer -1. Select your `movable.sed` file -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `0017c100` -> `data` on your SD card - + The `` will be the same one that you used in Seedminer - + The `` is a 32 character long folder inside of the `` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted - - ![]({{ "/images/screenshots/pichaxx-save-location.png" | absolute_url }}) - {: .notice--info} - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Pokémon Picross" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher - + If you get an error message, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-pichaxx) -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/fi_FI/homebrew-launcher-(smilehax-iie).txt b/_pages/fi_FI/homebrew-launcher-(smilehax-iie).txt deleted file mode 100644 index 925c564bba..0000000000 --- a/_pages/fi_FI/homebrew-launcher-(smilehax-iie).txt +++ /dev/null @@ -1,70 +0,0 @@ ---- -title: "Homebrew Launcher (smilehax-IIe)" ---- - -{% include toc title="Sisällysluettelo" %} - -This set of instructions does not support the Japanese version of SmileBASIC. -{: .notice--warning} - -{% capture technical_info %} -Technical Details (optional) -[smilehax-IIe](https://github.com/zoogie/smilehax-IIe) is an exploit for the game "SmileBASIC" made by zoogie, compatible with system versions 9.0.0 through 11.17.0 for USA/EUR/JPN region consoles. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Tarpeet -+ The game "SmileBASIC" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install SmileBASIC -+ The latest release of [smilehax-IIe](https://github.com/zoogie/smilehax-IIe/releases/download/v1.1/Release_sh2e_v1.1.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Ohjeet - -#### Vaihe I – Valmistelut - -1. Power off your console -1. Aseta SD-korttisi tietokoneeseesi -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Transfer the `.wav` for your region from the Release_sh2e `.zip` to a device that can play `.wav` files, for example a phone -1. Copy the petitcom `.icn` for your region to the root of your SD card - -#### Section II - smilehax - -1. Launch SmileBASIC - + Update the game if prompted -1. Select the "Publish/Download Projects" option -1. Select the "Download (Receive) using Public Key" option -1. Press the "Yes" button -1. Enter the Public Key "NJEQK3A4" using the on-screen keyboard -1. Press the "Yes" button to confirm the download of PMODEM141 -1. Press "OK", then "Back", then "Browse Projects" -1. Select PMODEM141, then press "Select File" -1. Select PMODEM141.PRG, then press "OK", then "Yes" to execute it -1. Select RECEIVE FILE SIMPLEX -1. Prepare the device you use to play the `.wav` file -1. Keep your console about a foot from the `.wav` file playing devices' speaker and use a reasonable (not loud) volume to play the `.wav` -1. Now select 300BPS, then play the `.wav` file -1. When it finishes, press "Yes", then press "OK" -1. Press the START button -1. Select the SH2E-xxx.TXT file, then press OK, then "Yes" to execute it - + If you get kicked back into menu, make sure you're using the latest version of SmileBASIC -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/fi_FI/homebrew-launcher-(steelhax).txt b/_pages/fi_FI/homebrew-launcher-(steelhax).txt deleted file mode 100644 index e3e2e7b0b6..0000000000 --- a/_pages/fi_FI/homebrew-launcher-(steelhax).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (Steelhax)" ---- - -{% include toc title="Sisällysluettelo" %} - -{% capture technical_info %} -Technical Details (optional) -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Steel Diver: Sub Wars, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Steel Diver: Sub Wars save file, if you have one. If you wish to preserve your Steel Diver: Sub Wars game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### Tarpeet - -+ The game "Steel Diver: Sub Wars" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Steel Diver: Sub Wars -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Steelhax](/assets/steelhax-release.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Ohjeet - -#### Vaihe I – Valmistelut - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Aseta SD-korttisi tietokoneeseesi -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the `steelhax` folder from the `Steelhax-release.zip` to the root of your SD card -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - Steelminer - -In this section, you will create a hacked Steel Diver: Sub Wars save file that, when used, will load the Homebrew Launcher on your console. - -1. Launch "Steel Diver: Sub Wars" once and select a Mii to initialize your save file - + Decline the game update when prompted - + If you have already updated the game, use the Data Management menu of the System Settings to delete the update -1. Exit "Steel Diver: Sub Wars" -1. Power off your console -1. Aseta SD-korttisi tietokoneeseesi -1. Open [the SteelHax Save Tool website](https://3dstools.nhnarwhal.com/#/steelhax) on your computer -1. Select your `movable.sed` file -1. Select your region based on your console -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `<8-character-region>` -> `data` on your SD card - + **EUR Region**: `000d7e00` - + **JPN Region**: `000d7c00` - + **USA Region**: `000d7d00` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Steel Diver: Sub Wars" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/fi_FI/homebrew-launcher-(super-skaterhax).txt b/_pages/fi_FI/homebrew-launcher-(super-skaterhax).txt deleted file mode 100644 index fddc294f8b..0000000000 --- a/_pages/fi_FI/homebrew-launcher-(super-skaterhax).txt +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: "Homebrew Launcher (super-skaterhax)" ---- - -{% include toc title="Sisällysluettelo" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see [here](https://github.com/zoogie/super-skaterhax). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -Super-skaterhax (when used to launch the Homebrew Launcher) is compatible with New models on version 11.16.0 in all regions, and 11.17.0 in the EUR, JPN and USA regions. - -The instructions provided only apply to the New 3DS, New 3DS XL, and New 2DS XL. Please ensure that the console you are modding is a New 3DS, New 3DS XL, or New 2DS XL before continuing. -{: .notice--warning} - -### Tarpeet - -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* The latest release of [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (the release `.zip` file) - -#### Vaihe I – Valmistelut - -In this section, you will copy the files needed to trigger both super-skaterhax and the Homebrew Launcher. - -1. Power off your console -1. Aseta SD-korttisi tietokoneeseesi -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy everything inside the folder for your console's region (and also system version if the region is USA) in the super-skaterhax `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/skater-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - super-skaterhax - -In this section, you will visit the browser exploit webpage, which will launch the Homebrew Launcher. - -If you haven't already, make sure you have a working Internet connection set up on your console. -{: .notice--info} - -1. On the HOME Menu, press the Left and Right shoulder buttons at the same time to open the camera - + If you are unable to open the camera, open the Internet Browser and manually type the URL instead (`https://zoogie.github.io/web/super/` for EUR/USA/JPN, `https://zoogie.github.io/web/korea` for KOR) -1. Tap the QR code button and scan one of the following QR codes for your console's region [here](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png) - + If you get a security certificate warning, press (A) to allow the connection -1. Press the (Select) button to open the bookmark tab - + If your (Select) button does not respond, tap the star icon on the bottom-left corner of the screen -1. Tap "Bookmark this page" -1. Press (B) once to return to the browser -1. Press (Start) to open the context menu - + If your (Start) button does not respond, tap the 3-line menu on the bottom-right corner of the screen -1. Tap on "Settings" -1. Tap on "Delete Cookies" -1. Paina (A):ta jatkaaksesi -1. Press (Home) to return to the HOME Menu, then immediately press (A) to launch the browser again -1. Select the "GO GO!" button on the top screen - + If any prompts appear, approve all of them - + If your console freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your console freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section - + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/fi_FI/include/fredtool-prep.txt b/_pages/fi_FI/include/fredtool-prep.txt deleted file mode 100644 index e82aa7bc83..0000000000 --- a/_pages/fi_FI/include/fredtool-prep.txt +++ /dev/null @@ -1,29 +0,0 @@ -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Aseta SD-korttisi tietokoneeseesi -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} \ No newline at end of file diff --git a/_pages/fi_FI/include/hbl-common-exploits-movable.txt b/_pages/fi_FI/include/hbl-common-exploits-movable.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/fi_FI/include/hbl-common-exploits-movable.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/fi_FI/include/hbl-common-exploits.txt b/_pages/fi_FI/include/hbl-common-exploits.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/fi_FI/include/hbl-common-exploits.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/fi_FI/installing-boot9strap-(fredtool).txt b/_pages/fi_FI/installing-boot9strap-(fredtool).txt deleted file mode 100644 index 2393ebbf3a..0000000000 --- a/_pages/fi_FI/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool)" ---- - -{% include toc title="Sisällysluettelo" %} - -{% capture technical_info %} -Technical Details (optional) - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### Tarpeet - -* Your `movable.sed` file from completing [Seedminer](seedminer) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Jatka osioon [Asennuksen viimeistely](finalizing-setup) -{: .notice--primary} diff --git a/_pages/fi_FI/installing-boot9strap-(fredtool-legacy).txt b/_pages/fi_FI/installing-boot9strap-(fredtool-legacy).txt deleted file mode 100644 index 71f85bc41a..0000000000 --- a/_pages/fi_FI/installing-boot9strap-(fredtool-legacy).txt +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool, Legacy)" ---- - -{% include toc title="Sisällysluettelo" %} - -{% capture technical_info %} -Technical Details (optional) - -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. - -Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### Tarpeet - -* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Jatka osioon [Asennuksen viimeistely](finalizing-setup) -{: .notice--primary} diff --git a/_pages/fi_FI/installing-boot9strap-(frogtool).txt b/_pages/fi_FI/installing-boot9strap-(frogtool).txt deleted file mode 100644 index 7680548c6e..0000000000 --- a/_pages/fi_FI/installing-boot9strap-(frogtool).txt +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Installing boot9strap (Frogtool)" ---- - -{% include toc title="Sisällysluettelo" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see "DSiWare_Exports CTCert verification" and "FIRM partitions known-plaintext" [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - - -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) link for `frogcert.bin` on this page, you will need a torrent client like [qBittorrent](https://www.qbittorrent.org/download.php) or [Deluge](http://dev.deluge-torrent.org/wiki/Download). -{: .notice--warning} - -### Tarpeet - -* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link) -* The latest release of [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (direct download) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - Prep Work - -1. Power off your console -1. Aseta SD-korttisi tietokoneeseesi -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Copy `boot.nds` (b9sTool) from the b9sTool release `.zip` to the root of your SD card -1. Luo `3ds`‑niminen kansio SD‑korttisi juureen, jos sitä ei jo ole olemassa - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy the `Frogtool` folder from the Frogtool-nimhax `.zip` to the `/3ds/` folder on your SD card -1. Copy `frogcert.bin` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section III - Patching DS Download Play - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch Frogtool from the list of homebrew -1. Select the "INJECT patched DS Download Play" option -1. Frogtool will automatically run and inject the JPN version of Flipnote Studio into your DS Download Play -1. Once this operation has finished, read the screens and check if the process was successful -1. Tap the touch screen, then select "BOOT patched DS Download Play" -1. If the exploit was successful, your console will have loaded the JPN version of Flipnote Studio - + If you get stuck on a black screen, follow [this](https://wiki.hacks.guide/wiki/3DS:TWLFix#Userland_(PicHaxx,_Steelhax,_etc.)-0) page, then try again - -#### Section IV - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsdlp" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Download Play - -1. Avaa Download Play -sovellus -1. Wait until you see the two buttons - + Do not press either of the buttons -1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu -1. Valitse "Miscellaneous options" -1. Valitse "Switch the hb. title to the current app." -1. Paina (B):tä jatkaaksesi -1. Paina (B):tä palataksesi Rosalinan päävalikkoon -1. Paina (B):tä poistuaksesi Rosalina-valikosta -1. Paina (HOME)-painiketta ja sulje Download Play -1. Relaunch the Download Play application -1. Your console should load the Homebrew Launcher -1. Launch Frogtool from the list of homebrew -1. Select the "RESTORE clean DS Download Play" option -1. Once this operation has finished, read the screens and check if the process was successful - + If there are any errors or missing files, correct the problem and try again -1. If the process was successful, tap the touch screen, then press START to exit -1. Power off your console - -___ - -### Jatka osioon [Asennuksen viimeistely](finalizing-setup) -{: .notice--primary} diff --git a/_pages/fi_FI/installing-boot9strap-(hbl-usm).txt b/_pages/fi_FI/installing-boot9strap-(hbl-usm).txt deleted file mode 100644 index 387a11f84a..0000000000 --- a/_pages/fi_FI/installing-boot9strap-(hbl-usm).txt +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "Installing boot9strap (HBL-USM)" ---- - -{% include toc title="Sisällysluettelo" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--danger} - -### Tarpeet - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) (direct download) - -#### Vaihe I – Valmistelut - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. Then, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Aseta SD-korttisi tietokoneeseesi -1. Luo `boot9strap`-niminen kansio SD-korttisi juureen -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the RELEASE `.zip` to the `/boot9strap/` folder on your SD card -1. Luo `3ds`‑niminen kansio SD‑korttisi juureen, jos sitä ei jo ole olemassa - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy `slotTool.3dsx` from the `slotTool` folder inside the RELEASE `.zip` to the `/3ds/` folder on your SD card -1. Copy `usm.bin` from the RELEASE `.zip` to the root folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch slotTool from the list of homebrew - + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section -1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option - + You will see some on-screen text and then your system will shut down - -![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Vaihe III – Boot9strapin asentaminen - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section IV - Restoring WiFi Configuration Profiles - -{% include_relative include/remove-usm-slottool.txt %} - -___ - -### Jatka osioon [Asennuksen viimeistely](finalizing-setup) -{: .notice--primary} diff --git a/_pages/fi_FI/installing-boot9strap-(usm).txt b/_pages/fi_FI/installing-boot9strap-(usm).txt deleted file mode 100644 index b4b42932fd..0000000000 --- a/_pages/fi_FI/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: "Installing boot9strap (USM)" ---- - -{% include toc title="Sisällysluettelo" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. - -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--warning} - -### Tarpeet - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* [usm.bin](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) - - -#### Vaihe I – Valmistelut - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. - -1. Your SD card should be inserted in your computer -1. Copy `usm.bin` to the root of your SD card -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Luo `boot9strap`-niminen kansio SD-korttisi juureen -1. Kopioi boot9strap-`.zip`-pakkauksesta `boot9strap.firm` ja `boot9strap.firm.sha` SD-korttisi `/boot9strap/`-kansioon -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card - -![]({{ "/images/screenshots/usm/usm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If the BB3 multihax menu doesn't open, [follow this troubleshooting guide](troubleshooting#bannerbomb3) - + If the BB3 multihax menu says "cfw installed already", you already have custom firmware and should continue from [here](checking-for-cfw) -1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" - + Your console will automatically power off -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Internet Settings` -> `Connection Settings` -1. Ensure that all three connections are named "Haaaaaaaxxxxxxxxx..." - + Do NOT change these settings! - + If all three connections are NOT all named "Haaaaaaaxxxxxxxxx...", STOP! Something went wrong in this section and MUST be fixed before you can continue -1. Power off your console - -#### Section III - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section IV - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section V - Restoring WiFi Configuration Profiles - -In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. - -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" - + Your console will automatically reboot -1. Power off your console -1. Aseta SD-korttisi tietokoneeseesi -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore - -___ - -### Jatka osioon [Asennuksen viimeistely](finalizing-setup) -{: .notice--primary} diff --git a/_pages/fr_FR/dumping-movable-(nimhax).txt b/_pages/fr_FR/dumping-movable-(nimhax).txt deleted file mode 100644 index 559c7f4ff0..0000000000 --- a/_pages/fr_FR/dumping-movable-(nimhax).txt +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: "Dumping du Movable (nimhax)" ---- - -{% include toc title="Table des matières" %} - -{% capture technical_info %} -Détails techniques (facultatif) - -To install boot9strap on your console, we derive your console's unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console. - -Pour une explication plus technique, voir [ici](https://github.com/luigoalma/nimhax/) pour des informations sur l'exploit nimhax. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -## Ce dont vous avez besoin - -* La dernière version de [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (le fichier nimhax `.zip`) - -### Instructions - -#### Section I - Préparatifs - -1. Éteignez votre console -1. Insérez votre carte SD dans votre ordinateur -1. Copiez le dossier `nimhax` du fichier `.zip` vers le dossier `/3ds/` de votre carte SD -1. Réinsérez votre carte SD dans votre console -1. Power on your console - -![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) -{: .notice--info} - -#### Section II - nimhax - -1. Ouvrez l'Homebrew Launcher par la méthode de votre choix (probablement le Navigateur Internet) -1. Lancez nimhax depuis la liste des homebrew -1. Si l'exploit a réussi, un fichier `movable.sed` apparaîtra à la racine de votre carte SD - -### Next step: Frogtool - -Once you have your console's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \ -Bien que cette méthode soit plus rapide, elle nécessite de télécharger un fichier avec un client torrent. Ne suivez pas cette méthode si vous n'êtes pas en mesure d'utiliser un client torrent. - -Continuer vers [Installation de boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--primary} diff --git a/_pages/fr_FR/homebrew-launcher-(freakyhax).txt b/_pages/fr_FR/homebrew-launcher-(freakyhax).txt deleted file mode 100644 index f6b378f1a8..0000000000 --- a/_pages/fr_FR/homebrew-launcher-(freakyhax).txt +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: "Homebrew Launcher (freakyhax)" ---- - -{% include toc title="Table des matières" %} - -{% capture technical_info %} -Détails techniques (facultatif) -[freakyhax](https://plutooo.github.io/freakyhax/) is an exploit for the game Freakyforms Deluxe discovered and released by [plutooo](https://github.com/plutooo). It works on versions 9.0.0 through 11.17.0 on EUR, USA and JPN region consoles. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -## Ce dont vous avez besoin - -+ A EUR/USA/JPN copy of Freakyforms Deluxe (eShop or cartridge) -+ The latest release of [freakyhax](https://github.com/plutooo/freakyhax/releases/latest) -* La dernière version de [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (le fichier `.zip' de Luma3DS) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Préparatifs - -1. Éteignez votre console -1. Insérez votre carte SD dans votre ordinateur -1. Copy all files and folders inside the `/build//exploit/` folder from the freakyhax `.zip` to the root of your SD card - + La racine de la carte SD représente le répertoire initial de la carte SD où vous pouvez voir le dossier Nintendo 3DS, mais ce n'est pas à l'intérieur de ce dernier -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copiez `boot.firm` et `boot.3dsx` depuis Luma3DS `.zip`vers la racine de votre carte SD -1. Réinsérez votre carte SD dans votre console -1. Power on your console - -#### Section II - freakyhax - -1. Réinsérez votre carte SD dans votre console -1. Power on your console -1. Launch Freakyforms Deluxe -1. In the game menu, select `Play -> Camera -> Load a QR code` -1. Select the QR code -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Éteignez votre console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. Cela déterminera la méthode que vous allez suivre sur la page suivante. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/fr_FR/homebrew-launcher-(ninjhax2-dx).txt b/_pages/fr_FR/homebrew-launcher-(ninjhax2-dx).txt deleted file mode 100644 index 7cf9d55d44..0000000000 --- a/_pages/fr_FR/homebrew-launcher-(ninjhax2-dx).txt +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "Homebrew Launcher (ninjhax2-dx)" ---- - -{% include toc title="Table des matières" %} - -{% capture technical_info %} -Détails techniques (facultatif) -[Ninjhax2](https://github.com/smealum/ninjhax2.x) is an exploit for the game "Cubic Ninja" made by [smealum](https://github.com/smealum). This page uses an updated version of ninjhax by [zoogie](https://github.com/zoogie) called [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx), which supports 11.17.0. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -This process will overwrite your Cubic Ninja save file, if you have one. -{: .notice--warning} - -## Ce dont vous avez besoin -* The game "Cubic Ninja" -* The latest release of [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx/releases) -* La dernière version de [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (le fichier `.zip' de Luma3DS) - -### Instructions - -#### Section I - Préparatifs - -1. Éteignez votre console -1. Insérez votre carte SD dans votre ordinateur -1. Copy `Launcher.dat` from the folder appropriate for your console from the ninjhax2-dx `.zip` file to the root of your SD card - + La racine de la carte SD représente le répertoire initial de la carte SD où vous pouvez voir le dossier Nintendo 3DS, mais ce n'est pas à l'intérieur de ce dernier -1. Copiez `boot.firm` et `boot.3dsx` depuis Luma3DS `.zip`vers la racine de votre carte SD - -#### Section II - ninjhax2-dx -1. Réinsérez votre carte SD dans votre console -1. Power on your console -1. Launch "Cubic Ninja" once and select "Create" - + If prompted, delete all data -1. Select "QR Code" -1. Select "Scan QR Code" -1. On your PC, open the browser and go to [ninjhax2-dx website](https://zoogie.github.io/web/nh2dx/) -1. Select your console's region and hardware -1. On your console, scan the QR code - + If the game exits to the HOME Menu, then the exploit has installed correctly -1. Launch "Cubic Ninja" again -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Éteignez votre console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. Cela déterminera la méthode que vous allez suivre sur la page suivante. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/fr_FR/homebrew-launcher-(pichaxx).txt b/_pages/fr_FR/homebrew-launcher-(pichaxx).txt deleted file mode 100644 index 324f4302e9..0000000000 --- a/_pages/fr_FR/homebrew-launcher-(pichaxx).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (PicHaxx)" ---- - -{% include toc title="Table des matières" %} - -{% capture technical_info %} -Détails techniques (facultatif) -[PicHaxx](https://github.com/zoogie/pichaxx) is an exploit for the game Pokémon Picross released by [zoogie](https://github.com/zoogie), originally discovered and [demonstrated](https://twitter.com/mrnbayoh/status/744899681663258624) by [MrNbaYoh](https://github.com/MrNbaYoh). - -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -## Ce dont vous avez besoin - -+ The game "Pokémon Picross" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Pokémon Picross -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Préparatifs - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Éteignez votre console -1. Insérez votre carte SD dans votre ordinateur -1. Copiez `boot.firm` et `boot.3dsx` depuis Luma3DS `.zip`vers la racine de votre carte SD - + La racine de la carte SD représente le répertoire initial de la carte SD où vous pouvez voir le dossier Nintendo 3DS, mais ce n'est pas à l'intérieur de ce dernier -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card - -![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - PicHaxx - -In this section, you will create a hacked Pokémon Picross save file that, when loaded, will run the Homebrew Launcher on your console. - -1. Open [the PicHaxx Injector website](https://3dstools.nhnarwhal.com/#/pichaxx) on your computer -1. Select your `movable.sed` file -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `0017c100` -> `data` on your SD card - + The `` will be the same one that you used in Seedminer - + L'`` est un dossier de 32 caractères à l'intérieur du dossier `` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted - - ![]({{ "/images/screenshots/pichaxx-save-location.png" | absolute_url }}) - {: .notice--info} - -1. Réinsérez votre carte SD dans votre console -1. Power on your console -1. Launch "Pokémon Picross" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher - + If you get an error message, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-pichaxx) -1. Éteignez votre console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. Cela déterminera la méthode que vous allez suivre sur la page suivante. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/fr_FR/homebrew-launcher-(smilehax-iie).txt b/_pages/fr_FR/homebrew-launcher-(smilehax-iie).txt deleted file mode 100644 index e74cca31d3..0000000000 --- a/_pages/fr_FR/homebrew-launcher-(smilehax-iie).txt +++ /dev/null @@ -1,70 +0,0 @@ ---- -title: "Homebrew Launcher (smilehax-IIe)" ---- - -{% include toc title="Table des matières" %} - -This set of instructions does not support the Japanese version of SmileBASIC. -{: .notice--warning} - -{% capture technical_info %} -Détails techniques (facultatif) -[smilehax-IIe](https://github.com/zoogie/smilehax-IIe) is an exploit for the game "SmileBASIC" made by zoogie, compatible with system versions 9.0.0 through 11.17.0 for USA/EUR/JPN region consoles. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -## Ce dont vous avez besoin -+ The game "SmileBASIC" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install SmileBASIC -+ The latest release of [smilehax-IIe](https://github.com/zoogie/smilehax-IIe/releases/download/v1.1/Release_sh2e_v1.1.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Préparatifs - -1. Éteignez votre console -1. Insérez votre carte SD dans votre ordinateur -1. Copiez `boot.firm` et `boot.3dsx` depuis Luma3DS `.zip`vers la racine de votre carte SD - + La racine de la carte SD représente le répertoire initial de la carte SD où vous pouvez voir le dossier Nintendo 3DS, mais ce n'est pas à l'intérieur de ce dernier -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Transfer the `.wav` for your region from the Release_sh2e `.zip` to a device that can play `.wav` files, for example a phone -1. Copy the petitcom `.icn` for your region to the root of your SD card - -#### Section II - smilehax - -1. Launch SmileBASIC - + Update the game if prompted -1. Select the "Publish/Download Projects" option -1. Select the "Download (Receive) using Public Key" option -1. Press the "Yes" button -1. Enter the Public Key "NJEQK3A4" using the on-screen keyboard -1. Press the "Yes" button to confirm the download of PMODEM141 -1. Press "OK", then "Back", then "Browse Projects" -1. Select PMODEM141, then press "Select File" -1. Select PMODEM141.PRG, then press "OK", then "Yes" to execute it -1. Select RECEIVE FILE SIMPLEX -1. Prepare the device you use to play the `.wav` file -1. Keep your console about a foot from the `.wav` file playing devices' speaker and use a reasonable (not loud) volume to play the `.wav` -1. Now select 300BPS, then play the `.wav` file -1. When it finishes, press "Yes", then press "OK" -1. Press the START button -1. Select the SH2E-xxx.TXT file, then press OK, then "Yes" to execute it - + If you get kicked back into menu, make sure you're using the latest version of SmileBASIC -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Éteignez votre console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. Cela déterminera la méthode que vous allez suivre sur la page suivante. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/fr_FR/homebrew-launcher-(steelhax).txt b/_pages/fr_FR/homebrew-launcher-(steelhax).txt deleted file mode 100644 index f0befa8672..0000000000 --- a/_pages/fr_FR/homebrew-launcher-(steelhax).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (Steelhax)" ---- - -{% include toc title="Table des matières" %} - -{% capture technical_info %} -Détails techniques (facultatif) -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Steel Diver: Sub Wars, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Steel Diver: Sub Wars save file, if you have one. If you wish to preserve your Steel Diver: Sub Wars game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -## Ce dont vous avez besoin - -+ The game "Steel Diver: Sub Wars" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Steel Diver: Sub Wars -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Steelhax](/assets/steelhax-release.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Préparatifs - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Éteignez votre console -1. Insérez votre carte SD dans votre ordinateur -1. Copiez `boot.firm` et `boot.3dsx` depuis Luma3DS `.zip`vers la racine de votre carte SD - + La racine de la carte SD représente le répertoire initial de la carte SD où vous pouvez voir le dossier Nintendo 3DS, mais ce n'est pas à l'intérieur de ce dernier -1. Copy the `steelhax` folder from the `Steelhax-release.zip` to the root of your SD card -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card -1. Réinsérez votre carte SD dans votre console -1. Power on your console - -#### Section II - Steelminer - -In this section, you will create a hacked Steel Diver: Sub Wars save file that, when used, will load the Homebrew Launcher on your console. - -1. Launch "Steel Diver: Sub Wars" once and select a Mii to initialize your save file - + Decline the game update when prompted - + If you have already updated the game, use the Data Management menu of the System Settings to delete the update -1. Exit "Steel Diver: Sub Wars" -1. Éteignez votre console -1. Insérez votre carte SD dans votre ordinateur -1. Open [the SteelHax Save Tool website](https://3dstools.nhnarwhal.com/#/steelhax) on your computer -1. Select your `movable.sed` file -1. Select your region based on your console -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `<8-character-region>` -> `data` on your SD card - + **EUR Region**: `000d7e00` - + **JPN Region**: `000d7c00` - + **USA Region**: `000d7d00` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted -1. Réinsérez votre carte SD dans votre console -1. Power on your console -1. Launch "Steel Diver: Sub Wars" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Éteignez votre console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. Cela déterminera la méthode que vous allez suivre sur la page suivante. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/fr_FR/homebrew-launcher-(super-skaterhax).txt b/_pages/fr_FR/homebrew-launcher-(super-skaterhax).txt deleted file mode 100644 index 0fd322ad6d..0000000000 --- a/_pages/fr_FR/homebrew-launcher-(super-skaterhax).txt +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: "Homebrew Launcher (super-skaterhax)" ---- - -{% include toc title="Table des matières" %} - -{% capture technical_info %} -Détails techniques (facultatif) -Pour des détails techniques sur les exploits que vous utiliserez sur cette page, voir [ici](https://github.com/zoogie/super-skaterhax). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Notes de compatibilité - -Super-skaterhax (when used to launch the Homebrew Launcher) is compatible with New models on version 11.16.0 in all regions, and 11.17.0 in the EUR, JPN and USA regions. - -Les instructions fournies ne s'appliquent qu'aux New 3DS, New 3DS XL et New 2DS XL. Please ensure that the console you are modding is a New 3DS, New 3DS XL, or New 2DS XL before continuing. -{: .notice--warning} - -## Ce dont vous avez besoin - -* La dernière version de [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (le fichier `.zip' de Luma3DS) -* La dernière version de [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (le fichier `.zip`) - -#### Section I - Préparatifs - -Dans cette section, vous copierez les fichiers nécessaires pour déclencher à la fois super-skaterhax et l'Homebrew Launcher. - -1. Éteignez votre console -1. Insérez votre carte SD dans votre ordinateur -1. Copiez `boot.firm` et `boot.3dsx` depuis Luma3DS `.zip`vers la racine de votre carte SD - + La racine de la carte SD représente le répertoire initial de la carte SD où vous pouvez voir le dossier Nintendo 3DS, mais ce n'est pas à l'intérieur de ce dernier -1. Copy everything inside the folder for your console's region (and also system version if the region is USA) in the super-skaterhax `.zip` to the root of your SD card -1. Réinsérez votre carte SD dans votre console -1. Power on your console - -![]({{ "/images/screenshots/skater-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - super-skaterhax - -Dans cette section, vous allez visiter la page web d'exploit du Navigateur Internet, qui lancera l'Homebrew Launcher. - -Si vous ne l'avez pas déjà fait, assurez-vous d'avoir une connexion Internet fonctionnelle configurée sur votre console. -{: .notice--info} - -1. Sur le Menu HOME, appuyez simultanément sur les boutons (L) et (R) pour ouvrir l'appareil photo - + Si vous ne pouvez pas ouvrir la caméra, ouvrez le Navigateur Internet et tapez manuellement l'URL (`https://zoogie.github.io/web/super/` pour EUR/USA/JPN, `https://zoogie.github.io/web/korea` pour KOR) -1. Tap the QR code button and scan one of the following QR codes for your console's region [here](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png) - + Si vous recevez un avertissement de certificat de sécurité, appuyez sur (A) pour autoriser la connexion -1. Appuyez sur le bouton (Select) pour ouvrir l'onglet signet - + Si votre bouton (Select) ne répond pas, appuyez sur l'icône étoile en bas à gauche de l'écran -1. Appuyez sur "Ajouter cette page aux favoris" -1. Appuyez une fois sur (B) pour revenir au navigateur -1. Appuyez sur (Start) pour ouvrir le menu contextuel - + Si votre bouton (Start) ne répond pas, appuyez sur le bouton avec 3 lignes en bas à droite de l'écran -1. Appuyez sur "Paramètres" -1. Appuyez sur "Effacer les cookies" -1. Appuyez sur (A) pour continuer -1. Appuyez sur (HOME) pour revenir au Menu HOME, puis appuyez immédiatement sur (A) pour relancer le navigateur -1. Appuyez sur le bouton "GO GO!" en haut de l'écran - + Si des invites apparaissent, approuvez les tous - + If your console freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your console freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section - + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Éteignez votre console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. Cela déterminera la méthode que vous allez suivre sur la page suivante. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/fr_FR/include/fredtool-prep.txt b/_pages/fr_FR/include/fredtool-prep.txt deleted file mode 100644 index 47fa07c89f..0000000000 --- a/_pages/fr_FR/include/fredtool-prep.txt +++ /dev/null @@ -1,29 +0,0 @@ -Dans cette section, vous copierez les fichiers nécessaires pour remplacer temporairement Connexions Nintendo DS par Flipnote Studio, qui est utilisé pour lancer l'installateur de boot9strap (custom firmware). - -1. Insérez votre carte SD dans votre ordinateur -1. Ouvrez le site Web [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) sur votre ordinateur -1. Dans le champ "Username", entrez n'importe quel nom alphanumérique (sans espaces ni caractères spéciaux) -1. Dans le champ "DSiBin", téléchargez votre fichier DSiWare (par exemple 42383841.bin) depuis la racine de votre carte SD en utilisant la première option "Choisir un fichier" -1. Sous le champ "MovableSed", uploadez votre fichier `movable.sed` en utilisant la deuxième option "Choisir un fichier" -1. Dans le champ "InjectionTarget", définissez la cible d'injection à `DSinternet` (PAS memorypit) -1. Cliquez sur "Build" - + Attendez quelques secondes que le processus de compilation soit terminé -1. Dans la section Historique des builds à gauche, tapez le nom d'utilisateur dans le champ "Filter builds..." -1. Cliquez sur le premier résultat de recherche - + Ce résultat devrait avoir l'horodatage le plus récent -1. Cliquez sur le lien "output_(name).zip" -1. Naviguez vers `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` sur votre carte SD - + `` est le nom du dossier à 32 lettres que vous avez copié dans [Seedminer](seedminer) - + `` est un dossier de 32 caractères à l'intérieur de `` -1. Supprimez `F00D43D5.bin` de votre dossier Nintendo DSiWare -1. Copiez le fichier `42383841.bin` depuis le dossier `hax` de l'archive DSiWare téléchargée (output_(name).zip) vers le dossier `Nintendo DSiWare` - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copiez `boot.firm` et `boot.3dsx` depuis Luma3DS `.zip`vers la racine de votre carte SD - + La racine de la carte SD représente le répertoire initial de la carte SD où vous pouvez voir le dossier Nintendo 3DS, mais ce n'est pas à l'intérieur de ce dernier -1. Copiez `boot.nds` (B9STool) de l'archive `.zip` à la racine de votre carte SD -1. Copiez le dossier `private` du fichier `.zip` de Frogminer_save vers la racine de votre carte SD -1. Réinsérez votre carte SD dans votre console -1. Power on your console - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} \ No newline at end of file diff --git a/_pages/fr_FR/include/hbl-common-exploits-movable.txt b/_pages/fr_FR/include/hbl-common-exploits-movable.txt deleted file mode 100644 index 86ef66db53..0000000000 --- a/_pages/fr_FR/include/hbl-common-exploits-movable.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Étape suivante : Choisissez un exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/fr_FR/include/hbl-common-exploits.txt b/_pages/fr_FR/include/hbl-common-exploits.txt deleted file mode 100644 index 86ef66db53..0000000000 --- a/_pages/fr_FR/include/hbl-common-exploits.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Étape suivante : Choisissez un exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/fr_FR/installing-boot9strap-(fredtool).txt b/_pages/fr_FR/installing-boot9strap-(fredtool).txt deleted file mode 100644 index c0bd147d9e..0000000000 --- a/_pages/fr_FR/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: "Installation de Boot9strap (Fredtool)" ---- - -{% include toc title="Table des matières" %} - -{% capture technical_info %} -Détails techniques (facultatif) - -Cette méthode d'utilisation de Seedminer pour une exploitation ultérieure utilise votre fichier `movable.sed` pour déchiffrer n'importe quel titre DSiWare afin d'injecter un titre DSiWare exploitable dans l'application Connexions Nintendo DS. - -Ceci est une implémentation de l'exploit "FIRM partitions known-plaintext" qui est décrit [ici](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -## Ce dont vous avez besoin - -* Votre fichier `movable.sed` obtenu grâce à [Seedminer](seedminer) -* La dernière version de [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) -* La dernière version de [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (le fichier `.zip' de Luma3DS) - -#### Section I - Vérification de la présence d’un CFW - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -Dans cette section, vous allez déclencher l'exploit BannerBomb3 à l'aide du menu de Gestion des Nintendo DSiWare et copier le fichier dumpé sur votre ordinateur afin de pouvoir l'utiliser dans la section suivante. - -1. Réinsérez votre carte SD dans votre console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Utilisez la croix directionnelle pour naviguer et appuyez sur le bouton (A) pour sélectionner "Dump DSiWare" - + Your console will automatically reboot -1. Éteignez votre console - -#### Section III - Préparatifs - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Écrasement de Connexions Nintendo DS - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Exploit Flipnote - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Configuration de Luma3DS - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restauration des paramètres de Connexions Nintendo DS - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continuer vers [Finalisation de l'installation](finalizing-setup) -{: .notice--primary} diff --git a/_pages/fr_FR/installing-boot9strap-(fredtool-legacy).txt b/_pages/fr_FR/installing-boot9strap-(fredtool-legacy).txt deleted file mode 100644 index e87547cf35..0000000000 --- a/_pages/fr_FR/installing-boot9strap-(fredtool-legacy).txt +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool, Legacy)" ---- - -{% include toc title="Table des matières" %} - -{% capture technical_info %} -Détails techniques (facultatif) - -Pour extraire un DSiWare système, nous exploitons une faille dans l'onglet de gestion des données DSiWare présent dans les paramètres système. - -Pour ce faire, nous utilisons la clé de chiffrement de votre console (movable.sed) pour créer une sauvegarde DSiWare qui exploite le système pour dumper l'application DSi Internet Settings à la racine SD. - -Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. - -Ceci est une implémentation de l'exploit "FIRM partitions known-plaintext" qui est décrit [ici](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -## Ce dont vous avez besoin - -* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) -* La dernière version de [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) -* La dernière version de [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (le fichier `.zip' de Luma3DS) - -#### Section I - Vérification de la présence d’un CFW - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -Dans cette section, vous allez déclencher l'exploit BannerBomb3 à l'aide du menu de Gestion des Nintendo DSiWare et copier le fichier dumpé sur votre ordinateur afin de pouvoir l'utiliser dans la section suivante. - -1. Réinsérez votre carte SD dans votre console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Utilisez la croix directionnelle pour naviguer et appuyez sur le bouton (A) pour sélectionner "Dump DSiWare" - + Your console will automatically reboot -1. Éteignez votre console - -#### Section III - Préparatifs - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Écrasement de Connexions Nintendo DS - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Exploit Flipnote - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Configuration de Luma3DS - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restauration des paramètres de Connexions Nintendo DS - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continuer vers [Finalisation de l'installation](finalizing-setup) -{: .notice--primary} diff --git a/_pages/fr_FR/installing-boot9strap-(frogtool).txt b/_pages/fr_FR/installing-boot9strap-(frogtool).txt deleted file mode 100644 index 79fa172a95..0000000000 --- a/_pages/fr_FR/installing-boot9strap-(frogtool).txt +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Installer boot9strap (Frogtool)" ---- - -{% include toc title="Table des matières" %} - -{% capture technical_info %} -Détails techniques (facultatif) -Pour des détails techniques sur les exploits que vous utiliserez sur cette page, voir "Vérification CTCert DSiWare_Exports" et "FIRM partitions known-plaintext" [ici](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - - -Pour utiliser le lien [magnet](https://fr.wikipedia.org/wiki/Magnet_(standard)) pour `frogcert.bin` sur cette page, vous aurez besoin d'un client torrent comme [qBittorrent](https://www.qbittorrent.org/download.php) ou [Deluge](http://dev.deluge-torrent.org/wiki/Download). -{: .notice--warning} - -## Ce dont vous avez besoin - -* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (lien magnet) -* The latest release of [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (direct download) -* La dernière version de [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) - -#### Section I - Vérification de la présence d’un CFW - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - Préparatifs - -1. Éteignez votre console -1. Insérez votre carte SD dans votre ordinateur -1. Copiez `boot.firm` et `boot.3dsx` depuis Luma3DS `.zip`vers la racine de votre carte SD -1. Copiez `boot.nds` (b9sTool) depuis le fichier `.zip` de b9sTool vers la racine de votre carte SD -1. Créez un dossier nommé `3ds` à la racine de votre carte SD si celui ci n'existe pas - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy the `Frogtool` folder from the Frogtool-nimhax `.zip` to the `/3ds/` folder on your SD card -1. Copiez `frogcert.bin` à la racine de votre carte SD -1. Réinsérez votre carte SD dans votre console -1. Power on your console - -#### Section III - Patchage de Mode téléchargement - -1. Ouvrez l'Homebrew Launcher par la méthode de votre choix (probablement le Navigateur Internet) -1. Lancez Frogtool depuis la liste des homebrews -1. Sélectionnez l'option "INJECT patched DS Download Play" -1. Frogtool va se lancer automatiquement et injecter la version JPN de Flipnote Studio dans l'application Mode téléchargement -1. Une fois cette opération terminée, lisez les écrans et vérifiez si le processus a réussi -1. Appuyez sur l'écran tactile, puis sélectionnez "BOOT patched DS Download Play" -1. If the exploit was successful, your console will have loaded the JPN version of Flipnote Studio - + If you get stuck on a black screen, follow [this](https://wiki.hacks.guide/wiki/3DS:TWLFix#Userland_(PicHaxx,_Steelhax,_etc.)-0) page, then try again - -#### Section IV - Exploit Flipnote - -{% include_relative include/install-boot9strap-b9stool.txt method="dsdlp" %} - -#### Section VI - Configuration de Luma3DS - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restauration du Téléchargement DS - -1. Lancez l’application Mode téléchargement -1. Attendez jusqu'à ce que vous voyiez les deux boutons - + N'appuyez sur aucun des deux boutons -1. Appuyez simultanément sur (L) + (Bas sur la croix directionnelle) + (Select) pour ouvrir le menu Rosalina -1. Sélectionnez "Miscellaneous options" -1. Sélectionnez "Switch the hb. title to the current app." -1. Appuyez sur (B) pour continuer -1. Appuyez sur (B) pour revenir au menu principal de Rosalina -1. Appuyez sur (B) pour quitter le menu Rosalina -1. Appuyez sur (Home), puis fermez Mode téléchargement -1. Relancez l’application Mode téléchargement -1. Your console should load the Homebrew Launcher -1. Lancez Frogtool depuis la liste des homebrews -1. Select the "RESTORE clean DS Download Play" option -1. Une fois cette opération terminée, lisez les écrans et vérifiez si le processus a réussi - + S'il y a des erreurs ou des fichiers manquants, corrigez le problème et réessayez -1. Si le processus a réussi, appuyez sur l'écran tactile, puis appuyez sur START pour quitter -1. Éteignez votre console - -___ - -### Continuer vers [Finalisation de l'installation](finalizing-setup) -{: .notice--primary} diff --git a/_pages/fr_FR/installing-boot9strap-(hbl-usm).txt b/_pages/fr_FR/installing-boot9strap-(hbl-usm).txt deleted file mode 100644 index 43bf26dce7..0000000000 --- a/_pages/fr_FR/installing-boot9strap-(hbl-usm).txt +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "Installation de boot9strap (HBL-USM)" ---- - -{% include toc title="Table des matières" %} - -{% capture technical_info %} -Détails techniques (facultatif) - -Afin d'exploiter le firmware SAFE_MODE de votre console, nous devons injecter un profil Wi-Fi exploité. - -Comme nous avons déjà un accès Homebrew, nous pouvons utiliser slotTool pour faire cela. - -Une fois le profil Wi-Fi injecté, nous utiliserons SAFE_MODE, qui est une fonctionnalité de récupération présente sur toutes les consoles 3DS, pour activer le profil Wi-Fi exploité. - -Pour une explication plus technique, voir [ici](https://github.com/zoogie/unSAFE_MODE/) pour des informations sur l'exploit unSAFE_MODE. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Notes de compatibilité - -Si vos boutons (L) et (R), (Haut sur la croix directionnelle) ou (A) ne fonctionnent pas, rejoignez [Nintendo Homebrew sur Discord](https://discord.gg/MWxPgEp) et demandez, en anglais, de l'aide. -{: .notice--danger} - -## Ce dont vous avez besoin - -* La dernière version de [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (téléchargement direct) -* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) (direct download) - -#### Section I - Préparatifs - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. Then, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Vos paramètres de connexion Wi-Fi seront temporairement remplacés pendant que l'exploit sera actif. - -1. Insérez votre carte SD dans votre ordinateur -1. Créez un dossier nommé `boot9strap` à la racine de votre carte SD -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the RELEASE `.zip` to the `/boot9strap/` folder on your SD card -1. Créez un dossier nommé `3ds` à la racine de votre carte SD si celui ci n'existe pas - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy `slotTool.3dsx` from the `slotTool` folder inside the RELEASE `.zip` to the `/3ds/` folder on your SD card -1. Copy `usm.bin` from the RELEASE `.zip` to the root folder on your SD card -1. Copiez `SafeB9SInstaller.bin` depuis le fichier `.zip` de SafeB9SInstaller à la racine de votre carte SD -1. Réinsérez votre carte SD dans votre console -1. Power on your console -1. Ouvrez l'Homebrew Launcher par la méthode de votre choix (probablement le Navigateur Internet) -1. Lancez slotTool depuis la liste des homebrews - + Si vous êtes coincé sur un écran rouge, éteignez la console de manière forcée en maintenant le bouton POWER enfoncé pendant quinze secondes, puis recommencez les étapes de cette section -1. Sélectionnez l'option "INSTALL exploit to wifi slots 1,2,3 & shutdown" - + Vous verrez du texte à l'écran et votre console s'éteindra - -![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section III - Installation de boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section IV - Restauration des profils de connexion Wi-Fi - -{% include_relative include/remove-usm-slottool.txt %} - -___ - -### Continuer vers [Finalisation de l'installation](finalizing-setup) -{: .notice--primary} diff --git a/_pages/fr_FR/installing-boot9strap-(usm).txt b/_pages/fr_FR/installing-boot9strap-(usm).txt deleted file mode 100644 index 395268b1a4..0000000000 --- a/_pages/fr_FR/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: "Installation de boot9strap (USM)" ---- - -{% include toc title="Table des matières" %} - -{% capture technical_info %} -Détails techniques (facultatif) - -Afin d'exploiter le firmware SAFE_MODE de votre console, nous devons injecter un profil Wi-Fi exploité. - -Nous pouvons faire cela en utilisant un exploit existant, BannerBomb3. - -Pour accomplir cela, nous utilisons la clé de chiffrement de votre console (movable.sed) pour créer une sauvegarde DSiWare qui exploite le système afin d'injecter le profil Wi-Fi exploité dans votre liste de connexions. - -Une fois le profil Wi-Fi injecté, nous utiliserons SAFE_MODE, qui est une fonctionnalité de récupération présente sur toutes les consoles 3DS, pour activer le profil Wi-Fi exploité. - -Pour une explication plus technique, voir les liens suivants pour des informations sur les exploits de BannerBomb3 et unSAFE_MODE : [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Notes de compatibilité - -Ces instructions fonctionnent sur les consoles des régions USA, Europe, Japon et Corée, comme indiqué par les lettres U, E, J ou K après la version du logiciel système de la console. - -Si vos boutons (L), (R), (Haut sur la croix directionnelle), ou (A) ne fonctionnent pas, vous devrez suivre [une autre variante de Seedminer](installing-boot9strap-(fredtool)). Pour obtenir de l'aide à ce sujet, rejoignez [Nintendo Homebrew sur Discord](https://discord.gg/MWxPgEp) et demandez de l'aide, en anglais. -{: .notice--warning} - -## Ce dont vous avez besoin - -* La dernière version de [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (téléchargement direct) -* La dernière version de [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (téléchargement direct) -* La dernière version de [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (le fichier `.zip' de Luma3DS) -* [usm.bin](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (téléchargement direct) - - -#### Section I - Préparatifs - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. - -1. Votre carte SD doit être insérée dans votre ordinateur -1. Copiez `usm.bin` à la racine de votre carte SD -1. Copiez `boot.firm` et `boot.3dsx` depuis Luma3DS `.zip`vers la racine de votre carte SD - + La racine de la carte SD représente le répertoire initial de la carte SD où vous pouvez voir le dossier Nintendo 3DS, mais ce n'est pas à l'intérieur de ce dernier -1. Créez un dossier nommé `boot9strap` à la racine de votre carte SD -1. Copiez `boot9strap.firm` et `boot9strap.firm.sha` depuis le fichier ".zip" de boot9strap vers le dossier `/boot9strap/` sur votre carte SD -1. Copiez `SafeB9SInstaller.bin` depuis le fichier `.zip` de SafeB9SInstaller à la racine de votre carte SD - -![]({{ "/images/screenshots/usm/usm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - BannerBomb3 - -Dans cette section, vous allez déclencher l'exploit BannerBomb3 en utilisant le menu de Gestion des Nintendo DSiWare qui peut être utilisé pour remplacer vos emplacements Wi-Fi par des données hackées. Vos paramètres de connexion Wi-Fi seront temporairement remplacés pendant que l'exploit sera actif. - -1. Réinsérez votre carte SD dans votre console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If the BB3 multihax menu doesn't open, [follow this troubleshooting guide](troubleshooting#bannerbomb3) - + Si le menu multihax BB3 dit "cfw installed already", vous avez déjà un custom firmware et devriez continuer [ici](checking-for-cfw) -1. Utilisez la croix directionnelle pour naviguer et appuyez sur le bouton (A) pour sélectionner "Install unSAFE_MODE" - + Your console will automatically power off -1. Power on your console -1. Launch System Settings on your console -1. Naviguez vers `Paramètres Internet` -> `Paramètres de connexion` -1. Ensure that all three connections are named "Haaaaaaaxxxxxxxxx..." - + Do NOT change these settings! - + If all three connections are NOT all named "Haaaaaaaxxxxxxxxx...", STOP! Something went wrong in this section and MUST be fixed before you can continue -1. Éteignez votre console - -#### Section III - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section IV - Installation de boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section V - Restauration des profils de connexion Wi-Fi - -Dans cette section, vous déclencherez une seconde fois l'exploit BannerBomb3 pour que vous puissiez restaurer les slots de connexion Wi-Fi qui ont été écrasés dans la Section II. - -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Utilisez la croix directionnelle pour naviguer et appuyez sur le bouton (A) pour sélectionner "Uninstall unSAFE_MODE" - + Your console will automatically reboot -1. Éteignez votre console -1. Insérez votre carte SD dans votre ordinateur -1. Naviguez vers `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` sur votre carte SD -1. Supprimez `F00D43D5.bin` de votre dossier Nintendo DSiWare de votre ordinateur. Ce fichier ne sera plus nécessaire - -___ - -### Continuer vers [Finalisation de l'installation](finalizing-setup) -{: .notice--primary} diff --git a/_pages/he_IL/dumping-movable-(nimhax).txt b/_pages/he_IL/dumping-movable-(nimhax).txt deleted file mode 100644 index 17845bee17..0000000000 --- a/_pages/he_IL/dumping-movable-(nimhax).txt +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: "Dumping Movable (nimhax)" ---- - -{% include toc title="תוכן העניינים" %} - -{% capture technical_info %} -Technical Details (optional) - -To install boot9strap on your console, we derive your console's unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console. - -For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need - -* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file) - -### הנחיות - -#### חלק I - הכנות - -1. Power off your console -1. תכניסו את ה-SD שלכם למחשב -1. Copy the `nimhax` folder from the nimhax `.zip` to the `/3ds/` folder on your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) -{: .notice--info} - -#### Section II - nimhax - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch nimhax from the list of homebrew -1. If the exploit was successful, a `movable.sed` file will appear on the root of your SD card - -### Next step: Frogtool - -Once you have your console's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \ -While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you're unable to use a torrent client. - -Continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--primary} diff --git a/_pages/he_IL/homebrew-launcher-(freakyhax).txt b/_pages/he_IL/homebrew-launcher-(freakyhax).txt deleted file mode 100644 index 6538272d6c..0000000000 --- a/_pages/he_IL/homebrew-launcher-(freakyhax).txt +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: "Homebrew Launcher (freakyhax)" ---- - -{% include toc title="תוכן העניינים" %} - -{% capture technical_info %} -Technical Details (optional) -[freakyhax](https://plutooo.github.io/freakyhax/) is an exploit for the game Freakyforms Deluxe discovered and released by [plutooo](https://github.com/plutooo). It works on versions 9.0.0 through 11.17.0 on EUR, USA and JPN region consoles. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -### What You Need - -+ A EUR/USA/JPN copy of Freakyforms Deluxe (eShop or cartridge) -+ The latest release of [freakyhax](https://github.com/plutooo/freakyhax/releases/latest) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### הנחיות - -#### חלק I - הכנות - -1. Power off your console -1. תכניסו את ה-SD שלכם למחשב -1. Copy all files and folders inside the `/build//exploit/` folder from the freakyhax `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - freakyhax - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch Freakyforms Deluxe -1. In the game menu, select `Play -> Camera -> Load a QR code` -1. Select the QR code -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/he_IL/homebrew-launcher-(ninjhax2-dx).txt b/_pages/he_IL/homebrew-launcher-(ninjhax2-dx).txt deleted file mode 100644 index f038ab0c99..0000000000 --- a/_pages/he_IL/homebrew-launcher-(ninjhax2-dx).txt +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "Homebrew Launcher (ninjhax2-dx)" ---- - -{% include toc title="תוכן העניינים" %} - -{% capture technical_info %} -Technical Details (optional) -[Ninjhax2](https://github.com/smealum/ninjhax2.x) is an exploit for the game "Cubic Ninja" made by [smealum](https://github.com/smealum). This page uses an updated version of ninjhax by [zoogie](https://github.com/zoogie) called [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx), which supports 11.17.0. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -This process will overwrite your Cubic Ninja save file, if you have one. -{: .notice--warning} - -### What You Need -* The game "Cubic Ninja" -* The latest release of [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx/releases) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -### הנחיות - -#### חלק I - הכנות - -1. Power off your console -1. תכניסו את ה-SD שלכם למחשב -1. Copy `Launcher.dat` from the folder appropriate for your console from the ninjhax2-dx `.zip` file to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - -#### Section II - ninjhax2-dx -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Cubic Ninja" once and select "Create" - + If prompted, delete all data -1. Select "QR Code" -1. Select "Scan QR Code" -1. On your PC, open the browser and go to [ninjhax2-dx website](https://zoogie.github.io/web/nh2dx/) -1. Select your console's region and hardware -1. On your console, scan the QR code - + If the game exits to the HOME Menu, then the exploit has installed correctly -1. Launch "Cubic Ninja" again -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/he_IL/homebrew-launcher-(pichaxx).txt b/_pages/he_IL/homebrew-launcher-(pichaxx).txt deleted file mode 100644 index 24f1d7c1ca..0000000000 --- a/_pages/he_IL/homebrew-launcher-(pichaxx).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (PicHaxx)" ---- - -{% include toc title="תוכן העניינים" %} - -{% capture technical_info %} -Technical Details (optional) -[PicHaxx](https://github.com/zoogie/pichaxx) is an exploit for the game Pokémon Picross released by [zoogie](https://github.com/zoogie), originally discovered and [demonstrated](https://twitter.com/mrnbayoh/status/744899681663258624) by [MrNbaYoh](https://github.com/MrNbaYoh). - -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Pokémon Picross" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Pokémon Picross -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### הנחיות - -#### חלק I - הכנות - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. תכניסו את ה-SD שלכם למחשב -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card - -![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - PicHaxx - -In this section, you will create a hacked Pokémon Picross save file that, when loaded, will run the Homebrew Launcher on your console. - -1. Open [the PicHaxx Injector website](https://3dstools.nhnarwhal.com/#/pichaxx) on your computer -1. Select your `movable.sed` file -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `0017c100` -> `data` on your SD card - + The `` will be the same one that you used in Seedminer - + The `` is a 32 character long folder inside of the `` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted - - ![]({{ "/images/screenshots/pichaxx-save-location.png" | absolute_url }}) - {: .notice--info} - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Pokémon Picross" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher - + If you get an error message, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-pichaxx) -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/he_IL/homebrew-launcher-(smilehax-iie).txt b/_pages/he_IL/homebrew-launcher-(smilehax-iie).txt deleted file mode 100644 index 5c5f17aa6a..0000000000 --- a/_pages/he_IL/homebrew-launcher-(smilehax-iie).txt +++ /dev/null @@ -1,70 +0,0 @@ ---- -title: "Homebrew Launcher (smilehax-IIe)" ---- - -{% include toc title="תוכן העניינים" %} - -This set of instructions does not support the Japanese version of SmileBASIC. -{: .notice--warning} - -{% capture technical_info %} -Technical Details (optional) -[smilehax-IIe](https://github.com/zoogie/smilehax-IIe) is an exploit for the game "SmileBASIC" made by zoogie, compatible with system versions 9.0.0 through 11.17.0 for USA/EUR/JPN region consoles. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need -+ The game "SmileBASIC" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install SmileBASIC -+ The latest release of [smilehax-IIe](https://github.com/zoogie/smilehax-IIe/releases/download/v1.1/Release_sh2e_v1.1.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### הנחיות - -#### חלק I - הכנות - -1. Power off your console -1. תכניסו את ה-SD שלכם למחשב -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Transfer the `.wav` for your region from the Release_sh2e `.zip` to a device that can play `.wav` files, for example a phone -1. Copy the petitcom `.icn` for your region to the root of your SD card - -#### Section II - smilehax - -1. Launch SmileBASIC - + Update the game if prompted -1. Select the "Publish/Download Projects" option -1. Select the "Download (Receive) using Public Key" option -1. Press the "Yes" button -1. Enter the Public Key "NJEQK3A4" using the on-screen keyboard -1. Press the "Yes" button to confirm the download of PMODEM141 -1. Press "OK", then "Back", then "Browse Projects" -1. Select PMODEM141, then press "Select File" -1. Select PMODEM141.PRG, then press "OK", then "Yes" to execute it -1. Select RECEIVE FILE SIMPLEX -1. Prepare the device you use to play the `.wav` file -1. Keep your console about a foot from the `.wav` file playing devices' speaker and use a reasonable (not loud) volume to play the `.wav` -1. Now select 300BPS, then play the `.wav` file -1. When it finishes, press "Yes", then press "OK" -1. Press the START button -1. Select the SH2E-xxx.TXT file, then press OK, then "Yes" to execute it - + If you get kicked back into menu, make sure you're using the latest version of SmileBASIC -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/he_IL/homebrew-launcher-(steelhax).txt b/_pages/he_IL/homebrew-launcher-(steelhax).txt deleted file mode 100644 index 756060e6c3..0000000000 --- a/_pages/he_IL/homebrew-launcher-(steelhax).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (Steelhax)" ---- - -{% include toc title="תוכן העניינים" %} - -{% capture technical_info %} -Technical Details (optional) -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Steel Diver: Sub Wars, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Steel Diver: Sub Wars save file, if you have one. If you wish to preserve your Steel Diver: Sub Wars game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Steel Diver: Sub Wars" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Steel Diver: Sub Wars -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Steelhax](/assets/steelhax-release.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### הנחיות - -#### חלק I - הכנות - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. תכניסו את ה-SD שלכם למחשב -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the `steelhax` folder from the `Steelhax-release.zip` to the root of your SD card -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - Steelminer - -In this section, you will create a hacked Steel Diver: Sub Wars save file that, when used, will load the Homebrew Launcher on your console. - -1. Launch "Steel Diver: Sub Wars" once and select a Mii to initialize your save file - + Decline the game update when prompted - + If you have already updated the game, use the Data Management menu of the System Settings to delete the update -1. Exit "Steel Diver: Sub Wars" -1. Power off your console -1. תכניסו את ה-SD שלכם למחשב -1. Open [the SteelHax Save Tool website](https://3dstools.nhnarwhal.com/#/steelhax) on your computer -1. Select your `movable.sed` file -1. Select your region based on your console -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `<8-character-region>` -> `data` on your SD card - + **EUR Region**: `000d7e00` - + **JPN Region**: `000d7c00` - + **USA Region**: `000d7d00` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Steel Diver: Sub Wars" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/he_IL/homebrew-launcher-(super-skaterhax).txt b/_pages/he_IL/homebrew-launcher-(super-skaterhax).txt deleted file mode 100644 index 49d2dfa887..0000000000 --- a/_pages/he_IL/homebrew-launcher-(super-skaterhax).txt +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: "Homebrew Launcher (super-skaterhax)" ---- - -{% include toc title="תוכן העניינים" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see [here](https://github.com/zoogie/super-skaterhax). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -Super-skaterhax (when used to launch the Homebrew Launcher) is compatible with New models on version 11.16.0 in all regions, and 11.17.0 in the EUR, JPN and USA regions. - -The instructions provided only apply to the New 3DS, New 3DS XL, and New 2DS XL. Please ensure that the console you are modding is a New 3DS, New 3DS XL, or New 2DS XL before continuing. -{: .notice--warning} - -### What You Need - -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* The latest release of [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (the release `.zip` file) - -#### חלק I - הכנות - -In this section, you will copy the files needed to trigger both super-skaterhax and the Homebrew Launcher. - -1. Power off your console -1. תכניסו את ה-SD שלכם למחשב -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy everything inside the folder for your console's region (and also system version if the region is USA) in the super-skaterhax `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/skater-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - super-skaterhax - -In this section, you will visit the browser exploit webpage, which will launch the Homebrew Launcher. - -If you haven't already, make sure you have a working Internet connection set up on your console. -{: .notice--info} - -1. On the HOME Menu, press the Left and Right shoulder buttons at the same time to open the camera - + If you are unable to open the camera, open the Internet Browser and manually type the URL instead (`https://zoogie.github.io/web/super/` for EUR/USA/JPN, `https://zoogie.github.io/web/korea` for KOR) -1. Tap the QR code button and scan one of the following QR codes for your console's region [here](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png) - + If you get a security certificate warning, press (A) to allow the connection -1. Press the (Select) button to open the bookmark tab - + If your (Select) button does not respond, tap the star icon on the bottom-left corner of the screen -1. Tap "Bookmark this page" -1. Press (B) once to return to the browser -1. Press (Start) to open the context menu - + If your (Start) button does not respond, tap the 3-line menu on the bottom-right corner of the screen -1. Tap on "Settings" -1. Tap on "Delete Cookies" -1. תלחצו (A) כדי להמשיך -1. Press (Home) to return to the HOME Menu, then immediately press (A) to launch the browser again -1. Select the "GO GO!" button on the top screen - + If any prompts appear, approve all of them - + If your console freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your console freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section - + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/he_IL/include/fredtool-prep.txt b/_pages/he_IL/include/fredtool-prep.txt deleted file mode 100644 index a0ed3bbc58..0000000000 --- a/_pages/he_IL/include/fredtool-prep.txt +++ /dev/null @@ -1,29 +0,0 @@ -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. תכניסו את ה-SD שלכם למחשב -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} \ No newline at end of file diff --git a/_pages/he_IL/include/hbl-common-exploits-movable.txt b/_pages/he_IL/include/hbl-common-exploits-movable.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/he_IL/include/hbl-common-exploits-movable.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/he_IL/include/hbl-common-exploits.txt b/_pages/he_IL/include/hbl-common-exploits.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/he_IL/include/hbl-common-exploits.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/he_IL/installing-boot9strap-(fredtool).txt b/_pages/he_IL/installing-boot9strap-(fredtool).txt deleted file mode 100644 index 37997db5e5..0000000000 --- a/_pages/he_IL/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool)" ---- - -{% include toc title="תוכן העניינים" %} - -{% capture technical_info %} -Technical Details (optional) - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer](seedminer) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/he_IL/installing-boot9strap-(fredtool-legacy).txt b/_pages/he_IL/installing-boot9strap-(fredtool-legacy).txt deleted file mode 100644 index 79c6c8b580..0000000000 --- a/_pages/he_IL/installing-boot9strap-(fredtool-legacy).txt +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool, Legacy)" ---- - -{% include toc title="תוכן העניינים" %} - -{% capture technical_info %} -Technical Details (optional) - -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. - -Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/he_IL/installing-boot9strap-(frogtool).txt b/_pages/he_IL/installing-boot9strap-(frogtool).txt deleted file mode 100644 index 0a4b3384f8..0000000000 --- a/_pages/he_IL/installing-boot9strap-(frogtool).txt +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Installing boot9strap (Frogtool)" ---- - -{% include toc title="תוכן העניינים" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see "DSiWare_Exports CTCert verification" and "FIRM partitions known-plaintext" [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - - -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) link for `frogcert.bin` on this page, you will need a torrent client like [qBittorrent](https://www.qbittorrent.org/download.php) or [Deluge](http://dev.deluge-torrent.org/wiki/Download). -{: .notice--warning} - -### What You Need - -* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link) -* The latest release of [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (direct download) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - Prep Work - -1. Power off your console -1. תכניסו את ה-SD שלכם למחשב -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Copy `boot.nds` (b9sTool) from the b9sTool release `.zip` to the root of your SD card -1. Create a folder named `3ds` on the root of your SD card if it does not already exist - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy the `Frogtool` folder from the Frogtool-nimhax `.zip` to the `/3ds/` folder on your SD card -1. Copy `frogcert.bin` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section III - Patching DS Download Play - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch Frogtool from the list of homebrew -1. Select the "INJECT patched DS Download Play" option -1. Frogtool will automatically run and inject the JPN version of Flipnote Studio into your DS Download Play -1. Once this operation has finished, read the screens and check if the process was successful -1. Tap the touch screen, then select "BOOT patched DS Download Play" -1. If the exploit was successful, your console will have loaded the JPN version of Flipnote Studio - + If you get stuck on a black screen, follow [this](https://wiki.hacks.guide/wiki/3DS:TWLFix#Userland_(PicHaxx,_Steelhax,_etc.)-0) page, then try again - -#### Section IV - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsdlp" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Download Play - -1. תפעילו את Download Play -1. Wait until you see the two buttons - + Do not press either of the buttons -1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu -1. תבחרו ב "Miscellaneous options" -1. תבחרו ב "Switch the hb. title to the current app." -1. תלחצו (B) כדי להמשיך -1. תלחצו (B) כדי לחזור לתפריט הראשי של Rosalina -1. תלחצו (B) כדי לצאת מהתפריט של Rosalina -1. תלחצו על (Home), ואז תסגרו את Download Play -1. Relaunch the Download Play application -1. Your console should load the Homebrew Launcher -1. Launch Frogtool from the list of homebrew -1. Select the "RESTORE clean DS Download Play" option -1. Once this operation has finished, read the screens and check if the process was successful - + If there are any errors or missing files, correct the problem and try again -1. If the process was successful, tap the touch screen, then press START to exit -1. Power off your console - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/he_IL/installing-boot9strap-(hbl-usm).txt b/_pages/he_IL/installing-boot9strap-(hbl-usm).txt deleted file mode 100644 index 63b2e0c3ec..0000000000 --- a/_pages/he_IL/installing-boot9strap-(hbl-usm).txt +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "Installing boot9strap (HBL-USM)" ---- - -{% include toc title="תוכן העניינים" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--danger} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) (direct download) - -#### חלק I - הכנות - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. Then, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. תכניסו את ה-SD שלכם למחשב -1. תצרו ב-SD שלכם תיקייה חדשה בשם `boot9strap` -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the RELEASE `.zip` to the `/boot9strap/` folder on your SD card -1. Create a folder named `3ds` on the root of your SD card if it does not already exist - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy `slotTool.3dsx` from the `slotTool` folder inside the RELEASE `.zip` to the `/3ds/` folder on your SD card -1. Copy `usm.bin` from the RELEASE `.zip` to the root folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch slotTool from the list of homebrew - + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section -1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option - + You will see some on-screen text and then your system will shut down - -![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### חלק III - התקנת boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section IV - Restoring WiFi Configuration Profiles - -{% include_relative include/remove-usm-slottool.txt %} - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/he_IL/installing-boot9strap-(usm).txt b/_pages/he_IL/installing-boot9strap-(usm).txt deleted file mode 100644 index 99725a3def..0000000000 --- a/_pages/he_IL/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: "Installing boot9strap (USM)" ---- - -{% include toc title="תוכן העניינים" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. - -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--warning} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* [usm.bin](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) - - -#### חלק I - הכנות - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. - -1. Your SD card should be inserted in your computer -1. Copy `usm.bin` to the root of your SD card -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. תצרו ב-SD שלכם תיקייה חדשה בשם `boot9strap` -1. תעתיקו את`boot9strap.firm` ואת `boot9strap.firm.sha` מה `.zip` של boot9strap אל תיקיית `/boot9strap/`על כרטיס הSD שלכם -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card - -![]({{ "/images/screenshots/usm/usm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If the BB3 multihax menu doesn't open, [follow this troubleshooting guide](troubleshooting#bannerbomb3) - + If the BB3 multihax menu says "cfw installed already", you already have custom firmware and should continue from [here](checking-for-cfw) -1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" - + Your console will automatically power off -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Internet Settings` -> `Connection Settings` -1. Ensure that all three connections are named "Haaaaaaaxxxxxxxxx..." - + Do NOT change these settings! - + If all three connections are NOT all named "Haaaaaaaxxxxxxxxx...", STOP! Something went wrong in this section and MUST be fixed before you can continue -1. Power off your console - -#### Section III - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section IV - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section V - Restoring WiFi Configuration Profiles - -In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. - -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" - + Your console will automatically reboot -1. Power off your console -1. תכניסו את ה-SD שלכם למחשב -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/hr_HR/dumping-movable-(nimhax).txt b/_pages/hr_HR/dumping-movable-(nimhax).txt deleted file mode 100644 index 69f3d011d3..0000000000 --- a/_pages/hr_HR/dumping-movable-(nimhax).txt +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: "Dumping Movable (nimhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -To install boot9strap on your console, we derive your console's unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console. - -For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need - -* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy the `nimhax` folder from the nimhax `.zip` to the `/3ds/` folder on your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) -{: .notice--info} - -#### Section II - nimhax - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch nimhax from the list of homebrew -1. If the exploit was successful, a `movable.sed` file will appear on the root of your SD card - -### Next step: Frogtool - -Once you have your console's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \ -While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you're unable to use a torrent client. - -Continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--primary} diff --git a/_pages/hr_HR/homebrew-launcher-(freakyhax).txt b/_pages/hr_HR/homebrew-launcher-(freakyhax).txt deleted file mode 100644 index 028cee82a4..0000000000 --- a/_pages/hr_HR/homebrew-launcher-(freakyhax).txt +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: "Homebrew Launcher (freakyhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[freakyhax](https://plutooo.github.io/freakyhax/) is an exploit for the game Freakyforms Deluxe discovered and released by [plutooo](https://github.com/plutooo). It works on versions 9.0.0 through 11.17.0 on EUR, USA and JPN region consoles. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -### What You Need - -+ A EUR/USA/JPN copy of Freakyforms Deluxe (eShop or cartridge) -+ The latest release of [freakyhax](https://github.com/plutooo/freakyhax/releases/latest) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy all files and folders inside the `/build//exploit/` folder from the freakyhax `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - freakyhax - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch Freakyforms Deluxe -1. In the game menu, select `Play -> Camera -> Load a QR code` -1. Select the QR code -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/hr_HR/homebrew-launcher-(ninjhax2-dx).txt b/_pages/hr_HR/homebrew-launcher-(ninjhax2-dx).txt deleted file mode 100644 index 2d8032745c..0000000000 --- a/_pages/hr_HR/homebrew-launcher-(ninjhax2-dx).txt +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "Homebrew Launcher (ninjhax2-dx)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[Ninjhax2](https://github.com/smealum/ninjhax2.x) is an exploit for the game "Cubic Ninja" made by [smealum](https://github.com/smealum). This page uses an updated version of ninjhax by [zoogie](https://github.com/zoogie) called [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx), which supports 11.17.0. