From 7224db8ef1b5dd05ae7d1de12ebef317e7b424be Mon Sep 17 00:00:00 2001 From: ihaveahax Date: Wed, 12 Oct 2022 10:14:03 -0700 Subject: [PATCH] New Crowdin updates (#2111) * New translations installing-boot9strap-(fredtool).txt (Spanish) * New translations installing-boot9strap-(fredtool).txt (Romanian) * New translations seedminer.txt (Romanian) * New translations installing-boot9strap-(usm).txt (Romanian) * New translations installing-boot9strap-(fredtool).txt (French) * New translations installing-boot9strap-(usm).txt (French) * New translations seedminer.txt (French) * New translations installing-boot9strap-(usm).txt (Korean) * New translations troubleshooting.txt (Korean) * New translations seedminer.txt (Spanish) * New translations installing-boot9strap-(fredtool).txt (Catalan) * New translations seedminer.txt (Catalan) * New translations installing-boot9strap-(usm).txt (Catalan) * New translations installing-boot9strap-(fredtool).txt (Czech) * New translations seedminer.txt (Czech) * New translations installing-boot9strap-(usm).txt (Czech) * New translations installing-boot9strap-(usm).txt (Spanish) * New translations installing-boot9strap-(usm).txt (Arabic) * New translations installing-boot9strap-(fredtool).txt (Arabic) * New translations seedminer.txt (Arabic) * New translations installing-boot9strap-(fredtool).txt (Bulgarian) * New translations seedminer.txt (Bulgarian) * New translations installing-boot9strap-(usm).txt (Bulgarian) * New translations installing-boot9strap-(fredtool).txt (Hebrew) * New translations installing-boot9strap-(usm).txt (Finnish) * New translations installing-boot9strap-(usm).txt (Hebrew) * New translations seedminer.txt (Hebrew) * New translations installing-boot9strap-(fredtool).txt (Hungarian) * New translations seedminer.txt (Finnish) * New translations installing-boot9strap-(fredtool).txt (Finnish) * New translations installing-boot9strap-(fredtool).txt (German) * New translations seedminer.txt (German) * New translations installing-boot9strap-(usm).txt (German) * New translations installing-boot9strap-(fredtool).txt (Greek) * New translations seedminer.txt (Greek) * New translations installing-boot9strap-(usm).txt (Greek) * New translations seedminer.txt (Hungarian) * New translations installing-boot9strap-(usm).txt (Hungarian) * New translations installing-boot9strap-(usm).txt (Japanese) * New translations installing-boot9strap-(fredtool).txt (Japanese) * New translations installing-boot9strap-(fredtool).txt (Korean) * New translations seedminer.txt (Korean) * New translations seedminer.txt (Japanese) * New translations installing-boot9strap-(fredtool).txt (Italian) * New translations seedminer.txt (Italian) * New translations installing-boot9strap-(usm).txt (Italian) * New translations installing-boot9strap-(fredtool).txt (Dutch) * New translations installing-boot9strap-(usm).txt (Dutch) * New translations seedminer.txt (Dutch) * New translations installing-boot9strap-(fredtool).txt (Norwegian) * New translations installing-boot9strap-(fredtool).txt (Russian) * New translations seedminer.txt (Russian) * New translations installing-boot9strap-(usm).txt (Russian) * New translations installing-boot9strap-(fredtool).txt (Swedish) * New translations seedminer.txt (Swedish) * New translations installing-boot9strap-(usm).txt (Swedish) * New translations seedminer.txt (Norwegian) * New translations seedminer.txt (Polish) * New translations installing-boot9strap-(usm).txt (Norwegian) * New translations installing-boot9strap-(fredtool).txt (Polish) * New translations installing-boot9strap-(usm).txt (Polish) * New translations installing-boot9strap-(usm).txt (Portuguese) * New translations installing-boot9strap-(fredtool).txt (Portuguese) * New translations seedminer.txt (Portuguese) * New translations seedminer.txt (Ukrainian) * New translations installing-boot9strap-(usm).txt (Chinese Simplified) * New translations seedminer.txt (Chinese Simplified) * New translations installing-boot9strap-(fredtool).txt (Chinese Simplified) * New translations installing-boot9strap-(usm).txt (Ukrainian) * New translations installing-boot9strap-(fredtool).txt (Ukrainian) * New translations installing-boot9strap-(usm).txt (Turkish) * New translations seedminer.txt (Turkish) * New translations installing-boot9strap-(fredtool).txt (Turkish) * New translations installing-boot9strap-(usm).txt (Chinese Traditional) * New translations seedminer.txt (Chinese Traditional) * New translations installing-boot9strap-(fredtool).txt (Chinese Traditional) * New translations installing-boot9strap-(fredtool).txt (Vietnamese) * New translations seedminer.txt (Vietnamese) * New translations installing-boot9strap-(fredtool).txt (Thai) * New translations seedminer.txt (Thai) * New translations installing-boot9strap-(usm).txt (Thai) * New translations installing-boot9strap-(fredtool).txt (Croatian) * New translations seedminer.txt (Croatian) * New translations installing-boot9strap-(usm).txt (Croatian) * New translations installing-boot9strap-(usm).txt (Vietnamese) * New translations installing-boot9strap-(usm).txt (Portuguese, Brazilian) * New translations installing-boot9strap-(fredtool).txt (Portuguese, Brazilian) * New translations seedminer.txt (Portuguese, Brazilian) * New translations installing-boot9strap-(fredtool).txt (Indonesian) * New translations seedminer.txt (Indonesian) * New translations installing-boot9strap-(usm).txt (Indonesian) * New translations bannerbomb3.txt (Romanian) * New translations installing-boot9strap-(fredtool).txt (Malay) * New translations seedminer.txt (Malay) * New translations installing-boot9strap-(usm).txt (Malay) * New translations installing-boot9strap-(fredtool).txt (Pirate English) * New translations seedminer.txt (Pirate English) * New translations installing-boot9strap-(usm).txt (Pirate English) * New