Merge pull request #1893 from lifehackerhansol/yeet

Remove unused pages
This commit is contained in:
Lily 2022-01-13 23:44:16 -08:00 committed by GitHub
commit 6d7c5f30ef
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
20 changed files with 29 additions and 958 deletions

View file

@ -55,9 +55,6 @@ sidebar_pages:
-
title: Get Started
url: get-started
-
title: Cart Update
url: cart-update
-
title: ntrboot
url: ntrboot
@ -85,48 +82,24 @@ sidebar_pages:
-
title: Homebrew Launcher (Soundhax)
url: homebrew-launcher-(soundhax)
-
title: Homebrew Launcher (Alternatives)
url: homebrew-launcher-(alternatives)
-
title: Homebrew Launcher (PicHaxx)
url: homebrew-launcher-(pichaxx)
-
title: Installing boot9strap (2xrsa)
url: installing-boot9strap-(2xrsa)
-
title: Installing boot9strap (Browser)
url: installing-boot9strap-(browser)
-
title: Installing boot9strap (Hardmod)
url: installing-boot9strap-(hardmod)
-
title: Installing boot9strap (SafeB9SInstaller)
url: installing-boot9strap-(safeb9sinstaller)
-
title: Installing boot9strap (MSET)
url: installing-boot9strap-(mset)
-
title: Installing boot9strap (ntrboot)
url: installing-boot9strap-(ntrboot)
-
title: Installing boot9strap (Soundhax)
url: installing-boot9strap-(soundhax)
-
title: Installing boot9strap (Frogtool)
url: installing-boot9strap-(frogtool)
-
title: Installing boot9strap (Fredtool)
url: installing-boot9strap-(fredtool)
-
title: Installing boot9strap (USM)
url: installing-boot9strap-(usm)
-
title: Installing boot9strap (safecerthax)
url: installing-boot9strap-(safecerthax)
-
title: Installing boot9strap (SSLoth-Browser)
url: installing-boot9strap-(ssloth-browser)
-
title: Installing boot9strap (PicHaxx)
url: installing-boot9strap-(pichaxx)

View file

@ -1,36 +0,0 @@
---
title: "Cartridge Update"
---
{% include toc title="Table of Contents" %}
### Required Reading
All game cartridges contain a copy of the required system version to play it, allowing anyone on a lower version to use the cartridge to update to that version (even without an internet connection).
{% capture notice-1 %}
Note that cartridge updates will only deliver updates to core features, such as the System Settings, Home Menu, etc. cartridge updates will not deliver updates to Nintendo 3DS Sound and Network features, such as System Transfer, Internet Browser, StreetPass Mii Plaza, or eShop.
This means that using a cartridge update from a version containing an older Nintendo 3DS Sound version *(<3.0.0)* to one that introduced a newer Nintendo 3DS Sound version will break [Soundhax](homebrew-launcher-(soundhax))! You will need an [alternate method](homebrew-launcher-(alternatives)) of entering the Homebrew Launcher!
This also means that a cartridge update will NOT install a browser if you do not already have one. This will **only** update the actual system version *(for example, 2.1.0-0 -> 6.0.0-0)*. The last number *(the -0)* will **not** change.
{% endcapture %}
<div class="notice--warning">{{ notice-1 | markdownify }}</div>
**Updating with a game cartridge containing the version 9.9.0 or above will remove your browser until a standard online update is performed!**
{: .notice--danger}
### What You Need
* A game cartridge that [contains the version](http://www.3dsdb.com/) you wish to update to
### Instructions
1. Boot your device into recovery mode by holding (L) + (R) + (A) + (UP) while powering on
1. If prompted, decline the update
1. Reboot your device
1. Put the game in your device if it is not already
1. Attempt to launch the game
1. Update when prompted

View file

@ -1,6 +0,0 @@
---
title: "DSiDumper"
---
This page has been removed because the method used is outdated. Please follow a modern method linked on the [Get Started](get-started) page.
{: .notice--warning}