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -This process will overwrite your Cubic Ninja save file, if you have one. -{: .notice--warning} - -### What You Need -* The game "Cubic Ninja" -* The latest release of [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx/releases) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `Launcher.dat` from the folder appropriate for your console from the ninjhax2-dx `.zip` file to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - -#### Section II - ninjhax2-dx -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Cubic Ninja" once and select "Create" - + If prompted, delete all data -1. Select "QR Code" -1. Select "Scan QR Code" -1. On your PC, open the browser and go to [ninjhax2-dx website](https://zoogie.github.io/web/nh2dx/) -1. Select your console's region and hardware -1. On your console, scan the QR code - + If the game exits to the HOME Menu, then the exploit has installed correctly -1. Launch "Cubic Ninja" again -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/hr_HR/homebrew-launcher-(pichaxx).txt b/_pages/hr_HR/homebrew-launcher-(pichaxx).txt deleted file mode 100644 index a58df498f5..0000000000 --- a/_pages/hr_HR/homebrew-launcher-(pichaxx).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (PicHaxx)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[PicHaxx](https://github.com/zoogie/pichaxx) is an exploit for the game Pokémon Picross released by [zoogie](https://github.com/zoogie), originally discovered and [demonstrated](https://twitter.com/mrnbayoh/status/744899681663258624) by [MrNbaYoh](https://github.com/MrNbaYoh). - -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Pokémon Picross" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Pokémon Picross -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Prep Work - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card - -![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - PicHaxx - -In this section, you will create a hacked Pokémon Picross save file that, when loaded, will run the Homebrew Launcher on your console. - -1. Open [the PicHaxx Injector website](https://3dstools.nhnarwhal.com/#/pichaxx) on your computer -1. Select your `movable.sed` file -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `0017c100` -> `data` on your SD card - + The `` will be the same one that you used in Seedminer - + The `` is a 32 character long folder inside of the `` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted - - ![]({{ "/images/screenshots/pichaxx-save-location.png" | absolute_url }}) - {: .notice--info} - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Pokémon Picross" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher - + If you get an error message, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-pichaxx) -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/hr_HR/homebrew-launcher-(smilehax-iie).txt b/_pages/hr_HR/homebrew-launcher-(smilehax-iie).txt deleted file mode 100644 index 08cd5865c0..0000000000 --- a/_pages/hr_HR/homebrew-launcher-(smilehax-iie).txt +++ /dev/null @@ -1,70 +0,0 @@ ---- -title: "Homebrew Launcher (smilehax-IIe)" ---- - -{% include toc title="Table of Contents" %} - -This set of instructions does not support the Japanese version of SmileBASIC. -{: .notice--warning} - -{% capture technical_info %} -Technical Details (optional) -[smilehax-IIe](https://github.com/zoogie/smilehax-IIe) is an exploit for the game "SmileBASIC" made by zoogie, compatible with system versions 9.0.0 through 11.17.0 for USA/EUR/JPN region consoles. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need -+ The game "SmileBASIC" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install SmileBASIC -+ The latest release of [smilehax-IIe](https://github.com/zoogie/smilehax-IIe/releases/download/v1.1/Release_sh2e_v1.1.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Transfer the `.wav` for your region from the Release_sh2e `.zip` to a device that can play `.wav` files, for example a phone -1. Copy the petitcom `.icn` for your region to the root of your SD card - -#### Section II - smilehax - -1. Launch SmileBASIC - + Update the game if prompted -1. Select the "Publish/Download Projects" option -1. Select the "Download (Receive) using Public Key" option -1. Press the "Yes" button -1. Enter the Public Key "NJEQK3A4" using the on-screen keyboard -1. Press the "Yes" button to confirm the download of PMODEM141 -1. Press "OK", then "Back", then "Browse Projects" -1. Select PMODEM141, then press "Select File" -1. Select PMODEM141.PRG, then press "OK", then "Yes" to execute it -1. Select RECEIVE FILE SIMPLEX -1. Prepare the device you use to play the `.wav` file -1. Keep your console about a foot from the `.wav` file playing devices' speaker and use a reasonable (not loud) volume to play the `.wav` -1. Now select 300BPS, then play the `.wav` file -1. When it finishes, press "Yes", then press "OK" -1. Press the START button -1. Select the SH2E-xxx.TXT file, then press OK, then "Yes" to execute it - + If you get kicked back into menu, make sure you're using the latest version of SmileBASIC -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/hr_HR/homebrew-launcher-(steelhax).txt b/_pages/hr_HR/homebrew-launcher-(steelhax).txt deleted file mode 100644 index 9b8dace5a3..0000000000 --- a/_pages/hr_HR/homebrew-launcher-(steelhax).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (Steelhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Steel Diver: Sub Wars, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Steel Diver: Sub Wars save file, if you have one. If you wish to preserve your Steel Diver: Sub Wars game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Steel Diver: Sub Wars" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Steel Diver: Sub Wars -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Steelhax](/assets/steelhax-release.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Prep Work - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the `steelhax` folder from the `Steelhax-release.zip` to the root of your SD card -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - Steelminer - -In this section, you will create a hacked Steel Diver: Sub Wars save file that, when used, will load the Homebrew Launcher on your console. - -1. Launch "Steel Diver: Sub Wars" once and select a Mii to initialize your save file - + Decline the game update when prompted - + If you have already updated the game, use the Data Management menu of the System Settings to delete the update -1. Exit "Steel Diver: Sub Wars" -1. Power off your console -1. Insert your SD card into your computer -1. Open [the SteelHax Save Tool website](https://3dstools.nhnarwhal.com/#/steelhax) on your computer -1. Select your `movable.sed` file -1. Select your region based on your console -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `<8-character-region>` -> `data` on your SD card - + **EUR Region**: `000d7e00` - + **JPN Region**: `000d7c00` - + **USA Region**: `000d7d00` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Steel Diver: Sub Wars" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/hr_HR/homebrew-launcher-(super-skaterhax).txt b/_pages/hr_HR/homebrew-launcher-(super-skaterhax).txt deleted file mode 100644 index 5895c4f64b..0000000000 --- a/_pages/hr_HR/homebrew-launcher-(super-skaterhax).txt +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: "Homebrew Launcher (super-skaterhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see [here](https://github.com/zoogie/super-skaterhax). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -Super-skaterhax (when used to launch the Homebrew Launcher) is compatible with New models on version 11.16.0 in all regions, and 11.17.0 in the EUR, JPN and USA regions. - -The instructions provided only apply to the New 3DS, New 3DS XL, and New 2DS XL. Please ensure that the console you are modding is a New 3DS, New 3DS XL, or New 2DS XL before continuing. -{: .notice--warning} - -### What You Need - -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* The latest release of [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (the release `.zip` file) - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger both super-skaterhax and the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy everything inside the folder for your console's region (and also system version if the region is USA) in the super-skaterhax `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/skater-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - super-skaterhax - -In this section, you will visit the browser exploit webpage, which will launch the Homebrew Launcher. - -If you haven't already, make sure you have a working Internet connection set up on your console. -{: .notice--info} - -1. On the HOME Menu, press the Left and Right shoulder buttons at the same time to open the camera - + If you are unable to open the camera, open the Internet Browser and manually type the URL instead (`https://zoogie.github.io/web/super/` for EUR/USA/JPN, `https://zoogie.github.io/web/korea` for KOR) -1. Tap the QR code button and scan one of the following QR codes for your console's region [here](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png) - + If you get a security certificate warning, press (A) to allow the connection -1. Press the (Select) button to open the bookmark tab - + If your (Select) button does not respond, tap the star icon on the bottom-left corner of the screen -1. Tap "Bookmark this page" -1. Press (B) once to return to the browser -1. Press (Start) to open the context menu - + If your (Start) button does not respond, tap the 3-line menu on the bottom-right corner of the screen -1. Tap on "Settings" -1. Tap on "Delete Cookies" -1. Press (A) to continue -1. Press (Home) to return to the HOME Menu, then immediately press (A) to launch the browser again -1. Select the "GO GO!" button on the top screen - + If any prompts appear, approve all of them - + If your console freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your console freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section - + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/hr_HR/include/fredtool-prep.txt b/_pages/hr_HR/include/fredtool-prep.txt deleted file mode 100644 index bd910b24de..0000000000 --- a/_pages/hr_HR/include/fredtool-prep.txt +++ /dev/null @@ -1,29 +0,0 @@ -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Insert your SD card into your computer -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} \ No newline at end of file diff --git a/_pages/hr_HR/include/hbl-common-exploits-movable.txt b/_pages/hr_HR/include/hbl-common-exploits-movable.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/hr_HR/include/hbl-common-exploits-movable.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/hr_HR/include/hbl-common-exploits.txt b/_pages/hr_HR/include/hbl-common-exploits.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/hr_HR/include/hbl-common-exploits.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/hr_HR/installing-boot9strap-(fredtool).txt b/_pages/hr_HR/installing-boot9strap-(fredtool).txt deleted file mode 100644 index a06a1259f2..0000000000 --- a/_pages/hr_HR/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer](seedminer) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/hr_HR/installing-boot9strap-(fredtool-legacy).txt b/_pages/hr_HR/installing-boot9strap-(fredtool-legacy).txt deleted file mode 100644 index 7e88fb51b4..0000000000 --- a/_pages/hr_HR/installing-boot9strap-(fredtool-legacy).txt +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool, Legacy)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. - -Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/hr_HR/installing-boot9strap-(frogtool).txt b/_pages/hr_HR/installing-boot9strap-(frogtool).txt deleted file mode 100644 index 063799fcc6..0000000000 --- a/_pages/hr_HR/installing-boot9strap-(frogtool).txt +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Installing boot9strap (Frogtool)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see "DSiWare_Exports CTCert verification" and "FIRM partitions known-plaintext" [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - - -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) link for `frogcert.bin` on this page, you will need a torrent client like [qBittorrent](https://www.qbittorrent.org/download.php) or [Deluge](http://dev.deluge-torrent.org/wiki/Download). -{: .notice--warning} - -### What You Need - -* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link) -* The latest release of [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (direct download) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Copy `boot.nds` (b9sTool) from the b9sTool release `.zip` to the root of your SD card -1. Create a folder named `3ds` on the root of your SD card if it does not already exist - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy the `Frogtool` folder from the Frogtool-nimhax `.zip` to the `/3ds/` folder on your SD card -1. Copy `frogcert.bin` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section III - Patching DS Download Play - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch Frogtool from the list of homebrew -1. Select the "INJECT patched DS Download Play" option -1. Frogtool will automatically run and inject the JPN version of Flipnote Studio into your DS Download Play -1. Once this operation has finished, read the screens and check if the process was successful -1. Tap the touch screen, then select "BOOT patched DS Download Play" -1. If the exploit was successful, your console will have loaded the JPN version of Flipnote Studio - + If you get stuck on a black screen, follow [this](https://wiki.hacks.guide/wiki/3DS:TWLFix#Userland_(PicHaxx,_Steelhax,_etc.)-0) page, then try again - -#### Section IV - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsdlp" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Download Play - -1. Launch the Download Play application -1. Wait until you see the two buttons - + Do not press either of the buttons -1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu -1. Select "Miscellaneous options" -1. Select "Switch the hb. title to the current app." -1. Press (B) to continue -1. Press (B) to return to the Rosalina main menu -1. Press (B) to exit the Rosalina menu -1. Press (Home), then close Download Play -1. Relaunch the Download Play application -1. Your console should load the Homebrew Launcher -1. Launch Frogtool from the list of homebrew -1. Select the "RESTORE clean DS Download Play" option -1. Once this operation has finished, read the screens and check if the process was successful - + If there are any errors or missing files, correct the problem and try again -1. If the process was successful, tap the touch screen, then press START to exit -1. Power off your console - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/hr_HR/installing-boot9strap-(hbl-usm).txt b/_pages/hr_HR/installing-boot9strap-(hbl-usm).txt deleted file mode 100644 index de8dad596a..0000000000 --- a/_pages/hr_HR/installing-boot9strap-(hbl-usm).txt +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "Installing boot9strap (HBL-USM)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--danger} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) (direct download) - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. Then, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Insert your SD card into your computer -1. Create a folder named `boot9strap` on the root of your SD card -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the RELEASE `.zip` to the `/boot9strap/` folder on your SD card -1. Create a folder named `3ds` on the root of your SD card if it does not already exist - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy `slotTool.3dsx` from the `slotTool` folder inside the RELEASE `.zip` to the `/3ds/` folder on your SD card -1. Copy `usm.bin` from the RELEASE `.zip` to the root folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch slotTool from the list of homebrew - + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section -1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option - + You will see some on-screen text and then your system will shut down - -![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section III - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section IV - Restoring WiFi Configuration Profiles - -{% include_relative include/remove-usm-slottool.txt %} - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/hr_HR/installing-boot9strap-(usm).txt b/_pages/hr_HR/installing-boot9strap-(usm).txt deleted file mode 100644 index 9dcede6ffe..0000000000 --- a/_pages/hr_HR/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: "Installing boot9strap (USM)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. - -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--warning} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* [usm.bin](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) - - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. - -1. Your SD card should be inserted in your computer -1. Copy `usm.bin` to the root of your SD card -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Create a folder named `boot9strap` on the root of your SD card -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card - -![]({{ "/images/screenshots/usm/usm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If the BB3 multihax menu doesn't open, [follow this troubleshooting guide](troubleshooting#bannerbomb3) - + If the BB3 multihax menu says "cfw installed already", you already have custom firmware and should continue from [here](checking-for-cfw) -1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" - + Your console will automatically power off -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Internet Settings` -> `Connection Settings` -1. Ensure that all three connections are named "Haaaaaaaxxxxxxxxx..." - + Do NOT change these settings! - + If all three connections are NOT all named "Haaaaaaaxxxxxxxxx...", STOP! Something went wrong in this section and MUST be fixed before you can continue -1. Power off your console - -#### Section III - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section IV - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section V - Restoring WiFi Configuration Profiles - -In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. - -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" - + Your console will automatically reboot -1. Power off your console -1. Insert your SD card into your computer -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/hu_HU/dumping-movable-(nimhax).txt b/_pages/hu_HU/dumping-movable-(nimhax).txt deleted file mode 100644 index 0801d5b2c1..0000000000 --- a/_pages/hu_HU/dumping-movable-(nimhax).txt +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: "Movable dumpolás (nimhax)" ---- - -{% include toc title="Tartalomjegyzék" %} - -{% capture technical_info %} -Technikai részletek (opcionális) - -A boot9strap telepítéséhez a konzolodra, megfejtjük az eszköz egyedi titkosító kulcsát. Ennek eléréséhez használd a Homebrew Launcher-t a nimhax indításához és dumpold a titkosító kulcsot (movable.sed) a konzolodról. - -A nimhax exploitról további technikai információkért látogass el [ide](https://github.com/luigoalma/nimhax/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Amire szükséged lesz - -* A [nimhax](https://github.com/luigoalma/nimhax/releases/latest) legújabb kiadása (a nimhax `.zip` fájl) - -### Lépések - -#### I. rész - Előkészületek - -1. Kapcsold ki a konzolod -1. Helyezd az SD kártyád a számítógépbe -1. Másold át a `nimhax` mappát a nimhax `.zip`-ből az SD kártya gyökerében található `3ds` mappába -1. Tedd vissza az SD kártyád a konzoldba -1. Kapcsold be a konzolod - -![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) -{: .notice--info} - -#### II. rész - nimhax - -1. Nyisd meg a Homebrew Launcher a választott metódusodnak megfelelő módon (például az Internet Browser-rel) -1. Indítsd el a nimhax-et a homebrew listájáról -1. Ha az exploit sikeres volt, egy `movable.sed` fájl fog megjelenni az SD kártyád gyökerében - -### Következő lépés: Frogtool - -Ha meg van a konzolod titkosítási kulcsa (`movable.sed`) a Frogtool-lal együtt használhatod, ami a `movable.sed` fájlodat használja, hogy a JPN Flinote Studio-t injektálja és azt kihasználja. \ -Habár ez a metódus gyorsabb, fájl letöltését igényli torrent klienssel. Ne kövesd ezt a metódust, ha nem tudsz torrent klienst használni. - -Továbblépés a [Boot9strap telepítésére (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--primary} diff --git a/_pages/hu_HU/homebrew-launcher-(freakyhax).txt b/_pages/hu_HU/homebrew-launcher-(freakyhax).txt deleted file mode 100644 index fead3d6c97..0000000000 --- a/_pages/hu_HU/homebrew-launcher-(freakyhax).txt +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: "Homebrew Launcher (freakyhax)" ---- - -{% include toc title="Tartalomjegyzék" %} - -{% capture technical_info %} -Technikai részletek (opcionális) -A [freakyhax](https://plutooo.github.io/freakyhax) egy exploit a Freakyforms Deluxe játékhoz, amit [plutooo](https://github.com/plutooo) fedezett fel és készített. A 9.0.0-11.17.0 verziókon EUR, USA és JPN régiós konzolokon működik. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -Ez a metódus működő 3DS kamerát igényel. -{: .notice--info} - -### Amire szükséged lesz - -+ Egy EUR/USA/JPN példánya a Freakyforms Deluxe-nak (eShop vagy cartridge) -+ A legújabb kiadás [freakyhax](https://github.com/plutooo/freakyhax/releases/latest) -* A [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) legújabb kiadása (a Luma3DS `.zip` fájl) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (közvetlen letöltés) - -### Lépések - -#### I. rész - Előkészületek - -1. Kapcsold ki a konzolod -1. Helyezd az SD kártyád a számítógépbe -1. Másol minden fájlt és mappát a `/build//exploit/` mappájából a freakyhax `.zip`-nek az SD kártyád gyökerébe - + Az SD kártya gyökere a kezdőkönyvtárt jelenti az SD kártyán, ahol látható a Nintendo 3DS könyvtár, de nem vagyunk benne -1. Másold a modelledhez/régiódhoz/verziódhoz tartozó otherapp payloadot az `otherapps.zip` fájlból a az SD kártyád gyökerébe, majd nevezd át `otherapp.bin` névre - + Ne add hozzá a `.bin` kiterjesztést, ha nem látod -1. Másold át a `boot.firm` és `boot.3dsx` fájlt a Luma3DS `.zip`-ből az SD kártya gyökerébe -1. Tedd vissza az SD kártyád a konzoldba -1. Kapcsold be a konzolod - -#### II. rész - freakyhax - -1. Tedd vissza az SD kártyád a konzoldba -1. Kapcsold be a konzolod -1. Indítsd el a Freakyforms Deluxe-ot -1. A játék menüjében válaszd a `Play -> Camera -> Load a QR code`-t -1. Válaszd a QR kódot -1. Ha az exploit sikeres volt, a konzolodnak ezt követően be kell bootolnia a Homebrew Launcherbe -1. Kapcsold ki a konzolod - -#### III. rész - Fizikai gombok ellenőrzése - -Ebben a fejezetben tesztelni fogod azt, hogy egyáltalán eléred-e a SAFE_MODE funkcióját a konzolodnak. Ez meghatározza, hogy melyik metódust kell követned a következő oldalon. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/hu_HU/homebrew-launcher-(ninjhax2-dx).txt b/_pages/hu_HU/homebrew-launcher-(ninjhax2-dx).txt deleted file mode 100644 index f7d4fca1cf..0000000000 --- a/_pages/hu_HU/homebrew-launcher-(ninjhax2-dx).txt +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "Homebrew Launcher (ninjhax2-dx)" ---- - -{% include toc title="Tartalomjegyzék" %} - -{% capture technical_info %} -Technikai részletek (opcionális) -A [Ninjhax2](https://github.com/smealum/ninjhax2.x) egy exploit a "Cubic Ninja" játékhoz, amit [smealum](https://github.com/smealum) készített. Ez az oldal egy [zoogie](https://github.com/zoogie) által frissített verzióját tartalmazza a ninjhax-nak [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx) néven, ami támogatja a 11.17.0 verziót. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -Ez a metódus működő 3DS kamerát igényel. -{: .notice--info} - -Etz a folyamat felülírja a Cubic Ninja mentés fájlt, ha rendelkezel ilyennel. -{: .notice--warning} - -### Amire szükséged lesz -* A "Cubic Ninja" játék -* A [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx/releases) legújabb kiadása -* A [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) legújabb kiadása (a Luma3DS `.zip` fájl) - -### Lépések - -#### I. rész - Előkészületek - -1. Kapcsold ki a konzolod -1. Helyezd az SD kártyád a számítógépbe -1. Másold át a ´Launcher.dat´ a konzolodnak megfelelő mappából a.zip´ fájlból az SD kártya gyökerébe a ninjhax2-dx `.zip` fájlból az SD kártyád gyökerébe - + Az SD kártya gyökere a kezdőkönyvtárt jelenti az SD kártyán, ahol látható a Nintendo 3DS könyvtár, de nem vagyunk benne -1. Másold át a `boot.firm` és `boot.3dsx` fájlt a Luma3DS `.zip`-ből az SD kártya gyökerébe - -#### II. rész - ninjhax2-dx -1. Tedd vissza az SD kártyád a konzoldba -1. Kapcsold be a konzolod -1. Indítsd el a "Cubic Ninja" egyszer és válaszd a "Create" opciót - + Ha kérdezi, törölj minden adatot -1. Válaszd a "QR Code" opciót -1. Válaszd a "Scan QR Code" opciót -1. A PC-n nyiss meg egy böngészőt és menj a [ninjhax2-dx weboldalára](https://zoogie.github.io/web/nh2dx/) -1. Válaszd ki a konzolod régióját és hardverét -1. A konzoloddal olvasd le a QR kódot - + Ha a játék kilép a HOME menübe, az exploit sikeresen telepítésre került -1. Indítsd el a "Cubic Ninja"-t még egyszer -1. Ha az exploit sikeres volt, a konzolodnak ezt követően be kell bootolnia a Homebrew Launcherbe -1. Kapcsold ki a konzolod - -#### III. rész - Fizikai gombok ellenőrzése - -Ebben a fejezetben tesztelni fogod azt, hogy egyáltalán eléred-e a SAFE_MODE funkcióját a konzolodnak. Ez meghatározza, hogy melyik metódust kell követned a következő oldalon. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/hu_HU/homebrew-launcher-(pichaxx).txt b/_pages/hu_HU/homebrew-launcher-(pichaxx).txt deleted file mode 100644 index d8544286c1..0000000000 --- a/_pages/hu_HU/homebrew-launcher-(pichaxx).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (PicHaxx)" ---- - -{% include toc title="Tartalomjegyzék" %} - -{% capture technical_info %} -Technikai részletek (opcionális) -A [PicHaxx](https://github.com/zoogie/pichaxx) egy exploit a Pokémon Picross játékhoz, amit [zoogie](https://github.com/zoogie) készített. Eredetileg [MrNbaYoh](https://github.com/MrNbaYoh) fedezte fel és [demonstrálta](https://twitter.com/mrnbayoh/status/744899681663258624). - -Ez a metódusa Seedminer használatának további exploitolás céljából használja a `movable.sed` fájlt, hogy egy egyedi Pokémon Picross mentés fájlt írjon, ami felhasználható a Homebrew Launcher indítására. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -Ennek a folyamatnak a során a Pokémon Picross mentése felülírásra kerül, ha rendelkezel ilyennel. Ha szeretnéd megőrizni a Pokémon Picross játék adatod, készítened kell egy mentést a `00000001.sav` fájlról, mielőtt felülírnád. -{: .notice--warning} - -### Amire szükséged lesz - -+ A "Pokémon Picross" játék telepítve az eszközödre - + Ha korábban letöltötted, [letöltheted újra](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Az SD kártyád be kell legyen helyezve a konzolodba a Pokémon Picross telepítéséhez -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ A [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) legújabb kiadása (a Luma3DS `.zip` fájl) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (közvetlen letöltés) - - -### Lépések - -#### I. rész - Előkészületek - -Ebben a fejezetben fel fogod másolni a fájlokat, amik a Homebrew Launcher indításához szükségesek. - -1. Kapcsold ki a konzolod -1. Helyezd az SD kártyád a számítógépbe -1. Másold át a `boot.firm` és `boot.3dsx` fájlt a Luma3DS `.zip`-ből az SD kártya gyökerébe - + Az SD kártya gyökere a kezdőkönyvtárt jelenti az SD kártyán, ahol látható a Nintendo 3DS könyvtár, de nem vagyunk benne -1. Másold a modelledhez/régiódhoz/verziódhoz tartozó otherapp payloadot az `otherapps.zip` fájlból a az SD kártyád gyökerébe, majd nevezd át `otherapp.bin` névre - + Ne add hozzá a `.bin` kiterjesztést, ha nem látod -1. Másold át a `movable.sed` a számítógépedről az SD kártyád gyökerébe - -![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### II. rész - PicHaxx - -Ebben a fejezetben létre fogsz hozni egy hackelt Pokémon Picross mentés fájlt, ami használatakor betölti a Homebrew Launcher-t a konzolodon. - -1. Nyisd meg [a PicHaxx Injector weboldalát](https://3dstools.nhnarwhal.com/#/pichaxx) a számítógépen -1. Válaszd ki a `movable.sed` fájlod -1. Válaszd a "Build and Download" menüpontot -1. Várja meg, amíg a folyamat befejeződik -1. Navigálj a `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `0017c100` -> `data` útvonalra az SD kártyán - + Az `` ugyanaz, mint amit a Seedminer-nél használtál - + Az `` egy 32 karakter hosszú nevű mappa az `` mappában -1. Másold az épp letöltött `00000001.sav` fájlt a `data` könyvtárba az SD kártyán - + Írd felül a régi mentés fájlt, ha kérdezi - - ![]({{ "/images/screenshots/pichaxx-save-location.png" | absolute_url }}) - {: .notice--info} - -1. Tedd vissza az SD kártyád a konzoldba -1. Kapcsold be a konzolod -1. Indítsd el a "Pokémon Picross"-t -1. Ha az exploit sikeres volt, a konzolodnak ezt követően be kell bootolnia a Homebrew Launcherbe - + Ha hiba üzenetet kapsz, [nézd át ezt a hibaelhárítási útmutatót](troubleshooting#homebrew-launcher-pichaxx) -1. Kapcsold ki a konzolod - -#### III. rész - Fizikai gombok ellenőrzése - -Ebben a fejezetben tesztelni fogod azt, hogy egyáltalán eléred-e a SAFE_MODE funkcióját a konzolodnak. Ez meghatározza, hogy melyik metódust kell követned a következő oldalon. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/hu_HU/homebrew-launcher-(smilehax-iie).txt b/_pages/hu_HU/homebrew-launcher-(smilehax-iie).txt deleted file mode 100644 index 612c6846b1..0000000000 --- a/_pages/hu_HU/homebrew-launcher-(smilehax-iie).txt +++ /dev/null @@ -1,70 +0,0 @@ ---- -title: "Homebrew Launcher (smilehax-IIe)" ---- - -{% include toc title="Tartalomjegyzék" %} - -Ezek a lépések nem támogatják a SmileBASIC japán verzióját. -{: .notice--warning} - -{% capture technical_info %} -Technikai részletek (opcionális) -A [smilehax-IIe](https://github.com/zoogie/smilehax-IIe) egy exploit a "SmileBASIC"-hez, amit [zoogie](https://github.com/zoogie) készített és kompatiblilis a 9.0.0-11.17.0 verziókkal USA/EUR/JPN régiós konzolokon. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Amire szükséged lesz -+ A "SmileBASIC" játék telepítve az eszközödre - + Ha korábban letöltötted, [letöltheted újra](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Az SD kártyád be kell legyen helyezve a konzolodba a SmileBASIC telepítéséhez -+ A [smilehax-IIe](https://github.com/zoogie/smilehax-IIe/releases/download/v1.1/Release_sh2e_v1.1.zip) legfrissebb verziója (közvetlen letöltés) -+ A [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) legújabb kiadása (a Luma3DS `.zip` fájl) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (közvetlen letöltés) - - -### Lépések - -#### I. rész - Előkészületek - -1. Kapcsold ki a konzolod -1. Helyezd az SD kártyád a számítógépbe -1. Másold át a `boot.firm` és `boot.3dsx` fájlt a Luma3DS `.zip`-ből az SD kártya gyökerébe - + Az SD kártya gyökere a kezdőkönyvtárt jelenti az SD kártyán, ahol látható a Nintendo 3DS könyvtár, de nem vagyunk benne -1. Másold a modelledhez/régiódhoz/verziódhoz tartozó otherapp payloadot az `otherapps.zip` fájlból a az SD kártyád gyökerébe, majd nevezd át `otherapp.bin` névre - + Ne add hozzá a `.bin` kiterjesztést, ha nem látod -1. Vidd át a régiódhoz kapcsolódó `.wav` fájlt a Release_sh2e `.zip` fájblól egy eszközre ami le tud játszani `.wav` fájlokat, például egy telefonra -1. Másold a régiódhoz kapcsolódó petitcom `.icn`-t az SD kártyád gyökerébe - -#### II. rész - smilehax - -1. Indítsd el az SmileBASIC alkalmazást - + Fogadd el a frissítést, ha felajánlja -1. Válaszd a "Publish/Download Projects" opciót -1. SVálaszd a "Download (Receive) using Public Key" opciót -1. Nyomd meg a "Yes" gombot -1. Add meg a "NJEQK3A4" publikus kulcsot a Public Key opció alatt a képernyőbillentyűzettel -1. Nyomd meg a "Yes" gombot a PMODEM141 letöltésének megerősítéséhez -1. Nyomj "OK"-t, utána "Back"-et, majd "Browse Projects"-t -1. Válaszd a PMODEM141-t, majd nyomd meg "Select File"-t -1. Válaszd a PMODEM141.PRG-t majd nyomj "OK"-t, azután "Yes"-t a végrehajtásához -1. Válaszd a RECEIVE FILE SIMPLEX-t -1. Készítsd elő az eszközt, amiről lejátszod a `.wav` fájlt -1. Tartsd a konzolt 30 cm távolságra a lejátszó hangszórójától és használj egy elfogadható (nem hangos) hangerőt a `.wav` fájl lejátszásához -1. Válaszd a 300BPS-t majd játszd le a `.wav` fájlt -1. Ha végzett nyomd meg a "Yes"-t majd az "OK"-t -1. Nyomd meg a START gombot -1. Válaszd a SH2E-xxx.TXT fájlt, majd nyomj "OK"-t, azután "Yes"-t a végrehajtásához - + Ha vissza lettél dobva a menübe, akkor ellenőrizd, hogy a SmileBASIC lefrisebb verzióját használod-e -1. Ha az exploit sikeres volt, a konzolodnak ezt követően be kell bootolnia a Homebrew Launcherbe -1. Kapcsold ki a konzolod - -#### III. rész - Fizikai gombok ellenőrzése - -Ebben a fejezetben tesztelni fogod azt, hogy egyáltalán eléred-e a SAFE_MODE funkcióját a konzolodnak. Ez meghatározza, hogy melyik metódust kell követned a következő oldalon. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/hu_HU/homebrew-launcher-(steelhax).txt b/_pages/hu_HU/homebrew-launcher-(steelhax).txt deleted file mode 100644 index f0eb4111f1..0000000000 --- a/_pages/hu_HU/homebrew-launcher-(steelhax).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (Steelhax)" ---- - -{% include toc title="Tartalomjegyzék" %} - -{% capture technical_info %} -Technikai részletek (opcionális) -Ez a metódusa Seedminer használatának további exploitolás céljából használja a `movable.sed` fájlt, hogy egy egyedi Steel Diver: Sub Wars mentés fájlt írjon, ami felhasználható a Homebrew Launcher indítására. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -Ez a folyamat felülírja a Steel Diver: Sub Wars mentés fájlt, ha rendelkezel ilyennel. Ha szeretnéd megőrizni a Steel Diver: Sub Wars játék adatod, készítened kell egy mentést a `00000001.sav` fájlról, mielőtt felülírnád. -{: .notice--warning} - -### Amire szükséged lesz - -+ A "Steel Diver: Sub Wars" játék telepítve az eszközödre - + Ha korábban letöltötted, [letöltheted újra](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Az SD kártyád be kell legyen helyezve az eszközödbe a Steel Diver: Sub Wars telepítéséhez -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ A [Steelhax](/assets/steelhax-release.zip) legfrissebb verziója (közvetlen letöltés) -+ A [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) legújabb kiadása (a Luma3DS `.zip` fájl) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (közvetlen letöltés) - -### Lépések - -#### I. rész - Előkészületek - -Ebben a fejezetben fel fogod másolni a fájlokat, amik a Homebrew Launcher indításához szükségesek. - -1. Kapcsold ki a konzolod -1. Helyezd az SD kártyád a számítógépbe -1. Másold át a `boot.firm` és `boot.3dsx` fájlt a Luma3DS `.zip`-ből az SD kártya gyökerébe - + Az SD kártya gyökere a kezdőkönyvtárt jelenti az SD kártyán, ahol látható a Nintendo 3DS könyvtár, de nem vagyunk benne -1. Másold át a `steelhax` mappát a Steelhax-release.zip`-ből az SD kártya gyökerébe -1. Másold a modelledhez/régiódhoz/verziódhoz tartozó otherapp payloadot az `otherapps.zip` fájlból a az SD kártyád gyökerébe, majd nevezd át `otherapp.bin` névre - + Ne add hozzá a `.bin` kiterjesztést, ha nem látod -1. Másold át a `movable.sed` a számítógépedről az SD kártyád gyökerébe -1. Tedd vissza az SD kártyád a konzoldba -1. Kapcsold be a konzolod - -#### II. rész - Steelminer - -Ebben a fejezetben létre fogsz hozni egy hackelt Steel Diver: Sub Wars mentés fájlt, ami használatakor betölti a Homebrew Launcher-t a konzolodon. - -1. Indítsd el a "Steel Diver: Sub Wars"-t egyszer és válaszd a Mii-t a mentés fájl inicializálásához - + Utasítsd el a játék frissítést, ha kérdezi - + Ha már frissítetted a játékot, akkor a System Settings Data management menüjében töröld a frissítést -1. Lépj ki a "Steel Diver: Sub Wars"-ból -1. Kapcsold ki a konzolod -1. Helyezd az SD kártyád a számítógépbe -1. Nyisd meg [a SteelHax Save Tool weboldalát](https://3dstools.nhnarwhal.com/#/steelhax) a számítógépeden -1. Válaszd ki a `movable.sed` fájlod -1. Válaszd ki a konzolodnak megfelelő régiót -1. Válaszd a "Build and Download" menüpontot -1. Várd meg, amíg a folyamat befejeződik -1. Navigálj a `Nintendo 3DS` -> `` -> ` -> `title` -> `00040000` -> `<8-character-region>` -> `data` útvonalra az SD kártyán - + **EUR régió**: `000d7e00` - + **JPN régió**: `000d7c00` - + **USA régió**: `000d7d00` -1. Másold az épp letöltött `00000001.sav` fájlt a `data` könyvtárba az SD kártyán - + Írd felül a régi mentés fájlt, ha kérdezi -1. Tedd vissza az SD kártyád a konzoldba -1. Kapcsold be a konzolod -1. Indítsd el "Steel Diver: Sub Wars"-t -1. Ha az exploit sikeres volt, a konzolodnak ezt követően be kell bootolnia a Homebrew Launcherbe -1. Kapcsold ki a konzolod - -#### III. rész - Fizikai gombok ellenőrzése - -Ebben a fejezetben tesztelni fogod azt, hogy egyáltalán eléred-e a SAFE_MODE funkcióját a konzolodnak. Ez meghatározza, hogy melyik metódust kell követned a következő oldalon. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/hu_HU/homebrew-launcher-(super-skaterhax).txt b/_pages/hu_HU/homebrew-launcher-(super-skaterhax).txt deleted file mode 100644 index 7561a54520..0000000000 --- a/_pages/hu_HU/homebrew-launcher-(super-skaterhax).txt +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: "Homebrew Launcher (super-skaterhax)" ---- - -{% include toc title="Tartalomjegyzék" %} - -{% capture technical_info %} -Technikai részletek (opcionális) -A technikai részletei az ezen az oldalon használt exploit-oknak [itt](https://github.com/zoogie/super-skaterhax) találhatók. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Kompatibilitási megjegyzések - -A super-skaterhax (ami a Homebrew Launcher indítására használt) kompatibilis a 11.16.0 verziós New modellekkel minden régióban és 11.17.0 verziós EUR, JPN, és USA régiós konzolokon. - -A megadott lépések csak a New 3DS, New 3DS XL és New 2DS XL típusokra vonatkoznak. Mielőtt folytatnád, kérjük ellenőrizd, hogy a moddolandó konzolod New 3DS, New 3DS XL, vagy New 2DS XL. -{: .notice--warning} - -### Amire szükséged lesz - -* A [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) legújabb kiadása (a Luma3DS `.zip` fájl) -* A [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) legújabb kiadása (a kiadás`.zip` fájl) - -#### I. rész - Előkészületek - -Ebben a fejezetben fel fogod másolni a fájlokat, amik a super-skaterhax és a Homebrew Launcher triggereléshez szükségesek. - -1. Kapcsold ki a konzolod -1. Helyezd az SD kártyád a számítógépbe -1. Másold át a `boot.firm` és `boot.3dsx` fájlt a Luma3DS `.zip`-ből az SD kártya gyökerébe - + Az SD kártya gyökere a kezdőkönyvtárt jelenti az SD kártyán, ahol látható a Nintendo 3DS könyvtár, de nem vagyunk benne -1. Másolj mindent át a konzolod régiójának megfelelő mappájából (és a rendszer verziónak megfelelően, ha a régió USA) a super-skaterhax `.zip`-nek az SD kártyád gyökerébe -1. Tedd vissza az SD kártyád a konzoldba -1. Kapcsold be a konzolod - -![]({{ "/images/screenshots/skater-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### II. rész - super-skaterhax - -Ebben a fejezetben meg fogod látogatni a browser exploit weboldalt, ami elindítja a Homebrew Launcher-t. - -Ha még nem történt meg, biztosítsd, hogy legyen működő Internet kapcsolata a konzolodnak. -{: .notice--info} - -1. A HOME menüben nyomd meg a bal és jobb váll gombokat egyszerre, hogy megnyisd a kamerát - + Ha nem tudod megnyitni a kamerát, nyisd meg az Internet Browser-t kézzel, és írd be az URL-t e helyett. (`https://zoogie.github.io/web/super/` az EUR/USA/JPN régiókhoz, `https://zoogie.github.io/web/korea` a KOR régióhoz) -1. Nyomd meg a QR kód gombot és olvasd be a következő QR kódok egyikét, ami megfelel a konzol régiódnak, [itt](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png) - + Ha tanúsítvány figyelmeztetést kapsz, nyomd meg az (A) gombot a kapcsolat engedélyezéséhez -1. Nyomd meg a (Select) gombot a könyvjelző fül megnyitásához - + Ha a (Select) gombod nem reagál, akkor érintsd meg a csillag ikont a bal alsó sarkában a képernyőnek -1. Éríntsd meg a "Bookmark this page" feliratot -1. Nyomd meg a (B) gombot egyszer, hogy visszatérj a böngészőhöz -1. Nyomd meg a (START) gombot, hogy megnyisd a helyérzékeny menüt - + Ha a (Start) gombod nem reagál, akkor érintsd meg 3-vonal menüt a jobb alsó sarkában a képernyőnek -1. Érintsd meg a "Settings"-et -1. Érintsd meg a "Delete Cookies"-t -1. Nyomd meg az (A) gombot a folytatáshoz -1. Nyomj (Home) gombot a HOME Menübe visszatéréshez, majd nyomj azonnal egy (A)-t a böngésző ismételt elindításához -1. Válaszd a "GO GO!" gombot a felső képernyőn - + Ha bármilyen kérdés előjön, fogadd el mind - + Ha a konzolod lefagy egy sárga képernyőn, tartsd nyomva a POWER gombot, amíg ki nem kapcsol, és próbáld újra ezt a részt - + Ha a konzolod lefagy egy piros képernyőn, tartsd nyomva a POWER gombot, amíg ki nem kapcsol, csináld újra a 3. lépést a II. részben, majd próbáld újra ezt a részt - + Ha más hibát kapsz, próbáld meg 5x, és ha még minden nem megy [kövesd ezt a hibaelhárítási útmutatót](troubleshooting#homebrew-launcher-super-skaterhax) -1. Ha az exploit sikeres volt, a konzolodnak ezt követően be kell bootolnia a Homebrew Launcherbe -1. Kapcsold ki a konzolod - -#### III. rész - Fizikai gombok ellenőrzése - -Ebben a fejezetben tesztelni fogod azt, hogy egyáltalán eléred-e a SAFE_MODE funkcióját a konzolodnak. Ez meghatározza, hogy melyik metódust kell követned a következő oldalon. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/hu_HU/include/fredtool-prep.txt b/_pages/hu_HU/include/fredtool-prep.txt deleted file mode 100644 index 4fe40af9df..0000000000 --- a/_pages/hu_HU/include/fredtool-prep.txt +++ /dev/null @@ -1,29 +0,0 @@ -Ebben a fejezetben fel fogod másolni azokat a fájlokat, amik átmenetileg lecserélik a DS Connection Settings-t a Flipnote Studio-val, ami arra használt, hogy elindítsa a boot9strap (egyedi firmware) telepítőt. - -1. Helyezd az SD kártyád a számítógépbe -1. Nyisd meg a [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec/) oldalt a számítógépeden -1. A "Username" mező alatt adj meg egy tetszőleges alfanumerikus nevet (nem lehet benne szóköz vagy speciális karakter) -1. A "DSiBin" mező alatt töltsd fel a DSiWare mentés fájlodat (pl.: 42383841.bin) az SD kártyád gyökeréről az első "Browse..." opció használatával -1. A "MovableSed" mező alatt töltsd fel a `movable.sed` fájlod a második "Browse..." opció használatával -1. Az "InjectionTarget" mező alatt válaszd ki az injection target-et `DSinternet`-re (NEM memorypit) -1. Kattints a "Build"-re - + Várj néhány másodpercet a build folyamat befejezésére -1. A Build History szekcióban a bal oldalon gépeld be a felhasználónevet (Username) a "Filter Builds" mezőbe -1. Kattints az első keresési találatra - + Ennek kell a legutolsó időbélyeggel rendelkeznie -1. Kattints az "output_(name).zip" linkre -1. Navigálj a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` mappába az SD kártyán - + Az `` egy 32 karakter hosszú mappanév, amit a [Seedminer](seedminer)-nél másoltál - + Az `` egy 32 karakter hosszú nevű mappa az `` mappában -1. Töröld `F00D43D5.bin` fájlt a Nintendo DSiWare mappából -1. Másold a `42383841.bin` fájlt az `hax` mappájából a letöltött DSiWare csomagból (output_(name).zip) a `Nintendo DSiWare` mappába - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Másold át a `boot.firm` és `boot.3dsx` fájlt a Luma3DS `.zip`-ből az SD kártya gyökerébe - + Az SD kártya gyökere a kezdőkönyvtárt jelenti az SD kártyán, ahol látható a Nintendo 3DS könyvtár, de nem vagyunk benne -1. Másold át a `boot.nds`-t (B9STool) a release `.zip`-ből az SD kártyád gyökerébe -1. Másold át a `private` mappát a Frogminer_save `.zip`-ből az SD kártyád gyökerébe -1. Tedd vissza az SD kártyád a konzoldba -1. Kapcsold be a konzolod - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} \ No newline at end of file diff --git a/_pages/hu_HU/include/hbl-common-exploits-movable.txt b/_pages/hu_HU/include/hbl-common-exploits-movable.txt deleted file mode 100644 index 6c4d212829..0000000000 --- a/_pages/hu_HU/include/hbl-common-exploits-movable.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Következő lépés: Válassz egy exploit-ot - -Ha a kamera megjelent az előző szakaszban, a Safe Mode valószínűleg működik a konzolodon. - -Ha a kamera megjelent, folytasd a [boot9strap telepítésével (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -Ha a kamera NEM jelenik meg, folytasd a [boot9strap telepítésével (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/hu_HU/include/hbl-common-exploits.txt b/_pages/hu_HU/include/hbl-common-exploits.txt deleted file mode 100644 index 6c4d212829..0000000000 --- a/_pages/hu_HU/include/hbl-common-exploits.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Következő lépés: Válassz egy exploit-ot - -Ha a kamera megjelent az előző szakaszban, a Safe Mode valószínűleg működik a konzolodon. - -Ha a kamera megjelent, folytasd a [boot9strap telepítésével (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -Ha a kamera NEM jelenik meg, folytasd a [boot9strap telepítésével (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/hu_HU/installing-boot9strap-(fredtool).txt b/_pages/hu_HU/installing-boot9strap-(fredtool).txt deleted file mode 100644 index 182e8d4bfe..0000000000 --- a/_pages/hu_HU/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: "Boot9strap telepítése (Fredtool)" ---- - -{% include toc title="Tartalomjegyzék" %} - -{% capture technical_info %} -Technikai részletek (opcionális) - -Ez a metódusa a Seedminer használatának a további exploitoláshoz használja a `movable.sed` fájlod, hogy dekriptáljon egy DSiWare címet, azzal az céllal, hogy beinjektáljon egy exploitolható DSiWare címet a DS Download Play alkalmazásba. - -Ez egy jelenleg működő megvalósítása a "FIRM partitions known-plaintext" néven ismert exploitnak, amiről részletesebben olvashatsz [itt](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -Csak akkor szabad erre az oldalra jutnod, ha 11.16.0 verziót futtatsz. Ha más firmware-en vagy mint 11.17.0 vagy 11.16.0, akkor ÁLLJ MEG, ez az útmutató BRICKELNI FOG más firmware-en!! -{: .notice--warning} - -### Amire szükséged lesz - -* A `movable.sed` fájlodra a [Seedminer](seedminer)-ből -* A [Frogminer_save] legújabb kiadása (https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.16.0 vagy 11.17.0 használók**: A [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) v6.1.1 verziója (közvetlen letöltés) -* A [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) legújabb kiadása (a Luma3DS `.zip` fájl) - -#### I. rész - CHF ellenőrzés - -{% include_relative include/cfw-check-fredtool.txt %} - -#### II. rész - BannerBomb3 - -Ebben a fejezetben elő fogod idézni a BannerBomb3 exploit-ot a DSIWare Management menü használatával és lemásolni az eredmény dump fájlt a számítógépedre, hogy fel tudd használni a következő fejezetben. - -1. Tedd vissza az SD kártyád a konzoldba -1. Kapcsold be a konzolod -1. Lépj be a "System Settings"-be a konzolodon -1. Navigálj ide: `Data Management` -> `DSiWare` -> `SD Card` ([kép](/images/screenshots/bb3/dsiware-management.png)) - + A konzolodnak a BB3 multihax menüt kell mutatnia - + Ha összeomlik a konzolod ebben a lépésben, [kövesd ezt a hibaelhárítási útmutatót](troubleshooting#installing-boot9strap-fredtool) -1. Használd a D-Pad-et a navigáláshoz, és nyomd meg az (A) gombot a "Dump DSiWare" kiválasztásához - + A konzolodod automatikusan újra fog indulni -1. Kapcsold ki a konzolod - -#### III. rész - Előkészületek - -{% include_relative include/fredtool-prep.txt %} - -#### IV. rész - A DS Connection Settings felülírása - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### V. rész - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### VI. rész - Luma3DS beállítás - -1. Nyomd le és tartsd nyomva a (Select) gombot, és a (Select) nyomva tartása mellett kapcsold be a konzolod -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### VII. rész - A DS Connection Settings visszaállítása - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Tovább a [telepítés véglegesítésére](finalizing-setup) -{: .notice--primary} diff --git a/_pages/hu_HU/installing-boot9strap-(fredtool-legacy).txt b/_pages/hu_HU/installing-boot9strap-(fredtool-legacy).txt deleted file mode 100644 index a523e2d9e3..0000000000 --- a/_pages/hu_HU/installing-boot9strap-(fredtool-legacy).txt +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: "Boot9strap telepítése (Fredtool, régi verziók)" ---- - -{% include toc title="Tartalomjegyzék" %} - -{% capture technical_info %} -Technikai részletek (opcionális) - -Ahhoz, hogy a rendszerből kinyerjük a DSiWare adatokat, egy hibát használunk ki a DSiWare adat kezelési ablakában, a rendszer beállításokban. - -Hogy ezt elérjük, szükségünk van a rendszer titkosítási kulcsára (movable.sed), hogy újra építsünk egy DSiWare mentést, aminek segítségével ki tudjuk nyerni a DSi Internet beállítások alkalmazást az SD kártyára. - -Ha van egy DSiWare mentésünk, injektálhatjuk a DS Internet Settings alkalmazásba. - -Ez egy jelenleg működő megvalósítása a "FIRM partitions known-plaintext" néven ismert exploitnak, amiről részletesebben olvashatsz [itt](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -Csak akkor szabad erre az oldalra jutnod, ha 11.15.0 vagy 11.14.0 verziót futtatsz. Ha más firmware-en vagy mint 11.15.0 vagy 11.14.0, akkor ÁLLJ MEG, ez az útmutató BRICKELNI FOG más firmware-en!! -{: .notice--warning} - -### Amire szükséged lesz - -* A `movable.sed` fájlodra a [Seedminer (Mii)](seedminer-(mii))-ből -* A [Frogminer_save] legújabb kiadása (https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **Csak 11.15.0 és 11.14.0 használók**: A [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) v6.0.1 verziója (közvetlen letöltés) -* A [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) legújabb kiadása (a Luma3DS `.zip` fájl) - -#### I. rész - CHF ellenőrzés - -{% include_relative include/cfw-check-fredtool.txt %} - -#### II. rész - BannerBomb3 - -Ebben a fejezetben elő fogod idézni a BannerBomb3 exploit-ot a DSIWare Management menü használatával és lemásolni az eredmény dump fájlt a számítógépedre, hogy fel tudd használni a következő fejezetben. - -1. Tedd vissza az SD kártyád a konzoldba -1. Kapcsold be a konzolod -1. Lépj be a "System Settings"-be a konzolodon -1. Navigálj ide: `Data Management` -> `DSiWare` -> `SD Card` ([kép](/images/screenshots/bb3/dsiware-management.png)) - + A konzolodnak a BB3 multihax menüt kell mutatnia - + Ha összeomlik a rendszered ebben a lépésben, [kövesd ezt a hibaelhárítási útmutatót](troubleshooting#installing-boot9strap-fredtool) -1. Használd a D-Pad-et a navigáláshoz, és nyomd meg az (A) gombot a "Dump DSiWare" kiválasztásához - + A konzolodod automatikusan újra fog indulni -1. Kapcsold ki a konzolod - -#### III. rész - Előkészületek - -{% include_relative include/fredtool-prep.txt %} - -#### IV. rész - A DS Connection Settings felülírása - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### V. rész - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### VI. rész - Luma3DS beállítás - -1. Nyomd le és tartsd nyomva a (Select) gombot, és a (Select) nyomva tartása mellett kapcsold be a konzolod -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### VII. rész - A DS Connection Settings visszaállítása - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Tovább a [telepítés véglegesítésére](finalizing-setup) -{: .notice--primary} diff --git a/_pages/hu_HU/installing-boot9strap-(frogtool).txt b/_pages/hu_HU/installing-boot9strap-(frogtool).txt deleted file mode 100644 index 86c085eb86..0000000000 --- a/_pages/hu_HU/installing-boot9strap-(frogtool).txt +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Boot9strap telepítése (Frogtool)" ---- - -{% include toc title="Tartalomjegyzék" %} - -{% capture technical_info %} -Technikai részletek (opcionális) -A technikai részletei az ezen az oldalon használt exploit-oknak lásd a "DSiWare_Exports CTCert verification" és a "FIRM partitions known-plaintext" témákat [itt](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - - -Ahhoz, hogy használhasd a [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) linkeket a `frogcert.bin`-hez ezen az oldalon, szükséged lesz egy torrent kliensre, mint például a [qBittorrent](https://www.qbittorrent.org/download.php) vagy a [Deluge](http://dev.deluge-torrent.org/wiki/Download). -{: .notice--warning} - -### Amire szükséged lesz - -* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link) -* The latest release of [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (direct download) -* A [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) legújabb kiadása - -#### I. rész - CHF ellenőrzés - -{% include_relative include/cfw-check-fredtool.txt %} - -#### II. rész - Előkészületek - -1. Kapcsold ki a konzolod -1. Helyezd az SD kártyád a számítógépbe -1. Másold át a `boot.firm` és `boot.3dsx` fájlt a Luma3DS `.zip`-ből az SD kártya gyökerébe -1. Másold át a `boot.nds`-t (b9sTool) a `b9sTool release `.zip`-ből az SD kártya gyökerébe -1. Hozz létre egy mappát `3ds` néven az SD kártyád gyökerében, ha még nem létezik ilyen - + Ez a mappa tárolja a homebrew applikációkat és adataikat; ez mást mint a `Nintendo 3DS` mappa, amit a konzol automatikusan generál -1. Copy the `Frogtool` folder from the Frogtool-nimhax `.zip` to the `/3ds/` folder on your SD card -1. Másold az `frogcert.bin` fájlt az SD kártyád gyökerébe -1. Tedd vissza az SD kártyád a konzoldba -1. Kapcsold be a konzolod - -#### III. rész - A DS Download Play patchelése - -1. Nyisd meg a Homebrew Launcher a választott metódusodnak megfelelő módon (például az Internet Browser-rel) -1. Indítsd el az Frogtool-t a homebrew listából -1. Válaszd az "INJECT patched DS Download Play" opciót -1. A Frogtool automatikusan futtatja és injektálja a JPN verzióját a Flipnote Studio-nak a DS Download Play-be -1. Ha a művelet lefutott, olvasd el a képernyőket és ellenőrizd, hogy a folyamat sikeres volt -1. Érintsd meg az érintőképernyőt és válaszd a "BOOT patched DS Download Play" opciót -1. Ha az exploit sikeres volt, a konzolodnak ezt követően be kell töltenie a JPN verzióját a Flipnote Studio-nak - + If you get stuck on a black screen, follow [this](https://wiki.hacks.guide/wiki/3DS:TWLFix#Userland_(PicHaxx,_Steelhax,_etc.)-0) page, then try again - -#### IV. rész - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsdlp" %} - -#### VI. rész - Luma3DS beállítás - -1. Nyomd le és tartsd nyomva a (Select) gombot, és a (Select) nyomva tartása mellett kapcsold be a konzolod -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### VII. rész - A DS Download Play visszaállítása - -1. Indítsd el a Download Play alkalmazást -1. Várj, amíg két gombot nem látsz - + Ne nyomd meg egyik gombot sem -1. Nyomd le az (Bal Váll) + (D-Pad le) + (Select) gombokat egyszerre a Rosalina menü megnyitásához -1. Válaszd ki a "Miscellaneous options"-t -1. Válaszd a "Switch the hb. title to the current app." opciót -1. Nyomd meg a (B) gombot a folytatáshoz -1. Nyomd meg a (B) gombot, hogy visszakerülj a Rosalina főmenüjébe -1. Nyomd meg a (B) gombot, hogy kilépj a Rosalina menüből -1. Nyomd meg a (Home) gombot és zárd be a Download Play-t -1. Indítsd el újra a Download Play alkalmazást -1. Ekkor a konzolodnak be kell töltenie a Homebrew Launcher-t -1. Indítsd el az Frogtool-t a homebrew listából -1. Válaszd a "RESTORE clean DS Download Play" opciót -1. Ha a művelet lefutott, olvasd el a képernyőket és ellenőrizd, hogy a folyamat sikeres volt - + Ha voltak hibák vagy hiányzó fájlok, javítsd a problémát és próbáld újra -1. Ha a folyamat sikeres volt, érintsd meg a képernyőt, majd a START gombot a kilépéshez -1. Kapcsold ki a konzolod - -___ - -### Tovább a [telepítés véglegesítésére](finalizing-setup) -{: .notice--primary} diff --git a/_pages/hu_HU/installing-boot9strap-(hbl-usm).txt b/_pages/hu_HU/installing-boot9strap-(hbl-usm).txt deleted file mode 100644 index 26ac80f705..0000000000 --- a/_pages/hu_HU/installing-boot9strap-(hbl-usm).txt +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "Boot9strap telepítése (HBL-USM)" ---- - -{% include toc title="Tartalomjegyzék" %} - -{% capture technical_info %} -Technikai részletek (opcionális) - -Ahhoz, hogy a SAFE_MODE-ot exploitálhassuk, be kell injektálnunk egy exploitált WiFi profilt. - -Mivel már van Homebrew hozzáférésünk, használhatjuk a slotTool-t erre a célra. - -Amint a WiFi profil injektálásra került, a SAFE_MODE-ot fogjuk használni, ami egy helyreállítás szolgáltatás, ami elérhető minden 3DS konzolon, hogy aktiválja az exploitolt WiFi profilt. - -További technikai információkért az unSAFE_MODE exploit-ról látogass el [ide](https://github.com/zoogie/unSAFE_MODE/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Kompatibilitási megjegyzések - -Ha a (Jobb/Bell Vál), (D-Pad Fel) vagy az (A) gombod nem működik, csatlakozz a [Nintendo Homebrew csatornához Discord-on](https://discord.gg/MWxPgEp) és kérj segítséget, angolul. -{: .notice--danger} - -### Amire szükséged lesz - -* A [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) legfrisseb verziója (közvetlen letöltés) -* A [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) legfrissebb verziója (közvetlen letöltés) - -#### I. rész - Előkészületek - -Ebben a fejezetben fel fogod másolni azokat a fájlokat a konzolod SD kártyájára, amik ahhoz szükségesek, hogy kiváltsák az unSAFE_MODE exploit-ot. Ezután a Homebrew Launcher-t fogod használni a slotTool indítására, ami felülírja a Wi-Fi slotjaidat a hackelt adattal. A Wi-Fi kapcsolat beállításaid átmenetileg felülírásra kerülnek, amíg az exploit aktív. - -1. Helyezd az SD kártyád a számítógépbe -1. Hozz létre egy mappát `boot9strap` néven az SD kártya gyökerében -1. Másold át a `boot9strap.firm` fájlt és a `boot9strap.firm.sha` fájlt a RELEASE `.zip` fájlból az SD kártyád `/boot9strap/` mappájába -1. Hozz létre egy mappát `3ds` néven az SD kártyád gyökerében, ha még nem létezik ilyen - + Ez a mappa tárolja a homebrew applikációkat és adataikat; ez mást mint a `Nintendo 3DS` mappa, amit a konzol automatikusan generál -1. Másold át a `slotTool.3dsx` fájlt az RELEASE`.zip`-ből az SD kártya gyökerében található `/3ds/` mappába -1. Másold át a `usm.bin` fájlt a RELEASE `.zip`-ből az SD kártya gyökerébe -1. Másold át a `SafeB9SInstaller.bin` fájlt a SafeB9SInstaller `.zip`-ből az SD kártyád gyökerébe -1. Tedd vissza az SD kártyád a konzoldba -1. Kapcsold be a konzolod -1. Nyisd meg a Homebrew Launcher a választott metódusodnak megfelelő módon (például az Internet Browser-rel) -1. Indítsd el a slotTool-t a homebrew listából - + Ha beragadsz a piros képernyőn, kapcsold ki erőltetve a konzolod a bekapcsoló gombjának 15 másodpercig nyomva tartásával, majd próbáld meg újra ezt a részt -1. Válaszd az "INSTALL exploit to wifi slots 1,2,3 & shutdown" opciót - + Ezt követően néhány szöveget fogsz látni a képernyőn, majd a rendszer leáll - -![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### II. szakasz - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### III. rész - boot9strap telepítése - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### IV. rész - A WiFi Configuration Profiles visszaállítása - -{% include_relative include/remove-usm-slottool.txt %} - -___ - -### Tovább a [telepítés véglegesítésére](finalizing-setup) -{: .notice--primary} diff --git a/_pages/hu_HU/installing-boot9strap-(usm).txt b/_pages/hu_HU/installing-boot9strap-(usm).txt deleted file mode 100644 index 3d1f839525..0000000000 --- a/_pages/hu_HU/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: "Boot9strap telepítése (USM)" ---- - -{% include toc title="Tartalomjegyzék" %} - -{% capture technical_info %} -Technikai részletek (opcionális) - -Ahhoz, hogy a SAFE_MODE-ot exploitálhassuk, be kell injektálnunk egy exploitált WiFi profilt. - -Ezt megtenni egy másik létező exploittal, a BannerBomb3-mal tudjuk. - -Hogy ezt elérjük, a rendszer titkosítási kulcsoddal (movable.sed) újra építünk egy DSiWare mentést, ami exploitolja a rendszert annak érdekében, hogy be tudjuk injektálni az exploitolt WiFi profilt a kapcsolatok listájára. - -Amint a WiFi profil injektálásra került, a SAFE_MODE-ot fogjuk használni, ami egy helyreállítás szolgáltatás, ami elérhető minden 3DS konzolon, hogy aktiválja az exploitolt WiFi profilt. - -További technikai információkért a Bannerbom3 és az unSAFE_MODE exploitokról kövesd ezeket a linkeket: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Kompatibilitási megjegyzések - -Az utasítások az Amerikai, Európai, Japán és Koreai régiójú konzolokon működnek, amik a rendszer verzió mögött egy U, E, J vagy K betű jelöl. - -Ha a (Jobb/Bal Váll), (D-Pad Fel) vagy (A) gombjaid nem működnek, [a Seedminer egy alternatív ágát](installing-boot9strap-(fredtool)) kell követned. Ha támogatásra van szükséged az anyaggal kapcsolatosan, csatlakozz a [Nintendo Homebrew-hoz Discord-on](https://discord.gg/MWxPgEp) és kérj, angolul, támogatást. -{: .notice--warning} - -### Amire szükséged lesz - -* A [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) legfrisseb verziója (közvetlen letöltés) -* A [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) legfrisseb verziója (közvetlen letöltés) -* A [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) legújabb kiadása (a Luma3DS `.zip` fájl) -* [usm.bin](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (közvetlen letöltés) - - -#### I. rész - Előkészületek - -Ebben a fejezetben fel fogod másolni azokat a fájlokat a konzolod SD kártyájára, amik ahhoz szükségesek, hogy kiváltsák az unSAFE_MODE exploit-ot. - -1. Az SD kártyádnak be kell helyezve lennie a számítógépedbe -1. Másold az `usm.bin` fájlt az SD kártyád gyökerébe -1. Másold át a `boot.firm` és `boot.3dsx` fájlt a Luma3DS `.zip`-ből az SD kártya gyökerébe - + Az SD kártya gyökere a kezdőkönyvtárt jelenti az SD kártyán, ahol látható a Nintendo 3DS könyvtár, de nem vagyunk benne -1. Hozz létre egy mappát `boot9strap` néven az SD kártya gyökerében -1. Másold át a `boot9strap.firm` fájlt és a `boot9strap.firm.sha` fájlt a boot9strap `.zip` fájlból az SD kártyád `/boot9strap/` mappájába -1. Másold át a `SafeB9SInstaller.bin` fájlt a SafeB9SInstaller `.zip`-ből az SD kártyád gyökerébe - -![]({{ "/images/screenshots/usm/usm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### II. rész - BannerBomb3 - -Ebben a fejezetben elő fogod idézni a BannerBomb3 exploit-ot a DSIWare Management menü használatával, amivel felülírod a Wi-Fi slotjaid a hackelt adattal. A Wi-Fi kapcsolat beállításaid átmenetileg felülírásra kerülnek, amíg az exploit aktív. - -1. Tedd vissza az SD kártyád a konzoldba -1. Kapcsold be a konzolod -1. Lépj be a "System Settings"-be a konzolodon -1. Navigálj ide: `Data Management` -> `DSiWare` -> `SD Card` ([kép](/images/screenshots/bb3/dsiware-management.png)) - + A konzolodnak a BB3 multihax menüt kell mutatnia - + Ha a BB3 multihax menü nem nyílik meg [kövesd ezt a hibaelhárítási útmutatót](troubleshooting#bannerbomb3) - + Ha a BB3 multihax menü azt mondja, hogy a "cfw installed already", akkor már van egyedi firmware-ed és [innen](checking-for-cfw) kellene folytatnod -1. Használd a D-Pad-et a navigáláshoz, és nyomd meg az (A) gombot az "Install unSAFE_MODE" kiválasztásához - + A konzolod automatikusan ki fog kapcsolni -1. Kapcsold be a konzolod -1. Lépj be a "System Settings"-be a konzolodon -1. Navigálj az `Internet Settings` -> `Connection Settings` opciókhoz -1. + Ellenőrizd, hogy mind a három kapcsolatnak a neve "Haaaaaaaxxxxxxxxx..." - + NE állítsd át ezeket a beállításokat! - + Ha a három kapcsolatnak NEM "Haaaaaaaxxxxxxxxx..." a neve, ÁLLJ MEG! Valami nem sikerült jól ebben a részben és azt ki KELL javítani mielőtt tovább mehetsz -1. Kapcsold ki a konzolod - -#### III. rész - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### IV. rész - boot9strap telepítése - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### V. rész - A WiFi Configuration Profiles visszaállítása - -Ebben a fejezetben elő fogod idézni a BannerBomb3 exploit-ot egy második alkalommal, hogy helyreállítsd a Wi-Fi kapcsolat slot-okat, amik felülírásra kerültek a II. részben. - -1. Lépj be a "System Settings"-be a konzolodon -1. Navigálj ide: `Data Management` -> `DSiWare` -> `SD Card` ([kép](/images/screenshots/bb3/dsiware-management.png)) -1. Használd a D-Pad-et a navigáláshoz, és nyomd meg az (A) gombot az "Uninstall unSAFE_MODE" kiválasztásához - + A konzolodod automatikusan újra fog indulni -1. Kapcsold ki a konzolod -1. Helyezd az SD kártyád a számítógépbe -1. Navigálj a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` mappába az SD kártyán -1. Töröld ki a `F00D43D5.bin` fájlt a Nintendo DSiWare mappádból és a számítógépedről. Ez nem fog kelleni többet - -___ - -### Tovább a [telepítés véglegesítésére](finalizing-setup) -{: .notice--primary} diff --git a/_pages/id_ID/dumping-movable-(nimhax).txt b/_pages/id_ID/dumping-movable-(nimhax).txt deleted file mode 100644 index 69f3d011d3..0000000000 --- a/_pages/id_ID/dumping-movable-(nimhax).txt +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: "Dumping Movable (nimhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -To install boot9strap on your console, we derive your console's unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console. - -For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need - -* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy the `nimhax` folder from the nimhax `.zip` to the `/3ds/` folder on your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) -{: .notice--info} - -#### Section II - nimhax - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch nimhax from the list of homebrew -1. If the exploit was successful, a `movable.sed` file will appear on the root of your SD card - -### Next step: Frogtool - -Once you have your console's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \ -While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you're unable to use a torrent client. - -Continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--primary} diff --git a/_pages/id_ID/homebrew-launcher-(freakyhax).txt b/_pages/id_ID/homebrew-launcher-(freakyhax).txt deleted file mode 100644 index 028cee82a4..0000000000 --- a/_pages/id_ID/homebrew-launcher-(freakyhax).txt +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: "Homebrew Launcher (freakyhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[freakyhax](https://plutooo.github.io/freakyhax/) is an exploit for the game Freakyforms Deluxe discovered and released by [plutooo](https://github.com/plutooo). It works on versions 9.0.0 through 11.17.0 on EUR, USA and JPN region consoles. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -### What You Need - -+ A EUR/USA/JPN copy of Freakyforms Deluxe (eShop or cartridge) -+ The latest release of [freakyhax](https://github.com/plutooo/freakyhax/releases/latest) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy all files and folders inside the `/build//exploit/` folder from the freakyhax `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - freakyhax - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch Freakyforms Deluxe -1. In the game menu, select `Play -> Camera -> Load a QR code` -1. Select the QR code -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/id_ID/homebrew-launcher-(ninjhax2-dx).txt b/_pages/id_ID/homebrew-launcher-(ninjhax2-dx).txt deleted file mode 100644 index 2d8032745c..0000000000 --- a/_pages/id_ID/homebrew-launcher-(ninjhax2-dx).txt +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "Homebrew Launcher (ninjhax2-dx)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[Ninjhax2](https://github.com/smealum/ninjhax2.x) is an exploit for the game "Cubic Ninja" made by [smealum](https://github.com/smealum). This page uses an updated version of ninjhax by [zoogie](https://github.com/zoogie) called [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx), which supports 11.17.0. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -This process will overwrite your Cubic Ninja save file, if you have one. -{: .notice--warning} - -### What You Need -* The game "Cubic Ninja" -* The latest release of [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx/releases) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `Launcher.dat` from the folder appropriate for your console from the ninjhax2-dx `.zip` file to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - -#### Section II - ninjhax2-dx -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Cubic Ninja" once and select "Create" - + If prompted, delete all data -1. Select "QR Code" -1. Select "Scan QR Code" -1. On your PC, open the browser and go to [ninjhax2-dx website](https://zoogie.github.io/web/nh2dx/) -1. Select your console's region and hardware -1. On your console, scan the QR code - + If the game exits to the HOME Menu, then the exploit has installed correctly -1. Launch "Cubic Ninja" again -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/id_ID/homebrew-launcher-(pichaxx).txt b/_pages/id_ID/homebrew-launcher-(pichaxx).txt deleted file mode 100644 index a58df498f5..0000000000 --- a/_pages/id_ID/homebrew-launcher-(pichaxx).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (PicHaxx)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[PicHaxx](https://github.com/zoogie/pichaxx) is an exploit for the game Pokémon Picross released by [zoogie](https://github.com/zoogie), originally discovered and [demonstrated](https://twitter.com/mrnbayoh/status/744899681663258624) by [MrNbaYoh](https://github.com/MrNbaYoh). - -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Pokémon Picross" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Pokémon Picross -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Prep Work - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card - -![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - PicHaxx - -In this section, you will create a hacked Pokémon Picross save file that, when loaded, will run the Homebrew Launcher on your console. - -1. Open [the PicHaxx Injector website](https://3dstools.nhnarwhal.com/#/pichaxx) on your computer -1. Select your `movable.sed` file -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `0017c100` -> `data` on your SD card - + The `` will be the same one that you used in Seedminer - + The `` is a 32 character long folder inside of the `` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted - - ![]({{ "/images/screenshots/pichaxx-save-location.png" | absolute_url }}) - {: .notice--info} - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Pokémon Picross" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher - + If you get an error message, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-pichaxx) -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/id_ID/homebrew-launcher-(smilehax-iie).txt b/_pages/id_ID/homebrew-launcher-(smilehax-iie).txt deleted file mode 100644 index 08cd5865c0..0000000000 --- a/_pages/id_ID/homebrew-launcher-(smilehax-iie).txt +++ /dev/null @@ -1,70 +0,0 @@ ---- -title: "Homebrew Launcher (smilehax-IIe)" ---- - -{% include toc title="Table of Contents" %} - -This set of instructions does not support the Japanese version of SmileBASIC. -{: .notice--warning} - -{% capture technical_info %} -Technical Details (optional) -[smilehax-IIe](https://github.com/zoogie/smilehax-IIe) is an exploit for the game "SmileBASIC" made by zoogie, compatible with system versions 9.0.0 through 11.17.0 for USA/EUR/JPN region consoles. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need -+ The game "SmileBASIC" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install SmileBASIC -+ The latest release of [smilehax-IIe](https://github.com/zoogie/smilehax-IIe/releases/download/v1.1/Release_sh2e_v1.1.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Transfer the `.wav` for your region from the Release_sh2e `.zip` to a device that can play `.wav` files, for example a phone -1. Copy the petitcom `.icn` for your region to the root of your SD card - -#### Section II - smilehax - -1. Launch SmileBASIC - + Update the game if prompted -1. Select the "Publish/Download Projects" option -1. Select the "Download (Receive) using Public Key" option -1. Press the "Yes" button -1. Enter the Public Key "NJEQK3A4" using the on-screen keyboard -1. Press the "Yes" button to confirm the download of PMODEM141 -1. Press "OK", then "Back", then "Browse Projects" -1. Select PMODEM141, then press "Select File" -1. Select PMODEM141.PRG, then press "OK", then "Yes" to execute it -1. Select RECEIVE FILE SIMPLEX -1. Prepare the device you use to play the `.wav` file -1. Keep your console about a foot from the `.wav` file playing devices' speaker and use a reasonable (not loud) volume to play the `.wav` -1. Now select 300BPS, then play the `.wav` file -1. When it finishes, press "Yes", then press "OK" -1. Press the START button -1. Select the SH2E-xxx.TXT file, then press OK, then "Yes" to execute it - + If you get kicked back into menu, make sure you're using the latest version of SmileBASIC -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/id_ID/homebrew-launcher-(steelhax).txt b/_pages/id_ID/homebrew-launcher-(steelhax).txt deleted file mode 100644 index 9b8dace5a3..0000000000 --- a/_pages/id_ID/homebrew-launcher-(steelhax).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (Steelhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Steel Diver: Sub Wars, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Steel Diver: Sub Wars save file, if you have one. If you wish to preserve your Steel Diver: Sub Wars game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Steel Diver: Sub Wars" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Steel Diver: Sub Wars -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Steelhax](/assets/steelhax-release.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Prep Work - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the `steelhax` folder from the `Steelhax-release.zip` to the root of your SD card -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - Steelminer - -In this section, you will create a hacked Steel Diver: Sub Wars save file that, when used, will load the Homebrew Launcher on your console. - -1. Launch "Steel Diver: Sub Wars" once and select a Mii to initialize your save file - + Decline the game update when prompted - + If you have already updated the game, use the Data Management menu of the System Settings to delete the update -1. Exit "Steel Diver: Sub Wars" -1. Power off your console -1. Insert your SD card into your computer -1. Open [the SteelHax Save Tool website](https://3dstools.nhnarwhal.com/#/steelhax) on your computer -1. Select your `movable.sed` file -1. Select your region based on your console -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `<8-character-region>` -> `data` on your SD card - + **EUR Region**: `000d7e00` - + **JPN Region**: `000d7c00` - + **USA Region**: `000d7d00` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Steel Diver: Sub Wars" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/id_ID/homebrew-launcher-(super-skaterhax).txt b/_pages/id_ID/homebrew-launcher-(super-skaterhax).txt deleted file mode 100644 index 5895c4f64b..0000000000 --- a/_pages/id_ID/homebrew-launcher-(super-skaterhax).txt +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: "Homebrew Launcher (super-skaterhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see [here](https://github.com/zoogie/super-skaterhax). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -Super-skaterhax (when used to launch the Homebrew Launcher) is compatible with New models on version 11.16.0 in all regions, and 11.17.0 in the EUR, JPN and USA regions. - -The instructions provided only apply to the New 3DS, New 3DS XL, and New 2DS XL. Please ensure that the console you are modding is a New 3DS, New 3DS XL, or New 2DS XL before continuing. -{: .notice--warning} - -### What You Need - -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* The latest release of [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (the release `.zip` file) - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger both super-skaterhax and the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy everything inside the folder for your console's region (and also system version if the region is USA) in the super-skaterhax `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/skater-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - super-skaterhax - -In this section, you will visit the browser exploit webpage, which will launch the Homebrew Launcher. - -If you haven't already, make sure you have a working Internet connection set up on your console. -{: .notice--info} - -1. On the HOME Menu, press the Left and Right shoulder buttons at the same time to open the camera - + If you are unable to open the camera, open the Internet Browser and manually type the URL instead (`https://zoogie.github.io/web/super/` for EUR/USA/JPN, `https://zoogie.github.io/web/korea` for KOR) -1. Tap the QR code button and scan one of the following QR codes for your console's region [here](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png) - + If you get a security certificate warning, press (A) to allow the connection -1. Press the (Select) button to open the bookmark tab - + If your (Select) button does not respond, tap the star icon on the bottom-left corner of the screen -1. Tap "Bookmark this page" -1. Press (B) once to return to the browser -1. Press (Start) to open the context menu - + If your (Start) button does not respond, tap the 3-line menu on the bottom-right corner of the screen -1. Tap on "Settings" -1. Tap on "Delete Cookies" -1. Press (A) to continue -1. Press (Home) to return to the HOME Menu, then immediately press (A) to launch the browser again -1. Select the "GO GO!" button on the top screen - + If any prompts appear, approve all of them - + If your console freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your console freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section - + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/id_ID/include/fredtool-prep.txt b/_pages/id_ID/include/fredtool-prep.txt deleted file mode 100644 index bd910b24de..0000000000 --- a/_pages/id_ID/include/fredtool-prep.txt +++ /dev/null @@ -1,29 +0,0 @@ -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Insert your SD card into your computer -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} \ No newline at end of file diff --git a/_pages/id_ID/include/hbl-common-exploits-movable.txt b/_pages/id_ID/include/hbl-common-exploits-movable.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/id_ID/include/hbl-common-exploits-movable.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/id_ID/include/hbl-common-exploits.txt b/_pages/id_ID/include/hbl-common-exploits.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/id_ID/include/hbl-common-exploits.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/id_ID/installing-boot9strap-(fredtool).txt b/_pages/id_ID/installing-boot9strap-(fredtool).txt deleted file mode 100644 index a06a1259f2..0000000000 --- a/_pages/id_ID/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer](seedminer) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/id_ID/installing-boot9strap-(fredtool-legacy).txt b/_pages/id_ID/installing-boot9strap-(fredtool-legacy).txt deleted file mode 100644 index 7e88fb51b4..0000000000 --- a/_pages/id_ID/installing-boot9strap-(fredtool-legacy).txt +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool, Legacy)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. - -Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/id_ID/installing-boot9strap-(frogtool).txt b/_pages/id_ID/installing-boot9strap-(frogtool).txt deleted file mode 100644 index 063799fcc6..0000000000 --- a/_pages/id_ID/installing-boot9strap-(frogtool).txt +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Installing boot9strap (Frogtool)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see "DSiWare_Exports CTCert verification" and "FIRM partitions known-plaintext" [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - - -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) link for `frogcert.bin` on this page, you will need a torrent client like [qBittorrent](https://www.qbittorrent.org/download.php) or [Deluge](http://dev.deluge-torrent.org/wiki/Download). -{: .notice--warning} - -### What You Need - -* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link) -* The latest release of [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (direct download) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Copy `boot.nds` (b9sTool) from the b9sTool release `.zip` to the root of your SD card -1. Create a folder named `3ds` on the root of your SD card if it does not already exist - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy the `Frogtool` folder from the Frogtool-nimhax `.zip` to the `/3ds/` folder on your SD card -1. Copy `frogcert.bin` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section III - Patching DS Download Play - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch Frogtool from the list of homebrew -1. Select the "INJECT patched DS Download Play" option -1. Frogtool will automatically run and inject the JPN version of Flipnote Studio into your DS Download Play -1. Once this operation has finished, read the screens and check if the process was successful -1. Tap the touch screen, then select "BOOT patched DS Download Play" -1. If the exploit was successful, your console will have loaded the JPN version of Flipnote Studio - + If you get stuck on a black screen, follow [this](https://wiki.hacks.guide/wiki/3DS:TWLFix#Userland_(PicHaxx,_Steelhax,_etc.)-0) page, then try again - -#### Section IV - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsdlp" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Download Play - -1. Launch the Download Play application -1. Wait until you see the two buttons - + Do not press either of the buttons -1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu -1. Select "Miscellaneous options" -1. Select "Switch the hb. title to the current app." -1. Press (B) to continue -1. Press (B) to return to the Rosalina main menu -1. Press (B) to exit the Rosalina menu -1. Press (Home), then close Download Play -1. Relaunch the Download Play application -1. Your console should load the Homebrew Launcher -1. Launch Frogtool from the list of homebrew -1. Select the "RESTORE clean DS Download Play" option -1. Once this operation has finished, read the screens and check if the process was successful - + If there are any errors or missing files, correct the problem and try again -1. If the process was successful, tap the touch screen, then press START to exit -1. Power off your console - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/id_ID/installing-boot9strap-(hbl-usm).txt b/_pages/id_ID/installing-boot9strap-(hbl-usm).txt deleted file mode 100644 index de8dad596a..0000000000 --- a/_pages/id_ID/installing-boot9strap-(hbl-usm).txt +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "Installing boot9strap (HBL-USM)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--danger} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) (direct download) - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. Then, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Insert your SD card into your computer -1. Create a folder named `boot9strap` on the root of your SD card -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the RELEASE `.zip` to the `/boot9strap/` folder on your SD card -1. Create a folder named `3ds` on the root of your SD card if it does not already exist - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy `slotTool.3dsx` from the `slotTool` folder inside the RELEASE `.zip` to the `/3ds/` folder on your SD card -1. Copy `usm.bin` from the RELEASE `.zip` to the root folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch slotTool from the list of homebrew - + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section -1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option - + You will see some on-screen text and then your system will shut down - -![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section III - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section IV - Restoring WiFi Configuration Profiles - -{% include_relative include/remove-usm-slottool.txt %} - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/id_ID/installing-boot9strap-(usm).txt b/_pages/id_ID/installing-boot9strap-(usm).txt deleted file mode 100644 index 9dcede6ffe..0000000000 --- a/_pages/id_ID/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: "Installing boot9strap (USM)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. - -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--warning} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* [usm.bin](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) - - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. - -1. Your SD card should be inserted in your computer -1. Copy `usm.bin` to the root of your SD card -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Create a folder named `boot9strap` on the root of your SD card -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card - -![]({{ "/images/screenshots/usm/usm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If the BB3 multihax menu doesn't open, [follow this troubleshooting guide](troubleshooting#bannerbomb3) - + If the BB3 multihax menu says "cfw installed already", you already have custom firmware and should continue from [here](checking-for-cfw) -1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" - + Your console will automatically power off -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Internet Settings` -> `Connection Settings` -1. Ensure that all three connections are named "Haaaaaaaxxxxxxxxx..." - + Do NOT change these settings! - + If all three connections are NOT all named "Haaaaaaaxxxxxxxxx...", STOP! Something went wrong in this section and MUST be fixed before you can continue -1. Power off your console - -#### Section III - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section IV - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section V - Restoring WiFi Configuration Profiles - -In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. - -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" - + Your console will automatically reboot -1. Power off your console -1. Insert your SD card into your computer -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/it_IT/dumping-movable-(nimhax).txt b/_pages/it_IT/dumping-movable-(nimhax).txt deleted file mode 100644 index 670a9640ff..0000000000 --- a/_pages/it_IT/dumping-movable-(nimhax).txt +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: Dump di Movable (nimhax)" ---- - -{% include toc title="Indice" %} - -{% capture technical_info %} -Dettagli Tecnici (opzionale) - -Per installare boot9strap nella tua console, ne ricaviamo la sua univoca chiave di cifratura. A questo scopo, utilizziamo l'Homebrew Launcher per avviare nimhax e scaricare la chiave di crittografia dei dati (movable.sed) dalla tua console. - -Per una spiegazione più tecnica, vedi [qui](https://github.com/luigoalma/nimhax/) per informazioni sull'exploit nimhax. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Cosa serve - -* L'ultima versione di [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (il file `.zip` di nimhax) - -### Istruzioni - -#### Sezione I - Preparazione - -1. Spegni la tua console -1. Inserisci la scheda SD nel tuo computer -1. Copia la cartella `nimhax` dall'archivio `.zip` di nimhax nella cartella `/3ds/` della tua scheda SD -1. Reinserisci la scheda SD nella tua console -1. Accendi la tua console - -![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) -{: .notice--info} - -#### Sezione II - nimhax - -1. Avvia l'Homebrew Launcher attraverso il tuo metodo preferito (probabilmente il Browser Internet) -1. Avvia nimhax dalla lista degli homebrew disponibili -1. Se l'exploit ha avuto successo, apparirà un file `movable.sed` nella directory principale della tua scheda SD - -### Passo successivo: Frogtool - -Una volta ottenuta la chiave di crittografia della tua console (`movable.sed`), puoi usarla in combinazione con Frogtool, che utilizza il tuo file `movable.sed` per iniettare e sfruttare delle falle nell'applicazione JPN Flipnote Studio. \ -Anche se è il metodo più rapido, richiede il download di un file con un client torrent. Non seguire questo metodo se non sei in grado di utilizzare un client torrent. - -Prosegui con [l'installazione di boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--primary} diff --git a/_pages/it_IT/homebrew-launcher-(freakyhax).txt b/_pages/it_IT/homebrew-launcher-(freakyhax).txt deleted file mode 100644 index d3b6a186b5..0000000000 --- a/_pages/it_IT/homebrew-launcher-(freakyhax).txt +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: "Homebrew Launcher (freakyhax)" ---- - -{% include toc title="Indice" %} - -{% capture technical_info %} -Dettagli Tecnici (opzionale) -[freakyhax](https://plutooo.github.io/freakyhax/) è un exploit per il gioco Freakyforms Deluxe scoperto e rilasciato da [plutooo](https://github.com/plutooo). Funziona sulle versioni da 9.0.0 a 11.17.0 su console EUR, USA e JPN. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -Questo metodo richiede una fotocamera 3DS funzionante. -{: .notice--info} - -### Cosa serve - -+ Una copia EUR/USA/JPN di Freakyforms Deluxe (da eShop o scheda di gioco) -+ L'ultima versione di [freakyhax](https://github.com/plutooo/freakyhax/releases/latest) -* L'ultima versione di [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (il file `.zip` di Luma3DS) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (download diretto) - -### Istruzioni - -#### Sezione I - Preparazione - -1. Spegni la tua console -1. Inserisci la scheda SD nel tuo computer -1. Copia tutti i file e le cartelle all'interno della cartella `/build//exploit/` dall'archivio `.zip` di freakyhax nella directory principale della tua scheda SD - + La directory principale della scheda SD è la cartella della tua scheda SD in cui è possibile visualizzare la cartella Nintendo 3DS, ma non il suo interno -1. Copia il file di payload otherapp per il modello/regione/versione dall'archivio `otherapps.zip` nella directory principale della tua scheda SD, quindi rinomina il payload in `otherapp.bin` - + Non aggiungere l'estensione `.bin` se non la vedi presente -1. Copia i file `boot.firm` e `boot.3dsx` dall'archivio `.zip` di Luma3DS nella directory principale della tua scheda SD -1. Reinserisci la scheda SD nella tua console -1. Accendi la tua console - -#### Sezione II - freakyhax - -1. Reinserisci la scheda SD nella tua console -1. Accendi la tua console -1. Avvia Freakyforms Deluxe -1. Nel menu di gioco, seleziona `Play -> Camera -> Load a QR code` -1. Seleziona il codice QR -1. Se l'exploit ha avuto successo, la tua console avrà avviato l'Homebrew Launcher -1. Spegni la tua console - -#### Sezione III - Verifica Pulsanti Hardware - -In questa sezione controllerai se la tua console può accedere alla Modalità Provvisoria. Serve per determinare quale metodo seguirai nella prossima pagina. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/it_IT/homebrew-launcher-(ninjhax2-dx).txt b/_pages/it_IT/homebrew-launcher-(ninjhax2-dx).txt deleted file mode 100644 index 06a2e7eebf..0000000000 --- a/_pages/it_IT/homebrew-launcher-(ninjhax2-dx).txt +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "Homebrew Launcher (ninjhax2-dx)" ---- - -{% include toc title="Indice" %} - -{% capture technical_info %} -Dettagli Tecnici (opzionale) -[Ninjhax2](https://github.com/smealum/ninjhax2.x) è un exploit per il gioco "Cubic Ninja" realizzato da [smealum](https://github.com/smealum). Questa pagina utilizza una versione aggiornata di ninjhax di [zoogie](https://github.com/zoogie) chiamata [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx), che supporta la versione 11.17.0. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -Questo metodo richiede una fotocamera 3DS funzionante. -{: .notice--info} - -Questo processo sovrascriverà il tuo file di salvataggio per Cubic Ninja, se ne hai uno. -{: .notice--warning} - -### Cosa serve -* Il gioco "Cubic Ninja" -* L'ultima versione di [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx/releases) -* L'ultima versione di [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (il file `.zip` di Luma3DS) - -### Istruzioni - -#### Sezione I - Preparazione - -1. Spegni la tua console -1. Inserisci la scheda SD nel tuo computer -1. Copia il file `Launcher.dat` dalla cartella appropriata per la console dall'archivio `.zip` di ninjhax2-dx nella directory principale della tua scheda SD - + La directory principale della scheda SD è la cartella della tua scheda SD in cui è possibile visualizzare la cartella Nintendo 3DS, ma non il suo interno -1. Copia i file `boot.firm` e `boot.3dsx` dall'archivio `.zip` di Luma3DS nella directory principale della tua scheda SD - -#### Sezione II - ninjhax2-dx -1. Reinserisci la scheda SD nella tua console -1. Accendi la tua console -1. Lancia "Cubic Ninja" la prima volta e seleziona "Crea" - + Se richiesto, elimina tutto i dati -1. Seleziona "QR Code" -1. Seleziona "Scansiona QR Code" -1. Sul tuo PC, apri il browser e vai al [sito web di ninjhax2-dx](https://zoogie.github.io/web/nh2dx/) -1. Seleziona la regione e l'hardware della tua console -1. Sulla tua console, scansiona il codice QR - + Se il gioco esce al menu HOME, l'exploit è stato installato correttamente -1. Avvia nuovamente "Cubic Ninja" -1. Se l'exploit ha avuto successo, la tua console avrà avviato l'Homebrew Launcher -1. Spegni la tua console - -#### Sezione III - Verifica Pulsanti Hardware - -In questa sezione controllerai se la tua console può accedere alla Modalità Provvisoria. Serve per determinare quale metodo seguirai nella prossima pagina. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/it_IT/homebrew-launcher-(pichaxx).txt b/_pages/it_IT/homebrew-launcher-(pichaxx).txt deleted file mode 100644 index 1bd6eebc84..0000000000 --- a/_pages/it_IT/homebrew-launcher-(pichaxx).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (PicHaxx)" ---- - -{% include toc title="Indice" %} - -{% capture technical_info %} -Dettagli Tecnici (opzionale) -[PicHaxx](https://github.com/zoogie/pichaxx) è un exploit per il gioco Pokémon Picross rilasciato da [zoogie](https://github.com/zoogie), originariamente scoperto e [dimostrato](https://twitter.com/mrnbayoh/status/744899681663258624) da [MrNbaYoh](https://github.com/MrNbaYoh). - -Questo metodo usa Seedminer per servirsi ulteriormente del tuo file `movable.sed` e scrivere un file di salvataggio personalizzato per Pokémon Picross, che può essere utilizzato per avviare l'Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -Questo processo sovrascriverà il tuo file di salvataggio per Pokémon Picross, se ne hai uno. Se desideri conservare i tuoi dati di gioco Pokémon Picross, dovresti fare un backup del tuo file `00000001.sav` prima di sovrascriverlo. -{: .notice--warning} - -### Cosa serve - -+ Il gioco "Pokémon Picross" installato sulla tua console - + Se lo hai già scaricato in passato, puoi [riscaricarlo](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + La scheda SD deve essere inserita nella console per poter installare Pokémon Picross -+ Il tuo file `movable.sed` dalla sezione [Seedminer](seedminer-(alternate)) -+ L'ultima versione di [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (il file `.zip` di Luma3DS) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (download diretto) - - -### Istruzioni - -#### Sezione I - Preparazione - -In questa sezione copierai alcuni dei file che verranno utilizzati per avviare l'Homebrew Launcher. - -1. Spegni la tua console -1. Inserisci la scheda SD nel tuo computer -1. Copia i file `boot.firm` e `boot.3dsx` dall'archivio `.zip` di Luma3DS nella directory principale della tua scheda SD - + La directory principale della scheda SD è la cartella della tua scheda SD in cui è possibile visualizzare la cartella Nintendo 3DS, ma non il suo interno -1. Copia il file di payload otherapp per il modello/regione/versione dall'archivio `otherapps.zip` nella directory principale della tua scheda SD, quindi rinomina il payload in `otherapp.bin` - + Non aggiungere l'estensione `.bin` se non la vedi presente -1. Copia il file `movable.sed` dal tuo computer nella directory principale della tua scheda SD - -![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Sezione II - PicHaxx - -In questa sezione creerai un file di salvataggio modificato per Pokémon Picross che, una volta caricato, avvierà l'Homebrew Launcher nella tua console. - -1. Apri [il sito di PicHaxx Injector](https://3dstools.nhnarwhal.com/#/pichaxx) sul tuo computer -1. Seleziona il tuo file `movable.sed` -1. Seleziona "Build and Download" -1. Attendi il termine del processo -1. Nella tua scheda SD, entra nella cartella `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `0017c100` -> `data` - + Questo `` sarà lo stesso che hai utilizzato in Seedminer - + `` è una cartella dal nome lungo 32 caratteri all'interno di `` -1. Copia il file `00000001.sav` appena scaricato nella cartella `data` della tua scheda SD - + Sovrascrivi il salvataggio precedente quando richiesto - - ![]({{ "/images/screenshots/pichaxx-save-location.png" | absolute_url }}) - {: .notice--info} - -1. Reinserisci la scheda SD nella tua console -1. Accendi la tua console -1. Avvia "Pokémon Picross" -1. Se l'exploit ha avuto successo, la tua console avrà avviato l'Homebrew Launcher - + Se ottieni un messaggio di errore, [segui questa guida per risolvere il problema](troubleshooting#homebrew-launcher-pichaxx) -1. Spegni la tua console - -#### Sezione III - Verifica Pulsanti Hardware - -In questa sezione controllerai se la tua console può accedere alla Modalità Provvisoria. Serve per determinare quale metodo seguirai nella prossima pagina. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/it_IT/homebrew-launcher-(smilehax-iie).txt b/_pages/it_IT/homebrew-launcher-(smilehax-iie).txt deleted file mode 100644 index 28bc9b645d..0000000000 --- a/_pages/it_IT/homebrew-launcher-(smilehax-iie).txt +++ /dev/null @@ -1,70 +0,0 @@ ---- -title: "Homebrew Launcher (smilehax-IIe)" ---- - -{% include toc title="Indice" %} - -Questa guida non supporta la versione Giapponese di SmileBASIC. -{: .notice--warning} - -{% capture technical_info %} -Dettagli Tecnici (opzionale) -[smilehax-IIe](https://github.com/zoogie/smilehax-IIe) è un exploit per il gioco "SmileBASIC" realizzato da zoogie, compatibile con le versioni di sistema da 9.0.0 a 11.17.0 per le console USA/EUR/JPN. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Cosa serve -+ Il gioco "SmileBASIC" installato sulla tua console - + Se lo hai già scaricato in passato, puoi [riscaricarlo](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + La scheda SD deve essere inserita nella console per poter installare SmileBASIC -+ L'ultima versione di [smilehax-IIe](https://github.com/zoogie/smilehax-IIe/releases/download/v1.1/Release_sh2e_v1.1.zip) (download diretto) -+ L'ultima versione di [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (il file `.zip` di Luma3DS) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (download diretto) - - -### Istruzioni - -#### Sezione I - Preparazione - -1. Spegni la tua console -1. Inserisci la scheda SD nel tuo computer -1. Copia i file `boot.firm` e `boot.3dsx` dall'archivio `.zip` di Luma3DS nella directory principale della tua scheda SD - + La directory principale della scheda SD è la cartella della tua scheda SD in cui è possibile visualizzare la cartella Nintendo 3DS, ma non il suo interno -1. Copia il file di payload otherapp per il modello/regione/versione dall'archivio `otherapps.zip` nella directory principale della tua scheda SD, quindi rinomina il payload in `otherapp.bin` - + Non aggiungere l'estensione `.bin` se non la vedi presente -1. Trasferisci il file `.wav` per la tua regione dall'archivio `.zip` di Release_sh2e a un dispositivo in grado di riprodurre i file `.wav`, ad esempio un telefono -1. Copia il file petitcom `.icn` per la tua regione nella directory principale della tua scheda SD - -#### Sezione II - smilehax - -1. Avvia SmileBASIC - + Aggiorna il gioco se richiesto -1. Seleziona l'opzione "Publish/Download Projects" -1. Seleziona l'opzione "Download (Receive) using Public Key" -1. Premi il pulsante "Yes" -1. Inserisci la Public Key "NJEQK3A4" usando la tastiera a schermo -1. Premi il pulsante "Sì" per confermare il download di PMODEM141 -1. Premi "OK", poi "Back", poi "Browse Projects" -1. Seleziona PMODEM141, quindi premi "Select File" -1. Seleziona PMODEM141.PRG, premi "OK", quindi "Yes" per eseguirlo -1. Seleziona RECEIVE FILE SIMPLEX -1. Prepara il dispositivo per riprodurre il file `.wav` -1. Mantieni la tua console a 30cm dall'altoparlante del dispositivo che usi per riprodurre il file `.wav` e usa un volume ragionevole (non alto) per riprodurlo -1. Ora seleziona 300BPS, quindi riproduci il file `.wav` -1. Al termine, premi "Yes", quindi premi "OK" -1. Premi il tasto START -1. Seleziona il file SH2E-xxx.TXT, premi OK, quindi "YES" per eseguirlo - + Se ritorni al menu, assicurati di usare l'ultima versione di SmileBASIC -1. Se l'exploit ha avuto successo, la tua console avrà avviato l'Homebrew Launcher -1. Spegni la tua console - -#### Sezione III - Verifica Pulsanti Hardware - -In questa sezione controllerai se la tua console può accedere alla Modalità Provvisoria. Serve per determinare quale metodo seguirai nella prossima pagina. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/it_IT/homebrew-launcher-(steelhax).txt b/_pages/it_IT/homebrew-launcher-(steelhax).txt deleted file mode 100644 index ca3533fd74..0000000000 --- a/_pages/it_IT/homebrew-launcher-(steelhax).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (Steelhax)" ---- - -{% include toc title="Indice" %} - -{% capture technical_info %} -Dettagli Tecnici (opzionale) -Questo metodo usa Seedminer per servirsi ulteriormente del tuo file `movable.sed` e scrivere un file di salvataggio personalizzato per Steel Diver: Sub Wars, che può essere utilizzato per avviare l'Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -Questo processo sovrascriverà il tuo file di salvataggio per Steel Diver: Sub Wars, se ne hai uno. Se desideri conservare i tuoi dati di gioco Steel Diver: Sub Wars, dovresti fare un backup del tuo file `00000001.sav` prima di sovrascriverlo. -{: .notice--warning} - -### Cosa serve - -+ Il gioco "Steel Diver: Sub Wars" installato sulla tua console - + Se lo hai già scaricato in passato, puoi [riscaricarlo](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + La scheda SD deve essere inserita nella console per poter installare Steel Diver: Sub Wars -+ Il tuo file `movable.sed` dalla sezione [Seedminer](seedminer-(alternate)) -+ L'ultima versione di [Steelhax](/assets/steelhax-release.zip) (download diretto) -+ L'ultima versione di [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (il file `.zip` di Luma3DS) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (download diretto) - -### Istruzioni - -#### Sezione I - Preparazione - -In questa sezione copierai alcuni dei file che verranno utilizzati per avviare l'Homebrew Launcher. - -1. Spegni la tua console -1. Inserisci la scheda SD nel tuo computer -1. Copia i file `boot.firm` e `boot.3dsx` dall'archivio `.zip` di Luma3DS nella directory principale della tua scheda SD - + La directory principale della scheda SD è la cartella della tua scheda SD in cui è possibile visualizzare la cartella Nintendo 3DS, ma non il suo interno -1. Copia la cartella `steelhax` presente nell'archivio `Steelhax-release.zip` nella directory principale della tua scheda SD -1. Copia il file di payload otherapp per il modello/regione/versione dall'archivio `otherapps.zip` nella directory principale della tua scheda SD, quindi rinomina il payload in `otherapp.bin` - + Non aggiungere l'estensione `.bin` se non la vedi presente -1. Copia il file `movable.sed` dal tuo computer nella directory principale della tua scheda SD -1. Reinserisci la scheda SD nella tua console -1. Accendi la tua console - -#### Sezione II - Steelminer - -In questa sezione creerai un file di salvataggio modificato per Steel Diver: Sub Wars che, una volta utilizzato, caricherà l'Homebrew Launcher nella tua console. - -1. Avvia "Steel Diver: Sub Wars" e seleziona un Mii per inizializzare il salvataggio - + Rifiuta l'aggiornamento di gioco quando richiesto - + Se hai già aggiornato il gioco, rimuovi l'aggiornamento tramite il menu Gestione dati nelle Impostazioni della console -1. Chiudi "Steel Diver: Sub Wars" -1. Spegni la tua console -1. Inserisci la scheda SD nel tuo computer -1. Apri [il sito web di SteelHax Save Tool](https://3dstools.nhnarwhal.com/#/steelhax) sul tuo computer -1. Seleziona il tuo file `movable.sed` -1. Seleziona la regione in base alla tua console -1. Seleziona "Build and Download" -1. Attendi il termine del processo -1. Nella tua scheda SD, entra nella cartella `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `` -> `data` - + **Regione EUR**: `000d7e00` - + **Regione JPN**: `000d7c00` - + **Regione USA**: `000d7d00` -1. Copia il file `00000001.sav` appena scaricato nella cartella `data` della tua scheda SD - + Sovrascrivi il salvataggio precedente quando richiesto -1. Reinserisci la scheda SD nella tua console -1. Accendi la tua console -1. Avvia "Steel Diver: Sub Wars" -1. Se l'exploit ha avuto successo, la tua console avrà avviato l'Homebrew Launcher -1. Spegni la tua console - -#### Sezione III - Verifica Pulsanti Hardware - -In questa sezione controllerai se la tua console può accedere alla Modalità Provvisoria. Serve per determinare quale metodo seguirai nella prossima pagina. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/it_IT/homebrew-launcher-(super-skaterhax).txt b/_pages/it_IT/homebrew-launcher-(super-skaterhax).txt deleted file mode 100644 index fca5e94a86..0000000000 --- a/_pages/it_IT/homebrew-launcher-(super-skaterhax).txt +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: "Homebrew Launcher (super-skaterhax)" ---- - -{% include toc title="Indice" %} - -{% capture technical_info %} -Dettagli Tecnici (opzionale) -Per i dettagli tecnici sugli exploit che utilizzerai in questa pagina, vedi [qui](https://github.com/zoogie/super-skaterhax). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Note di Compatibilità - -Super-skaterhax (quando utilizzato per avviare l'Homebrew Launcher) è compatibile con i modelli New alla versione 11.16.0 di tutte le regioni, e 11.17.0 per le regioni EUR, JPN e USA. - -Le istruzioni indicate si applicano solo a New 3DS, New 3DS XL e New 2DS XL. Assicurati che la console che stai modificando sia un New 3DS, New 3DS XL, o un New 2DS XL prima di continuare. -{: .notice--warning} - -### Cosa serve - -* L'ultima versione di [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (il file `.zip` di Luma3DS) -* L'ultima versione di [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (il file `.zip` della release) - -#### Sezione I - Preparazione - -In questa sezione copierai i file necessari per attivare sia super-skaterhax che l'Homebrew Launcher. - -1. Spegni la tua console -1. Inserisci la scheda SD nel tuo computer -1. Copia i file `boot.firm` e `boot.3dsx` dall'archivio `.zip` di Luma3DS nella directory principale della tua scheda SD - + La directory principale della scheda SD è la cartella della tua scheda SD in cui è possibile visualizzare la cartella Nintendo 3DS, ma non il suo interno -1. Copia tutto il contenuto della cartella per la regione della tua console (e anche della versione di sistema in caso di USA) dell'archivio `.zip` di super-skaterhax nella directory principale della tua scheda SD -1. Reinserisci la scheda SD nella tua console -1. Accendi la tua console - -![]({{ "/images/screenshots/skater-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Sezione II - super-skaterhax - -In questa sezione visiterai la pagina web dell'exploit del browser, che avvierà l'Homebrew Launcher. - -Se non l'hai già fatto, assicurati di avere una connessione Internet funzionante configurata sulla tua console. -{: .notice--info} - -1. Nel menu HOME, premi contemporaneamente i pulsanti dorsali L e R per avviare la fotocamera - + Se non riesci ad aprire la fotocamera, apri il browser Internet e digita manualmente l'URL (`https://zoogie.github.io/web/super/` per EUR/USA/JPN, `https://zoogie.github.io/web/korea` per KOR) -1. Tocca il pulsante "codice QR" e scansiona uno dei seguenti codici QR per la regione della tua console [qui](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png) - + Se visualizzi un avviso riguardo un certificato di sicurezza, premi (A) per consentire la connessione -1. Premi il pulsante (Select) per aprire la pagina dei segnalibri - + Se il pulsante (Select) non funziona, tocca l'icona della stella nell'angolo in basso a sinistra dello schermo -1. Tocca "Aggiungi ai preferiti" -1. Premi (B) una volta per ritornare al browser -1. Premi (Start) per aprire il menu contestuale - + Se il pulsante (Start) non funziona, tocca il pulsante con 3 linee nell'angolo in basso a destra dello schermo -1. Tocca su "Impostazioni" -1. Tocca su "Elimina cookie" -1. Premi il pulsante (A) per continuare -1. Premi (Home) per tornare al menu HOME e premi subito (A) per avviare nuovamente il browser -1. Seleziona il pulsante "GO GO!" nella schermata superiore - + Se vengono visualizzate delle richieste, approvale tutte - + Se la tua console si blocca con una schermata gialla, tieni premuto il pulsante POWER finché non si spegne, quindi riprova questa sezione - + Se la tua console si blocca con una schermata rossa, tieni premuto il pulsante POWER finché non si spegne, riprova il passo 3 della Sezione II, quindi riprova questa sezione - + Se ottieni un altro errore riprova altre 5 volte, e se continua a non funzionare [segui questa guida per risolvere il problema](troubleshooting#homebrew-launcher-super-skaterhax) -1. Se l'exploit ha avuto successo, la tua console avrà avviato l'Homebrew Launcher -1. Spegni la tua console - -#### Sezione III - Verifica Pulsanti Hardware - -In questa sezione controllerai se la tua console può accedere alla Modalità Provvisoria. Serve per determinare quale metodo seguirai nella prossima pagina. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/it_IT/include/fredtool-prep.txt b/_pages/it_IT/include/fredtool-prep.txt deleted file mode 100644 index 2bb304ec06..0000000000 --- a/_pages/it_IT/include/fredtool-prep.txt +++ /dev/null @@ -1,29 +0,0 @@ -In questa sezione copierai i file necessari per sostituire temporaneamente "Impostazioni di collegamento" con Flipnote Studio, usato per lanciare l'installer di boot9strap (custom firmware). - -1. Inserisci la scheda SD nel tuo computer -1. Apri il sito [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) sul tuo computer -1. Sotto il campo "Username" inserisci un nome alfanumerico qualunque (senza spazi o caratteri speciali) -1. Sul il campo "DSiBin", carica il tuo file backup DSiWare (ad esempio 42383841.bin) presente nella directory principale della tua scheda SD usando la prima opzione "Browse..." -1. Sul campo "MovableSed", carica il tuo file `movable.sed` usando la seconda opzione "Browse..." -1. Sul campo "InjectionTarget", imposta l'obiettivo dell'iniezione su `DSinternet` (NON memorypit) -1. Clicca "Build" - + Attendi qualche secondo che termini il processo di compilazione -1. Nella sezione "Build History" a sinistra, inserisci l'Username nel campo "Filter Builds" -1. Clicca sul primo risultato della ricerca - + Dovrebbe avere la data più recente -1. Clicca il link "output_(name).zip" -1. Nella tua scheda SD, entra in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` - + `` è il nome a 32 lettere della cartella che hai copiato in [Seedminer](seedminer) - + `` è una cartella dal nome lungo 32 caratteri all'interno di `` -1. Elimina il file `F0D43D5.bin` dalla cartella Nintendo DSiWare -1. Copia il file `42383841.bin` dalla cartella `hax` dall'archivio DSiWare appena scaricato (`output_(name).zip`) nella cartella `Nintendo DSiWare` - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copia i file `boot.firm` e `boot.3dsx` dall'archivio `.zip` di Luma3DS nella directory principale della tua scheda SD - + La directory principale della scheda SD è la cartella della tua scheda SD in cui è possibile visualizzare la cartella Nintendo 3DS, ma non il suo interno -1. Copia il file `boot.nds` (B9STool) dall'archivio `.zip` di b9sTool nella directory principale della tua scheda SD -1. Copia la cartella `private` presente nell'archivio `.zip` di Frogminer_save nella directory principale della tua scheda SD -1. Reinserisci la scheda SD nella tua console -1. Accendi la tua console - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} \ No newline at end of file diff --git a/_pages/it_IT/include/hbl-common-exploits-movable.txt b/_pages/it_IT/include/hbl-common-exploits-movable.txt deleted file mode 100644 index 52f2d336fa..0000000000 --- a/_pages/it_IT/include/hbl-common-exploits-movable.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Passaggio successivo: Scelta di un exploit - -Se è apparsa la fotocamera nella sezione precedente, la tua console ha la Modalità Provvisoria probabilmente funzionante. - -Se è apparsa la fotocamera, prosegui con [Installazione di boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -Se la fotocamera NON è apparsa, prosegui con [Installazione di boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/it_IT/include/hbl-common-exploits.txt b/_pages/it_IT/include/hbl-common-exploits.txt deleted file mode 100644 index 52f2d336fa..0000000000 --- a/_pages/it_IT/include/hbl-common-exploits.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Passaggio successivo: Scelta di un exploit - -Se è apparsa la fotocamera nella sezione precedente, la tua console ha la Modalità Provvisoria probabilmente funzionante. - -Se è apparsa la fotocamera, prosegui con [Installazione di boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -Se la fotocamera NON è apparsa, prosegui con [Installazione di boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/it_IT/installing-boot9strap-(fredtool).txt b/_pages/it_IT/installing-boot9strap-(fredtool).txt deleted file mode 100644 index f64de437ce..0000000000 --- a/_pages/it_IT/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: "Installazione di boot9strap (Fredtool)" ---- - -{% include toc title="Indice" %} - -{% capture technical_info %} -Dettagli Tecnici (opzionale) - -Seedminer utilizza il tuo file `movable.sed` per decriptare un qualunque titolo DSiWare per iniettare una particolare applicazione DSiWare nell'applicazione Connessioni Nintendo DS. - -Questa è un'implementazione funzionante dell'exploit del "testo in chiaro noto nelle partizioni FIRM" spiegato [qui](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -Dovresti essere arrivato a questa pagina solo se esegui la versione 11.16.0. Se hai una versione del software diversa da 11.17.0 o 11.16.0, FERMATI SUBITO poiché queste istruzioni BRICKERANNO LA TUA CONSOLE con altri firmware!! -{: .notice--warning} - -### Cosa serve - -* Il tuo file `movable.sed` dalla sezione [Seedminer](seedminer) -* L'ultima versione di [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **Utenti con 11.16.0 o 11.17.0**: La versione v6.1.1 di [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (download diretto) -* L'ultima versione di [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (il file `.zip` di Luma3DS) - -#### Sezione I - Controllo del CFW - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Sezione II - BannerBomb3 - -In questa sezione attiverai l'exploit BannerBomb3 utilizzando il menu Gestione Nintendo DSiWare e copierai il file dump risultante sul computer per poterlo utilizzare nella sezione successiva. - -1. Reinserisci la scheda SD nella tua console -1. Accendi la tua console -1. Avvia le Impostazioni di sistema sulla tua console -1. Entra in `Gestione dati` -> `DSiWare` -> `Scheda SD` ([image](/images/screenshots/bb3/dsiware-management.png)) - + La tua console dovrebbe mostrare il menu BB3 multihax - + Se questo passaggio causa il crash della tua console, [segui questa guida per risolvere il problema](troubleshooting#installing-boot9strap-fredtool) -1. Usa il D-Pad per spostarti sul menu "Dump DSiWare", quindi premi il pulsante (A) - + La tua console si riavvierà automaticamente -1. Spegni la tua console - -#### Sezione III - Preparazione - -{% include_relative include/fredtool-prep.txt %} - -#### Sezione IV - Sovrascrittura delle Impostazioni di collegamento DS - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Sezione V - Exploit Flipnote - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Sezione VI - Configurazione di Luma3DS - -1. Premi (Select) e accendi la tua console continuando a tenerlo premuto -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Sezione VII - Ripristino delle Impostazioni di Connessione DS - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Prosegui con il [Completamento dell'installazione](finalizing-setup) -{: .notice--primary} diff --git a/_pages/it_IT/installing-boot9strap-(fredtool-legacy).txt b/_pages/it_IT/installing-boot9strap-(fredtool-legacy).txt deleted file mode 100644 index 9898983f27..0000000000 --- a/_pages/it_IT/installing-boot9strap-(fredtool-legacy).txt +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: "Installazione di boot9strap (Fredtool, Legacy)" ---- - -{% include toc title="Indice" %} - -{% capture technical_info %} -Dettagli Tecnici (opzionale) - -Per eseguire un dump dei DSiWare di sistema, approfittiamo di una falla di sicurezza nella sezione Gestione Nintendo DSiWare dell'applicazione Impostazioni della console. - -Per realizzare l'obiettivo, utilizziamo la chiave di cifratura della tua console (movable.sed) per generare un backup DSiWare che induce la console a creare un dump dell'applicazione Impostazioni Internet DSi nella directory principale della scheda SD. - -Una volta ottenuto un backup DSiWare, possiamo iniettarlo nell'applicazione Connessioni Nintendo DS. - -Questa è un'implementazione funzionante dell'exploit del "testo in chiaro noto nelle partizioni FIRM" spiegato [qui](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -Dovresti essere arrivato a questa pagina solo se esegui la versione 11.15.0 o 11.14.0. Se hai una versione del software diversa da 11.15.0 o 11.14.0, FERMATI SUBITO poiché queste istruzioni BRICKERANNO LA TUA CONSOLE con altri firmware!! -{: .notice--warning} - -### Cosa serve - -* Il tuo file `movable.sed` dalla sezione [Seedminer (Mii)](seedminer-(mii)) -* L'ultima versione di [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **Solo utenti con 11.15.0 o 11.14.0**: La versione v6.0.1 di [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (download diretto) -* L'ultima versione di [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (il file `.zip` di Luma3DS) - -#### Sezione I - Controllo del CFW - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Sezione II - BannerBomb3 - -In questa sezione attiverai l'exploit BannerBomb3 utilizzando il menu Gestione Nintendo DSiWare e copierai il file dump risultante sul computer per poterlo utilizzare nella sezione successiva. - -1. Reinserisci la scheda SD nella tua console -1. Accendi la tua console -1. Avvia le Impostazioni di sistema sulla tua console -1. Entra in `Gestione dati` -> `DSiWare` -> `Scheda SD` ([image](/images/screenshots/bb3/dsiware-management.png)) - + La tua console dovrebbe mostrare il menu BB3 multihax - + Se questo passaggio causa il crash della tua console, [segui questa guida per risolvere il problema](troubleshooting#installing-boot9strap-fredtool) -1. Usa il D-Pad per spostarti sul menu "Dump DSiWare", quindi premi il pulsante (A) - + La tua console si riavvierà automaticamente -1. Spegni la tua console - -#### Sezione III - Preparazione - -{% include_relative include/fredtool-prep.txt %} - -#### Sezione IV - Sovrascrittura delle Impostazioni di collegamento DS - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Sezione V - Exploit Flipnote - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Sezione VI - Configurazione di Luma3DS - -1. Premi (Select) e accendi la tua console continuando a tenerlo premuto -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Sezione VII - Ripristino delle Impostazioni di Connessione DS - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Prosegui con il [Completamento dell'installazione](finalizing-setup) -{: .notice--primary} diff --git a/_pages/it_IT/installing-boot9strap-(frogtool).txt b/_pages/it_IT/installing-boot9strap-(frogtool).txt deleted file mode 100644 index 408049fd82..0000000000 --- a/_pages/it_IT/installing-boot9strap-(frogtool).txt +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Installazione di boot9strap (Frogtool)" ---- - -{% include toc title="Indice" %} - -{% capture technical_info %} -Dettagli Tecnici (opzionale) -Per dettagli tecnici sugli exploit che utilizzerai in questa pagina, consulta "DSiWare_Exports CTCert verification" e "FIRM partitions known-plaintext" [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - - -Per usare i link [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) per il file `frogcert.bin` di questa guida avrai bisogno di un client torrent come [qBittorrent](https://www.qbittorrent.org/download.php) o [Deluge](http://dev.deluge-torrent.org/wiki/Download). -{: .notice--warning} - -### Cosa serve - -* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link) -* The latest release of [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (direct download) -* L'ultima versione di [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) - -#### Sezione I - Controllo del CFW - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Sezione II - Preparazione - -1. Spegni la tua console -1. Inserisci la scheda SD nel tuo computer -1. Copia i file `boot.firm` e `boot.3dsx` dall'archivio `.zip` di Luma3DS nella directory principale della tua scheda SD -1. Copia `boot.nds` (b9sTool) dall'archivio `.zip` di b9sTool nella directory principale della tua scheda SD -1. Se assente, crea una cartella chiamata `3ds` nella directory principale della tua scheda SD - + Questa cartella mantiene le applicazioni homebrew e i loro dati; è diversa dalla cartella `Nintendo 3DS` generata automaticamente dalla console -1. Copy the `Frogtool` folder from the Frogtool-nimhax `.zip` to the `/3ds/` folder on your SD card -1. Copia il file `frogcert.bin` nella directory principale della tua scheda SD -1. Reinserisci la scheda SD nella tua console -1. Accendi la tua console - -#### Sezione III - Patch della Modalità Download DS - -1. Avvia l'Homebrew Launcher attraverso il tuo metodo preferito (probabilmente il Browser Internet) -1. Avvia Frogtool dalla lista degli homebrew disponibili -1. Seleziona l'opzione "INJECT patched DS Download Play" -1. Frogtool verrà eseguito automaticamente e inietterà la versione JPN di Flipnote Studio nell'applicazione "Modalità download" -1. Al termine dell'operazione, leggi lo schermo e controlla l'effettivo successo dell'operazione -1. Tocca il touch screen, quindi seleziona "BOOT patched DS Download Play" -1. Se l'exploit ha avuto successo, la tua console avrà caricato la versione JPN di Flipnote Studio - + If you get stuck on a black screen, follow [this](https://wiki.hacks.guide/wiki/3DS:TWLFix#Userland_(PicHaxx,_Steelhax,_etc.)-0) page, then try again - -#### Sezione IV - Exploit Flipnote - -{% include_relative include/install-boot9strap-b9stool.txt method="dsdlp" %} - -#### Sezione VI - Configurazione di Luma3DS - -1. Premi (Select) e accendi la tua console continuando a tenerlo premuto -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Sezione VII - Ripristino della Modalità Download DS - -1. Avvia l'applicazione "Modalità download" -1. Attendi finché non vedrai i due pulsanti - + Non premere alcun pulsante -1. Premi simultaneamente i pulsanti (L) + (Giù) + (Select) per aprire il menu di Rosalina -1. Seleziona "Miscellaneous options" -1. Seleziona "Switch the hb. title to the current app." -1. Premi (B) per continuare -1. Premi (B) per tornare al menu principale di Rosalina -1. Premi (B) per uscire dal menu di Rosalina -1. Premi il pulsante HOME, quindi chiudi l'applicazione "Modalità download" -1. Riavvia l'applicazione "Modalità download" -1. La console dovrebbe ora avviare l'Homebrew Launcher -1. Avvia Frogtool dalla lista degli homebrew disponibili -1. Seleziona l'opzione "RESTORE clean DS Download Play" -1. Al termine dell'operazione, leggi lo schermo e controlla l'effettivo successo dell'operazione - + Se dovesse essersi verificato qualche errore, o se mancano dei file, correggi il problema e riprova -1. Se il processo è andato a buon fine, tocca il touch screen, quindi premi START per uscire -1. Spegni la tua console - -___ - -### Prosegui con il [Completamento dell'installazione](finalizing-setup) -{: .notice--primary} diff --git a/_pages/it_IT/installing-boot9strap-(hbl-usm).txt b/_pages/it_IT/installing-boot9strap-(hbl-usm).txt deleted file mode 100644 index 9d4880c474..0000000000 --- a/_pages/it_IT/installing-boot9strap-(hbl-usm).txt +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "Installazione di boot9strap (HBL-USM)" ---- - -{% include toc title="Indice" %} - -{% capture technical_info %} -Dettagli Tecnici (opzionale) - -Per sfruttare il firmware SAFE_MODE del nostro sistema, dobbiamo iniettare un profilo di connessione WiFi modificato. - -Poiché abbiamo già accesso agli Homebrew, possiamo approfittare di slotTool. - -Una volta inserito il profilo WiFi utilizzeremo SAFE_MODE, una funzionalità di ripristino presente su ogni console 3DS, per attivare il profilo WiFi modificato. - -Per una spiegazione più tecnica, vedi [qui](https://github.com/zoogie/unSAFE_MODE/) per informazioni sull'exploit unSAFE_MODE. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Note di Compatibilità - -Se i tuoi pulsanti (L/R), (Su) o (A) non funzionano, unisciti a [Nintendo Homebrew su Discord](https://discord.gg/MWxPgEp) e chiedi, in inglese, una mano. -{: .notice--danger} - -### Cosa serve - -* L'ultima versione di [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (download diretto) -* L'ultima versione di [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) (download diretto) - -#### Sezione I - Preparazione - -In questa sezione copierai i file necessari per attivare l'exploit unSAFE_MODE nella scheda SD della tua console. Successivamente userai l'Homebrew Launcher per avviare slotTool, che sovrascriverà le tue impostazioni Wi-Fi con dati modificati. Le tue impostazioni Wi-Fi rimarranno temporaneamente sovrascritte finché l'exploit sarà attivo. - -1. Inserisci la scheda SD nel tuo computer -1. Crea una cartella chiamata `boot9strap` nella directory principale della tua scheda SD -1. Copia i file `boot9strap.firm` e `boot9strap.firm.sha` dall'archivio RELEASE `.zip` nella cartella `/boot9strap/` della tua scheda SD -1. Se assente, crea una cartella chiamata `3ds` nella directory principale della tua scheda SD - + Questa cartella mantiene le applicazioni homebrew e i loro dati; è diversa dalla cartella `Nintendo 3DS` generata automaticamente dalla console -1. Copia il file `slotTool.3dsx` dalla cartella `slotTool` all'interno dell'archivio RELEASE `.zip` nella cartella `/3ds/` della tua scheda SD -1. Copia il file `usm.bin` dall'archivio RELEASE `.zip` nella directory principale della tua scheda SD -1. Copia il file `SafeB9SInstaller.bin` dall'archivio `.zip` di SafeB9SInstaller nella directory principale della tua scheda SD -1. Reinserisci la scheda SD nella tua console -1. Accendi la tua console -1. Avvia l'Homebrew Launcher attraverso il tuo metodo preferito (probabilmente il Browser Internet) -1. Avvia slotTool dalla lista degli homebrew disponibili - + Se rimani bloccato su una schermata rossa, spegni forzatamente la console tenendo premuto il pulsante di accensione per quindici secondi, quindi ritenta questa sezione -1. Seleziona l'opzione "INSTALL exploit to wifi slots 1,2,3 & shutdown" - + Apparirà del testo a schermo, dopodiché la console si spegnerà - -![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Sezione II - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Sezione III - Installazione di boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Sezione IV - Ripristino dei Profili di Connessione WiFi - -{% include_relative include/remove-usm-slottool.txt %} - -___ - -### Prosegui con il [Completamento dell'installazione](finalizing-setup) -{: .notice--primary} diff --git a/_pages/it_IT/installing-boot9strap-(usm).txt b/_pages/it_IT/installing-boot9strap-(usm).txt deleted file mode 100644 index afc244592d..0000000000 --- a/_pages/it_IT/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: "Installazione di boot9strap (USM)" ---- - -{% include toc title="Indice" %} - -{% capture technical_info %} -Dettagli Tecnici (opzionale) - -Per sfruttare il firmware SAFE_MODE del nostro sistema, dobbiamo iniettare un profilo di connessione WiFi modificato. - -Lo faremo utilizzando un exploit già esistente, BannerBomb3. - -Per realizzare l'obiettivo, utilizziamo la chiave di cifratura della tua console (movable.sed) per generare un backup DSiWare che induce la console a iniettare il profilo WiFi modificato nella tua lista di connessioni disponibili. - -Una volta inserito il profilo WiFi utilizzeremo SAFE_MODE, una funzionalità di ripristino presente su ogni console 3DS, per attivare il profilo WiFi modificato. - -Per una spiegazione più tecnica, consulta i seguenti link per informazioni sugli exploit BannerBomb3 e unSAFE_MODE: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Note di Compatibilità - -Queste istruzioni funzionano su console americane, europee, giapponesi e coreane, indicate rispettivamente dalle lettere U, E, J o K dopo la versione del sistema operativo. - -Se i tuoi pulsanti (L/R), (Su) o (A) non funzionano, dovrai usare [una versione alternativa di Seedminer](installing-boot9strap-(fredtool)). In questi casi, puoi ricevere assistenza chiedendo, in inglese, nel [canale Discord di Nintendo Homebrew](https://discord.gg/MWxPgEp). -{: .notice--warning} - -### Cosa serve - -* L'ultima versione di [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (download diretto) -* L'ultima versione di [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (download diretto) -* L'ultima versione di [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (il file `.zip` di Luma3DS) -* [usm.bin](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (download diretto) - - -#### Sezione I - Preparazione - -In questa sezione copierai i file necessari per attivare l'exploit unSAFE_MODE nella scheda SD della tua console. - -1. La tua scheda SD dovrebbe essere inserita nel tuo computer -1. Copia il file `usm.bin` nella directory principale della tua scheda SD -1. Copia i file `boot.firm` e `boot.3dsx` dall'archivio `.zip` di Luma3DS nella directory principale della tua scheda SD - + La directory principale della scheda SD è la cartella della tua scheda SD in cui è possibile visualizzare la cartella Nintendo 3DS, ma non il suo interno -1. Crea una cartella chiamata `boot9strap` nella directory principale della tua scheda SD -1. Copia i file `boot9strap.firm` e `boot9strap.firm.sha` dall'archivio `.zip` di boot9strap nella cartella `/boot9strap/` della tua scheda SD -1. Copia il file `SafeB9SInstaller.bin` dall'archivio `.zip` di SafeB9SInstaller nella directory principale della tua scheda SD - -![]({{ "/images/screenshots/usm/usm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Sezione II - BannerBomb3 - -In questa sezione attiverai l'exploit BannerBomb3 utilizzando il menu Gestione Nintendo DSiWare, che può essere utilizzato per sovrascrivere le tue configurazioni Wi-Fi con dati modificati. Le tue impostazioni Wi-Fi rimarranno temporaneamente sovrascritte finché l'exploit sarà attivo. - -1. Reinserisci la scheda SD nella tua console -1. Accendi la tua console -1. Avvia le Impostazioni di sistema sulla tua console -1. Entra in `Gestione dati` -> `DSiWare` -> `Scheda SD` ([image](/images/screenshots/bb3/dsiware-management.png)) - + La tua console dovrebbe mostrare il menu BB3 multihax - + Se il menu BB3 multihax non si apre, [segui questa guida per risolvere il problema](troubleshooting#bannerbomb3) - + Se il menu BB3 multihax visualizza il messaggio "cfw installed already", significa che hai già un custom firmware installato e dovresti continuare da [qui](checking-for-cfw) -1. Usa il D-Pad per spostarti sul menu "Install unSAFE_MODE", quindi premi il pulsante (A) - + La tua console si spegnerà automaticamente -1. Accendi la tua console -1. Avvia le Impostazioni di sistema sulla tua console -1. Entra in `Impostazioni Internet` -> `Impostazioni di collegamento` -1. Assicurati che tutte e tre le connessioni siano denominate "Haaaaaaaxxxxxxxxx..." - + NON modificare queste impostazioni! - + Se non tutte e tre le connessioni sono denominate "Haaaaaaaxxxxxxxxx...", FERMATI! Qualcosa è andato storto in questa sezione e DEVE essere risolto prima di poter continuare -1. Spegni la tua console - -#### Sezione III - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Sezione IV - Installazione di boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Sezione V - Ripristino dei Profili di Connessione WiFi - -In questa sezione avvierai l'exploit BannerBomb3 una seconda volta per ripristinare le configurazioni Wi-Fi sovrascritte nella Sezione II. - -1. Avvia le Impostazioni di sistema sulla tua console -1. Entra in `Gestione dati` -> `DSiWare` -> `Scheda SD` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Usa il D-Pad per spostarti sul menu "Uninstall unSAFE_MODE", quindi premi il pulsante (A) - + La tua console si riavvierà automaticamente -1. Spegni la tua console -1. Inserisci la scheda SD nel tuo computer -1. Nella tua scheda SD, entra in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` -1. Elimina il file `F0D43D5.bin` dalla cartella Nintendo DSiWare e dal tuo computer. Questo file non sarà più necessario - -___ - -### Prosegui con il [Completamento dell'installazione](finalizing-setup) -{: .notice--primary} diff --git a/_pages/ja_JP/dumping-movable-(nimhax).txt b/_pages/ja_JP/dumping-movable-(nimhax).txt deleted file mode 100644 index f664d3bc78..0000000000 --- a/_pages/ja_JP/dumping-movable-(nimhax).txt +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: "Dumping Movable (nimhax)" ---- - -{% include toc title="目次" %} - -{% capture technical_info %} -Technical Details (optional) - -To install boot9strap on your console, we derive your console's unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console. - -For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### 必要なもの - -* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file) - -### 手順 - -#### セクション I - 準備 - -1. Power off your console -1. パソコンにSDカードを入れます -1. Copy the `nimhax` folder from the nimhax `.zip` to the `/3ds/` folder on your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) -{: .notice--info} - -#### Section II - nimhax - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch nimhax from the list of homebrew -1. If the exploit was successful, a `movable.sed` file will appear on the root of your SD card - -### Next step: Frogtool - -Once you have your console's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \ -While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you're unable to use a torrent client. - -Continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--primary} diff --git a/_pages/ja_JP/homebrew-launcher-(freakyhax).txt b/_pages/ja_JP/homebrew-launcher-(freakyhax).txt deleted file mode 100644 index 09e407eb77..0000000000 --- a/_pages/ja_JP/homebrew-launcher-(freakyhax).txt +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: "Homebrew Launcher (freakyhax)" ---- - -{% include toc title="目次" %} - -{% capture technical_info %} -Technical Details (optional) -[freakyhax](https://plutooo.github.io/freakyhax/) is an exploit for the game Freakyforms Deluxe discovered and released by [plutooo](https://github.com/plutooo). It works on versions 9.0.0 through 11.17.0 on EUR, USA and JPN region consoles. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -### 必要なもの - -+ A EUR/USA/JPN copy of Freakyforms Deluxe (eShop or cartridge) -+ The latest release of [freakyhax](https://github.com/plutooo/freakyhax/releases/latest) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### 手順 - -#### セクション I - 準備 - -1. Power off your console -1. パソコンにSDカードを入れます -1. Copy all files and folders inside the `/build//exploit/` folder from the freakyhax `.zip` to the root of your SD card - + SDカードのルートとは、Nintendo 3DSのフォルダなどがある最初の項目のことであり、フォルダの中ではありません。 -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. `boot.firm` と `boot.3dsx` をLuma3DSの `.zip` からSDカードのルートにコピーします -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - freakyhax - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch Freakyforms Deluxe -1. In the game menu, select `Play -> Camera -> Load a QR code` -1. Select the QR code -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/ja_JP/homebrew-launcher-(ninjhax2-dx).txt b/_pages/ja_JP/homebrew-launcher-(ninjhax2-dx).txt deleted file mode 100644 index c9845d5310..0000000000 --- a/_pages/ja_JP/homebrew-launcher-(ninjhax2-dx).txt +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "Homebrew Launcher (ninjhax2-dx)" ---- - -{% include toc title="目次" %} - -{% capture technical_info %} -Technical Details (optional) -[Ninjhax2](https://github.com/smealum/ninjhax2.x) is an exploit for the game "Cubic Ninja" made by [smealum](https://github.com/smealum). This page uses an updated version of ninjhax by [zoogie](https://github.com/zoogie) called [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx), which supports 11.17.0. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -This process will overwrite your Cubic Ninja save file, if you have one. -{: .notice--warning} - -### 必要なもの -* The game "Cubic Ninja" -* The latest release of [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx/releases) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -### 手順 - -#### セクション I - 準備 - -1. Power off your console -1. パソコンにSDカードを入れます -1. Copy `Launcher.dat` from the folder appropriate for your console from the ninjhax2-dx `.zip` file to the root of your SD card - + SDカードのルートとは、Nintendo 3DSのフォルダなどがある最初の項目のことであり、フォルダの中ではありません。 -1. `boot.firm` と `boot.3dsx` をLuma3DSの `.zip` からSDカードのルートにコピーします - -#### Section II - ninjhax2-dx -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Cubic Ninja" once and select "Create" - + If prompted, delete all data -1. Select "QR Code" -1. Select "Scan QR Code" -1. On your PC, open the browser and go to [ninjhax2-dx website](https://zoogie.github.io/web/nh2dx/) -1. Select your console's region and hardware -1. On your console, scan the QR code - + If the game exits to the HOME Menu, then the exploit has installed correctly -1. Launch "Cubic Ninja" again -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/ja_JP/homebrew-launcher-(pichaxx).txt b/_pages/ja_JP/homebrew-launcher-(pichaxx).txt deleted file mode 100644 index e49bb01867..0000000000 --- a/_pages/ja_JP/homebrew-launcher-(pichaxx).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (PicHaxx)" ---- - -{% include toc title="目次" %} - -{% capture technical_info %} -Technical Details (optional) -[PicHaxx](https://github.com/zoogie/pichaxx) is an exploit for the game Pokémon Picross released by [zoogie](https://github.com/zoogie), originally discovered and [demonstrated](https://twitter.com/mrnbayoh/status/744899681663258624) by [MrNbaYoh](https://github.com/MrNbaYoh). - -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### 必要なもの - -+ The game "Pokémon Picross" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Pokémon Picross -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### 手順 - -#### セクション I - 準備 - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. パソコンにSDカードを入れます -1. `boot.firm` と `boot.3dsx` をLuma3DSの `.zip` からSDカードのルートにコピーします - + SDカードのルートとは、Nintendo 3DSのフォルダなどがある最初の項目のことであり、フォルダの中ではありません。 -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card - -![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - PicHaxx - -In this section, you will create a hacked Pokémon Picross save file that, when loaded, will run the Homebrew Launcher on your console. - -1. Open [the PicHaxx Injector website](https://3dstools.nhnarwhal.com/#/pichaxx) on your computer -1. Select your `movable.sed` file -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `0017c100` -> `data` on your SD card - + The `` will be the same one that you used in Seedminer - + `` は ` ` の中の32文字の長いフォルダのことです。 -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted - - ![]({{ "/images/screenshots/pichaxx-save-location.png" | absolute_url }}) - {: .notice--info} - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Pokémon Picross" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher - + If you get an error message, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-pichaxx) -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/ja_JP/homebrew-launcher-(smilehax-iie).txt b/_pages/ja_JP/homebrew-launcher-(smilehax-iie).txt deleted file mode 100644 index aea849f046..0000000000 --- a/_pages/ja_JP/homebrew-launcher-(smilehax-iie).txt +++ /dev/null @@ -1,70 +0,0 @@ ---- -title: "Homebrew Launcher (smilehax-IIe)" ---- - -{% include toc title="目次" %} - -This set of instructions does not support the Japanese version of SmileBASIC. -{: .notice--warning} - -{% capture technical_info %} -Technical Details (optional) -[smilehax-IIe](https://github.com/zoogie/smilehax-IIe) is an exploit for the game "SmileBASIC" made by zoogie, compatible with system versions 9.0.0 through 11.17.0 for USA/EUR/JPN region consoles. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### 必要なもの -+ The game "SmileBASIC" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install SmileBASIC -+ The latest release of [smilehax-IIe](https://github.com/zoogie/smilehax-IIe/releases/download/v1.1/Release_sh2e_v1.1.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### 手順 - -#### セクション I - 準備 - -1. Power off your console -1. パソコンにSDカードを入れます -1. `boot.firm` と `boot.3dsx` をLuma3DSの `.zip` からSDカードのルートにコピーします - + SDカードのルートとは、Nintendo 3DSのフォルダなどがある最初の項目のことであり、フォルダの中ではありません。 -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Transfer the `.wav` for your region from the Release_sh2e `.zip` to a device that can play `.wav` files, for example a phone -1. Copy the petitcom `.icn` for your region to the root of your SD card - -#### Section II - smilehax - -1. Launch SmileBASIC - + Update the game if prompted -1. Select the "Publish/Download Projects" option -1. Select the "Download (Receive) using Public Key" option -1. Press the "Yes" button -1. Enter the Public Key "NJEQK3A4" using the on-screen keyboard -1. Press the "Yes" button to confirm the download of PMODEM141 -1. Press "OK", then "Back", then "Browse Projects" -1. Select PMODEM141, then press "Select File" -1. Select PMODEM141.PRG, then press "OK", then "Yes" to execute it -1. Select RECEIVE FILE SIMPLEX -1. Prepare the device you use to play the `.wav` file -1. Keep your console about a foot from the `.wav` file playing devices' speaker and use a reasonable (not loud) volume to play the `.wav` -1. Now select 300BPS, then play the `.wav` file -1. When it finishes, press "Yes", then press "OK" -1. Press the START button -1. Select the SH2E-xxx.TXT file, then press OK, then "Yes" to execute it - + If you get kicked back into menu, make sure you're using the latest version of SmileBASIC -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/ja_JP/homebrew-launcher-(steelhax).txt b/_pages/ja_JP/homebrew-launcher-(steelhax).txt deleted file mode 100644 index c21e60d058..0000000000 --- a/_pages/ja_JP/homebrew-launcher-(steelhax).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (Steelhax)" ---- - -{% include toc title="目次" %} - -{% capture technical_info %} -Technical Details (optional) -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Steel Diver: Sub Wars, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Steel Diver: Sub Wars save file, if you have one. If you wish to preserve your Steel Diver: Sub Wars game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### 必要なもの - -+ The game "Steel Diver: Sub Wars" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Steel Diver: Sub Wars -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Steelhax](/assets/steelhax-release.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### 手順 - -#### セクション I - 準備 - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. パソコンにSDカードを入れます -1. `boot.firm` と `boot.3dsx` をLuma3DSの `.zip` からSDカードのルートにコピーします - + SDカードのルートとは、Nintendo 3DSのフォルダなどがある最初の項目のことであり、フォルダの中ではありません。 -1. Copy the `steelhax` folder from the `Steelhax-release.zip` to the root of your SD card -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - Steelminer - -In this section, you will create a hacked Steel Diver: Sub Wars save file that, when used, will load the Homebrew Launcher on your console. - -1. Launch "Steel Diver: Sub Wars" once and select a Mii to initialize your save file - + Decline the game update when prompted - + If you have already updated the game, use the Data Management menu of the System Settings to delete the update -1. Exit "Steel Diver: Sub Wars" -1. Power off your console -1. パソコンにSDカードを入れます -1. Open [the SteelHax Save Tool website](https://3dstools.nhnarwhal.com/#/steelhax) on your computer -1. Select your `movable.sed` file -1. Select your region based on your console -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `<8-character-region>` -> `data` on your SD card - + **EUR Region**: `000d7e00` - + **JPN Region**: `000d7c00` - + **USA Region**: `000d7d00` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Steel Diver: Sub Wars" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/ja_JP/homebrew-launcher-(super-skaterhax).txt b/_pages/ja_JP/homebrew-launcher-(super-skaterhax).txt deleted file mode 100644 index af0831fdaa..0000000000 --- a/_pages/ja_JP/homebrew-launcher-(super-skaterhax).txt +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: "Homebrew Launcher (super-skaterhax)" ---- - -{% include toc title="目次" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see [here](https://github.com/zoogie/super-skaterhax). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -Super-skaterhax (when used to launch the Homebrew Launcher) is compatible with New models on version 11.16.0 in all regions, and 11.17.0 in the EUR, JPN and USA regions. - -The instructions provided only apply to the New 3DS, New 3DS XL, and New 2DS XL. Please ensure that the console you are modding is a New 3DS, New 3DS XL, or New 2DS XL before continuing. -{: .notice--warning} - -### 必要なもの - -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* The latest release of [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (the release `.zip` file) - -#### セクション I - 準備 - -In this section, you will copy the files needed to trigger both super-skaterhax and the Homebrew Launcher. - -1. Power off your console -1. パソコンにSDカードを入れます -1. `boot.firm` と `boot.3dsx` をLuma3DSの `.zip` からSDカードのルートにコピーします - + SDカードのルートとは、Nintendo 3DSのフォルダなどがある最初の項目のことであり、フォルダの中ではありません。 -1. Copy everything inside the folder for your console's region (and also system version if the region is USA) in the super-skaterhax `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/skater-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - super-skaterhax - -In this section, you will visit the browser exploit webpage, which will launch the Homebrew Launcher. - -まだ設定していない場合は、本体にインターネット接続を設定してください。 -{: .notice--info} - -1. On the HOME Menu, press the Left and Right shoulder buttons at the same time to open the camera - + If you are unable to open the camera, open the Internet Browser and manually type the URL instead (`https://zoogie.github.io/web/super/` for EUR/USA/JPN, `https://zoogie.github.io/web/korea` for KOR) -1. Tap the QR code button and scan one of the following QR codes for your console's region [here](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png) - + If you get a security certificate warning, press (A) to allow the connection -1. Press the (Select) button to open the bookmark tab - + If your (Select) button does not respond, tap the star icon on the bottom-left corner of the screen -1. Tap "Bookmark this page" -1. Press (B) once to return to the browser -1. Press (Start) to open the context menu - + If your (Start) button does not respond, tap the 3-line menu on the bottom-right corner of the screen -1. Tap on "Settings" -1. Tap on "Delete Cookies" -1. (A) で続行します -1. Press (Home) to return to the HOME Menu, then immediately press (A) to launch the browser again -1. Select the "GO GO!" button on the top screen - + If any prompts appear, approve all of them - + If your console freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your console freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section - + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/ja_JP/include/fredtool-prep.txt b/_pages/ja_JP/include/fredtool-prep.txt deleted file mode 100644 index 8b5a127574..0000000000 --- a/_pages/ja_JP/include/fredtool-prep.txt +++ /dev/null @@ -1,29 +0,0 @@ -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. パソコンにSDカードを入れます -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. SDカードの`Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`へ移動します - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. `boot.firm` と `boot.3dsx` をLuma3DSの `.zip` からSDカードのルートにコピーします - + SDカードのルートとは、Nintendo 3DSのフォルダなどがある最初の項目のことであり、フォルダの中ではありません。 -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Frogminer_save `.zip`から`private`フォルダをSDカードのルートにコピーします -1. Reinsert your SD card into your console -1. Power on your console - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} \ No newline at end of file diff --git a/_pages/ja_JP/include/hbl-common-exploits-movable.txt b/_pages/ja_JP/include/hbl-common-exploits-movable.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/ja_JP/include/hbl-common-exploits-movable.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/ja_JP/include/hbl-common-exploits.txt b/_pages/ja_JP/include/hbl-common-exploits.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/ja_JP/include/hbl-common-exploits.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/ja_JP/installing-boot9strap-(fredtool).txt b/_pages/ja_JP/installing-boot9strap-(fredtool).txt deleted file mode 100644 index 74118ca43b..0000000000 --- a/_pages/ja_JP/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool)" ---- - -{% include toc title="目次" %} - -{% capture technical_info %} -Technical Details (optional) - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### 必要なもの - -* [Seedminer](seedminer) より作成した、 `movable.sed` ファイル -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### セクション II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -[セットアップを完了する](finalizing-setup) へ進みます -{: .notice--primary} diff --git a/_pages/ja_JP/installing-boot9strap-(fredtool-legacy).txt b/_pages/ja_JP/installing-boot9strap-(fredtool-legacy).txt deleted file mode 100644 index 7d5ded5823..0000000000 --- a/_pages/ja_JP/installing-boot9strap-(fredtool-legacy).txt +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool, Legacy)" ---- - -{% include toc title="目次" %} - -{% capture technical_info %} -Technical Details (optional) - -DSiWareシステムをダンプするために、本体設定アプリのDSiWare データ管理画面の脆弱性を使用します。 - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. - -Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### 必要なもの - -* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### セクション II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -[セットアップを完了する](finalizing-setup) へ進みます -{: .notice--primary} diff --git a/_pages/ja_JP/installing-boot9strap-(frogtool).txt b/_pages/ja_JP/installing-boot9strap-(frogtool).txt deleted file mode 100644 index 5a0a66d3eb..0000000000 --- a/_pages/ja_JP/installing-boot9strap-(frogtool).txt +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Installing boot9strap (Frogtool)" ---- - -{% include toc title="目次" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see "DSiWare_Exports CTCert verification" and "FIRM partitions known-plaintext" [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - - -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) link for `frogcert.bin` on this page, you will need a torrent client like [qBittorrent](https://www.qbittorrent.org/download.php) or [Deluge](http://dev.deluge-torrent.org/wiki/Download). -{: .notice--warning} - -### 必要なもの - -* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link) -* The latest release of [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (direct download) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -####セクションⅡ-準備 - -1. Power off your console -1. パソコンにSDカードを入れます -1. `boot.firm` と `boot.3dsx` をLuma3DSの `.zip` からSDカードのルートにコピーします -1. Copy `boot.nds` (b9sTool) from the b9sTool release `.zip` to the root of your SD card -1. SDカードの直下に`3ds`フォルダがない場合、そのフォルダを作成します - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy the `Frogtool` folder from the Frogtool-nimhax `.zip` to the `/3ds/` folder on your SD card -1. Copy `frogcert.bin` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section III - Patching DS Download Play - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch Frogtool from the list of homebrew -1. Select the "INJECT patched DS Download Play" option -1. Frogtool will automatically run and inject the JPN version of Flipnote Studio into your DS Download Play -1. Once this operation has finished, read the screens and check if the process was successful -1. Tap the touch screen, then select "BOOT patched DS Download Play" -1. If the exploit was successful, your console will have loaded the JPN version of Flipnote Studio - + If you get stuck on a black screen, follow [this](https://wiki.hacks.guide/wiki/3DS:TWLFix#Userland_(PicHaxx,_Steelhax,_etc.)-0) page, then try again - -#### Section IV - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsdlp" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Download Play - -1. 再度ダウンロードプレイアプリを開きます。 -1. 画面が表示されるまで待ちます - + Do not press either of the buttons -1. (Lボタン) + (十字キー下) + (Select) を同時に押してRosalina menu を開きます -1. "Miscellaneous options​"を選びます。 -1. "Switch the hb. title to the current app."を選びます。 -1. (B) ボタンで続行します -1. (B) を押してRosalinaメインメニューに戻ります -1. (B) を押してRosalinaメインメニューを終了します。 -1. Homeボタンを押しダウンロードプレイを閉じます。 -1. Relaunch the Download Play application -1. Your console should load the Homebrew Launcher -1. Launch Frogtool from the list of homebrew -1. Select the "RESTORE clean DS Download Play" option -1. Once this operation has finished, read the screens and check if the process was successful - + If there are any errors or missing files, correct the problem and try again -1. If the process was successful, tap the touch screen, then press START to exit -1. Power off your console - -___ - -[セットアップを完了する](finalizing-setup) へ進みます -{: .notice--primary} diff --git a/_pages/ja_JP/installing-boot9strap-(hbl-usm).txt b/_pages/ja_JP/installing-boot9strap-(hbl-usm).txt deleted file mode 100644 index 55bf792e40..0000000000 --- a/_pages/ja_JP/installing-boot9strap-(hbl-usm).txt +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "Installing boot9strap (HBL-USM)" ---- - -{% include toc title="目次" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--danger} - -### 必要なもの - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) (direct download) - -#### セクション I - 準備 - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. Then, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. パソコンにSDカードを入れます -1. `boot9strap`という名前のフォルダをSDカードのルート上に作成します。 -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the RELEASE `.zip` to the `/boot9strap/` folder on your SD card -1. SDカードの直下に`3ds`フォルダがない場合、そのフォルダを作成します - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy `slotTool.3dsx` from the `slotTool` folder inside the RELEASE `.zip` to the `/3ds/` folder on your SD card -1. Copy `usm.bin` from the RELEASE `.zip` to the root folder on your SD card -1. SafeB9SInstaller `.zip` から`SafeB9SInstaller.bin`をSDカードのルートへコピーします -1. Reinsert your SD card into your console -1. Power on your console -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch slotTool from the list of homebrew - + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section -1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option - + You will see some on-screen text and then your system will shut down - -![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### セクション III - boot9strapをインストールする - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section IV - Restoring WiFi Configuration Profiles - -{% include_relative include/remove-usm-slottool.txt %} - -___ - -[セットアップを完了する](finalizing-setup) へ進みます -{: .notice--primary} diff --git a/_pages/ja_JP/installing-boot9strap-(usm).txt b/_pages/ja_JP/installing-boot9strap-(usm).txt deleted file mode 100644 index b55ab5f1b3..0000000000 --- a/_pages/ja_JP/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: "boot9strap(USM) の導入" ---- - -{% include toc title="目次" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -これらのガイドは、システムバージョン末尾にある「U、E、J、K」にあるように、米国、欧州、日本、韓国の端末で機能します。 - -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--warning} - -### 必要なもの - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* [usm.bin](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) - - -#### セクション I - 準備 - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. - -1. Your SD card should be inserted in your computer -1. Copy `usm.bin` to the root of your SD card -1. `boot.firm` と `boot.3dsx` をLuma3DSの `.zip` からSDカードのルートにコピーします - + SDカードのルートとは、Nintendo 3DSのフォルダなどがある最初の項目のことであり、フォルダの中ではありません。 -1. `boot9strap`という名前のフォルダをSDカードのルート上に作成します。 -1. `boot9strap.firm`と`boot9strap.firm.sha`を boot9strap `.zip` ファイルから解凍し、SD カードのboot9strapフォルダにコピーします。 -1. SafeB9SInstaller `.zip` から`SafeB9SInstaller.bin`をSDカードのルートへコピーします - -![]({{ "/images/screenshots/usm/usm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### セクション II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If the BB3 multihax menu doesn't open, [follow this troubleshooting guide](troubleshooting#bannerbomb3) - + If the BB3 multihax menu says "cfw installed already", you already have custom firmware and should continue from [here](checking-for-cfw) -1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" - + Your console will automatically power off -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Internet Settings` -> `Connection Settings` -1. Ensure that all three connections are named "Haaaaaaaxxxxxxxxx..." - + Do NOT change these settings! - + If all three connections are NOT all named "Haaaaaaaxxxxxxxxx...", STOP! Something went wrong in this section and MUST be fixed before you can continue -1. Power off your console - -#### セクション III - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section IV - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section V - Restoring WiFi Configuration Profiles - -In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. - -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" - + Your console will automatically reboot -1. Power off your console -1. パソコンにSDカードを入れます -1. SDカードの`Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`へ移動します -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. このファイルはもう必要ありません。 - -___ - -[セットアップを完了する](finalizing-setup) へ進みます -{: .notice--primary} diff --git a/_pages/ko_KR/dumping-movable-(nimhax).txt b/_pages/ko_KR/dumping-movable-(nimhax).txt deleted file mode 100644 index 750a3b0d68..0000000000 --- a/_pages/ko_KR/dumping-movable-(nimhax).txt +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: "movable.sed 덤프 (nimhax)" ---- - -{% include toc title="목차" %} - -{% capture technical_info %} -기술적 상세 정보 (선택 사항) - -boot9strap을 설치하려면 우선 각 콘솔의 고유 암호화 키를 알아내야 합니다. 이를 위해, Homebrew Launcher를 통해 nimhax를 실행하여 콘솔에서 데이터 암호화 키 (movable.sed)를 덤프하게 됩니다. - -nimhax의 더 자세한 설명은 [여기 (영문)](https://github.com/luigoalma/nimhax/)를 참고해 주세요. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### 준비물 - -* 최신 버전의 [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (nimhax `.zip` 파일) - -### 진행 방법 - -#### 섹션 I - 준비 작업 - -1. 콘솔을 종료해 주세요 -1. SD 카드를 컴퓨터에 삽입해 주세요 -1. nimhax `.zip`안에 있는 `nimhax` 폴더를 SD 카드의 `/3ds/` 폴더에 복사해 주세요 -1. SD 카드를 콘솔에 다시 삽입해 주세요 -1. 콘솔을 시작해 주세요 - -![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) -{: .notice--info} - -#### 섹션 II - nimhax - -1. 아무 방법을 사용해 Homebrew Launcher를 실행해 주세요 (아마 인터넷 브라우저일 겁니다) -1. 홈브류 목록에서 nimhax를 실행해 주세요 -1. 이 취약점이 성공했다면, SD 카드의 루트에 `movable.sed` 파일이 생성됩니다 - -### 다음 단계: Frogtool - -콘솔의 암호화 키 (`movable.sed`)를 구한 후, 이것을 Frogtool과 함께 사용하여, 일본어 Flipnote Studio을 주입해 사용할 것 입니다. \ -이 방법은 조금 더 빠르지만, 파일 다운로드를 위해 torrent 클라이언트가 필요합니다. torrent 클라이언트를 사용할 수 없다면 이 방법을 이용하지 마세요. - -### [boot9strap 설치 (Frogtool)](installing-boot9strap-(frogtool))로 계속합니다 -{: .notice--primary} diff --git a/_pages/ko_KR/homebrew-launcher-(freakyhax).txt b/_pages/ko_KR/homebrew-launcher-(freakyhax).txt deleted file mode 100644 index c677d7c0a9..0000000000 --- a/_pages/ko_KR/homebrew-launcher-(freakyhax).txt +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: "Homebrew Launcher (freakyhax)" ---- - -{% include toc title="목차" %} - -{% capture technical_info %} -기술적 상세 정보 (선택 사항) -[freakyhax](https://plutooo.github.io/freakyhax/)는 [plutooo](https://github.com/plutooo)가 발견하고 작성한 Freakyforms Deluxe 게임의 취약점입니다. EUR, USA 및 JPN 지역 콘솔의 버전 9.0.0 - 11.17.0에서 작동합니다. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -이 방법은 3DS의 카메라가 작동해야 가능합니다. -{: .notice--info} - -### 준비물 - -+ EUR/USA/JPN 버전의 Freakyforms Deluxe (e숍 또는 카트리지) -+ 최신 버전의 [freakyhax](https://github.com/plutooo/freakyhax/releases/latest) -* 최신 버전의 [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (`.zip` 파일) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (직접 다운로드) - -### 진행 방법 - -#### 섹션 I - 준비 작업 - -1. 콘솔의 전원을 꺼 주세요 -1. SD 카드를 컴퓨터에 삽입해 주세요 -1. freakyhax `.zip`에서 `/build/<콘솔 지역과 버전>/exploit/` 폴더 안의 모든 파일과 폴더를 SD 카드의 루트로 복사해 주세요 - + SD 카드의 루트는 SD 카드를 열 때 보이는 디렉토리이고, Nintendo 3DS 폴더가 보이지만 그 안에 들어가 있지 않은 상태의 폴더입니다 -1. 콘솔의 모델/지역/버전에 해당한 otherapp 페이로드를 `otherapps.zip`에서 SD 카드의 루트에 복사하고, 이 파일을 `otherapp.bin`으로 이름을 바꿔 주세요 - + `.bin` 확장자는 보이지 않는 이상 추가하지 말아 주세요 -1. Luma3DS `.zip`안에 있는 `boot.firm`과 `boot.3dsx`를 SD 카드의 루트에 복사해 주세요 -1. SD 카드를 콘솔에 다시 삽입해 주세요 -1. 콘솔의 전원을 켜 주세요 - -#### 섹션 II - freakyhax - -1. SD 카드를 콘솔에 다시 삽입해 주세요 -1. 콘솔의 전원을 켜 주세요 -1. Freakyforms Deluxe를 실행해 주세요 -1. 게임 메뉴에서 `Play -> Camera -> Load a QR code`를 선택해 주세요 -1. QR 코드를 선택해 주세요 -1. 익스플로잇이 성공적이었다면 Homebrew Launcher로 부팅되었을 것입니다 -1. 콘솔의 전원을 꺼 주세요 - -#### 섹션 III - 하드웨어 버튼 작동 확인 - -이 섹션에서는 콘솔의 안전 모드 기능을 사용 할 수 있는지 테스트할 것 입니다. 이 테스트를 통해, 다음 페이지에서 어떤 방법을 취해야 할지 결정할 수 있습니다. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/ko_KR/homebrew-launcher-(ninjhax2-dx).txt b/_pages/ko_KR/homebrew-launcher-(ninjhax2-dx).txt deleted file mode 100644 index 76e40fe72c..0000000000 --- a/_pages/ko_KR/homebrew-launcher-(ninjhax2-dx).txt +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "Homebrew Launcher (ninjhax2-dx)" ---- - -{% include toc title="목차" %} - -{% capture technical_info %} -기술적 상세 정보 (선택 사항) -[Ninjhax2](https://github.com/smealum/ninjhax2.x)는 [smealum](https://github.com/smealum)이 작성한 "Cubic Ninja" 게임의 취약점입니다. 이 페이지는 11.17.0을 지원하는 [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx)라는 [zoogie](https://github.com/zoogie)의 ninjhax 업데이트 버전을 사용합니다. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -이 방법은 3DS의 카메라가 작동해야 가능합니다. -{: .notice--info} - -이 과정은 Cubic Ninja 저장 파일이 있는 경우 덮어쓸 것 입니다. -{: .notice--warning} - -### 준비물 -* "Cubic Ninja" 게임 -* 최신 버젼의 [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx/releases) -* 최신 버전의 [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (`.zip` 파일) - -### 진행 방법 - -#### 섹션 I - 준비 작업 - -1. 콘솔의 전원을 꺼 주세요 -1. SD 카드를 컴퓨터에 삽입해 주세요 -1. ninjhax2-dx `.zip` 안에서 콘솔에 적합한 폴더의 `Launcher.dat`를 SD 카드의 루트로 복사해 주세요 - + SD 카드의 루트는 SD 카드를 열 때 보이는 디렉토리이고, Nintendo 3DS 폴더가 보이지만 그 안에 들어가 있지 않은 상태의 폴더입니다 -1. Luma3DS `.zip`안에 있는 `boot.firm`과 `boot.3dsx`를 SD 카드의 루트에 복사해 주세요 - -#### 섹션 II - ninjhax2-dx -1. SD 카드를 콘솔에 다시 삽입해 주세요 -1. 콘솔의 전원을 켜 주세요 -1. "Cubic Ninja"를 한 번 실행하고 "Create"를 선택해 주세요 - + If prompted, delete all data -1. "QR 코드" 를 선택해 주세요 -1. "Scan QR Code" 를 선택해 주세요 -1. On your PC, open the browser and go to [ninjhax2-dx website](https://zoogie.github.io/web/nh2dx/) -1. Select your console's region and hardware -1. 콘솔에서 QR 코드를 스캔해 주세요 - + 게임이 HOME 메뉴로 종료되면 취약점이 올바르게 설치된 것입니다 -1. "Cubic Ninja" 를 다시 실행해 주세요 -1. 익스플로잇이 성공적이었다면 Homebrew Launcher로 부팅되었을 것입니다 -1. 콘솔의 전원을 꺼 주세요 - -#### 섹션 III - 하드웨어 버튼 작동 확인 - -이 섹션에서는 콘솔의 안전 모드 기능을 사용 할 수 있는지 테스트할 것 입니다. 이 테스트를 통해, 다음 페이지에서 어떤 방법을 취해야 할지 결정할 수 있습니다. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/ko_KR/homebrew-launcher-(pichaxx).txt b/_pages/ko_KR/homebrew-launcher-(pichaxx).txt deleted file mode 100644 index dc5d87f3f0..0000000000 --- a/_pages/ko_KR/homebrew-launcher-(pichaxx).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (PicHaxx)" ---- - -{% include toc title="목차" %} - -{% capture technical_info %} -기술적 상세 정보 (선택 사항) -[PicHaxx](https://github.com/zoogie/pichaxx)는 [MrNbaYoh](https://github.com/MrNbaYoh)가 [발견하고](https://twitter.com/mrnbayoh/status/744899681663258624), [zoogie](https://github.com/zoogie)가 작성한 포켓몬 피크로스 게임의 취약점입니다. - -더 깊은 모딩을 위한 Seedminer의 이 사용법은, 포켓몬 피크로스의 커스텀 세이브 파일을 `movable.sed` 파일을 사용해서 작성해, Homebrew Launcher를 실행하는 방식입니다. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -이 과정은 포켓몬 피크로스의 기존 저장 데이터를 덮어쓸 것입니다. 만약 게임의 저장 데이터를 보존하고 싶으시다면 `00000001.sav` 파일을 백업해 두시는 것을 권장합니다. -{: .notice--warning} - -### 준비물 - -+ 콘솔에 설치된 게임 "포켓몬 피크로스" - + 이 게임을 다운로드 한 적이 있다면, [다시 다운로드](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) 할 수 있습니다 - + 포켓몬 피크로스를 설치하려면 SD 카드가 들어가 있어야 합니다 -* [Seedminer](seedminer-(alternate))에서 받은 `movable.sed` 파일 -+ 최신 버전의 [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (`.zip` 파일) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (직접 다운로드) - - -### 진행 방법 - -#### 섹션 I - 준비 작업 - -이 섹션에서는, Homebrew Launcher를 실행할 파일들을 복사합니다. - -1. 콘솔의 전원을 꺼 주세요 -1. SD 카드를 컴퓨터에 삽입해 주세요 -1. Luma3DS `.zip`안에 있는 `boot.firm`과 `boot.3dsx`를 SD 카드의 루트에 복사해 주세요 - + SD 카드의 루트는 SD 카드를 열 때 보이는 디렉토리이고, Nintendo 3DS 폴더가 보이지만 그 안에 들어가 있지 않은 상태의 폴더입니다 -1. 콘솔의 모델/지역/버전에 해당한 otherapp 페이로드를 `otherapps.zip`에서 SD 카드의 루트에 복사하고, 이 파일을 `otherapp.bin`으로 이름을 바꿔 주세요 - + `.bin` 확장자는 보이지 않는 이상 추가하지 말아 주세요 -1. 'movable.sed' 파일을 SD 카드의 루트에 복사해 주세요 - -![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### 섹션 II - PicHaxx - -이 섹션에서는, 포켓몬 피크로스의 해킹된 저장 파일을 생성하고, 이걸 사용해서 Homebrew Launcher를 실행합니다. - -1. [PicHaxx 인젝터 웹사이트](https://3dstools.nhnarwhal.com/#/pichaxx)를 컴퓨터에서 열어 주세요 -1. `movable.sed` 파일을 선택해 주세요 -1. "Build and Download"를 선택해 주세요 -1. 완료될 때까지 기다려 주세요 -1. SD 카드에서 `Nintendo 3DS` -> `` -> ``-> `title` -> `00040000` -> `0017c100` -> `data` 폴더로 들어가 주세요 - + 이 ``는 Seedminer에서 사용한 것과 같습니다 - + 이 ``은 `` 폴더 안에 존재하는 32 자리의 이름을 갖춘 폴더 입니다 -1. 새로 다운로드한 `00000001.sav` 파일을 `data` 폴더로 복사해 주세요 - + 만약 표시가 된다면, 전 세이브 파일을 덮어쓰세요 - - ![]({{ "/images/screenshots/pichaxx-save-location.png" | absolute_url }}) - {: .notice--info} - -1. SD 카드를 콘솔에 다시 삽입해 주세요 -1. 콘솔의 전원을 켜 주세요 -1. 포켓몬 피크로스 ("Pokémon Picross")를 열어 주세요 -1. 익스플로잇이 성공적이었다면 Homebrew Launcher로 부팅되었을 것입니다 - + 오류가 발생하면 이 [문제 해결 가이드](troubleshooting#homebrew-launcher-pichaxx) 를 참고해 주세요 -1. 콘솔의 전원을 꺼 주세요 - -#### 섹션 III - 하드웨어 버튼 작동 확인 - -이 섹션에서는 콘솔의 안전 모드 기능을 사용 할 수 있는지 테스트할 것 입니다. 이 테스트를 통해, 다음 페이지에서 어떤 방법을 취해야 할지 결정할 수 있습니다. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/ko_KR/homebrew-launcher-(smilehax-iie).txt b/_pages/ko_KR/homebrew-launcher-(smilehax-iie).txt deleted file mode 100644 index 9de6f50542..0000000000 --- a/_pages/ko_KR/homebrew-launcher-(smilehax-iie).txt +++ /dev/null @@ -1,70 +0,0 @@ ---- -title: "Homebrew Launcher (smilehax-IIe)" ---- - -{% include toc title="목차" %} - -이 방법은 일본판 SmileBASIC과 호환되지 않습니다. -{: .notice--warning} - -{% capture technical_info %} -기술적 상세 정보 (선택 사항) -[smilehax-IIe](https://github.com/zoogie/smilehax-IIe) is an exploit for the game "SmileBASIC" made by zoogie, compatible with system versions 9.0.0 through 11.17.0 for USA/EUR/JPN region consoles. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### 준비물 -+ 콘솔에 설치된 게임 "SmileBASIC" - + 이 게임을 다운로드 한 적이 있다면, [다시 다운로드](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) 할 수 있습니다 - + SmileBASIC을 설치하려면 SD 카드가 들어가 있어야 합니다 -+ The latest release of [smilehax-IIe](https://github.com/zoogie/smilehax-IIe/releases/download/v1.1/Release_sh2e_v1.1.zip) (direct download) -+ 최신 버전의 [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (`.zip` 파일) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (직접 다운로드) - - -### 진행 방법 - -#### 섹션 I - 준비 작업 - -1. 콘솔의 전원을 꺼 주세요 -1. SD 카드를 컴퓨터에 삽입해 주세요 -1. Luma3DS `.zip`안에 있는 `boot.firm`과 `boot.3dsx`를 SD 카드의 루트에 복사해 주세요 - + SD 카드의 루트는 SD 카드를 열 때 보이는 디렉토리이고, Nintendo 3DS 폴더가 보이지만 그 안에 들어가 있지 않은 상태의 폴더입니다 -1. 콘솔의 모델/지역/버전에 해당한 otherapp 페이로드를 `otherapps.zip`에서 SD 카드의 루트에 복사하고, 이 파일을 `otherapp.bin`으로 이름을 바꿔 주세요 - + `.bin` 확장자는 보이지 않는 이상 추가하지 말아 주세요 -1. Transfer the `.wav` for your region from the Release_sh2e `.zip` to a device that can play `.wav` files, for example a phone -1. 콘솔의 지역에 해당한 petitcom `.icn` 파일을 SD 카드의 루트에 복사해 주세요 - -#### 섹션 II - smilehax - -1. SmileBASIC을 실행해 주세요 - + 메세지가 표시되면 게임을 업데이트해 주세요 -1. "Publish/Download Projects" 를 선택해 주세요 -1. Select the "Download (Receive) using Public Key" option -1. "Yes" 버튼을 눌러 주세요 -1. Enter the Public Key "NJEQK3A4" using the on-screen keyboard -1. Press the "Yes" button to confirm the download of PMODEM141 -1. Press "OK", then "Back", then "Browse Projects" -1. Select PMODEM141, then press "Select File" -1. Select PMODEM141.PRG, then press "OK", then "Yes" to execute it -1. Select RECEIVE FILE SIMPLEX -1. Prepare the device you use to play the `.wav` file -1. Keep your console about a foot from the `.wav` file playing devices' speaker and use a reasonable (not loud) volume to play the `.wav` -1. Now select 300BPS, then play the `.wav` file -1. When it finishes, press "Yes", then press "OK" -1. START 버튼을 눌러 주세요 -1. Select the SH2E-xxx.TXT file, then press OK, then "Yes" to execute it - + If you get kicked back into menu, make sure you're using the latest version of SmileBASIC -1. 