translations bannerbomb3.txt (Spanish) * New translations bannerbomb3.txt (Arabic) * New translations bannerbomb3.txt (French) * New translations bannerbomb3.txt (Catalan) * New translations bannerbomb3.txt (Bulgarian) * New translations bannerbomb3.txt (Czech) * New translations bannerbomb3.txt (Greek) * New translations bannerbomb3.txt (German) * New translations bannerbomb3.txt (Hebrew) * New translations bannerbomb3.txt (Hungarian) * New translations bannerbomb3.txt (Finnish) * New translations bannerbomb3.txt (Japanese) * New translations bannerbomb3.txt (Korean) * New translations bannerbomb3.txt (Italian) * New translations bannerbomb3.txt (Norwegian) * New translations bannerbomb3.txt (Polish) * New translations bannerbomb3.txt (Dutch) * New translations bannerbomb3.txt (Russian) * New translations bannerbomb3.txt (Portuguese) * New translations bannerbomb3.txt (Ukrainian) * New translations bannerbomb3.txt (Swedish) * New translations bannerbomb3.txt (Turkish) * New translations bannerbomb3.txt (Chinese Simplified) * New translations bannerbomb3.txt (Chinese Traditional) * New translations bannerbomb3.txt (Vietnamese) * New translations bannerbomb3.txt (Indonesian) * New translations bannerbomb3.txt (Portuguese, Brazilian) * New translations bannerbomb3.txt (Malay) * New translations bannerbomb3.txt (Croatian) * New translations bannerbomb3.txt (Thai) * New translations troubleshooting.txt (French) * New translations troubleshooting.txt (Spanish) * New translations troubleshooting.txt (Romanian) * New translations bannerbomb3.txt (Pirate English) * New translations troubleshooting.txt (Czech) * New translations troubleshooting.txt (Arabic) * New translations troubleshooting.txt (German) * New translations troubleshooting.txt (Bulgarian) * New translations troubleshooting.txt (Catalan) * New translations troubleshooting.txt (Hebrew) * New translations troubleshooting.txt (Hungarian) * New translations troubleshooting.txt (Greek) * New translations troubleshooting.txt (Finnish) * New translations troubleshooting.txt (Italian) * New translations troubleshooting.txt (Japanese) * New translations troubleshooting.txt (Norwegian) * New translations troubleshooting.txt (Dutch) * New translations troubleshooting.txt (Swedish) * New translations troubleshooting.txt (Turkish) * New translations troubleshooting.txt (Russian) * New translations troubleshooting.txt (Polish) * New translations troubleshooting.txt (Portuguese) * New translations troubleshooting.txt (Chinese Simplified) * New translations troubleshooting.txt (Ukrainian) * New translations troubleshooting.txt (Vietnamese) * New translations troubleshooting.txt (Chinese Traditional) * New translations troubleshooting.txt (Croatian) * New translations troubleshooting.txt (Malay) * New translations troubleshooting.txt (Portuguese, Brazilian) * New translations troubleshooting.txt (Indonesian) * New translations troubleshooting.txt (Thai) * New translations troubleshooting.txt (Pirate English) --- _pages/ar_SA/bannerbomb3.txt | 45 ++++++++++-------- .../installing-boot9strap-(fredtool).txt | 35 +++++++++----- _pages/ar_SA/installing-boot9strap-(usm).txt | 38 ++++----------- _pages/ar_SA/seedminer.txt | 9 ++-- _pages/ar_SA/troubleshooting.txt | 18 +++++-- _pages/bg_BG/bannerbomb3.txt | 45 ++++++++++-------- .../installing-boot9strap-(fredtool).txt | 35 +++++++++----- _pages/bg_BG/installing-boot9strap-(usm).txt | 38 ++++----------- _pages/bg_BG/seedminer.txt | 9 ++-- _pages/bg_BG/troubleshooting.txt | 18 +++++-- _pages/ca_ES/bannerbomb3.txt | 45 ++++++++++-------- .../installing-boot9strap-(fredtool).txt | 35 +++++++++----- _pages/ca_ES/installing-boot9strap-(usm).txt | 38 ++++----------- _pages/ca_ES/seedminer.txt | 9 ++-- _pages/ca_ES/troubleshooting.txt | 18 +++++-- _pages/cs_CZ/bannerbomb3.txt | 45 ++++++++++-------- .../installing-boot9strap-(fredtool).txt | 35 +++++++++----- _pages/cs_CZ/installing-boot9strap-(usm).txt | 38 ++++----------- _pages/cs_CZ/seedminer.txt | 9 ++-- _pages/cs_CZ/troubleshooting.txt | 18 +++++-- _pages/de_DE/bannerbomb3.txt | 45 ++++++++++-------- .../installing-boot9strap-(fredtool).txt | 35 +++++++++----- _pages/de_DE/installing-boot9strap-(usm).txt | 38 ++++----------- _pages/de_DE/seedminer.txt | 9 ++-- _pages/de_DE/troubleshooting.txt | 18 +++++-- _pages/el_GR/bannerbomb3.txt | 45 ++++++++++-------- .../installing-boot9strap-(fredtool).txt | 35 +++++++++----- _pages/el_GR/installing-boot9strap-(usm).txt | 38 ++++----------- _pages/el_GR/seedminer.txt | 9 ++-- _pages/el_GR/troubleshooting.txt | 18 +++++-- _pages/en_PT/bannerbomb3.txt | 45 ++++++++++-------- .../installing-boot9strap-(fredtool).txt | 35 +++++++++----- _pages/en_PT/installing-boot9strap-(usm).txt | 38 ++++----------- _pages/en_PT/seedminer.txt | 9 ++-- _pages/en_PT/troubleshooting.txt | 18 +++++-- _pages/es_ES/bannerbomb3.txt | 45 ++++++++++-------- .../installing-boot9strap-(fredtool).txt | 35 +++++++++----- _pages/es_ES/installing-boot9strap-(usm).txt | 38 ++++----------- _pages/es_ES/seedminer.txt | 9 ++-- _pages/es_ES/troubleshooting.txt | 18 +++++-- _pages/fi_FI/bannerbomb3.txt | 45 ++++++++++-------- .../installing-boot9strap-(fredtool).txt | 35 +++++++++----- _pages/fi_FI/installing-boot9strap-(usm).txt | 38 ++++----------- _pages/fi_FI/seedminer.txt | 9 ++-- _pages/fi_FI/troubleshooting.txt | 18 +++++-- _pages/fr_FR/bannerbomb3.txt | 45 ++++++++++-------- .../installing-boot9strap-(fredtool).txt | 35 +++++++++----- _pages/fr_FR/installing-boot9strap-(usm).txt | 38 ++++----------- _pages/fr_FR/seedminer.txt | 9 ++-- _pages/fr_FR/troubleshooting.txt | 18 +++++-- _pages/he_IL/bannerbomb3.txt | 45 ++++++++++-------- .../installing-boot9strap-(fredtool).txt | 35 +++++++++----- _pages/he_IL/installing-boot9strap-(usm).txt | 38 ++++----------- _pages/he_IL/seedminer.txt | 9 ++-- _pages/he_IL/troubleshooting.txt | 18 +++++-- _pages/hr_HR/bannerbomb3.txt | 45 ++++++++++-------- .../installing-boot9strap-(fredtool).txt | 35 +++++++++----- _pages/hr_HR/installing-boot9strap-(usm).txt | 38 ++++----------- _pages/hr_HR/seedminer.txt | 9 ++-- _pages/hr_HR/troubleshooting.txt | 18 +++++-- _pages/hu_HU/bannerbomb3.txt | 45 ++++++++++-------- .../installing-boot9strap-(fredtool).txt | 35 +++++++++----- _pages/hu_HU/installing-boot9strap-(usm).txt | 38 ++++----------- _pages/hu_HU/seedminer.txt | 9 ++-- _pages/hu_HU/troubleshooting.txt | 18 +++++-- _pages/id_ID/bannerbomb3.txt | 45 ++++++++++-------- .../installing-boot9strap-(fredtool).txt | 35 +++++++++----- _pages/id_ID/installing-boot9strap-(usm).txt | 38 ++++----------- _pages/id_ID/seedminer.txt | 9 ++-- _pages/id_ID/troubleshooting.txt | 18 +++++-- _pages/it_IT/bannerbomb3.txt | 45 ++++++++++-------- .../installing-boot9strap-(fredtool).txt | 35 +++++++++----- _pages/it_IT/installing-boot9strap-(usm).txt | 38 ++++----------- _pages/it_IT/seedminer.txt | 9 ++-- _pages/it_IT/troubleshooting.txt | 18 +++++-- _pages/ja_JP/bannerbomb3.txt | 45 ++++++++++-------- .../installing-boot9strap-(fredtool).txt | 35 +++++++++----- _pages/ja_JP/installing-boot9strap-(usm).txt | 38 ++++----------- _pages/ja_JP/seedminer.txt | 9 ++-- _pages/ja_JP/troubleshooting.txt | 18 +++++-- _pages/ko_KR/bannerbomb3.txt | 45 ++++++++++-------- .../installing-boot9strap-(fredtool).txt | 35 +++++++++----- _pages/ko_KR/installing-boot9strap-(usm).txt | 38 ++++----------- _pages/ko_KR/seedminer.txt | 9 ++-- _pages/ko_KR/troubleshooting.txt | 18 +++++-- _pages/ms_MY/bannerbomb3.txt | 45 ++++++++++-------- .../installing-boot9strap-(fredtool).txt | 35 +++++++++----- _pages/ms_MY/installing-boot9strap-(usm).txt | 38 ++++----------- _pages/ms_MY/seedminer.txt | 9 ++-- _pages/ms_MY/troubleshooting.txt | 18 +++++-- _pages/nl_NL/bannerbomb3.txt | 45 ++++++++++-------- .../installing-boot9strap-(fredtool).txt | 35 +++++++++----- _pages/nl_NL/installing-boot9strap-(usm).txt | 38 ++++----------- _pages/nl_NL/seedminer.txt | 9 ++-- _pages/nl_NL/troubleshooting.txt | 18 +++++-- _pages/no_NO/bannerbomb3.txt | 45 ++++++++++-------- .../installing-boot9strap-(fredtool).txt | 35 +++++++++----- _pages/no_NO/installing-boot9strap-(usm).txt | 38 ++++----------- _pages/no_NO/seedminer.txt | 9 ++-- _pages/no_NO/troubleshooting.txt | 18 +++++-- _pages/pl_PL/bannerbomb3.txt | 45 ++++++++++-------- .../installing-boot9strap-(fredtool).txt | 35 +++++++++----- _pages/pl_PL/installing-boot9strap-(usm).txt | 38 ++++----------- _pages/pl_PL/seedminer.txt | 9 ++-- _pages/pl_PL/troubleshooting.txt | 18 +++++-- _pages/pt_BR/bannerbomb3.txt | 47 ++++++++++--------- .../installing-boot9strap-(fredtool).txt | 35 +++++++++----- _pages/pt_BR/installing-boot9strap-(usm).txt | 38 ++++----------- _pages/pt_BR/seedminer.txt | 9 ++-- _pages/pt_BR/troubleshooting.txt | 20 +++++--- _pages/pt_PT/bannerbomb3.txt | 45 ++++++++++-------- .../installing-boot9strap-(fredtool).txt | 35 +++++++++----- _pages/pt_PT/installing-boot9strap-(usm).txt | 38 ++++----------- _pages/pt_PT/seedminer.txt | 9 ++-- _pages/pt_PT/troubleshooting.txt | 18 +++++-- _pages/ro_RO/bannerbomb3.txt | 45 ++++++++++-------- .../installing-boot9strap-(fredtool).txt | 35 +++++++++----- _pages/ro_RO/installing-boot9strap-(usm).txt | 38 ++++----------- _pages/ro_RO/seedminer.txt | 9 ++-- _pages/ro_RO/troubleshooting.txt | 18 +++++-- _pages/ru_RU/bannerbomb3.txt | 45 ++++++++++-------- .../installing-boot9strap-(fredtool).txt | 35 +++++++++----- _pages/ru_RU/installing-boot9strap-(usm).txt | 38 ++++----------- _pages/ru_RU/seedminer.txt | 9 ++-- _pages/ru_RU/troubleshooting.txt | 18 +++++-- _pages/sv_SE/bannerbomb3.txt | 45 ++++++++++-------- .../installing-boot9strap-(fredtool).txt | 35 +++++++++----- _pages/sv_SE/installing-boot9strap-(usm).txt | 38 ++++----------- _pages/sv_SE/seedminer.txt | 9 ++-- _pages/sv_SE/troubleshooting.txt | 18 +++++-- _pages/th_TH/bannerbomb3.txt | 45 ++++++++++-------- .../installing-boot9strap-(fredtool).txt | 35 +++++++++----- _pages/th_TH/installing-boot9strap-(usm).txt | 38 ++++----------- _pages/th_TH/seedminer.txt | 9 ++-- _pages/th_TH/troubleshooting.txt | 18 +++++-- _pages/tr_TR/bannerbomb3.txt | 45 ++++++++++-------- .../installing-boot9strap-(fredtool).txt | 35 +++++++++----- _pages/tr_TR/installing-boot9strap-(usm).txt | 38 ++++----------- _pages/tr_TR/seedminer.txt | 9 ++-- _pages/tr_TR/troubleshooting.txt | 18 +++++-- _pages/uk_UA/bannerbomb3.txt | 45 ++++++++++-------- .../installing-boot9strap-(fredtool).txt | 35 +++++++++----- _pages/uk_UA/installing-boot9strap-(usm).txt | 38 ++++----------- _pages/uk_UA/seedminer.txt | 9 ++-- _pages/uk_UA/troubleshooting.txt | 18 +++++-- _pages/vi_VN/bannerbomb3.txt | 45 ++++++++++-------- .../installing-boot9strap-(fredtool).txt | 35 +++++++++----- _pages/vi_VN/installing-boot9strap-(usm).txt | 38 ++++----------- _pages/vi_VN/seedminer.txt | 9 ++-- _pages/vi_VN/troubleshooting.txt | 18 +++++-- _pages/zh_CN/bannerbomb3.txt | 45 ++++++++++-------- .../installing-boot9strap-(fredtool).txt | 37 ++++++++++----- _pages/zh_CN/installing-boot9strap-(usm).txt | 38 ++++----------- _pages/zh_CN/seedminer.txt | 9 ++-- _pages/zh_CN/troubleshooting.txt | 18 +++++-- _pages/zh_TW/bannerbomb3.txt | 45 ++++++++++-------- .../installing-boot9strap-(fredtool).txt | 35 +++++++++----- _pages/zh_TW/installing-boot9strap-(usm).txt | 38 ++++----------- _pages/zh_TW/seedminer.txt | 9 ++-- _pages/zh_TW/troubleshooting.txt | 18 +++++-- 160 files changed, 2467 insertions(+), 2179 deletions(-) diff --git a/_pages/ar_SA/bannerbomb3.txt b/_pages/ar_SA/bannerbomb3.txt index 5a46749529..ea5034f134 100644 --- a/_pages/ar_SA/bannerbomb3.txt +++ b/_pages/ar_SA/bannerbomb3.txt @@ -6,8 +6,8 @@ title: "BannerBomb3"
Technical Details (optional) -