View file

@ -1,85 +0,0 @@
---
title: "Homebrew Launcher (Alternatives)"
---
{% include toc title="Table of Contents" %}
### Required Reading
This udsploit/safehax exploit is compatible with versions 9.0.0 through 11.3.0.
The Homebrew Launcher has many different entrypoints, or methods of launching.
If browserhax is not an option (see the chart below), you do not already own any of these games, and do not have another 3DS that can access the Homebrew Launcher, the cheapest option is to buy a "Nintendo Selects" copy of [Ocarina of Time 3D](https://amzn.to/2fkaKdp) (ensure you get the correct cartridge for your region) and a [Powersaves](https://amzn.to/2fb3VY7) (compatible with all regions), then use oot3dhax from the chart below.
Ensure your device's Wireless Communication is turned on as udsploit (used in the next page) will need the wireless module to be active to function, and some devices (New 3DS, New 2DS, and Old 2DS) cannot adjust the Wireless Communication setting from the Homebrew Launcher. Wireless Communication only has to be on; connecting it to an access point is not required.
To extract the `.7z` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/).
### What You Need
* The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest)
* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/latest)
* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/latest) *(standard boot9strap; not the `devkit` file, not the `ntr` file)*
* The latest release of [safehax](https://github.com/TiniVi/safehax/releases/latest)
* The latest release of [udsploit](https://github.com/smealum/udsploit/releases/latest)
* The latest release of [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(the `.7z` file)*
### Instructions
1. Power off your device
1. Insert your SD card into your computer
1. Create a folder named `3ds` on the root of your SD card if it does not already exist
1. Copy `boot.3dsx` to the root of your SD card
1. Copy `boot.firm` from the Luma3DS `.7z` to the root of your SD card
1. Create a folder named `boot9strap` on the root of your SD card
1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card
1. Copy `safehax.3dsx` to the `/3ds/` folder on your SD card
1. Copy `udsploit.3dsx` to the `/3ds/` folder on your SD card
1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card and rename `SafeB9SInstaller.bin` to `safehaxpayload.bin`
![]({{ "/images/screenshots/boot9strap-hb-file-layout.png" | absolute_url }})
{: .notice--info}
1. Reinsert your SD card into your device
1. Power on your device
1. Use one of the following alternate entrypoints to get into the Homebrew Launcher:
| <sub> | <sub>Requires | <sub>Editions | <sub>Devices | <sub>Regions | <sub>Game Versions | <sub>System Versions |
|:-:|:-:|:-:|:-:|:-:|:-:|:-:|
| <sub>[browserhax](https://yls8.mtheall.com/3dsbrowserhax.php) | <sub>Nothing | <sub>Preinstalled | <sub>New, Old, 2DS | <sub>EUR, JPN, USA | <sub>All | <sub>9.0.0-2 up to and including 11.0.0-33 |
| <sub>[oot3dhax](https://github.com/yellows8/oot3dhax) | <sub>[*Ocarina of Time 3D*](https://amzn.to/2fkaKdp), <br> Either a powersaves or another 3DS which already has the Homebrew Launcher | <sub>Cart | <sub>New, Old, 2DS | <sub>EUR, JPN, USA | <sub>All | <sub>9.0.0-X up to and including 11.7.0-X |
| <sub>[smashbroshax](https://gbatemp.net/threads/397194/) | <sub>[*Super Smash Bros*](https://amzn.to/2ftGA72) | <sub>Cart, eShop | <sub>New | <sub>EUR, JPN, USA | <sub><1.1.3, <br> Carts with "amiibo" on the cover are preinstalled with v1.1.4 | <sub>9.0.0-X up to and including 11.3.0-X |
| <sub>[supermysterychunkhax](https://smd.salthax.org/) | <sub>[*Pokemon Super Mystery Dungeon*](https://amzn.to/2ebxZ75), <br> Another 3DS which already has the Homebrew Launcher | <sub>Cart | <sub>New, Old, 2DS | <sub>EUR, JPN, USA | <sub>All | <sub>9.9.0-X (USA/JPN) / 10.2.0-X (EUR) up to and including 11.0.0-X |
| <sub>[freakyhax](http://plutooo.github.io/freakyhax/) | <sub>[*Freakyforms Deluxe*](https://amzn.to/2f6eHO7) | <sub>eShop, Cart | <sub>New, Old, 2DS | <sub>EUR, JPN, USA | <sub>All | <sub>9.0.0-X up to and including 11.7.0-X |
| <sub>[basehaxx](http://mrnbayoh.github.io/basehaxx/) | <sub>*Pokemon [Omega Ruby](https://amzn.to/2eRILNQ)/[Alpha Sapphire](https://amzn.to/2ebGrmN)*, <br> Another 3DS which already has the Homebrew Launcher | <sub>Cart | <sub>New, Old, 2DS | <sub>EUR, JPN, USA | <sub>1.0, 1.4 | <sub>9.0.0-X up to and including 11.3.0-X |
| <sub>[BASICSploit](https://mrnbayoh.github.io/basicsploit/) | <sub>[*SmileBASIC*](https://www.nintendo.com/games/detail/eYURHNjVdfyrnA3OJGfmlMYIrJUzgOcv) | <sub>eShop | <sub>New, Old, 2DS | <sub>USA | <sub>3.2.1 | <sub>9.0.0-X up to and including 11.0.0-X |
| <sub>[smilehax](https://plutooo.github.io/smilehax/) | <sub>[*SmileBASIC*](https://www.nintendo.com/games/detail/eYURHNjVdfyrnA3OJGfmlMYIrJUzgOcv) | <sub>eShop | <sub>New, Old, 2DS | <sub>JPN, USA | <sub>3.3.1 | <sub>9.0.0-X up to and including 11.0.0-X |
| <sub>[stickerhax](https://github.com/yellows8/stickerhax) | <sub>[*Paper Mario: Sticker Star*](https://amzn.to/2f6aDx8), <br> Another 3DS which already has the Homebrew Launcher | <sub>eShop, Cart | <sub>New, Old, 2DS | <sub>EUR, JPN, KOR, USA | <sub>All | <sub>9.0.0-X up to and including 11.3.0-X |
| <sub>[Ninjhax 2](http://smealum.github.io/ninjhax2/) | <sub>[*Cubic Ninja*](https://amzn.to/2eRI1by) | <sub>eShop, Cart | <sub>New, Old, 2DS | <sub>EUR, JPN, USA | <sub>All | <sub>9.0.0-X up to and including 11.7.0-X |
| <sub>[Notehax](https://mrnbayoh.github.io/notehax/) | <sub>[*Flipnote Studio 3D*](https://my.nintendo.com/rewards/0391c34c430369c0) | <sub>eShop | <sub>New, Old, 2DS | <sub>EUR, JPN, USA | <sub>1.3.1 (JPN) / 1.0.0 (EUR/USA) | <sub>9.0.0-X up to and including 11.5.0-X |
| <sub>[RPwnG](https://mrnbayoh.github.io/rpwng/) | <sub>[*RPG Maker Player*](http://www.nintendo.com/games/detail/rpg-maker-player-3ds) | <sub>eShop | <sub>New, Old, 2DS | <sub>EUR, JPN, USA | <sub>1.1.4 (EUR) / 1.1.2 (JPN/USA) | <sub>9.0.0-X up to and including 11.5.0-X |
| <sub>[GenHax](https://github.com/svanheulen/genhax_proxy_installer) | <sub>[*Monster Hunter X*](http://amzn.to/2gsk6Tk) | <sub>eShop | <sub>New | <sub>JPN | <sub>All | <sub>9.9.0-X up to and including 11.2.0-X |
{: .notice--info}
<script type="text/javascript">
amzn_assoc_placement = "adunit0";
amzn_assoc_tracking_id = "plailect-20";
amzn_assoc_ad_mode = "manual";
amzn_assoc_ad_type = "smart";
amzn_assoc_marketplace = "amazon";
amzn_assoc_region = "US";
amzn_assoc_title = "";
amzn_assoc_linkid = "718ad647bc3d1b8f8c44b3a1f34bc235";
amzn_assoc_search_bar = "false";
amzn_assoc_asins = "B01AC3ZDCE,B00DD0B1R0,B00YC7DZP4,B00IVJ1M7M,B008YYSBR8,B004SG211I,B00KI2OZ9M,B00K848IH0";
</script>
<script src="//z-na.amazon-adsystem.com/widgets/onejs?MarketPlace=US"></script>
1. Your device should load the Homebrew Launcher
![]({{ "/images/screenshots/homebrew-launcher.png" | absolute_url }})
{: .notice--info}
### Continue to [Installing boot9strap (SafeB9SInstaller)](installing-boot9strap-(safeb9sinstaller))
{: .notice--primary}