익스플로잇이 성공적이었다면 Homebrew Launcher로 부팅되었을 것입니다 -1. 콘솔의 전원을 꺼 주세요 - -#### 섹션 III - 하드웨어 버튼 작동 확인 - -이 섹션에서는 콘솔의 안전 모드 기능을 사용 할 수 있는지 테스트할 것 입니다. 이 테스트를 통해, 다음 페이지에서 어떤 방법을 취해야 할지 결정할 수 있습니다. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/ko_KR/homebrew-launcher-(steelhax).txt b/_pages/ko_KR/homebrew-launcher-(steelhax).txt deleted file mode 100644 index 6cfd7720b0..0000000000 --- a/_pages/ko_KR/homebrew-launcher-(steelhax).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (Steelhax)" ---- - -{% include toc title="목차" %} - -{% capture technical_info %} -기술적 상세 정보 (선택 사항) -더 깊은 모딩을 위한 Seedminer의 이 사용법은, Steel Diver: Sub Wars의 커스텀 세이브 파일을 `movable.sed` 파일을 사용해서 작성해, Homebrew Launcher를 실행하는 방식입니다. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -이 과정은 Steel Diver: Sub Wars의 기존 저장 데이터를 덮어쓸 것입니다. 만약 게임의 저장 데이터를 보존하고 싶으시다면 `00000001.sav` 파일을 백업해 두시는 것을 권장합니다. -{: .notice--warning} - -### 준비물 - -+콘솔에 설치된 게임 "Steel Diver: Sub Wars" - + 이 게임을 다운로드 한 적이 있다면, [다시 다운로드](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) 할 수 있습니다 - + Steel Diver: Sub Wars를 설치하려면 SD 카드가 들어가 있어야 합니다 -* [Seedminer](seedminer-(alternate))에서 받은 `movable.sed` 파일 -+ 최신 버전의 [Steelhax](/assets/steelhax-release.zip) (직접 다운로드) -+ 최신 버전의 [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (`.zip` 파일) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (직접 다운로드) - -### 진행 방법 - -#### 섹션 I - 준비 작업 - -이 섹션에서는, Homebrew Launcher를 실행할 파일들을 복사합니다. - -1. 콘솔의 전원을 꺼 주세요 -1. SD 카드를 컴퓨터에 삽입해 주세요 -1. Luma3DS `.zip`안에 있는 `boot.firm`과 `boot.3dsx`를 SD 카드의 루트에 복사해 주세요 - + SD 카드의 루트는 SD 카드를 열 때 보이는 디렉토리이고, Nintendo 3DS 폴더가 보이지만 그 안에 들어가 있지 않은 상태의 폴더입니다 -1. `Steelhax-release.zip` 안에 있는 `steelhax` 폴더를 SD 카드의 루트에 복사해 주세요 -1. 콘솔의 모델/지역/버전에 해당한 otherapp 페이로드를 `otherapps.zip`에서 SD 카드의 루트에 복사하고, 이 파일을 `otherapp.bin`으로 이름을 바꿔 주세요 - + `.bin` 확장자는 보이지 않는 이상 추가하지 말아 주세요 -1. 'movable.sed' 파일을 SD 카드의 루트에 복사해 주세요 -1. SD 카드를 콘솔에 다시 삽입해 주세요 -1. 콘솔의 전원을 켜 주세요 - -#### 섹션 II - Steelminer - -이 섹션에서는, Steel Diver: Sub Wars의 해킹된 저장 파일을 생성하고, 이걸 사용해서 Homebrew Launcher를 실행합니다. - -1. Launch "Steel Diver: Sub Wars" once and select a Mii to initialize your save file - + Decline the game update when prompted - + If you have already updated the game, use the Data Management menu of the System Settings to delete the update -1. Exit "Steel Diver: Sub Wars" -1. 콘솔의 전원을 꺼 주세요 -1. SD 카드를 컴퓨터에 삽입해 주세요 -1. [SteelHax 저장 툴 웹사이트](https://3dstools.nhnarwhal.com/#/steelhax)를 컴퓨터에서 열어 주세요 -1. `movable.sed` 파일을 선택해 주세요 -1. Select your region based on your console -1. "Build and Download"를 선택해 주세요 -1. 완료될 때까지 기다려 주세요 -1. SD 카드에서 `Nintendo 3DS` -> `` -> ``-> `title` -> `00040000` -> `<8-글자-지역>` -> `data` 폴더로 들어가 주세요 - + **EUR 지역**: `000d7e00` - + **JPN 지역**: `000d7c00` - + **USA 지역**: `000d7d00` -1. 새로 다운로드한 `00000001.sav` 파일을 `data` 폴더로 복사해 주세요 - + 만약 표시가 된다면, 전 세이브 파일을 덮어쓰세요 -1. SD 카드를 콘솔에 다시 삽입해 주세요 -1. 콘솔의 전원을 켜 주세요 -1. "Steel Diver: Sub Wars" 를 실행해 주세요 -1. 익스플로잇이 성공적이었다면 Homebrew Launcher로 부팅되었을 것입니다 -1. 콘솔의 전원을 꺼 주세요 - -#### 섹션 III - 하드웨어 버튼 작동 확인 - -이 섹션에서는 콘솔의 안전 모드 기능을 사용 할 수 있는지 테스트할 것 입니다. 이 테스트를 통해, 다음 페이지에서 어떤 방법을 취해야 할지 결정할 수 있습니다. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/ko_KR/homebrew-launcher-(super-skaterhax).txt b/_pages/ko_KR/homebrew-launcher-(super-skaterhax).txt deleted file mode 100644 index 6db99d61c6..0000000000 --- a/_pages/ko_KR/homebrew-launcher-(super-skaterhax).txt +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: "Homebrew Launcher (super-skaterhax)" ---- - -{% include toc title="목차" %} - -{% capture technical_info %} -기술적 상세 정보 (선택 사항) -이 페이지에 사용되는 익스플로잇에 자세한 설명은 [여기](https://github.com/zoogie/super-skaterhax)를 참고해 주세요. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### 호환성 안내 - -(Homebrew Launcher를 실행하기 위해 활용되는) super-skaterhax는 모든 지역에서의 11.16.0 버전과 EUR, JPN, USA 지역의 11.17.0 버전(해당 버전은 여기에 언급된 지역에만 배포되었습니다)에 호환됩니다. - -여기에서 제공하는 방법은 New 3DS, New 3DS XL, New 2DS XL에만 적용됩니다. 해킹되는 콘솔이 New 3DS, New 3DS XL, 또는 New 2DS XL이 맞는지 확인 하고 진행하시길 바랍니다. -{: .notice--warning} - -### 준비물 - -* 최신 버전의 [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (`.zip` 파일) -* 최신 버전의 [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (release `.zip` 파일) - -#### 섹션 I - 준비 작업 - -이 섹션에서 super-skaterhax하고 Homebrew Launcher를 실행할 파일을 복사합니다. - -1. 콘솔의 전원을 꺼 주세요 -1. SD 카드를 컴퓨터에 삽입해 주세요 -1. Luma3DS `.zip`안에 있는 `boot.firm`과 `boot.3dsx`를 SD 카드의 루트에 복사해 주세요 - + SD 카드의 루트는 SD 카드를 열 때 보이는 디렉토리이고, Nintendo 3DS 폴더가 보이지만 그 안에 들어가 있지 않은 상태의 폴더입니다 -1. super-skaterhax `.zip`에서 콘솔의 지역(EUR, JPN, USA의 경우 버전까지)이 일치하는 폴더의 내용물을 SD 카드의 루트에 모두 복사하세요 -1. SD 카드를 콘솔에 다시 삽입해 주세요 -1. 콘솔의 전원을 켜 주세요 - -![]({{ "/images/screenshots/skater-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### 섹션 II - super-skaterhax - -이 섹션에서는, 브라우저 취약점을 이용하는 웹사이트에 접속해 Homebrew Launcher를 실행합니다. - -아직 안하셨다면, 콘솔을 인터넷에 연결해 주세요. -{: .notice--info} - -1. HOME 메뉴에서 L, R 버튼을 동시에 눌러 카메라를 열어 주세요 - + 카메라를 열 수 없다면, 인터넷 브라우저를 열어 URL을 직접 입력해주세요 (EUR/USA/JPN의 경우 `https://zoogie.github.io/web/super/`, KOR의 경우 `https://zoogie.github.io/web/korea`). -1. QR 코드 버튼을 터치해, [여기](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png)에서 콘솔의 지역에 맞는 QR 코드를 스캔해주세요 - + 보안 인증서 경고가 표시되면, (A)를 눌러 연결을 허용하세요 -1. (Select) 버튼을 눌러 북마크 탭을 열어주세요 - + (Select) 버튼이 동작하지 않는다면, 화면 왼쪽 아래에 있는 별 아이콘을 눌러주세요 -1. "즐겨찾기에 추가" 를 선택해 주세요 -1. (B)를 눌러 브라우저로 돌아가 주세요 -1. (Start) 를 눌러 브라우저 메뉴를 열어 주세요 - + If your (Start) button does not respond, tap the 3-line menu on the bottom-right corner of the screen -1. "설정"을 선택해 주세요 -1. "쿠키 삭제"를 선택해 주세요 -1. (A)를 눌러 진행해 주세요 -1. (Home) 을 눌러 HOME 메뉴로 돌아간 다음 바로 (A) 를 눌러 브라우저를 다시 실행해 주세요 -1. 위 화면에 "GO GO!" 버튼을 선택해 주세요 - + If any prompts appear, approve all of them - + 만약 콘솔에 노란 화면이 표시되면, 전원 버튼을 길게 눌러 콘솔의 전원을 끄고, 이 섹션을 다시 시도해 주세요 - + 만약 콘솔이 적색 화면에서 멈추는 경우, 전원 버튼을 길게 눌러 콘솔의 전원을 끄고, 섹션 II의 3단계를 다시 실행한 다음, 이 섹션을 다시 시도해 주세요 - + 또 다른 오류가 발생하면 최대 5회까지 다시 시도하고, 여전히 작동하지 않으면 [이 문제 해결 가이드를 따라 주세요](troubleshooting#homebrew-launcher-super-skaterhax) -1. 익스플로잇이 성공적이었다면 Homebrew Launcher로 부팅되었을 것입니다 -1. 콘솔의 전원을 꺼 주세요 - -#### 섹션 III - 하드웨어 버튼 작동 확인 - -이 섹션에서는 콘솔의 안전 모드 기능을 사용 할 수 있는지 테스트할 것 입니다. 이 테스트를 통해, 다음 페이지에서 어떤 방법을 취해야 할지 결정할 수 있습니다. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/ko_KR/include/fredtool-prep.txt b/_pages/ko_KR/include/fredtool-prep.txt deleted file mode 100644 index 75b17041cf..0000000000 --- a/_pages/ko_KR/include/fredtool-prep.txt +++ /dev/null @@ -1,29 +0,0 @@ -이 섹션에서는, boot9strap (커스텀 펌웨어) 설치 도구를 실행할 수 있는 Flipnote Studio를 DS 소프트웨어용 설정에 덮어씌울수 있도록 필요한 파일을 복사합니다. - -1. SD 카드를 컴퓨터에 삽입해 주세요 -1. 컴퓨터에서 [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) 웹사이트를 열어 주세요 -1. "Username"에 영어/숫자를 사용한 이름을 아무거나 입력해 주세요 (스페이스나 특수 문자는 사용 불가) -1. "DSiBin" 란에, "Browse..."옵션을 이용해 `42383841.bin`과 같은 DSiWare 백업 파일을 업로드해 주세요 -1. "MovableSed" 란에, "Browse..." 옵션을 이용해 `movable.sed` 파일을 업로드해 주세요 -1. "InjectionTarget" 란에서, 주입 목표를 `DSinternet`(memorypit 아님)로 설정해 주세요 -1. "Build"를 클릭해 주세요 - + 빌드 과정이 완료될 때까지 잠시 기다려 주세요 -1. 왼쪽의 Build History 영역에 유저네임을 입력해 주세요 -1. 첫 번째 검색 결과를 선택해 주세요 - + 날짜가 가장 최신이어야 합니다 -1. "output_(name).zip" 링크를 클릭하여 다운로드해 주세요 -1. SD 카드의 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 폴더로 이동해 주세요 - + ``은 [Seedminer](seedminer)에서 복사한 32글자 폴더명 입니다 - + ``은 `` 안에 있는 32글자 폴더명입니다 -1. `Nintendo DSiWare` 폴더 내 `F00D43D5.bin` 파일을 삭제해 주세요 -1. 다운로드한 DSiWare 압축 파일(output_(이름).zip)에서, `hax` 폴더 안에 있는 `42383841.bin` 파일을 `Nintendo DSiWare` 폴더로 복사해 주세요 - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Luma3DS `.zip`안에 있는 `boot.firm`과 `boot.3dsx`를 SD 카드의 루트에 복사해 주세요 - + SD 카드의 루트는 SD 카드를 열 때 보이는 디렉토리이고, Nintendo 3DS 폴더가 보이지만 그 안에 들어가 있지 않은 상태의 폴더입니다 -1. release `.zip`안에 있는 `boot.nds` (B9STool)를 SD 카드의 루트에 복사해 주세요 -1. SD 카드의 루트로 Frogminer_save `.zip`안에 압축이 되있는 `private` 폴더를 복사해 주세요 -1. SD 카드를 콘솔에 다시 삽입해 주세요 -1. 콘솔의 전원을 켜 주세요 - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} \ No newline at end of file diff --git a/_pages/ko_KR/include/hbl-common-exploits-movable.txt b/_pages/ko_KR/include/hbl-common-exploits-movable.txt deleted file mode 100644 index 973470f0c3..0000000000 --- a/_pages/ko_KR/include/hbl-common-exploits-movable.txt +++ /dev/null @@ -1,9 +0,0 @@ -### 다음 단계: 익스플로잇 선택 - -이전 섹션에서 카메라가 표시되었다면, 안전 모드가 정상적으로 실행될 수 있을 것입니다. - -카메라가 실행되었다면, [boot9strap 설치 (HBL-USM)](installing-boot9strap-(hbl-usm))으로 계속합니다 -{: .notice--primary} - -카메라가 실행되지 않았다면, [boot9strap 설치 (Frogtool)](installing-boot9strap-(frogtool))로 계속합니다 -{: .notice--info} diff --git a/_pages/ko_KR/include/hbl-common-exploits.txt b/_pages/ko_KR/include/hbl-common-exploits.txt deleted file mode 100644 index 973470f0c3..0000000000 --- a/_pages/ko_KR/include/hbl-common-exploits.txt +++ /dev/null @@ -1,9 +0,0 @@ -### 다음 단계: 익스플로잇 선택 - -이전 섹션에서 카메라가 표시되었다면, 안전 모드가 정상적으로 실행될 수 있을 것입니다. - -카메라가 실행되었다면, [boot9strap 설치 (HBL-USM)](installing-boot9strap-(hbl-usm))으로 계속합니다 -{: .notice--primary} - -카메라가 실행되지 않았다면, [boot9strap 설치 (Frogtool)](installing-boot9strap-(frogtool))로 계속합니다 -{: .notice--info} diff --git a/_pages/ko_KR/installing-boot9strap-(fredtool).txt b/_pages/ko_KR/installing-boot9strap-(fredtool).txt deleted file mode 100644 index 1bf7e83ff2..0000000000 --- a/_pages/ko_KR/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: "boot9strap 설치 (Fredtool)" ---- - -{% include toc title="목차" %} - -{% capture technical_info %} -기술적 상세 정보 (선택 사항) - -이 방식은 Seedminer에서 얻은 `movable.sed` 파일을 사용해 어느 DSiWare 타이틀을 해독해 익스플로잇 가능한 DSiWare 타이틀을 DS 소프트웨어용 인터넷 설정에 주입합니다. - -이 작업은 [이곳](https://www.3dbrew.org/wiki/3DS_System_Flaws)에 자세히 설명되어 있는 "FIRM partitions known-plaintext" 익스플로잇을 구현한 작업입니다. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -여기까지 왔다면, 시스템 펌웨어 버전이 11.16.0일 것 입니다. 펌웨어 버전이 11.17.0 또는 11.16.0가 아닌 경후, **이 방법은 콘솔을 벽돌로 만들 수 있습니다!!** -{: .notice--warning} - -### 준비물 - -* [Seedminer](seedminer)에서 받은 `movable.sed` 파일 -* 최신 버전의 [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest`) (`Frogminer_save.zip`) -* **11.16.0 또는 11.17.0 사용자**: v6.1.1 버전의 [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (직접 다운로드) -* 최신 버전의 [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (`.zip` 파일) - -#### 섹션 I - CFW 확인 - -{% include_relative include/cfw-check-fredtool.txt %} - -#### 섹션 II - BannerBomb3 - -이 섹션에서는 DSiWare 관리 메뉴에서 BannerBomb3 취약점을 실행해 결과물을 컴퓨터에 복사함으로서 다음 섹션에서 사용할 수 있게 합니다. - -1. SD 카드를 콘솔에 다시 삽입해 주세요 -1. 콘솔의 전원을 켜 주세요 -1. 콘솔에서 본체 설정을 열어 주세요 -1. `데이터 관리` -> `DSiWare` -> `SD 카드`로 들어가주세요 ([사진](/images/screenshots/bb3/dsiware-management.png)) - + 콘솔은 BB3 multihax 메뉴를 표시할 겁니다 - + 이 과정에서 콘솔이 갑자기 꺼진다면, [이 문제 해결 가이드](troubleshooting#installing-boot9strap-fredtool)를 참고해 주세요. -1. 십자 패드를 이용해 "Dump DSiWare" 에 (A) 버튼을 눌러 선택해 주세요 - + 콘솔이 자동으로 재부팅될 겁니다 -1. 콘솔의 전원을 꺼 주세요 - -#### 섹션 III - 준비 작업 - -{% include_relative include/fredtool-prep.txt %} - -#### 섹션 IV - DS 소프트웨어용 설정 덮어쓰기 - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### 섹션 V - Flipnote 익스플로잇 - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### 섹션 VI - Luma3DS 구성 - -1. (Select) 를 길게 누르고, 이 상태에서 콘솔의 전원을 켜 주세요 -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### 섹션 VII - DS 소프트웨어용 설정 복구 - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### [마무리 단계](finalizing-setup) 로 계속합니다 -{: .notice--primary} diff --git a/_pages/ko_KR/installing-boot9strap-(fredtool-legacy).txt b/_pages/ko_KR/installing-boot9strap-(fredtool-legacy).txt deleted file mode 100644 index 65fcb7ec61..0000000000 --- a/_pages/ko_KR/installing-boot9strap-(fredtool-legacy).txt +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: "boot9strap 설치 (Fredtool, 레거시)" ---- - -{% include toc title="목차" %} - -{% capture technical_info %} -기술적 상세 정보 (선택 사항) - -시스템 DSiWare를 추출하기 위해, DSiWare 데이터 관리 설정 창의 취약점을 악용합니다. - -이 가이드는 시스템의 암호화 키 (movable.sed)를 이용해 DSiWare 백업을 만들어, 시스템이 DSi 인터넷 설정 앱을 SD 카드 루트에 추출하게 합니다. - -DSiWare 백업을 만든 후, 이것을 DS 소프트웨어용 설정과 바꿔칠 수 있습니다. - -이 작업은 [이곳](https://www.3dbrew.org/wiki/3DS_System_Flaws)에 자세히 설명되어 있는 "FIRM partitions known-plaintext" 익스플로잇을 구현한 작업입니다. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -여기까지 왔다면, 시스템 펌웨어 버전이 11.15.0 또는 11.14.0일 것 입니다. 펌웨어 버전이 11.15.0 또는 11.14.0가 아닌 경후, **이 방법은 콘솔을 벽돌로 만들 수 있습니다!!** -{: .notice--warning} - -### 준비물 - -* [Seedminer (Mii)](seedminer-(mii))에서 받은 `movable.sed` 파일 -* 최신 버전의 [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest`) (`Frogminer_save.zip`) -* **11.15.0 또는 11.14.0 사용자**: v6.0.1 버전의 [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (직접 다운로드) -* 최신 버전의 [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (`.zip` 파일) - -#### 섹션 I - CFW 확인 - -{% include_relative include/cfw-check-fredtool.txt %} - -#### 섹션 II - BannerBomb3 - -이 섹션에서는 DSiWare 관리 메뉴에서 BannerBomb3 취약점을 실행해 결과물을 컴퓨터에 복사함으로서 다음 섹션에서 사용할 수 있게 합니다. - -1. SD 카드를 콘솔에 다시 삽입해 주세요 -1. 콘솔을 시작해 주세요 -1. 콘솔에서 본체 설정을 열어 주세요 -1. `데이터 관리` -> `DSiWare` -> `SD 카드`로 들어가주세요 ([사진](/images/screenshots/bb3/dsiware-management.png)) - + 콘솔은 BB3 multihax 메뉴를 표시할 겁니다 - + 이 과정에서 콘솔이 갑자기 꺼진다면, [이 문제 해결 가이드](troubleshooting#installing-boot9strap-fredtool)를 참고해 주세요. -1. 십자 패드를 이용해 "Dump DSiWare" 에 (A) 버튼을 눌러 선택해 주세요 - + 콘솔이 자동으로 재부팅될 겁니다 -1. 콘솔을 종료해 주세요 - -#### 섹션 III - 준비 작업 - -{% include_relative include/fredtool-prep.txt %} - -#### 섹션 IV - DS 소프트웨어용 설정 덮어쓰기 - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### 섹션 V - Flipnote 익스플로잇 - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### 섹션 VI - Luma3DS 구성 - -1. (Select) 를 길게 누르고, 이 상태에서 콘솔의 전원을 켜 주세요 -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### 섹션 VII - DS 소프트웨어용 설정 복구 - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### [마무리 단계](finalizing-setup) 로 계속합니다 -{: .notice--primary} diff --git a/_pages/ko_KR/installing-boot9strap-(frogtool).txt b/_pages/ko_KR/installing-boot9strap-(frogtool).txt deleted file mode 100644 index 1c870a991a..0000000000 --- a/_pages/ko_KR/installing-boot9strap-(frogtool).txt +++ /dev/null @@ -1,89 +0,0 @@ ---- -title: "boot9strap 설치 (Frogtool)" ---- - -{% include toc title="목차" %} - -{% capture technical_info %} -기술적 상세 정보 (선택 사항) -이 페이지에서 사용하게 될 취약점에 대한 기술적 세부 정보는 [여기 (영어)](https://www.3dbrew.org/wiki/3DS_System_Flaws)에 "DSiWare_Exports CTCert verification" 및 "FIRM partitions known-plaintext" 관련 글을 참조하세요. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - - -이 페이지의 `frogcert.bin` [마그넷](https://wikipedia.org/wiki/Magnet_URI_scheme)링크를 사용하려면 - [qBittorrent](https://www.qbittorrent.org/download.php) 또는 [Deluge](http://dev.deluge-torrent.org/wiki/Download)와 같은 토렌트 클라이언트가 필요합니다. -{: .notice--warning} - -### 준비물 - -* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link) -* 최신 버전의 [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (직접 다운로드) -* 최신 버전의 [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) - -#### 섹션 I - CFW 확인 - -{% include_relative include/cfw-check-fredtool.txt %} - -#### 섹션 II - 준비 작업 - -1. 콘솔의 전원을 꺼 주세요 -1. SD 카드를 컴퓨터에 삽입해 주세요 -1. Luma3DS `.zip`안에 있는 `boot.firm`과 `boot.3dsx`를 SD 카드의 루트에 복사해 주세요 -1. b9stool release `.zip`안에 있는 `boot.nds` (b9stool)를 SD 카드의 루트에 복사해 주세요 -1. SD 카드의 루트에 `3ds` 폴더가 없을 경우 폴더를 만들어 주세요 - + 이 폴더에는 홈브류 에플리케이션과 데이터가 보관되어 있으며, 콘솔이 자동으로 생성하는 `Nintendo 3DS` 폴더와 다른 폴더입니다 -1. Frogtool `.zip`안에 있는 `Frogtool` 폴더를 SD 카드의 `/3ds/` 폴더에 복사해 주세요 -1. 'frogcert.bin' 파일을 SD 카드의 루트에 복사해 주세요 -1. SD 카드를 콘솔에 다시 삽입해 주세요 -1. 콘솔의 전원을 켜 주세요 - -#### 섹션 III - DS 다운로드 플레이 패치 - -1. 아무 방법을 사용해 Homebrew Launcher를 실행해 주세요 (아마 인터넷 브라우저일 겁니다) -1. 홈브류 목록에서 Frogtool를 실행해 주세요 -1. "INJECT patched DS Download Play" 옵션을 선택해 주세요 -1. Frogtool이 자동으로 Flipnote Studio의 JPN 버전을 DS 다운로드 플레이에 삽입할 것입니다 -1. 작업이 완료되면, 위 화면을 읽고 문제가 없는지 확인해 주세요 -1. 터치 스크린을 탭하고, "BOOT patched DS Download Play" 을 선택해 주세요 -1. 만약 익스플로잇이 성공적이었다면, 콘솔은 JPN 버전의 Flipnote Studio를 실행할 겁니다 - + If you get stuck on a black screen, follow [this](https://wiki.hacks.guide/wiki/3DS:TWLFix#Userland_(PicHaxx,_Steelhax,_etc.)-0) page, then try again - -#### 섹션 IV - Flipnote 익스플로잇 - -{% include_relative include/install-boot9strap-b9stool.txt method="dsdlp" %} - -#### 섹션 VI - Luma3DS 구성 - -1. (Select) 를 길게 누르고, 이 상태에서 콘솔의 전원을 켜 주세요 -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### 섹션 VII - DS 다운로드 플레이 복구 - -1. 다운로드 플레이 앱을 실행해 주세요 -1. 두 가지의 버튼이 화면에 뜰 때까지 기다려 주세요 - + 이 버튼들을 누르지 마세요 -1. (L 어깨) + (십자 Down) + (Select) 을 동시에 눌러서 Rosalina 메뉴를 실행해 주세요 -1. "Miscellaneous options"을 선택해 주세요 -1. "Switch the hb. title to the current app."를 선택해 주세요 -1. (B)를 눌러 진행해 주세요 -1. (B)를 눌러 Rosalina 메뉴로 돌아가 주세요 -1. (B)를 눌러 Rosalina 메뉴를 나와 주세요 -1. (Home) 키를 누르고, 다운로드 플레이를 종료해 주세요 -1. 다운로드 플레이 앱을 다시 실행해 주세요 -1. 성공하면 Homebrew Launcher가 실행될 것입니다 -1. 홈브류 목록에서 Frogtool를 실행해 주세요 -1. "RESTORE clean DS Download Play"을 선택해 주세요 -1. 작업이 완료되면, 위 화면을 읽고 문제가 없는지 확인해 주세요 - + If there are any errors or missing files, correct the problem and try again -1. 작업을 성공적으로 마치면 화연을 탭한 후 스타트 버튼(START) 를 눌러서 나가 주세요 -1. 콘솔의 전원을 꺼 주세요 - -___ - -### [마무리 단계](finalizing-setup) 로 계속합니다 -{: .notice--primary} diff --git a/_pages/ko_KR/installing-boot9strap-(hbl-usm).txt b/_pages/ko_KR/installing-boot9strap-(hbl-usm).txt deleted file mode 100644 index 75c044b9d9..0000000000 --- a/_pages/ko_KR/installing-boot9strap-(hbl-usm).txt +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "boot9strap 설치 (HBL-USM)" ---- - -{% include toc title="목차" %} - -{% capture technical_info %} -기술적 상세 정보 (선택 사항) - -SAFE_MODE 펌웨어를 해킹하기 위해, 익스플로잇이 되어있는 Wi-Fi 프로필을 설치해야 합니다. - -이미 홈브류 기능을 사용할수 있으니, slotTool을 이용하면 됩니다. - -Wi-Fi 프로필을 설치한 후, 모든 3DS 콘솔에 내장되어 있는 시스템 복구 모드인 SAFE_MODE를 사용해 해당 인터넷 설정을 활성화합니다. - -unSAFE_MODE의 더 자세한 설명은 [여기 (영문)](https://github.com/zoogie/unSAFE_MODE/)를 참고해 주세요. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### 호환성 안내 - -만약 (L/R 어깨 버튼), (위 십자 패드), 또는 (A) 버튼이 동작되지 않다면, [Nintendo Homebrew Discord 서버](https://discord.gg/MWxPgEp)에서 (영어로) 도움을 요청해 주세요. -{: .notice--danger} - -### 준비물 - -* 최신 버전의 [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (직접 다운로드) -* 최신 버전의 [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) (직접 다운로드) - -#### 섹션 I - 준비 작업 - -이 섹션에서는 콘솔의 SD 카드에 unSAFE_MODE 취약점을 실행하기 위한 파일을 복사하게 됩니다. 이 섹션에서는, Homebrew Launcher 메뉴에서 slotTool을 실행해, Wi-Fi 연결 슬롯을 수정된 데이터로 덮어씌웁니다. 이 취약점을 실행함으로서, 콘솔의 Wi-Fi 연결 설정은 일시적으로 덮어씌워집니다. - -1. SD 카드를 컴퓨터에 삽입해 주세요 -1. SD 카드이 루트에 `boot9strap` 라는 이름으로 새 폴더를 생성해 주세요 -1. SD 카드에 있는 `/boot9strap/` 폴더에 RELEASE `.zip` 파일 안에 압축되있는 `boot9strap.firm`과 `boot9strap.firm.sha`을 복사해 주세요 -1. SD 카드의 루트에 `3ds` 폴더가 없을 경우 폴더를 만들어 주세요 - + 이 폴더에는 홈브류 에플리케이션과 데이터가 보관되어 있으며, 콘솔이 자동으로 생성하는 `Nintendo 3DS` 폴더와 다른 폴더입니다 -1. RELEASE `.zip`안에 `slotTool`폴더에 있는 `slotTool.3dsx`를 SD 카드의 `/3ds/` 폴더에 복사해 주세요 -1. RELEASE `.zip`안에 있는 `usm.bin`을 SD 카드의 루트에 복사해 주세요 -1. SafeB9SInstaller `.zip`의 `SafeB9SInstaller.bin`을 SD 카드의 루트로 복사해 주세요 -1. SD 카드를 콘솔에 다시 삽입해 주세요 -1. 콘솔의 전원을 켜 주세요 -1. 아무 방법을 사용해 Homebrew Launcher를 실행해 주세요 (아마 인터넷 브라우저일 겁니다) -1. 홈브류 목록에서 slotTool를 실행해 주세요 - + 여기서 붉은 화면이 표시되면, 전원 버튼을 15초 눌러 기기를 강제로 종료하고, 이 섹션을 다시 시도해 주세요 -1. "INSTALL exploit to wifi slots 1,2,3 & shutdown" 옵션을 선택해 주세요 - + 화면에 텍스트가 표시되고, 그 다음 기기가 자동으료 종료될 겁니다 - -![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### 섹션 II - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### 섹션 III - boot9strap 설치하기 - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### 섹션 IV - Wi-Fi 프로필 복구 - -{% include_relative include/remove-usm-slottool.txt %} - -___ - -### [마무리 단계](finalizing-setup) 로 계속합니다 -{: .notice--primary} diff --git a/_pages/ko_KR/installing-boot9strap-(usm).txt b/_pages/ko_KR/installing-boot9strap-(usm).txt deleted file mode 100644 index e230bfd8e2..0000000000 --- a/_pages/ko_KR/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: "boot9strap 설치 (USM)" ---- - -{% include toc title="목차" %} - -{% capture technical_info %} -기술적 상세 정보 (선택 사항) - -SAFE_MODE 펌웨어를 해킹하기 위해, 익스플로잇이 되어있는 Wi-Fi 프로필을 설치해야 합니다. - -이미 존재하는 BannerBomb3 익스플로잇을 사용해 이걸 할 수 있습니다. - -이것은 시스템의 암호화 키 (movable.sed)를 이용해 DSiWare 백업을 만들고, 이걸 사용해 인터넷 설정에 익스플로잇을 설치할 수 있도록 만듭니다. - -Wi-Fi 프로필을 설치한 후, 모든 3DS 콘솔에 내장되어 있는 시스템 복구 모드인 SAFE_MODE를 사용해 해당 인터넷 설정을 활성화합니다. - -BannerBomb3와 unSAFE_MODE의 더 자세한 설명은 다음 (영어) 페이지를 참고해 주세요: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### 호환성 안내 - -이 설명서는 미주, 유럽, 일본, 그리고 한국 지역 콘솔들 (시스템 버전 다음 글짜가 U, E, J, 아니면 K 인 경우) 와 호환됩니다. - -만약 (L/R 어깨 버튼), (위 십자 패드), 또는 (A) 버튼이 동작되지 않다면, [다른 Seedminer 방법](installing-boot9strap-(fredtool))을 따라야 합니다. 이 방법에 도움이 필요하다면, [Nintendo Homebrew Discord 서버](https://discord.gg/MWxPgEp)에서 영어로 도움을 요청해 주세요. -{: .notice--warning} - -### 준비물 - -* 최신 버전의 [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (직접 다운로드) -* 최신 버전의 [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (직접 다운로드) -* 최신 버전의 [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (`.zip` 파일) -* [usm.bin](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (직접 다운로드) - - -#### 섹션 I - 준비 작업 - -이 섹션에서는 콘솔의 SD 카드에 unSAFE_MODE 취약점을 실행하기 위한 파일을 복사하게 됩니다. - -1. SD 카드는 컴퓨터에 삽입이 되 있어야 합니다 -1. 'usm.bin' 파일을 SD 카드의 루트에 복사해 주세요 -1. Luma3DS `.zip`안에 있는 `boot.firm`과 `boot.3dsx`를 SD 카드의 루트에 복사해 주세요 - + SD 카드의 루트는 SD 카드를 열 때 보이는 디렉토리이고, Nintendo 3DS 폴더가 보이지만 그 안에 들어가 있지 않은 상태의 폴더입니다 -1. SD 카드이 루트에 `boot9strap` 라는 이름으로 새 폴더를 생성해 주세요 -1. SD 카드에 있는 `/boot9strap/` 폴더에 boot9strap `.zip` 파일 안에 압축되있는 `boot9strap.firm`과 `boot9strap.firm.sha`을 복사해 주세요 -1. SafeB9SInstaller `.zip`의 `SafeB9SInstaller.bin`을 SD 카드의 루트로 복사해 주세요 - -![]({{ "/images/screenshots/usm/usm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### 섹션 II - BannerBomb3 - -이 섹션에서는, DSiWare 관리 메뉴에서 BannerBomb3 취약점을 실행해, Wi-Fi 연결 슬롯을 수정된 데이터로 덮어씌웁니다. 이 취약점을 실행함으로서, 콘솔의 Wi-Fi 연결 설정은 일시적으로 덮어씌워집니다. - -1. SD 카드를 콘솔에 다시 삽입해 주세요 -1. 콘솔의 전원을 켜 주세요 -1. 콘솔에서 본체 설정을 열어 주세요 -1. `데이터 관리` -> `DSiWare` -> `SD 카드`로 들어가주세요 ([사진](/images/screenshots/bb3/dsiware-management.png)) - + 콘솔은 BB3 multihax 메뉴를 표시할 겁니다 - + BB3 multihax 메뉴가 표시되지 않으면, [이 문제 해결 가이드](troubleshooting#bannerbomb3)를 참고해 주세요 - + 만약 BB3 multihax 메뉴에서 "cfw installed already"를 표시한다면, 해당 콘솔은 이미 커스텀 펌웨어가 설치되어 있다는 뜻이며, [여기](checking-for-cfw)로 계속해야 합니다 -1. 십자 패드를 이용해 "Install unSAFE_MODE" 에 (A) 버튼을 눌러 선택해 주세요 - + 콘솔이 자동으로 종료될 겁니다 -1. 콘솔의 전원을 켜 주세요 -1. 콘솔에서 본체 설정을 열어 주세요 -1. `인터넷 설정` -> `인터넷 접속 설정`으로 이동해 주세요 -1. 세 개의 연결 이름이 모두 "Haaaaaaaxxxxxxxxx..."인지 확인해 주세요 - + 이 설정을 변경하지 마세요! - + 세 설정 중 하나라도 "Haaaaaaaxxxxxxxxx..."로 표시되지 **않는다면**, **멈추세요!** 이 섹션을 진행하면서 문제가 발생했으며, 계속하기 전에 **반드시** 수정되어야 합니다 -1. 콘솔의 전원을 꺼 주세요 - -#### 섹션 III - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### 섹션 IV - boot9strap 설치 - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### 섹션 V - Wi-Fi 프로필 복구 - -이 섹션에서는, BannerBomb3 취약점을 다시 한 번 실행해 섹션 II에서 덮어씌웠던 Wi-Fi 커넥션 슬롯을 원래대로 복구합니다. - -1. 콘솔에서 본체 설정을 열어 주세요 -1. `데이터 관리` -> `DSiWare` -> `SD 카드`로 들어가주세요 ([사진](/images/screenshots/bb3/dsiware-management.png)) -1. 십자 패드를 이용해 "Uninstall unSAFE_MODE" 에 (A) 버튼을 눌러 선택해 주세요 - + 콘솔이 자동으로 재부팅될 겁니다 -1. 콘솔의 전원을 꺼 주세요 -1. SD 카드를 컴퓨터에 삽입해 주세요 -1. SD 카드의 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 폴더로 이동해 주세요 -1. `F00D43D5.bin` 파일을 Nintendo DSiWare 폴더와 PC에서 지워 주세요. 더 이상 이 파일은 필요가 없습니다 - -___ - -### [마무리 단계](finalizing-setup) 로 계속합니다 -{: .notice--primary} diff --git a/_pages/ms_MY/dumping-movable-(nimhax).txt b/_pages/ms_MY/dumping-movable-(nimhax).txt deleted file mode 100644 index 6e24428be4..0000000000 --- a/_pages/ms_MY/dumping-movable-(nimhax).txt +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: "Dumping Movable (nimhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -To install boot9strap on your console, we derive your console's unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console. - -For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need - -* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Pasang kad SD anda ke dalam komputer -1. Copy the `nimhax` folder from the nimhax `.zip` to the `/3ds/` folder on your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) -{: .notice--info} - -#### Section II - nimhax - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch nimhax from the list of homebrew -1. If the exploit was successful, a `movable.sed` file will appear on the root of your SD card - -### Next step: Frogtool - -Once you have your console's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \ -While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you're unable to use a torrent client. - -Continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--primary} diff --git a/_pages/ms_MY/homebrew-launcher-(freakyhax).txt b/_pages/ms_MY/homebrew-launcher-(freakyhax).txt deleted file mode 100644 index 7b5225858d..0000000000 --- a/_pages/ms_MY/homebrew-launcher-(freakyhax).txt +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: "Homebrew Launcher (freakyhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[freakyhax](https://plutooo.github.io/freakyhax/) is an exploit for the game Freakyforms Deluxe discovered and released by [plutooo](https://github.com/plutooo). It works on versions 9.0.0 through 11.17.0 on EUR, USA and JPN region consoles. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -### What You Need - -+ A EUR/USA/JPN copy of Freakyforms Deluxe (eShop or cartridge) -+ The latest release of [freakyhax](https://github.com/plutooo/freakyhax/releases/latest) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Pasang kad SD anda ke dalam komputer -1. Copy all files and folders inside the `/build//exploit/` folder from the freakyhax `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - freakyhax - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch Freakyforms Deluxe -1. In the game menu, select `Play -> Camera -> Load a QR code` -1. Select the QR code -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/ms_MY/homebrew-launcher-(ninjhax2-dx).txt b/_pages/ms_MY/homebrew-launcher-(ninjhax2-dx).txt deleted file mode 100644 index bd61784e20..0000000000 --- a/_pages/ms_MY/homebrew-launcher-(ninjhax2-dx).txt +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "Homebrew Launcher (ninjhax2-dx)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[Ninjhax2](https://github.com/smealum/ninjhax2.x) is an exploit for the game "Cubic Ninja" made by [smealum](https://github.com/smealum). This page uses an updated version of ninjhax by [zoogie](https://github.com/zoogie) called [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx), which supports 11.17.0. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -This process will overwrite your Cubic Ninja save file, if you have one. -{: .notice--warning} - -### What You Need -* The game "Cubic Ninja" -* The latest release of [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx/releases) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Pasang kad SD anda ke dalam komputer -1. Copy `Launcher.dat` from the folder appropriate for your console from the ninjhax2-dx `.zip` file to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - -#### Section II - ninjhax2-dx -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Cubic Ninja" once and select "Create" - + If prompted, delete all data -1. Select "QR Code" -1. Select "Scan QR Code" -1. On your PC, open the browser and go to [ninjhax2-dx website](https://zoogie.github.io/web/nh2dx/) -1. Select your console's region and hardware -1. On your console, scan the QR code - + If the game exits to the HOME Menu, then the exploit has installed correctly -1. Launch "Cubic Ninja" again -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/ms_MY/homebrew-launcher-(pichaxx).txt b/_pages/ms_MY/homebrew-launcher-(pichaxx).txt deleted file mode 100644 index 275a36df62..0000000000 --- a/_pages/ms_MY/homebrew-launcher-(pichaxx).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (PicHaxx)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[PicHaxx](https://github.com/zoogie/pichaxx) is an exploit for the game Pokémon Picross released by [zoogie](https://github.com/zoogie), originally discovered and [demonstrated](https://twitter.com/mrnbayoh/status/744899681663258624) by [MrNbaYoh](https://github.com/MrNbaYoh). - -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Pokémon Picross" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Pokémon Picross -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Prep Work - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Pasang kad SD anda ke dalam komputer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card - -![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - PicHaxx - -In this section, you will create a hacked Pokémon Picross save file that, when loaded, will run the Homebrew Launcher on your console. - -1. Open [the PicHaxx Injector website](https://3dstools.nhnarwhal.com/#/pichaxx) on your computer -1. Select your `movable.sed` file -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `0017c100` -> `data` on your SD card - + The `` will be the same one that you used in Seedminer - + The `` is a 32 character long folder inside of the `` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted - - ![]({{ "/images/screenshots/pichaxx-save-location.png" | absolute_url }}) - {: .notice--info} - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Pokémon Picross" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher - + If you get an error message, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-pichaxx) -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/ms_MY/homebrew-launcher-(smilehax-iie).txt b/_pages/ms_MY/homebrew-launcher-(smilehax-iie).txt deleted file mode 100644 index 0f7e5da026..0000000000 --- a/_pages/ms_MY/homebrew-launcher-(smilehax-iie).txt +++ /dev/null @@ -1,70 +0,0 @@ ---- -title: "Homebrew Launcher (smilehax-IIe)" ---- - -{% include toc title="Table of Contents" %} - -This set of instructions does not support the Japanese version of SmileBASIC. -{: .notice--warning} - -{% capture technical_info %} -Technical Details (optional) -[smilehax-IIe](https://github.com/zoogie/smilehax-IIe) is an exploit for the game "SmileBASIC" made by zoogie, compatible with system versions 9.0.0 through 11.17.0 for USA/EUR/JPN region consoles. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need -+ The game "SmileBASIC" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install SmileBASIC -+ The latest release of [smilehax-IIe](https://github.com/zoogie/smilehax-IIe/releases/download/v1.1/Release_sh2e_v1.1.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Pasang kad SD anda ke dalam komputer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Transfer the `.wav` for your region from the Release_sh2e `.zip` to a device that can play `.wav` files, for example a phone -1. Copy the petitcom `.icn` for your region to the root of your SD card - -#### Section II - smilehax - -1. Launch SmileBASIC - + Update the game if prompted -1. Select the "Publish/Download Projects" option -1. Select the "Download (Receive) using Public Key" option -1. Press the "Yes" button -1. Enter the Public Key "NJEQK3A4" using the on-screen keyboard -1. Press the "Yes" button to confirm the download of PMODEM141 -1. Press "OK", then "Back", then "Browse Projects" -1. Select PMODEM141, then press "Select File" -1. Select PMODEM141.PRG, then press "OK", then "Yes" to execute it -1. Select RECEIVE FILE SIMPLEX -1. Prepare the device you use to play the `.wav` file -1. Keep your console about a foot from the `.wav` file playing devices' speaker and use a reasonable (not loud) volume to play the `.wav` -1. Now select 300BPS, then play the `.wav` file -1. When it finishes, press "Yes", then press "OK" -1. Press the START button -1. Select the SH2E-xxx.TXT file, then press OK, then "Yes" to execute it - + If you get kicked back into menu, make sure you're using the latest version of SmileBASIC -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/ms_MY/homebrew-launcher-(steelhax).txt b/_pages/ms_MY/homebrew-launcher-(steelhax).txt deleted file mode 100644 index 75026f3db7..0000000000 --- a/_pages/ms_MY/homebrew-launcher-(steelhax).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (Steelhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Steel Diver: Sub Wars, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Steel Diver: Sub Wars save file, if you have one. If you wish to preserve your Steel Diver: Sub Wars game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Steel Diver: Sub Wars" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Steel Diver: Sub Wars -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Steelhax](/assets/steelhax-release.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Prep Work - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Pasang kad SD anda ke dalam komputer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the `steelhax` folder from the `Steelhax-release.zip` to the root of your SD card -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - Steelminer - -In this section, you will create a hacked Steel Diver: Sub Wars save file that, when used, will load the Homebrew Launcher on your console. - -1. Launch "Steel Diver: Sub Wars" once and select a Mii to initialize your save file - + Decline the game update when prompted - + If you have already updated the game, use the Data Management menu of the System Settings to delete the update -1. Exit "Steel Diver: Sub Wars" -1. Power off your console -1. Pasang kad SD anda ke dalam komputer -1. Open [the SteelHax Save Tool website](https://3dstools.nhnarwhal.com/#/steelhax) on your computer -1. Select your `movable.sed` file -1. Select your region based on your console -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `<8-character-region>` -> `data` on your SD card - + **EUR Region**: `000d7e00` - + **JPN Region**: `000d7c00` - + **USA Region**: `000d7d00` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Steel Diver: Sub Wars" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/ms_MY/homebrew-launcher-(super-skaterhax).txt b/_pages/ms_MY/homebrew-launcher-(super-skaterhax).txt deleted file mode 100644 index 5f56b1b39f..0000000000 --- a/_pages/ms_MY/homebrew-launcher-(super-skaterhax).txt +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: "Homebrew Launcher (super-skaterhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see [here](https://github.com/zoogie/super-skaterhax). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -Super-skaterhax (when used to launch the Homebrew Launcher) is compatible with New models on version 11.16.0 in all regions, and 11.17.0 in the EUR, JPN and USA regions. - -The instructions provided only apply to the New 3DS, New 3DS XL, and New 2DS XL. Please ensure that the console you are modding is a New 3DS, New 3DS XL, or New 2DS XL before continuing. -{: .notice--warning} - -### What You Need - -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* The latest release of [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (the release `.zip` file) - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger both super-skaterhax and the Homebrew Launcher. - -1. Power off your console -1. Pasang kad SD anda ke dalam komputer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy everything inside the folder for your console's region (and also system version if the region is USA) in the super-skaterhax `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/skater-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - super-skaterhax - -In this section, you will visit the browser exploit webpage, which will launch the Homebrew Launcher. - -If you haven't already, make sure you have a working Internet connection set up on your console. -{: .notice--info} - -1. On the HOME Menu, press the Left and Right shoulder buttons at the same time to open the camera - + If you are unable to open the camera, open the Internet Browser and manually type the URL instead (`https://zoogie.github.io/web/super/` for EUR/USA/JPN, `https://zoogie.github.io/web/korea` for KOR) -1. Tap the QR code button and scan one of the following QR codes for your console's region [here](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png) - + If you get a security certificate warning, press (A) to allow the connection -1. Press the (Select) button to open the bookmark tab - + If your (Select) button does not respond, tap the star icon on the bottom-left corner of the screen -1. Tap "Bookmark this page" -1. Press (B) once to return to the browser -1. Press (Start) to open the context menu - + If your (Start) button does not respond, tap the 3-line menu on the bottom-right corner of the screen -1. Tap on "Settings" -1. Tap on "Delete Cookies" -1. Tekan (A) untuk meneruskan -1. Press (Home) to return to the HOME Menu, then immediately press (A) to launch the browser again -1. Select the "GO GO!" button on the top screen - + If any prompts appear, approve all of them - + If your console freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your console freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section - + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/ms_MY/include/fredtool-prep.txt b/_pages/ms_MY/include/fredtool-prep.txt deleted file mode 100644 index 987be446e1..0000000000 --- a/_pages/ms_MY/include/fredtool-prep.txt +++ /dev/null @@ -1,29 +0,0 @@ -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Pasang kad SD anda ke dalam komputer -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} \ No newline at end of file diff --git a/_pages/ms_MY/include/hbl-common-exploits-movable.txt b/_pages/ms_MY/include/hbl-common-exploits-movable.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/ms_MY/include/hbl-common-exploits-movable.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/ms_MY/include/hbl-common-exploits.txt b/_pages/ms_MY/include/hbl-common-exploits.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/ms_MY/include/hbl-common-exploits.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/ms_MY/installing-boot9strap-(fredtool).txt b/_pages/ms_MY/installing-boot9strap-(fredtool).txt deleted file mode 100644 index a06a1259f2..0000000000 --- a/_pages/ms_MY/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer](seedminer) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/ms_MY/installing-boot9strap-(fredtool-legacy).txt b/_pages/ms_MY/installing-boot9strap-(fredtool-legacy).txt deleted file mode 100644 index 7e88fb51b4..0000000000 --- a/_pages/ms_MY/installing-boot9strap-(fredtool-legacy).txt +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool, Legacy)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. - -Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/ms_MY/installing-boot9strap-(frogtool).txt b/_pages/ms_MY/installing-boot9strap-(frogtool).txt deleted file mode 100644 index 17eed67c83..0000000000 --- a/_pages/ms_MY/installing-boot9strap-(frogtool).txt +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Installing boot9strap (Frogtool)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see "DSiWare_Exports CTCert verification" and "FIRM partitions known-plaintext" [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - - -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) link for `frogcert.bin` on this page, you will need a torrent client like [qBittorrent](https://www.qbittorrent.org/download.php) or [Deluge](http://dev.deluge-torrent.org/wiki/Download). -{: .notice--warning} - -### What You Need - -* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link) -* The latest release of [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (direct download) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - Prep Work - -1. Power off your console -1. Pasang kad SD anda ke dalam komputer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Copy `boot.nds` (b9sTool) from the b9sTool release `.zip` to the root of your SD card -1. Create a folder named `3ds` on the root of your SD card if it does not already exist - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy the `Frogtool` folder from the Frogtool-nimhax `.zip` to the `/3ds/` folder on your SD card -1. Copy `frogcert.bin` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section III - Patching DS Download Play - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch Frogtool from the list of homebrew -1. Select the "INJECT patched DS Download Play" option -1. Frogtool will automatically run and inject the JPN version of Flipnote Studio into your DS Download Play -1. Once this operation has finished, read the screens and check if the process was successful -1. Tap the touch screen, then select "BOOT patched DS Download Play" -1. If the exploit was successful, your console will have loaded the JPN version of Flipnote Studio - + If you get stuck on a black screen, follow [this](https://wiki.hacks.guide/wiki/3DS:TWLFix#Userland_(PicHaxx,_Steelhax,_etc.)-0) page, then try again - -#### Section IV - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsdlp" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Download Play - -1. Launch the Download Play application -1. Wait until you see the two buttons - + Do not press either of the buttons -1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu -1. Select "Miscellaneous options" -1. Select "Switch the hb. title to the current app." -1. Press (B) to continue -1. Press (B) to return to the Rosalina main menu -1. Press (B) to exit the Rosalina menu -1. Press (Home), then close Download Play -1. Relaunch the Download Play application -1. Your console should load the Homebrew Launcher -1. Launch Frogtool from the list of homebrew -1. Select the "RESTORE clean DS Download Play" option -1. Once this operation has finished, read the screens and check if the process was successful - + If there are any errors or missing files, correct the problem and try again -1. If the process was successful, tap the touch screen, then press START to exit -1. Power off your console - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/ms_MY/installing-boot9strap-(hbl-usm).txt b/_pages/ms_MY/installing-boot9strap-(hbl-usm).txt deleted file mode 100644 index daa7b23eb5..0000000000 --- a/_pages/ms_MY/installing-boot9strap-(hbl-usm).txt +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "Installing boot9strap (HBL-USM)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--danger} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) (direct download) - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. Then, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Pasang kad SD anda ke dalam komputer -1. Create a folder named `boot9strap` on the root of your SD card -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the RELEASE `.zip` to the `/boot9strap/` folder on your SD card -1. Create a folder named `3ds` on the root of your SD card if it does not already exist - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy `slotTool.3dsx` from the `slotTool` folder inside the RELEASE `.zip` to the `/3ds/` folder on your SD card -1. Copy `usm.bin` from the RELEASE `.zip` to the root folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch slotTool from the list of homebrew - + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section -1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option - + You will see some on-screen text and then your system will shut down - -![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section III - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section IV - Restoring WiFi Configuration Profiles - -{% include_relative include/remove-usm-slottool.txt %} - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/ms_MY/installing-boot9strap-(usm).txt b/_pages/ms_MY/installing-boot9strap-(usm).txt deleted file mode 100644 index cd0999e946..0000000000 --- a/_pages/ms_MY/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: "Installing boot9strap (USM)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. - -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--warning} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* [usm.bin](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) - - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. - -1. Your SD card should be inserted in your computer -1. Copy `usm.bin` to the root of your SD card -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Create a folder named `boot9strap` on the root of your SD card -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card - -![]({{ "/images/screenshots/usm/usm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If the BB3 multihax menu doesn't open, [follow this troubleshooting guide](troubleshooting#bannerbomb3) - + If the BB3 multihax menu says "cfw installed already", you already have custom firmware and should continue from [here](checking-for-cfw) -1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" - + Your console will automatically power off -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Internet Settings` -> `Connection Settings` -1. Ensure that all three connections are named "Haaaaaaaxxxxxxxxx..." - + Do NOT change these settings! - + If all three connections are NOT all named "Haaaaaaaxxxxxxxxx...", STOP! Something went wrong in this section and MUST be fixed before you can continue -1. Power off your console - -#### Section III - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section IV - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section V - Restoring WiFi Configuration Profiles - -In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. - -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" - + Your console will automatically reboot -1. Power off your console -1. Pasang kad SD anda ke dalam komputer -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/nl_NL/dumping-movable-(nimhax).txt b/_pages/nl_NL/dumping-movable-(nimhax).txt deleted file mode 100644 index 94f35355df..0000000000 --- a/_pages/nl_NL/dumping-movable-(nimhax).txt +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: "Dumping Movable (nimhax)" ---- - -{% include toc title="Inhoudsopgave" %} - -{% capture technical_info %} -Technical Details (optional) - -To install boot9strap on your console, we derive your console's unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console. - -For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Wat je nodig hebt - -* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file) - -### Instructies - -#### Deel I - Voorbereiding - -1. Zet je console uit -1. Plaats je SD kaart in je computer -1. Copy the `nimhax` folder from the nimhax `.zip` to the `/3ds/` folder on your SD card -1. Stop je SD-kaart terug in je console -1. Zet je console aan - -![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) -{: .notice--info} - -#### Section II - nimhax - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch nimhax from the list of homebrew -1. If the exploit was successful, a `movable.sed` file will appear on the root of your SD card - -### Next step: Frogtool - -Once you have your console's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \ -While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you're unable to use a torrent client. - -Continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--primary} diff --git a/_pages/nl_NL/homebrew-launcher-(freakyhax).txt b/_pages/nl_NL/homebrew-launcher-(freakyhax).txt deleted file mode 100644 index 7295329997..0000000000 --- a/_pages/nl_NL/homebrew-launcher-(freakyhax).txt +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: "Homebrew Launcher (freakyhax)" ---- - -{% include toc title="Inhoudsopgave" %} - -{% capture technical_info %} -Technical Details (optional) -[freakyhax](https://plutooo.github.io/freakyhax/) is an exploit for the game Freakyforms Deluxe discovered and released by [plutooo](https://github.com/plutooo). It works on versions 9.0.0 through 11.17.0 on EUR, USA and JPN region consoles. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -### Wat je nodig hebt - -+ A EUR/USA/JPN copy of Freakyforms Deluxe (eShop or cartridge) -+ The latest release of [freakyhax](https://github.com/plutooo/freakyhax/releases/latest) -* De nieuwste versie van [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (het Luma3DS `.zip` bestand) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructies - -#### Deel I - Voorbereiding - -1. Zet je console uit -1. Plaats je SD kaart in je computer -1. Copy all files and folders inside the `/build//exploit/` folder from the freakyhax `.zip` to the root of your SD card - + De hoofdmap van de SD-kaart verwijst naar de bovenste map van de SD-kaart, waarin je alle mappen op de SD-kaart kunt zien, waaronder de Nintendo 3DS map, zonder je in de Nintendo 3DS map te bevinden -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Kopieer `boot.firm` en `boot.3dsx` van de Luma3DS `.zip` naar de hoofdmap van je SD-kaart -1. Stop je SD-kaart terug in je console -1. Zet je console aan - -#### Section II - freakyhax - -1. Stop je SD-kaart terug in je console -1. Zet je console aan -1. Launch Freakyforms Deluxe -1. In the game menu, select `Play -> Camera -> Load a QR code` -1. Select the QR code -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Zet je console uit - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/nl_NL/homebrew-launcher-(ninjhax2-dx).txt b/_pages/nl_NL/homebrew-launcher-(ninjhax2-dx).txt deleted file mode 100644 index b722913ade..0000000000 --- a/_pages/nl_NL/homebrew-launcher-(ninjhax2-dx).txt +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "Homebrew Launcher (ninjhax2-dx)" ---- - -{% include toc title="Inhoudsopgave" %} - -{% capture technical_info %} -Technical Details (optional) -[Ninjhax2](https://github.com/smealum/ninjhax2.x) is an exploit for the game "Cubic Ninja" made by [smealum](https://github.com/smealum). This page uses an updated version of ninjhax by [zoogie](https://github.com/zoogie) called [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx), which supports 11.17.0. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -This process will overwrite your Cubic Ninja save file, if you have one. -{: .notice--warning} - -### Wat je nodig hebt -* The game "Cubic Ninja" -* The latest release of [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx/releases) -* De nieuwste versie van [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (het Luma3DS `.zip` bestand) - -### Instructies - -#### Deel I - Voorbereiding - -1. Zet je console uit -1. Plaats je SD kaart in je computer -1. Copy `Launcher.dat` from the folder appropriate for your console from the ninjhax2-dx `.zip` file to the root of your SD card - + De hoofdmap van de SD-kaart verwijst naar de bovenste map van de SD-kaart, waarin je alle mappen op de SD-kaart kunt zien, waaronder de Nintendo 3DS map, zonder je in de Nintendo 3DS map te bevinden -1. Kopieer `boot.firm` en `boot.3dsx` van de Luma3DS `.zip` naar de hoofdmap van je SD-kaart - -#### Section II - ninjhax2-dx -1. Stop je SD-kaart terug in je console -1. Zet je console aan -1. Launch "Cubic Ninja" once and select "Create" - + If prompted, delete all data -1. Select "QR Code" -1. Select "Scan QR Code" -1. On your PC, open the browser and go to [ninjhax2-dx website](https://zoogie.github.io/web/nh2dx/) -1. Select your console's region and hardware -1. On your console, scan the QR code - + If the game exits to the HOME Menu, then the exploit has installed correctly -1. Launch "Cubic Ninja" again -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Zet je console uit - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/nl_NL/homebrew-launcher-(pichaxx).txt b/_pages/nl_NL/homebrew-launcher-(pichaxx).txt deleted file mode 100644 index 0a96a73072..0000000000 --- a/_pages/nl_NL/homebrew-launcher-(pichaxx).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (PicHaxx)" ---- - -{% include toc title="Inhoudsopgave" %} - -{% capture technical_info %} -Technical Details (optional) -[PicHaxx](https://github.com/zoogie/pichaxx) is an exploit for the game Pokémon Picross released by [zoogie](https://github.com/zoogie), originally discovered and [demonstrated](https://twitter.com/mrnbayoh/status/744899681663258624) by [MrNbaYoh](https://github.com/MrNbaYoh). - -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### Wat je nodig hebt - -+ The game "Pokémon Picross" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Pokémon Picross -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructies - -#### Deel I - Voorbereiding - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Zet je console uit -1. Plaats je SD kaart in je computer -1. Kopieer `boot.firm` en `boot.3dsx` van de Luma3DS `.zip` naar de hoofdmap van je SD-kaart - + De hoofdmap van de SD-kaart verwijst naar de bovenste map van de SD-kaart, waarin je alle mappen op de SD-kaart kunt zien, waaronder de Nintendo 3DS map, zonder je in de Nintendo 3DS map te bevinden -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card - -![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - PicHaxx - -In this section, you will create a hacked Pokémon Picross save file that, when loaded, will run the Homebrew Launcher on your console. - -1. Open [the PicHaxx Injector website](https://3dstools.nhnarwhal.com/#/pichaxx) on your computer -1. Select your `movable.sed` file -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `0017c100` -> `data` on your SD card - + The `` will be the same one that you used in Seedminer - + `` is een reeks van 32 characters lang en bevindt zich in de map van de `` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted - - ![]({{ "/images/screenshots/pichaxx-save-location.png" | absolute_url }}) - {: .notice--info} - -1. Stop je SD-kaart terug in je console -1. Zet je console aan -1. Launch "Pokémon Picross" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher - + If you get an error message, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-pichaxx) -1. Zet je console uit - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/nl_NL/homebrew-launcher-(smilehax-iie).txt b/_pages/nl_NL/homebrew-launcher-(smilehax-iie).txt deleted file mode 100644 index fa1526fcc3..0000000000 --- a/_pages/nl_NL/homebrew-launcher-(smilehax-iie).txt +++ /dev/null @@ -1,70 +0,0 @@ ---- -title: "Homebrew Launcher (smilehax-IIe)" ---- - -{% include toc title="Inhoudsopgave" %} - -This set of instructions does not support the Japanese version of SmileBASIC. -{: .notice--warning} - -{% capture technical_info %} -Technical Details (optional) -[smilehax-IIe](https://github.com/zoogie/smilehax-IIe) is an exploit for the game "SmileBASIC" made by zoogie, compatible with system versions 9.0.0 through 11.17.0 for USA/EUR/JPN region consoles. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Wat je nodig hebt -+ The game "SmileBASIC" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install SmileBASIC -+ The latest release of [smilehax-IIe](https://github.com/zoogie/smilehax-IIe/releases/download/v1.1/Release_sh2e_v1.1.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructies - -#### Deel I - Voorbereiding - -1. Zet je console uit -1. Plaats je SD kaart in je computer -1. Kopieer `boot.firm` en `boot.3dsx` van de Luma3DS `.zip` naar de hoofdmap van je SD-kaart - + De hoofdmap van de SD-kaart verwijst naar de bovenste map van de SD-kaart, waarin je alle mappen op de SD-kaart kunt zien, waaronder de Nintendo 3DS map, zonder je in de Nintendo 3DS map te bevinden -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Transfer the `.wav` for your region from the Release_sh2e `.zip` to a device that can play `.wav` files, for example a phone -1. Copy the petitcom `.icn` for your region to the root of your SD card - -#### Section II - smilehax - -1. Launch SmileBASIC - + Update the game if prompted -1. Select the "Publish/Download Projects" option -1. Select the "Download (Receive) using Public Key" option -1. Press the "Yes" button -1. Enter the Public Key "NJEQK3A4" using the on-screen keyboard -1. Press the "Yes" button to confirm the download of PMODEM141 -1. Press "OK", then "Back", then "Browse Projects" -1. Select PMODEM141, then press "Select File" -1. Select PMODEM141.PRG, then press "OK", then "Yes" to execute it -1. Select RECEIVE FILE SIMPLEX -1. Prepare the device you use to play the `.wav` file -1. Keep your console about a foot from the `.wav` file playing devices' speaker and use a reasonable (not loud) volume to play the `.wav` -1. Now select 300BPS, then play the `.wav` file -1. When it finishes, press "Yes", then press "OK" -1. Press the START button -1. Select the SH2E-xxx.TXT file, then press OK, then "Yes" to execute it - + If you get kicked back into menu, make sure you're using the latest version of SmileBASIC -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Zet je console uit - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/nl_NL/homebrew-launcher-(steelhax).txt b/_pages/nl_NL/homebrew-launcher-(steelhax).txt deleted file mode 100644 index 48dd5b306e..0000000000 --- a/_pages/nl_NL/homebrew-launcher-(steelhax).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (Steelhax)" ---- - -{% include toc title="Inhoudsopgave" %} - -{% capture technical_info %} -Technical Details (optional) -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Steel Diver: Sub Wars, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Steel Diver: Sub Wars save file, if you have one. If you wish to preserve your Steel Diver: Sub Wars game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### Wat je nodig hebt - -+ The game "Steel Diver: Sub Wars" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Steel Diver: Sub Wars -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Steelhax](/assets/steelhax-release.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructies - -#### Deel I - Voorbereiding - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Zet je console uit -1. Plaats je SD kaart in je computer -1. Kopieer `boot.firm` en `boot.3dsx` van de Luma3DS `.zip` naar de hoofdmap van je SD-kaart - + De hoofdmap van de SD-kaart verwijst naar de bovenste map van de SD-kaart, waarin je alle mappen op de SD-kaart kunt zien, waaronder de Nintendo 3DS map, zonder je in de Nintendo 3DS map te bevinden -1. Copy the `steelhax` folder from the `Steelhax-release.zip` to the root of your SD card -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card -1. Stop je SD-kaart terug in je console -1. Zet je console aan - -#### Section II - Steelminer - -In this section, you will create a hacked Steel Diver: Sub Wars save file that, when used, will load the Homebrew Launcher on your console. - -1. Launch "Steel Diver: Sub Wars" once and select a Mii to initialize your save file - + Decline the game update when prompted - + If you have already updated the game, use the Data Management menu of the System Settings to delete the update -1. Exit "Steel Diver: Sub Wars" -1. Zet je console uit -1. Plaats je SD kaart in je computer -1. Open [the SteelHax Save Tool website](https://3dstools.nhnarwhal.com/#/steelhax) on your computer -1. Select your `movable.sed` file -1. Select your region based on your console -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `<8-character-region>` -> `data` on your SD card - + **EUR Region**: `000d7e00` - + **JPN Region**: `000d7c00` - + **USA Region**: `000d7d00` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted -1. Stop je SD-kaart terug in je console -1. Zet je console aan -1. Launch "Steel Diver: Sub Wars" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Zet je console uit - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/nl_NL/homebrew-launcher-(super-skaterhax).txt b/_pages/nl_NL/homebrew-launcher-(super-skaterhax).txt deleted file mode 100644 index 73a5adfce2..0000000000 --- a/_pages/nl_NL/homebrew-launcher-(super-skaterhax).txt +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: "Homebrew Launcher (super-skaterhax)" ---- - -{% include toc title="Inhoudsopgave" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see [here](https://github.com/zoogie/super-skaterhax). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -Super-skaterhax (when used to launch the Homebrew Launcher) is compatible with New models on version 11.16.0 in all regions, and 11.17.0 in the EUR, JPN and USA regions. - -The instructions provided only apply to the New 3DS, New 3DS XL, and New 2DS XL. Please ensure that the console you are modding is a New 3DS, New 3DS XL, or New 2DS XL before continuing. -{: .notice--warning} - -### Wat je nodig hebt - -* De nieuwste versie van [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (het Luma3DS `.zip` bestand) -* The latest release of [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (the release `.zip` file) - -#### Deel I - Voorbereiding - -In this section, you will copy the files needed to trigger both super-skaterhax and the Homebrew Launcher. - -1. Zet je console uit -1. Plaats je SD kaart in je computer -1. Kopieer `boot.firm` en `boot.3dsx` van de Luma3DS `.zip` naar de hoofdmap van je SD-kaart - + De hoofdmap van de SD-kaart verwijst naar de bovenste map van de SD-kaart, waarin je alle mappen op de SD-kaart kunt zien, waaronder de Nintendo 3DS map, zonder je in de Nintendo 3DS map te bevinden -1. Copy everything inside the folder for your console's region (and also system version if the region is USA) in the super-skaterhax `.zip` to the root of your SD card -1. Stop je SD-kaart terug in je console -1. Zet je console aan - -![]({{ "/images/screenshots/skater-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - super-skaterhax - -In this section, you will visit the browser exploit webpage, which will launch the Homebrew Launcher. - -Als je dat nog niet gedaan hebt, zorg ervoor dat je een werkende internetverbinding hebt ingesteld op je console. -{: .notice--info} - -1. On the HOME Menu, press the Left and Right shoulder buttons at the same time to open the camera - + If you are unable to open the camera, open the Internet Browser and manually type the URL instead (`https://zoogie.github.io/web/super/` for EUR/USA/JPN, `https://zoogie.github.io/web/korea` for KOR) -1. Tap the QR code button and scan one of the following QR codes for your console's region [here](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png) - + If you get a security certificate warning, press (A) to allow the connection -1. Press the (Select) button to open the bookmark tab - + If your (Select) button does not respond, tap the star icon on the bottom-left corner of the screen -1. Tap "Bookmark this page" -1. Press (B) once to return to the browser -1. Press (Start) to open the context menu - + If your (Start) button does not respond, tap the 3-line menu on the bottom-right corner of the screen -1. Tap on "Settings" -1. Tap on "Delete Cookies" -1. Druk op (A) om door te gaan -1. Press (Home) to return to the HOME Menu, then immediately press (A) to launch the browser again -1. Select the "GO GO!" button on the top screen - + If any prompts appear, approve all of them - + If your console freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your console freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section - + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Zet je console uit - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/nl_NL/include/fredtool-prep.txt b/_pages/nl_NL/include/fredtool-prep.txt deleted file mode 100644 index e32162d407..0000000000 --- a/_pages/nl_NL/include/fredtool-prep.txt +++ /dev/null @@ -1,29 +0,0 @@ -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Plaats je SD kaart in je computer -1. Open de [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website op je computer -1. Voer een alfanumerieke naam in onder het "Username" veld (geen spaties of speciale tekens) -1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option -1. Onder het veld "MovableSed", upload je `movable.sed` bestand met behulp van de tweede "Browse..." optie -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Klik op "Build" - + Wacht enkele seconden tot het bouwproces voltooid is -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Klik op het eerste zoekresultaat - + This result should have the latest timestamp -1. Klik op de "output_(name).zip" link -1. Navigeer naar `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` op je SD-kaart - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Kopieer `boot.firm` en `boot.3dsx` van de Luma3DS `.zip` naar de hoofdmap van je SD-kaart - + De hoofdmap van de SD-kaart verwijst naar de bovenste map van de SD-kaart, waarin je alle mappen op de SD-kaart kunt zien, waaronder de Nintendo 3DS map, zonder je in de Nintendo 3DS map te bevinden -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Kopieer de `private` map van de Frogminer_save `.zip` naar de hoofdmap van je SD-kaart -1. Stop je SD-kaart terug in je console -1. Zet je console aan - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} \ No newline at end of file diff --git a/_pages/nl_NL/include/hbl-common-exploits-movable.txt b/_pages/nl_NL/include/hbl-common-exploits-movable.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/nl_NL/include/hbl-common-exploits-movable.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/nl_NL/include/hbl-common-exploits.txt b/_pages/nl_NL/include/hbl-common-exploits.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/nl_NL/include/hbl-common-exploits.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/nl_NL/installing-boot9strap-(fredtool).txt b/_pages/nl_NL/installing-boot9strap-(fredtool).txt deleted file mode 100644 index 3429ac3c44..0000000000 --- a/_pages/nl_NL/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool)" ---- - -{% include toc title="Inhoudsopgave" %} - -{% capture technical_info %} -Technical Details (optional) - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### Wat je nodig hebt - -* je `movable.sed` bestand van het voltooien van [Seedminer](seedminer) -* De nieuwste versie van [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) -* De nieuwste versie van [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (het Luma3DS `.zip` bestand) - -#### Deel I - CFW Controle - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Deel II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Stop je SD-kaart terug in je console -1. Zet je console aan -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Zet je console uit - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Deel V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Doorgaan naar [Installatie voltooien](finalizing-setup) -{: .notice--primary} diff --git a/_pages/nl_NL/installing-boot9strap-(fredtool-legacy).txt b/_pages/nl_NL/installing-boot9strap-(fredtool-legacy).txt deleted file mode 100644 index 1e6f54d888..0000000000 --- a/_pages/nl_NL/installing-boot9strap-(fredtool-legacy).txt +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool, Legacy)" ---- - -{% include toc title="Inhoudsopgave" %} - -{% capture technical_info %} -Technical Details (optional) - -Om DSiWare die op het systeem staat te dumpen naar de SD-kaart, maken we gebruik van een fout in het DSiWare Data Management venster van de Settings applicatie. - -Om dit te bereiken, gebruiken we de encryptiesleutel van je systeem (movable.sed) om een DSiWare back-up te maken die het systeem exploiteert om de DSi Internet Settings applicatie naar de hoofdmap van je SD-kaart te dumpen. - -Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### Wat je nodig hebt - -* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) -* De nieuwste versie van [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) -* De nieuwste versie van [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (het Luma3DS `.zip` bestand) - -#### Deel I - CFW Controle - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Deel II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Stop je SD-kaart terug in je console -1. Zet je console aan -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Zet je console uit - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Deel V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Doorgaan naar [Installatie voltooien](finalizing-setup) -{: .notice--primary} diff --git a/_pages/nl_NL/installing-boot9strap-(frogtool).txt b/_pages/nl_NL/installing-boot9strap-(frogtool).txt deleted file mode 100644 index 79fef347c0..0000000000 --- a/_pages/nl_NL/installing-boot9strap-(frogtool).txt +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Installing boot9strap (Frogtool)" ---- - -{% include toc title="Inhoudsopgave" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see "DSiWare_Exports CTCert verification" and "FIRM partitions known-plaintext" [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - - -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) link for `frogcert.bin` on this page, you will need a torrent client like [qBittorrent](https://www.qbittorrent.org/download.php) or [Deluge](http://dev.deluge-torrent.org/wiki/Download). -{: .notice--warning} - -### Wat je nodig hebt - -* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link) -* The latest release of [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (direct download) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) - -#### Deel I - CFW Controle - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Deel II - Voorbereiding - -1. Zet je console uit -1. Plaats je SD kaart in je computer -1. Kopieer `boot.firm` en `boot.3dsx` van de Luma3DS `.zip` naar de hoofdmap van je SD-kaart -1. Copy `boot.nds` (b9sTool) from the b9sTool release `.zip` to the root of your SD card -1. Maak een map genaamd "3ds" op de hoofdmap van je SD-kaart als die nog niet bestaat - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy the `Frogtool` folder from the Frogtool-nimhax `.zip` to the `/3ds/` folder on your SD card -1. Copy `frogcert.bin` to the root of your SD card -1. Stop je SD-kaart terug in je console -1. Zet je console aan - -#### Section III - Patching DS Download Play - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch Frogtool from the list of homebrew -1. Select the "INJECT patched DS Download Play" option -1. Frogtool will automatically run and inject the JPN version of Flipnote Studio into your DS Download Play -1. Once this operation has finished, read the screens and check if the process was successful -1. Tap the touch screen, then select "BOOT patched DS Download Play" -1. If the exploit was successful, your console will have loaded the JPN version of Flipnote Studio - + If you get stuck on a black screen, follow [this](https://wiki.hacks.guide/wiki/3DS:TWLFix#Userland_(PicHaxx,_Steelhax,_etc.)-0) page, then try again - -#### Section IV - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsdlp" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Deel VII - DS Download Play herstellen - -1. Open de Download Play app -1. Wacht tot je de twee knoppen ziet - + Do not press either of the buttons -1. Druk tegelijkertijd op (L) + (Down) + (Select) om het Rosalina menu te openen -1. Selecteer "Miscellaneous options" -1. Selecteer "Switch the hb. title to the current app." -1. Druk op (B) om door te gaan -1. Druk op (B) om terug te gaan naar het Rosalina hoofdmenu -1. Druk op (B) om het Rosalina menu af te sluiten -1. Druk op (Home), en sluit dan Download Play af -1. Relaunch the Download Play application -1. Your console should load the Homebrew Launcher -1. Launch Frogtool from the list of homebrew -1. Selecteer de "RESTORE clean DS Download Play" optie -1. Once this operation has finished, read the screens and check if the process was successful - + If there are any errors or missing files, correct the problem and try again -1. If the process was successful, tap the touch screen, then press START to exit -1. Zet je console uit - -___ - -### Doorgaan naar [Installatie voltooien](finalizing-setup) -{: .notice--primary} diff --git a/_pages/nl_NL/installing-boot9strap-(hbl-usm).txt b/_pages/nl_NL/installing-boot9strap-(hbl-usm).txt deleted file mode 100644 index 9e704a935b..0000000000 --- a/_pages/nl_NL/installing-boot9strap-(hbl-usm).txt +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "Installing boot9strap (HBL-USM)" ---- - -{% include toc title="Inhoudsopgave" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--danger} - -### Wat je nodig hebt - -* De nieuwste versie van [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (directe download) -* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) (direct download) - -#### Deel I - Voorbereiding - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. Then, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Plaats je SD kaart in je computer -1. Maak een map genaamd `boot9strap` op de hoofdmap van je SD-kaart -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the RELEASE `.zip` to the `/boot9strap/` folder on your SD card -1. Maak een map genaamd "3ds" op de hoofdmap van je SD-kaart als die nog niet bestaat - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Kopieer `slotTool.3dsx` van de `slotTool` map in de RELEASE `.zip` naar de `/3ds/` map op je SD-kaart -1. Copy `usm.bin` from the RELEASE `.zip` to the root folder on your SD card -1. Kopieer `SafeB9SInstaller.bin` van de SafeB9SInstaller `.zip` naar de hoofdmap van je SD-kaart -1. Stop je SD-kaart terug in je console -1. Zet je console aan -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch slotTool from the list of homebrew - + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section -1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option - + You will see some on-screen text and then your system will shut down - -![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Deel III - Boot9strap installeren - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section IV - Restoring WiFi Configuration Profiles - -{% include_relative include/remove-usm-slottool.txt %} - -___ - -### Doorgaan naar [Installatie voltooien](finalizing-setup) -{: .notice--primary} diff --git a/_pages/nl_NL/installing-boot9strap-(usm).txt b/_pages/nl_NL/installing-boot9strap-(usm).txt deleted file mode 100644 index 5c88942590..0000000000 --- a/_pages/nl_NL/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: "Boot9strap installeren (USM)" ---- - -{% include toc title="Inhoudsopgave" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -Deze instructies werken aan de consoles van de VS, Europa, Japan en Korea zoals aangegeven in de letters U, E, J, of K na de systeemversie. - -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--warning} - -### Wat je nodig hebt - -* De nieuwste versie van [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (directe download) -* De nieuwste versie van [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (directe download) -* De nieuwste versie van [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (het Luma3DS `.zip` bestand) -* [usm.bin](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) - - -#### Deel I - Voorbereiding - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. - -1. Your SD card should be inserted in your computer -1. Copy `usm.bin` to the root of your SD card -1. Kopieer `boot.firm` en `boot.3dsx` van de Luma3DS `.zip` naar de hoofdmap van je SD-kaart - + De hoofdmap van de SD-kaart verwijst naar de bovenste map van de SD-kaart, waarin je alle mappen op de SD-kaart kunt zien, waaronder de Nintendo 3DS map, zonder je in de Nintendo 3DS map te bevinden -1. Maak een map genaamd `boot9strap` op de hoofdmap van je SD-kaart -1. Kopieer `boot9strap.firm` en `boot9strap.firm.sha` van de boot9strap `.zip` naar de `/boot9strap/` map op je SD-kaart -1. Kopieer `SafeB9SInstaller.bin` van de SafeB9SInstaller `.zip` naar de hoofdmap van je SD-kaart - -![]({{ "/images/screenshots/usm/usm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Deel II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Stop je SD-kaart terug in je console -1. Zet je console aan -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If the BB3 multihax menu doesn't open, [follow this troubleshooting guide](troubleshooting#bannerbomb3) - + If the BB3 multihax menu says "cfw installed already", you already have custom firmware and should continue from [here](checking-for-cfw) -1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" - + Your console will automatically power off -1. Zet je console aan -1. Launch System Settings on your console -1. Navigate to `Internet Settings` -> `Connection Settings` -1. Ensure that all three connections are named "Haaaaaaaxxxxxxxxx..." - + Do NOT change these settings! - + If all three connections are NOT all named "Haaaaaaaxxxxxxxxx...", STOP! Something went wrong in this section and MUST be fixed before you can continue -1. Zet je console uit - -#### Deel III - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Deel IV - Boot9strap installeren - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Deel V - Wifi-configuratie profielen herstellen - -In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. - -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" - + Your console will automatically reboot -1. Zet je console uit -1. Plaats je SD kaart in je computer -1. Navigeer naar `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` op je SD-kaart -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. Dit bestand is niet meer nodig - -___ - -### Doorgaan naar [Installatie voltooien](finalizing-setup) -{: .notice--primary} diff --git a/_pages/no_NO/dumping-movable-(nimhax).txt b/_pages/no_NO/dumping-movable-(nimhax).txt deleted file mode 100644 index 817b71bd0b..0000000000 --- a/_pages/no_NO/dumping-movable-(nimhax).txt +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: "Dumping Movable (nimhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -To install boot9strap on your console, we derive your console's unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console. - -For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need - -* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Sett inn SD-kortet i datamaskinen din -1. Copy the `nimhax` folder from the nimhax `.zip` to the `/3ds/` folder on your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) -{: .notice--info} - -#### Section II - nimhax - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch nimhax from the list of homebrew -1. If the exploit was successful, a `movable.sed` file will appear on the root of your SD card - -### Next step: Frogtool - -Once you have your console's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \ -While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you're unable to use a torrent client. - -Continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--primary} diff --git a/_pages/no_NO/homebrew-launcher-(freakyhax).txt b/_pages/no_NO/homebrew-launcher-(freakyhax).txt deleted file mode 100644 index 2ee5f3736c..0000000000 --- a/_pages/no_NO/homebrew-launcher-(freakyhax).txt +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: "Homebrew Launcher (freakyhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[freakyhax](https://plutooo.github.io/freakyhax/) is an exploit for the game Freakyforms Deluxe discovered and released by [plutooo](https://github.com/plutooo). It works on versions 9.0.0 through 11.17.0 on EUR, USA and JPN region consoles. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -### What You Need - -+ A EUR/USA/JPN copy of Freakyforms Deluxe (eShop or cartridge) -+ The latest release of [freakyhax](https://github.com/plutooo/freakyhax/releases/latest) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Sett inn SD-kortet i datamaskinen din -1. Copy all files and folders inside the `/build//exploit/` folder from the freakyhax `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - freakyhax - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch Freakyforms Deluxe -1. In the game menu, select `Play -> Camera -> Load a QR code` -1. Select the QR code -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/no_NO/homebrew-launcher-(ninjhax2-dx).txt b/_pages/no_NO/homebrew-launcher-(ninjhax2-dx).txt deleted file mode 100644 index 01ec74a383..0000000000 --- a/_pages/no_NO/homebrew-launcher-(ninjhax2-dx).txt +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "Homebrew Launcher (ninjhax2-dx)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[Ninjhax2](https://github.com/smealum/ninjhax2.x) is an exploit for the game "Cubic Ninja" made by [smealum](https://github.com/smealum). This page uses an updated version of ninjhax by [zoogie](https://github.com/zoogie) called [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx), which supports 11.17.0. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -This process will overwrite your Cubic Ninja save file, if you have one. -{: .notice--warning} - -### What You Need -* The game "Cubic Ninja" -* The latest release of [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx/releases) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Sett inn SD-kortet i datamaskinen din -1. Copy `Launcher.dat` from the folder appropriate for your console from the ninjhax2-dx `.zip` file to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - -#### Section II - ninjhax2-dx -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Cubic Ninja" once and select "Create" - + If prompted, delete all data -1. Select "QR Code" -1. Select "Scan QR Code" -1. On your PC, open the browser and go to [ninjhax2-dx website](https://zoogie.github.io/web/nh2dx/) -1. Select your console's region and hardware -1. On your console, scan the QR code - + If the game exits to the HOME Menu, then the exploit has installed correctly -1. Launch "Cubic Ninja" again -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/no_NO/homebrew-launcher-(pichaxx).txt b/_pages/no_NO/homebrew-launcher-(pichaxx).txt deleted file mode 100644 index 3d638c34ed..0000000000 --- a/_pages/no_NO/homebrew-launcher-(pichaxx).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (PicHaxx)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[PicHaxx](https://github.com/zoogie/pichaxx) is an exploit for the game Pokémon Picross released by [zoogie](https://github.com/zoogie), originally discovered and [demonstrated](https://twitter.com/mrnbayoh/status/744899681663258624) by [MrNbaYoh](https://github.com/MrNbaYoh). - -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Pokémon Picross" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Pokémon Picross -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Prep Work - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Sett inn SD-kortet i datamaskinen din -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card - -![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - PicHaxx - -In this section, you will create a hacked Pokémon Picross save file that, when loaded, will run the Homebrew Launcher on your console. - -1. Open [the PicHaxx Injector website](https://3dstools.nhnarwhal.com/#/pichaxx) on your computer -1. Select your `movable.sed` file -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `0017c100` -> `data` on your SD card - + The `` will be the same one that you used in Seedminer - + The `` is a 32 character long folder inside of the `` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted - - ![]({{ "/images/screenshots/pichaxx-save-location.png" | absolute_url }}) - {: .notice--info} - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Pokémon Picross" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher - + If you get an error message, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-pichaxx) -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/no_NO/homebrew-launcher-(smilehax-iie).txt b/_pages/no_NO/homebrew-launcher-(smilehax-iie).txt deleted file mode 100644 index c37b7785bf..0000000000 --- a/_pages/no_NO/homebrew-launcher-(smilehax-iie).txt +++ /dev/null @@ -1,70 +0,0 @@ ---- -title: "Homebrew Launcher (smilehax-IIe)" ---- - -{% include toc title="Table of Contents" %} - -This set of instructions does not support the Japanese version of SmileBASIC. -{: .notice--warning} - -{% capture technical_info %} -Technical Details (optional) -[smilehax-IIe](https://github.com/zoogie/smilehax-IIe) is an exploit for the game "SmileBASIC" made by zoogie, compatible with system versions 9.0.0 through 11.17.0 for USA/EUR/JPN region consoles. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need -+ The game "SmileBASIC" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install SmileBASIC -+ The latest release of [smilehax-IIe](https://github.com/zoogie/smilehax-IIe/releases/download/v1.1/Release_sh2e_v1.1.