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

For a more technical explanation, see here.

{: .notice--info} @@ -27,38 +27,43 @@ If you have a Taiwanese console (indicated by a T after the system version), fol In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. -1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` inside of a zip file (`BannerBomb3.zip`) -1. If your console is powered on, power off your console +1. Power off your device 1. Insert your SD card into your computer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} -#### Section II - BannerBomb3 +#### Section II - Hardware Button Check -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. +In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked +1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) +1. If prompted to update, press Cancel + + If the device boots to the HOME Menu, just continue to the next step 1. Power off your device -1. Insert your SD card into your computer -1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore +___ -Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +### Next steps: Choose an exploit + +If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. + +If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} + +If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +{: .notice--warning} diff --git a/_pages/ar_SA/installing-boot9strap-(fredtool).txt b/_pages/ar_SA/installing-boot9strap-(fredtool).txt index 1f7825ac28..a14f20f6ba 100644 --- a/_pages/ar_SA/installing-boot9strap-(fredtool).txt +++ b/_pages/ar_SA/installing-boot9strap-(fredtool).txt @@ -6,14 +6,13 @@ title: "Installing boot9strap (Fredtool)"
Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

{: .notice--info} ### What You Need -* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -27,17 +26,32 @@ As an additional safety measure, we will perform an additional check for custom 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button 1. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide +1. Power off your device -If you see a configuration menu, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. {: .notice--danger} + +#### Section II - BannerBomb3 -#### Section II - Prep Work +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically power off + +#### Section III - Prep Work In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. +1. Insert your SD card into your computer 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file using the first "Browse..." option +1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option 1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) 1. Click "Build" @@ -46,7 +60,6 @@ In this section, you will copy the files necessary to temporarily replace DS Con 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link -1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` @@ -60,7 +73,7 @@ In this section, you will copy the files necessary to temporarily replace DS Con ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### Section III - Overwriting DS Connection Settings +#### Section IV - Overwriting DS Connection Settings In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. @@ -73,7 +86,7 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte 1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio -#### Section IV - Flipnote Exploit +#### Section V - Flipnote Exploit If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} @@ -99,7 +112,7 @@ In this section, you will perform a series of very specific steps within Flipnot + If your device shuts down when you try to power it on, ensure that you have copied `boot.firm` from the Luma3DS `.zip` to the root of your SD card + If you see the Luma Configuration screen, press (Start) to reboot, then continue with the guide -#### Section V - Luma3DS Verification +#### Section VI - Luma3DS Verification Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. @@ -113,9 +126,9 @@ At this point, your console will boot to Luma3DS by default. + Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware. + On the next page, you will install useful homebrew applications to complete your setup. -#### Section VI - Restoring DS Connection Settings +#### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card 1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one diff --git a/_pages/ar_SA/installing-boot9strap-(usm).txt b/_pages/ar_SA/installing-boot9strap-(usm).txt index b58fa784a2..4861044daf 100644 --- a/_pages/ar_SA/installing-boot9strap-(usm).txt +++ b/_pages/ar_SA/installing-boot9strap-(usm).txt @@ -18,45 +18,28 @@ title: "Installing boot9strap (USM)" These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. +If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--warning} ### What You Need -* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) * The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. +In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. -1. If your device is powered on, power off your device -1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` and a SAFE_MODE exploit data file called `usm.bin` inside of a zip archive (`unSAFE_MODE.zip`) -1. Insert your SD card into your computer +1. Your SD card should be inserted in your computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Create a folder named `boot9strap` on the root of your SD card 1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} - ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +1. Copy `usm.bin` to the root of your SD card #### Section II - BannerBomb3 @@ -66,9 +49,9 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana 1. Power on your device 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) - + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Press (A) to select "Inject haxx" + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-usm) +1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + Your device will automatically power off #### Section III - unSAFE_MODE @@ -77,7 +60,7 @@ In this section, you will enter Safe Mode (a feature available on all 3DS family 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) - + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of BannerBomb3](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions @@ -107,8 +90,7 @@ In this section, you will trigger the BannerBomb3 exploit a second time so that 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) -1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" +1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" + Your device will automatically reboot 1. Power off your device 1. Insert your SD card into your computer diff --git a/_pages/ar_SA/seedminer.txt b/_pages/ar_SA/seedminer.txt index 8ecc9a8637..b6d7e339df 100644 --- a/_pages/ar_SA/seedminer.txt +++ b/_pages/ar_SA/seedminer.txt @@ -56,6 +56,7 @@ In this section, you will use the Bruteforce Movable website to retrieve your de + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages +1. Power off your device ___ @@ -63,11 +64,11 @@ ___ Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. -#### unSAFE_MODE (Recommended) +#### BannerBomb3 -This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the SAFE_MODE firmware present in all 3DS units. +This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the System Settings application. -Continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +Continue to [BannerBomb3](bannerbomb3) {: .notice--primary} ___ @@ -77,4 +78,4 @@ ___ If you have a Taiwanese device (indicated with a T at the end of the system version, such as 11.15.0-39**T**), you must follow this route. **Other regions may not follow this route.** Continue to [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) -{: .notice--warning} \ No newline at end of file +{: .notice--warning} diff --git a/_pages/ar_SA/troubleshooting.txt b/_pages/ar_SA/troubleshooting.txt index 05797b7bdb..2668e098fc 100644 --- a/_pages/ar_SA/troubleshooting.txt +++ b/_pages/ar_SA/troubleshooting.txt @@ -126,11 +126,11 @@ If this is unsuccessful, try using another SD card. ## Installing boot9strap (USM) -### DSiWare Management menu crashes without showing USM menu +### DSiWare Management menu crashes without showing BB3 multihax menu (USM) -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php). +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). -Also, ensure that `usm.bin` is on the root of the SD card. If it is missing, then download the latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) (the RELEASE `.zip` file), and copy the `usm.bin` file to the root of your SD card. +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, you will need to follow [an alternate branch of Seedminer](homebrew-launcher-(pichaxx)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. @@ -144,16 +144,24 @@ If neither of these solutions fixes this problem, then custom firmware may have ### DSiWare Management shows a question mark -There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php), ensuring that you use the `movable.sed` file for your console. +There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen), ensuring that you use the `movable.sed` file for your console. ### DSiWare Management menu crashes without purple screen -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. --- ## Installing boot9strap (Fredtool) +### DSiWare Management menu crashes without showing BB3 multihax menu (Fredtool) + +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). + +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. + +If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + ### Error on Fredtool Injector page Ensure that your `movable.sed` and DSiWare backup come from the same console. A mismatch will result in an error. diff --git a/_pages/bg_BG/bannerbomb3.txt b/_pages/bg_BG/bannerbomb3.txt index 5a46749529..ea5034f134 100644 --- a/_pages/bg_BG/bannerbomb3.txt +++ b/_pages/bg_BG/bannerbomb3.txt @@ -6,8 +6,8 @@ title: "BannerBomb3"
Technical Details (optional) -

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

For a more technical explanation, see here.

{: .notice--info} @@ -27,38 +27,43 @@ If you have a Taiwanese console (indicated by a T after the system version), fol In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. -1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` inside of a zip file (`BannerBomb3.zip`) -1. If your console is powered on, power off your console +1. Power off your device 1. Insert your SD card into your computer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} -#### Section II - BannerBomb3 +#### Section II - Hardware Button Check -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. +In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked +1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) +1. If prompted to update, press Cancel + + If the device boots to the HOME Menu, just continue to the next step 1. Power off your device -1. Insert your SD card into your computer -1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore +___ -Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +### Next steps: Choose an exploit + +If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. + +If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} + +If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +{: .notice--warning} diff --git a/_pages/bg_BG/installing-boot9strap-(fredtool).txt b/_pages/bg_BG/installing-boot9strap-(fredtool).txt index 1f7825ac28..a14f20f6ba 100644 --- a/_pages/bg_BG/installing-boot9strap-(fredtool).txt +++ b/_pages/bg_BG/installing-boot9strap-(fredtool).txt @@ -6,14 +6,13 @@ title: "Installing boot9strap (Fredtool)"
Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