View file

@ -1,6 +0,0 @@
---
title: "Homebrew Launcher (BrowserHax 2020)"
---
This page has been removed because the method used is outdated. Please follow a modern method linked on the [Get Started](get-started) page.
{: .notice--warning}

View file

@ -1,55 +0,0 @@
---
title: "Homebrew Launcher (PicHaxx)"
---
{% include toc title="Table of Contents" %}
### Required Reading
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the PicHaxx exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Pokemon Picross" game from the eShop.
If your device already has access to the Homebrew Launcher (whether through PicHaxx or another exploit), you can skip to [Frogtool](installing-boot9strap-(frogtool)).
{: .notice--success}
If you already have Pokemon Picross, this process will overwrite your game's save file!
{: .notice--warning}
### What You Need
* The free eShop game "Pokemon Picross"
* Your `movable.sed` file from completing [Seedminer](seedminer)
* The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest)
* The [otherapp payload](https://deadphoenix8091.github.io/3ds/#otherapp) *(for your region, device, and version)*
+ If your current version is 11.14.0-46, select 11.13.0-45 for your version
### Instructions
#### Section I - Prep Work
1. Copy `boot.3dsx` to the root of your SD card
1. Copy the otherapp payload to the root of your SD card and rename it to `otherapp.bin`
+ If you do not see the `.bin` extension, do not add it to the end of the filename
1. Create a folder named `3ds` on the root of your SD card if it does not already exist
#### Section II - PicHaxx
1. Open [the PicHaxx Injector website](https://3ds.nhnarwhal.com/3dstools/pichaxx.php) on your computer
1. Select your `movable.sed` file
1. Select "Build and Download"
1. Wait for the process to complete
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `title` -> `00040000` -> `0017c100` -> `data` on your SD card
+ The `<ID0>` will be the same one that you used in [Seedminer](seedminer)
+ The `<ID1>` is a 32 character long folder inside of the `<ID0>`
1. Copy the newly downloaded `00000001.sav` file to the `data` folder on your SD card
+ Overwrite the old save file when prompted
1. Reinsert your SD card into your device
1. Power on your device
1. Launch "Pokemon Picross"
1. If the exploit was successful, your device will have loaded the Homebrew Launcher
+ You may see an error stating there are no applications found
1. Power off your device
___
### Continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool))
{: .notice--primary}

View file

@ -1,6 +0,0 @@
---
title: "Homebrew Launcher (Steelhax)"
---
This page has been removed because the method used is outdated. Please follow a modern method linked on the [Get Started](get-started) page.
{: .notice--warning}

View file

@ -1,111 +0,0 @@
---
title: "Seedminer"
---
{% include toc title="Table of Contents" %}
### Required Reading
To install boot9strap on your device, we exploit an oversight in the security restrictions applied to "DSiWare" applications.
To accomplish this, we use a tool called Seedminer to calculate the DSiWare encryption key (`movable.sed`) for your device. We then use this DSiWare encryption key to decrypt a compatible DSiWare application and inject an exploit into it to run our own code (the exact exploit used will depend on your device's region).
If this key were completely random, the encryption key would be impossible to break on current computing hardware. Fortunately, the first half of the key (`movable_part1.sed`) is actually mathematically related to your device's Friend Code, allowing us to break the encryption. For information on how Seedminer works, please see [this presentation](https://zoogie.github.io/web/34⅕c3).
Note that this tool requires a PC with a powerful graphics card to break your device's DSiWare encryption. If you do not have access to one of these, there also exists several online helper services where a volunteer running automated software will do this for you.
### Instructions
#### Section I - Compatibility Tests
While these tests are not strictly necessary to perform the Seedminer exploit, the follow-up exploits to this do require this test to be performed and it would be a waste of time and effort to perform Seedminer without the ability to use the other exploits.
There are two different methods for building on the Seedminer exploit (described in more detail at the bottom of this page), so even if one of these test fails you can still use another method as long as the other does not fail.
#### DS Internet Settings Test (used for Fredtool)
1. Go to System Settings, then "Internet Settings", then "Nintendo DS Connections"
1. Press "OK"
1. If your device loads into a "Nintendo Wi-Fi Connection Setup" menu, the test was successful
+ If the screen stays black or appears to freeze, the test has failed and you will not be able to use the Fredtool method which requires a functioning DS Internet Settings
1. Exit this menu
#### DS Download Play Test (used for Frogtool)
1. Launch the Download Play application (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"})
1. Select "Nintendo DS"
1. If your device loads into a "Download software via DS Download Play" menu, the test was successful
+ If the screen stays black or appears to freeze, the test has failed and you will not be able to use the Frogtool method which requires a functioning DS Download Play
1. Exit this menu
#### Section II - Prep Work
1. Insert your SD card into your computer
1. Navigate to the `Nintendo 3DS` folder on your SD card
1. Copy the 32 character long name of the folder you see
+ If you see multiple folders like this, perform the following:
+ Rename the `Nintendo 3DS` folder to `BACKUP_Nintendo 3DS`
+ Reinsert your SD card into your device and power on your device
+ Wait for the device to generate the SD card data
+ Power off your device and reinsert your SD card into your computer
+ Navigate to the `Nintendo 3DS` folder on your SD card
+ Copy the 32 character long name of the folder you see
+ Delete the `Nintendo 3DS` folder
+ Rename the `BACKUP_Nintendo 3DS` folder to `Nintendo 3DS`
1. Paste your 32 character long folder name into a document you can reference later
+ This folder name is also known as your "ID0"
1. Power on your device
1. Go to your Friend List (the [orange Face Icon]({{ "/images/friend-list-icon.png" | absolute_url }}) in the top row of your Home Menu)
+ If you receive an error and are kicked out of the menu, you either must create a new Mii or your console cannot connect to Nintendo's servers (due to a ban or connection issues)
1. Find your Mii profile, then find the "Friend Code" field on the top screen
#### Section III - Seedminer
1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer
+ This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer)
+ If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field
1. Paste your device's 32 character long folder name into the "Your ID0" field
1. Complete the "I'm not a robot" captcha
1. Select "Go"
+ If the site immediately goes to step 4, download your `movable.sed` file and continue with the next section.
1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console
1. Wait for the site to update
+ If it does not, wait a few minutes before refreshing the page once
1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button
1. Wait for the remainder of the process to complete
+ This is usually fast (1-5 minutes) but in some cases, can take up to half an hour.
+ During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue.
+ If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. When the process has completed, download your `movable.sed` file from the site
+ Keep this file as you will need it in the upcoming pages
___
### Methods
___
#### Seedminer + Fredtool
This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare eShop title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to already own (or download / buy) a DSiWare game from the eShop.
This method is compatible with all regions, though only the JPN and USA regions have free DSiWare titles in the eShop.
This method requires that the DS Internet Settings be functioning properly (see the test at the top of this page).
Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool))
{: .notice--primary}
___
#### Seedminer + Steelhax + Frogtool
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop.
This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason.
This method requires that the DS Download Play be functioning properly (see the test at the top of this page).
Continue to [Homebrew Launcher (Steelhax)](homebrew-launcher-(steelhax))
{: .notice--primary}