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Sett inn SD-kortet i datamaskinen din -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Transfer the `.wav` for your region from the Release_sh2e `.zip` to a device that can play `.wav` files, for example a phone -1. Copy the petitcom `.icn` for your region to the root of your SD card - -#### Section II - smilehax - -1. Launch SmileBASIC - + Update the game if prompted -1. Select the "Publish/Download Projects" option -1. Select the "Download (Receive) using Public Key" option -1. Press the "Yes" button -1. Enter the Public Key "NJEQK3A4" using the on-screen keyboard -1. Press the "Yes" button to confirm the download of PMODEM141 -1. Press "OK", then "Back", then "Browse Projects" -1. Select PMODEM141, then press "Select File" -1. Select PMODEM141.PRG, then press "OK", then "Yes" to execute it -1. Select RECEIVE FILE SIMPLEX -1. Prepare the device you use to play the `.wav` file -1. Keep your console about a foot from the `.wav` file playing devices' speaker and use a reasonable (not loud) volume to play the `.wav` -1. Now select 300BPS, then play the `.wav` file -1. When it finishes, press "Yes", then press "OK" -1. Press the START button -1. Select the SH2E-xxx.TXT file, then press OK, then "Yes" to execute it - + If you get kicked back into menu, make sure you're using the latest version of SmileBASIC -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/no_NO/homebrew-launcher-(steelhax).txt b/_pages/no_NO/homebrew-launcher-(steelhax).txt deleted file mode 100644 index d1b7e5c534..0000000000 --- a/_pages/no_NO/homebrew-launcher-(steelhax).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (Steelhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Steel Diver: Sub Wars, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Steel Diver: Sub Wars save file, if you have one. If you wish to preserve your Steel Diver: Sub Wars game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Steel Diver: Sub Wars" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Steel Diver: Sub Wars -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Steelhax](/assets/steelhax-release.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Prep Work - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Sett inn SD-kortet i datamaskinen din -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the `steelhax` folder from the `Steelhax-release.zip` to the root of your SD card -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - Steelminer - -In this section, you will create a hacked Steel Diver: Sub Wars save file that, when used, will load the Homebrew Launcher on your console. - -1. Launch "Steel Diver: Sub Wars" once and select a Mii to initialize your save file - + Decline the game update when prompted - + If you have already updated the game, use the Data Management menu of the System Settings to delete the update -1. Exit "Steel Diver: Sub Wars" -1. Power off your console -1. Sett inn SD-kortet i datamaskinen din -1. Open [the SteelHax Save Tool website](https://3dstools.nhnarwhal.com/#/steelhax) on your computer -1. Select your `movable.sed` file -1. Select your region based on your console -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `<8-character-region>` -> `data` on your SD card - + **EUR Region**: `000d7e00` - + **JPN Region**: `000d7c00` - + **USA Region**: `000d7d00` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Steel Diver: Sub Wars" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/no_NO/homebrew-launcher-(super-skaterhax).txt b/_pages/no_NO/homebrew-launcher-(super-skaterhax).txt deleted file mode 100644 index e4255c1701..0000000000 --- a/_pages/no_NO/homebrew-launcher-(super-skaterhax).txt +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: "Homebrew Launcher (super-skaterhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see [here](https://github.com/zoogie/super-skaterhax). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -Super-skaterhax (when used to launch the Homebrew Launcher) is compatible with New models on version 11.16.0 in all regions, and 11.17.0 in the EUR, JPN and USA regions. - -The instructions provided only apply to the New 3DS, New 3DS XL, and New 2DS XL. Please ensure that the console you are modding is a New 3DS, New 3DS XL, or New 2DS XL before continuing. -{: .notice--warning} - -### What You Need - -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* The latest release of [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (the release `.zip` file) - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger both super-skaterhax and the Homebrew Launcher. - -1. Power off your console -1. Sett inn SD-kortet i datamaskinen din -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy everything inside the folder for your console's region (and also system version if the region is USA) in the super-skaterhax `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/skater-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - super-skaterhax - -In this section, you will visit the browser exploit webpage, which will launch the Homebrew Launcher. - -If you haven't already, make sure you have a working Internet connection set up on your console. -{: .notice--info} - -1. On the HOME Menu, press the Left and Right shoulder buttons at the same time to open the camera - + If you are unable to open the camera, open the Internet Browser and manually type the URL instead (`https://zoogie.github.io/web/super/` for EUR/USA/JPN, `https://zoogie.github.io/web/korea` for KOR) -1. Tap the QR code button and scan one of the following QR codes for your console's region [here](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png) - + If you get a security certificate warning, press (A) to allow the connection -1. Press the (Select) button to open the bookmark tab - + If your (Select) button does not respond, tap the star icon on the bottom-left corner of the screen -1. Tap "Bookmark this page" -1. Press (B) once to return to the browser -1. Press (Start) to open the context menu - + If your (Start) button does not respond, tap the 3-line menu on the bottom-right corner of the screen -1. Tap on "Settings" -1. Tap on "Delete Cookies" -1. Trykk (A) for å fortsette -1. Press (Home) to return to the HOME Menu, then immediately press (A) to launch the browser again -1. Select the "GO GO!" button on the top screen - + If any prompts appear, approve all of them - + If your console freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your console freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section - + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/no_NO/include/fredtool-prep.txt b/_pages/no_NO/include/fredtool-prep.txt deleted file mode 100644 index ae20577ef4..0000000000 --- a/_pages/no_NO/include/fredtool-prep.txt +++ /dev/null @@ -1,29 +0,0 @@ -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Sett inn SD-kortet i datamaskinen din -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} \ No newline at end of file diff --git a/_pages/no_NO/include/hbl-common-exploits-movable.txt b/_pages/no_NO/include/hbl-common-exploits-movable.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/no_NO/include/hbl-common-exploits-movable.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/no_NO/include/hbl-common-exploits.txt b/_pages/no_NO/include/hbl-common-exploits.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/no_NO/include/hbl-common-exploits.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/no_NO/installing-boot9strap-(fredtool).txt b/_pages/no_NO/installing-boot9strap-(fredtool).txt deleted file mode 100644 index a06a1259f2..0000000000 --- a/_pages/no_NO/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer](seedminer) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/no_NO/installing-boot9strap-(fredtool-legacy).txt b/_pages/no_NO/installing-boot9strap-(fredtool-legacy).txt deleted file mode 100644 index 7e88fb51b4..0000000000 --- a/_pages/no_NO/installing-boot9strap-(fredtool-legacy).txt +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool, Legacy)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. - -Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/no_NO/installing-boot9strap-(frogtool).txt b/_pages/no_NO/installing-boot9strap-(frogtool).txt deleted file mode 100644 index e55abd76eb..0000000000 --- a/_pages/no_NO/installing-boot9strap-(frogtool).txt +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Installing boot9strap (Frogtool)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see "DSiWare_Exports CTCert verification" and "FIRM partitions known-plaintext" [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - - -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) link for `frogcert.bin` on this page, you will need a torrent client like [qBittorrent](https://www.qbittorrent.org/download.php) or [Deluge](http://dev.deluge-torrent.org/wiki/Download). -{: .notice--warning} - -### What You Need - -* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link) -* The latest release of [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (direct download) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - Prep Work - -1. Power off your console -1. Sett inn SD-kortet i datamaskinen din -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Copy `boot.nds` (b9sTool) from the b9sTool release `.zip` to the root of your SD card -1. Create a folder named `3ds` on the root of your SD card if it does not already exist - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy the `Frogtool` folder from the Frogtool-nimhax `.zip` to the `/3ds/` folder on your SD card -1. Copy `frogcert.bin` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section III - Patching DS Download Play - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch Frogtool from the list of homebrew -1. Select the "INJECT patched DS Download Play" option -1. Frogtool will automatically run and inject the JPN version of Flipnote Studio into your DS Download Play -1. Once this operation has finished, read the screens and check if the process was successful -1. Tap the touch screen, then select "BOOT patched DS Download Play" -1. If the exploit was successful, your console will have loaded the JPN version of Flipnote Studio - + If you get stuck on a black screen, follow [this](https://wiki.hacks.guide/wiki/3DS:TWLFix#Userland_(PicHaxx,_Steelhax,_etc.)-0) page, then try again - -#### Section IV - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsdlp" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Download Play - -1. Launch the Download Play application -1. Wait until you see the two buttons - + Do not press either of the buttons -1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu -1. Select "Miscellaneous options" -1. Select "Switch the hb. title to the current app." -1. Press (B) to continue -1. Press (B) to return to the Rosalina main menu -1. Press (B) to exit the Rosalina menu -1. Press (Home), then close Download Play -1. Relaunch the Download Play application -1. Your console should load the Homebrew Launcher -1. Launch Frogtool from the list of homebrew -1. Select the "RESTORE clean DS Download Play" option -1. Once this operation has finished, read the screens and check if the process was successful - + If there are any errors or missing files, correct the problem and try again -1. If the process was successful, tap the touch screen, then press START to exit -1. Power off your console - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/no_NO/installing-boot9strap-(hbl-usm).txt b/_pages/no_NO/installing-boot9strap-(hbl-usm).txt deleted file mode 100644 index b3d5cb12c6..0000000000 --- a/_pages/no_NO/installing-boot9strap-(hbl-usm).txt +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "Installing boot9strap (HBL-USM)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--danger} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) (direct download) - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. Then, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Sett inn SD-kortet i datamaskinen din -1. Create a folder named `boot9strap` on the root of your SD card -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the RELEASE `.zip` to the `/boot9strap/` folder on your SD card -1. Create a folder named `3ds` on the root of your SD card if it does not already exist - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy `slotTool.3dsx` from the `slotTool` folder inside the RELEASE `.zip` to the `/3ds/` folder on your SD card -1. Copy `usm.bin` from the RELEASE `.zip` to the root folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch slotTool from the list of homebrew - + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section -1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option - + You will see some on-screen text and then your system will shut down - -![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section III - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section IV - Restoring WiFi Configuration Profiles - -{% include_relative include/remove-usm-slottool.txt %} - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/no_NO/installing-boot9strap-(usm).txt b/_pages/no_NO/installing-boot9strap-(usm).txt deleted file mode 100644 index 4e1afe571e..0000000000 --- a/_pages/no_NO/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: "Installing boot9strap (USM)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. - -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--warning} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* [usm.bin](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) - - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. - -1. Your SD card should be inserted in your computer -1. Copy `usm.bin` to the root of your SD card -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Create a folder named `boot9strap` on the root of your SD card -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card - -![]({{ "/images/screenshots/usm/usm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If the BB3 multihax menu doesn't open, [follow this troubleshooting guide](troubleshooting#bannerbomb3) - + If the BB3 multihax menu says "cfw installed already", you already have custom firmware and should continue from [here](checking-for-cfw) -1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" - + Your console will automatically power off -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Internet Settings` -> `Connection Settings` -1. Ensure that all three connections are named "Haaaaaaaxxxxxxxxx..." - + Do NOT change these settings! - + If all three connections are NOT all named "Haaaaaaaxxxxxxxxx...", STOP! Something went wrong in this section and MUST be fixed before you can continue -1. Power off your console - -#### Section III - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section IV - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section V - Restoring WiFi Configuration Profiles - -In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. - -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" - + Your console will automatically reboot -1. Power off your console -1. Sett inn SD-kortet i datamaskinen din -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/pl_PL/dumping-movable-(nimhax).txt b/_pages/pl_PL/dumping-movable-(nimhax).txt deleted file mode 100644 index 6fb997ce39..0000000000 --- a/_pages/pl_PL/dumping-movable-(nimhax).txt +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: "Dumping Movable (nimhax)" ---- - -{% include toc title="Spis Treści" %} - -{% capture technical_info %} -Technical Details (optional) - -To install boot9strap on your console, we derive your console's unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console. - -For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Czego Potrzebujesz - -* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file) - -### Instrukcje - -#### Sekcja I - Przygotowanie - -1. Power off your console -1. Włóż kartę SD do komputera -1. Copy the `nimhax` folder from the nimhax `.zip` to the `/3ds/` folder on your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) -{: .notice--info} - -#### Section II - nimhax - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch nimhax from the list of homebrew -1. If the exploit was successful, a `movable.sed` file will appear on the root of your SD card - -### Next step: Frogtool - -Once you have your console's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \ -While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you're unable to use a torrent client. - -Continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--primary} diff --git a/_pages/pl_PL/homebrew-launcher-(freakyhax).txt b/_pages/pl_PL/homebrew-launcher-(freakyhax).txt deleted file mode 100644 index f7e70a091c..0000000000 --- a/_pages/pl_PL/homebrew-launcher-(freakyhax).txt +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: "Homebrew Launcher (freakyhax)" ---- - -{% include toc title="Spis Treści" %} - -{% capture technical_info %} -Technical Details (optional) -[freakyhax](https://plutooo.github.io/freakyhax/) is an exploit for the game Freakyforms Deluxe discovered and released by [plutooo](https://github.com/plutooo). It works on versions 9.0.0 through 11.17.0 on EUR, USA and JPN region consoles. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -### Czego Potrzebujesz - -+ A EUR/USA/JPN copy of Freakyforms Deluxe (eShop or cartridge) -+ The latest release of [freakyhax](https://github.com/plutooo/freakyhax/releases/latest) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instrukcje - -#### Sekcja I - Przygotowanie - -1. Power off your console -1. Włóż kartę SD do komputera -1. Copy all files and folders inside the `/build//exploit/` folder from the freakyhax `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - freakyhax - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch Freakyforms Deluxe -1. In the game menu, select `Play -> Camera -> Load a QR code` -1. Select the QR code -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/pl_PL/homebrew-launcher-(ninjhax2-dx).txt b/_pages/pl_PL/homebrew-launcher-(ninjhax2-dx).txt deleted file mode 100644 index c8591ae762..0000000000 --- a/_pages/pl_PL/homebrew-launcher-(ninjhax2-dx).txt +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "Homebrew Launcher (ninjhax2-dx)" ---- - -{% include toc title="Spis Treści" %} - -{% capture technical_info %} -Technical Details (optional) -[Ninjhax2](https://github.com/smealum/ninjhax2.x) is an exploit for the game "Cubic Ninja" made by [smealum](https://github.com/smealum). This page uses an updated version of ninjhax by [zoogie](https://github.com/zoogie) called [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx), which supports 11.17.0. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -This process will overwrite your Cubic Ninja save file, if you have one. -{: .notice--warning} - -### Czego Potrzebujesz -* The game "Cubic Ninja" -* The latest release of [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx/releases) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -### Instrukcje - -#### Sekcja I - Przygotowanie - -1. Power off your console -1. Włóż kartę SD do komputera -1. Copy `Launcher.dat` from the folder appropriate for your console from the ninjhax2-dx `.zip` file to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - -#### Section II - ninjhax2-dx -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Cubic Ninja" once and select "Create" - + If prompted, delete all data -1. Select "QR Code" -1. Select "Scan QR Code" -1. On your PC, open the browser and go to [ninjhax2-dx website](https://zoogie.github.io/web/nh2dx/) -1. Select your console's region and hardware -1. On your console, scan the QR code - + If the game exits to the HOME Menu, then the exploit has installed correctly -1. Launch "Cubic Ninja" again -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/pl_PL/homebrew-launcher-(pichaxx).txt b/_pages/pl_PL/homebrew-launcher-(pichaxx).txt deleted file mode 100644 index 829dced54f..0000000000 --- a/_pages/pl_PL/homebrew-launcher-(pichaxx).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (PicHaxx)" ---- - -{% include toc title="Spis Treści" %} - -{% capture technical_info %} -Technical Details (optional) -[PicHaxx](https://github.com/zoogie/pichaxx) is an exploit for the game Pokémon Picross released by [zoogie](https://github.com/zoogie), originally discovered and [demonstrated](https://twitter.com/mrnbayoh/status/744899681663258624) by [MrNbaYoh](https://github.com/MrNbaYoh). - -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### Czego Potrzebujesz - -+ The game "Pokémon Picross" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Pokémon Picross -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instrukcje - -#### Sekcja I - Przygotowanie - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Włóż kartę SD do komputera -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card - -![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - PicHaxx - -In this section, you will create a hacked Pokémon Picross save file that, when loaded, will run the Homebrew Launcher on your console. - -1. Open [the PicHaxx Injector website](https://3dstools.nhnarwhal.com/#/pichaxx) on your computer -1. Select your `movable.sed` file -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `0017c100` -> `data` on your SD card - + The `` will be the same one that you used in Seedminer - + The `` is a 32 character long folder inside of the `` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted - - ![]({{ "/images/screenshots/pichaxx-save-location.png" | absolute_url }}) - {: .notice--info} - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Pokémon Picross" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher - + If you get an error message, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-pichaxx) -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/pl_PL/homebrew-launcher-(smilehax-iie).txt b/_pages/pl_PL/homebrew-launcher-(smilehax-iie).txt deleted file mode 100644 index dda3f58d2a..0000000000 --- a/_pages/pl_PL/homebrew-launcher-(smilehax-iie).txt +++ /dev/null @@ -1,70 +0,0 @@ ---- -title: "Homebrew Launcher (smilehax-IIe)" ---- - -{% include toc title="Spis Treści" %} - -This set of instructions does not support the Japanese version of SmileBASIC. -{: .notice--warning} - -{% capture technical_info %} -Technical Details (optional) -[smilehax-IIe](https://github.com/zoogie/smilehax-IIe) is an exploit for the game "SmileBASIC" made by zoogie, compatible with system versions 9.0.0 through 11.17.0 for USA/EUR/JPN region consoles. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Czego Potrzebujesz -+ The game "SmileBASIC" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install SmileBASIC -+ The latest release of [smilehax-IIe](https://github.com/zoogie/smilehax-IIe/releases/download/v1.1/Release_sh2e_v1.1.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instrukcje - -#### Sekcja I - Przygotowanie - -1. Power off your console -1. Włóż kartę SD do komputera -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Transfer the `.wav` for your region from the Release_sh2e `.zip` to a device that can play `.wav` files, for example a phone -1. Copy the petitcom `.icn` for your region to the root of your SD card - -#### Section II - smilehax - -1. Launch SmileBASIC - + Update the game if prompted -1. Select the "Publish/Download Projects" option -1. Select the "Download (Receive) using Public Key" option -1. Press the "Yes" button -1. Enter the Public Key "NJEQK3A4" using the on-screen keyboard -1. Press the "Yes" button to confirm the download of PMODEM141 -1. Press "OK", then "Back", then "Browse Projects" -1. Select PMODEM141, then press "Select File" -1. Select PMODEM141.PRG, then press "OK", then "Yes" to execute it -1. Select RECEIVE FILE SIMPLEX -1. Prepare the device you use to play the `.wav` file -1. Keep your console about a foot from the `.wav` file playing devices' speaker and use a reasonable (not loud) volume to play the `.wav` -1. Now select 300BPS, then play the `.wav` file -1. When it finishes, press "Yes", then press "OK" -1. Press the START button -1. Select the SH2E-xxx.TXT file, then press OK, then "Yes" to execute it - + If you get kicked back into menu, make sure you're using the latest version of SmileBASIC -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/pl_PL/homebrew-launcher-(steelhax).txt b/_pages/pl_PL/homebrew-launcher-(steelhax).txt deleted file mode 100644 index cbfa3e11e9..0000000000 --- a/_pages/pl_PL/homebrew-launcher-(steelhax).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (Steelhax)" ---- - -{% include toc title="Spis Treści" %} - -{% capture technical_info %} -Technical Details (optional) -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Steel Diver: Sub Wars, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Steel Diver: Sub Wars save file, if you have one. If you wish to preserve your Steel Diver: Sub Wars game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### Czego Potrzebujesz - -+ The game "Steel Diver: Sub Wars" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Steel Diver: Sub Wars -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Steelhax](/assets/steelhax-release.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instrukcje - -#### Sekcja I - Przygotowanie - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Włóż kartę SD do komputera -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the `steelhax` folder from the `Steelhax-release.zip` to the root of your SD card -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - Steelminer - -In this section, you will create a hacked Steel Diver: Sub Wars save file that, when used, will load the Homebrew Launcher on your console. - -1. Launch "Steel Diver: Sub Wars" once and select a Mii to initialize your save file - + Decline the game update when prompted - + If you have already updated the game, use the Data Management menu of the System Settings to delete the update -1. Exit "Steel Diver: Sub Wars" -1. Power off your console -1. Włóż kartę SD do komputera -1. Open [the SteelHax Save Tool website](https://3dstools.nhnarwhal.com/#/steelhax) on your computer -1. Select your `movable.sed` file -1. Select your region based on your console -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `<8-character-region>` -> `data` on your SD card - + **EUR Region**: `000d7e00` - + **JPN Region**: `000d7c00` - + **USA Region**: `000d7d00` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Steel Diver: Sub Wars" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/pl_PL/homebrew-launcher-(super-skaterhax).txt b/_pages/pl_PL/homebrew-launcher-(super-skaterhax).txt deleted file mode 100644 index e479219e1c..0000000000 --- a/_pages/pl_PL/homebrew-launcher-(super-skaterhax).txt +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: "Homebrew Launcher (super-skaterhax)" ---- - -{% include toc title="Spis Treści" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see [here](https://github.com/zoogie/super-skaterhax). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -Super-skaterhax (when used to launch the Homebrew Launcher) is compatible with New models on version 11.16.0 in all regions, and 11.17.0 in the EUR, JPN and USA regions. - -The instructions provided only apply to the New 3DS, New 3DS XL, and New 2DS XL. Please ensure that the console you are modding is a New 3DS, New 3DS XL, or New 2DS XL before continuing. -{: .notice--warning} - -### Czego Potrzebujesz - -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* The latest release of [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (the release `.zip` file) - -#### Sekcja I - Przygotowanie - -In this section, you will copy the files needed to trigger both super-skaterhax and the Homebrew Launcher. - -1. Power off your console -1. Włóż kartę SD do komputera -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy everything inside the folder for your console's region (and also system version if the region is USA) in the super-skaterhax `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/skater-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - super-skaterhax - -In this section, you will visit the browser exploit webpage, which will launch the Homebrew Launcher. - -If you haven't already, make sure you have a working Internet connection set up on your console. -{: .notice--info} - -1. On the HOME Menu, press the Left and Right shoulder buttons at the same time to open the camera - + If you are unable to open the camera, open the Internet Browser and manually type the URL instead (`https://zoogie.github.io/web/super/` for EUR/USA/JPN, `https://zoogie.github.io/web/korea` for KOR) -1. Tap the QR code button and scan one of the following QR codes for your console's region [here](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png) - + If you get a security certificate warning, press (A) to allow the connection -1. Press the (Select) button to open the bookmark tab - + If your (Select) button does not respond, tap the star icon on the bottom-left corner of the screen -1. Tap "Bookmark this page" -1. Press (B) once to return to the browser -1. Press (Start) to open the context menu - + If your (Start) button does not respond, tap the 3-line menu on the bottom-right corner of the screen -1. Tap on "Settings" -1. Tap on "Delete Cookies" -1. Naciśnij (A), aby kontynuować -1. Press (Home) to return to the HOME Menu, then immediately press (A) to launch the browser again -1. Select the "GO GO!" button on the top screen - + If any prompts appear, approve all of them - + If your console freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your console freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section - + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/pl_PL/include/fredtool-prep.txt b/_pages/pl_PL/include/fredtool-prep.txt deleted file mode 100644 index 028fdc6be7..0000000000 --- a/_pages/pl_PL/include/fredtool-prep.txt +++ /dev/null @@ -1,29 +0,0 @@ -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Włóż kartę SD do komputera -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Skopiuj folder `private` z katalogu Frogminer_save `.zip` do głównego katalogu Twojej karty SD -1. Reinsert your SD card into your console -1. Power on your console - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} \ No newline at end of file diff --git a/_pages/pl_PL/include/hbl-common-exploits-movable.txt b/_pages/pl_PL/include/hbl-common-exploits-movable.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/pl_PL/include/hbl-common-exploits-movable.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/pl_PL/include/hbl-common-exploits.txt b/_pages/pl_PL/include/hbl-common-exploits.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/pl_PL/include/hbl-common-exploits.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/pl_PL/installing-boot9strap-(fredtool).txt b/_pages/pl_PL/installing-boot9strap-(fredtool).txt deleted file mode 100644 index 94cb2e63b5..0000000000 --- a/_pages/pl_PL/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool)" ---- - -{% include toc title="Spis Treści" %} - -{% capture technical_info %} -Technical Details (optional) - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### Czego Potrzebujesz - -* Twojego pliku `movable.sed` z ukończenia [Seedminer](seedminer) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Kontynuuj do [Finalizowanie Instalacji](finalizing-setup) -{: .notice--primary} diff --git a/_pages/pl_PL/installing-boot9strap-(fredtool-legacy).txt b/_pages/pl_PL/installing-boot9strap-(fredtool-legacy).txt deleted file mode 100644 index 56778787dc..0000000000 --- a/_pages/pl_PL/installing-boot9strap-(fredtool-legacy).txt +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool, Legacy)" ---- - -{% include toc title="Spis Treści" %} - -{% capture technical_info %} -Technical Details (optional) - -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. - -Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### Czego Potrzebujesz - -* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Kontynuuj do [Finalizowanie Instalacji](finalizing-setup) -{: .notice--primary} diff --git a/_pages/pl_PL/installing-boot9strap-(frogtool).txt b/_pages/pl_PL/installing-boot9strap-(frogtool).txt deleted file mode 100644 index b190fcb291..0000000000 --- a/_pages/pl_PL/installing-boot9strap-(frogtool).txt +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Installing boot9strap (Frogtool)" ---- - -{% include toc title="Spis Treści" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see "DSiWare_Exports CTCert verification" and "FIRM partitions known-plaintext" [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - - -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) link for `frogcert.bin` on this page, you will need a torrent client like [qBittorrent](https://www.qbittorrent.org/download.php) or [Deluge](http://dev.deluge-torrent.org/wiki/Download). -{: .notice--warning} - -### Czego Potrzebujesz - -* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link) -* The latest release of [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (direct download) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Sekcja II - Przygotowanie - -1. Power off your console -1. Włóż kartę SD do komputera -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Copy `boot.nds` (b9sTool) from the b9sTool release `.zip` to the root of your SD card -1. Stwórz folder o nazwie `3ds` w głównym katalogu twojej karty SD, jeśli jeszcze nie istnieje - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy the `Frogtool` folder from the Frogtool-nimhax `.zip` to the `/3ds/` folder on your SD card -1. Copy `frogcert.bin` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section III - Patching DS Download Play - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch Frogtool from the list of homebrew -1. Select the "INJECT patched DS Download Play" option -1. Frogtool will automatically run and inject the JPN version of Flipnote Studio into your DS Download Play -1. Once this operation has finished, read the screens and check if the process was successful -1. Tap the touch screen, then select "BOOT patched DS Download Play" -1. If the exploit was successful, your console will have loaded the JPN version of Flipnote Studio - + If you get stuck on a black screen, follow [this](https://wiki.hacks.guide/wiki/3DS:TWLFix#Homebrew_Launcher-0) page, then try again - -#### Section IV - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsdlp" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Download Play - -1. Uruchom aplikację Download Play -1. Wait until you see the two buttons - + Do not press either of the buttons -1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu -1. Wybierz "Miscellaneous options" -1. Wybierz "Switch the hb. title to the current app." -1. Naciśnij (B) aby kontynuować -1. Naciśnij (B) aby powrócić do głównego menu Rosalina -1. Naciśnij (B) aby zamknąć menu Rosalina -1. Naciśnij (Home), a następnie zamknij aplikację Download Play -1. Relaunch the Download Play application -1. Your console should load the Homebrew Launcher -1. Launch Frogtool from the list of homebrew -1. Select the "RESTORE clean DS Download Play" option -1. Once this operation has finished, read the screens and check if the process was successful - + If there are any errors or missing files, correct the problem and try again -1. If the process was successful, tap the touch screen, then press START to exit -1. Power off your console - -___ - -### Kontynuuj do [Finalizowanie Instalacji](finalizing-setup) -{: .notice--primary} diff --git a/_pages/pl_PL/installing-boot9strap-(hbl-usm).txt b/_pages/pl_PL/installing-boot9strap-(hbl-usm).txt deleted file mode 100644 index f6287a1832..0000000000 --- a/_pages/pl_PL/installing-boot9strap-(hbl-usm).txt +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "Installing boot9strap (HBL-USM)" ---- - -{% include toc title="Spis Treści" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--danger} - -### Czego Potrzebujesz - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) (direct download) - -#### Sekcja I - Przygotowanie - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. Then, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Włóż kartę SD do komputera -1. Stwórz folder o nazwie `boot9strap` w katalogu głównym karty SD -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the RELEASE `.zip` to the `/boot9strap/` folder on your SD card -1. Stwórz folder o nazwie `3ds` w głównym katalogu twojej karty SD, jeśli jeszcze nie istnieje - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy `slotTool.3dsx` from the `slotTool` folder inside the RELEASE `.zip` to the `/3ds/` folder on your SD card -1. Copy `usm.bin` from the RELEASE `.zip` to the root folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch slotTool from the list of homebrew - + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section -1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option - + You will see some on-screen text and then your system will shut down - -![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Sekcja III - Instalacja boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section IV - Restoring WiFi Configuration Profiles - -{% include_relative include/remove-usm-slottool.txt %} - -___ - -### Kontynuuj do [Finalizowanie Instalacji](finalizing-setup) -{: .notice--primary} diff --git a/_pages/pl_PL/installing-boot9strap-(usm).txt b/_pages/pl_PL/installing-boot9strap-(usm).txt deleted file mode 100644 index a7f31e5582..0000000000 --- a/_pages/pl_PL/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: "Installing boot9strap (USM)" ---- - -{% include toc title="Spis Treści" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. - -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--warning} - -### Czego Potrzebujesz - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* [usm.bin](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) - - -#### Sekcja I - Przygotowanie - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. - -1. Your SD card should be inserted in your computer -1. Copy `usm.bin` to the root of your SD card -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Stwórz folder o nazwie `boot9strap` w katalogu głównym karty SD -1. Skopiuj `boot9strap.firm` i `boot9strap.firm.sha` z boot9strap `.zip` do folderu `/boot9strap/` na karcie SD -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card - -![]({{ "/images/screenshots/usm/usm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If the BB3 multihax menu doesn't open, [follow this troubleshooting guide](troubleshooting#bannerbomb3) - + If the BB3 multihax menu says "cfw installed already", you already have custom firmware and should continue from [here](checking-for-cfw) -1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" - + Your console will automatically power off -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Internet Settings` -> `Connection Settings` -1. Ensure that all three connections are named "Haaaaaaaxxxxxxxxx..." - + Do NOT change these settings! - + If all three connections are NOT all named "Haaaaaaaxxxxxxxxx...", STOP! Something went wrong in this section and MUST be fixed before you can continue -1. Power off your console - -#### Section III - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section IV - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section V - Restoring WiFi Configuration Profiles - -In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. - -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" - + Your console will automatically reboot -1. Power off your console -1. Włóż kartę SD do komputera -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore - -___ - -### Kontynuuj do [Finalizowanie Instalacji](finalizing-setup) -{: .notice--primary} diff --git a/_pages/pt_BR/dumping-movable-(nimhax).txt b/_pages/pt_BR/dumping-movable-(nimhax).txt deleted file mode 100644 index 14c25db782..0000000000 --- a/_pages/pt_BR/dumping-movable-(nimhax).txt +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: "Dump do Movable (nimhax)" ---- - -{% include toc title="Tabela de Conteúdo" %} - -{% capture technical_info %} -Detalhes técnicos (opcional) - -Para instalar o boot9strap no seu console, nós derivamos a chave de criptografia exclusiva do seu console. Para fazer isso, usamos o Homebrew Launcher para iniciar o nimhax e fazer um dump da chave de criptografia de dados (movable.sed) do seu console. - -Para obter uma explicação mais técnica, consulte [aqui](https://github.com/luigoalma/nimhax/) para obter informações sobre o exploit nimhax. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### O que é necessário - -* A versão mais recente do [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (o arquivo `.zip` do nimhax) - -### Instruções - -#### Seção I - Preparação - -1. Desligue seu console -1. Insira o cartão SD no seu computador -1. Copie a pasta `nimhax` do nimhax `.zip` para a pasta `/3ds/` no seu cartão SD -1. Reinsira o cartão SD no seu console -1. Ligue o seu console - -![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) -{: .notice--info} - -#### Seção II - nimhax - -1. Abra o Homebrew Launcher através do seu método de escolha (provavelmente o Navegador de Internet) -1. Abra o nimhax da lista de homebrew -1. Se o exploit obtiver sucesso, um arquivo `movable.sed` aparecerá na raiz do seu cartão SD - -### Próximo passo: Frogtool - -Assim que você tiver a chave de criptografia do console (`movable.sed`), você poderá usá-la em conjunto com o Frogtool, que usa seu arquivo `movable.sed` para injetar e fazer exploit do JPN Flipnote Studio. \ -Enquanto esse método é mais rápido, ele requer baixar um arquivo com um cliente torrent. Não siga este método se você não for capaz de usar um cliente torrent. - -Continue em [Instalando boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--primary} diff --git a/_pages/pt_BR/homebrew-launcher-(freakyhax).txt b/_pages/pt_BR/homebrew-launcher-(freakyhax).txt deleted file mode 100644 index ed280a52d3..0000000000 --- a/_pages/pt_BR/homebrew-launcher-(freakyhax).txt +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: "Homebrew Launcher (freakyhax)" ---- - -{% include toc title="Tabela de Conteúdo" %} - -{% capture technical_info %} -Detalhes técnicos (opcional) -[freakyhax](https://plutooo.github.io/freakyhax/) é um exploit para o jogo Freakyforms Deluxe descoberto e publicado por [plutooo](https://github.com/plutooo). Funciona nas versões de 9.0.0 a 11.17.0 nos consoles da região EUR, EUA e JPN. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -Este método requer uma câmera de 3DS funcional. -{: .notice--info} - -### O que é necessário - -+ Uma cópia EUR/EUA/JPN de Freakyforms Deluxe (eShop ou cartucho) -+ A versão mais recente do [freakyhax](https://github.com/plutooo/freakyhax/releases/latest) -* A versão mais recente do [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (o arquivo `.zip` do Luma3DS) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (download direto) - -### Instruções - -#### Seção I - Preparação - -1. Desligue seu console -1. Insira o cartão SD no seu computador -1. Copie todos os arquivos e pastas dentro da pasta `/build//exploit/` do `.zip` do freakyhax para a raiz do seu cartão SD - + A raiz do cartão SD refere-se ao diretório inicial no seu cartão SD onde você pode ver a pasta Nintendo 3DS, mas não está dentro dela -1. Copie o otherapp payload para o seu modelo/região/versão do `otherapps.zip` para a raiz do seu cartão SD, e então renomeie o payload para `otherapp.bin` - + Não adicione a extensão `.bin` se você não a vê -1. Copie `boot.firm` e `boot.3dsx` do `.zip` do Luma3DS para a raiz do seu cartão SD -1. Reinsira o cartão SD no seu console -1. Ligue o seu console - -#### Seção II - freakyhax - -1. Reinsira o cartão SD no seu console -1. Ligue o seu console -1. Inicie Freakyforms Deluxe -1. No menu do jogo, selecione `Play -> Camera -> Load a QR Code` -1. Selecione o código QR -1. Se o exploit foi bem sucedido, seu console irá iniciar no Homebrew Launcher -1. Desligue seu console - -#### Seção III - Verificação de Hardware - -Nesta seção, você verá se pode acessar o Modo de Segurança no seu console. Isso determinará qual método você seguirá na próxima página. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/pt_BR/homebrew-launcher-(ninjhax2-dx).txt b/_pages/pt_BR/homebrew-launcher-(ninjhax2-dx).txt deleted file mode 100644 index e8b8a70176..0000000000 --- a/_pages/pt_BR/homebrew-launcher-(ninjhax2-dx).txt +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "Homebrew Launcher (ninjhax2-dx)" ---- - -{% include toc title="Tabela de Conteúdo" %} - -{% capture technical_info %} -Detalhes técnicos (opcional) -[Ninjhax2](https://github.com/smealum/ninjhax2.x) é um exploit para o jogo "Cubic Ninja" feito por [smealum](https://github.com/smealum). Esta página usa uma versão atualizada do ninjhax por [zoogie](https://github.com/zoogie) chamada [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx), que suporta a versão 11.17.0. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -Este método requer uma câmera de 3DS funcional. -{: .notice--info} - -Este processo irá sobrescrever o seu save de Cubic Ninja, se você tiver um. -{: .notice--warning} - -### O que é necessário -* O jogo "Cubic Ninja" -* A versão mais recente do [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx/releases) -* A versão mais recente do [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (o arquivo `.zip` do Luma3DS) - -### Instruções - -#### Seção I - Preparação - -1. Desligue seu console -1. Insira o cartão SD no seu computador -1. Copie o arquivo `Launcher.dat` da pasta apropriada para o seu console do arquivo `.zip` do ninjhax2-dx para a raiz do seu cartão SD - + A raiz do cartão SD refere-se ao diretório inicial no seu cartão SD onde você pode ver a pasta Nintendo 3DS, mas não está dentro dela -1. Copie `boot.firm` e `boot.3dsx` do `.zip` do Luma3DS para a raiz do seu cartão SD - -#### Seção II - ninjhax2-dx -1. Reinsira o cartão SD no seu console -1. Ligue o seu console -1. Abra "Cubic Ninja" uma vez e selecione "Create" - + Se solicitado, exclua todos os dados -1. Selecione "QR Code" -1. Selecione "Scan QR Code" -1. Em seu PC, abra o navegador e vá para [o website do ninjhax2-dx](https://zoogie.github.io/web/nh2dx/) -1. Selecione a região e o hardware do seu console -1. No seu console, leia o código QR - + Se o jogo sair para o Menu HOME, então o exploit foi instalado corretamente -1. Abra "Cubic Ninja" novamente -1. Se o exploit foi bem sucedido, seu console irá iniciar no Homebrew Launcher -1. Desligue seu console - -#### Seção III - Verificação de Hardware - -Nesta seção, você verá se pode acessar o Modo de Segurança no seu console. Isso determinará qual método você seguirá na próxima página. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/pt_BR/homebrew-launcher-(pichaxx).txt b/_pages/pt_BR/homebrew-launcher-(pichaxx).txt deleted file mode 100644 index 5a4638bba3..0000000000 --- a/_pages/pt_BR/homebrew-launcher-(pichaxx).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (PicHaxx)" ---- - -{% include toc title="Tabela de Conteúdo" %} - -{% capture technical_info %} -Detalhes técnicos (opcional) -[PicHaxx](https://github.com/zoogie/pichaxx) é um exploit para o jogo Pokémon Picross lançado por [zoogie](https://github.com/zoogie), originalmente descoberto e [demonstrado](https://twitter.com/mrnbayoh/status/744899681663258624) por [MrNbaYoh](https://github.com/MrNbaYoh). - -Este método de usar o Seedminer para exploiting usa seu arquivo `movable.sed` para fazer um save personalizado para o Pokémon Picross, que pode ser usado para iniciar o Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -Esse processo irá sobrescrever seu save de Pokémon Picross, se você tiver um. Se você deseja preservar seus dados do jogo Pokémon Picross, você deve fazer um backup do seu arquivo `00000001.sav` antes de substituí-lo. -{: .notice--warning} - -### O que é necessário - -+ O jogo "Pokémon Picross" instalado no seu console - + Se você já fez o download antes, você pode [baixá-lo novamente](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Seu cartão SD deve ser inserido no seu console para instalar o Pokémon Picross -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ A versão mais recente do [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (o arquivo `.zip` do Luma3DS) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (download direto) - - -### Instruções - -#### Seção I - Preparação - -Nesta seção, você copiará alguns dos arquivos que serão usados para iniciar o Homebrew Launcher. - -1. Desligue seu console -1. Insira o cartão SD no seu computador -1. Copie `boot.firm` e `boot.3dsx` do `.zip` do Luma3DS para a raiz do seu cartão SD - + A raiz do cartão SD refere-se ao diretório inicial no seu cartão SD onde você pode ver a pasta Nintendo 3DS, mas não está dentro dela -1. Copie o otherapp payload para o seu modelo/região/versão do `otherapps.zip` para a raiz do seu cartão SD, e então renomeie o payload para `otherapp.bin` - + Não adicione a extensão `.bin` se você não a vê -1. Copie `movable.sed` do seu computador para a raiz do seu cartão SD - -![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Seção II - PicHaxx - -Nesta seção, você criará um arquivo de save modificado para o Pokémon Picross que, quando carregado, executará o Homebrew Launcher no seu console. - -1. Abra [o site do PicHaxx Injector](https://3dstools.nhnarwhal.com/#/pichaxx) no seu computador -1. Selecione o seu arquivo `movable.sed` -1. Selecione "Build and Download" -1. Aguarde a conclusão do processo -1. Navegue até `Nintendo 3DS` -> `-> ` ->` -> `title` -> `00040000` -> `0017c100` -> `data` em seu cartão SD - + O `` será o mesmo que você usou em Seedminer - + O `` é uma pasta de 32 caracteres dentro do `` -1. Copie o arquivo `00000001.sav` recém-baixado para a pasta `data` no seu cartão SD - + Sobrescreva o arquivo de save antigo quando solicitado - - ![]({{ "/images/screenshots/pichaxx-save-location.png" | absolute_url }}) - {: .notice--info} - -1. Reinsira o cartão SD no seu console -1. Ligue o seu console -1. Abra "Pokémon Picross" -1. Se o exploit foi bem sucedido, seu console irá iniciar no Homebrew Launcher - + Se você receber uma mensagem de erro, [siga este guia de troubleshooting](troubleshooting#homebrew-launcher-pichaxx) -1. Desligue seu console - -#### Seção III - Verificação de Hardware - -Nesta seção, você verá se pode acessar o Modo de Segurança no seu console. Isso determinará qual método você seguirá na próxima página. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/pt_BR/homebrew-launcher-(smilehax-iie).txt b/_pages/pt_BR/homebrew-launcher-(smilehax-iie).txt deleted file mode 100644 index a9cf1edda0..0000000000 --- a/_pages/pt_BR/homebrew-launcher-(smilehax-iie).txt +++ /dev/null @@ -1,70 +0,0 @@ ---- -title: "Homebrew Launcher (smilehax-IIe)" ---- - -{% include toc title="Tabela de Conteúdo" %} - -Este conjunto de instruções não suporta a versão japonesa do SmileBASIC. -{: .notice--warning} - -{% capture technical_info %} -Detalhes técnicos (opcional) -[smilehax-IIe](https://github.com/zoogie/smilehax-IIe) é um exploit para o jogo "SmileBASIC" feito por zoogie, compatível com versões de sistema 9.0.0 até 11.17.0 para consoles de região USA/EUR/JPN. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### O que é necessário -+ O jogo "SmileBASIC" instalado no seu console - + Se você já fez o download antes, você pode [baixá-lo novamente](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Seu cartão SD deve ser inserido no seu console para instalar o SmileBASIC -+ A versão mais recente do [smilehax-IIe](https://github.com/zoogie/smilehax-IIe/releases/download/v1.1/Release_sh2e_v1.1.zip) (download direto) -+ A versão mais recente do [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (o arquivo `.zip` do Luma3DS) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (download direto) - - -### Instruções - -#### Seção I - Preparação - -1. Desligue seu console -1. Insira o cartão SD no seu computador -1. Copie `boot.firm` e `boot.3dsx` do `.zip` do Luma3DS para a raiz do seu cartão SD - + A raiz do cartão SD refere-se ao diretório inicial no seu cartão SD onde você pode ver a pasta Nintendo 3DS, mas não está dentro dela -1. Copie o otherapp payload para o seu modelo/região/versão do `otherapps.zip` para a raiz do seu cartão SD, e então renomeie o payload para `otherapp.bin` - + Não adicione a extensão `.bin` se você não a vê -1. Transfira o `.wav` para sua região do Release_sh2e `.zip` para um dispositivo que pode reproduzir arquivos `.wav`, por exemplo, um telefone -1. Copie o `.icn` petitcom para sua região para a raiz do seu cartão SD - -#### Seção II - smilehax - -1. Abra o SmileBASIC - + Atualize o jogo se solicitado -1. Selecione a opção "Publish/Download Projects" -1. Selecione a opção "Download (Receive) using Public Key" -1. Pressione o botão "Yes" -1. Digite a chave pública "NJEQK3A4" usando o teclado na tela -1. Pressione o botão "Yes" para confirmar o download do PMODEM141 -1. Pressione "OK", depois "Back", depois "Browse Projects" -1. Selecione PMODEM141, então pressione "Select File" -1. Selecione PMODEM141.PRG, pressione "OK", então "Sim" para executá-lo -1. Selecione RECEIVE FILE SIMPLEX -1. Prepare o dispositivo que você usa para reproduzir o arquivo `.wav` -1. Mantenha seu console sobre três centrímetros do dispostivo tocando o arquivo `.wav` e use um volume razoável (não alto) para reproduzir o `.wav` -1. Agora selecione 300BPS, e então reproduza o arquivo `.wav` -1. Quando terminar, pressione "Yes" e então pressione "OK" -1. Pressione o botão START -1. Selecione o arquivo SH2E-xxx.TXT e pressione OK, em seguida "Yes" para executá-lo - + Se você for expulso de volta ao menu, certifique-se de estar usando a versão mais recente do SmileBASIC -1. Se o exploit foi bem sucedido, seu console irá iniciar no Homebrew Launcher -1. Desligue seu console - -#### Seção III - Verificação de Hardware - -Nesta seção, você verá se pode acessar o Modo de Segurança no seu console. Isso determinará qual método você seguirá na próxima página. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/pt_BR/homebrew-launcher-(steelhax).txt b/_pages/pt_BR/homebrew-launcher-(steelhax).txt deleted file mode 100644 index afe8b7af3d..0000000000 --- a/_pages/pt_BR/homebrew-launcher-(steelhax).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (Steelhax)" ---- - -{% include toc title="Tabela de Conteúdo" %} - -{% capture technical_info %} -Detalhes técnicos (opcional) -Este método de usar o Seedminer para exploiting usa seu `movable.sed` para escrever um save modificado para Steel Diver: Sub Wars, que pode então ser usado para iniciar o Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -Esse processo irá sobrescrever seu save do jogo Steel Diver: Sub Wars, se você tiver um. Se você deseja preservar seu dados de Steel Diver: Sub Wars, você deve fazer um backup de seu arquivo `00000001.sav` antes de substituí-lo. -{: .notice--warning} - -### O que é necessário - -+ O jogo "Steel Diver: Sub Wars" instalado no seu console - + Se você já fez o download antes, você pode [baixá-lo novamente](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Seu cartão SD deve ser inserido no seu console para instalar o Steel Diver: Sub Wars -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ A versão mais recente do [Steelhax](/assets/steelhax-release.zip) (download direto) -+ A versão mais recente do [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (o arquivo `.zip` do Luma3DS) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (download direto) - -### Instruções - -#### Seção I - Preparação - -Nesta seção, você copiará alguns dos arquivos que serão usados para iniciar o Homebrew Launcher. - -1. Desligue seu console -1. Insira o cartão SD no seu computador -1. Copie `boot.firm` e `boot.3dsx` do `.zip` do Luma3DS para a raiz do seu cartão SD - + A raiz do cartão SD refere-se ao diretório inicial no seu cartão SD onde você pode ver a pasta Nintendo 3DS, mas não está dentro dela -1. Copie a pasta `steelhax` do `Steelhax-release.zip` para a raiz do seu cartão SD -1. Copie o otherapp payload para o seu modelo/região/versão do `otherapps.zip` para a raiz do seu cartão SD, e então renomeie o payload para `otherapp.bin` - + Não adicione a extensão `.bin` se você não a vê -1. Copie `movable.sed` do seu computador para a raiz do seu cartão SD -1. Reinsira o cartão SD no seu console -1. Ligue o seu console - -#### Seção II - Steelminer - -Nesta seção, você criará um arquivo de save para o Steel Diver: Sub Wars que, quando usado, carregará o Homebrew Launcher em seu console. - -1. Abra "Steel Diver: Sub Wars" uma vez e selecione um Mii para inicializar seu save - + Recuse a atualização do jogo quando for pedido - + Se você já atualizou o jogo, use o menu do Gerenciamento de Dados nas Configurações do Console para deletar o update -1. Saia do "Steel Diver: Sub Wars" -1. Desligue seu console -1. Insira o cartão SD no seu computador -1. Abra [o site SteelHax Save Tool](https://3dstools.nhnarwhal.com/#/steelhax) em seu computador -1. Selecione o seu arquivo `movable.sed` -1. Selecione sua região com base no seu console -1. Selecione "Build and Download" -1. Aguarde a conclusão do processo -1. Navegue até `Nintendo 3DS` -> `-> ` ->` -> `title` -> `00040000` -> `0017c100` -> `data` em seu cartão SD - + **Região EUR**: `000d7e00` - + **Região JPN**: `000d7c00` - + **Região USA**: `000d7d00` -1. Copie o arquivo `00000001.sav` recém-baixado para a pasta `data` no seu cartão SD - + Sobrescreva o arquivo de save antigo quando solicitado -1. Reinsira o cartão SD no seu console -1. Ligue o seu console -1. Abra "Steel Diver: Sub Wars" -1. Se o exploit foi bem sucedido, seu console irá iniciar no Homebrew Launcher -1. Desligue seu console - -#### Seção III - Verificação de Hardware - -Nesta seção, você verá se pode acessar o Modo de Segurança no seu console. Isso determinará qual método você seguirá na próxima página. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/pt_BR/homebrew-launcher-(super-skaterhax).txt b/_pages/pt_BR/homebrew-launcher-(super-skaterhax).txt deleted file mode 100644 index bdae505499..0000000000 --- a/_pages/pt_BR/homebrew-launcher-(super-skaterhax).txt +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: "Homebrew Launcher (super-skaterhax)" ---- - -{% include toc title="Tabela de Conteúdo" %} - -{% capture technical_info %} -Detalhes técnicos (opcional) -Para detalhes técnicos sobre os exploits que você usará nesta página, consulte [aqui](https://github.com/zoogie/super-skaterhax). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Notas de Compatibilidade - -Super-skaterhax (quando usado para iniciar o Homebrew Launcher) é compatível com modelos new na versão 11.16.0 em todas as regiões e 11.17.0 nas regiões EUR, JPN e EUA. - -As instruções fornecidas só se aplicam ao New 3DS, New 3DS XL e ao New 2DS XL. Por favor, certifique-se de que o console que você está modificando é um New 3DS, New 3DS XL, ou New 2DS XL antes de continuar. -{: .notice--warning} - -### O que é necessário - -* A versão mais recente do [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (o arquivo `.zip` do Luma3DS) -* A versão mais recente do [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (o arquivo de release `.zip`) - -#### Seção I - Preparação - -Nesta seção, você irá copiar os arquivos necessários para acionar tanto superskaterhax quanto o Homebrew Launcher. - -1. Desligue seu console -1. Insira o cartão SD no seu computador -1. Copie `boot.firm` e `boot.3dsx` do `.zip` do Luma3DS para a raiz do seu cartão SD - + A raiz do cartão SD refere-se ao diretório inicial no seu cartão SD onde você pode ver a pasta Nintendo 3DS, mas não está dentro dela -1. Copie tudo dentro da pasta para a região do seu console (e também a versão do sistema se a região for USA) no superskaterhax `.zip` para a raiz do seu cartão SD -1. Reinsira o cartão SD no seu console -1. Ligue o seu console - -![]({{ "/images/screenshots/skater-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Seção II - super-skaterhax - -Nesta seção, você visitará a página web contendo o exploit, que iniciará o Homebrew Launcher. - -Se você ainda não tem, certifique-se de que você tem uma conexão de Internet ativa configurada em seu console. -{: .notice--info} - -1. No Menu HOME, pressione os gatilhos da Esquerda e da Direita ao mesmo tempo para abrir a câmera - + Se você não consegue abrir a câmera, abra o Navegador de Internet e digite manualmente a URL (`https://zoogie.github.io/web/super/` para EUR/USA/JPN, `https://zoogie.github.io/web/korea` para KOR) -1. Toque no botão do código QR e digitalize um dos seguintes códigos QR para a região do seu console [aqui](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png) - + Se você receber um aviso de certificado de segurança, aperte (A) para permitir a conexão -1. Pressione o botão (Select) para abrir a aba de favoritos - + Se o seu botão (Select) não responder, toque no ícone de estrela no canto inferior esquerdo da tela -1. Toque em "Adicionar aos favoritos" -1. Aperte (B) uma vez para retornar ao navegador -1. Aperte (Start) para abrir o menu de contexto - + Se o seu botão (Start) não responder, toque no menu de 3 linhas no canto inferior direito da tela -1. Toque em "Configurações" -1. Toque em "Excluir Cookies" -1. Aperte (A) para continuar -1. Aperte (Home) para retornar ao Menu HOME, depois aperte (A) imediatamente para iniciar o navegador novamente -1. Selecione o botão "GO GO!" na tela superior - + Se qualquer prompt aparecer, aprove todos eles - + Se o seu console congela em uma tela amarela, segure o botão POWER até que ele desligue e tente esta seção novamente - + Se o seu console congela numa tela vermelha, segure o botão POWER até que ele desligue, refaça o passo 3 da Seção II e tente novamente esta seção - + Se você receber outro erro, tente novamente até 5 vezes e, se ainda não funcionar, [siga este guia de solução de problemas](troubleshooting#homebrew-launcher-super-skaterhax) -1. Se o exploit foi bem sucedido, seu console irá iniciar no Homebrew Launcher -1. Desligue seu console - -#### Seção III - Verificação de Hardware - -Nesta seção, você verá se pode acessar o Modo de Segurança no seu console. Isso determinará qual método você seguirá na próxima página. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/pt_BR/include/fredtool-prep.txt b/_pages/pt_BR/include/fredtool-prep.txt deleted file mode 100644 index 4eade07726..0000000000 --- a/_pages/pt_BR/include/fredtool-prep.txt +++ /dev/null @@ -1,29 +0,0 @@ -Nesta seção, você copiará os arquivos necessários para substituir temporariamente as Configurações de Conexões Nintendo DS com Flipnote Studio, que é usado para iniciar o instalador boot9strap (custom firmware). - -1. Insira o cartão SD no seu computador -1. Abra o site [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) no seu computador -1. Sob o campo "Username", digite qualquer nome alfanumérico (sem espaços ou caracteres especiais) -1. Sob o campo "DSiBin", faça o upload do seu arquivo de backup DSiWare (por exemplo, 42383841.bin) da raiz do seu cartão SD usando a primeira opção "Browse..." -1. Sob o campo "MovableSed", coloque seu arquivo `movable.sed` usando a segunda opção "Browse..." -1. Sob o campo "InjectionTarget", defina o alvo de injeção como `DSinternet` (NÃO memorypit) -1. Clique em "Build" - + Aguarde alguns segundos para que o processo de compilação termine -1. Na seção Build History à esquerda, digite o nome de usuário no campo "Filter Builds" -1. Clique no primeiro resultado da pesquisa - + Esse resultado deve ter a última marcação de tempo -1. Clique no link "output_(nome).zip" -1. Navegue até `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` no seu cartão SD - + `` é o nome da pasta de 32 caracteres que você copiou em [Seedminer](seedminer) - + `` é uma pasta de 32 caracteres dentro da pasta `` -1. Delete `F00D43D5.bin` da sua pasta Nintendo DSiWare -1. Copie o arquivo `42383841.bin` da pasta `hax` do arquivo DSiWare baixado (output_(nome).zip) para a pasta `Nintendo DSiWare` - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copie `boot.firm` e `boot.3dsx` do `.zip` do Luma3DS para a raiz do seu cartão SD - + A raiz do cartão SD refere-se ao diretório inicial no seu cartão SD onde você pode ver a pasta Nintendo 3DS, mas não está dentro dela -1. Copie `boot.nds` (B9STool) do `.zip` para a raiz do seu cartão SD -1. Copie a pasta `private` do `.zip` do Frogminer_save para a raiz do seu cartão SD -1. Reinsira o cartão SD no seu console -1. Ligue o seu console - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} \ No newline at end of file diff --git a/_pages/pt_BR/include/hbl-common-exploits-movable.txt b/_pages/pt_BR/include/hbl-common-exploits-movable.txt deleted file mode 100644 index acb66017b3..0000000000 --- a/_pages/pt_BR/include/hbl-common-exploits-movable.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Próximo passo: Escolha um exploit - -Se a câmera apareceu na seção anterior, é provável que o Modo de Segurança esteja funcionando no seu console. - -Caso a câmera tenha aparecido, continue em [Instalando boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -Se a câmera NÃO apareceu, continue em [Instalando boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/pt_BR/include/hbl-common-exploits.txt b/_pages/pt_BR/include/hbl-common-exploits.txt deleted file mode 100644 index acb66017b3..0000000000 --- a/_pages/pt_BR/include/hbl-common-exploits.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Próximo passo: Escolha um exploit - -Se a câmera apareceu na seção anterior, é provável que o Modo de Segurança esteja funcionando no seu console. - -Caso a câmera tenha aparecido, continue em [Instalando boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -Se a câmera NÃO apareceu, continue em [Instalando boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/pt_BR/installing-boot9strap-(fredtool).txt b/_pages/pt_BR/installing-boot9strap-(fredtool).txt deleted file mode 100644 index 57a5e08ec8..0000000000 --- a/_pages/pt_BR/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: "Instalando boot9strap (Fredtool)" ---- - -{% include toc title="Tabela de Conteúdo" %} - -{% capture technical_info %} -Detalhes técnicos (opcional) - -Este método de usar o Seedminer para exploiting usa seu arquivo `movable.sed` para descriptografar qualquer aplicativo DSiWare para fins de injetar um título de DSiWare exploitable nas Configurações de Internet do DS. - -Esta é uma implementação funcional do exploit "FIRM partitions known-plaintext" detalhado [aqui](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -Você só deve ser capaz de chegar a esta página se estiver executando a versão 11.16.0. Se você estiver em algum firmware diferente de 11.17.0 ou 11.16.0, PARE ou estas instruções VÃO CAUSAR UM BRICK em outros firmwares!! -{: .notice--warning} - -### O que é necessário - -* Seu arquivo `movable.sed` de completar [Seedminer](seedminer) -* A versão mais recente do [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **usuários 11.16.0 ou 11.17.0**: A versão v6.1.1 do [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.zip) (download direto) -* A versão mais recente do [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (o arquivo `.zip` do Luma3DS) - -#### Seção I - Checando por CFW - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Seção II - BannerBomb3 - -Nesta seção, você irá acionar o exploit do BannerBomb3 usando o Menu de Gerenciamento de DSiWare e copiará o dump de arquivos resultantes para o seu computador para que você possa usá-lo na próxima seção. - -1. Reinsira o cartão SD no seu console -1. Ligue o seu console -1. Abra as Configurações do Sistema no seu console -1. Navegue para `Gerenciamento de dados` -> `DSiWare` -> `Cartão SD` ([imagem](/images/screenshots/bb3/dsiware-management.png)) - + Seu console deve mostrar o menu multihax do BB3 - + Se esta etapa fazer com que seu console tenha um crash, [siga este guia de troubleshooting](troubleshooting#installing-boot9strap-fredtool) -1. Use os botões direcionais para navegar e pressione o botão (A) para selecionar "Dump DSiWare" - + Seu console irá reiniciar automaticamente -1. Desligue seu console - -#### Seção III - Preparação - -{% include_relative include/fredtool-prep.txt %} - -#### Seção IV - Substituindo as Configurações de Internet DS - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Seção V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Seção VI - Configuração do Luma3DS - -1. Aperte e segure (Select) e enquanto segura (Select), ligue seu console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Seção VII - Restaurando as Configurações de Conexão DS - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue para [Finalizando a instalação](finalizing-setup) -{: .notice--primary} diff --git a/_pages/pt_BR/installing-boot9strap-(fredtool-legacy).txt b/_pages/pt_BR/installing-boot9strap-(fredtool-legacy).txt deleted file mode 100644 index dc58c1fab1..0000000000 --- a/_pages/pt_BR/installing-boot9strap-(fredtool-legacy).txt +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: "Instalando boot9strap (Fredtool, Legado)" ---- - -{% include toc title="Tabela de Conteúdo" %} - -{% capture technical_info %} -Detalhes técnicos (opcional) - -Para fazer o dump do sistema DSiWare, nós executamos um exploit em uma falha na janela do Gerenciador de Dados do DSiWare no aplicativo Configuração do Console. - -Para fazer isso, usamos a chave de criptografia do seu sistema (movable.sed) para construir um backup de DSiWare que faz exploit do sistema para fazer um dump do aplicativo Conexões Nintendo DS para a raiz do SD. - -Assim que tivermos um backup de DSiWare, podemos injetá-lo no aplicativo de Configurações Conexão Nintendo DS. - -Esta é uma implementação funcional do exploit "FIRM partitions known-plaintext" detalhado [aqui](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -Você só deve ser capaz de chegar a esta página se estiver executando a versão 11.15.0 ou 11.14.0. Se você estiver em algum firmware diferente de 11.15.0 ou 11.14.0, PARE ou estas instruções VÃO CAUSAR UM BRICK em outros firmwares!! -{: .notice--warning} - -### O que é necessário - -* Seu arquivo `movable.sed` de completar [Seedminer (Mii)](seedminer-(mii)) -* A versão mais recente do [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **usuários 11.15.0 e 11.14.0 somente**: A versão v6.0.1 do [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (download direto) -* A versão mais recente do [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (o arquivo `.zip` do Luma3DS) - -#### Seção I - Checando por CFW - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Seção II - BannerBomb3 - -Nesta seção, você irá acionar o exploit do BannerBomb3 usando o Menu de Gerenciamento de DSiWare e copiará o dump de arquivos resultantes para o seu computador para que você possa usá-lo na próxima seção. - -1. Reinsira o cartão SD no seu console -1. Ligue o seu console -1. Abra as Configurações do Sistema no seu console -1. Navegue para `Gerenciamento de dados` -> `DSiWare` -> `Cartão SD` ([imagem](/images/screenshots/bb3/dsiware-management.png)) - + Seu console deve mostrar o menu multihax do BB3 - + Se esta etapa fazer com que seu console tenha um crash, [siga este guia de troubleshooting](troubleshooting#installing-boot9strap-fredtool) -1. Use os botões direcionais para navegar e pressione o botão (A) para selecionar "Dump DSiWare" - + Seu console irá reiniciar automaticamente -1. Desligue seu console - -#### Seção III - Preparação - -{% include_relative include/fredtool-prep.txt %} - -#### Seção IV - Substituindo as Configurações de Internet DS - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Seção V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Seção VI - Configuração do Luma3DS - -1. Aperte e segure (Select) e enquanto segura (Select), ligue seu console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Seção VII - Restaurando as Configurações de Conexão DS - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue para [Finalizando a instalação](finalizing-setup) -{: .notice--primary} diff --git a/_pages/pt_BR/installing-boot9strap-(frogtool).txt b/_pages/pt_BR/installing-boot9strap-(frogtool).txt deleted file mode 100644 index d59076a48d..0000000000 --- a/_pages/pt_BR/installing-boot9strap-(frogtool).txt +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Instalando boot9strap (Frogtool)" ---- - -{% include toc title="Tabela de Conteúdo" %} - -{% capture technical_info %} -Detalhes técnicos (opcional) -Para obter detalhes técnicos sobre os exploits que você estará usando nesta página, consulte "DSiWare_Exports CTCert verification" e "FIRM partitions known-plaintext" [aqui](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - - -Para usar o link [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) para `frogcert.bin` nesta página, você precisará de um cliente de torrent como [qBittorrent](https://www.qbittorrent.org/download.php) ou [Deluge](http://dev.deluge-torrent.org/wiki/Download). -{: .notice--warning} - -### O que é necessário - -* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link) -* A versão mais recente do [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (download direto) -* A versão mais recente do [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) - -#### Seção I - Checando por CFW - -{% include_relative include/cfw-check-fredtool.txt %} - -### Seção II - Preparação - -1. Desligue seu console -1. Insira o cartão SD no seu computador -1. Copie `boot.firm` e `boot.3dsx` do `.zip` do Luma3DS para a raiz do seu cartão SD -1. Copie `boot.nds` (b9sTool) do b9sTool `.zip` para a raiz do seu cartão SD -1. Crie uma pasta chamada `3ds` na raiz do seu cartão SD se ela ainda não existir - + Esta pasta armazena aplicativos homebrew e dados; é diferente da pasta `Nintendo 3DS` que o console gera automaticamente -1. Copie a pasta `Frogtool` do Frogtool-nimhax `.zip` para a pasta `/3ds/` no seu cartão SD -1. Copie `frogcert.bin` para a raiz do seu cartão SD -1. Reinsira o cartão SD no seu console -1. Ligue o seu console - -#### Seção III - Aplicando patches no DS Download Play - -1. Abra o Homebrew Launcher através do seu método de escolha (provavelmente o Navegador de Internet) -1. Abra o Frogtool da lista de homebrew -1. Selecione a opção "INJECT patched DS Download Play" -1. Frogtool irá automaticamente rodar e injetar a versão JPN do Flipnote Studio em seu DS Download Play -1. Quando esta operação terminar, leia as telas e verifique se o processo foi bem sucedido -1. Toque na tela de toque e então selecione "BOOT patched DS Download Play" -1. Se o exploit foi bem sucedido, seu console irá abrir a versão JPN do Flipnote Studio - + Se você ficar preso em uma tela preta, siga [esta](https://wiki.hacks.guide/wiki/3DS:TWLFix#Userland_(PicHaxx,_Steelhax,_etc.)-0) página e tente novamente - -#### Seção IV - Exploit do Flipnote - -{% include_relative include/install-boot9strap-b9stool.txt method="dsdlp" %} - -#### Seção VI - Configuração do Luma3DS - -1. Aperte e segure (Select) e enquanto segura (Select), ligue seu console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Seção VII - Restaurando o DS Download Play - -1. Inicie o aplicativo Download Play -1. Aguarde até que você veja os dois botões - + Não pressione nenhum dos botões -1. Aperte (Gatilho Esquerdo) + (D-pad pra baixo) + (Select) ao mesmo tempo para abrir o menu Rosalina -1. Selecione "Miscellaneous options" -1. Selecione "Switch the hb. title to the current app." -1. Aperte (B) para continuar -1. Aperte (B) para retornar para o menu principal do Rosalina -1. Aperte (B) para sair do menu do Rosalina -1. Aperte (Home), depois feche o Download Play -1. Reinicie o aplicativo Download Play -1. Seu console deve inicializar o Homebrew Launcher -1. Abra o Frogtool da lista de homebrew -1. Selecione a opção "RESTORE clean DS Download Play" -1. Quando esta operação terminar, leia as telas e verifique se o processo foi bem sucedido - + Se houver erros ou arquivos faltando, corrija o problema e tente novamente -1. Se o processo foi bem sucedido, toque na tela e pressione START para sair -1. Desligue seu console - -___ - -### Continue para [Finalizando a instalação](finalizing-setup) -{: .notice--primary} diff --git a/_pages/pt_BR/installing-boot9strap-(hbl-usm).txt b/_pages/pt_BR/installing-boot9strap-(hbl-usm).txt deleted file mode 100644 index a3223779ec..0000000000 --- a/_pages/pt_BR/installing-boot9strap-(hbl-usm).txt +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "Instalando boot9strap (HBL-USM)" ---- - -{% include toc title="Tabela de Conteúdo" %} - -{% capture technical_info %} -Detalhes técnicos (opcional) - -Para executar o exploit no firmware SAFE_MODE do nosso sistema, precisamos injetar um perfil de Wi-Fi exploited. - -Como já temos acesso a Homebrew, podemos usar o slotTool para fazer isso. - -Assim que o perfil Wi-Fi for injetado, usaremos o SAFE_MODE, que é um recurso de recuperação presente em todos os consoles 3DS, para ativar o perfil de Wi-Fi exploited. - -Para obter mais uma explicação técnica, veja [aqui](https://github.com/zoogie/unSAFE_MODE/) para obter informações sobre o exploit unSAFE_MODE. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Notas de Compatibilidade - -Se os seus botões (Gatilho Direito/Esquerdo), (D-Pad pra Cima) ou (A) não funcionarem, entre no [Discord do Nintendo Homebrew](https://discord.gg/MWxPgEp) e pergunte, em inglês, para obter ajuda. -{: .notice--danger} - -### O que é necessário - -* A versão mais recente do [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (download direto) -* A versão mais recente do [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) (download direto) - -#### Seção I - Preparação - -Nesta seção, você copiará os arquivos necessários para acionar o exploit unSAFE_MODE no cartão SD do seu console. Em seguida, você usará o Homebrew Launcher para iniciar o slotTool, que substituirá seus slots de Wi-Fi com dados com hack. Suas configurações de conexão Wi-Fi serão temporariamente sobrescritas enquanto o exploit estiver ativo. - -1. Insira o cartão SD no seu computador -1. Crie uma pasta chamada `boot9strap` na raiz do seu cartão SD -1. Copie `boot9strap.firm` e `boot9strap.firm.sha` do `.zip` RELEASE para a pasta `/boot9strap/` no seu cartão SD -1. Crie uma pasta chamada `3ds` na raiz do seu cartão SD se ela ainda não existir - + Esta pasta armazena aplicativos homebrew e dados; é diferente da pasta `Nintendo 3DS` que o console gera automaticamente -1. Copie o `slotTool.3dsx` da pasta `slotTool` dentro do `.zip` RELEASE para a pasta `/3ds/` do seu cartão SD -1. Copie `usm.bin` do `.zip` do RELEASE para a pasta raiz no seu cartão SD -1. Copie `SafeB9SInstaller.bin` do `.zip` do SafeB9SInstaller para a raiz do seu cartão SD -1. Reinsira o cartão SD no seu console -1. Ligue o seu console -1. Abra o Homebrew Launcher através do seu método de escolha (provavelmente o Navegador de Internet) -1. Abra o slotTool da lista de homebrew - + Se você ficar preso numa tela vermelha, force o desligamento do console, segurando o botão liga/desliga por quinze segundos, e tente novamente esta seção -1. Selecione a opção "INSTALL exploit to wifi slots 1,2,3 & shutdown" - + Você verá algum texto na tela e então seu sistema irá desligar - -![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Seção II - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Seção III - Instalando o boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Seção IV - Restaurando os Perfis de Configuração de Wi-Fi - -{% include_relative include/remove-usm-slottool.txt %} - -___ - -### Continue para [Finalizando a instalação](finalizing-setup) -{: .notice--primary} diff --git a/_pages/pt_BR/installing-boot9strap-(usm).txt b/_pages/pt_BR/installing-boot9strap-(usm).txt deleted file mode 100644 index 6ba733d78e..0000000000 --- a/_pages/pt_BR/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: "Instalando boot9strap (USM)" ---- - -{% include toc title="Tabela de Conteúdo" %} - -{% capture technical_info %} -Detalhes técnicos (opcional) - -Para executar o exploit no firmware SAFE_MODE do nosso sistema, precisamos injetar um perfil de Wi-Fi exploited. - -Podemos fazer isso usando um exploit existente, BannerBomb3. - -Para fazer isso, usamos a chave de criptografia do seu sistema (movable.sed) para construir um backup de DSiWare que executa um exploit no sistema para injetar o perfil Wi-Fi exploited na sua lista de conexões. - -Assim que o perfil Wi-Fi for injetado, usaremos o SAFE_MODE, que é um recurso de recuperação presente em todos os consoles 3DS, para ativar o perfil de Wi-Fi exploited. - -Para obter explicações técnicas, consulte os seguintes links para obter informações sobre os exploits BannerBomb3 e unSAFE_MODE: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Notas de Compatibilidade - -Essas instruções funcionam nas versões de consoles EUA, Europa, Japão e Coréia, indicadas pelas letras U, E, J ou K após a versão do sistema. - -Se os seus botões (Gatilho Esquerdo/Direito), (Botão direcional pra cima), ou (A) não funcionarem, você precisará seguir [um ramo alternativo de Seedminer](installing-boot9strap-(fredtool)). Para obter ajuda com isso, entre no [Discord do Nintendo Homebrew](https://discord.gg/MWxPgEp) e peça, em inglês, por ajuda. -{: .notice--warning} - -### O que é necessário - -* A versão mais recente do [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (download direto) -* A versão mais recente do [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (download direto) -* A versão mais recente do [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (o arquivo `.zip` do Luma3DS) -* [usm.bin](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (download direto) - - -#### Seção I - Preparação - -Nesta seção, você copiará os arquivos necessários para acionar o exploit unSAFE_MODE no cartão SD do seu console. - -1. Seu cartão SD deve ser inserido no seu computador -1. Copie `usm.bin` para a raiz do seu cartão SD -1. Copie `boot.firm` e `boot.3dsx` do `.zip` do Luma3DS para a raiz do seu cartão SD - + A raiz do cartão SD refere-se ao diretório inicial no seu cartão SD onde você pode ver a pasta Nintendo 3DS, mas não está dentro dela -1. Crie uma pasta chamada `boot9strap` na raiz do seu cartão SD -1. Copie o `boot9strap.firm` e o `boot9strap.firm.sha` do `.zip` do boot9strap para a pasta `/boot9strap/` no seu cartão SD -1. Copie `SafeB9SInstaller.bin` do `.zip` do SafeB9SInstaller para a raiz do seu cartão SD - -![]({{ "/images/screenshots/usm/usm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Seção II - BannerBomb3 - -Nesta seção, você irá acionar o exploit BannerBomb3 usando o menu de Gerenciamento de DSiWare, que pode ser usado para substituir seus slots de Wi-Fi por dados modificados. Suas configurações de conexão Wi-Fi serão temporariamente sobrescritas enquanto o exploit estiver ativo. - -1. Reinsira o cartão SD no seu console -1. Ligue o seu console -1. Abra as Configurações do Sistema no seu console -1. Navegue para `Gerenciamento de dados` -> `DSiWare` -> `Cartão SD` ([imagem](/images/screenshots/bb3/dsiware-management.png)) - + Seu console deve mostrar o menu multihax do BB3 - + Se o menu do multihax BB3 não abrir, [siga este guia de troubleshooting](troubleshooting#bannerbomb3) - + Se o menu multihax BB3 diz "cfw installed already", você já possui custom firmware e deve continuar a partir [daqui](checando for-cfw) -1. Use os botões direcionais para navegar e pressione o botão (A) para selecionar "Install unSAFE_MODE" - + Seu console irá desligar automaticamente -1. Ligue o seu console -1. Abra as Configurações do Sistema no seu console -1. Navegue para `Configurações da Internet` -> `Configurações de Conexão` -1. Certifique-se de que todas as três conexões tenham o nome "Haaaaaaaxxxxxxxxx..." - + NÃO altere estas configurações! - + Se todas as três conexões NÃO são todas chamadas de "Haaaaaaaxxxxxxxxx...", PARE! Algo deu errado nesta seção e PRECISA ser corrigido antes que você possa continuar -1. Desligue seu console - -#### Seção III - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Seção IV - Instalando o boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Seção V - Restaurando os Perfis de Configuração de Wi-Fi - -Nesta seção, ativará o exploit BannerBomb3 pela segunda vez para restaurar os slots de conexão Wi-Fi que foram substituídos na Seção II. - -1. Abra as Configurações do Sistema no seu console -1. Navegue para `Gerenciamento de dados` -> `DSiWare` -> `Cartão SD` ([imagem](/images/screenshots/bb3/dsiware-management.png)) -1. Use os botões direcionais para navegar e pressione o botão (A) para selecionar "Uninstall unSAFE_MODE" - + Seu console irá reiniciar automaticamente -1. Desligue seu console -1. Insira o cartão SD no seu computador -1. Navegue até `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` no seu cartão SD -1. Apague `F00D43D5.bin` da sua pasta Nintendo DSiWare e do seu computador. Esse arquivo não será mais necessário - -___ - -### Continue para [Finalizando a instalação](finalizing-setup) -{: .notice--primary} diff --git a/_pages/pt_PT/dumping-movable-(nimhax).txt b/_pages/pt_PT/dumping-movable-(nimhax).txt deleted file mode 100644 index 69f3d011d3..0000000000 --- a/_pages/pt_PT/dumping-movable-(nimhax).txt +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: "Dumping Movable (nimhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -To install boot9strap on your console, we derive your console's unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console. - -For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need - -* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy the `nimhax` folder from the nimhax `.zip` to the `/3ds/` folder on your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) -{: .notice--info} - -#### Section II - nimhax - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch nimhax from the list of homebrew -1. If the exploit was successful, a `movable.sed` file will appear on the root of your SD card - -### Next step: Frogtool - -Once you have your console's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \ -While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you're unable to use a torrent client. - -Continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--primary} diff --git a/_pages/pt_PT/homebrew-launcher-(freakyhax).txt b/_pages/pt_PT/homebrew-launcher-(freakyhax).txt deleted file mode 100644 index 028cee82a4..0000000000 --- a/_pages/pt_PT/homebrew-launcher-(freakyhax).txt +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: "Homebrew Launcher (freakyhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[freakyhax](https://plutooo.github.io/freakyhax/) is an exploit for the game Freakyforms Deluxe discovered and released by [plutooo](https://github.com/plutooo). It works on versions 9.0.0 through 11.17.0 on EUR, USA and JPN region consoles. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -### What You Need - -+ A EUR/USA/JPN copy of Freakyforms Deluxe (eShop or cartridge) -+ The latest release of [freakyhax](https://github.com/plutooo/freakyhax/releases/latest) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy all files and folders inside the `/build//exploit/` folder from the freakyhax `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - freakyhax - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch Freakyforms Deluxe -1. In the game menu, select `Play -> Camera -> Load a QR code` -1. Select the QR code -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/pt_PT/homebrew-launcher-(ninjhax2-dx).txt b/_pages/pt_PT/homebrew-launcher-(ninjhax2-dx).txt deleted file mode 100644 index 2d8032745c..0000000000 --- a/_pages/pt_PT/homebrew-launcher-(ninjhax2-dx).txt +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "Homebrew Launcher (ninjhax2-dx)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[Ninjhax2](https://github.com/smealum/ninjhax2.x) is an exploit for the game "Cubic Ninja" made by [smealum](https://github.com/smealum). This page uses an updated version of ninjhax by [zoogie](https://github.com/zoogie) called [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx), which supports 11.17.0. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -This process will overwrite your Cubic Ninja save file, if you have one. -{: .notice--warning} - -### What You Need -* The game "Cubic Ninja" -* The latest release of [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx/releases) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `Launcher.dat` from the folder appropriate for your console from the ninjhax2-dx `.zip` file to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - -#### Section II - ninjhax2-dx -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Cubic Ninja" once and select "Create" - + If prompted, delete all data -1. Select "QR Code" -1. Select "Scan QR Code" -1. On your PC, open the browser and go to [ninjhax2-dx website](https://zoogie.github.io/web/nh2dx/) -1. Select your console's region and hardware -1. On your console, scan the QR code - + If the game exits to the HOME Menu, then the exploit has installed correctly -1. Launch "Cubic Ninja" again -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/pt_PT/homebrew-launcher-(pichaxx).txt b/_pages/pt_PT/homebrew-launcher-(pichaxx).txt deleted file mode 100644 index a58df498f5..0000000000 --- a/_pages/pt_PT/homebrew-launcher-(pichaxx).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (PicHaxx)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[PicHaxx](https://github.com/zoogie/pichaxx) is an exploit for the game Pokémon Picross released by [zoogie](https://github.com/zoogie), originally discovered and [demonstrated](https://twitter.com/mrnbayoh/status/744899681663258624) by [MrNbaYoh](https://github.com/MrNbaYoh). - -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Pokémon Picross" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Pokémon Picross -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Prep Work - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card - -![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - PicHaxx - -In this section, you will create a hacked Pokémon Picross save file that, when loaded, will run the Homebrew Launcher on your console. - -1. Open [the PicHaxx Injector website](https://3dstools.nhnarwhal.com/#/pichaxx) on your computer -1. Select your `movable.sed` file -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `0017c100` -> `data` on your SD card - + The `` will be the same one that you used in Seedminer - + The `` is a 32 character long folder inside of the `` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted - - ![]({{ "/images/screenshots/pichaxx-save-location.png" | absolute_url }}) - {: .notice--info} - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Pokémon Picross" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher - + If you get an error message, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-pichaxx) -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/pt_PT/homebrew-launcher-(smilehax-iie).txt b/_pages/pt_PT/homebrew-launcher-(smilehax-iie).txt deleted file mode 100644 index 08cd5865c0..0000000000 --- a/_pages/pt_PT/homebrew-launcher-(smilehax-iie).txt +++ /dev/null @@ -1,70 +0,0 @@ ---- -title: "Homebrew Launcher (smilehax-IIe)" ---- - -{% include toc title="Table of Contents" %} - -This set of instructions does not support the Japanese version of SmileBASIC. -{: .notice--warning} - -{% capture technical_info %} -Technical Details (optional) -[smilehax-IIe](https://github.com/zoogie/smilehax-IIe) is an exploit for the game "SmileBASIC" made by zoogie, compatible with system versions 9.0.0 through 11.17.0 for USA/EUR/JPN region consoles. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need -+ The game "SmileBASIC" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install SmileBASIC -+ The latest release of [smilehax-IIe](https://github.com/zoogie/smilehax-IIe/releases/download/v1.1/Release_sh2e_v1.1.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Transfer the `.wav` for your region from the Release_sh2e `.zip` to a device that can play `.wav` files, for example a phone -1. Copy the petitcom `.icn` for your region to the root of your SD card - -#### Section II - smilehax - -1. Launch SmileBASIC - + Update the game if prompted -1. Select the "Publish/Download Projects" option -1. Select the "Download (Receive) using Public Key" option -1. Press the "Yes" button -1. Enter the Public Key "NJEQK3A4" using the on-screen keyboard -1. Press the "Yes" button to confirm the download of PMODEM141 -1. Press "OK", then "Back", then "Browse Projects" -1. Select PMODEM141, then press "Select File" -1. Select PMODEM141.PRG, then press "OK", then "Yes" to execute it -1. Select RECEIVE FILE SIMPLEX -1. Prepare the device you use to play the `.wav` file -1. Keep your console about a foot from the `.wav` file playing devices' speaker and use a reasonable (not loud) volume to play the `.wav` -1. Now select 300BPS, then play the `.wav` file -1. When it finishes, press "Yes", then press "OK" -1. Press the START button -1. Select the SH2E-xxx.TXT file, then press OK, then "Yes" to execute it - + If you get kicked back into menu, make sure you're using the latest version of SmileBASIC -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/pt_PT/homebrew-launcher-(steelhax).txt b/_pages/pt_PT/homebrew-launcher-(steelhax).txt deleted file mode 100644 index 9b8dace5a3..0000000000 --- a/_pages/pt_PT/homebrew-launcher-(steelhax).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (Steelhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Steel Diver: Sub Wars, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Steel Diver: Sub Wars save file, if you have one. If you wish to preserve your Steel Diver: Sub Wars game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Steel Diver: Sub Wars" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Steel Diver: Sub Wars -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Steelhax](/assets/steelhax-release.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Prep Work - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the `steelhax` folder from the `Steelhax-release.zip` to the root of your SD card -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - Steelminer - -In this section, you will create a hacked Steel Diver: Sub Wars save file that, when used, will load the Homebrew Launcher on your console. - -1. Launch "Steel Diver: Sub Wars" once and select a Mii to initialize your save file - + Decline the game update when prompted - + If you have already updated the game, use the Data Management menu of the System Settings to delete the update -1. Exit "Steel Diver: Sub Wars" -1. Power off your console -1. Insert your SD card into your computer -1. Open [the SteelHax Save Tool website](https://3dstools.nhnarwhal.com/#/steelhax) on your computer -1. Select your `movable.sed` file -1. Select your region based on your console -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `<8-character-region>` -> `data` on your SD card - + **EUR Region**: `000d7e00` - + **JPN Region**: `000d7c00` - + **USA Region**: `000d7d00` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Steel Diver: Sub Wars" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/pt_PT/homebrew-launcher-(super-skaterhax).txt b/_pages/pt_PT/homebrew-launcher-(super-skaterhax).txt deleted file mode 100644 index 5895c4f64b..0000000000 --- a/_pages/pt_PT/homebrew-launcher-(super-skaterhax).txt +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: "Homebrew Launcher (super-skaterhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see [here](https://github.com/zoogie/super-skaterhax). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -Super-skaterhax (when used to launch the Homebrew Launcher) is compatible with New models on version 11.16.0 in all regions, and 11.17.0 in the EUR, JPN and USA regions. - -The instructions provided only apply to the New 3DS, New 3DS XL, and New 2DS XL. Please ensure that the console you are modding is a New 3DS, New 3DS XL, or New 2DS XL before continuing. -{: .notice--warning} - -### What You Need - -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* The latest release of [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (the release `.zip` file) - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger both super-skaterhax and the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy everything inside the folder for your console's region (and also system version if the region is USA) in the super-skaterhax `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/skater-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - super-skaterhax - -In this section, you will visit the browser exploit webpage, which will launch the Homebrew Launcher. - -If you haven't already, make sure you have a working Internet connection set up on your console. -{: .notice--info} - -1. On the HOME Menu, press the Left and Right shoulder buttons at the same time to open the camera - + If you are unable to open the camera, open the Internet Browser and manually type the URL instead (`https://zoogie.github.io/web/super/` for EUR/USA/JPN, `https://zoogie.github.io/web/korea` for KOR) -1. Tap the QR code button and scan one of the following QR codes for your console's region [here](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png) - + If you get a security certificate warning, press (A) to allow the connection -1. Press the (Select) button to open the bookmark tab - + If your (Select) button does not respond, tap the star icon on the bottom-left corner of the screen -1. Tap "Bookmark this page" -1. Press (B) once to return to the browser -1. Press (Start) to open the context menu - + If your (Start) button does not respond, tap the 3-line menu on the bottom-right corner of the screen -1. Tap on "Settings" -1. Tap on "Delete Cookies" -1. Press (A) to continue -1. Press (Home) to return to the HOME Menu, then immediately press (A) to launch the browser again -1. Select the "GO GO!" button on the top screen - + If any prompts appear, approve all of them - + If your console freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your console freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section - + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/pt_PT/include/fredtool-prep.txt b/_pages/pt_PT/include/fredtool-prep.txt deleted file mode 100644 index bd910b24de..0000000000 --- a/_pages/pt_PT/include/fredtool-prep.txt +++ /dev/null @@ -1,29 +0,0 @@ -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Insert your SD card into your computer -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} \ No newline at end of file diff --git a/_pages/pt_PT/include/hbl-common-exploits-movable.txt b/_pages/pt_PT/include/hbl-common-exploits-movable.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/pt_PT/include/hbl-common-exploits-movable.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/pt_PT/include/hbl-common-exploits.txt b/_pages/pt_PT/include/hbl-common-exploits.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/pt_PT/include/hbl-common-exploits.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/pt_PT/installing-boot9strap-(fredtool).txt b/_pages/pt_PT/installing-boot9strap-(fredtool).txt deleted file mode 100644 index a06a1259f2..0000000000 --- a/_pages/pt_PT/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer](seedminer) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/pt_PT/installing-boot9strap-(fredtool-legacy).txt b/_pages/pt_PT/installing-boot9strap-(fredtool-legacy).txt deleted file mode 100644 index 7e88fb51b4..0000000000 --- a/_pages/pt_PT/installing-boot9strap-(fredtool-legacy).txt +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool, Legacy)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. - -Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/pt_PT/installing-boot9strap-(frogtool).txt b/_pages/pt_PT/installing-boot9strap-(frogtool).txt deleted file mode 100644 index 063799fcc6..0000000000 --- a/_pages/pt_PT/installing-boot9strap-(frogtool).txt +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Installing boot9strap (Frogtool)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see "DSiWare_Exports CTCert verification" and "FIRM partitions known-plaintext" [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - - -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) link for `frogcert.bin` on this page, you will need a torrent client like [qBittorrent](https://www.qbittorrent.org/download.php) or [Deluge](http://dev.deluge-torrent.org/wiki/Download). -{: .notice--warning} - -### What You Need - -* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link) -* The latest release of [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (direct download) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Copy `boot.nds` (b9sTool) from the b9sTool release `.zip` to the root of your SD card -1. Create a folder named `3ds` on the root of your SD card if it does not already exist - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy the `Frogtool` folder from the Frogtool-nimhax `.zip` to the `/3ds/` folder on your SD card -1. Copy `frogcert.bin` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section III - Patching DS Download Play - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch Frogtool from the list of homebrew -1. Select the "INJECT patched DS Download Play" option -1. Frogtool will automatically run and inject the JPN version of Flipnote Studio into your DS Download Play -1. Once this operation has finished, read the screens and check if the process was successful -1. Tap the touch screen, then select "BOOT patched DS Download Play" -1. If the exploit was successful, your console will have loaded the JPN version of Flipnote Studio - + If you get stuck on a black screen, follow [this](https://wiki.hacks.guide/wiki/3DS:TWLFix#Userland_(PicHaxx,_Steelhax,_etc.)-0) page, then try again - -#### Section IV - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsdlp" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Download Play - -1. Launch the Download Play application -1. Wait until you see the two buttons - + Do not press either of the buttons -1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu -1. Select "Miscellaneous options" -1. Select "Switch the hb. title to the current app." -1. Press (B) to continue -1. Press (B) to return to the Rosalina main menu -1. Press (B) to exit the Rosalina menu -1. Press (Home), then close Download Play -1. Relaunch the Download Play application -1. Your console should load the Homebrew Launcher -1. Launch Frogtool from the list of homebrew -1. Select the "RESTORE clean DS Download Play" option -1. Once this operation has finished, read the screens and check if the process was successful - + If there are any errors or missing files, correct the problem and try again -1. If the process was successful, tap the touch screen, then press START to exit -1. Power off your console - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/pt_PT/installing-boot9strap-(hbl-usm).txt b/_pages/pt_PT/installing-boot9strap-(hbl-usm).txt deleted file mode 100644 index de8dad596a..0000000000 --- a/_pages/pt_PT/installing-boot9strap-(hbl-usm).txt +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "Installing boot9strap (HBL-USM)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--danger} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) (direct download) - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. Then, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Insert your SD card into your computer -1. Create a folder named `boot9strap` on the root of your SD card -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the RELEASE `.zip` to the `/boot9strap/` folder on your SD card -1. Create a folder named `3ds` on the root of your SD card if it does not already exist - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy `slotTool.3dsx` from the `slotTool` folder inside the RELEASE `.zip` to the `/3ds/` folder on your SD card -1. Copy `usm.bin` from the RELEASE `.zip` to the root folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch slotTool from the list of homebrew - + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section -1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option - + You will see some on-screen text and then your system will shut down - -![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section III - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section IV - Restoring WiFi Configuration Profiles - -{% include_relative include/remove-usm-slottool.txt %} - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/pt_PT/installing-boot9strap-(usm).txt b/_pages/pt_PT/installing-boot9strap-(usm).txt deleted file mode 100644 index 9dcede6ffe..0000000000 --- a/_pages/pt_PT/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: "Installing boot9strap (USM)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. - -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--warning} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* [usm.bin](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) - - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. - -1. Your SD card should be inserted in your computer -1. Copy `usm.bin` to the root of your SD card -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Create a folder named `boot9strap` on the root of your SD card -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card - -![]({{ "/images/screenshots/usm/usm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If the BB3 multihax menu doesn't open, [follow this troubleshooting guide](troubleshooting#bannerbomb3) - + If the BB3 multihax menu says "cfw installed already", you already have custom firmware and should continue from [here](checking-for-cfw) -1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" - + Your console will automatically power off -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Internet Settings` -> `Connection Settings` -1. Ensure that all three connections are named "Haaaaaaaxxxxxxxxx..." - + Do NOT change these settings! - + If all three connections are NOT all named "Haaaaaaaxxxxxxxxx...", STOP! Something went wrong in this section and MUST be fixed before you can continue -1. Power off your console - -#### Section III - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section IV - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section V - Restoring WiFi Configuration Profiles - -In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. - -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" - + Your console will automatically reboot -1. Power off your console -1. Insert your SD card into your computer -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/ro_RO/dumping-movable-(nimhax).txt b/_pages/ro_RO/dumping-movable-(nimhax).txt deleted file mode 100644 index b52b65c3cb..0000000000 --- a/_pages/ro_RO/dumping-movable-(nimhax).txt +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: "Dumping Movable (nimhax)" ---- - -{% include toc title="Cuprins" %} - -{% capture technical_info %} -Technical Details (optional) - -To install boot9strap on your console, we derive your console's unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console. - -For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Ce aveți nevoie - -* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file) - -### Instrucțiuni - -#### Secțiunea I - Preparații - -1. Power off your console -1. Introduceți cardul SD în calculator -1. Copy the `nimhax` folder from the nimhax `.zip` to the `/3ds/` folder on your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) -{: .notice--info} - -#### Section II - nimhax - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch nimhax from the list of homebrew -1. If the exploit was successful, a `movable.sed` file will appear on the root of your SD card - -### Next step: Frogtool - -Once you have your console's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \ -While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you're unable to use a torrent client. - -Continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--primary} diff --git a/_pages/ro_RO/homebrew-launcher-(freakyhax).txt b/_pages/ro_RO/homebrew-launcher-(freakyhax).txt deleted file mode 100644 index 29e3cd58f6..0000000000 --- a/_pages/ro_RO/homebrew-launcher-(freakyhax).txt +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: "Homebrew Launcher (freakyhax)" ---- - -{% include toc title="Cuprins" %} - -{% capture technical_info %} -Technical Details (optional) -[freakyhax](https://plutooo.github.io/freakyhax/) is an exploit for the game Freakyforms Deluxe discovered and released by [plutooo](https://github.com/plutooo). It works on versions 9.0.0 through 11.17.0 on EUR, USA and JPN region consoles. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -### Ce aveți nevoie - -+ A EUR/USA/JPN copy of Freakyforms Deluxe (eShop or cartridge) -+ The latest release of [freakyhax](https://github.com/plutooo/freakyhax/releases/latest) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instrucțiuni - -#### Secțiunea I - Preparații - -1. Power off your console -1. Introduceți cardul SD în calculator -1. Copy all files and folders inside the `/build//exploit/` folder from the freakyhax `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copiați `boot.firm` și `boot.3dsx` de la Luma3DS `.zip` pe rădăcina cardului SD -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - freakyhax - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch Freakyforms Deluxe -1. In the game menu, select `Play -> Camera -> Load a QR code` -1. Select the QR code -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/ro_RO/homebrew-launcher-(ninjhax2-dx).txt b/_pages/ro_RO/homebrew-launcher-(ninjhax2-dx).txt deleted file mode 100644 index ed5a3ead61..0000000000 --- a/_pages/ro_RO/homebrew-launcher-(ninjhax2-dx).txt +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "Homebrew Launcher (ninjhax2-dx)" ---- - -{% include toc title="Cuprins" %} - -{% capture technical_info %} -Technical Details (optional) -[Ninjhax2](https://github.com/smealum/ninjhax2.x) is an exploit for the game "Cubic Ninja" made by [smealum](https://github.com/smealum). This page uses an updated version of ninjhax by [zoogie](https://github.com/zoogie) called [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx), which supports 11.17.0. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -This process will overwrite your Cubic Ninja save file, if you have one. -{: .notice--warning} - -### Ce aveți nevoie -* The game "Cubic Ninja" -* The latest release of [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx/releases) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -### Instrucțiuni - -#### Secțiunea I - Preparații - -1. Power off your console -1. Introduceți cardul SD în calculator -1. Copy `Launcher.dat` from the folder appropriate for your console from the ninjhax2-dx `.zip` file to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copiați `boot.firm` și `boot.3dsx` de la Luma3DS `.zip` pe rădăcina cardului SD - -#### Section II - ninjhax2-dx -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Cubic Ninja" once and select "Create" - + If prompted, delete all data -1. Select "QR Code" -1. Select "Scan QR Code" -1. On your PC, open the browser and go to [ninjhax2-dx website](https://zoogie.github.io/web/nh2dx/) -1. Select your console's region and hardware -1. On your console, scan the QR code - + If the game exits to the HOME Menu, then the exploit has installed correctly -1. Launch "Cubic Ninja" again -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/ro_RO/homebrew-launcher-(pichaxx).txt b/_pages/ro_RO/homebrew-launcher-(pichaxx).txt deleted file mode 100644 index f1c17c4d8c..0000000000 --- a/_pages/ro_RO/homebrew-launcher-(pichaxx).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (PicHaxx)" ---- - -{% include toc title="Cuprins" %} - -{% capture technical_info %} -Technical Details (optional) -[PicHaxx](https://github.com/zoogie/pichaxx) is an exploit for the game Pokémon Picross released by [zoogie](https://github.com/zoogie), originally discovered and [demonstrated](https://twitter.com/mrnbayoh/status/744899681663258624) by [MrNbaYoh](https://github.com/MrNbaYoh). - -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### Ce aveți nevoie - -+ The game "Pokémon Picross" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Pokémon Picross -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instrucțiuni - -#### Secțiunea I - Preparații - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Introduceți cardul SD în calculator -1. Copiați `boot.firm` și `boot.3dsx` de la Luma3DS `.zip` pe rădăcina cardului SD - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card - -![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - PicHaxx - -In this section, you will create a hacked Pokémon Picross save file that, when loaded, will run the Homebrew Launcher on your console. - -1. Open [the PicHaxx Injector website](https://3dstools.nhnarwhal.com/#/pichaxx) on your computer -1. Select your `movable.sed` file -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `0017c100` -> `data` on your SD card - + The `` will be the same one that you used in Seedminer - + The `` is a 32 character long folder inside of the `` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted - - ![]({{ "/images/screenshots/pichaxx-save-location.png" | absolute_url }}) - {: .notice--info} - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Pokémon Picross" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher - + If you get an error message, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-pichaxx) -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/ro_RO/homebrew-launcher-(smilehax-iie).txt b/_pages/ro_RO/homebrew-launcher-(smilehax-iie).txt deleted file mode 100644 index 5305c52936..0000000000 --- a/_pages/ro_RO/homebrew-launcher-(smilehax-iie).txt +++ /dev/null @@ -1,70 +0,0 @@ ---- -title: "Homebrew Launcher (smilehax-IIe)" ---- - -{% include toc title="Cuprins" %} - -This set of instructions does not support the Japanese version of SmileBASIC. -{: .notice--warning} - -{% capture technical_info %} -Technical Details (optional) -[smilehax-IIe](https://github.com/zoogie/smilehax-IIe) is an exploit for the game "SmileBASIC" made by zoogie, compatible with system versions 9.0.0 through 11.17.0 for USA/EUR/JPN region consoles. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Ce aveți nevoie -+ The game "SmileBASIC" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install SmileBASIC -+ The latest release of [smilehax-IIe](https://github.com/zoogie/smilehax-IIe/releases/download/v1.1/Release_sh2e_v1.1.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instrucțiuni - -#### Secțiunea I - Preparații - -1. Power off your console -1. Introduceți cardul SD în calculator -1. Copiați `boot.firm` și `boot.3dsx` de la Luma3DS `.zip` pe rădăcina cardului SD - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Transfer the `.wav` for your region from the Release_sh2e `.zip` to a device that can play `.wav` files, for example a phone -1. Copy the petitcom `.icn` for your region to the root of your SD card - -#### Section II - smilehax - -1. Launch SmileBASIC - + Update the game if prompted -1. Select the "Publish/Download Projects" option -1. Select the "Download (Receive) using Public Key" option -1. Press the "Yes" button -1. Enter the Public Key "NJEQK3A4" using the on-screen keyboard -1. Press the "Yes" button to confirm the download of PMODEM141 -1. Press "OK", then "Back", then "Browse Projects" -1. Select PMODEM141, then press "Select File" -1. Select PMODEM141.PRG, then press "OK", then "Yes" to execute it -1. Select RECEIVE FILE SIMPLEX -1. Prepare the device you use to play the `.wav` file -1. Keep your console about a foot from the `.wav` file playing devices' speaker and use a reasonable (not loud) volume to play the `.wav` -1. Now select 300BPS, then play the `.wav` file -1. When it finishes, press "Yes", then press "OK" -1. Press the START button -1. Select the SH2E-xxx.TXT file, then press OK, then "Yes" to execute it - + If you get kicked back into menu, make sure you're using the latest version of SmileBASIC -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/ro_RO/homebrew-launcher-(steelhax).txt b/_pages/ro_RO/homebrew-launcher-(steelhax).txt deleted file mode 100644 index 602a05bd1a..0000000000 --- a/_pages/ro_RO/homebrew-launcher-(steelhax).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (Steelhax)" ---- - -{% include toc title="Cuprins" %} - -{% capture technical_info %} -Technical Details (optional) -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Steel Diver: Sub Wars, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Steel Diver: Sub Wars save file, if you have one. If you wish to preserve your Steel Diver: Sub Wars game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### Ce aveți nevoie - -+ The game "Steel Diver: Sub Wars" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Steel Diver: Sub Wars -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Steelhax](/assets/steelhax-release.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instrucțiuni - -#### Secțiunea I - Preparații - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Introduceți cardul SD în calculator -1. Copiați `boot.firm` și `boot.3dsx` de la Luma3DS `.zip` pe rădăcina cardului SD - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the `steelhax` folder from the `Steelhax-release.zip` to the root of your SD card -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - Steelminer - -In this section, you will create a hacked Steel Diver: Sub Wars save file that, when used, will load the Homebrew Launcher on your console. - -1. Launch "Steel Diver: Sub Wars" once and select a Mii to initialize your save file - + Decline the game update when prompted - + If you have already updated the game, use the Data Management menu of the System Settings to delete the update -1. Exit "Steel Diver: Sub Wars" -1. Power off your console -1. Introduceți cardul SD în calculator -1. Open [the SteelHax Save Tool website](https://3dstools.nhnarwhal.com/#/steelhax) on your computer -1. Select your `movable.sed` file -1. Select your region based on your console -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `<8-character-region>` -> `data` on your SD card - + **EUR Region**: `000d7e00` - + **JPN Region**: `000d7c00` - + **USA Region**: `000d7d00` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Steel Diver: Sub Wars" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/ro_RO/homebrew-launcher-(super-skaterhax).txt b/_pages/ro_RO/homebrew-launcher-(super-skaterhax).txt deleted file mode 100644 index 83abccd4bd..0000000000 --- a/_pages/ro_RO/homebrew-launcher-(super-skaterhax).txt +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: "Homebrew Launcher (super-skaterhax)" ---- - -{% include toc title="Cuprins" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see [here](https://github.com/zoogie/super-skaterhax). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -Super-skaterhax (when used to launch the Homebrew Launcher) is compatible with New models on version 11.16.0 in all regions, and 11.17.0 in the EUR, JPN and USA regions. - -The instructions provided only apply to the New 3DS, New 3DS XL, and New 2DS XL. Please ensure that the console you are modding is a New 3DS, New 3DS XL, or New 2DS XL before continuing. -{: .notice--warning} - -### Ce aveți nevoie - -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* The latest release of [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (the release `.zip` file) - -#### Secțiunea I - Preparații - -In this section, you will copy the files needed to trigger both super-skaterhax and the Homebrew Launcher. - -1. Power off your console -1. Introduceți cardul SD în calculator -1. Copiați `boot.firm` și `boot.3dsx` de la Luma3DS `.zip` pe rădăcina cardului SD - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy everything inside the folder for your console's region (and also system version if the region is USA) in the super-skaterhax `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/skater-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - super-skaterhax - -In this section, you will visit the browser exploit webpage, which will launch the Homebrew Launcher. - -If you haven't already, make sure you have a working Internet connection set up on your console. -{: .notice--info} - -1. On the HOME Menu, press the Left and Right shoulder buttons at the same time to open the camera - + If you are unable to open the camera, open the Internet Browser and manually type the URL instead (`https://zoogie.github.io/web/super/` for EUR/USA/JPN, `https://zoogie.github.io/web/korea` for KOR) -1. Tap the QR code button and scan one of the following QR codes for your console's region [here](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png) - + If you get a security certificate warning, press (A) to allow the connection -1. Press the (Select) button to open the bookmark tab - + If your (Select) button does not respond, tap the star icon on the bottom-left corner of the screen -1. Tap "Bookmark this page" -1. Press (B) once to return to the browser -1. Press (Start) to open the context menu - + If your (Start) button does not respond, tap the 3-line menu on the bottom-right corner of the screen -1. Tap on "Settings" -1. Tap on "Delete Cookies" -1. Apăsați (A) pentru a continua -1. Press (Home) to return to the HOME Menu, then immediately press (A) to launch the browser again -1. Select the "GO GO!" button on the top screen - + If any prompts appear, approve all of them - + If your console freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your console freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section - + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/ro_RO/include/fredtool-prep.txt b/_pages/ro_RO/include/fredtool-prep.txt deleted file mode 100644 index f2e9a9d9da..0000000000 --- a/_pages/ro_RO/include/fredtool-prep.txt +++ /dev/null @@ -1,29 +0,0 @@ -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Introduceți cardul SD în calculator -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigați spre `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` pe cardul SD - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copiați `boot.firm` și `boot.3dsx` de la Luma3DS `.zip` pe rădăcina cardului SD - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copiați folderul `private` de pe arhiva Frogminer_save `.zip` în rădăcina cardului SD -1. Reinsert your SD card into your console -1. Power on your console - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} \ No newline at end of file diff --git a/_pages/ro_RO/include/hbl-common-exploits-movable.txt b/_pages/ro_RO/include/hbl-common-exploits-movable.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/ro_RO/include/hbl-common-exploits-movable.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/ro_RO/include/hbl-common-exploits.txt b/_pages/ro_RO/include/hbl-common-exploits.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/ro_RO/include/hbl-common-exploits.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/ro_RO/installing-boot9strap-(fredtool).txt b/_pages/ro_RO/installing-boot9strap-(fredtool).txt deleted file mode 100644 index 4ef9a4e79b..0000000000 --- a/_pages/ro_RO/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool)" ---- - -{% include toc title="Cuprins" %} - -{% capture technical_info %} -Technical Details (optional) - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### Ce aveți nevoie - -* Fișierul 'movable.sed' de la completarea lui [Seedminer](seedminer) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continuați la [Finalizând instalarea](finalizing-setup) -{: .notice--primary} diff --git a/_pages/ro_RO/installing-boot9strap-(fredtool-legacy).txt b/_pages/ro_RO/installing-boot9strap-(fredtool-legacy).txt deleted file mode 100644 index fa32e79e4b..0000000000 --- a/_pages/ro_RO/installing-boot9strap-(fredtool-legacy).txt +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool, Legacy)" ---- - -{% include toc title="Cuprins" %} - -{% capture technical_info %} -Technical Details (optional) - -Pentru a descărca DSiWare de sistem, vom exploata o eroare din fereastra DSiWare Data Management de la aplicația Settings. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. - -Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### Ce aveți nevoie - -* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continuați la [Finalizând instalarea](finalizing-setup) -{: .notice--primary} diff --git a/_pages/ro_RO/installing-boot9strap-(frogtool).txt b/_pages/ro_RO/installing-boot9strap-(frogtool).txt deleted file mode 100644 index 32aab11352..0000000000 --- a/_pages/ro_RO/installing-boot9strap-(frogtool).txt +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Installing boot9strap (Frogtool)" ---- - -{% include toc title="Cuprins" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see "DSiWare_Exports CTCert verification" and "FIRM partitions known-plaintext" [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - - -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) link for `frogcert.bin` on this page, you will need a torrent client like [qBittorrent](https://www.qbittorrent.org/download.php) or [Deluge](http://dev.deluge-torrent.org/wiki/Download). -{: .notice--warning} - -### Ce aveți nevoie - -* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link) -* The latest release of [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (direct download) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Secțiunea II - Preparații - -1. Power off your console -1. Introduceți cardul SD în calculator -1. Copiați `boot.firm` și `boot.3dsx` de la Luma3DS `.zip` pe rădăcina cardului SD -1. Copy `boot.nds` (b9sTool) from the b9sTool release `.zip` to the root of your SD card -1. Creați un folder numit `3ds` în rădăcina cardului SD dacă nu există deja - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy the `Frogtool` folder from the Frogtool-nimhax `.zip` to the `/3ds/` folder on your SD card -1. Copy `frogcert.bin` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section III - Patching DS Download Play - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch Frogtool from the list of homebrew -1. Select the "INJECT patched DS Download Play" option -1. Frogtool will automatically run and inject the JPN version of Flipnote Studio into your DS Download Play -1. Once this operation has finished, read the screens and check if the process was successful -1. Tap the touch screen, then select "BOOT patched DS Download Play" -1. If the exploit was successful, your console will have loaded the JPN version of Flipnote Studio - + If you get stuck on a black screen, follow [this](https://wiki.hacks.guide/wiki/3DS:TWLFix#Userland_(PicHaxx,_Steelhax,_etc.)-0) page, then try again - -#### Section IV - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsdlp" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Download Play - -1. Lansați aplicația Download Play -1. Așteptați până când vedeți două butoane - + Do not press either of the buttons -1. Apăsați (L) + (Jos) + (Select) în același timp ca să deschideți meniul Rosalina -1. Selectați "Miscellaneous options" -1. Selectați "Switch the hb. title to the current app" -1. Apăsați (B) pentru a continua -1. Apăsați (B) ca să vă întoarceți la meniul principal Rosalina -1. Apăsați (B) pentru a ieși din meniul Rosalina -1. Apăsați (Home), apoi închideți Download Play -1. Relaunch the Download Play application -1. Your console should load the Homebrew Launcher -1. Launch Frogtool from the list of homebrew -1. Select the "RESTORE clean DS Download Play" option -1. Once this operation has finished, read the screens and check if the process was successful - + If there are any errors or missing files, correct the problem and try again -1. If the process was successful, tap the touch screen, then press START to exit -1. Power off your console - -___ - -### Continuați la [Finalizând instalarea](finalizing-setup) -{: .notice--primary} diff --git a/_pages/ro_RO/installing-boot9strap-(hbl-usm).txt b/_pages/ro_RO/installing-boot9strap-(hbl-usm).txt deleted file mode 100644 index f346d81ed4..0000000000 --- a/_pages/ro_RO/installing-boot9strap-(hbl-usm).txt +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "Installing boot9strap (HBL-USM)" ---- - -{% include toc title="Cuprins" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--danger} - -### Ce aveți nevoie - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) (direct download) - -#### Secțiunea I - Preparații - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. Then, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Introduceți cardul SD în calculator -1. Creați un folder numit `boot9strap` pe rădăcina cardului SD -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the RELEASE `.zip` to the `/boot9strap/` folder on your SD card -1. Creați un folder numit `3ds` în rădăcina cardului SD dacă nu există deja - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy `slotTool.3dsx` from the `slotTool` folder inside the RELEASE `.zip` to the `/3ds/` folder on your SD card -1. Copy `usm.bin` from the RELEASE `.zip` to the root folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch slotTool from the list of homebrew - + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section -1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option - + You will see some on-screen text and then your system will shut down - -![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Secțiunea III - Instalând boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section IV - Restoring WiFi Configuration Profiles - -{% include_relative include/remove-usm-slottool.txt %} - -___ - -### Continuați la [Finalizând instalarea](finalizing-setup) -{: .notice--primary} diff --git a/_pages/ro_RO/installing-boot9strap-(usm).txt b/_pages/ro_RO/installing-boot9strap-(usm).txt deleted file mode 100644 index 2abbff7284..0000000000 --- a/_pages/ro_RO/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: "Installing boot9strap (USM)" ---- - -{% include toc title="Cuprins" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -Aceste instrucțiuni funcționează pe consolele din regiunea SUA, Europa, Japonia și Coreea, indicate de literele U, E, J, sau K după versiunea de sistem. - -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--warning} - -### Ce aveți nevoie - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* [usm.bin](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) - - -#### Secțiunea I - Preparații - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. - -1. Your SD card should be inserted in your computer -1. Copy `usm.bin` to the root of your SD card -1. Copiați `boot.firm` și `boot.3dsx` de la Luma3DS `.zip` pe rădăcina cardului SD - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Creați un folder numit `boot9strap` pe rădăcina cardului SD -1. Copiați `boot9strap.firm` și `boot9strap.firm.sha` din arhiva `.zip` boot9strap în folderul `/boot9strap/` de pe cardul SD -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card - -![]({{ "/images/screenshots/usm/usm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If the BB3 multihax menu doesn't open, [follow this troubleshooting guide](troubleshooting#bannerbomb3) - + If the BB3 multihax menu says "cfw installed already", you already have custom firmware and should continue from [here](checking-for-cfw) -1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" - + Your console will automatically power off -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Internet Settings` -> `Connection Settings` -1. Ensure that all three connections are named "Haaaaaaaxxxxxxxxx..." - + Do NOT change these settings! - + If all three connections are NOT all named "Haaaaaaaxxxxxxxxx...", STOP! Something went wrong in this section and MUST be fixed before you can continue -1. Power off your console - -#### Section III - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section IV - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section V - Restoring WiFi Configuration Profiles - -In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. - -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" - + Your console will automatically reboot -1. Power off your console -1. Introduceți cardul SD în calculator -1. Navigați spre `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` pe cardul SD -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. Acest fișier nu mai este necesar - -___ - -### Continuați la [Finalizând instalarea](finalizing-setup) -{: .notice--primary} diff --git a/_pages/ru_RU/dumping-movable-(nimhax).txt b/_pages/ru_RU/dumping-movable-(nimhax).txt deleted file mode 100644 index ab1d177db7..0000000000 --- a/_pages/ru_RU/dumping-movable-(nimhax).txt +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: "Dumping Movable (nimhax)" ---- - -{% include toc title="Содержание" %} - -{% capture technical_info %} -Technical Details (optional) - -To install boot9strap on your console, we derive your console's unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console. - -For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Что понадобится - -* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file) - -### Инструкция - -#### Часть I - Подготовительные работы - -1. Power off your console -1. Вставьте SD-карту в компьютер -1. Copy the `nimhax` folder from the nimhax `.zip` to the `/3ds/` folder on your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) -{: .notice--info} - -#### Section II - nimhax - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch nimhax from the list of homebrew -1. If the exploit was successful, a `movable.sed` file will appear on the root of your SD card - -### Next step: Frogtool - -Once you have your console's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \ -While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you're unable to use a torrent client. - -Continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--primary} diff --git a/_pages/ru_RU/homebrew-launcher-(freakyhax).txt b/_pages/ru_RU/homebrew-launcher-(freakyhax).txt deleted file mode 100644 index d03c00f9c0..0000000000 --- a/_pages/ru_RU/homebrew-launcher-(freakyhax).txt +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: "Homebrew Launcher (freakyhax)" ---- - -{% include toc title="Содержание" %} - -{% capture technical_info %} -Technical Details (optional) -[freakyhax](https://plutooo.github.io/freakyhax/) is an exploit for the game Freakyforms Deluxe discovered and released by [plutooo](https://github.com/plutooo). It works on versions 9.0.0 through 11.17.0 on EUR, USA and JPN region consoles. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -### Что понадобится - -+ A EUR/USA/JPN copy of Freakyforms Deluxe (eShop or cartridge) -+ The latest release of [freakyhax](https://github.com/plutooo/freakyhax/releases/latest) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Инструкция - -#### Часть I - Подготовительные работы - -1. Power off your console -1. Вставьте SD-карту в компьютер -1. Copy all files and folders inside the `/build//exploit/` folder from the freakyhax `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Скопируйте файлы `boot.firm` и `boot.3dsx` из `.zip-архива` Luma3DS в корень SD-карты -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - freakyhax - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch Freakyforms Deluxe -1. In the game menu, select `Play -> Camera -> Load a QR code` -1. Select the QR code -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/ru_RU/homebrew-launcher-(ninjhax2-dx).txt b/_pages/ru_RU/homebrew-launcher-(ninjhax2-dx).txt deleted file mode 100644 index 9bfcd3415f..0000000000 --- a/_pages/ru_RU/homebrew-launcher-(ninjhax2-dx).txt +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "Homebrew Launcher (ninjhax2-dx)" ---- - -{% include toc title="Содержание" %} - -{% capture technical_info %} -Technical Details (optional) -[Ninjhax2](https://github.com/smealum/ninjhax2.x) is an exploit for the game "Cubic Ninja" made by [smealum](https://github.com/smealum). This page uses an updated version of ninjhax by [zoogie](https://github.com/zoogie) called [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx), which supports 11.17.0. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -This process will overwrite your Cubic Ninja save file, if you have one. -{: .notice--warning} - -### Что понадобится -* The game "Cubic Ninja" -* The latest release of [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx/releases) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -### Инструкция - -#### Часть I - Подготовительные работы - -1. Power off your console -1. Вставьте SD-карту в компьютер -1. Copy `Launcher.dat` from the folder appropriate for your console from the ninjhax2-dx `.zip` file to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Скопируйте файлы `boot.firm` и `boot.3dsx` из `.zip-архива` Luma3DS в корень SD-карты - -#### Section II - ninjhax2-dx -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Cubic Ninja" once and select "Create" - + If prompted, delete all data -1. Select "QR Code" -1. Select "Scan QR Code" -1. On your PC, open the browser and go to [ninjhax2-dx website](https://zoogie.github.io/web/nh2dx/) -1. Select your console's region and hardware -1. On your console, scan the QR code - + If the game exits to the HOME Menu, then the exploit has installed correctly -1. Launch "Cubic Ninja" again -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/ru_RU/homebrew-launcher-(pichaxx).txt b/_pages/ru_RU/homebrew-launcher-(pichaxx).txt deleted file mode 100644 index 0e658924e8..0000000000 --- a/_pages/ru_RU/homebrew-launcher-(pichaxx).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (PicHaxx)" ---- - -{% include toc title="Содержание" %} - -{% capture technical_info %} -Technical Details (optional) -[PicHaxx](https://github.com/zoogie/pichaxx) is an exploit for the game Pokémon Picross released by [zoogie](https://github.com/zoogie), originally discovered and [demonstrated](https://twitter.com/mrnbayoh/status/744899681663258624) by [MrNbaYoh](https://github.com/MrNbaYoh). - -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### Что понадобится - -+ The game "Pokémon Picross" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Pokémon Picross -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Инструкция - -#### Часть I - Подготовительные работы - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Вставьте SD-карту в компьютер -1. Скопируйте файлы `boot.firm` и `boot.3dsx` из `.zip-архива` Luma3DS в корень SD-карты - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card - -![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - PicHaxx - -In this section, you will create a hacked Pokémon Picross save file that, when loaded, will run the Homebrew Launcher on your console. - -1. Open [the PicHaxx Injector website](https://3dstools.nhnarwhal.com/#/pichaxx) on your computer -1. Select your `movable.sed` file -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `0017c100` -> `data` on your SD card - + The `` will be the same one that you used in Seedminer - + The `` is a 32 character long folder inside of the `` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted - - ![]({{ "/images/screenshots/pichaxx-save-location.png" | absolute_url }}) - {: .notice--info} - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Pokémon Picross" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher - + If you get an error message, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-pichaxx) -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/ru_RU/homebrew-launcher-(smilehax-iie).txt b/_pages/ru_RU/homebrew-launcher-(smilehax-iie).txt deleted file mode 100644 index 11d0cff9b5..0000000000 --- a/_pages/ru_RU/homebrew-launcher-(smilehax-iie).txt +++ /dev/null @@ -1,70 +0,0 @@ ---- -title: "Homebrew Launcher (smilehax-IIe)" ---- - -{% include toc title="Содержание" %} - -This set of instructions does not support the Japanese version of SmileBASIC. -{: .notice--warning} - -{% capture technical_info %} -Technical Details (optional) -[smilehax-IIe](https://github.com/zoogie/smilehax-IIe) is an exploit for the game "SmileBASIC" made by zoogie, compatible with system versions 9.0.0 through 11.17.0 for USA/EUR/JPN region consoles. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Что понадобится -+ The game "SmileBASIC" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install SmileBASIC -+ The latest release of [smilehax-IIe](https://github.com/zoogie/smilehax-IIe/releases/download/v1.1/Release_sh2e_v1.1.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Инструкция - -#### Часть I - Подготовительные работы - -1. Power off your console -1. Вставьте SD-карту в компьютер -1. Скопируйте файлы `boot.firm` и `boot.3dsx` из `.zip-архива` Luma3DS в корень SD-карты - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Transfer the `.wav` for your region from the Release_sh2e `.zip` to a device that can play `.wav` files, for example a phone -1. Copy the petitcom `.icn` for your region to the root of your SD card - -#### Section II - smilehax - -1. Launch SmileBASIC - + Update the game if prompted -1. Select the "Publish/Download Projects" option -1. Select the "Download (Receive) using Public Key" option -1. Press the "Yes" button -1. Enter the Public Key "NJEQK3A4" using the on-screen keyboard -1. Press the "Yes" button to confirm the download of PMODEM141 -1. Press "OK", then "Back", then "Browse Projects" -1. Select PMODEM141, then press "Select File" -1. Select PMODEM141.PRG, then press "OK", then "Yes" to execute it -1. Select RECEIVE FILE SIMPLEX -1. Prepare the device you use to play the `.wav` file -1. Keep your console about a foot from the `.wav` file playing devices' speaker and use a reasonable (not loud) volume to play the `.wav` -1. Now select 300BPS, then play the `.wav` file -1. When it finishes, press "Yes", then press "OK" -1. Press the START button -1. Select the SH2E-xxx.TXT file, then press OK, then "Yes" to execute it - + If you get kicked back into menu, make sure you're using the latest version of SmileBASIC -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/ru_RU/homebrew-launcher-(steelhax).txt b/_pages/ru_RU/homebrew-launcher-(steelhax).txt deleted file mode 100644 index 660d47a461..0000000000 --- a/_pages/ru_RU/homebrew-launcher-(steelhax).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (Steelhax)" ---- - -{% include toc title="Содержание" %} - -{% capture technical_info %} -Technical Details (optional) -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Steel Diver: Sub Wars, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Steel Diver: Sub Wars save file, if you have one. If you wish to preserve your Steel Diver: Sub Wars game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### Что понадобится - -+ The game "Steel Diver: Sub Wars" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Steel Diver: Sub Wars -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Steelhax](/assets/steelhax-release.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Инструкция - -#### Часть I - Подготовительные работы - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Вставьте SD-карту в компьютер -1. Скопируйте файлы `boot.firm` и `boot.3dsx` из `.zip-архива` Luma3DS в корень SD-карты - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the `steelhax` folder from the `Steelhax-release.zip` to the root of your SD card -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - Steelminer - -In this section, you will create a hacked Steel Diver: Sub Wars save file that, when used, will load the Homebrew Launcher on your console. - -1. Launch "Steel Diver: Sub Wars" once and select a Mii to initialize your save file - + Decline the game update when prompted - + If you have already updated the game, use the Data Management menu of the System Settings to delete the update -1. Exit "Steel Diver: Sub Wars" -1. Power off your console -1. Вставьте SD-карту в компьютер -1. Open [the SteelHax Save Tool website](https://3dstools.nhnarwhal.com/#/steelhax) on your computer -1. Select your `movable.sed` file -1. Select your region based on your console -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `<8-character-region>` -> `data` on your SD card - + **EUR Region**: `000d7e00` - + **JPN Region**: `000d7c00` - + **USA Region**: `000d7d00` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Steel Diver: Sub Wars" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/ru_RU/homebrew-launcher-(super-skaterhax).txt b/_pages/ru_RU/homebrew-launcher-(super-skaterhax).txt deleted file mode 100644 index 01c5e7dc6f..0000000000 --- a/_pages/ru_RU/homebrew-launcher-(super-skaterhax).txt +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: "Homebrew Launcher (super-skaterhax)" ---- - -{% include toc title="Содержание" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see [here](https://github.com/zoogie/super-skaterhax). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -Super-skaterhax (when used to launch the Homebrew Launcher) is compatible with New models on version 11.16.0 in all regions, and 11.17.0 in the EUR, JPN and USA regions. - -The instructions provided only apply to the New 3DS, New 3DS XL, and New 2DS XL. Please ensure that the console you are modding is a New 3DS, New 3DS XL, or New 2DS XL before continuing. -{: .notice--warning} - -### Что понадобится - -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* The latest release of [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (the release `.zip` file) - -#### Часть I - Подготовительные работы - -In this section, you will copy the files needed to trigger both super-skaterhax and the Homebrew Launcher. - -1. Power off your console -1. Вставьте SD-карту в компьютер -1. Скопируйте файлы `boot.firm` и `boot.3dsx` из `.zip-архива` Luma3DS в корень SD-карты - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy everything inside the folder for your console's region (and also system version if the region is USA) in the super-skaterhax `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/skater-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - super-skaterhax - -In this section, you will visit the browser exploit webpage, which will launch the Homebrew Launcher. - -If you haven't already, make sure you have a working Internet connection set up on your console. -{: .notice--info} - -1. On the HOME Menu, press the Left and Right shoulder buttons at the same time to open the camera - + If you are unable to open the camera, open the Internet Browser and manually type the URL instead (`https://zoogie.github.io/web/super/` for EUR/USA/JPN, `https://zoogie.github.io/web/korea` for KOR) -1. Tap the QR code button and scan one of the following QR codes for your console's region [here](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png) - + If you get a security certificate warning, press (A) to allow the connection -1. Press the (Select) button to open the bookmark tab - + If your (Select) button does not respond, tap the star icon on the bottom-left corner of the screen -1. Tap "Bookmark this page" -1. Press (B) once to return to the browser -1. Press (Start) to open the context menu - + If your (Start) button does not respond, tap the 3-line menu on the bottom-right corner of the screen -1. Tap on "Settings" -1. Tap on "Delete Cookies" -1. Нажмите (A), чтобы продолжить -1. Press (Home) to return to the HOME Menu, then immediately press (A) to launch the browser again -1. Select the "GO GO!" button on the top screen - + If any prompts appear, approve all of them - + If your console freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your console freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section - + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/ru_RU/include/fredtool-prep.txt b/_pages/ru_RU/include/fredtool-prep.txt deleted file mode 100644 index 1c2caa4208..0000000000 --- a/_pages/ru_RU/include/fredtool-prep.txt +++ /dev/null @@ -1,29 +0,0 @@ -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Вставьте SD-карту в компьютер -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Перейдите в папку `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` на SD-карте - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Скопируйте файлы `boot.firm` и `boot.3dsx` из `.zip-архива` Luma3DS в корень SD-карты - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Скопируйте папку `private` из `.zip-архива` Frogminer_save в корень SD-карты -1. Reinsert your SD card into your console -1. Power on your console - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} \ No newline at end of file diff --git a/_pages/ru_RU/include/hbl-common-exploits-movable.txt b/_pages/ru_RU/include/hbl-common-exploits-movable.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/ru_RU/include/hbl-common-exploits-movable.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/ru_RU/include/hbl-common-exploits.txt b/_pages/ru_RU/include/hbl-common-exploits.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/ru_RU/include/hbl-common-exploits.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/ru_RU/installing-boot9strap-(fredtool).txt b/_pages/ru_RU/installing-boot9strap-(fredtool).txt deleted file mode 100644 index 2f57379536..0000000000 --- a/_pages/ru_RU/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool)" ---- - -{% include toc title="Содержание" %} - -{% capture technical_info %} -Technical Details (optional) - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### Что понадобится - -* Ваш файл `movable.sed`, полученный на странице [Seedminer](seedminer) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Часть II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Следующий шаг: [Завершение установки](finalizing-setup) -{: .notice--primary} diff --git a/_pages/ru_RU/installing-boot9strap-(fredtool-legacy).txt b/_pages/ru_RU/installing-boot9strap-(fredtool-legacy).txt deleted file mode 100644 index ee2b41082f..0000000000 --- a/_pages/ru_RU/installing-boot9strap-(fredtool-legacy).txt +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool, Legacy)" ---- - -{% include toc title="Содержание" %} - -{% capture technical_info %} -Technical Details (optional) - -Чтобы получить дамп системного DSiWare приложения, мы воспользуемся уязвимостью в разделе Управление данными DSiWare внутри приложения Настройки. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. - -Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### Что понадобится - -* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Часть II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Следующий шаг: [Завершение установки](finalizing-setup) -{: .notice--primary} diff --git a/_pages/ru_RU/installing-boot9strap-(frogtool).txt b/_pages/ru_RU/installing-boot9strap-(frogtool).txt deleted file mode 100644 index 46dd1fad64..0000000000 --- a/_pages/ru_RU/installing-boot9strap-(frogtool).txt +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Installing boot9strap (Frogtool)" ---- - -{% include toc title="Содержание" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see "DSiWare_Exports CTCert verification" and "FIRM partitions known-plaintext" [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - - -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) link for `frogcert.bin` on this page, you will need a torrent client like [qBittorrent](https://www.qbittorrent.org/download.php) or [Deluge](http://dev.deluge-torrent.org/wiki/Download). -{: .notice--warning} - -### Что понадобится - -* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link) -* The latest release of [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (direct download) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Часть II - Подготовка - -1. Power off your console -1. Вставьте SD-карту в компьютер -1. Скопируйте файлы `boot.firm` и `boot.3dsx` из `.zip-архива` Luma3DS в корень SD-карты -1. Copy `boot.nds` (b9sTool) from the b9sTool release `.zip` to the root of your SD card -1. Создайте папку `3ds` в корне SD-карты, если таковой нет - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy the `Frogtool` folder from the Frogtool-nimhax `.zip` to the `/3ds/` folder on your SD card -1. Copy `frogcert.bin` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section III - Patching DS Download Play - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch Frogtool from the list of homebrew -1. Select the "INJECT patched DS Download Play" option -1. Frogtool will automatically run and inject the JPN version of Flipnote Studio into your DS Download Play -1. Once this operation has finished, read the screens and check if the process was successful -1. Tap the touch screen, then select "BOOT patched DS Download Play" -1. If the exploit was successful, your console will have loaded the JPN version of Flipnote Studio - + If you get stuck on a black screen, follow [this](https://wiki.hacks.guide/wiki/3DS:TWLFix#Userland_(PicHaxx,_Steelhax,_etc.)-0) page, then try again - -#### Section IV - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsdlp" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Download Play - -1. Запустите приложение Загружаемая игра -1. Дождитесь появления двух кнопок - + Do not press either of the buttons -1. Нажмите (L) + (Вниз) + (Select) одновременно чтобы открыть меню Rosalina -1. Выберите "Miscellaneous options" -1. Выберите "Switch the hb. title to the current app." -1. Нажмите (B), чтобы продолжить -1. Нажмите (B) для возврата в главное меню Rosalina -1. Нажмите (B) для выхода из главного меню Rosalina -1. Нажмите (Home), затем закройте приложение Загружаемая игра -1. Relaunch the Download Play application -1. Your console should load the Homebrew Launcher -1. Launch Frogtool from the list of homebrew -1. Select the "RESTORE clean DS Download Play" option -1. Once this operation has finished, read the screens and check if the process was successful - + If there are any errors or missing files, correct the problem and try again -1. If the process was successful, tap the touch screen, then press START to exit -1. Power off your console - -___ - -### Следующий шаг: [Завершение установки](finalizing-setup) -{: .notice--primary} diff --git a/_pages/ru_RU/installing-boot9strap-(hbl-usm).txt b/_pages/ru_RU/installing-boot9strap-(hbl-usm).txt deleted file mode 100644 index fc6aa91fb5..0000000000 --- a/_pages/ru_RU/installing-boot9strap-(hbl-usm).txt +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "Installing boot9strap (HBL-USM)" ---- - -{% include toc title="Содержание" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--danger} - -### Что понадобится - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) (direct download) - -#### Часть I - Подготовительные работы - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. Then, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Вставьте SD-карту в компьютер -1. Создайте папку `boot9strap` в корне SD-карты -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the RELEASE `.zip` to the `/boot9strap/` folder on your SD card -1. Создайте папку `3ds` в корне SD-карты, если таковой нет - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy `slotTool.3dsx` from the `slotTool` folder inside the RELEASE `.zip` to the `/3ds/` folder on your SD card -1. Copy `usm.bin` from the RELEASE `.zip` to the root folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch slotTool from the list of homebrew - + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section -1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option - + You will see some on-screen text and then your system will shut down - -![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Часть III - Установка boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section IV - Restoring WiFi Configuration Profiles - -{% include_relative include/remove-usm-slottool.txt %} - -___ - -### Следующий шаг: [Завершение установки](finalizing-setup) -{: .notice--primary} diff --git a/_pages/ru_RU/installing-boot9strap-(usm).txt b/_pages/ru_RU/installing-boot9strap-(usm).txt deleted file mode 100644 index ed58320fd4..0000000000 --- a/_pages/ru_RU/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: "Установка boot9strap (USM)" ---- - -{% include toc title="Содержание" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -Эти инструкции работают на консолях регионов USA, Europe, Japan и Korea. На регион консоли указывает буква U, E, J или K после версии прошивки. - -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--warning} - -### Что понадобится - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* [usm.bin](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) - - -#### Часть I - Подготовительные работы - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. - -1. Your SD card should be inserted in your computer -1. Copy `usm.bin` to the root of your SD card -1. Скопируйте файлы `boot.firm` и `boot.3dsx` из `.zip-архива` Luma3DS в корень SD-карты - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Создайте папку `boot9strap` в корне SD-карты -1. Скопируйте `boot9strap.firm` и `boot9strap.firm.sha` из `.zip-архива` boot9strap в папку `/boot9strap/` в корне SD-карты -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card - -![]({{ "/images/screenshots/usm/usm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Часть II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If the BB3 multihax menu doesn't open, [follow this troubleshooting guide](troubleshooting#bannerbomb3) - + If the BB3 multihax menu says "cfw installed already", you already have custom firmware and should continue from [here](checking-for-cfw) -1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" - + Your console will automatically power off -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Internet Settings` -> `Connection Settings` -1. Ensure that all three connections are named "Haaaaaaaxxxxxxxxx..." - + Do NOT change these settings! - + If all three connections are NOT all named "Haaaaaaaxxxxxxxxx...", STOP! Something went wrong in this section and MUST be fixed before you can continue -1. Power off your console - -#### Часть III - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section IV - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section V - Restoring WiFi Configuration Profiles - -In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. - -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" - + Your console will automatically reboot -1. Power off your console -1. Вставьте SD-карту в компьютер -1. Перейдите в папку `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` на SD-карте -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. Этот файл больше не нужен - -___ - -### Следующий шаг: [Завершение установки](finalizing-setup) -{: .notice--primary} diff --git a/_pages/sr_SP/installing-boot9strap-(fredtool).txt b/_pages/sr_SP/installing-boot9strap-(fredtool).txt deleted file mode 100644 index 46eedbe264..0000000000 --- a/_pages/sr_SP/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,102 +0,0 @@ ---- -title: "Installing Boot9strap (Fredtool)" ---- - -{% include toc title="Table of Contents" %} - -### Required Reading - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, for example from BannerBomb or the DSiWare Dumper tool. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -### What You Need - -* A DSiWare Backup (such as the one on SD root from [BannerBomb3](bannerbomb3) or [DSiWare Dumper](dsidumper)) -* Your `movable.sed` file from completing [Seedminer](seedminer) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) -* The latest release of [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) - -#### Section I - Prep Work - -1. Power off your device -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Copy `boot.nds` (B9STool) to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card - -#### Section II - Fredtool - -1. Open [Fredtool](https://fredtool.bruteforcemovable.com/) on your computer -1. Select your `movable.sed` file for the "Your movable.sed" field -1. Select your DSiWare Backup (`<8-character-id>.bin`) file for the "Your dsiware.bin" field -1. Complete the "I'm not a robot" captcha -1. Select "Start" -1. Wait for the process to complete -1. When the process has completed, download your modified DSiWare archive from the site - + This file contains 2 dsiware backup files, one clean (unmodified) and one hax (exploited) -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + This `` will be the same one that you used in [Seedminer](seedminer) - + This `` folder will be another 32 letter/number folder inside the `` folder - + If the `Nintendo DSiWare` folder does not exist, create it inside the `` folder -1. Copy the `42383841.bin` file from the `output/hax/` folder of the downloaded DSiWare archive (`fredtool_output.zip`) to the `Nintendo DSiWare` folder -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Haxxxxxxxxx!" title -1. Select "Copy", then select "OK" -1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" -1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio - -#### Section III - Flipnote Exploit - -If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). -{: .notice--info} - -1. Complete the initial setup process for the launched game until you reach the main menu - + Select the left option whenever prompted during the setup process -1. Using the touch-screen, select the large left box, then select the box with an SD card icon -1. Once the menu loads, select the face icon, then the bottom right icon to continue -1. Press (X) or (UP) on the D-Pad depending on which is shown on the top screen -1. Select the second button along the top with a film-reel icon -1. Scroll right until reel "3/3" is selected -1. Tap the third box with the letter "A" in it -1. Scroll left until reel "1/3" is selected -1. Tap the fourth box with the letter "A" in it -1. If the exploit was successful, your device will have loaded b9sTool -1. Using the D-Pad, move to "Install boot9strap" - + If you miss this step, the system will exit to home menu instead of installing boot9strap and you will need to open Nintendo DS Connections and start over from the beginning of Section III -1. Press (A), then press START and SELECT at the same time to begin the process -1. Once completed and the bottom screen says "done.", exit b9sTool, then power off your device - + You may have to force power off by holding the power button - + If you see the Luma Configuration screen, continue with the guide without powering off - -#### Section IV - Configuring Luma3DS - -1. Boot your device while holding (Select) to launch the Luma configuration menu - + If you encounter issues launching the Luma configuration menu, [follow this troubleshooting guide](https://github.com/zoogie/b9sTool/blob/master/TROUBLESHOOTING.md) -1. Use the (A) button and the D-Pad to turn on the following: - + **"Show NAND or user string in System Settings"** -1. Press (Start) to save and reboot - + Your device should load the Home Menu after a short delay. If you get a black screen lasting longer than 5 minutes, [follow this troubleshooting guide](troubleshooting#black-screen-on-sysnand-boot-after-installing-boot9strap) - -#### Section V - Restoring DS Connection Settings - -1. Power off your device -1. Insert your SD card into your computer -1. Copy the `42383841.bin` file from the `output/clean/` folder of the downloaded DSiWare archive (`fredtool_output.zip`) to the `Nintendo 3DS//<32-character-id>/Nintendo DSiWare/` folder on your SD card - + Replace the existing `42383841.bin` file -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Nintendo DSi™" title -1. Select "Copy", then select "OK" - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/sr_SP/installing-boot9strap-(usm).txt b/_pages/sr_SP/installing-boot9strap-(usm).txt deleted file mode 100644 index 079b370df0..0000000000 --- a/_pages/sr_SP/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,92 +0,0 @@ ---- -title: "Installing boot9strap (USM)" ---- - -{% include toc title="Table of Contents" %} - -### Required Reading - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile to your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. - -If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, you will need to use a [Legacy Method](legacy-methods). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--danger} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer](seedminer) -* The latest release archive for [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) - -#### Section I - Prep Work - -1. Open [unSAFE_MODE-bb3 tool](https://usm.bruteforcemovable.com/) on your computer - + If this site is nonfunctional, try using [this one](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) -1. Upload your movable.sed using the "Choose File" option -1. Click "Download unSAFE_MODE-bb3 archive" - + This will download an exploit DSiWare called `F00D43D5.bin` and a SAFE_MODE exploit data file called `usm.bin` inside of a zip folder (`unSAFE_MODE-bb3.zip`) -1. If your console is powered on, power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Copy `usm.bin` from the USM archive (`unSAFE_MODE-bb3.zip`) to the root of your SD card -1. Navigate to `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card - + This `` will be the same one that you used in [Seedminer](seedminer) - + If `Nintendo DSiWare` does not exist, create it -1. If there are any existing DSiWare backup files (`<8-character-id>.bin`) in this folder, move them to your PC - + This will leave you with an empty Nintendo DSiWare folder. Moving the files to your PC ensures you don't delete any intentional backups -1. Copy the `F00D43D5.bin` file from the USM archive (`unSAFE_MODE-bb3.zip`) to the `Nintendo DSiWare` folder - -#### Section II - BannerBomb3 - -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your bottom screen should flash Red and then the system will reboot to home menu a few seconds later. This means the exploit profile was successfully copied - + If the bottom screen does not flash Red, the exploit profile was not copied and you will not be able to complete the next section. Ensure that your files are properly placed, then try again -1. Power off your device - -#### Section III - unSAFE_MODE - -1. With your system still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), then press (Power) - + Release the buttons after a few seconds. Your console will boot into Safe Mode -1. Press "OK" to accept the update - + There is no update. This is part of the exploit -1. Press "I accept" to accept the terms and conditions -1. The update will eventually fail, with error code `003-1099`. This is intended behaviour -1. When asked "Would you like to configure Internet settings?", select "Yes" -1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` -1. Once you see `B9S install SUCCESS` on the top screen, press any button to reboot to Luma Configuration - -#### Section IV - Configuring Luma3DS - -1. Your device should automatically show the Luma Configuration menu -1. Use the (A) button and the D-Pad to turn on the following: - + **"Show NAND or user string in System Settings"** -1. Press (Start) to save and reboot - + Your device should load the Home Menu after a short delay. If you get a black screen lasting longer than 5 minutes, [follow this troubleshooting guide](troubleshooting#black-screen-on-sysnand-boot-after-installing-boot9strap) - -#### Section V - Restoring WiFi Configuration Profiles - -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -1. Click on the SD Card section - + Your bottom screen should flash Green and then the system will reboot to home menu a few seconds later. This means your WiFi configuration profiles were successfully restored -1. Power your system off -1. Insert your SD card into your computer -1. Navigate to `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card - + This `` will be the same one that you used in [Seedminer](seedminer) -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Continue to Finalizing Setup - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/sv_SE/dumping-movable-(nimhax).txt b/_pages/sv_SE/dumping-movable-(nimhax).txt deleted file mode 100644 index 69f3d011d3..0000000000 --- a/_pages/sv_SE/dumping-movable-(nimhax).txt +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: "Dumping Movable (nimhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -To install boot9strap on your console, we derive your console's unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console. - -For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need - -* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy the `nimhax` folder from the nimhax `.zip` to the `/3ds/` folder on your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) -{: .notice--info} - -#### Section II - nimhax - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch nimhax from the list of homebrew -1. If the exploit was successful, a `movable.sed` file will appear on the root of your SD card - -### Next step: Frogtool - -Once you have your console's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \ -While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you're unable to use a torrent client. - -Continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--primary} diff --git a/_pages/sv_SE/homebrew-launcher-(freakyhax).txt b/_pages/sv_SE/homebrew-launcher-(freakyhax).txt deleted file mode 100644 index 028cee82a4..0000000000 --- a/_pages/sv_SE/homebrew-launcher-(freakyhax).txt +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: "Homebrew Launcher (freakyhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[freakyhax](https://plutooo.github.io/freakyhax/) is an exploit for the game Freakyforms Deluxe discovered and released by [plutooo](https://github.com/plutooo). It works on versions 9.0.0 through 11.17.0 on EUR, USA and JPN region consoles. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -### What You Need - -+ A EUR/USA/JPN copy of Freakyforms Deluxe (eShop or cartridge) -+ The latest release of [freakyhax](https://github.com/plutooo/freakyhax/releases/latest) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy all files and folders inside the `/build//exploit/` folder from the freakyhax `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - freakyhax - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch Freakyforms Deluxe -1. In the game menu, select `Play -> Camera -> Load a QR code` -1. Select the QR code -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/sv_SE/homebrew-launcher-(ninjhax2-dx).txt b/_pages/sv_SE/homebrew-launcher-(ninjhax2-dx).txt deleted file mode 100644 index 2d8032745c..0000000000 --- a/_pages/sv_SE/homebrew-launcher-(ninjhax2-dx).txt +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "Homebrew Launcher (ninjhax2-dx)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[Ninjhax2](https://github.com/smealum/ninjhax2.x) is an exploit for the game "Cubic Ninja" made by [smealum](https://github.com/smealum). This page uses an updated version of ninjhax by [zoogie](https://github.com/zoogie) called [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx), which supports 11.17.0. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -This process will overwrite your Cubic Ninja save file, if you have one. -{: .notice--warning} - -### What You Need -* The game "Cubic Ninja" -* The latest release of [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx/releases) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `Launcher.dat` from the folder appropriate for your console from the ninjhax2-dx `.zip` file to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - -#### Section II - ninjhax2-dx -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Cubic Ninja" once and select "Create" - + If prompted, delete all data -1. Select "QR Code" -1. Select "Scan QR Code" -1. On your PC, open the browser and go to [ninjhax2-dx website](https://zoogie.github.io/web/nh2dx/) -1. Select your console's region and hardware -1. On your console, scan the QR code - + If the game exits to the HOME Menu, then the exploit has installed correctly -1. Launch "Cubic Ninja" again -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/sv_SE/homebrew-launcher-(pichaxx).txt b/_pages/sv_SE/homebrew-launcher-(pichaxx).txt deleted file mode 100644 index a58df498f5..0000000000 --- a/_pages/sv_SE/homebrew-launcher-(pichaxx).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (PicHaxx)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[PicHaxx](https://github.com/zoogie/pichaxx) is an exploit for the game Pokémon Picross released by [zoogie](https://github.com/zoogie), originally discovered and [demonstrated](https://twitter.com/mrnbayoh/status/744899681663258624) by [MrNbaYoh](https://github.com/MrNbaYoh). - -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Pokémon Picross" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Pokémon Picross -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Prep Work - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card - -![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - PicHaxx - -In this section, you will create a hacked Pokémon Picross save file that, when loaded, will run the Homebrew Launcher on your console. - -1. Open [the PicHaxx Injector website](https://3dstools.nhnarwhal.com/#/pichaxx) on your computer -1. Select your `movable.sed` file -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `0017c100` -> `data` on your SD card - + The `` will be the same one that you used in Seedminer - + The `` is a 32 character long folder inside of the `` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted - - ![]({{ "/images/screenshots/pichaxx-save-location.png" | absolute_url }}) - {: .notice--info} - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Pokémon Picross" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher - + If you get an error message, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-pichaxx) -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/sv_SE/homebrew-launcher-(smilehax-iie).txt b/_pages/sv_SE/homebrew-launcher-(smilehax-iie).txt deleted file mode 100644 index 08cd5865c0..0000000000 --- a/_pages/sv_SE/homebrew-launcher-(smilehax-iie).txt +++ /dev/null @@ -1,70 +0,0 @@ ---- -title: "Homebrew Launcher (smilehax-IIe)" ---- - -{% include toc title="Table of Contents" %} - -This set of instructions does not support the Japanese version of SmileBASIC. -{: .notice--warning} - -{% capture technical_info %} -Technical Details (optional) -[smilehax-IIe](https://github.com/zoogie/smilehax-IIe) is an exploit for the game "SmileBASIC" made by zoogie, compatible with system versions 9.0.0 through 11.17.0 for USA/EUR/JPN region consoles. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need -+ The game "SmileBASIC" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install SmileBASIC -+ The latest release of [smilehax-IIe](https://github.com/zoogie/smilehax-IIe/releases/download/v1.1/Release_sh2e_v1.1.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Transfer the `.wav` for your region from the Release_sh2e `.zip` to a device that can play `.wav` files, for example a phone -1. Copy the petitcom `.icn` for your region to the root of your SD card - -#### Section II - smilehax - -1. Launch SmileBASIC - + Update the game if prompted -1. Select the "Publish/Download Projects" option -1. Select the "Download (Receive) using Public Key" option -1. Press the "Yes" button -1. Enter the Public Key "NJEQK3A4" using the on-screen keyboard -1. Press the "Yes" button to confirm the download of PMODEM141 -1. Press "OK", then "Back", then "Browse Projects" -1. Select PMODEM141, then press "Select File" -1. Select PMODEM141.PRG, then press "OK", then "Yes" to execute it -1. Select RECEIVE FILE SIMPLEX -1. Prepare the device you use to play the `.wav` file -1. Keep your console about a foot from the `.wav` file playing devices' speaker and use a reasonable (not loud) volume to play the `.wav` -1. Now select 300BPS, then play the `.wav` file -1. When it finishes, press "Yes", then press "OK" -1. Press the START button -1. Select the SH2E-xxx.TXT file, then press OK, then "Yes" to execute it - + If you get kicked back into menu, make sure you're using the latest version of SmileBASIC -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/sv_SE/homebrew-launcher-(steelhax).txt b/_pages/sv_SE/homebrew-launcher-(steelhax).txt deleted file mode 100644 index 9b8dace5a3..0000000000 --- a/_pages/sv_SE/homebrew-launcher-(steelhax).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (Steelhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Steel Diver: Sub Wars, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Steel Diver: Sub Wars save file, if you have one. If you wish to preserve your Steel Diver: Sub Wars game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Steel Diver: Sub Wars" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Steel Diver: Sub Wars -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Steelhax](/assets/steelhax-release.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Prep Work - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the `steelhax` folder from the `Steelhax-release.zip` to the root of your SD card -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - Steelminer - -In this section, you will create a hacked Steel Diver: Sub Wars save file that, when used, will load the Homebrew Launcher on your console. - -1. Launch "Steel Diver: Sub Wars" once and select a Mii to initialize your save file - + Decline the game update when prompted - + If you have already updated the game, use the Data Management menu of the System Settings to delete the update -1. Exit "Steel Diver: Sub Wars" -1. Power off your console -1. Insert your SD card into your computer -1. Open [the SteelHax Save Tool website](https://3dstools.nhnarwhal.com/#/steelhax) on your computer -1. Select your `movable.sed` file -1. Select your region based on your console -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `<8-character-region>` -> `data` on your SD card - + **EUR Region**: `000d7e00` - + **JPN Region**: `000d7c00` - + **USA Region**: `000d7d00` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Steel Diver: Sub Wars" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/sv_SE/homebrew-launcher-(super-skaterhax).txt b/_pages/sv_SE/homebrew-launcher-(super-skaterhax).txt deleted file mode 100644 index 5895c4f64b..0000000000 --- a/_pages/sv_SE/homebrew-launcher-(super-skaterhax).txt +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: "Homebrew Launcher (super-skaterhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see [here](https://github.com/zoogie/super-skaterhax). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -Super-skaterhax (when used to launch the Homebrew Launcher) is compatible with New models on version 11.16.0 in all regions, and 11.17.0 in the EUR, JPN and USA regions. - -The instructions provided only apply to the New 3DS, New 3DS XL, and New 2DS XL. Please ensure that the console you are modding is a New 3DS, New 3DS XL, or New 2DS XL before continuing. -{: .notice--warning} - -### What You Need - -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* The latest release of [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (the release `.zip` file) - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger both super-skaterhax and the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy everything inside the folder for your console's region (and also system version if the region is USA) in the super-skaterhax `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/skater-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - super-skaterhax - -In this section, you will visit the browser exploit webpage, which will launch the Homebrew Launcher. - -If you haven't already, make sure you have a working Internet connection set up on your console. -{: .notice--info} - -1. On the HOME Menu, press the Left and Right shoulder buttons at the same time to open the camera - + If you are unable to open the camera, open the Internet Browser and manually type the URL instead (`https://zoogie.github.io/web/super/` for EUR/USA/JPN, `https://zoogie.github.io/web/korea` for KOR) -1. Tap the QR code button and scan one of the following QR codes for your console's region [here](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png) - + If you get a security certificate warning, press (A) to allow the connection -1. Press the (Select) button to open the bookmark tab - + If your (Select) button does not respond, tap the star icon on the bottom-left corner of the screen -1. Tap "Bookmark this page" -1. Press (B) once to return to the browser -1. Press (Start) to open the context menu - + If your (Start) button does not respond, tap the 3-line menu on the bottom-right corner of the screen -1. Tap on "Settings" -1. Tap on "Delete Cookies" -1. Press (A) to continue -1. Press (Home) to return to the HOME Menu, then immediately press (A) to launch the browser again -1. Select the "GO GO!" button on the top screen - + If any prompts appear, approve all of them - + If your console freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your console freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section - + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/sv_SE/include/fredtool-prep.txt b/_pages/sv_SE/include/fredtool-prep.txt deleted file mode 100644 index bd910b24de..0000000000 --- a/_pages/sv_SE/include/fredtool-prep.txt +++ /dev/null @@ -1,29 +0,0 @@ -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Insert your SD card into your computer -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} \ No newline at end of file diff --git a/_pages/sv_SE/include/hbl-common-exploits-movable.txt b/_pages/sv_SE/include/hbl-common-exploits-movable.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/sv_SE/include/hbl-common-exploits-movable.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/sv_SE/include/hbl-common-exploits.txt b/_pages/sv_SE/include/hbl-common-exploits.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/sv_SE/include/hbl-common-exploits.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/sv_SE/installing-boot9strap-(fredtool).txt b/_pages/sv_SE/installing-boot9strap-(fredtool).txt deleted file mode 100644 index a06a1259f2..0000000000 --- a/_pages/sv_SE/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer](seedminer) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/sv_SE/installing-boot9strap-(fredtool-legacy).txt b/_pages/sv_SE/installing-boot9strap-(fredtool-legacy).txt deleted file mode 100644 index 7e88fb51b4..0000000000 --- a/_pages/sv_SE/installing-boot9strap-(fredtool-legacy).txt +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool, Legacy)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. - -Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/sv_SE/installing-boot9strap-(frogtool).txt b/_pages/sv_SE/installing-boot9strap-(frogtool).txt deleted file mode 100644 index a8b388e296..0000000000 --- a/_pages/sv_SE/installing-boot9strap-(frogtool).txt +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Installing boot9strap (Frogtool)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see "DSiWare_Exports CTCert verification" and "FIRM partitions known-plaintext" [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - - -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) link for `frogcert.bin` on this page, you will need a torrent client like [qBittorrent](https://www.qbittorrent.org/download.php) or [Deluge](http://dev.deluge-torrent.org/wiki/Download). -{: .notice--warning} - -### What You Need - -* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link) -* The latest release of [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (direct download) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Copy `boot.nds` (b9sTool) from the b9sTool release `.zip` to the root of your SD card -1. Skapa en mapp som heter '3ds' i roten på SD-kortet om det inte redan finns - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy the `Frogtool` folder from the Frogtool-nimhax `.zip` to the `/3ds/` folder on your SD card -1. Copy `frogcert.bin` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section III - Patching DS Download Play - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch Frogtool from the list of homebrew -1. Select the "INJECT patched DS Download Play" option -1. Frogtool will automatically run and inject the JPN version of Flipnote Studio into your DS Download Play -1. Once this operation has finished, read the screens and check if the process was successful -1. Tap the touch screen, then select "BOOT patched DS Download Play" -1. If the exploit was successful, your console will have loaded the JPN version of Flipnote Studio - + If you get stuck on a black screen, follow [this](https://wiki.hacks.guide/wiki/3DS:TWLFix#Userland_(PicHaxx,_Steelhax,_etc.)-0) page, then try again - -#### Section IV - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsdlp" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Download Play - -1. Launch the Download Play application -1. Wait until you see the two buttons - + Do not press either of the buttons -1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu -1. Select "Miscellaneous options" -1. Select "Switch the hb. title to the current app." -1. Press (B) to continue -1. Press (B) to return to the Rosalina main menu -1. Press (B) to exit the Rosalina menu -1. Press (Home), then close Download Play -1. Relaunch the Download Play application -1. Your console should load the Homebrew Launcher -1. Launch Frogtool from the list of homebrew -1. Select the "RESTORE clean DS Download Play" option -1. Once this operation has finished, read the screens and check if the process was successful - + If there are any errors or missing files, correct the problem and try again -1. If the process was successful, tap the touch screen, then press START to exit -1. Power off your console - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/sv_SE/installing-boot9strap-(hbl-usm).txt b/_pages/sv_SE/installing-boot9strap-(hbl-usm).txt deleted file mode 100644 index de81ac50bd..0000000000 --- a/_pages/sv_SE/installing-boot9strap-(hbl-usm).txt +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "Installing boot9strap (HBL-USM)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--danger} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) (direct download) - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. Then, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Insert your SD card into your computer -1. Create a folder named `boot9strap` on the root of your SD card -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the RELEASE `.zip` to the `/boot9strap/` folder on your SD card -1. Skapa en mapp som heter '3ds' i roten på SD-kortet om det inte redan finns - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy `slotTool.3dsx` from the `slotTool` folder inside the RELEASE `.zip` to the `/3ds/` folder on your SD card -1. Copy `usm.bin` from the RELEASE `.zip` to the root folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch slotTool from the list of homebrew - + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section -1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option - + You will see some on-screen text and then your system will shut down - -![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section III - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section IV - Restoring WiFi Configuration Profiles - -{% include_relative include/remove-usm-slottool.txt %} - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/sv_SE/installing-boot9strap-(usm).txt b/_pages/sv_SE/installing-boot9strap-(usm).txt deleted file mode 100644 index 9dcede6ffe..0000000000 --- a/_pages/sv_SE/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: "Installing boot9strap (USM)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. - -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--warning} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* [usm.bin](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) - - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. - -1. Your SD card should be inserted in your computer -1. Copy `usm.bin` to the root of your SD card -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Create a folder named `boot9strap` on the root of your SD card -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card - -![]({{ "/images/screenshots/usm/usm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If the BB3 multihax menu doesn't open, [follow this troubleshooting guide](troubleshooting#bannerbomb3) - + If the BB3 multihax menu says "cfw installed already", you already have custom firmware and should continue from [here](checking-for-cfw) -1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" - + Your console will automatically power off -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Internet Settings` -> `Connection Settings` -1. Ensure that all three connections are named "Haaaaaaaxxxxxxxxx..." - + Do NOT change these settings! - + If all three connections are NOT all named "Haaaaaaaxxxxxxxxx...", STOP! Something went wrong in this section and MUST be fixed before you can continue -1. Power off your console - -#### Section III - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section IV - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section V - Restoring WiFi Configuration Profiles - -In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. - -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" - + Your console will automatically reboot -1. Power off your console -1. Insert your SD card into your computer -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/th_TH/dumping-movable-(nimhax).txt b/_pages/th_TH/dumping-movable-(nimhax).txt deleted file mode 100644 index 69f3d011d3..0000000000 --- a/_pages/th_TH/dumping-movable-(nimhax).txt +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: "Dumping Movable (nimhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -To install boot9strap on your console, we derive your console's unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console. - -For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need - -* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy the `nimhax` folder from the nimhax `.zip` to the `/3ds/` folder on your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) -{: .notice--info} - -#### Section II - nimhax - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch nimhax from the list of homebrew -1. If the exploit was successful, a `movable.sed` file will appear on the root of your SD card - -### Next step: Frogtool - -Once you have your console's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \ -While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you're unable to use a torrent client. - -Continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--primary} diff --git a/_pages/th_TH/homebrew-launcher-(freakyhax).txt b/_pages/th_TH/homebrew-launcher-(freakyhax).txt deleted file mode 100644 index 028cee82a4..0000000000 --- a/_pages/th_TH/homebrew-launcher-(freakyhax).txt +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: "Homebrew Launcher (freakyhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[freakyhax](https://plutooo.github.io/freakyhax/) is an exploit for the game Freakyforms Deluxe discovered and released by [plutooo](https://github.com/plutooo). It works on versions 9.0.0 through 11.17.0 on EUR, USA and JPN region consoles. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -### What You Need - -+ A EUR/USA/JPN copy of Freakyforms Deluxe (eShop or cartridge) -+ The latest release of [freakyhax](https://github.com/plutooo/freakyhax/releases/latest) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy all files and folders inside the `/build//exploit/` folder from the freakyhax `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - freakyhax - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch Freakyforms Deluxe -1. In the game menu, select `Play -> Camera -> Load a QR code` -1. Select the QR code -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/th_TH/homebrew-launcher-(ninjhax2-dx).txt b/_pages/th_TH/homebrew-launcher-(ninjhax2-dx).txt deleted file mode 100644 index 2d8032745c..0000000000 --- a/_pages/th_TH/homebrew-launcher-(ninjhax2-dx).txt +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "Homebrew Launcher (ninjhax2-dx)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[Ninjhax2](https://github.com/smealum/ninjhax2.x) is an exploit for the game "Cubic Ninja" made by [smealum](https://github.com/smealum). This page uses an updated version of ninjhax by [zoogie](https://github.com/zoogie) called [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx), which supports 11.17.0. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -This process will overwrite your Cubic Ninja save file, if you have one. -{: .notice--warning} - -### What You Need -* The game "Cubic Ninja" -* The latest release of [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx/releases) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `Launcher.dat` from the folder appropriate for your console from the ninjhax2-dx `.zip` file to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - -#### Section II - ninjhax2-dx -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Cubic Ninja" once and select "Create" - + If prompted, delete all data -1. Select "QR Code" -1. Select "Scan QR Code" -1. On your PC, open the browser and go to [ninjhax2-dx website](https://zoogie.github.io/web/nh2dx/) -1. Select your console's region and hardware -1. On your console, scan the QR code - + If the game exits to the HOME Menu, then the exploit has installed correctly -1. Launch "Cubic Ninja" again -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/th_TH/homebrew-launcher-(pichaxx).txt b/_pages/th_TH/homebrew-launcher-(pichaxx).txt deleted file mode 100644 index a58df498f5..0000000000 --- a/_pages/th_TH/homebrew-launcher-(pichaxx).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (PicHaxx)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[PicHaxx](https://github.com/zoogie/pichaxx) is an exploit for the game Pokémon Picross released by [zoogie](https://github.com/zoogie), originally discovered and [demonstrated](https://twitter.com/mrnbayoh/status/744899681663258624) by [MrNbaYoh](https://github.com/MrNbaYoh). - -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Pokémon Picross" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Pokémon Picross -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Prep Work - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card - -![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - PicHaxx - -In this section, you will create a hacked Pokémon Picross save file that, when loaded, will run the Homebrew Launcher on your console. - -1. Open [the PicHaxx Injector website](https://3dstools.nhnarwhal.com/#/pichaxx) on your computer -1. Select your `movable.sed` file -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `0017c100` -> `data` on your SD card - + The `` will be the same one that you used in Seedminer - + The `` is a 32 character long folder inside of the `` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted - - ![]({{ "/images/screenshots/pichaxx-save-location.png" | absolute_url }}) - {: .notice--info} - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Pokémon Picross" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher - + If you get an error message, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-pichaxx) -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/th_TH/homebrew-launcher-(smilehax-iie).txt b/_pages/th_TH/homebrew-launcher-(smilehax-iie).txt deleted file mode 100644 index 08cd5865c0..0000000000 --- a/_pages/th_TH/homebrew-launcher-(smilehax-iie).txt +++ /dev/null @@ -1,70 +0,0 @@ ---- -title: "Homebrew Launcher (smilehax-IIe)" ---- - -{% include toc title="Table of Contents" %} - -This set of instructions does not support the Japanese version of SmileBASIC. -{: .notice--warning} - -{% capture technical_info %} -Technical Details (optional) -[smilehax-IIe](https://github.com/zoogie/smilehax-IIe) is an exploit for the game "SmileBASIC" made by zoogie, compatible with system versions 9.0.0 through 11.17.0 for USA/EUR/JPN region consoles. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need -+ The game "SmileBASIC" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install SmileBASIC -+ The latest release of [smilehax-IIe](https://github.com/zoogie/smilehax-IIe/releases/download/v1.1/Release_sh2e_v1.1.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Transfer the `.wav` for your region from the Release_sh2e `.zip` to a device that can play `.wav` files, for example a phone -1. Copy the petitcom `.icn` for your region to the root of your SD card - -#### Section II - smilehax - -1. Launch SmileBASIC - + Update the game if prompted -1. Select the "Publish/Download Projects" option -1. Select the "Download (Receive) using Public Key" option -1. Press the "Yes" button -1. Enter the Public Key "NJEQK3A4" using the on-screen keyboard -1. Press the "Yes" button to confirm the download of PMODEM141 -1. Press "OK", then "Back", then "Browse Projects" -1. Select PMODEM141, then press "Select File" -1. Select PMODEM141.PRG, then press "OK", then "Yes" to execute it -1. Select RECEIVE FILE SIMPLEX -1. Prepare the device you use to play the `.wav` file -1. Keep your console about a foot from the `.wav` file playing devices' speaker and use a reasonable (not loud) volume to play the `.wav` -1. Now select 300BPS, then play the `.wav` file -1. When it finishes, press "Yes", then press "OK" -1. Press the START button -1. Select the SH2E-xxx.TXT file, then press OK, then "Yes" to execute it - + If you get kicked back into menu, make sure you're using the latest version of SmileBASIC -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/th_TH/homebrew-launcher-(steelhax).txt b/_pages/th_TH/homebrew-launcher-(steelhax).txt deleted file mode 100644 index 9b8dace5a3..0000000000 --- a/_pages/th_TH/homebrew-launcher-(steelhax).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (Steelhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Steel Diver: Sub Wars, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Steel Diver: Sub Wars save file, if you have one. If you wish to preserve your Steel Diver: Sub Wars game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Steel Diver: Sub Wars" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Steel Diver: Sub Wars -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Steelhax](/assets/steelhax-release.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Prep Work - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the `steelhax` folder from the `Steelhax-release.zip` to the root of your SD card -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - Steelminer - -In this section, you will create a hacked Steel Diver: Sub Wars save file that, when used, will load the Homebrew Launcher on your console. - -1. Launch "Steel Diver: Sub Wars" once and select a Mii to initialize your save file - + Decline the game update when prompted - + If you have already updated the game, use the Data Management menu of the System Settings to delete the update -1. Exit "Steel Diver: Sub Wars" -1. Power off your console -1. Insert your SD card into your computer -1. Open [the SteelHax Save Tool website](https://3dstools.nhnarwhal.com/#/steelhax) on your computer -1. Select your `movable.sed` file -1. Select your region based on your console -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `<8-character-region>` -> `data` on your SD card - + **EUR Region**: `000d7e00` - + **JPN Region**: `000d7c00` - + **USA Region**: `000d7d00` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Steel Diver: Sub Wars" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/th_TH/homebrew-launcher-(super-skaterhax).txt b/_pages/th_TH/homebrew-launcher-(super-skaterhax).txt deleted file mode 100644 index 5895c4f64b..0000000000 --- a/_pages/th_TH/homebrew-launcher-(super-skaterhax).txt +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: "Homebrew Launcher (super-skaterhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see [here](https://github.com/zoogie/super-skaterhax). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -Super-skaterhax (when used to launch the Homebrew Launcher) is compatible with New models on version 11.16.0 in all regions, and 11.17.0 in the EUR, JPN and USA regions. - -The instructions provided only apply to the New 3DS, New 3DS XL, and New 2DS XL. Please ensure that the console you are modding is a New 3DS, New 3DS XL, or New 2DS XL before continuing. -{: .notice--warning} - -### What You Need - -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* The latest release of [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (the release `.zip` file) - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger both super-skaterhax and the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy everything inside the folder for your console's region (and also system version if the region is USA) in the super-skaterhax `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/skater-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - super-skaterhax - -In this section, you will visit the browser exploit webpage, which will launch the Homebrew Launcher. - -If you haven't already, make sure you have a working Internet connection set up on your console. -{: .notice--info} - -1. On the HOME Menu, press the Left and Right shoulder buttons at the same time to open the camera - + If you are unable to open the camera, open the Internet Browser and manually type the URL instead (`https://zoogie.github.io/web/super/` for EUR/USA/JPN, `https://zoogie.github.io/web/korea` for KOR) -1. Tap the QR code button and scan one of the following QR codes for your console's region [here](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png) - + If you get a security certificate warning, press (A) to allow the connection -1. Press the (Select) button to open the bookmark tab - + If your (Select) button does not respond, tap the star icon on the bottom-left corner of the screen -1. Tap "Bookmark this page" -1. Press (B) once to return to the browser -1. Press (Start) to open the context menu - + If your (Start) button does not respond, tap the 3-line menu on the bottom-right corner of the screen -1. Tap on "Settings" -1. Tap on "Delete Cookies" -1. Press (A) to continue -1. Press (Home) to return to the HOME Menu, then immediately press (A) to launch the browser again -1. Select the "GO GO!" button on the top screen - + If any prompts appear, approve all of them - + If your console freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your console freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section - + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/th_TH/include/fredtool-prep.txt b/_pages/th_TH/include/fredtool-prep.txt deleted file mode 100644 index bd910b24de..0000000000 --- a/_pages/th_TH/include/fredtool-prep.txt +++ /dev/null @@ -1,29 +0,0 @@ -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Insert your SD card into your computer -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} \ No newline at end of file diff --git a/_pages/th_TH/include/hbl-common-exploits-movable.txt b/_pages/th_TH/include/hbl-common-exploits-movable.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/th_TH/include/hbl-common-exploits-movable.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/th_TH/include/hbl-common-exploits.txt b/_pages/th_TH/include/hbl-common-exploits.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/th_TH/include/hbl-common-exploits.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/th_TH/installing-boot9strap-(fredtool).txt b/_pages/th_TH/installing-boot9strap-(fredtool).txt deleted file mode 100644 index a06a1259f2..0000000000 --- a/_pages/th_TH/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer](seedminer) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/th_TH/installing-boot9strap-(fredtool-legacy).txt b/_pages/th_TH/installing-boot9strap-(fredtool-legacy).txt deleted file mode 100644 index 7e88fb51b4..0000000000 --- a/_pages/th_TH/installing-boot9strap-(fredtool-legacy).txt +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool, Legacy)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. - -Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/th_TH/installing-boot9strap-(frogtool).txt b/_pages/th_TH/installing-boot9strap-(frogtool).txt deleted file mode 100644 index 063799fcc6..0000000000 --- a/_pages/th_TH/installing-boot9strap-(frogtool).txt +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Installing boot9strap (Frogtool)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see "DSiWare_Exports CTCert verification" and "FIRM partitions known-plaintext" [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - - -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) link for `frogcert.bin` on this page, you will need a torrent client like [qBittorrent](https://www.qbittorrent.org/download.php) or [Deluge](http://dev.deluge-torrent.org/wiki/Download). -{: .notice--warning} - -### What You Need - -* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link) -* The latest release of [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (direct download) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Copy `boot.nds` (b9sTool) from the b9sTool release `.zip` to the root of your SD card -1. Create a folder named `3ds` on the root of your SD card if it does not already exist - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy the `Frogtool` folder from the Frogtool-nimhax `.zip` to the `/3ds/` folder on your SD card -1. Copy `frogcert.bin` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section III - Patching DS Download Play - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch Frogtool from the list of homebrew -1. Select the "INJECT patched DS Download Play" option -1. Frogtool will automatically run and inject the JPN version of Flipnote Studio into your DS Download Play -1. Once this operation has finished, read the screens and check if the process was successful -1. Tap the touch screen, then select "BOOT patched DS Download Play" -1. If the exploit was successful, your console will have loaded the JPN version of Flipnote Studio - + If you get stuck on a black screen, follow [this](https://wiki.hacks.guide/wiki/3DS:TWLFix#Userland_(PicHaxx,_Steelhax,_etc.)-0) page, then try again - -#### Section IV - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsdlp" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Download Play - -1. Launch the Download Play application -1. Wait until you see the two buttons - + Do not press either of the buttons -1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu -1. Select "Miscellaneous options" -1. Select "Switch the hb. title to the current app." -1. Press (B) to continue -1. Press (B) to return to the Rosalina main menu -1. Press (B) to exit the Rosalina menu -1. Press (Home), then close Download Play -1. Relaunch the Download Play application -1. Your console should load the Homebrew Launcher -1. Launch Frogtool from the list of homebrew -1. Select the "RESTORE clean DS Download Play" option -1. Once this operation has finished, read the screens and check if the process was successful - + If there are any errors or missing files, correct the problem and try again -1. If the process was successful, tap the touch screen, then press START to exit -1. Power off your console - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/th_TH/installing-boot9strap-(hbl-usm).txt b/_pages/th_TH/installing-boot9strap-(hbl-usm).txt deleted file mode 100644 index de8dad596a..0000000000 --- a/_pages/th_TH/installing-boot9strap-(hbl-usm).txt +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "Installing boot9strap (HBL-USM)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--danger} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) (direct download) - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. Then, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Insert your SD card into your computer -1. Create a folder named `boot9strap` on the root of your SD card -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the RELEASE `.zip` to the `/boot9strap/` folder on your SD card -1. Create a folder named `3ds` on the root of your SD card if it does not already exist - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy `slotTool.3dsx` from the `slotTool` folder inside the RELEASE `.zip` to the `/3ds/` folder on your SD card -1. Copy `usm.bin` from the RELEASE `.zip` to the root folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch slotTool from the list of homebrew - + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section -1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option - + You will see some on-screen text and then your system will shut down - -![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section III - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section IV - Restoring WiFi Configuration Profiles - -{% include_relative include/remove-usm-slottool.txt %} - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/th_TH/installing-boot9strap-(usm).txt b/_pages/th_TH/installing-boot9strap-(usm).txt deleted file mode 100644 index 9dcede6ffe..0000000000 --- a/_pages/th_TH/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: "Installing boot9strap (USM)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. - -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--warning} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* [usm.bin](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) - - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. - -1. Your SD card should be inserted in your computer -1. Copy `usm.bin` to the root of your SD card -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Create a folder named `boot9strap` on the root of your SD card -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card - -![]({{ "/images/screenshots/usm/usm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If the BB3 multihax menu doesn't open, [follow this troubleshooting guide](troubleshooting#bannerbomb3) - + If the BB3 multihax menu says "cfw installed already", you already have custom firmware and should continue from [here](checking-for-cfw) -1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" - + Your console will automatically power off -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Internet Settings` -> `Connection Settings` -1. Ensure that all three connections are named "Haaaaaaaxxxxxxxxx..." - + Do NOT change these settings! - + If all three connections are NOT all named "Haaaaaaaxxxxxxxxx...", STOP! Something went wrong in this section and MUST be fixed before you can continue -1. Power off your console - -#### Section III - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section IV - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section V - Restoring WiFi Configuration Profiles - -In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. - -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" - + Your console will automatically reboot -1. Power off your console -1. Insert your SD card into your computer -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/tr_TR/dumping-movable-(nimhax).txt b/_pages/tr_TR/dumping-movable-(nimhax).txt deleted file mode 100644 index 24b26a584e..0000000000 --- a/_pages/tr_TR/dumping-movable-(nimhax).txt +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: "Dumping Movable (nimhax)" ---- - -{% include toc title = "İçindekiler"%} - -{% capture technical_info %} -Technical Details (optional) - -To install boot9strap on your console, we derive your console's unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console. - -For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need - -* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. SD kartınızı bilgisayarınıza takın -1. Copy the `nimhax` folder from the nimhax `.zip` to the `/3ds/` folder on your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) -{: .notice--info} - -#### Section II - nimhax - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch nimhax from the list of homebrew -1. If the exploit was successful, a `movable.sed` file will appear on the root of your SD card - -### Next step: Frogtool - -Once you have your console's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \ -While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you're unable to use a torrent client. - -Continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--primary} diff --git a/_pages/tr_TR/homebrew-launcher-(freakyhax).txt b/_pages/tr_TR/homebrew-launcher-(freakyhax).txt deleted file mode 100644 index b4d4b14934..0000000000 --- a/_pages/tr_TR/homebrew-launcher-(freakyhax).txt +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: "Homebrew Launcher (freakyhax)" ---- - -{% include toc title = "İçindekiler"%} - -{% capture technical_info %} -Technical Details (optional) -[freakyhax](https://plutooo.github.io/freakyhax/) is an exploit for the game Freakyforms Deluxe discovered and released by [plutooo](https://github.com/plutooo). It works on versions 9.0.0 through 11.17.0 on EUR, USA and JPN region consoles. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -### What You Need - -+ A EUR/USA/JPN copy of Freakyforms Deluxe (eShop or cartridge) -+ The latest release of [freakyhax](https://github.com/plutooo/freakyhax/releases/latest) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. SD kartınızı bilgisayarınıza takın -1. Copy all files and folders inside the `/build//exploit/` folder from the freakyhax `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - freakyhax - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch Freakyforms Deluxe -1. In the game menu, select `Play -> Camera -> Load a QR code` -1. Select the QR code -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/tr_TR/homebrew-launcher-(ninjhax2-dx).txt b/_pages/tr_TR/homebrew-launcher-(ninjhax2-dx).txt deleted file mode 100644 index a4fc7e7004..0000000000 --- a/_pages/tr_TR/homebrew-launcher-(ninjhax2-dx).txt +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "Homebrew Launcher (ninjhax2-dx)" ---- - -{% include toc title = "İçindekiler"%} - -{% capture technical_info %} -Technical Details (optional) -[Ninjhax2](https://github.com/smealum/ninjhax2.x) is an exploit for the game "Cubic Ninja" made by [smealum](https://github.com/smealum). This page uses an updated version of ninjhax by [zoogie](https://github.com/zoogie) called [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx), which supports 11.17.0. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -This process will overwrite your Cubic Ninja save file, if you have one. -{: .notice--warning} - -### What You Need -* The game "Cubic Ninja" -* The latest release of [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx/releases) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. SD kartınızı bilgisayarınıza takın -1. Copy `Launcher.dat` from the folder appropriate for your console from the ninjhax2-dx `.zip` file to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - -#### Section II - ninjhax2-dx -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Cubic Ninja" once and select "Create" - + If prompted, delete all data -1. Select "QR Code" -1. Select "Scan QR Code" -1. On your PC, open the browser and go to [ninjhax2-dx website](https://zoogie.github.io/web/nh2dx/) -1. Select your console's region and hardware -1. On your console, scan the QR code - + If the game exits to the HOME Menu, then the exploit has installed correctly -1. Launch "Cubic Ninja" again -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/tr_TR/homebrew-launcher-(pichaxx).txt b/_pages/tr_TR/homebrew-launcher-(pichaxx).txt deleted file mode 100644 index 11c7a71025..0000000000 --- a/_pages/tr_TR/homebrew-launcher-(pichaxx).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (PicHaxx)" ---- - -{% include toc title = "İçindekiler"%} - -{% capture technical_info %} -Technical Details (optional) -[PicHaxx](https://github.com/zoogie/pichaxx) is an exploit for the game Pokémon Picross released by [zoogie](https://github.com/zoogie), originally discovered and [demonstrated](https://twitter.com/mrnbayoh/status/744899681663258624) by [MrNbaYoh](https://github.com/MrNbaYoh). - -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Pokémon Picross" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Pokémon Picross -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Prep Work - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. SD kartınızı bilgisayarınıza takın -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card - -![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - PicHaxx - -In this section, you will create a hacked Pokémon Picross save file that, when loaded, will run the Homebrew Launcher on your console. - -1. Open [the PicHaxx Injector website](https://3dstools.nhnarwhal.com/#/pichaxx) on your computer -1. Select your `movable.sed` file -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `0017c100` -> `data` on your SD card - + The `` will be the same one that you used in Seedminer - + The `` is a 32 character long folder inside of the `` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted - - ![]({{ "/images/screenshots/pichaxx-save-location.png" | absolute_url }}) - {: .notice--info} - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Pokémon Picross" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher - + If you get an error message, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-pichaxx) -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/tr_TR/homebrew-launcher-(smilehax-iie).txt b/_pages/tr_TR/homebrew-launcher-(smilehax-iie).txt deleted file mode 100644 index 14bf3c53ff..0000000000 --- a/_pages/tr_TR/homebrew-launcher-(smilehax-iie).txt +++ /dev/null @@ -1,70 +0,0 @@ ---- -title: "Homebrew Launcher (smilehax-IIe)" ---- - -{% include toc title = "İçindekiler"%} - -This set of instructions does not support the Japanese version of SmileBASIC. -{: .notice--warning} - -{% capture technical_info %} -Technical Details (optional) -[smilehax-IIe](https://github.com/zoogie/smilehax-IIe) is an exploit for the game "SmileBASIC" made by zoogie, compatible with system versions 9.0.0 through 11.17.0 for USA/EUR/JPN region consoles. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need -+ The game "SmileBASIC" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install SmileBASIC -+ The latest release of [smilehax-IIe](https://github.com/zoogie/smilehax-IIe/releases/download/v1.1/Release_sh2e_v1.1.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. SD kartınızı bilgisayarınıza takın -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Transfer the `.wav` for your region from the Release_sh2e `.zip` to a device that can play `.wav` files, for example a phone -1. Copy the petitcom `.icn` for your region to the root of your SD card - -#### Section II - smilehax - -1. Launch SmileBASIC - + Update the game if prompted -1. Select the "Publish/Download Projects" option -1. Select the "Download (Receive) using Public Key" option -1. Press the "Yes" button -1. Enter the Public Key "NJEQK3A4" using the on-screen keyboard -1. Press the "Yes" button to confirm the download of PMODEM141 -1. Press "OK", then "Back", then "Browse Projects" -1. Select PMODEM141, then press "Select File" -1. Select PMODEM141.PRG, then press "OK", then "Yes" to execute it -1. Select RECEIVE FILE SIMPLEX -1. Prepare the device you use to play the `.wav` file -1. Keep your console about a foot from the `.wav` file playing devices' speaker and use a reasonable (not loud) volume to play the `.wav` -1. Now select 300BPS, then play the `.wav` file -1. When it finishes, press "Yes", then press "OK" -1. Press the START button -1. Select the SH2E-xxx.TXT file, then press OK, then "Yes" to execute it - + If you get kicked back into menu, make sure you're using the latest version of SmileBASIC -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/tr_TR/homebrew-launcher-(steelhax).txt b/_pages/tr_TR/homebrew-launcher-(steelhax).txt deleted file mode 100644 index 12df05982a..0000000000 --- a/_pages/tr_TR/homebrew-launcher-(steelhax).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (Steelhax)" ---- - -{% include toc title = "İçindekiler"%} - -{% capture technical_info %} -Technical Details (optional) -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Steel Diver: Sub Wars, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Steel Diver: Sub Wars save file, if you have one. If you wish to preserve your Steel Diver: Sub Wars game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Steel Diver: Sub Wars" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Steel Diver: Sub Wars -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Steelhax](/assets/steelhax-release.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Prep Work - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. SD kartınızı bilgisayarınıza takın -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the `steelhax` folder from the `Steelhax-release.zip` to the root of your SD card -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - Steelminer - -In this section, you will create a hacked Steel Diver: Sub Wars save file that, when used, will load the Homebrew Launcher on your console. - -1. Launch "Steel Diver: Sub Wars" once and select a Mii to initialize your save file - + Decline the game update when prompted - + If you have already updated the game, use the Data Management menu of the System Settings to delete the update -1. Exit "Steel Diver: Sub Wars" -1. Power off your console -1. SD kartınızı bilgisayarınıza takın -1. Open [the SteelHax Save Tool website](https://3dstools.nhnarwhal.com/#/steelhax) on your computer -1. Select your `movable.sed` file -1. Select your region based on your console -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `<8-character-region>` -> `data` on your SD card - + **EUR Region**: `000d7e00` - + **JPN Region**: `000d7c00` - + **USA Region**: `000d7d00` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Steel Diver: Sub Wars" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/tr_TR/homebrew-launcher-(super-skaterhax).txt b/_pages/tr_TR/homebrew-launcher-(super-skaterhax).txt deleted file mode 100644 index 250f9c7b67..0000000000 --- a/_pages/tr_TR/homebrew-launcher-(super-skaterhax).txt +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: "Homebrew Launcher (super-skaterhax)" ---- - -{% include toc title = "İçindekiler"%} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see [here](https://github.com/zoogie/super-skaterhax). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -Super-skaterhax (when used to launch the Homebrew Launcher) is compatible with New models on version 11.16.0 in all regions, and 11.17.0 in the EUR, JPN and USA regions. - -The instructions provided only apply to the New 3DS, New 3DS XL, and New 2DS XL. Please ensure that the console you are modding is a New 3DS, New 3DS XL, or New 2DS XL before continuing. -{: .notice--warning} - -### What You Need - -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* The latest release of [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (the release `.zip` file) - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger both super-skaterhax and the Homebrew Launcher. - -1. Power off your console -1. SD kartınızı bilgisayarınıza takın -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy everything inside the folder for your console's region (and also system version if the region is USA) in the super-skaterhax `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/skater-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - super-skaterhax - -In this section, you will visit the browser exploit webpage, which will launch the Homebrew Launcher. - -If you haven't already, make sure you have a working Internet connection set up on your console. -{: .notice--info} - -1. On the HOME Menu, press the Left and Right shoulder buttons at the same time to open the camera - + If you are unable to open the camera, open the Internet Browser and manually type the URL instead (`https://zoogie.github.io/web/super/` for EUR/USA/JPN, `https://zoogie.github.io/web/korea` for KOR) -1. Tap the QR code button and scan one of the following QR codes for your console's region [here](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png) - + If you get a security certificate warning, press (A) to allow the connection -1. Press the (Select) button to open the bookmark tab - + If your (Select) button does not respond, tap the star icon on the bottom-left corner of the screen -1. Tap "Bookmark this page" -1. Press (B) once to return to the browser -1. Press (Start) to open the context menu - + If your (Start) button does not respond, tap the 3-line menu on the bottom-right corner of the screen -1. Tap on "Settings" -1. Tap on "Delete Cookies" -1. Devam etmek için (A) basın -1. Press (Home) to return to the HOME Menu, then immediately press (A) to launch the browser again -1. Select the "GO GO!" button on the top screen - + If any prompts appear, approve all of them - + If your console freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your console freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section - + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/tr_TR/include/fredtool-prep.txt b/_pages/tr_TR/include/fredtool-prep.txt deleted file mode 100644 index 3253f2c8c8..0000000000 --- a/_pages/tr_TR/include/fredtool-prep.txt +++ /dev/null @@ -1,29 +0,0 @@ -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. SD kartınızı bilgisayarınıza takın -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} \ No newline at end of file diff --git a/_pages/tr_TR/include/hbl-common-exploits-movable.txt b/_pages/tr_TR/include/hbl-common-exploits-movable.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/tr_TR/include/hbl-common-exploits-movable.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/tr_TR/include/hbl-common-exploits.txt b/_pages/tr_TR/include/hbl-common-exploits.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/tr_TR/include/hbl-common-exploits.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/tr_TR/installing-boot9strap-(fredtool).txt b/_pages/tr_TR/installing-boot9strap-(fredtool).txt deleted file mode 100644 index 85778cccba..0000000000 --- a/_pages/tr_TR/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool)" ---- - -{% include toc title = "İçindekiler"%} - -{% capture technical_info %} -Technical Details (optional) - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer](seedminer) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### [Kurulumu Tamamlamak](finalizing-setup) için devam edin -{: .notice--primary} diff --git a/_pages/tr_TR/installing-boot9strap-(fredtool-legacy).txt b/_pages/tr_TR/installing-boot9strap-(fredtool-legacy).txt deleted file mode 100644 index 65008ec2af..0000000000 --- a/_pages/tr_TR/installing-boot9strap-(fredtool-legacy).txt +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool, Legacy)" ---- - -{% include toc title = "İçindekiler"%} - -{% capture technical_info %} -Technical Details (optional) - -Sistem DSiWare dosyasını çıkartabilmek için Settings (Ayarlar) uygulamasında bulunan DSiWare Data Management (DSiWare Veri Yönetimi) kısmındaki bir açıktan yararlanıyoruz. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. - -Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### [Kurulumu Tamamlamak](finalizing-setup) için devam edin -{: .notice--primary} diff --git a/_pages/tr_TR/installing-boot9strap-(frogtool).txt b/_pages/tr_TR/installing-boot9strap-(frogtool).txt deleted file mode 100644 index 7169980b3d..0000000000 --- a/_pages/tr_TR/installing-boot9strap-(frogtool).txt +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Installing boot9strap (Frogtool)" ---- - -{% include toc title = "İçindekiler"%} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see "DSiWare_Exports CTCert verification" and "FIRM partitions known-plaintext" [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - - -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) link for `frogcert.bin` on this page, you will need a torrent client like [qBittorrent](https://www.qbittorrent.org/download.php) or [Deluge](http://dev.deluge-torrent.org/wiki/Download). -{: .notice--warning} - -### What You Need - -* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link) -* The latest release of [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (direct download) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - Prep Work - -1. Power off your console -1. SD kartınızı bilgisayarınıza takın -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Copy `boot.nds` (b9sTool) from the b9sTool release `.zip` to the root of your SD card -1. Create a folder named `3ds` on the root of your SD card if it does not already exist - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy the `Frogtool` folder from the Frogtool-nimhax `.zip` to the `/3ds/` folder on your SD card -1. Copy `frogcert.bin` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section III - Patching DS Download Play - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch Frogtool from the list of homebrew -1. Select the "INJECT patched DS Download Play" option -1. Frogtool will automatically run and inject the JPN version of Flipnote Studio into your DS Download Play -1. Once this operation has finished, read the screens and check if the process was successful -1. Tap the touch screen, then select "BOOT patched DS Download Play" -1. If the exploit was successful, your console will have loaded the JPN version of Flipnote Studio - + If you get stuck on a black screen, follow [this](https://wiki.hacks.guide/wiki/3DS:TWLFix#Userland_(PicHaxx,_Steelhax,_etc.)-0) page, then try again - -#### Section IV - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsdlp" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Download Play - -1. Launch the Download Play application -1. Wait until you see the two buttons - + Do not press either of the buttons -1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu -1. Select "Miscellaneous options" -1. Select "Switch the hb. title to the current app." -1. Press (B) to continue -1. Press (B) to return to the Rosalina main menu -1. Press (B) to exit the Rosalina menu -1. Press (Home), then close Download Play -1. Relaunch the Download Play application -1. Your console should load the Homebrew Launcher -1. Launch Frogtool from the list of homebrew -1. Select the "RESTORE clean DS Download Play" option -1. Once this operation has finished, read the screens and check if the process was successful - + If there are any errors or missing files, correct the problem and try again -1. If the process was successful, tap the touch screen, then press START to exit -1. Power off your console - -___ - -### [Kurulumu Tamamlamak](finalizing-setup) için devam edin -{: .notice--primary} diff --git a/_pages/tr_TR/installing-boot9strap-(hbl-usm).txt b/_pages/tr_TR/installing-boot9strap-(hbl-usm).txt deleted file mode 100644 index a8b900516d..0000000000 --- a/_pages/tr_TR/installing-boot9strap-(hbl-usm).txt +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "Installing boot9strap (HBL-USM)" ---- - -{% include toc title = "İçindekiler"%} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--danger} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) (direct download) - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. Then, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. SD kartınızı bilgisayarınıza takın -1. Create a folder named `boot9strap` on the root of your SD card -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the RELEASE `.zip` to the `/boot9strap/` folder on your SD card -1. Create a folder named `3ds` on the root of your SD card if it does not already exist - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy `slotTool.3dsx` from the `slotTool` folder inside the RELEASE `.zip` to the `/3ds/` folder on your SD card -1. Copy `usm.bin` from the RELEASE `.zip` to the root folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch slotTool from the list of homebrew - + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section -1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option - + You will see some on-screen text and then your system will shut down - -![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section III - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section IV - Restoring WiFi Configuration Profiles - -{% include_relative include/remove-usm-slottool.txt %} - -___ - -### [Kurulumu Tamamlamak](finalizing-setup) için devam edin -{: .notice--primary} diff --git a/_pages/tr_TR/installing-boot9strap-(usm).txt b/_pages/tr_TR/installing-boot9strap-(usm).txt deleted file mode 100644 index e1dedaee44..0000000000 --- a/_pages/tr_TR/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: "Installing boot9strap (USM)" ---- - -{% include toc title = "İçindekiler"%} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. - -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--warning} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* [usm.bin](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) - - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. - -1. Your SD card should be inserted in your computer -1. Copy `usm.bin` to the root of your SD card -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Create a folder named `boot9strap` on the root of your SD card -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card - -![]({{ "/images/screenshots/usm/usm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If the BB3 multihax menu doesn't open, [follow this troubleshooting guide](troubleshooting#bannerbomb3) - + If the BB3 multihax menu says "cfw installed already", you already have custom firmware and should continue from [here](checking-for-cfw) -1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" - + Your console will automatically power off -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Internet Settings` -> `Connection Settings` -1. Ensure that all three connections are named "Haaaaaaaxxxxxxxxx..." - + Do NOT change these settings! - + If all three connections are NOT all named "Haaaaaaaxxxxxxxxx...", STOP! Something went wrong in this section and MUST be fixed before you can continue -1. Power off your console - -#### Section III - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section IV - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section V - Restoring WiFi Configuration Profiles - -In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. - -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" - + Your console will automatically reboot -1. Power off your console -1. SD kartınızı bilgisayarınıza takın -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore - -___ - -### [Kurulumu Tamamlamak](finalizing-setup) için devam edin -{: .notice--primary} diff --git a/_pages/uk_UA/dumping-movable-(nimhax).txt b/_pages/uk_UA/dumping-movable-(nimhax).txt deleted file mode 100644 index 69f3d011d3..0000000000 --- a/_pages/uk_UA/dumping-movable-(nimhax).txt +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: "Dumping Movable (nimhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -To install boot9strap on your console, we derive your console's unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console. - -For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need - -* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy the `nimhax` folder from the nimhax `.zip` to the `/3ds/` folder on your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) -{: .notice--info} - -#### Section II - nimhax - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch nimhax from the list of homebrew -1. If the exploit was successful, a `movable.sed` file will appear on the root of your SD card - -### Next step: Frogtool - -Once you have your console's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \ -While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you're unable to use a torrent client. - -Continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--primary} diff --git a/_pages/uk_UA/homebrew-launcher-(freakyhax).txt b/_pages/uk_UA/homebrew-launcher-(freakyhax).txt deleted file mode 100644 index 028cee82a4..0000000000 --- a/_pages/uk_UA/homebrew-launcher-(freakyhax).txt +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: "Homebrew Launcher (freakyhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[freakyhax](https://plutooo.github.io/freakyhax/) is an exploit for the game Freakyforms Deluxe discovered and released by [plutooo](https://github.com/plutooo). It works on versions 9.0.0 through 11.17.0 on EUR, USA and JPN region consoles. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -### What You Need - -+ A EUR/USA/JPN copy of Freakyforms Deluxe (eShop or cartridge) -+ The latest release of [freakyhax](https://github.com/plutooo/freakyhax/releases/latest) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy all files and folders inside the `/build//exploit/` folder from the freakyhax `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - freakyhax - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch Freakyforms Deluxe -1. In the game menu, select `Play -> Camera -> Load a QR code` -1. Select the QR code -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/uk_UA/homebrew-launcher-(ninjhax2-dx).txt b/_pages/uk_UA/homebrew-launcher-(ninjhax2-dx).txt deleted file mode 100644 index 2d8032745c..0000000000 --- a/_pages/uk_UA/homebrew-launcher-(ninjhax2-dx).txt +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "Homebrew Launcher (ninjhax2-dx)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[Ninjhax2](https://github.com/smealum/ninjhax2.x) is an exploit for the game "Cubic Ninja" made by [smealum](https://github.com/smealum). This page uses an updated version of ninjhax by [zoogie](https://github.com/zoogie) called [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx), which supports 11.17.0. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -This process will overwrite your Cubic Ninja save file, if you have one. -{: .notice--warning} - -### What You Need -* The game "Cubic Ninja" -* The latest release of [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx/releases) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `Launcher.dat` from the folder appropriate for your console from the ninjhax2-dx `.zip` file to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - -#### Section II - ninjhax2-dx -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Cubic Ninja" once and select "Create" - + If prompted, delete all data -1. Select "QR Code" -1. Select "Scan QR Code" -1. On your PC, open the browser and go to [ninjhax2-dx website](https://zoogie.github.io/web/nh2dx/) -1. Select your console's region and hardware -1. On your console, scan the QR code - + If the game exits to the HOME Menu, then the exploit has installed correctly -1. Launch "Cubic Ninja" again -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/uk_UA/homebrew-launcher-(pichaxx).txt b/_pages/uk_UA/homebrew-launcher-(pichaxx).txt deleted file mode 100644 index a58df498f5..0000000000 --- a/_pages/uk_UA/homebrew-launcher-(pichaxx).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (PicHaxx)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[PicHaxx](https://github.com/zoogie/pichaxx) is an exploit for the game Pokémon Picross released by [zoogie](https://github.com/zoogie), originally discovered and [demonstrated](https://twitter.com/mrnbayoh/status/744899681663258624) by [MrNbaYoh](https://github.com/MrNbaYoh). - -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Pokémon Picross" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Pokémon Picross -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Prep Work - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card - -![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - PicHaxx - -In this section, you will create a hacked Pokémon Picross save file that, when loaded, will run the Homebrew Launcher on your console. - -1. Open [the PicHaxx Injector website](https://3dstools.nhnarwhal.com/#/pichaxx) on your computer -1. Select your `movable.sed` file -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `0017c100` -> `data` on your SD card - + The `` will be the same one that you used in Seedminer - + The `` is a 32 character long folder inside of the `` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted - - ![]({{ "/images/screenshots/pichaxx-save-location.png" | absolute_url }}) - {: .notice--info} - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Pokémon Picross" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher - + If you get an error message, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-pichaxx) -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/uk_UA/homebrew-launcher-(smilehax-iie).txt b/_pages/uk_UA/homebrew-launcher-(smilehax-iie).txt deleted file mode 100644 index 08cd5865c0..0000000000 --- a/_pages/uk_UA/homebrew-launcher-(smilehax-iie).txt +++ /dev/null @@ -1,70 +0,0 @@ ---- -title: "Homebrew Launcher (smilehax-IIe)" ---- - -{% include toc title="Table of Contents" %} - -This set of instructions does not support the Japanese version of SmileBASIC. -{: .notice--warning} - -{% capture technical_info %} -Technical Details (optional) -[smilehax-IIe](https://github.com/zoogie/smilehax-IIe) is an exploit for the game "SmileBASIC" made by zoogie, compatible with system versions 9.0.0 through 11.17.0 for USA/EUR/JPN region consoles. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need -+ The game "SmileBASIC" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install SmileBASIC -+ The latest release of [smilehax-IIe](https://github.com/zoogie/smilehax-IIe/releases/download/v1.1/Release_sh2e_v1.1.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Transfer the `.wav` for your region from the Release_sh2e `.zip` to a device that can play `.wav` files, for example a phone -1. Copy the petitcom `.icn` for your region to the root of your SD card - -#### Section II - smilehax - -1. Launch SmileBASIC - + Update the game if prompted -1. Select the "Publish/Download Projects" option -1. Select the "Download (Receive) using Public Key" option -1. Press the "Yes" button -1. Enter the Public Key "NJEQK3A4" using the on-screen keyboard -1. Press the "Yes" button to confirm the download of PMODEM141 -1. Press "OK", then "Back", then "Browse Projects" -1. Select PMODEM141, then press "Select File" -1. Select PMODEM141.PRG, then press "OK", then "Yes" to execute it -1. Select RECEIVE FILE SIMPLEX -1. Prepare the device you use to play the `.wav` file -1. Keep your console about a foot from the `.wav` file playing devices' speaker and use a reasonable (not loud) volume to play the `.wav` -1. Now select 300BPS, then play the `.wav` file -1. When it finishes, press "Yes", then press "OK" -1. Press the START button -1. Select the SH2E-xxx.TXT file, then press OK, then "Yes" to execute it - + If you get kicked back into menu, make sure you're using the latest version of SmileBASIC -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/uk_UA/homebrew-launcher-(steelhax).txt b/_pages/uk_UA/homebrew-launcher-(steelhax).txt deleted file mode 100644 index 9b8dace5a3..0000000000 --- a/_pages/uk_UA/homebrew-launcher-(steelhax).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (Steelhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Steel Diver: Sub Wars, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Steel Diver: Sub Wars save file, if you have one. If you wish to preserve your Steel Diver: Sub Wars game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Steel Diver: Sub Wars" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Steel Diver: Sub Wars -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Steelhax](/assets/steelhax-release.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Prep Work - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the `steelhax` folder from the `Steelhax-release.zip` to the root of your SD card -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - Steelminer - -In this section, you will create a hacked Steel Diver: Sub Wars save file that, when used, will load the Homebrew Launcher on your console. - -1. Launch "Steel Diver: Sub Wars" once and select a Mii to initialize your save file - + Decline the game update when prompted - + If you have already updated the game, use the Data Management menu of the System Settings to delete the update -1. Exit "Steel Diver: Sub Wars" -1. Power off your console -1. Insert your SD card into your computer -1. Open [the SteelHax Save Tool website](https://3dstools.nhnarwhal.com/#/steelhax) on your computer -1. Select your `movable.sed` file -1. Select your region based on your console -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `<8-character-region>` -> `data` on your SD card - + **EUR Region**: `000d7e00` - + **JPN Region**: `000d7c00` - + **USA Region**: `000d7d00` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Steel Diver: Sub Wars" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/uk_UA/homebrew-launcher-(super-skaterhax).txt b/_pages/uk_UA/homebrew-launcher-(super-skaterhax).txt deleted file mode 100644 index 5895c4f64b..0000000000 --- a/_pages/uk_UA/homebrew-launcher-(super-skaterhax).txt +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: "Homebrew Launcher (super-skaterhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see [here](https://github.com/zoogie/super-skaterhax). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -Super-skaterhax (when used to launch the Homebrew Launcher) is compatible with New models on version 11.16.0 in all regions, and 11.17.0 in the EUR, JPN and USA regions. - -The instructions provided only apply to the New 3DS, New 3DS XL, and New 2DS XL. Please ensure that the console you are modding is a New 3DS, New 3DS XL, or New 2DS XL before continuing. -{: .notice--warning} - -### What You Need - -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* The latest release of [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (the release `.zip` file) - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger both super-skaterhax and the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy everything inside the folder for your console's region (and also system version if the region is USA) in the super-skaterhax `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/skater-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - super-skaterhax - -In this section, you will visit the browser exploit webpage, which will launch the Homebrew Launcher. - -If you haven't already, make sure you have a working Internet connection set up on your console. -{: .notice--info} - -1. On the HOME Menu, press the Left and Right shoulder buttons at the same time to open the camera - + If you are unable to open the camera, open the Internet Browser and manually type the URL instead (`https://zoogie.github.io/web/super/` for EUR/USA/JPN, `https://zoogie.github.io/web/korea` for KOR) -1. Tap the QR code button and scan one of the following QR codes for your console's region [here](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png) - + If you get a security certificate warning, press (A) to allow the connection -1. Press the (Select) button to open the bookmark tab - + If your (Select) button does not respond, tap the star icon on the bottom-left corner of the screen -1. Tap "Bookmark this page" -1. Press (B) once to return to the browser -1. Press (Start) to open the context menu - + If your (Start) button does not respond, tap the 3-line menu on the bottom-right corner of the screen -1. Tap on "Settings" -1. Tap on "Delete Cookies" -1. Press (A) to continue -1. Press (Home) to return to the HOME Menu, then immediately press (A) to launch the browser again -1. Select the "GO GO!" button on the top screen - + If any prompts appear, approve all of them - + If your console freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your console freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section - + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/uk_UA/include/fredtool-prep.txt b/_pages/uk_UA/include/fredtool-prep.txt deleted file mode 100644 index bd910b24de..0000000000 --- a/_pages/uk_UA/include/fredtool-prep.txt +++ /dev/null @@ -1,29 +0,0 @@ -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Insert your SD card into your computer -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} \ No newline at end of file diff --git a/_pages/uk_UA/include/hbl-common-exploits-movable.txt b/_pages/uk_UA/include/hbl-common-exploits-movable.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/uk_UA/include/hbl-common-exploits-movable.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/uk_UA/include/hbl-common-exploits.txt b/_pages/uk_UA/include/hbl-common-exploits.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/uk_UA/include/hbl-common-exploits.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/uk_UA/installing-boot9strap-(fredtool).txt b/_pages/uk_UA/installing-boot9strap-(fredtool).txt deleted file mode 100644 index a06a1259f2..0000000000 --- a/_pages/uk_UA/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer](seedminer) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/uk_UA/installing-boot9strap-(fredtool-legacy).txt b/_pages/uk_UA/installing-boot9strap-(fredtool-legacy).txt deleted file mode 100644 index 7e88fb51b4..0000000000 --- a/_pages/uk_UA/installing-boot9strap-(fredtool-legacy).txt +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool, Legacy)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. - -Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/uk_UA/installing-boot9strap-(frogtool).txt b/_pages/uk_UA/installing-boot9strap-(frogtool).txt deleted file mode 100644 index 063799fcc6..0000000000 --- a/_pages/uk_UA/installing-boot9strap-(frogtool).txt +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Installing boot9strap (Frogtool)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see "DSiWare_Exports CTCert verification" and "FIRM partitions known-plaintext" [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - - -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) link for `frogcert.bin` on this page, you will need a torrent client like [qBittorrent](https://www.qbittorrent.org/download.php) or [Deluge](http://dev.deluge-torrent.org/wiki/Download). -{: .notice--warning} - -### What You Need - -* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link) -* The latest release of [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (direct download) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Copy `boot.nds` (b9sTool) from the b9sTool release `.zip` to the root of your SD card -1. Create a folder named `3ds` on the root of your SD card if it does not already exist - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy the `Frogtool` folder from the Frogtool-nimhax `.zip` to the `/3ds/` folder on your SD card -1. Copy `frogcert.bin` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section III - Patching DS Download Play - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch Frogtool from the list of homebrew -1. Select the "INJECT patched DS Download Play" option -1. Frogtool will automatically run and inject the JPN version of Flipnote Studio into your DS Download Play -1. Once this operation has finished, read the screens and check if the process was successful -1. Tap the touch screen, then select "BOOT patched DS Download Play" -1. If the exploit was successful, your console will have loaded the JPN version of Flipnote Studio - + If you get stuck on a black screen, follow [this](https://wiki.hacks.guide/wiki/3DS:TWLFix#Userland_(PicHaxx,_Steelhax,_etc.)