{: .notice--info} ### What You Need -* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -27,17 +26,32 @@ As an additional safety measure, we will perform an additional check for custom 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button 1. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide +1. Power off your device -If you see a configuration menu, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. {: .notice--danger} + +#### Section II - BannerBomb3 -#### Section II - Prep Work +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically power off + +#### Section III - Prep Work In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. +1. Insert your SD card into your computer 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file using the first "Browse..." option +1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option 1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) 1. Click "Build" @@ -46,7 +60,6 @@ In this section, you will copy the files necessary to temporarily replace DS Con 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link -1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` @@ -60,7 +73,7 @@ In this section, you will copy the files necessary to temporarily replace DS Con ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### Section III - Overwriting DS Connection Settings +#### Section IV - Overwriting DS Connection Settings In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. @@ -73,7 +86,7 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte 1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio -#### Section IV - Flipnote Exploit +#### Section V - Flipnote Exploit If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} @@ -99,7 +112,7 @@ In this section, you will perform a series of very specific steps within Flipnot + If your device shuts down when you try to power it on, ensure that you have copied `boot.firm` from the Luma3DS `.zip` to the root of your SD card + If you see the Luma Configuration screen, press (Start) to reboot, then continue with the guide -#### Section V - Luma3DS Verification +#### Section VI - Luma3DS Verification Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. @@ -113,9 +126,9 @@ At this point, your console will boot to Luma3DS by default. + Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware. + On the next page, you will install useful homebrew applications to complete your setup. -#### Section VI - Restoring DS Connection Settings +#### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card 1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one diff --git a/_pages/bg_BG/installing-boot9strap-(usm).txt b/_pages/bg_BG/installing-boot9strap-(usm).txt index b58fa784a2..4861044daf 100644 --- a/_pages/bg_BG/installing-boot9strap-(usm).txt +++ b/_pages/bg_BG/installing-boot9strap-(usm).txt @@ -18,45 +18,28 @@ title: "Installing boot9strap (USM)" These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. +If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--warning} ### What You Need -* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) * The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. +In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. -1. If your device is powered on, power off your device -1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` and a SAFE_MODE exploit data file called `usm.bin` inside of a zip archive (`unSAFE_MODE.zip`) -1. Insert your SD card into your computer +1. Your SD card should be inserted in your computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Create a folder named `boot9strap` on the root of your SD card 1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} - ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +1. Copy `usm.bin` to the root of your SD card #### Section II - BannerBomb3 @@ -66,9 +49,9 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana 1. Power on your device 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) - + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Press (A) to select "Inject haxx" + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-usm) +1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + Your device will automatically power off #### Section III - unSAFE_MODE @@ -77,7 +60,7 @@ In this section, you will enter Safe Mode (a feature available on all 3DS family 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) - + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of BannerBomb3](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions @@ -107,8 +90,7 @@ In this section, you will trigger the BannerBomb3 exploit a second time so that 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) -1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" +1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" + Your device will automatically reboot 1. Power off your device 1. Insert your SD card into your computer diff --git a/_pages/bg_BG/seedminer.txt b/_pages/bg_BG/seedminer.txt index 8ecc9a8637..b6d7e339df 100644 --- a/_pages/bg_BG/seedminer.txt +++ b/_pages/bg_BG/seedminer.txt @@ -56,6 +56,7 @@ In this section, you will use the Bruteforce Movable website to retrieve your de + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages +1. Power off your device ___ @@ -63,11 +64,11 @@ ___ Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. -#### unSAFE_MODE (Recommended) +#### BannerBomb3 -This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the SAFE_MODE firmware present in all 3DS units. +This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the System Settings application. -Continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +Continue to [BannerBomb3](bannerbomb3) {: .notice--primary} ___ @@ -77,4 +78,4 @@ ___ If you have a Taiwanese device (indicated with a T at the end of the system version, such as 11.15.0-39**T**), you must follow this route. **Other regions may not follow this route.** Continue to [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) -{: .notice--warning} \ No newline at end of file +{: .notice--warning} diff --git a/_pages/bg_BG/troubleshooting.txt b/_pages/bg_BG/troubleshooting.txt index 05797b7bdb..2668e098fc 100644 --- a/_pages/bg_BG/troubleshooting.txt +++ b/_pages/bg_BG/troubleshooting.txt @@ -126,11 +126,11 @@ If this is unsuccessful, try using another SD card. ## Installing boot9strap (USM) -### DSiWare Management menu crashes without showing USM menu +### DSiWare Management menu crashes without showing BB3 multihax menu (USM) -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php). +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). -Also, ensure that `usm.bin` is on the root of the SD card. If it is missing, then download the latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) (the RELEASE `.zip` file), and copy the `usm.bin` file to the root of your SD card. +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, you will need to follow [an alternate branch of Seedminer](homebrew-launcher-(pichaxx)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. @@ -144,16 +144,24 @@ If neither of these solutions fixes this problem, then custom firmware may have ### DSiWare Management shows a question mark -There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php), ensuring that you use the `movable.sed` file for your console. +There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen), ensuring that you use the `movable.sed` file for your console. ### DSiWare Management menu crashes without purple screen -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. --- ## Installing boot9strap (Fredtool) +### DSiWare Management menu crashes without showing BB3 multihax menu (Fredtool) + +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). + +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. + +If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + ### Error on Fredtool Injector page Ensure that your `movable.sed` and DSiWare backup come from the same console. A mismatch will result in an error. diff --git a/_pages/ca_ES/bannerbomb3.txt b/_pages/ca_ES/bannerbomb3.txt index 5a46749529..ea5034f134 100644 --- a/_pages/ca_ES/bannerbomb3.txt +++ b/_pages/ca_ES/bannerbomb3.txt @@ -6,8 +6,8 @@ title: "BannerBomb3"
Technical Details (optional) -

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

For a more technical explanation, see here.

{: .notice--info} @@ -27,38 +27,43 @@ If you have a Taiwanese console (indicated by a T after the system version), fol In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. -1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` inside of a zip file (`BannerBomb3.zip`) -1. If your console is powered on, power off your console +1. Power off your device 1. Insert your SD card into your computer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} -#### Section II - BannerBomb3 +#### Section II - Hardware Button Check -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. +In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked +1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) +1. If prompted to update, press Cancel + + If the device boots to the HOME Menu, just continue to the next step 1. Power off your device -1. Insert your SD card into your computer -1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore +___ -Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +### Next steps: Choose an exploit + +If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. + +If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} + +If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +{: .notice--warning} diff --git a/_pages/ca_ES/installing-boot9strap-(fredtool).txt b/_pages/ca_ES/installing-boot9strap-(fredtool).txt index 1f7825ac28..a14f20f6ba 100644 --- a/_pages/ca_ES/installing-boot9strap-(fredtool).txt +++ b/_pages/ca_ES/installing-boot9strap-(fredtool).txt @@ -6,14 +6,13 @@ title: "Installing boot9strap (Fredtool)"
Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

{: .notice--info} ### What You Need -* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -27,17 +26,32 @@ As an additional safety measure, we will perform an additional check for custom 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button 1. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide +1. Power off your device -If you see a configuration menu, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. {: .notice--danger} + +#### Section II - BannerBomb3 -#### Section II - Prep Work +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically power off + +#### Section III - Prep Work In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. +1. Insert your SD card into your computer 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file using the first "Browse..." option +1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option 1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) 1. Click "Build" @@ -46,7 +60,6 @@ In this section, you will copy the files necessary to temporarily replace DS Con 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link -1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` @@ -60,7 +73,7 @@ In this section, you will copy the files necessary to temporarily replace DS Con ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### Section III - Overwriting DS Connection Settings +#### Section IV - Overwriting DS Connection Settings In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. @@ -73,7 +86,7 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte 1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio -#### Section IV - Flipnote Exploit +#### Section V - Flipnote Exploit If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} @@ -99,7 +112,7 @@ In this section, you will perform a series of very specific steps within Flipnot + If your device shuts down when you try to power it on, ensure that you have copied `boot.firm` from the Luma3DS `.zip` to the root of your SD card + If you see the Luma Configuration screen, press (Start) to reboot, then continue with the guide -#### Section V - Luma3DS Verification +#### Section VI - Luma3DS Verification Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. @@ -113,9 +126,9 @@ At this point, your console will boot to Luma3DS by default. + Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware. + On the next page, you will install useful homebrew applications to complete your setup. -#### Section VI - Restoring DS Connection Settings +#### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card 1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one diff --git a/_pages/ca_ES/installing-boot9strap-(usm).txt b/_pages/ca_ES/installing-boot9strap-(usm).txt index b58fa784a2..4861044daf 100644 --- a/_pages/ca_ES/installing-boot9strap-(usm).txt +++ b/_pages/ca_ES/installing-boot9strap-(usm).txt @@ -18,45 +18,28 @@ title: "Installing boot9strap (USM)" These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. +If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--warning} ### What You Need -* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) * The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. +In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. -1. If your device is powered on, power off your device -1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` and a SAFE_MODE exploit data file called `usm.bin` inside of a zip archive (`unSAFE_MODE.zip`) -1. Insert your SD card into your computer +1. Your SD card should be inserted in your computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Create a folder named `boot9strap` on the root of your SD card 1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} - ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +1. Copy `usm.bin` to the root of your SD card #### Section II - BannerBomb3 @@ -66,9 +49,9 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana 1. Power on your device 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) - + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Press (A) to select "Inject haxx" + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-usm) +1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + Your device will automatically power off #### Section III - unSAFE_MODE @@ -77,7 +60,7 @@ In this section, you will enter Safe Mode (a feature available on all 3DS family 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) - + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of BannerBomb3](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions @@ -107,8 +90,7 @@ In this section, you will trigger the BannerBomb3 exploit a second time so that 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) -1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" +1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" + Your device will automatically reboot 1. Power off your device 1. Insert your SD card into your computer diff --git a/_pages/ca_ES/seedminer.txt b/_pages/ca_ES/seedminer.txt index 8ecc9a8637..b6d7e339df 100644 --- a/_pages/ca_ES/seedminer.txt +++ b/_pages/ca_ES/seedminer.txt @@ -56,6 +56,7 @@ In this section, you will use the Bruteforce Movable website to retrieve your de + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages +1. Power off your device ___ @@ -63,11 +64,11 @@ ___ Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. -#### unSAFE_MODE (Recommended) +#### BannerBomb3 -This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the SAFE_MODE firmware present in all 3DS units. +This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the System Settings application. -Continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +Continue to [BannerBomb3](bannerbomb3) {: .notice--primary} ___ @@ -77,4 +78,4 @@ ___ If you have a Taiwanese device (indicated with a T at the end of the system version, such as 11.15.0-39**T**), you must follow this route. **Other regions may not follow this route.** Continue to [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) -{: .notice--warning} \ No newline at end of file +{: .notice--warning} diff --git a/_pages/ca_ES/troubleshooting.txt b/_pages/ca_ES/troubleshooting.txt index 05797b7bdb..2668e098fc 100644 --- a/_pages/ca_ES/troubleshooting.txt +++ b/_pages/ca_ES/troubleshooting.txt @@ -126,11 +126,11 @@ If this is unsuccessful, try using another SD card. ## Installing boot9strap (USM) -### DSiWare Management menu crashes without showing USM menu +### DSiWare Management menu crashes without showing BB3 multihax menu (USM) -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php). +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). -Also, ensure that `usm.bin` is on the root of the SD card. If it is missing, then download the latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) (the RELEASE `.zip` file), and copy the `usm.bin` file to the root of your SD card. +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, you will need to follow [an alternate branch of Seedminer](homebrew-launcher-(pichaxx)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. @@ -144,16 +144,24 @@ If neither of these solutions fixes this problem, then custom firmware may have ### DSiWare Management shows a question mark -There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php), ensuring that you use the `movable.sed` file for your console. +There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen), ensuring that you use the `movable.sed` file for your console. ### DSiWare Management menu crashes without purple screen -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. --- ## Installing boot9strap (Fredtool) +### DSiWare Management menu crashes without showing BB3 multihax menu (Fredtool) + +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). + +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. + +If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + ### Error on Fredtool Injector page Ensure that your `movable.sed` and DSiWare backup come from the same console. A mismatch will result in an error. diff --git a/_pages/cs_CZ/bannerbomb3.txt b/_pages/cs_CZ/bannerbomb3.txt index 5a46749529..ea5034f134 100644 --- a/_pages/cs_CZ/bannerbomb3.txt +++ b/_pages/cs_CZ/bannerbomb3.txt @@ -6,8 +6,8 @@ title: "BannerBomb3"
Technical Details (optional) -