View file

@ -1,58 +0,0 @@
---
title: "Installing boot9strap (2xrsa)"
---
{% include toc title="Table of Contents" %}
### What You Need
* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/latest)
* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/latest) *(standard boot9strap; not the `devkit` file, not the `ntr` file)*
* The latest release of [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest)
### Instructions
#### Section I - Prep Work
1. Power off your device
1. Insert your SD card into your computer
1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
1. Create a folder named `boot9strap` on the root of your SD card
1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card
1. Copy `arm9.bin` and `arm11.bin` from the SafeB9SInstaller `.zip` to the root of your SD card
![]({{ "/images/screenshots/boot9strap-2xrsa-file-layout.png" | absolute_url }})
{: .notice--info}
1. Reinsert your SD card into your device
1. Power on your device
#### Section II - Launching SafeB9SInstaller
1. Launch the browser and go to the following URL on your device
+ `http://2xrsa.hacks.guide`
+ If you are on a New 3DS, New 2DS, or Old 2DS and Wireless Communication is off, you can re-enable the wireless by removing the battery and unplugging the charger for several seconds then booting back up
+ If you get the error "This service is not available in your region", use the System Settings to set your device's country to match the NAND region you installed with 2.1.0 CTRTransfer
+ If you forgot to disable parental controls before CTRTransfering or otherwise cannot access wireless settings, note that the device will autoconnect to any network named `attwifi` with no password
+ If you get another error, [follow this troubleshooting guide](troubleshooting#a-browser-based-exploit-is-not-working)
1. If the exploit was successful, you will have booted into SafeB9SInstaller
#### Section III - Installing boot9strap
1. Wait for all safety checks to complete
1. When prompted, input the key combo given to install boot9strap
1. Once it has completed, press (A) to reboot your device
#### Section IV - Configuring Luma3DS
1. Your device should have rebooted into the Luma3DS configuration menu
+ If you get a black screen, [follow this troubleshooting guide](troubleshooting#black-screen-on-sysnand-boot-after-installing-boot9strap)
1. Use the (A) button and the D-Pad to turn on the following:
+ **"Show NAND or user string in System Settings"**
1. Press (Start) to save and reboot
+ If you get an error, just continue the next page
___
### Continue to [Finalizing Setup](finalizing-setup)
{: .notice--primary}

View file

@ -1,63 +0,0 @@
---
title: "Installing boot9strap (Browser)"
---
{% include toc title="Table of Contents" %}
### Required Reading
new-browserhax-xl/old-browserhax-xl (when combined with universal-otherapp) is compatible with version 11.14.0 on all 3DS devices with Internet Browser access.
### What You Need
* The latest release of [universal-otherapp](https://github.com/TuxSH/universal-otherapp/releases/latest)
* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/latest)
* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/latest) *(`boot9strap-1.3.zip`; not the `devkit` file, not the `ntr` file)*
* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest)
### Instructions
#### Section I - Prep Work
1. Power off your device
1. Insert your SD card into your computer
1. Copy `otherapp.bin` to the root of your SD card and rename it to `arm11code.bin`
+ If you do not see the `.bin` extension, do not add it to the end of the filename
1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
1. Create a folder named `boot9strap` on the root of your SD card
1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `boot9strap` folder on your SD card
1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card
1. Reinsert your SD card into your device
1. Power on your device
#### Section II - Launching SafeB9SInstaller
1. Power on your device
1. On the HOME Menu, press the Left and Right shoulder buttons together to open the camera
+ If you are unable to open the camera, open the Internet Browser and manually type the URL instead (`https://zoogie.github.io/web/nbhax`)
1. Tap the QR code button and scan [this QR code](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=https%3A%2F%2Fzoogie.github.io%2Fweb%2Fnbhax&qzone=1&margin=0&size=400x400&ecc=L)
+ If you get an error, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-browser)
1. If the exploit was successful, you will have booted into SafeB9SInstaller
#### Section III - Installing boot9strap
1. Wait for all checks to complete
1. When prompted, input the key combo given on the top screen to install boot9strap
1. Once it has completed, press (A) to reboot your device
#### Section IV - Configuring Luma3DS
1. Your device should have rebooted into the Luma3DS configuration menu
+ If you get a black screen, [follow this troubleshooting guide](troubleshooting#boot-related-issues-on-modded-devices)
1. Use the (A) button and the D-Pad to turn on the following:
+ **"Show NAND or user string in System Settings"**
1. Press (Start) to save and reboot
At this point, your console will boot to Luma3DS by default as long as the SD card is inserted.
+ Luma3DS does not look any different from the normal HOME menu. If your console has booted into the HOME menu, it is running custom firmware.
+ On the next page, you will copy Luma3DS to internal memory so that you can boot without an SD card.
___
### Continue to [Finalizing Setup](finalizing-setup)
{: .notice--primary}