-0) page, then try again - -#### Section IV - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsdlp" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Download Play - -1. Launch the Download Play application -1. Wait until you see the two buttons - + Do not press either of the buttons -1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu -1. Select "Miscellaneous options" -1. Select "Switch the hb. title to the current app." -1. Press (B) to continue -1. Press (B) to return to the Rosalina main menu -1. Press (B) to exit the Rosalina menu -1. Press (Home), then close Download Play -1. Relaunch the Download Play application -1. Your console should load the Homebrew Launcher -1. Launch Frogtool from the list of homebrew -1. Select the "RESTORE clean DS Download Play" option -1. Once this operation has finished, read the screens and check if the process was successful - + If there are any errors or missing files, correct the problem and try again -1. If the process was successful, tap the touch screen, then press START to exit -1. Power off your console - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/uk_UA/installing-boot9strap-(hbl-usm).txt b/_pages/uk_UA/installing-boot9strap-(hbl-usm).txt deleted file mode 100644 index de8dad596a..0000000000 --- a/_pages/uk_UA/installing-boot9strap-(hbl-usm).txt +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "Installing boot9strap (HBL-USM)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--danger} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) (direct download) - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. Then, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Insert your SD card into your computer -1. Create a folder named `boot9strap` on the root of your SD card -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the RELEASE `.zip` to the `/boot9strap/` folder on your SD card -1. Create a folder named `3ds` on the root of your SD card if it does not already exist - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy `slotTool.3dsx` from the `slotTool` folder inside the RELEASE `.zip` to the `/3ds/` folder on your SD card -1. Copy `usm.bin` from the RELEASE `.zip` to the root folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch slotTool from the list of homebrew - + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section -1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option - + You will see some on-screen text and then your system will shut down - -![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section III - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section IV - Restoring WiFi Configuration Profiles - -{% include_relative include/remove-usm-slottool.txt %} - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/uk_UA/installing-boot9strap-(usm).txt b/_pages/uk_UA/installing-boot9strap-(usm).txt deleted file mode 100644 index 9dcede6ffe..0000000000 --- a/_pages/uk_UA/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: "Installing boot9strap (USM)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. - -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--warning} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* [usm.bin](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) - - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. - -1. Your SD card should be inserted in your computer -1. Copy `usm.bin` to the root of your SD card -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Create a folder named `boot9strap` on the root of your SD card -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card - -![]({{ "/images/screenshots/usm/usm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If the BB3 multihax menu doesn't open, [follow this troubleshooting guide](troubleshooting#bannerbomb3) - + If the BB3 multihax menu says "cfw installed already", you already have custom firmware and should continue from [here](checking-for-cfw) -1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" - + Your console will automatically power off -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Internet Settings` -> `Connection Settings` -1. Ensure that all three connections are named "Haaaaaaaxxxxxxxxx..." - + Do NOT change these settings! - + If all three connections are NOT all named "Haaaaaaaxxxxxxxxx...", STOP! Something went wrong in this section and MUST be fixed before you can continue -1. Power off your console - -#### Section III - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section IV - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section V - Restoring WiFi Configuration Profiles - -In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. - -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" - + Your console will automatically reboot -1. Power off your console -1. Insert your SD card into your computer -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/vi_VN/dumping-movable-(nimhax).txt b/_pages/vi_VN/dumping-movable-(nimhax).txt deleted file mode 100644 index 69f3d011d3..0000000000 --- a/_pages/vi_VN/dumping-movable-(nimhax).txt +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: "Dumping Movable (nimhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -To install boot9strap on your console, we derive your console's unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console. - -For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need - -* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy the `nimhax` folder from the nimhax `.zip` to the `/3ds/` folder on your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) -{: .notice--info} - -#### Section II - nimhax - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch nimhax from the list of homebrew -1. If the exploit was successful, a `movable.sed` file will appear on the root of your SD card - -### Next step: Frogtool - -Once you have your console's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \ -While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you're unable to use a torrent client. - -Continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--primary} diff --git a/_pages/vi_VN/homebrew-launcher-(freakyhax).txt b/_pages/vi_VN/homebrew-launcher-(freakyhax).txt deleted file mode 100644 index 028cee82a4..0000000000 --- a/_pages/vi_VN/homebrew-launcher-(freakyhax).txt +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: "Homebrew Launcher (freakyhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[freakyhax](https://plutooo.github.io/freakyhax/) is an exploit for the game Freakyforms Deluxe discovered and released by [plutooo](https://github.com/plutooo). It works on versions 9.0.0 through 11.17.0 on EUR, USA and JPN region consoles. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -### What You Need - -+ A EUR/USA/JPN copy of Freakyforms Deluxe (eShop or cartridge) -+ The latest release of [freakyhax](https://github.com/plutooo/freakyhax/releases/latest) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy all files and folders inside the `/build//exploit/` folder from the freakyhax `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - freakyhax - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch Freakyforms Deluxe -1. In the game menu, select `Play -> Camera -> Load a QR code` -1. Select the QR code -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/vi_VN/homebrew-launcher-(ninjhax2-dx).txt b/_pages/vi_VN/homebrew-launcher-(ninjhax2-dx).txt deleted file mode 100644 index 2d8032745c..0000000000 --- a/_pages/vi_VN/homebrew-launcher-(ninjhax2-dx).txt +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "Homebrew Launcher (ninjhax2-dx)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[Ninjhax2](https://github.com/smealum/ninjhax2.x) is an exploit for the game "Cubic Ninja" made by [smealum](https://github.com/smealum). This page uses an updated version of ninjhax by [zoogie](https://github.com/zoogie) called [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx), which supports 11.17.0. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -This process will overwrite your Cubic Ninja save file, if you have one. -{: .notice--warning} - -### What You Need -* The game "Cubic Ninja" -* The latest release of [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx/releases) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `Launcher.dat` from the folder appropriate for your console from the ninjhax2-dx `.zip` file to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - -#### Section II - ninjhax2-dx -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Cubic Ninja" once and select "Create" - + If prompted, delete all data -1. Select "QR Code" -1. Select "Scan QR Code" -1. On your PC, open the browser and go to [ninjhax2-dx website](https://zoogie.github.io/web/nh2dx/) -1. Select your console's region and hardware -1. On your console, scan the QR code - + If the game exits to the HOME Menu, then the exploit has installed correctly -1. Launch "Cubic Ninja" again -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/vi_VN/homebrew-launcher-(pichaxx).txt b/_pages/vi_VN/homebrew-launcher-(pichaxx).txt deleted file mode 100644 index a58df498f5..0000000000 --- a/_pages/vi_VN/homebrew-launcher-(pichaxx).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (PicHaxx)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -[PicHaxx](https://github.com/zoogie/pichaxx) is an exploit for the game Pokémon Picross released by [zoogie](https://github.com/zoogie), originally discovered and [demonstrated](https://twitter.com/mrnbayoh/status/744899681663258624) by [MrNbaYoh](https://github.com/MrNbaYoh). - -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Pokémon Picross" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Pokémon Picross -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Prep Work - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card - -![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - PicHaxx - -In this section, you will create a hacked Pokémon Picross save file that, when loaded, will run the Homebrew Launcher on your console. - -1. Open [the PicHaxx Injector website](https://3dstools.nhnarwhal.com/#/pichaxx) on your computer -1. Select your `movable.sed` file -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `0017c100` -> `data` on your SD card - + The `` will be the same one that you used in Seedminer - + The `` is a 32 character long folder inside of the `` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted - - ![]({{ "/images/screenshots/pichaxx-save-location.png" | absolute_url }}) - {: .notice--info} - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Pokémon Picross" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher - + If you get an error message, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-pichaxx) -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/vi_VN/homebrew-launcher-(smilehax-iie).txt b/_pages/vi_VN/homebrew-launcher-(smilehax-iie).txt deleted file mode 100644 index 08cd5865c0..0000000000 --- a/_pages/vi_VN/homebrew-launcher-(smilehax-iie).txt +++ /dev/null @@ -1,70 +0,0 @@ ---- -title: "Homebrew Launcher (smilehax-IIe)" ---- - -{% include toc title="Table of Contents" %} - -This set of instructions does not support the Japanese version of SmileBASIC. -{: .notice--warning} - -{% capture technical_info %} -Technical Details (optional) -[smilehax-IIe](https://github.com/zoogie/smilehax-IIe) is an exploit for the game "SmileBASIC" made by zoogie, compatible with system versions 9.0.0 through 11.17.0 for USA/EUR/JPN region consoles. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### What You Need -+ The game "SmileBASIC" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install SmileBASIC -+ The latest release of [smilehax-IIe](https://github.com/zoogie/smilehax-IIe/releases/download/v1.1/Release_sh2e_v1.1.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### Instructions - -#### Section I - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Transfer the `.wav` for your region from the Release_sh2e `.zip` to a device that can play `.wav` files, for example a phone -1. Copy the petitcom `.icn` for your region to the root of your SD card - -#### Section II - smilehax - -1. Launch SmileBASIC - + Update the game if prompted -1. Select the "Publish/Download Projects" option -1. Select the "Download (Receive) using Public Key" option -1. Press the "Yes" button -1. Enter the Public Key "NJEQK3A4" using the on-screen keyboard -1. Press the "Yes" button to confirm the download of PMODEM141 -1. Press "OK", then "Back", then "Browse Projects" -1. Select PMODEM141, then press "Select File" -1. Select PMODEM141.PRG, then press "OK", then "Yes" to execute it -1. Select RECEIVE FILE SIMPLEX -1. Prepare the device you use to play the `.wav` file -1. Keep your console about a foot from the `.wav` file playing devices' speaker and use a reasonable (not loud) volume to play the `.wav` -1. Now select 300BPS, then play the `.wav` file -1. When it finishes, press "Yes", then press "OK" -1. Press the START button -1. Select the SH2E-xxx.TXT file, then press OK, then "Yes" to execute it - + If you get kicked back into menu, make sure you're using the latest version of SmileBASIC -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/vi_VN/homebrew-launcher-(steelhax).txt b/_pages/vi_VN/homebrew-launcher-(steelhax).txt deleted file mode 100644 index 9b8dace5a3..0000000000 --- a/_pages/vi_VN/homebrew-launcher-(steelhax).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (Steelhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Steel Diver: Sub Wars, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Steel Diver: Sub Wars save file, if you have one. If you wish to preserve your Steel Diver: Sub Wars game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### What You Need - -+ The game "Steel Diver: Sub Wars" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Steel Diver: Sub Wars -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Steelhax](/assets/steelhax-release.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### Instructions - -#### Section I - Prep Work - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy the `steelhax` folder from the `Steelhax-release.zip` to the root of your SD card -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - Steelminer - -In this section, you will create a hacked Steel Diver: Sub Wars save file that, when used, will load the Homebrew Launcher on your console. - -1. Launch "Steel Diver: Sub Wars" once and select a Mii to initialize your save file - + Decline the game update when prompted - + If you have already updated the game, use the Data Management menu of the System Settings to delete the update -1. Exit "Steel Diver: Sub Wars" -1. Power off your console -1. Insert your SD card into your computer -1. Open [the SteelHax Save Tool website](https://3dstools.nhnarwhal.com/#/steelhax) on your computer -1. Select your `movable.sed` file -1. Select your region based on your console -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `<8-character-region>` -> `data` on your SD card - + **EUR Region**: `000d7e00` - + **JPN Region**: `000d7c00` - + **USA Region**: `000d7d00` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Steel Diver: Sub Wars" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/vi_VN/homebrew-launcher-(super-skaterhax).txt b/_pages/vi_VN/homebrew-launcher-(super-skaterhax).txt deleted file mode 100644 index 5895c4f64b..0000000000 --- a/_pages/vi_VN/homebrew-launcher-(super-skaterhax).txt +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: "Homebrew Launcher (super-skaterhax)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see [here](https://github.com/zoogie/super-skaterhax). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -Super-skaterhax (when used to launch the Homebrew Launcher) is compatible with New models on version 11.16.0 in all regions, and 11.17.0 in the EUR, JPN and USA regions. - -The instructions provided only apply to the New 3DS, New 3DS XL, and New 2DS XL. Please ensure that the console you are modding is a New 3DS, New 3DS XL, or New 2DS XL before continuing. -{: .notice--warning} - -### What You Need - -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* The latest release of [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (the release `.zip` file) - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger both super-skaterhax and the Homebrew Launcher. - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy everything inside the folder for your console's region (and also system version if the region is USA) in the super-skaterhax `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/skater-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - super-skaterhax - -In this section, you will visit the browser exploit webpage, which will launch the Homebrew Launcher. - -If you haven't already, make sure you have a working Internet connection set up on your console. -{: .notice--info} - -1. On the HOME Menu, press the Left and Right shoulder buttons at the same time to open the camera - + If you are unable to open the camera, open the Internet Browser and manually type the URL instead (`https://zoogie.github.io/web/super/` for EUR/USA/JPN, `https://zoogie.github.io/web/korea` for KOR) -1. Tap the QR code button and scan one of the following QR codes for your console's region [here](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png) - + If you get a security certificate warning, press (A) to allow the connection -1. Press the (Select) button to open the bookmark tab - + If your (Select) button does not respond, tap the star icon on the bottom-left corner of the screen -1. Tap "Bookmark this page" -1. Press (B) once to return to the browser -1. Press (Start) to open the context menu - + If your (Start) button does not respond, tap the 3-line menu on the bottom-right corner of the screen -1. Tap on "Settings" -1. Tap on "Delete Cookies" -1. Press (A) to continue -1. Press (Home) to return to the HOME Menu, then immediately press (A) to launch the browser again -1. Select the "GO GO!" button on the top screen - + If any prompts appear, approve all of them - + If your console freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your console freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section - + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/vi_VN/include/fredtool-prep.txt b/_pages/vi_VN/include/fredtool-prep.txt deleted file mode 100644 index bd910b24de..0000000000 --- a/_pages/vi_VN/include/fredtool-prep.txt +++ /dev/null @@ -1,29 +0,0 @@ -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Insert your SD card into your computer -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} \ No newline at end of file diff --git a/_pages/vi_VN/include/hbl-common-exploits-movable.txt b/_pages/vi_VN/include/hbl-common-exploits-movable.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/vi_VN/include/hbl-common-exploits-movable.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/vi_VN/include/hbl-common-exploits.txt b/_pages/vi_VN/include/hbl-common-exploits.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/vi_VN/include/hbl-common-exploits.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/vi_VN/installing-boot9strap-(fredtool).txt b/_pages/vi_VN/installing-boot9strap-(fredtool).txt deleted file mode 100644 index a06a1259f2..0000000000 --- a/_pages/vi_VN/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer](seedminer) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/vi_VN/installing-boot9strap-(fredtool-legacy).txt b/_pages/vi_VN/installing-boot9strap-(fredtool-legacy).txt deleted file mode 100644 index 7e88fb51b4..0000000000 --- a/_pages/vi_VN/installing-boot9strap-(fredtool-legacy).txt +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool, Legacy)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. - -Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### What You Need - -* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### Section III - Prep Work - -{% include_relative include/fredtool-prep.txt %} - -#### Section IV - Overwriting DS Connection Settings - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### Section V - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/vi_VN/installing-boot9strap-(frogtool).txt b/_pages/vi_VN/installing-boot9strap-(frogtool).txt deleted file mode 100644 index 063799fcc6..0000000000 --- a/_pages/vi_VN/installing-boot9strap-(frogtool).txt +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Installing boot9strap (Frogtool)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see "DSiWare_Exports CTCert verification" and "FIRM partitions known-plaintext" [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - - -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) link for `frogcert.bin` on this page, you will need a torrent client like [qBittorrent](https://www.qbittorrent.org/download.php) or [Deluge](http://dev.deluge-torrent.org/wiki/Download). -{: .notice--warning} - -### What You Need - -* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link) -* The latest release of [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (direct download) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) - -#### Section I - CFW Check - -{% include_relative include/cfw-check-fredtool.txt %} - -#### Section II - Prep Work - -1. Power off your console -1. Insert your SD card into your computer -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card -1. Copy `boot.nds` (b9sTool) from the b9sTool release `.zip` to the root of your SD card -1. Create a folder named `3ds` on the root of your SD card if it does not already exist - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy the `Frogtool` folder from the Frogtool-nimhax `.zip` to the `/3ds/` folder on your SD card -1. Copy `frogcert.bin` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section III - Patching DS Download Play - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch Frogtool from the list of homebrew -1. Select the "INJECT patched DS Download Play" option -1. Frogtool will automatically run and inject the JPN version of Flipnote Studio into your DS Download Play -1. Once this operation has finished, read the screens and check if the process was successful -1. Tap the touch screen, then select "BOOT patched DS Download Play" -1. If the exploit was successful, your console will have loaded the JPN version of Flipnote Studio - + If you get stuck on a black screen, follow [this](https://wiki.hacks.guide/wiki/3DS:TWLFix#Userland_(PicHaxx,_Steelhax,_etc.)-0) page, then try again - -#### Section IV - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsdlp" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Download Play - -1. Launch the Download Play application -1. Wait until you see the two buttons - + Do not press either of the buttons -1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu -1. Select "Miscellaneous options" -1. Select "Switch the hb. title to the current app." -1. Press (B) to continue -1. Press (B) to return to the Rosalina main menu -1. Press (B) to exit the Rosalina menu -1. Press (Home), then close Download Play -1. Relaunch the Download Play application -1. Your console should load the Homebrew Launcher -1. Launch Frogtool from the list of homebrew -1. Select the "RESTORE clean DS Download Play" option -1. Once this operation has finished, read the screens and check if the process was successful - + If there are any errors or missing files, correct the problem and try again -1. If the process was successful, tap the touch screen, then press START to exit -1. Power off your console - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/vi_VN/installing-boot9strap-(hbl-usm).txt b/_pages/vi_VN/installing-boot9strap-(hbl-usm).txt deleted file mode 100644 index de8dad596a..0000000000 --- a/_pages/vi_VN/installing-boot9strap-(hbl-usm).txt +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "Installing boot9strap (HBL-USM)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--danger} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) (direct download) - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. Then, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Insert your SD card into your computer -1. Create a folder named `boot9strap` on the root of your SD card -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the RELEASE `.zip` to the `/boot9strap/` folder on your SD card -1. Create a folder named `3ds` on the root of your SD card if it does not already exist - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy `slotTool.3dsx` from the `slotTool` folder inside the RELEASE `.zip` to the `/3ds/` folder on your SD card -1. Copy `usm.bin` from the RELEASE `.zip` to the root folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch slotTool from the list of homebrew - + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section -1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option - + You will see some on-screen text and then your system will shut down - -![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section III - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section IV - Restoring WiFi Configuration Profiles - -{% include_relative include/remove-usm-slottool.txt %} - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/vi_VN/installing-boot9strap-(usm).txt b/_pages/vi_VN/installing-boot9strap-(usm).txt deleted file mode 100644 index 9dcede6ffe..0000000000 --- a/_pages/vi_VN/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: "Installing boot9strap (USM)" ---- - -{% include toc title="Table of Contents" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### Compatibility Notes - -These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. - -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--warning} - -### What You Need - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* [usm.bin](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) - - -#### Section I - Prep Work - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. - -1. Your SD card should be inserted in your computer -1. Copy `usm.bin` to the root of your SD card -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Create a folder named `boot9strap` on the root of your SD card -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card -1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card - -![]({{ "/images/screenshots/usm/usm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### Section II - BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If the BB3 multihax menu doesn't open, [follow this troubleshooting guide](troubleshooting#bannerbomb3) - + If the BB3 multihax menu says "cfw installed already", you already have custom firmware and should continue from [here](checking-for-cfw) -1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" - + Your console will automatically power off -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Internet Settings` -> `Connection Settings` -1. Ensure that all three connections are named "Haaaaaaaxxxxxxxxx..." - + Do NOT change these settings! - + If all three connections are NOT all named "Haaaaaaaxxxxxxxxx...", STOP! Something went wrong in this section and MUST be fixed before you can continue -1. Power off your console - -#### Section III - unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### Section IV - Installing boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section V - Restoring WiFi Configuration Profiles - -In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. - -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" - + Your console will automatically reboot -1. Power off your console -1. Insert your SD card into your computer -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore - -___ - -### Continue to [Finalizing Setup](finalizing-setup) -{: .notice--primary} diff --git a/_pages/zh_CN/dumping-movable-(nimhax).txt b/_pages/zh_CN/dumping-movable-(nimhax).txt deleted file mode 100644 index 5ef4be5173..0000000000 --- a/_pages/zh_CN/dumping-movable-(nimhax).txt +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: "Dumping Movable (nimhax)" ---- - -{% include toc title="目录内容" %} - -{% capture technical_info %} -技术细节(选看) - -To install boot9strap on your console, we derive your console's unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console. - -For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### 你需要准备点啥? - -* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file) - -### 操作步骤 - -#### 第一步 – 准备工作 - -1. Power off your console -1. 将你的 SD 卡插入到电脑 -1. Copy the `nimhax` folder from the nimhax `.zip` to the `/3ds/` folder on your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) -{: .notice--info} - -#### Section II - nimhax - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch nimhax from the list of homebrew -1. If the exploit was successful, a `movable.sed` file will appear on the root of your SD card - -### Next step: Frogtool - -Once you have your console's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \ -While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you're unable to use a torrent client. - -Continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--primary} diff --git a/_pages/zh_CN/homebrew-launcher-(freakyhax).txt b/_pages/zh_CN/homebrew-launcher-(freakyhax).txt deleted file mode 100644 index 3e76fa7d7d..0000000000 --- a/_pages/zh_CN/homebrew-launcher-(freakyhax).txt +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: "Homebrew Launcher (freakyhax)" ---- - -{% include toc title="目录内容" %} - -{% capture technical_info %} -技术细节(选看) -[freakyhax](https://plutooo.github.io/freakyhax/) is an exploit for the game Freakyforms Deluxe discovered and released by [plutooo](https://github.com/plutooo). It works on versions 9.0.0 through 11.17.0 on EUR, USA and JPN region consoles. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -### 你需要准备点啥? - -+ A EUR/USA/JPN copy of Freakyforms Deluxe (eShop or cartridge) -+ The latest release of [freakyhax](https://github.com/plutooo/freakyhax/releases/latest) -* 最新版本的 [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest)(下载 Luma3DS `.zip` 文件) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### 操作步骤 - -#### 第一步 – 准备工作 - -1. Power off your console -1. 将你的 SD 卡插入到电脑 -1. Copy all files and folders inside the `/build//exploit/` folder from the freakyhax `.zip` to the root of your SD card - + 根目录指的是你点进 SD 卡看到的目录,你可以在这个目录下看到 Nintendo 3DS 文件夹,但请不要点进去 -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. 解压 Luma3DS `.zip` 里的 `boot.firm` 和 `boot.3dsx` 到你 SD 卡的根目录 -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - freakyhax - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch Freakyforms Deluxe -1. In the game menu, select `Play -> Camera -> Load a QR code` -1. Select the QR code -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/zh_CN/homebrew-launcher-(ninjhax2-dx).txt b/_pages/zh_CN/homebrew-launcher-(ninjhax2-dx).txt deleted file mode 100644 index 38f8d870a6..0000000000 --- a/_pages/zh_CN/homebrew-launcher-(ninjhax2-dx).txt +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "Homebrew Launcher (ninjhax2-dx)" ---- - -{% include toc title="目录内容" %} - -{% capture technical_info %} -技术细节(选看) -[Ninjhax2](https://github.com/smealum/ninjhax2.x) is an exploit for the game "Cubic Ninja" made by [smealum](https://github.com/smealum). This page uses an updated version of ninjhax by [zoogie](https://github.com/zoogie) called [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx), which supports 11.17.0. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -This process will overwrite your Cubic Ninja save file, if you have one. -{: .notice--warning} - -### 你需要准备点啥? -* The game "Cubic Ninja" -* The latest release of [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx/releases) -* 最新版本的 [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest)(下载 Luma3DS `.zip` 文件) - -### 操作步骤 - -#### 第一步 – 准备工作 - -1. Power off your console -1. 将你的 SD 卡插入到电脑 -1. Copy `Launcher.dat` from the folder appropriate for your console from the ninjhax2-dx `.zip` file to the root of your SD card - + 根目录指的是你点进 SD 卡看到的目录,你可以在这个目录下看到 Nintendo 3DS 文件夹,但请不要点进去 -1. 解压 Luma3DS `.zip` 里的 `boot.firm` 和 `boot.3dsx` 到你 SD 卡的根目录 - -#### Section II - ninjhax2-dx -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Cubic Ninja" once and select "Create" - + If prompted, delete all data -1. Select "QR Code" -1. Select "Scan QR Code" -1. On your PC, open the browser and go to [ninjhax2-dx website](https://zoogie.github.io/web/nh2dx/) -1. Select your console's region and hardware -1. On your console, scan the QR code - + If the game exits to the HOME Menu, then the exploit has installed correctly -1. Launch "Cubic Ninja" again -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/zh_CN/homebrew-launcher-(pichaxx).txt b/_pages/zh_CN/homebrew-launcher-(pichaxx).txt deleted file mode 100644 index 973c64f2bd..0000000000 --- a/_pages/zh_CN/homebrew-launcher-(pichaxx).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (PicHaxx)" ---- - -{% include toc title="目录内容" %} - -{% capture technical_info %} -技术细节(选看) -[PicHaxx](https://github.com/zoogie/pichaxx) is an exploit for the game Pokémon Picross released by [zoogie](https://github.com/zoogie), originally discovered and [demonstrated](https://twitter.com/mrnbayoh/status/744899681663258624) by [MrNbaYoh](https://github.com/MrNbaYoh). - -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### 你需要准备点啥? - -+ The game "Pokémon Picross" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Pokémon Picross -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### 操作步骤 - -#### 第一步 – 准备工作 - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. 将你的 SD 卡插入到电脑 -1. 解压 Luma3DS `.zip` 里的 `boot.firm` 和 `boot.3dsx` 到你 SD 卡的根目录 - + 根目录指的是你点进 SD 卡看到的目录,你可以在这个目录下看到 Nintendo 3DS 文件夹,但请不要点进去 -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card - -![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - PicHaxx - -In this section, you will create a hacked Pokémon Picross save file that, when loaded, will run the Homebrew Launcher on your console. - -1. Open [the PicHaxx Injector website](https://3dstools.nhnarwhal.com/#/pichaxx) on your computer -1. Select your `movable.sed` file -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `0017c100` -> `data` on your SD card - + The `` will be the same one that you used in Seedminer - + `` 是一个在 `` 文件夹内,另一个 32 位字符长的文件夹 -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted - - ![]({{ "/images/screenshots/pichaxx-save-location.png" | absolute_url }}) - {: .notice--info} - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Pokémon Picross" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher - + If you get an error message, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-pichaxx) -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/zh_CN/homebrew-launcher-(smilehax-iie).txt b/_pages/zh_CN/homebrew-launcher-(smilehax-iie).txt deleted file mode 100644 index eae74202a9..0000000000 --- a/_pages/zh_CN/homebrew-launcher-(smilehax-iie).txt +++ /dev/null @@ -1,70 +0,0 @@ ---- -title: "Homebrew Launcher (smilehax-IIe)" ---- - -{% include toc title="目录内容" %} - -This set of instructions does not support the Japanese version of SmileBASIC. -{: .notice--warning} - -{% capture technical_info %} -技术细节(选看) -[smilehax-IIe](https://github.com/zoogie/smilehax-IIe) is an exploit for the game "SmileBASIC" made by zoogie, compatible with system versions 9.0.0 through 11.17.0 for USA/EUR/JPN region consoles. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### 你需要准备点啥? -+ The game "SmileBASIC" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install SmileBASIC -+ The latest release of [smilehax-IIe](https://github.com/zoogie/smilehax-IIe/releases/download/v1.1/Release_sh2e_v1.1.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### 操作步骤 - -#### 第一步 – 准备工作 - -1. Power off your console -1. 将你的 SD 卡插入到电脑 -1. 解压 Luma3DS `.zip` 里的 `boot.firm` 和 `boot.3dsx` 到你 SD 卡的根目录 - + 根目录指的是你点进 SD 卡看到的目录,你可以在这个目录下看到 Nintendo 3DS 文件夹,但请不要点进去 -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Transfer the `.wav` for your region from the Release_sh2e `.zip` to a device that can play `.wav` files, for example a phone -1. Copy the petitcom `.icn` for your region to the root of your SD card - -#### Section II - smilehax - -1. Launch SmileBASIC - + Update the game if prompted -1. Select the "Publish/Download Projects" option -1. Select the "Download (Receive) using Public Key" option -1. Press the "Yes" button -1. Enter the Public Key "NJEQK3A4" using the on-screen keyboard -1. Press the "Yes" button to confirm the download of PMODEM141 -1. Press "OK", then "Back", then "Browse Projects" -1. Select PMODEM141, then press "Select File" -1. Select PMODEM141.PRG, then press "OK", then "Yes" to execute it -1. Select RECEIVE FILE SIMPLEX -1. Prepare the device you use to play the `.wav` file -1. Keep your console about a foot from the `.wav` file playing devices' speaker and use a reasonable (not loud) volume to play the `.wav` -1. Now select 300BPS, then play the `.wav` file -1. When it finishes, press "Yes", then press "OK" -1. Press the START button -1. Select the SH2E-xxx.TXT file, then press OK, then "Yes" to execute it - + If you get kicked back into menu, make sure you're using the latest version of SmileBASIC -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/zh_CN/homebrew-launcher-(steelhax).txt b/_pages/zh_CN/homebrew-launcher-(steelhax).txt deleted file mode 100644 index 95063814b0..0000000000 --- a/_pages/zh_CN/homebrew-launcher-(steelhax).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (Steelhax)" ---- - -{% include toc title="目录内容" %} - -{% capture technical_info %} -技术细节(选看) -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Steel Diver: Sub Wars, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Steel Diver: Sub Wars save file, if you have one. If you wish to preserve your Steel Diver: Sub Wars game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### 你需要准备点啥? - -+ The game "Steel Diver: Sub Wars" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Steel Diver: Sub Wars -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Steelhax](/assets/steelhax-release.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### 操作步骤 - -#### 第一步 – 准备工作 - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. 将你的 SD 卡插入到电脑 -1. 解压 Luma3DS `.zip` 里的 `boot.firm` 和 `boot.3dsx` 到你 SD 卡的根目录 - + 根目录指的是你点进 SD 卡看到的目录,你可以在这个目录下看到 Nintendo 3DS 文件夹,但请不要点进去 -1. Copy the `steelhax` folder from the `Steelhax-release.zip` to the root of your SD card -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - Steelminer - -In this section, you will create a hacked Steel Diver: Sub Wars save file that, when used, will load the Homebrew Launcher on your console. - -1. Launch "Steel Diver: Sub Wars" once and select a Mii to initialize your save file - + Decline the game update when prompted - + If you have already updated the game, use the Data Management menu of the System Settings to delete the update -1. Exit "Steel Diver: Sub Wars" -1. Power off your console -1. 将你的 SD 卡插入到电脑 -1. Open [the SteelHax Save Tool website](https://3dstools.nhnarwhal.com/#/steelhax) on your computer -1. Select your `movable.sed` file -1. Select your region based on your console -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `<8-character-region>` -> `data` on your SD card - + **EUR Region**: `000d7e00` - + **JPN Region**: `000d7c00` - + **USA Region**: `000d7d00` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Steel Diver: Sub Wars" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/zh_CN/homebrew-launcher-(super-skaterhax).txt b/_pages/zh_CN/homebrew-launcher-(super-skaterhax).txt deleted file mode 100644 index d8e698f14b..0000000000 --- a/_pages/zh_CN/homebrew-launcher-(super-skaterhax).txt +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: "Homebrew Launcher (super-skaterhax)" ---- - -{% include toc title="目录内容" %} - -{% capture technical_info %} -技术细节(选看) -For technical details on the exploits that you will be using on this page, see [here](https://github.com/zoogie/super-skaterhax). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### 兼容性注意 - -Super-skaterhax (when used to launch the Homebrew Launcher) is compatible with New models on version 11.16.0 in all regions, and 11.17.0 in the EUR, JPN and USA regions. - -The instructions provided only apply to the New 3DS, New 3DS XL, and New 2DS XL. Please ensure that the console you are modding is a New 3DS, New 3DS XL, or New 2DS XL before continuing. -{: .notice--warning} - -### 你需要准备点啥? - -* 最新版本的 [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest)(下载 Luma3DS `.zip` 文件) -* The latest release of [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (the release `.zip` file) - -#### 第一步 – 准备工作 - -In this section, you will copy the files needed to trigger both super-skaterhax and the Homebrew Launcher. - -1. Power off your console -1. 将你的 SD 卡插入到电脑 -1. 解压 Luma3DS `.zip` 里的 `boot.firm` 和 `boot.3dsx` 到你 SD 卡的根目录 - + 根目录指的是你点进 SD 卡看到的目录,你可以在这个目录下看到 Nintendo 3DS 文件夹,但请不要点进去 -1. Copy everything inside the folder for your console's region (and also system version if the region is USA) in the super-skaterhax `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/skater-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - super-skaterhax - -In this section, you will visit the browser exploit webpage, which will launch the Homebrew Launcher. - -If you haven't already, make sure you have a working Internet connection set up on your console. -{: .notice--info} - -1. On the HOME Menu, press the Left and Right shoulder buttons at the same time to open the camera - + If you are unable to open the camera, open the Internet Browser and manually type the URL instead (`https://zoogie.github.io/web/super/` for EUR/USA/JPN, `https://zoogie.github.io/web/korea` for KOR) -1. Tap the QR code button and scan one of the following QR codes for your console's region [here](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png) - + 如果你收到了安全证书警告,请按 A 允许连接 -1. Press the (Select) button to open the bookmark tab - + If your (Select) button does not respond, tap the star icon on the bottom-left corner of the screen -1. Tap "Bookmark this page" -1. Press (B) once to return to the browser -1. Press (Start) to open the context menu - + If your (Start) button does not respond, tap the 3-line menu on the bottom-right corner of the screen -1. Tap on "Settings" -1. Tap on "Delete Cookies" -1. 按 “A” 键继续 -1. Press (Home) to return to the HOME Menu, then immediately press (A) to launch the browser again -1. Select the "GO GO!" button on the top screen - + If any prompts appear, approve all of them - + If your console freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your console freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section - + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/zh_CN/include/fredtool-prep.txt b/_pages/zh_CN/include/fredtool-prep.txt deleted file mode 100644 index aca833310e..0000000000 --- a/_pages/zh_CN/include/fredtool-prep.txt +++ /dev/null @@ -1,29 +0,0 @@ -本节中,你将会临时将 DS 连接设置(DS Connection Settings)程序临时替换为 Flipnote Studio,用来启动 boot9strap(自制固件)安装器。 - -1. 将你的 SD 卡插入到电脑 -1. 在电脑上打开 [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) 站点 -1. 于“Username”一行,填入一个你的英文名(不带空格或特殊字符) -1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option -1. 于“MovableSed”一行,点击“Browse...”(选择文件)上传你的 `movable.sed` 文件 -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. 点击 “Build” - + 等待片刻,直到构建完成 -1. 将你的名字输入左边的 Build History 菜单中的 Filter Builds 一栏 -1. 点击第一个搜索结果 - + 它应该是所有显示的结果中时间最新的那一个 -1. 点击 "output_(<你的名字>).zip" 的链接 -1. 打开内存卡的 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 文件夹 - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. 解压 Luma3DS `.zip` 里的 `boot.firm` 和 `boot.3dsx` 到你 SD 卡的根目录 - + 根目录指的是你点进 SD 卡看到的目录,你可以在这个目录下看到 Nintendo 3DS 文件夹,但请不要点进去 -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. 从 Frogminer_save `.zip` 压缩包中复制 `private` 文件夹到内存卡的根目录 -1. Reinsert your SD card into your console -1. Power on your console - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} \ No newline at end of file diff --git a/_pages/zh_CN/include/hbl-common-exploits-movable.txt b/_pages/zh_CN/include/hbl-common-exploits-movable.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/zh_CN/include/hbl-common-exploits-movable.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/zh_CN/include/hbl-common-exploits.txt b/_pages/zh_CN/include/hbl-common-exploits.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/zh_CN/include/hbl-common-exploits.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/zh_CN/installing-boot9strap-(fredtool).txt b/_pages/zh_CN/installing-boot9strap-(fredtool).txt deleted file mode 100644 index 8a60fec546..0000000000 --- a/_pages/zh_CN/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: "安装 boot9strap(通过 Fredtool)" ---- - -{% include toc title="目录内容" %} - -{% capture technical_info %} -技术细节(选看) - -本章节 Seedminer 将使用你的 `movable.sed` 文件来解密所有的 DSiWare 程序,以便在3DS中内置的 DS 网络设定中注入修改后的 DSiWare 程序。 - -本教程是使用 “FIRM partitions known-plaintext” 漏洞来进行破解的, 欲知相关资料请查阅[这里](https://www.3dbrew.org/wiki/3DS_System_Flaws)。 - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### 你需要准备点啥? - -* 你在 [Seedminer](seedminer) 步骤中获得的 `movable.sed` 文件 -* 最新版本的 [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest)(下载 `Frogminer_save.zip`) -* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) -* 最新版本的 [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest)(下载 Luma3DS `.zip` 文件) - -#### 第一步 – 检查自制固件 - -{% include_relative include/cfw-check-fredtool.txt %} - -#### 第二步 – BannerBomb3 - -本节中,你将会使用 DSiWare 数据管理菜单触发 BannerBomb3 漏洞,并利用它导出一个在下一个步骤中需要使用的文件。 - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. 使用十字键移动至 “Dump DSiWare” ,然后按下 A 键 - + Your console will automatically reboot -1. Power off your console - -#### 第三步 – 准备工作 - -{% include_relative include/fredtool-prep.txt %} - -#### 第四步 – 覆盖 “DS 连接设置(DS Connection Settings)” - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### 第五步 – 触发 Flipnote 漏洞 - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### 第四部分 — 配置 Luma3DS - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### 第七步 – 还原 “DS 连接设置(DS Connection Settings)” - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### 继续至[完成安装](finalizing-setup) -{: .notice--primary} diff --git a/_pages/zh_CN/installing-boot9strap-(fredtool-legacy).txt b/_pages/zh_CN/installing-boot9strap-(fredtool-legacy).txt deleted file mode 100644 index c5a71e3f1f..0000000000 --- a/_pages/zh_CN/installing-boot9strap-(fredtool-legacy).txt +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool, Legacy)" ---- - -{% include toc title="目录内容" %} - -{% capture technical_info %} -技术细节(选看) - -我们使用了一个在 3DS 系统设置应用程序的 DSiWare 数据管理窗口中的一个漏洞来导出系统的 DSiWare 软件。 - -为了做到它,我们将使用你主机的系统加密密钥(movable.sed)来构建一个可被利用的 DSiWare 系统备份,以便将 DSi 互联网设置应用程序导出到 SD 卡的根目录。 - -Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. - -本教程是使用 “FIRM partitions known-plaintext” 漏洞来进行破解的, 欲知相关资料请查阅[这里](https://www.3dbrew.org/wiki/3DS_System_Flaws)。 - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### 你需要准备点啥? - -* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) -* 最新版本的 [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest)(下载 `Frogminer_save.zip`) -* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) -* 最新版本的 [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest)(下载 Luma3DS `.zip` 文件) - -#### 第一步 – 检查自制固件 - -{% include_relative include/cfw-check-fredtool.txt %} - -#### 第二步 – BannerBomb3 - -本节中,你将会使用 DSiWare 数据管理菜单触发 BannerBomb3 漏洞,并利用它导出一个在下一个步骤中需要使用的文件。 - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. 使用十字键移动至 “Dump DSiWare” ,然后按下 A 键 - + Your console will automatically reboot -1. Power off your console - -#### 第三步 – 准备工作 - -{% include_relative include/fredtool-prep.txt %} - -#### 第四步 – 覆盖 “DS 连接设置(DS Connection Settings)” - -{% include_relative include/fredtool-write-flipnote.txt %} - -#### 第五步 – 触发 Flipnote 漏洞 - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### 第四部分 — 配置 Luma3DS - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### 第七步 – 还原 “DS 连接设置(DS Connection Settings)” - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### 继续至[完成安装](finalizing-setup) -{: .notice--primary} diff --git a/_pages/zh_CN/installing-boot9strap-(frogtool).txt b/_pages/zh_CN/installing-boot9strap-(frogtool).txt deleted file mode 100644 index 2bbfadc05d..0000000000 --- a/_pages/zh_CN/installing-boot9strap-(frogtool).txt +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Installing boot9strap (Frogtool)" ---- - -{% include toc title="目录内容" %} - -{% capture technical_info %} -技术细节(选看) -For technical details on the exploits that you will be using on this page, see "DSiWare_Exports CTCert verification" and "FIRM partitions known-plaintext" [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - - -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) link for `frogcert.bin` on this page, you will need a torrent client like [qBittorrent](https://www.qbittorrent.org/download.php) or [Deluge](http://dev.deluge-torrent.org/wiki/Download). -{: .notice--warning} - -### 你需要准备点啥? - -* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link) -* The latest release of [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (direct download) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) - -#### 第一步 – 检查自制固件 - -{% include_relative include/cfw-check-fredtool.txt %} - -#### 第二步 – 准备工作 - -1. Power off your console -1. 将你的 SD 卡插入到电脑 -1. 解压 Luma3DS `.zip` 里的 `boot.firm` 和 `boot.3dsx` 到你 SD 卡的根目录 -1. Copy `boot.nds` (b9sTool) from the b9sTool release `.zip` to the root of your SD card -1. 检查 SD 卡的根目录是否存在一个名为 `3ds` 的文件夹,如果没有则手动新建一个 - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy the `Frogtool` folder from the Frogtool-nimhax `.zip` to the `/3ds/` folder on your SD card -1. Copy `frogcert.bin` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section III - Patching DS Download Play - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch Frogtool from the list of homebrew -1. Select the "INJECT patched DS Download Play" option -1. Frogtool will automatically run and inject the JPN version of Flipnote Studio into your DS Download Play -1. Once this operation has finished, read the screens and check if the process was successful -1. Tap the touch screen, then select "BOOT patched DS Download Play" -1. If the exploit was successful, your console will have loaded the JPN version of Flipnote Studio - + If you get stuck on a black screen, follow [this](https://wiki.hacks.guide/wiki/3DS:TWLFix#Userland_(PicHaxx,_Steelhax,_etc.)-0) page, then try again - -#### Section IV - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsdlp" %} - -#### 第四部分 — 配置 Luma3DS - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### 第七步 – 还原“DS下载遊戲”程序 - -1. 运行“下载通信(Download Play)”程序 -1. 等到你看到两个按钮 - + Do not press either of the buttons -1. 同时按下 “L” + “↓” + “Select” 键来打开 Rosalina 菜单 -1. 选择 “Miscellaneous options” -1. 选择 “Switch the hb. title to the current app.” -1. 按 “B” 键继续 -1. 按 “B” 键返回 Rosalina 主菜单 -1. 按 “B” 键退出 Rosalina 菜单 -1. 按下 “Home” 键,然后关闭“下载通信(Download Play)” -1. Relaunch the Download Play application -1. Your console should load the Homebrew Launcher -1. Launch Frogtool from the list of homebrew -1. Select the "RESTORE clean DS Download Play" option -1. Once this operation has finished, read the screens and check if the process was successful - + If there are any errors or missing files, correct the problem and try again -1. If the process was successful, tap the touch screen, then press START to exit -1. Power off your console - -___ - -### 继续至[完成安装](finalizing-setup) -{: .notice--primary} diff --git a/_pages/zh_CN/installing-boot9strap-(hbl-usm).txt b/_pages/zh_CN/installing-boot9strap-(hbl-usm).txt deleted file mode 100644 index fe9d37ac91..0000000000 --- a/_pages/zh_CN/installing-boot9strap-(hbl-usm).txt +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "安装 boot9strap(通过 HBL-USM)" ---- - -{% include toc title="目录内容" %} - -{% capture technical_info %} -技术细节(选看) - -为了破解系统的 SAFE_MODE 固件,我们需要注入一个写入了漏洞的 WiFi 配置文件到主机中。 - -现在我们能够使用 Homebrew 程序了,接下来我们会利用它进入 slotTool 继续破解下去。 - -一旦 WiFi 配置文件被注入,我们将会使用到 SAFE_MODE 来继续此教程。SAVE_MODE 是一个所有的 3DS 主机都存在的修复功能,之后它将用于激活被破解的 WiFi 配置文件。 - -如果你想知道有关 unSAFE_MODE 的更多技术细节,请见[这里](https://github.com/zoogie/unSAFE_MODE/)。 - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### 兼容性注意 - -如果你的 LR↑A 键其中有一个坏掉了,请加入 [Nintendo Homebrew Discord 服务器](https://discord.gg/MWxPgEp)然后以英文寻求帮助。(请注意,如果你身处中国大陆,访问 Discord 可能需要科学上网),你也可以到译者的 [QQ 群](https://stray-soul.com/index.php/qqgroup)寻求帮助,群号为 942052497。 -{: .notice--danger} - -### 你需要准备点啥? - -* 最新版本的 [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip)(直链) -* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) (direct download) - -#### 第一步 – 准备工作 - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. Then, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. 你自己设置的 Wi-Fi 链接点将在这个过程中被暂时覆盖。 - -1. 将你的 SD 卡插入到电脑 -1. 在 SD 卡根目录创建一个名为 `boot9strap` 的文件夹 -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the RELEASE `.zip` to the `/boot9strap/` folder on your SD card -1. 检查 SD 卡的根目录是否存在一个名为 `3ds` 的文件夹,如果没有则手动新建一个 - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy `slotTool.3dsx` from the `slotTool` folder inside the RELEASE `.zip` to the `/3ds/` folder on your SD card -1. Copy `usm.bin` from the RELEASE `.zip` to the root folder on your SD card -1. 从 SafeB9SInstaller `.zip` 压缩包中复制 `SafeB9SInstaller.bin` 到 SD 卡根目录下 -1. Reinsert your SD card into your console -1. Power on your console -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. 从自制程序列表中找到并启动 slotTool - + 如果你的主机卡在了红屏,请长按住电源键来强制关机,然后重试本步骤 -1. 选择 “INSTALL exploit to wifi slots 1,2,3 & shutdown” 选项 - + 你应该会看到屏幕上出现了一些文字,然后你的主机就关机了 - -![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### 第二步 – unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### 第三步 – 安装 boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### 第四步 – 还原 WiFi 配置文件 - -{% include_relative include/remove-usm-slottool.txt %} - -___ - -### 继续至[完成安装](finalizing-setup) -{: .notice--primary} diff --git a/_pages/zh_CN/installing-boot9strap-(usm).txt b/_pages/zh_CN/installing-boot9strap-(usm).txt deleted file mode 100644 index d21a34e118..0000000000 --- a/_pages/zh_CN/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: "安装 boot9strap(通过 USM)" ---- - -{% include toc title="目录内容" %} - -{% capture technical_info %} -技术细节(选看) - -为了破解系统的 SAFE_MODE 固件,我们需要注入一个写入了漏洞的 WiFi 配置文件到主机中。 - -我们可以利用 BannerBomb3 这个现有的漏洞进行以下操作。 - -为了做到这一点,我们使用了你的主机系统中的加密密钥(movable.sed)来构建一个 DSiWare 备份,以便于将被破解的 WiFi 配置文件注入到 WiFi 接入点列表。 - -一旦 WiFi 配置文件被注入,我们将会使用到 SAFE_MODE 来继续此教程。SAVE_MODE 是一个所有的 3DS 主机都存在的修复功能,之后它将用于激活被破解的 WiFi 配置文件。 - -如果想知道更多 BannerBomb3 和 unSAFE_MODE 的技术细节,请参阅以下链接:[BannerBomb3](https://github.com/zoogie/Bannerbomb3)、[unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/)。 - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### 兼容性注意 - -这些操作可在美、欧、日、韩版的主机上工作,你可通过系统版本号末尾的 U,E,J,K 字符来区分主机版本。 - -如果你的主机 L 键、R 键、↑ 键和 A 键中有一个坏了无法使用,则你只能使用[替代方法](installing-boot9strap-(fredtool))。 如需帮助,请加入 [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) 并使用英文求助。(请注意,如果你身处中国大陆,访问 Discord 可能需要科学上网),你也可以到译者的 [QQ 群](https://stray-soul.site/index.php/qqgroup)寻求帮助,群号为 942052497。 -{: .notice--warning} - -### 你需要准备点啥? - -* 最新版本的 [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip)(直链) -* 最新版本的 [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip)(直链) -* 最新版本的 [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest)(下载 Luma3DS `.zip` 文件) -* [usm.bin](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin)(直链) - - -#### 第一步 – 准备工作 - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. - -1. 将你的 SD 卡插入电脑 -1. 复制 `usm.bin` 到你的 SD 卡根目录 -1. 解压 Luma3DS `.zip` 里的 `boot.firm` 和 `boot.3dsx` 到你 SD 卡的根目录 - + 根目录指的是你点进 SD 卡看到的目录,你可以在这个目录下看到 Nintendo 3DS 文件夹,但请不要点进去 -1. 在 SD 卡根目录创建一个名为 `boot9strap` 的文件夹 -1. 从boot9strap `.zip` 文件中复制 `boot9strap.firm` 和 `boot9strap.firm.sha` 到你SD卡的 `/boot9strap/` 文件夹中 -1. 从 SafeB9SInstaller `.zip` 压缩包中复制 `SafeB9SInstaller.bin` 到 SD 卡根目录下 - -![]({{ "/images/screenshots/usm/usm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### 第二步 – BannerBomb3 - -本节中,你将使用 DSiWare 数据管理菜单触发 BannerBomb3 漏洞,以便向你的 Wi-Fi 设置槽中写入带有漏洞的数据。 你自己设置的 Wi-Fi 链接点将在这个过程中被暂时覆盖。 - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If the BB3 multihax menu doesn't open, [follow this troubleshooting guide](troubleshooting#bannerbomb3) - + If the BB3 multihax menu says "cfw installed already", you already have custom firmware and should continue from [here](checking-for-cfw) -1. 使用十字键移动至 “Install unSAFE_MODE” ,然后按下 A 键 - + Your console will automatically power off -1. Power on your console -1. Launch System Settings on your console -1. 进入到 `互联网设置(インターネット設定 / Internet Settings)` -> `连接设置(インターネット接続設定 / Connection Settings)` -1. Ensure that all three connections are named "Haaaaaaaxxxxxxxxx..." - + Do NOT change these settings! - + If all three connections are NOT all named "Haaaaaaaxxxxxxxxx...", STOP! Something went wrong in this section and MUST be fixed before you can continue -1. Power off your console - -#### 第三步 – unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### 第四步 – 安装 boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### 第五步 – 还原 WiFi 配置文件 - -本节中,你将会再次触发 BannerBomb3 漏洞,以便还原第二步中被覆盖的 Wi-Fi 设置。 - -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. 使用十字键移动至 “Uninstall unSAFE_MODE”,然后按下 A 键 - + Your console will automatically reboot -1. Power off your console -1. 将你的 SD 卡插入到电脑 -1. 打开内存卡的 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 文件夹 -1. 从 Nintento DSiWare 文件夹和电脑中删除 `F00D43D5.bin`。 此文件之后不再需要使用 - -___ - -### 继续至[完成安装](finalizing-setup) -{: .notice--primary} diff --git a/_pages/zh_TW/dumping-movable-(nimhax).txt b/_pages/zh_TW/dumping-movable-(nimhax).txt deleted file mode 100644 index 834420e7e0..0000000000 --- a/_pages/zh_TW/dumping-movable-(nimhax).txt +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: "Dumping Movable (nimhax)" ---- - -{% include toc title="條目內容" %} - -{% capture technical_info %} -Technical Details (optional) - -To install boot9strap on your console, we derive your console's unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console. - -For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### 必備項目 - -* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file) - -### 操作說明 - -#### 第一節 — 準備工作 - -1. Power off your console -1. 將 SD 卡插入至電腦中 -1. Copy the `nimhax` folder from the nimhax `.zip` to the `/3ds/` folder on your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) -{: .notice--info} - -#### Section II - nimhax - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch nimhax from the list of homebrew -1. If the exploit was successful, a `movable.sed` file will appear on the root of your SD card - -### Next step: Frogtool - -Once you have your console's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \ -While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you're unable to use a torrent client. - -Continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--primary} diff --git a/_pages/zh_TW/homebrew-launcher-(freakyhax).txt b/_pages/zh_TW/homebrew-launcher-(freakyhax).txt deleted file mode 100644 index c3b627d6a3..0000000000 --- a/_pages/zh_TW/homebrew-launcher-(freakyhax).txt +++ /dev/null @@ -1,57 +0,0 @@ ---- -title: "Homebrew Launcher (freakyhax)" ---- - -{% include toc title="條目內容" %} - -{% capture technical_info %} -Technical Details (optional) -[freakyhax](https://plutooo.github.io/freakyhax/) is an exploit for the game Freakyforms Deluxe discovered and released by [plutooo](https://github.com/plutooo). It works on versions 9.0.0 through 11.17.0 on EUR, USA and JPN region consoles. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -### 必備項目 - -+ A EUR/USA/JPN copy of Freakyforms Deluxe (eShop or cartridge) -+ The latest release of [freakyhax](https://github.com/plutooo/freakyhax/releases/latest) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### 操作說明 - -#### 第一節 — 準備工作 - -1. Power off your console -1. 將 SD 卡插入至電腦中 -1. Copy all files and folders inside the `/build//exploit/` folder from the freakyhax `.zip` to the root of your SD card - + 「SD 卡的根目錄」指的是你的 SD 卡含有 Nintendo 3DS 資料夾的目錄,而非該資料夾內部 -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. 解壓 Luma3DS `.zip` 內的 `boot.firm` 及 `boot.3dsx` 到 SD 卡的根目錄底下 -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - freakyhax - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch Freakyforms Deluxe -1. In the game menu, select `Play -> Camera -> Load a QR code` -1. Select the QR code -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/zh_TW/homebrew-launcher-(ninjhax2-dx).txt b/_pages/zh_TW/homebrew-launcher-(ninjhax2-dx).txt deleted file mode 100644 index 982427fd8f..0000000000 --- a/_pages/zh_TW/homebrew-launcher-(ninjhax2-dx).txt +++ /dev/null @@ -1,58 +0,0 @@ ---- -title: "Homebrew Launcher (ninjhax2-dx)" ---- - -{% include toc title="條目內容" %} - -{% capture technical_info %} -Technical Details (optional) -[Ninjhax2](https://github.com/smealum/ninjhax2.x) is an exploit for the game "Cubic Ninja" made by [smealum](https://github.com/smealum). This page uses an updated version of ninjhax by [zoogie](https://github.com/zoogie) called [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx), which supports 11.17.0. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This method requires a working 3DS camera. -{: .notice--info} - -This process will overwrite your Cubic Ninja save file, if you have one. -{: .notice--warning} - -### 必備項目 -* The game "Cubic Ninja" -* The latest release of [ninjhax2-dx](https://github.com/zoogie/ninjhax2-dx/releases) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -### 操作說明 - -#### 第一節 — 準備工作 - -1. Power off your console -1. 將 SD 卡插入至電腦中 -1. Copy `Launcher.dat` from the folder appropriate for your console from the ninjhax2-dx `.zip` file to the root of your SD card - + 「SD 卡的根目錄」指的是你的 SD 卡含有 Nintendo 3DS 資料夾的目錄,而非該資料夾內部 -1. 解壓 Luma3DS `.zip` 內的 `boot.firm` 及 `boot.3dsx` 到 SD 卡的根目錄底下 - -#### Section II - ninjhax2-dx -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Cubic Ninja" once and select "Create" - + If prompted, delete all data -1. Select "QR Code" -1. Select "Scan QR Code" -1. On your PC, open the browser and go to [ninjhax2-dx website](https://zoogie.github.io/web/nh2dx/) -1. Select your console's region and hardware -1. On your console, scan the QR code - + If the game exits to the HOME Menu, then the exploit has installed correctly -1. Launch "Cubic Ninja" again -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/zh_TW/homebrew-launcher-(pichaxx).txt b/_pages/zh_TW/homebrew-launcher-(pichaxx).txt deleted file mode 100644 index 09fcd575ef..0000000000 --- a/_pages/zh_TW/homebrew-launcher-(pichaxx).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (PicHaxx)" ---- - -{% include toc title="條目內容" %} - -{% capture technical_info %} -Technical Details (optional) -[PicHaxx](https://github.com/zoogie/pichaxx) is an exploit for the game Pokémon Picross released by [zoogie](https://github.com/zoogie), originally discovered and [demonstrated](https://twitter.com/mrnbayoh/status/744899681663258624) by [MrNbaYoh](https://github.com/MrNbaYoh). - -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Pokémon Picross save file, if you have one. If you wish to preserve your Pokémon Picross game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### 必備項目 - -+ The game "Pokémon Picross" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Pokémon Picross -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### 操作說明 - -#### 第一節 — 準備工作 - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. 將 SD 卡插入至電腦中 -1. 解壓 Luma3DS `.zip` 內的 `boot.firm` 及 `boot.3dsx` 到 SD 卡的根目錄底下 - + 「SD 卡的根目錄」指的是你的 SD 卡含有 Nintendo 3DS 資料夾的目錄,而非該資料夾內部 -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card - -![]({{ "/images/screenshots/hblpichaxx-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - PicHaxx - -In this section, you will create a hacked Pokémon Picross save file that, when loaded, will run the Homebrew Launcher on your console. - -1. Open [the PicHaxx Injector website](https://3dstools.nhnarwhal.com/#/pichaxx) on your computer -1. Select your `movable.sed` file -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `0017c100` -> `data` on your SD card - + The `` will be the same one that you used in Seedminer - + 此 `` 字串指的是 `` 內 32 字元的資料夾名稱 -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted - - ![]({{ "/images/screenshots/pichaxx-save-location.png" | absolute_url }}) - {: .notice--info} - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Pokémon Picross" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher - + If you get an error message, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-pichaxx) -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/zh_TW/homebrew-launcher-(smilehax-iie).txt b/_pages/zh_TW/homebrew-launcher-(smilehax-iie).txt deleted file mode 100644 index 033c10d350..0000000000 --- a/_pages/zh_TW/homebrew-launcher-(smilehax-iie).txt +++ /dev/null @@ -1,70 +0,0 @@ ---- -title: "Homebrew Launcher (smilehax-IIe)" ---- - -{% include toc title="條目內容" %} - -This set of instructions does not support the Japanese version of SmileBASIC. -{: .notice--warning} - -{% capture technical_info %} -Technical Details (optional) -[smilehax-IIe](https://github.com/zoogie/smilehax-IIe) is an exploit for the game "SmileBASIC" made by zoogie, compatible with system versions 9.0.0 through 11.17.0 for USA/EUR/JPN region consoles. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### 必備項目 -+ The game "SmileBASIC" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install SmileBASIC -+ The latest release of [smilehax-IIe](https://github.com/zoogie/smilehax-IIe/releases/download/v1.1/Release_sh2e_v1.1.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - - -### 操作說明 - -#### 第一節 — 準備工作 - -1. Power off your console -1. 將 SD 卡插入至電腦中 -1. 解壓 Luma3DS `.zip` 內的 `boot.firm` 及 `boot.3dsx` 到 SD 卡的根目錄底下 - + 「SD 卡的根目錄」指的是你的 SD 卡含有 Nintendo 3DS 資料夾的目錄,而非該資料夾內部 -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Transfer the `.wav` for your region from the Release_sh2e `.zip` to a device that can play `.wav` files, for example a phone -1. Copy the petitcom `.icn` for your region to the root of your SD card - -#### Section II - smilehax - -1. Launch SmileBASIC - + Update the game if prompted -1. Select the "Publish/Download Projects" option -1. Select the "Download (Receive) using Public Key" option -1. Press the "Yes" button -1. Enter the Public Key "NJEQK3A4" using the on-screen keyboard -1. Press the "Yes" button to confirm the download of PMODEM141 -1. Press "OK", then "Back", then "Browse Projects" -1. Select PMODEM141, then press "Select File" -1. Select PMODEM141.PRG, then press "OK", then "Yes" to execute it -1. Select RECEIVE FILE SIMPLEX -1. Prepare the device you use to play the `.wav` file -1. Keep your console about a foot from the `.wav` file playing devices' speaker and use a reasonable (not loud) volume to play the `.wav` -1. Now select 300BPS, then play the `.wav` file -1. When it finishes, press "Yes", then press "OK" -1. Press the START button -1. Select the SH2E-xxx.TXT file, then press OK, then "Yes" to execute it - + If you get kicked back into menu, make sure you're using the latest version of SmileBASIC -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/zh_TW/homebrew-launcher-(steelhax).txt b/_pages/zh_TW/homebrew-launcher-(steelhax).txt deleted file mode 100644 index 22cb20d0cd..0000000000 --- a/_pages/zh_TW/homebrew-launcher-(steelhax).txt +++ /dev/null @@ -1,79 +0,0 @@ ---- -title: "Homebrew Launcher (Steelhax)" ---- - -{% include toc title="條目內容" %} - -{% capture technical_info %} -Technical Details (optional) -This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Steel Diver: Sub Wars, which can then be used to launch the Homebrew Launcher. -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -This process will overwrite your Steel Diver: Sub Wars save file, if you have one. If you wish to preserve your Steel Diver: Sub Wars game data, you should make a backup of your `00000001.sav` file before overwriting it. -{: .notice--warning} - -### 必備項目 - -+ The game "Steel Diver: Sub Wars" installed on your console - + If you have downloaded it before, you can [redownload it](https://en-americas-support.nintendo.com/app/answers/detail/a_id/607/~/how-to-download-or-redownload-content-in-nintendo-3ds-eshop) - + Your SD card must be inserted in your console to install Steel Diver: Sub Wars -+ Your `movable.sed` file from completing [Seedminer](seedminer-(alternate)) -+ The latest release of [Steelhax](/assets/steelhax-release.zip) (direct download) -+ The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -+ [otherapps.zip]({{ base_path }}/assets/otherapps.zip) (direct download) - -### 操作說明 - -#### 第一節 — 準備工作 - -In this section, you will copy some of the files that will be used to launch the Homebrew Launcher. - -1. Power off your console -1. 將 SD 卡插入至電腦中 -1. 解壓 Luma3DS `.zip` 內的 `boot.firm` 及 `boot.3dsx` 到 SD 卡的根目錄底下 - + 「SD 卡的根目錄」指的是你的 SD 卡含有 Nintendo 3DS 資料夾的目錄,而非該資料夾內部 -1. Copy the `steelhax` folder from the `Steelhax-release.zip` to the root of your SD card -1. Copy the otherapp payload for your model/region/version from `otherapps.zip` to the root of your SD card, then rename the payload to `otherapp.bin` - + Do not add the `.bin` extension if you do not already see it -1. Copy `movable.sed` from your computer to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section II - Steelminer - -In this section, you will create a hacked Steel Diver: Sub Wars save file that, when used, will load the Homebrew Launcher on your console. - -1. Launch "Steel Diver: Sub Wars" once and select a Mii to initialize your save file - + Decline the game update when prompted - + If you have already updated the game, use the Data Management menu of the System Settings to delete the update -1. Exit "Steel Diver: Sub Wars" -1. Power off your console -1. 將 SD 卡插入至電腦中 -1. Open [the SteelHax Save Tool website](https://3dstools.nhnarwhal.com/#/steelhax) on your computer -1. Select your `movable.sed` file -1. Select your region based on your console -1. Select "Build and Download" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `<8-character-region>` -> `data` on your SD card - + **EUR Region**: `000d7e00` - + **JPN Region**: `000d7c00` - + **USA Region**: `000d7d00` -1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card - + Overwrite the old save file when prompted -1. Reinsert your SD card into your console -1. Power on your console -1. Launch "Steel Diver: Sub Wars" -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} diff --git a/_pages/zh_TW/homebrew-launcher-(super-skaterhax).txt b/_pages/zh_TW/homebrew-launcher-(super-skaterhax).txt deleted file mode 100644 index 7f00010f71..0000000000 --- a/_pages/zh_TW/homebrew-launcher-(super-skaterhax).txt +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: "Homebrew Launcher (super-skaterhax)" ---- - -{% include toc title="條目內容" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see [here](https://github.com/zoogie/super-skaterhax). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### 相容性資訊 - -Super-skaterhax (when used to launch the Homebrew Launcher) is compatible with New models on version 11.16.0 in all regions, and 11.17.0 in the EUR, JPN and USA regions. - -The instructions provided only apply to the New 3DS, New 3DS XL, and New 2DS XL. Please ensure that the console you are modding is a New 3DS, New 3DS XL, or New 2DS XL before continuing. -{: .notice--warning} - -### 必備項目 - -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* The latest release of [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (the release `.zip` file) - -#### 第一節 — 準備工作 - -In this section, you will copy the files needed to trigger both super-skaterhax and the Homebrew Launcher. - -1. Power off your console -1. 將 SD 卡插入至電腦中 -1. 解壓 Luma3DS `.zip` 內的 `boot.firm` 及 `boot.3dsx` 到 SD 卡的根目錄底下 - + 「SD 卡的根目錄」指的是你的 SD 卡含有 Nintendo 3DS 資料夾的目錄,而非該資料夾內部 -1. Copy everything inside the folder for your console's region (and also system version if the region is USA) in the super-skaterhax `.zip` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -![]({{ "/images/screenshots/skater-root-layout.png" | absolute_url }}) -{: .notice--info} - - -#### Section II - super-skaterhax - -In this section, you will visit the browser exploit webpage, which will launch the Homebrew Launcher. - -If you haven't already, make sure you have a working Internet connection set up on your console. -{: .notice--info} - -1. On the HOME Menu, press the Left and Right shoulder buttons at the same time to open the camera - + If you are unable to open the camera, open the Internet Browser and manually type the URL instead (`https://zoogie.github.io/web/super/` for EUR/USA/JPN, `https://zoogie.github.io/web/korea` for KOR) -1. Tap the QR code button and scan one of the following QR codes for your console's region [here](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png) - + If you get a security certificate warning, press (A) to allow the connection -1. Press the (Select) button to open the bookmark tab - + If your (Select) button does not respond, tap the star icon on the bottom-left corner of the screen -1. Tap "Bookmark this page" -1. Press (B) once to return to the browser -1. Press (Start) to open the context menu - + If your (Start) button does not respond, tap the 3-line menu on the bottom-right corner of the screen -1. Tap on "Settings" -1. Tap on "Delete Cookies" -1. 按『A』 繼續 -1. Press (Home) to return to the HOME Menu, then immediately press (A) to launch the browser again -1. Select the "GO GO!" button on the top screen - + If any prompts appear, approve all of them - + If your console freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your console freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section - + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) -1. If the exploit was successful, your console will have booted into the Homebrew Launcher -1. Power off your console - -#### Section III - Hardware Button Check - -In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. - -{% include_relative include/safemodecheck.txt %} - -___ - -{% include_relative include/hbl-common-exploits.txt %} \ No newline at end of file diff --git a/_pages/zh_TW/include/fredtool-prep.txt b/_pages/zh_TW/include/fredtool-prep.txt deleted file mode 100644 index 7827765060..0000000000 --- a/_pages/zh_TW/include/fredtool-prep.txt +++ /dev/null @@ -1,29 +0,0 @@ -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. 將 SD 卡插入至電腦中 -1. 在電腦上開啟 [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. 選擇『Build』 - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. 於您的 SD 卡中,移動至 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. 解壓 Luma3DS `.zip` 內的 `boot.firm` 及 `boot.3dsx` 到 SD 卡的根目錄底下 - + 「SD 卡的根目錄」指的是你的 SD 卡含有 Nintendo 3DS 資料夾的目錄,而非該資料夾內部 -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. 解壓 Frogminer_save `.zip` 中的 `private` 資料夾到 SD 卡的根目錄底下 -1. Reinsert your SD card into your console -1. Power on your console - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} \ No newline at end of file diff --git a/_pages/zh_TW/include/hbl-common-exploits-movable.txt b/_pages/zh_TW/include/hbl-common-exploits-movable.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/zh_TW/include/hbl-common-exploits-movable.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/zh_TW/include/hbl-common-exploits.txt b/_pages/zh_TW/include/hbl-common-exploits.txt deleted file mode 100644 index a17fbfd3b1..0000000000 --- a/_pages/zh_TW/include/hbl-common-exploits.txt +++ /dev/null @@ -1,9 +0,0 @@ -### Next step: Choose an exploit - -If the camera appeared in the previous section, Safe Mode is likely to be working on your console. - -If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) -{: .notice--primary} - -If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) -{: .notice--info} diff --git a/_pages/zh_TW/installing-boot9strap-(fredtool).txt b/_pages/zh_TW/installing-boot9strap-(fredtool).txt deleted file mode 100644 index c985672503..0000000000 --- a/_pages/zh_TW/installing-boot9strap-(fredtool).txt +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool)" ---- - -{% include toc title="條目內容" %} - -{% capture technical_info %} -Technical Details (optional) - -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### 必備項目 - -* 您自 [Seedminer](seedminer) 步驟中所取得的 `movable.sed` 檔案 -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### 第一節 — 檢查自製韌體 - -{% include_relative include/cfw-check-fredtool.txt %} - -#### 第二節 — BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### 第三節 — 準備工作 - -{% include_relative include/fredtool-prep.txt %} - -#### 第四節 — 覆蓋 DS 連線設定 - -{% include_relative include/fredtool-write-flipnote.txt %} - -##### 第五節 — Flipnote 漏洞 - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### 繼續至[完成安裝](finalizing-setup) -{: .notice--primary} diff --git a/_pages/zh_TW/installing-boot9strap-(fredtool-legacy).txt b/_pages/zh_TW/installing-boot9strap-(fredtool-legacy).txt deleted file mode 100644 index 0e8f341e39..0000000000 --- a/_pages/zh_TW/installing-boot9strap-(fredtool-legacy).txt +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: "Installing boot9strap (Fredtool, Legacy)" ---- - -{% include toc title="條目內容" %} - -{% capture technical_info %} -Technical Details (optional) - -為了匯出系統的 DSiWare 軟體, 我們使用了在系統設定內的 DSiWare 數據管理的一個漏洞。 - -為了做到這一點,我們將使用你裝置的系統加密金鑰 (movable.sed) 來建構一個可使用的 DSiWare 系統備份,以便將 DSi 網路設定程式匯出到 SD 卡的根目錄。 - -Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. - -This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! -{: .notice--warning} - -### 必備項目 - -* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) - -#### 第一節 — 檢查自製韌體 - -{% include_relative include/cfw-check-fredtool.txt %} - -#### 第二節 — BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If this step causes your console to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" - + Your console will automatically reboot -1. Power off your console - -#### 第三節 — 準備工作 - -{% include_relative include/fredtool-prep.txt %} - -#### 第四節 — 覆蓋 DS 連線設定 - -{% include_relative include/fredtool-write-flipnote.txt %} - -##### 第五節 — Flipnote 漏洞 - -{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### Section VII - Restoring DS Connection Settings - -{% include_relative include/fredtool-restore-dsconn.txt %} - -___ - - -### 繼續至[完成安裝](finalizing-setup) -{: .notice--primary} diff --git a/_pages/zh_TW/installing-boot9strap-(frogtool).txt b/_pages/zh_TW/installing-boot9strap-(frogtool).txt deleted file mode 100644 index 1f2aa8119a..0000000000 --- a/_pages/zh_TW/installing-boot9strap-(frogtool).txt +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Installing boot9strap (Frogtool)" ---- - -{% include toc title="條目內容" %} - -{% capture technical_info %} -Technical Details (optional) -For technical details on the exploits that you will be using on this page, see "DSiWare_Exports CTCert verification" and "FIRM partitions known-plaintext" [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - - -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) link for `frogcert.bin` on this page, you will need a torrent client like [qBittorrent](https://www.qbittorrent.org/download.php) or [Deluge](http://dev.deluge-torrent.org/wiki/Download). -{: .notice--warning} - -### 必備項目 - -* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link) -* The latest release of [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (direct download) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) - -#### 第一節 — 檢查自製韌體 - -{% include_relative include/cfw-check-fredtool.txt %} - -#### 第二節 — 準備工作 - -1. Power off your console -1. 將 SD 卡插入至電腦中 -1. 解壓 Luma3DS `.zip` 內的 `boot.firm` 及 `boot.3dsx` 到 SD 卡的根目錄底下 -1. Copy `boot.nds` (b9sTool) from the b9sTool release `.zip` to the root of your SD card -1. 在 SD 卡的根目錄底下建立一個新資料夾 `3ds` - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy the `Frogtool` folder from the Frogtool-nimhax `.zip` to the `/3ds/` folder on your SD card -1. Copy `frogcert.bin` to the root of your SD card -1. Reinsert your SD card into your console -1. Power on your console - -#### Section III - Patching DS Download Play - -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch Frogtool from the list of homebrew -1. Select the "INJECT patched DS Download Play" option -1. Frogtool will automatically run and inject the JPN version of Flipnote Studio into your DS Download Play -1. Once this operation has finished, read the screens and check if the process was successful -1. Tap the touch screen, then select "BOOT patched DS Download Play" -1. If the exploit was successful, your console will have loaded the JPN version of Flipnote Studio - + If you get stuck on a black screen, follow [this](https://wiki.hacks.guide/wiki/3DS:TWLFix#Userland_(PicHaxx,_Steelhax,_etc.)-0) page, then try again - -#### Section IV - Flipnote Exploit - -{% include_relative include/install-boot9strap-b9stool.txt method="dsdlp" %} - -#### Section VI - Luma3DS Configuration - -1. Press and hold (Select), and while holding (Select), power on your console -{% include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -##### 第七節 — 還原『下載通信(Download Play)』程式 - -1. 啟動『下載通信 (Download Play)』程式 -1. 等到你看到兩個按鍵 - + Do not press either of the buttons -1. 同時按下『L』+『下』+『Select』鍵以啟動 Rosalina 選單 -1. 選擇『Miscellaneous options』 -1. 選擇『Switch the hb. title to the current app.』 -1. 按『B』繼續 -1. 按『B』回到 Rosalina 主選單 -1. 按『B』退出 Rosalina 選單 -1. 按『Home』鍵,並關閉『下載通信 (Download Play)』程式 -1. Relaunch the Download Play application -1. Your console should load the Homebrew Launcher -1. Launch Frogtool from the list of homebrew -1. Select the "RESTORE clean DS Download Play" option -1. Once this operation has finished, read the screens and check if the process was successful - + If there are any errors or missing files, correct the problem and try again -1. If the process was successful, tap the touch screen, then press START to exit -1. Power off your console - -___ - -### 繼續至[完成安裝](finalizing-setup) -{: .notice--primary} diff --git a/_pages/zh_TW/installing-boot9strap-(hbl-usm).txt b/_pages/zh_TW/installing-boot9strap-(hbl-usm).txt deleted file mode 100644 index 58bc306296..0000000000 --- a/_pages/zh_TW/installing-boot9strap-(hbl-usm).txt +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: "Installing boot9strap (HBL-USM)" ---- - -{% include toc title="條目內容" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -As we already have Homebrew access, we can use slotTool to do this. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### 相容性資訊 - -If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--danger} - -### 必備項目 - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) (direct download) - -#### 第一節 — 準備工作 - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. Then, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. 將 SD 卡插入至電腦中 -1. 在 SD 卡的根目錄底下建立一個新的資料夾 `boot9strap` -1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the RELEASE `.zip` to the `/boot9strap/` folder on your SD card -1. 在 SD 卡的根目錄底下建立一個新資料夾 `3ds` - + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates -1. Copy `slotTool.3dsx` from the `slotTool` folder inside the RELEASE `.zip` to the `/3ds/` folder on your SD card -1. Copy `usm.bin` from the RELEASE `.zip` to the root folder on your SD card -1. 將 SafeB9SInstaller `.zip` 中的 `SafeB9SInstaller.bin` 複製到 SD 卡的根目錄 -1. Reinsert your SD card into your console -1. Power on your console -1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) -1. Launch slotTool from the list of homebrew - + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section -1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option - + You will see some on-screen text and then your system will shut down - -![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### 第二節 — unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### 第三節 — 安裝 boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### 第四節 — 還原 WiFi 設定檔 - -{% include_relative include/remove-usm-slottool.txt %} - -___ - -### 繼續至[完成安裝](finalizing-setup) -{: .notice--primary} diff --git a/_pages/zh_TW/installing-boot9strap-(usm).txt b/_pages/zh_TW/installing-boot9strap-(usm).txt deleted file mode 100644 index 7e2b6c632d..0000000000 --- a/_pages/zh_TW/installing-boot9strap-(usm).txt +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: "安裝 boot9strap (透過 USM)" ---- - -{% include toc title="條目內容" %} - -{% capture technical_info %} -Technical Details (optional) - -In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. - -We can do this using an existing exploit, BannerBomb3. - -To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. - -Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. - -For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). - -{% endcapture %} -
{{ technical_info | markdownify }}
-{: .notice--info} - -### 相容性資訊 - -這些操作在美、歐、日、韓版可用,可透過系統版本號末尾的 「U、E、J、K」 字元來辨別。 - -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. -{: .notice--warning} - -### 必備項目 - -* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) -* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) -* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) -* [usm.bin](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) - - -#### 第一節 — 準備工作 - -In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. - -1. Your SD card should be inserted in your computer -1. Copy `usm.bin` to the root of your SD card -1. 解壓 Luma3DS `.zip` 內的 `boot.firm` 與 `boot.3dsx` 到 SD 卡的根目錄底下 - + 「SD 卡的根目錄」指的是你的 SD 卡含有 Nintendo 3DS 資料夾的目錄,而非該資料夾內部 -1. 在 SD 卡的根目錄底下建立一個新的資料夾 `boot9strap` -1. 解壓 boot9strap `.zip` 的 `boot9strap.firm` 及 `boot9strap.firm.sha` 檔案至 SD 卡的 `/boot9strap/` 資料夾中 -1. 將 SafeB9SInstaller `.zip` 中的 `SafeB9SInstaller.bin` 複製到 SD 卡的根目錄 - -![]({{ "/images/screenshots/usm/usm-root-layout.png" | absolute_url }}) -{: .notice--info} - -![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) -{: .notice--info} - -#### 第二節 — BannerBomb3 - -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. - -1. Reinsert your SD card into your console -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your console should show the BB3 multihax menu - + If the BB3 multihax menu doesn't open, [follow this troubleshooting guide](troubleshooting#bannerbomb3) - + If the BB3 multihax menu says "cfw installed already", you already have custom firmware and should continue from [here](checking-for-cfw) -1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" - + Your console will automatically power off -1. Power on your console -1. Launch System Settings on your console -1. Navigate to `Internet Settings` -> `Connection Settings` -1. Ensure that all three connections are named "Haaaaaaaxxxxxxxxx..." - + Do NOT change these settings! - + If all three connections are NOT all named "Haaaaaaaxxxxxxxxx...", STOP! Something went wrong in this section and MUST be fixed before you can continue -1. Power off your console - -#### 第三節 — unSAFE_MODE - -{% include_relative include/exploit-usm.txt %} - -#### 第四節 — 安裝 boot9strap - -{% include_relative include/install-boot9strap-safeb9sinstaller.txt %} -{%- include_relative include/configure-luma3ds.txt %} - -{% include_relative include/luma3ds-installed-note.txt %} - -#### 第五節 — 還原 WiFi 設定檔 - -In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. - -1. Launch System Settings on your console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" - + Your console will automatically reboot -1. Power off your console -1. 將 SD 卡插入至電腦中 -1. 於您的 SD 卡中,移動至 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. 這個檔案之後不再需要了 - -___ - -### 繼續至[完成安裝](finalizing-setup) -{: .notice--primary}