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

For a more technical explanation, see here.

{: .notice--info} @@ -27,38 +27,43 @@ If you have a Taiwanese console (indicated by a T after the system version), fol In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. -1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` inside of a zip file (`BannerBomb3.zip`) -1. If your console is powered on, power off your console +1. Power off your device 1. Insert your SD card into your computer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} -#### Section II - BannerBomb3 +#### Section II - Hardware Button Check -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. +In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked +1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) +1. If prompted to update, press Cancel + + If the device boots to the HOME Menu, just continue to the next step 1. Power off your device -1. Insert your SD card into your computer -1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore +___ -Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +### Next steps: Choose an exploit + +If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. + +If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} + +If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +{: .notice--warning} diff --git a/_pages/cs_CZ/installing-boot9strap-(fredtool).txt b/_pages/cs_CZ/installing-boot9strap-(fredtool).txt index 1f7825ac28..a14f20f6ba 100644 --- a/_pages/cs_CZ/installing-boot9strap-(fredtool).txt +++ b/_pages/cs_CZ/installing-boot9strap-(fredtool).txt @@ -6,14 +6,13 @@ title: "Installing boot9strap (Fredtool)"
Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

{: .notice--info} ### What You Need -* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -27,17 +26,32 @@ As an additional safety measure, we will perform an additional check for custom 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button 1. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide +1. Power off your device -If you see a configuration menu, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. {: .notice--danger} + +#### Section II - BannerBomb3 -#### Section II - Prep Work +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically power off + +#### Section III - Prep Work In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. +1. Insert your SD card into your computer 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file using the first "Browse..." option +1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option 1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) 1. Click "Build" @@ -46,7 +60,6 @@ In this section, you will copy the files necessary to temporarily replace DS Con 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link -1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` @@ -60,7 +73,7 @@ In this section, you will copy the files necessary to temporarily replace DS Con ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### Section III - Overwriting DS Connection Settings +#### Section IV - Overwriting DS Connection Settings In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. @@ -73,7 +86,7 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte 1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio -#### Section IV - Flipnote Exploit +#### Section V - Flipnote Exploit If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} @@ -99,7 +112,7 @@ In this section, you will perform a series of very specific steps within Flipnot + If your device shuts down when you try to power it on, ensure that you have copied `boot.firm` from the Luma3DS `.zip` to the root of your SD card + If you see the Luma Configuration screen, press (Start) to reboot, then continue with the guide -#### Section V - Luma3DS Verification +#### Section VI - Luma3DS Verification Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. @@ -113,9 +126,9 @@ At this point, your console will boot to Luma3DS by default. + Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware. + On the next page, you will install useful homebrew applications to complete your setup. -#### Section VI - Restoring DS Connection Settings +#### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card 1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one diff --git a/_pages/cs_CZ/installing-boot9strap-(usm).txt b/_pages/cs_CZ/installing-boot9strap-(usm).txt index b58fa784a2..4861044daf 100644 --- a/_pages/cs_CZ/installing-boot9strap-(usm).txt +++ b/_pages/cs_CZ/installing-boot9strap-(usm).txt @@ -18,45 +18,28 @@ title: "Installing boot9strap (USM)" These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. +If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--warning} ### What You Need -* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) * The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. +In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. -1. If your device is powered on, power off your device -1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` and a SAFE_MODE exploit data file called `usm.bin` inside of a zip archive (`unSAFE_MODE.zip`) -1. Insert your SD card into your computer +1. Your SD card should be inserted in your computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Create a folder named `boot9strap` on the root of your SD card 1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} - ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +1. Copy `usm.bin` to the root of your SD card #### Section II - BannerBomb3 @@ -66,9 +49,9 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana 1. Power on your device 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) - + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Press (A) to select "Inject haxx" + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-usm) +1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + Your device will automatically power off #### Section III - unSAFE_MODE @@ -77,7 +60,7 @@ In this section, you will enter Safe Mode (a feature available on all 3DS family 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) - + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of BannerBomb3](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions @@ -107,8 +90,7 @@ In this section, you will trigger the BannerBomb3 exploit a second time so that 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) -1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" +1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" + Your device will automatically reboot 1. Power off your device 1. Insert your SD card into your computer diff --git a/_pages/cs_CZ/seedminer.txt b/_pages/cs_CZ/seedminer.txt index 8ecc9a8637..b6d7e339df 100644 --- a/_pages/cs_CZ/seedminer.txt +++ b/_pages/cs_CZ/seedminer.txt @@ -56,6 +56,7 @@ In this section, you will use the Bruteforce Movable website to retrieve your de + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages +1. Power off your device ___ @@ -63,11 +64,11 @@ ___ Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. -#### unSAFE_MODE (Recommended) +#### BannerBomb3 -This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the SAFE_MODE firmware present in all 3DS units. +This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the System Settings application. -Continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +Continue to [BannerBomb3](bannerbomb3) {: .notice--primary} ___ @@ -77,4 +78,4 @@ ___ If you have a Taiwanese device (indicated with a T at the end of the system version, such as 11.15.0-39**T**), you must follow this route. **Other regions may not follow this route.** Continue to [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) -{: .notice--warning} \ No newline at end of file +{: .notice--warning} diff --git a/_pages/cs_CZ/troubleshooting.txt b/_pages/cs_CZ/troubleshooting.txt index 05797b7bdb..2668e098fc 100644 --- a/_pages/cs_CZ/troubleshooting.txt +++ b/_pages/cs_CZ/troubleshooting.txt @@ -126,11 +126,11 @@ If this is unsuccessful, try using another SD card. ## Installing boot9strap (USM) -### DSiWare Management menu crashes without showing USM menu +### DSiWare Management menu crashes without showing BB3 multihax menu (USM) -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php). +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). -Also, ensure that `usm.bin` is on the root of the SD card. If it is missing, then download the latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) (the RELEASE `.zip` file), and copy the `usm.bin` file to the root of your SD card. +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, you will need to follow [an alternate branch of Seedminer](homebrew-launcher-(pichaxx)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. @@ -144,16 +144,24 @@ If neither of these solutions fixes this problem, then custom firmware may have ### DSiWare Management shows a question mark -There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php), ensuring that you use the `movable.sed` file for your console. +There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen), ensuring that you use the `movable.sed` file for your console. ### DSiWare Management menu crashes without purple screen -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. --- ## Installing boot9strap (Fredtool) +### DSiWare Management menu crashes without showing BB3 multihax menu (Fredtool) + +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). + +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. + +If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + ### Error on Fredtool Injector page Ensure that your `movable.sed` and DSiWare backup come from the same console. A mismatch will result in an error. diff --git a/_pages/de_DE/bannerbomb3.txt b/_pages/de_DE/bannerbomb3.txt index 0abfcaa144..abb63628eb 100644 --- a/_pages/de_DE/bannerbomb3.txt +++ b/_pages/de_DE/bannerbomb3.txt @@ -6,8 +6,8 @@ title: "BannerBomb3"
Technical Details (optional) -

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

For a more technical explanation, see here.