View file

@ -1,79 +0,0 @@
---
title: "Installing Boot9strap (Frogtool)"
---
{% include toc title="Table of Contents" %}
### Required Reading
We will now use our Homebrew Launcher access to run the Frogtool utility in order to inject the exploitable Japanese version of the "Flipnote Studio" title, which we then use to run b9sTool and install boot9strap.
This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws).
To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download).
To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/).
### What You Need
* Your `movable.sed` file from completing [Seedminer](seedminer)
* <i class="fa fa-magnet" aria-hidden="true" title="This is a magnet link. Use a torrent client to download the file."></i> - [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce)
* The latest release of [Frogtool](https://github.com/zoogie/Frogtool/releases/latest)
* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest)
* The latest release of [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(the `.7z` file)*
#### Section I - Prep Work
1. Insert your SD card into your computer
1. Copy your `movable.sed` file to the root of your SD card
1. Copy `boot.firm` from the Luma3DS `.7z` to the root of your SD card
1. Copy `boot.nds` (B9STool) to the root of your SD card
1. Copy `Frogtool.3dsx` to the `/3ds/` folder on your SD card
1. Copy `frogcert.bin` to the root of your SD card
1. Reinsert your SD card into your device
1. Power on your device
#### Section II - Patching DS Download Play
1. Open the Homebrew Launcher using any method
1. Launch Frogtool from the list of homebrew
1. Select the "INJECT patched DS Download Play" option
1. Frogtool will automatically run and inject the JPN version of Flipnote Studio into your DS Download Play
1. Once this operation has finished, tap the touchscreen and select "BOOT patched DS Download Play"
1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio
#### Section III - Flipnote Exploit
If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/).
{: .notice--info}
1. Complete the initial setup process for the launched game until you reach the main menu
+ Select the left option whenever prompted during the setup process
1. Using the touch-screen, select the large left box, then select the box with an SD card icon
1. Once the menu loads, select the face icon, then the bottom right icon to continue
1. Select the frog icon at the bottom left
+ Alternatively, press (X) or (UP) on the D-Pad depending on which is shown on the top screen
1. Select the second button along the top with a film-reel icon
1. Scroll right until reel "3/3" is selected
1. Tap the third box with the letter "A" in it
1. Scroll left until reel "1/3" is selected
1. Tap the fourth box with the letter "A" in it
1. If the exploit was successful, your device will have loaded b9sTool
1. Select "Install boot9strap" and confirm
1. Exit b9sTool, then power off your device
+ You may have to force power off by holding the power button
+ If you see the Luma configuration menu, continue without powering off
#### Section IV - Configuring Luma3DS
1. Boot your device while holding (Select) to launch the Luma configuration menu
+ If you encounter issues launching the Luma configuration menu, [follow this troubleshooting guide](https://github.com/zoogie/b9sTool/blob/master/TROUBLESHOOTING.md)
1. Use the (A) button and the D-Pad to turn on the following:
+ **"Show NAND or user string in System Settings"**
1. Press (Start) to save and reboot
+ If you get a black screen, [follow this troubleshooting guide](troubleshooting#black-screen-on-sysnand-boot-after-installing-boot9strap)
___
### Continue to [Finalizing Setup](finalizing-setup)
{: .notice--primary}

View file

@ -1,100 +0,0 @@
---
title: "Installing Boot9strap (Frogtool)"
---
{% include toc title="Table of Contents" %}
### Required Reading
We will now use our Homebrew Launcher access to run the Frogtool utility in order to inject the exploitable Japanese version of the "Flipnote Studio" title, which we then use to run b9sTool and install boot9strap.
This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws).
To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download).
### What You Need
* Your `movable.sed` file from completing [Seedminer](seedminer)
* <i class="fa fa-magnet" aria-hidden="true" title="This is a magnet link. Use a torrent client to download the file."></i> - [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce)
* The latest release of [Frogtool](https://github.com/zoogie/Frogtool/releases/latest)
* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest)
* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest)
#### Section I - Prep Work
1. Insert your SD card into your computer
1. Copy your `movable.sed` file to the root of your SD card
1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
1. Copy `boot.nds` (b9sTool) from the b9sTool release `.zip` to the root of your SD card
1. Copy `Frogtool.3dsx` to the `/3ds/` folder on your SD card
1. Copy `frogcert.bin` to the root of your SD card
1. Reinsert your SD card into your device
1. Power on your device
#### Section II - Patching DS Download Play
1. Open the Homebrew Launcher using any method
1. Launch Frogtool from the list of homebrew
1. Select the "INJECT patched DS Download Play" option
1. Frogtool will automatically run and inject the JPN version of Flipnote Studio into your DS Download Play
1. Once this operation has finished, read the screens and check if the process was successful
+ If there are any errors or missing files, correct the problem and try again
1. If the process was successful, tap the touch screen, then select "BOOT patched DS Download Play"
1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio
#### Section III - Flipnote Exploit
If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/).
{: .notice--info}
1. Complete the initial setup process for the launched game until you reach the main menu
+ Select the left option whenever prompted during the setup process
1. Using the touch-screen, select the large left box, then select the box with an SD card icon
1. Once the menu loads, select the face icon, then the bottom right icon to continue
1. Select the frog icon at the bottom left
+ Alternatively, press (X) or (UP) on the D-Pad depending on which is shown on the top screen
1. Select the second button along the top with a film-reel icon
1. Scroll right until reel "3/3" is selected
1. Tap the third box with the letter "A" in it
1. Scroll left until reel "1/3" is selected
1. Tap the fourth box with the letter "A" in it
1. If the exploit was successful, your device will have loaded b9sTool
1. Using the D-Pad, move to "Install boot9strap"
1. Press (A), then press START and SELECT at the same time to begin the process
1. Once complete and the bottom screen says "done.", exit b9sTool, then power off your device
+ You may have to force power off by holding the power button
+ If you see the Luma configuration menu, continue without powering off
#### Section IV - Configuring Luma3DS
1. Boot your device while holding (Select) to launch the Luma configuration menu
+ If you encounter issues launching the Luma configuration menu, [follow this troubleshooting guide](https://github.com/zoogie/b9sTool/blob/master/TROUBLESHOOTING.md)
1. Use the (A) button and the D-Pad to turn on the following:
+ **"Show NAND or user string in System Settings"**
1. Press (Start) to save and reboot
+ Your device should load the Home Menu after a short delay. If you get a black screen lasting longer than 5 minutes, [follow this troubleshooting guide](troubleshooting#black-screen-on-sysnand-boot-after-installing-boot9strap)
#### Section V - Restoring DS Download Play
1. Launch the Download Play application (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"})
1. Wait until you see the two buttons
+ Do not press either of the buttons
1. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu
1. Select "Miscellaneous options"
1. Select "Switch the hb. title to the current app."
1. Press (B) to continue
1. Press (B) to return to the Rosalina main menu
1. Press (B) to exit the Rosalina menu
1. Press (Home), then close Download Play
1. Relaunch the Download Play application
1. Your device should load the Homebrew Launcher
1. Launch Frogtool from the list of homebrew
1. Select the "RESTORE patched DS Download Play" option
1. Once this operation has finished, read the screens and check if the process was successful
+ If there are any errors or missing files, correct the problem and try again
1. If the process was successful, tap the touch screen, then press START to exit
___
### Continue to [Finalizing Setup](finalizing-setup)
{: .notice--primary}