{: .notice--info} @@ -27,38 +27,43 @@ If you have a Taiwanese console (indicated by a T after the system version), fol In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. -1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` inside of a zip file (`BannerBomb3.zip`) -1. If your console is powered on, power off your console +1. Schalte deinen 3DS aus 1. Stecke deine SD-Karte in deinen Computer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} -#### Section II - BannerBomb3 +#### Section II - Hardware Button Check -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. +In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. -1. Stecke deine SD-Karte nun wieder in deinen 3DS -1. Schalte deine Konsole an -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked +1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) +1. If prompted to update, press Cancel + + If the device boots to the HOME Menu, just continue to the next step 1. Schalte deinen 3DS aus -1. Stecke deine SD-Karte in deinen Computer -1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore +___ -Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +### Next steps: Choose an exploit + +If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. + +If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} + +If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +{: .notice--warning} diff --git a/_pages/de_DE/installing-boot9strap-(fredtool).txt b/_pages/de_DE/installing-boot9strap-(fredtool).txt index 83f686c572..ccf9090fe3 100644 --- a/_pages/de_DE/installing-boot9strap-(fredtool).txt +++ b/_pages/de_DE/installing-boot9strap-(fredtool).txt @@ -6,14 +6,13 @@ title: "Installing boot9strap (Fredtool)"
Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

{: .notice--info} ### Was du brauchst -* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -27,17 +26,32 @@ As an additional safety measure, we will perform an additional check for custom 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button 1. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide +1. Schalte deinen 3DS aus -If you see a configuration menu, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. {: .notice--danger} + +#### Section II - BannerBomb3 -#### Section II - Prep Work +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Stecke deine SD-Karte nun wieder in deinen 3DS +1. Schalte deine Konsole an +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically power off + +#### Section III - Prep Work In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. +1. Stecke deine SD-Karte in deinen Computer 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file using the first "Browse..." option +1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option 1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) 1. Click "Build" @@ -46,7 +60,6 @@ In this section, you will copy the files necessary to temporarily replace DS Con 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link -1. Stecke deine SD-Karte in deinen Computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` @@ -60,7 +73,7 @@ In this section, you will copy the files necessary to temporarily replace DS Con ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### Section III - Overwriting DS Connection Settings +#### Section IV - Overwriting DS Connection Settings In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. @@ -73,7 +86,7 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte 1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio -#### Section IV - Flipnote Exploit +#### Section V - Flipnote Exploit If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} @@ -99,7 +112,7 @@ In this section, you will perform a series of very specific steps within Flipnot + If your device shuts down when you try to power it on, ensure that you have copied `boot.firm` from the Luma3DS `.zip` to the root of your SD card + If you see the Luma Configuration screen, press (Start) to reboot, then continue with the guide -#### Section V - Luma3DS Verification +#### Section VI - Luma3DS Verification Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. @@ -113,9 +126,9 @@ At this point, your console will boot to Luma3DS by default. + Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware. + On the next page, you will install useful homebrew applications to complete your setup. -#### Section VI - Restoring DS Connection Settings +#### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card 1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one diff --git a/_pages/de_DE/installing-boot9strap-(usm).txt b/_pages/de_DE/installing-boot9strap-(usm).txt index c79871c0fa..7079036c32 100644 --- a/_pages/de_DE/installing-boot9strap-(usm).txt +++ b/_pages/de_DE/installing-boot9strap-(usm).txt @@ -18,45 +18,28 @@ title: "Installing boot9strap (USM)" These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. +If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--warning} ### Was du brauchst -* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) * The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) #### Schritt I - Vorbereitungen -In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. +In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. -1. If your device is powered on, power off your device -1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` and a SAFE_MODE exploit data file called `usm.bin` inside of a zip archive (`unSAFE_MODE.zip`) -1. Stecke deine SD-Karte in deinen Computer +1. Your SD card should be inserted in your computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Erstelle einen Ordner namens `boot9strap` im Stammverzeichnis deiner SD-Karte 1. Kopiere `boot9strap.firm` und `boot9strap.firm.sha` aus der boot9strap `.zip` in den `/boot9strap/`-Ordner auf deiner SD-Karte 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} - ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +1. Copy `usm.bin` to the root of your SD card #### Section II - BannerBomb3 @@ -66,9 +49,9 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana 1. Schalte deine Konsole an 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) - + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Press (A) to select "Inject haxx" + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-usm) +1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + Your device will automatically power off #### Section III - unSAFE_MODE @@ -77,7 +60,7 @@ In this section, you will enter Safe Mode (a feature available on all 3DS family 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) - + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of BannerBomb3](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions @@ -107,8 +90,7 @@ In this section, you will trigger the BannerBomb3 exploit a second time so that 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) -1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" +1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" + Your device will automatically reboot 1. Schalte deinen 3DS aus 1. Stecke deine SD-Karte in deinen Computer diff --git a/_pages/de_DE/seedminer.txt b/_pages/de_DE/seedminer.txt index 6eeee64ed2..730413d0d3 100644 --- a/_pages/de_DE/seedminer.txt +++ b/_pages/de_DE/seedminer.txt @@ -56,6 +56,7 @@ In this section, you will use the Bruteforce Movable website to retrieve your de + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages +1. Schalte deinen 3DS aus ___ @@ -63,11 +64,11 @@ ___ Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. -#### unSAFE_MODE (Recommended) +#### BannerBomb3 -This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the SAFE_MODE firmware present in all 3DS units. +This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the System Settings application. -Continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +Continue to [BannerBomb3](bannerbomb3) {: .notice--primary} ___ @@ -77,4 +78,4 @@ ___ If you have a Taiwanese device (indicated with a T at the end of the system version, such as 11.15.0-39**T**), you must follow this route. **Other regions may not follow this route.** Continue to [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) -{: .notice--warning} \ No newline at end of file +{: .notice--warning} diff --git a/_pages/de_DE/troubleshooting.txt b/_pages/de_DE/troubleshooting.txt index 4501fd0bde..89344fe958 100644 --- a/_pages/de_DE/troubleshooting.txt +++ b/_pages/de_DE/troubleshooting.txt @@ -126,11 +126,11 @@ If this is unsuccessful, try using another SD card. ## Installing boot9strap (USM) -### DSiWare Management menu crashes without showing USM menu +### DSiWare Management menu crashes without showing BB3 multihax menu (USM) -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php). +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). -Also, ensure that `usm.bin` is on the root of the SD card. If it is missing, then download the latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) (the RELEASE `.zip` file), and copy the `usm.bin` file to the root of your SD card. +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, you will need to follow [an alternate branch of Seedminer](homebrew-launcher-(pichaxx)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. @@ -144,16 +144,24 @@ If neither of these solutions fixes this problem, then custom firmware may have ### DSiWare Management shows a question mark -There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php), ensuring that you use the `movable.sed` file for your console. +There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen), ensuring that you use the `movable.sed` file for your console. ### DSiWare Management menu crashes without purple screen -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. --- ## Installing boot9strap (Fredtool) +### DSiWare Management menu crashes without showing BB3 multihax menu (Fredtool) + +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). + +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. + +If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + ### Error on Fredtool Injector page Ensure that your `movable.sed` and DSiWare backup come from the same console. A mismatch will result in an error. diff --git a/_pages/el_GR/bannerbomb3.txt b/_pages/el_GR/bannerbomb3.txt index 6494452e78..3faf724902 100644 --- a/_pages/el_GR/bannerbomb3.txt +++ b/_pages/el_GR/bannerbomb3.txt @@ -6,8 +6,8 @@ title: "BannerBomb3"
Technical Details (optional) -

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

For a more technical explanation, see here.