View file

@ -1,6 +0,0 @@
---
title: "Installing boot9strap (HBL-USM)"
---
This page has been removed because the method used is outdated. Please follow a modern method linked on the [Get Started](get-started) page.
{: .notice--warning}

View file

@ -1,39 +0,0 @@
---
title: "Installing boot9strap (SafeB9SInstaller)"
---
{% include toc title="Table of Contents" %}
### Instructions
#### Section I - Launching SafeB9SInstaller
1. Launch udsploit from the list of homebrew
1. Once it has completed, press (Start) to exit udsploit
+ This may take several tries
+ If it freezes, just force the console to power off by holding the power button, then try again
1. Launch safehax from the list of homebrew
+ If you get a "PM INIT FAILED" error, make sure you ran udsploit with Wireless Communication turned on
+ If you *still* get a "PM INIT FAILED" error, try using the [r19 release of safehax](https://github.com/TiniVi/safehax/releases/tag/r19)
+ If it freezes, just force the console to power off by holding the power button, then try again
1. If the exploit was successful, you will have booted into SafeB9SInstaller
#### Section II - Installing boot9strap
1. Wait for all safety checks to complete
1. When prompted, input the key combo given to install boot9strap
1. Once it has completed, press (A) to reboot your device
#### Section III - Configuring Luma3DS
1. Your device should have rebooted into the Luma3DS configuration menu
+ If you get a black screen, [follow this troubleshooting guide](troubleshooting#black-screen-on-sysnand-boot-after-installing-boot9strap)
1. Use the (A) button and the D-Pad to turn on the following:
+ **"Show NAND or user string in System Settings"**
1. Press (Start) to save and reboot
+ If you get an error, just continue the next page
___
### Continue to [Finalizing Setup](finalizing-setup)
{: .notice--primary}

View file

@ -1,60 +0,0 @@
---
title: "Installing boot9strap (MSET)"
---
{% include toc title="Table of Contents" %}
### What You Need
* Any DS flashcart that works on your device version
* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/latest)
* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/latest) *(standard boot9strap; not the `devkit` file, not the `ntr` file)*
* The latest release of [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest)
### Instructions
#### Section I - Prep Work
1. Power off your device
1. Insert your SD card into your computer
1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
1. Create a folder named `boot9strap` on the root of your SD card
1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card
1. Copy `SafeB9SInstaller.dat` from the SafeB9SInstaller `.zip` to the root of your SD card
![]({{ "/images/screenshots/boot9strap-mset-file-layout.png" | absolute_url }})
{: .notice--info}
1. Reinsert your SD card into your device
1. Copy `SafeB9SInstaller.nds` from the SafeB9SInstaller `.zip` to your DS flashcart
1. Power on your device
#### Section II - Launching SafeB9SInstaller
1. Start your DS flashcart from your device
1. Boot `SafeB9SInstaller.nds` using your flashcart
1. Select the correct option for your system version
+ 4.X.X -> "4.x SafeB9SInstaller"
+ 6.X.X -> "6.x SafeB9SInstaller"
1. Reboot the system, then go to System Settings, then "Other Settings", then "Profile", then "Nintendo DS Profile"
1. If the exploit was successful, you will have booted into SafeB9SInstaller
#### Section III - Installing boot9strap
1. Wait for all safety checks to complete
1. When prompted, input the key combo given to install boot9strap
1. Once it has completed, press (A) to reboot your device
#### Section IV - Configuring Luma3DS
1. Your device should have rebooted into the Luma3DS configuration menu
+ If you get a black screen, [follow this troubleshooting guide](troubleshooting#black-screen-on-sysnand-boot-after-installing-boot9strap)
1. Use the (A) button and the D-Pad to turn on the following:
+ **"Show NAND or user string in System Settings"**
1. Press (Start) to save and reboot
+ If you get an error, just continue the next page
___
### Continue to [Finalizing Setup](finalizing-setup)
{: .notice--primary}

View file

@ -1,85 +0,0 @@
---
title: "Installing boot9strap (safecerthax)"
---
{% include toc title="Table of Contents" %}
### Required Reading
safecerthax is compatible with all Old 3DS and Old 2DS devices in all regions.
If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, or your ISP is rerouting DNS changes, you will need to use an alternate method, like [Installing boot9strap (Browser)](installing-boot9strap-(browser)).
{: .notice--warning}
This exploit will not work on the New 3DS, New 3DS XL, or New 2DS XL. Please ensure that the device you are modding is an Old 3DS, Old 3DS XL, or Old 2DS before continuing.
{: .notice--info}
### What You Need
* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/latest)
* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/latest) *(`boot9strap-1.3.zip`; not the `devkit` file, not the `ntr` file)*
* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest)
### Instructions
#### Section I - Prep Work
1. Power off your device
1. Insert your SD card into your computer
1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
1. Create a folder named `boot9strap` on the root of your SD card
1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `boot9strap` folder on your SD card
1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card
1. Reinsert your SD card into your device
1. Power on your device
#### Section II - safecerthax DNS
1. Launch the System Settings application
1. Navigate to `Internet Settings` -> `Connection Settings`
1. Click on your network connection slot and navigate to `Change Settings` -> `Next Page (right arrow)` -> `DNS`
1. Set "Auto-Obtain DNS" to "No", then click `Detailed Setup`
1. Set both the Primary DNS and Secondary DNS to `054.038.133.070`
1. Click OK, then click Save
1. When prompted, click "Test" to perform the connection test
+ The test should succeed
1. Power off your device
#### Section III - safecerthax
1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), then press (Power)
+ Keep holding the buttons until the device boots into Safe Mode
1. Press "OK" to accept the update
+ There is no update. This is part of the exploit
1. Press "I accept" to accept the terms and conditions
+ The update should fail and an error message should appear
+ If the update does not fail, it is possible that your ISP is rerouting DNS changes. Try another internet connection, or follow an alternate method, like [Installing boot9strap (Browser)](installing-boot9strap-(browser)).
1. Press "OK" to close the error message
1. If the exploit was successful, you will have booted into SafeB9SInstaller
+ If the console freezes or crashes, force power off the console, then retry this section
#### Section IV - Installing boot9strap
1. Wait for all safety checks to complete
1. When prompted, input the key combo given to install boot9strap
1. Once it has completed, press (A) to reboot your device
#### Section V - Configuring Luma3DS
1. Your device should have rebooted into the Luma3DS configuration menu
+ If you get a black screen, [follow this troubleshooting guide](troubleshooting#black-screen-on-sysnand-boot-after-installing-boot9strap)
1. Use the (A) button and the D-Pad to turn on the following:
+ **"Show NAND or user string in System Settings"**
1. Press (Start) to save and reboot
#### Section VI - Restoring default DNS
1. Launch the System Settings application
1. Navigate to `Internet Settings` -> `Connection Settings`
1. Click on your network connection slot and navigate to `Change Settings` -> `Next Page (right arrow)` -> `DNS`
1. Set "Auto-Obtain DNS" to "Yes"
1. Click OK, then click Save
1. When prompted, click "Test" to perform the connection test
+ The test should succeed
1. Power off your device
___
### Continue to [Finalizing Setup](finalizing-setup)
{: .notice--primary}

View file

@ -1,83 +0,0 @@
---
title: "Installing boot9strap (SSLoth-Browser)"
---
{% include toc title="Table of Contents" %}
### Required Reading
SSLoth allows users on version 11.13.0 and below to bypass the browser version check, allowing use of new-browserhax or old-browserhax, which can then be used in conjunction with universal-otherapp.
If you have updated your device to your current version using a cartridge, your Internet Browser will be inaccessible. If this is the case, you will need to update your device to the latest version through System Settings and then follow the method for the latest version.
{: .notice--warning}
### What You Need
* The latest release of [universal-otherapp](https://github.com/TuxSH/universal-otherapp/releases/latest)
* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/latest)
* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/latest) *(`boot9strap-1.3.zip`; not the `devkit` file, not the `ntr` file)*
* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest)
#### Section I - Prep Work
1. Power off your device
1. Insert your SD card into your computer
1. Copy `otherapp.bin` to the root of your SD card and rename it to `arm11code.bin`
+ If you do not see the `.bin` extension, do not add it to the end of the filename
1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
1. Create a folder named `boot9strap` on the root of your SD card
1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `boot9strap` folder on your SD card
1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card
1. Reinsert your SD card into your device
1. Power on your device
#### Section II - SSLoth
1. Launch the System Settings application
1. Navigate to `Internet Settings` -> `Connection Settings`
1. Click on your network connection slot and navigate to `Change Settings` -> `Next Page (right arrow)` -> `DNS`
1. Set "Auto-Obtain DNS" to "No", then click `Detailed Setup`
1. Set both the Primary DNS and Secondary DNS to `054.038.133.070`
1. Click OK, then click Save
1. When prompted, click "Test" to perform the connection test
+ The test should succeed
1. Power off your device
#### Section III - Launching SafeB9SInstaller
1. Power on your device
1. On the HOME Menu, press the Left and Right shoulder buttons together to open the camera
+ If you are unable to open the camera, open the Internet Browser and manually type the URL instead (`https://zoogie.github.io/web/nbhax/`)
1. Tap the QR code button and scan [this QR code](http://api.qrserver.com/v1/create-qr-code/?color=000000&bgcolor=FFFFFF&data=https%3A%2F%2Fzoogie.github.io%2Fweb%2Fnbhax&qzone=1&margin=0&size=400x400&ecc=L)
+ If you get an error, [follow this troubleshooting guide](troubleshooting#a-browser-based-exploit-is-not-working)
+ If the browser prompts an update, it is possible that your ISP is rerouting DNS changes. Try another internet connection, or update your console to the latest version and follow [Installing boot9strap (Browser)](installing-boot9strap-(browser)).
1. If the exploit was successful, you will have booted into SafeB9SInstaller
#### Section IV - Installing boot9strap
1. Wait for all safety checks to complete
1. When prompted, input the key combo given to install boot9strap
1. Once it has completed, press (A) to reboot your device
#### Section V - Configuring Luma3DS
1. Your device should have rebooted into the Luma3DS configuration menu
+ If you get a black screen, [follow this troubleshooting guide](troubleshooting#black-screen-on-sysnand-boot-after-installing-boot9strap)
1. Use the (A) button and the D-Pad to turn on the following:
+ **"Show NAND or user string in System Settings"**
1. Press (Start) to save and reboot
#### Section VI - Restoring default DNS
1. Launch the System Settings application
1. Navigate to `Internet Settings` -> `Connection Settings`
1. Click on your network connection slot and navigate to `Change Settings` -> `Next Page (right arrow)` -> `DNS`
1. Set "Auto-Obtain DNS" to "Yes"
1. Click OK, then click Save
1. When prompted, click "Test" to perform the connection test
+ The test should succeed
1. Power off your device
___
### Continue to [Finalizing Setup](finalizing-setup)
{: .notice--primary}

View file

@ -18,7 +18,6 @@ sitemap: false
+ [A9LH to B9S](a9lh-to-b9s)
+ [BannerBomb3](bannerbomb3)
+ [Cartridge Update](cart-update)
+ [Credits](credits)
+ [Checking for CFW](checking-for-cfw)
+ [Contribute](contribute)
@ -41,22 +40,14 @@ sitemap: false
+ [GodMode9 Usage](godmode9-usage)
+ [H2testw (Windows)](h2testw-(windows))
+ [Home](/)
+ [Homebrew Launcher (Alternatives)](homebrew-launcher-(alternatives))
+ [Homebrew Launcher (PicHaxx)](homebrew-launcher-(pichaxx))
+ [Homebrew Launcher (Soundhax)](homebrew-launcher-(soundhax))
+ [Installing boot9strap (2xrsa)](installing-boot9strap-(2xrsa))
+ [Installing boot9strap (Browser)](installing-boot9strap-(browser))
+ [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool))
+ [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool))
+ [Installing boot9strap (Hardmod)](installing-boot9strap-(hardmod))
* [Installing boot9strap (kartdlphax)](installing-boot9strap-(kartdlphax))
+ [Installing boot9strap (MSET)](installing-boot9strap-(mset))
+ [Installing boot9strap (ntrboot)](installing-boot9strap-(ntrboot))
+ [Installing boot9strap (PicHaxx)](installing-boot9strap-(pichaxx))
+ [Installing boot9strap (SafeB9SInstaller)](installing-boot9strap-(safeb9sinstaller))
+ [Installing boot9strap (safecerthax)](installing-boot9strap-(safecerthax))
+ [Installing boot9strap (Soundhax)](installing-boot9strap-(soundhax))
+ [Installing boot9strap (SSLoth-Browser)](installing-boot9strap-(ssloth-browser))
+ [Installing boot9strap (USM)](installing-boot9strap-(usm))
+ [Move EmuNAND](move-emunand)
+ [ntrboot](ntrboot)

View file

@ -200,27 +200,20 @@ $(document).ready(function() {
// the value is the key to the displayed route in the device_common/old/new variable below
//
var methods = {
"installing-boot9strap-(2xrsa)": "0",
"installing-boot9strap-(mset)": "1",
"installing-boot9strap-(browser)": "2",
"homebrew-launcher-(soundhax)": "3",
"homebrew-launcher-(alternatives)": "4",
"installing-boot9strap-(soundhax)": "7",
"ntrboot": "8",
"flashing-ntrboot-(3ds-single-system)": "9",
"flashing-ntrboot-(3ds-multi-system)": "10",
"flashing-ntrboot-(dsi)": "11",
"flashing-ntrboot-(nds)": "12",
"installing-boot9strap-(hardmod)": "14",
"seedminer": "15",
"installing-boot9strap-(fredtool)": "17",
"bannerbomb3": "18",
"homebrew-launcher-(pichaxx)": "19",
"installing-boot9strap-(usm)": "20",
"installing-boot9strap-(safecerthax)": "22",
"installing-boot9strap-(ssloth-browser)": "23",
"installing-boot9strap-(pichaxx)": "24",
"installing-boot9strap-(kartdlphax)": "25",
"homebrew-launcher-(soundhax)": "0",
"installing-boot9strap-(soundhax)": "1",
"ntrboot": "2",
"flashing-ntrboot-(3ds-single-system)": "3",
"flashing-ntrboot-(3ds-multi-system)": "4",
"flashing-ntrboot-(dsi)": "5",
"flashing-ntrboot-(nds)": "6",
"installing-boot9strap-(hardmod)": "7",
"seedminer": "8",
"installing-boot9strap-(fredtool)": "9",
"bannerbomb3": "10",
"installing-boot9strap-(usm)": "11",
"installing-boot9strap-(pichaxx)": "12",
"installing-boot9strap-(kartdlphax)": "13",
};
for(var device in devices){
@ -252,28 +245,20 @@ $(document).ready(function() {
// The key/propery name must match the value associated with the page in the methods variable above
//
var device_common = {
"0": ["installing-boot9strap-(2xrsa)", "finalizing-setup"],
"1": ["installing-boot9strap-(mset)", "finalizing-setup"],
"2": ["installing-boot9strap-(browser)", "finalizing-setup"],
"3": ["homebrew-launcher-(soundhax)", "installing-boot9strap-(homebrew-launcher)", "finalizing-setup"],
"4": ["homebrew-launcher-(alternatives)", "installing-boot9strap-(homebrew-launcher)", "finalizing-setup"],
"7": ["installing-boot9strap-(soundhax)", "finalizing-setup"],
"8": ["ntrboot", "multiple-options", "installing-boot9strap-(ntrboot)", "finalizing-setup"],
"9": ["ntrboot", "flashing-ntrboot-(3ds-single-system)", "installing-boot9strap-(ntrboot)", "finalizing-setup"],
"10": ["ntrboot", "flashing-ntrboot-(3ds-multi-system)", "installing-boot9strap-(ntrboot)", "finalizing-setup"],
"11": ["ntrboot", "flashing-ntrboot-(dsi)", "installing-boot9strap-(ntrboot)", "finalizing-setup"],
"12": ["ntrboot", "flashing-ntrboot-(nds)", "installing-boot9strap-(ntrboot)", "finalizing-setup"],
"14": ["installing-boot9strap-(hardmod)", "finalizing-setup"],
"15": ["seedminer", "multiple-options", "finalizing-setup"],
"17": ["seedminer", "multiple-options", "installing-boot9strap-(fredtool)", "finalizing-setup"],
"18": ["seedminer", "bannerbomb3", "installing-boot9strap-(fredtool)", "finalizing-setup"],
"19": ["seedminer", "homebrew-launcher-(pichaxx)", "installing-boot9strap-(frogtool)", "finalizing-setup"],
"20": ["seedminer", "installing-boot9strap-(usm)", "finalizing-setup"],
"22": ["installing-boot9strap-(safecerthax)", "finalizing-setup"],
"23": ["installing-boot9strap-(ssloth-browser)", "finalizing-setup"],
"24": ["seedminer", "installing-boot9strap-(pichaxx)", "finalizing-setup"],
"25": ["installing-boot9strap-(kartdlphax)", "finalizing-setup"],
"0": ["homebrew-launcher-(soundhax)", "installing-boot9strap-(safeb9sinstaller)", "finalizing-setup"],
"1": ["installing-boot9strap-(soundhax)", "finalizing-setup"],
"2": ["ntrboot", "multiple-options", "installing-boot9strap-(ntrboot)", "finalizing-setup"],
"3": ["ntrboot", "flashing-ntrboot-(3ds-single-system)", "installing-boot9strap-(ntrboot)", "finalizing-setup"],
"4": ["ntrboot", "flashing-ntrboot-(3ds-multi-system)", "installing-boot9strap-(ntrboot)", "finalizing-setup"],
"5": ["ntrboot", "flashing-ntrboot-(dsi)", "installing-boot9strap-(ntrboot)", "finalizing-setup"],
"6": ["ntrboot", "flashing-ntrboot-(nds)", "installing-boot9strap-(ntrboot)", "finalizing-setup"],
"7": ["installing-boot9strap-(hardmod)", "finalizing-setup"],
"8": ["seedminer", "multiple-options", "finalizing-setup"],
"9": ["seedminer", "multiple-options", "installing-boot9strap-(fredtool)", "finalizing-setup"],
"10": ["seedminer", "bannerbomb3", "installing-boot9strap-(fredtool)", "finalizing-setup"],
"11": ["seedminer", "installing-boot9strap-(usm)", "finalizing-setup"],
"12": ["seedminer", "installing-boot9strap-(pichaxx)", "finalizing-setup"],
"13": ["installing-boot9strap-(kartdlphax)", "finalizing-setup"],
}
// Can add custom routing if necessary but currently both routes are identical
var device_old = Object.assign({}, device_common,{

File diff suppressed because one or more lines are too long