{: .notice--info} @@ -27,38 +27,43 @@ If you have a Taiwanese console (indicated by a T after the system version), fol In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. -1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` inside of a zip file (`BannerBomb3.zip`) -1. If your console is powered on, power off your console +1. Power off your device 1. Εισάγετε την κάρτα SD στον υπολογιστή σας +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} -#### Section II - BannerBomb3 +#### Section II - Hardware Button Check -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. +In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked +1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) +1. If prompted to update, press Cancel + + If the device boots to the HOME Menu, just continue to the next step 1. Power off your device -1. Εισάγετε την κάρτα SD στον υπολογιστή σας -1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore +___ -Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +### Next steps: Choose an exploit + +If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. + +If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} + +If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +{: .notice--warning} diff --git a/_pages/el_GR/installing-boot9strap-(fredtool).txt b/_pages/el_GR/installing-boot9strap-(fredtool).txt index d8ef6b9db4..c9305d0cbb 100644 --- a/_pages/el_GR/installing-boot9strap-(fredtool).txt +++ b/_pages/el_GR/installing-boot9strap-(fredtool).txt @@ -6,14 +6,13 @@ title: "Installing boot9strap (Fredtool)"
Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

{: .notice--info} ### What You Need -* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -27,17 +26,32 @@ As an additional safety measure, we will perform an additional check for custom 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button 1. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide +1. Power off your device -If you see a configuration menu, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. {: .notice--danger} + +#### Section II - BannerBomb3 -#### Section II - Prep Work +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically power off + +#### Section III - Prep Work In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. +1. Εισάγετε την κάρτα SD στον υπολογιστή σας 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file using the first "Browse..." option +1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option 1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) 1. Click "Build" @@ -46,7 +60,6 @@ In this section, you will copy the files necessary to temporarily replace DS Con 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link -1. Εισάγετε την κάρτα SD στον υπολογιστή σας 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` @@ -60,7 +73,7 @@ In this section, you will copy the files necessary to temporarily replace DS Con ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### Section III - Overwriting DS Connection Settings +#### Section IV - Overwriting DS Connection Settings In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. @@ -73,7 +86,7 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte 1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio -#### Section IV - Flipnote Exploit +#### Section V - Flipnote Exploit If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} @@ -99,7 +112,7 @@ In this section, you will perform a series of very specific steps within Flipnot + If your device shuts down when you try to power it on, ensure that you have copied `boot.firm` from the Luma3DS `.zip` to the root of your SD card + If you see the Luma Configuration screen, press (Start) to reboot, then continue with the guide -#### Section V - Luma3DS Verification +#### Section VI - Luma3DS Verification Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. @@ -113,9 +126,9 @@ At this point, your console will boot to Luma3DS by default. + Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware. + On the next page, you will install useful homebrew applications to complete your setup. -#### Section VI - Restoring DS Connection Settings +#### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card 1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one diff --git a/_pages/el_GR/installing-boot9strap-(usm).txt b/_pages/el_GR/installing-boot9strap-(usm).txt index 7b030a8e21..c1f22299ad 100644 --- a/_pages/el_GR/installing-boot9strap-(usm).txt +++ b/_pages/el_GR/installing-boot9strap-(usm).txt @@ -18,45 +18,28 @@ title: "Installing boot9strap (USM)" These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. +If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--warning} ### What You Need -* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) * The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. +In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. -1. If your device is powered on, power off your device -1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` and a SAFE_MODE exploit data file called `usm.bin` inside of a zip archive (`unSAFE_MODE.zip`) -1. Εισάγετε την κάρτα SD στον υπολογιστή σας +1. Your SD card should be inserted in your computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Create a folder named `boot9strap` on the root of your SD card 1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} - ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +1. Copy `usm.bin` to the root of your SD card #### Section II - BannerBomb3 @@ -66,9 +49,9 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana 1. Power on your device 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) - + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Press (A) to select "Inject haxx" + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-usm) +1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + Your device will automatically power off #### Section III - unSAFE_MODE @@ -77,7 +60,7 @@ In this section, you will enter Safe Mode (a feature available on all 3DS family 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) - + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of BannerBomb3](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions @@ -107,8 +90,7 @@ In this section, you will trigger the BannerBomb3 exploit a second time so that 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) -1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" +1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" + Your device will automatically reboot 1. Power off your device 1. Εισάγετε την κάρτα SD στον υπολογιστή σας diff --git a/_pages/el_GR/seedminer.txt b/_pages/el_GR/seedminer.txt index 6314da6ca9..3ca2714bb4 100644 --- a/_pages/el_GR/seedminer.txt +++ b/_pages/el_GR/seedminer.txt @@ -56,6 +56,7 @@ In this section, you will use the Bruteforce Movable website to retrieve your de + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages +1. Power off your device ___ @@ -63,11 +64,11 @@ ___ Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. -#### unSAFE_MODE (Recommended) +#### BannerBomb3 -This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the SAFE_MODE firmware present in all 3DS units. +This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the System Settings application. -Continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +Continue to [BannerBomb3](bannerbomb3) {: .notice--primary} ___ @@ -77,4 +78,4 @@ ___ If you have a Taiwanese device (indicated with a T at the end of the system version, such as 11.15.0-39**T**), you must follow this route. **Other regions may not follow this route.** Continue to [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) -{: .notice--warning} \ No newline at end of file +{: .notice--warning} diff --git a/_pages/el_GR/troubleshooting.txt b/_pages/el_GR/troubleshooting.txt index 06ec19f09f..40f57c38f7 100644 --- a/_pages/el_GR/troubleshooting.txt +++ b/_pages/el_GR/troubleshooting.txt @@ -126,11 +126,11 @@ If this is unsuccessful, try using another SD card. ## Installing boot9strap (USM) -### DSiWare Management menu crashes without showing USM menu +### DSiWare Management menu crashes without showing BB3 multihax menu (USM) -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php). +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). -Also, ensure that `usm.bin` is on the root of the SD card. If it is missing, then download the latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) (the RELEASE `.zip` file), and copy the `usm.bin` file to the root of your SD card. +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, you will need to follow [an alternate branch of Seedminer](homebrew-launcher-(pichaxx)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. @@ -144,16 +144,24 @@ If neither of these solutions fixes this problem, then custom firmware may have ### DSiWare Management shows a question mark -There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php), ensuring that you use the `movable.sed` file for your console. +There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen), ensuring that you use the `movable.sed` file for your console. ### DSiWare Management menu crashes without purple screen -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. --- ## Installing boot9strap (Fredtool) +### DSiWare Management menu crashes without showing BB3 multihax menu (Fredtool) + +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). + +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. + +If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + ### Error on Fredtool Injector page Ensure that your `movable.sed` and DSiWare backup come from the same console. A mismatch will result in an error. diff --git a/_pages/en_PT/bannerbomb3.txt b/_pages/en_PT/bannerbomb3.txt index 2c8053d9cf..65caa1262d 100644 --- a/_pages/en_PT/bannerbomb3.txt +++ b/_pages/en_PT/bannerbomb3.txt @@ -6,8 +6,8 @@ title: "BannerBomb3"
Technical Details (optional) -

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

For a more technical explanation, see here.

{: .notice--info} @@ -27,38 +27,43 @@ If you have a Taiwanese console (indicated by a T after the system version), fol In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. -1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` inside of a zip file (`BannerBomb3.zip`) -1. If your console is powered on, power off your console +1. Power off ye device 1. Insert ye SD card into ye computer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} -#### Section II - BannerBomb3 +#### Section II - Hardware Button Check -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. +In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. -1. Reinsert ye SD card into ye device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked +1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) +1. If prompted to update, press Cancel + + If the device boots to the HOME Menu, just continue to the next step 1. Power off ye device -1. Insert ye SD card into ye computer -1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore +___ -Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +### Next steps: Choose an exploit + +If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. + +If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} + +If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +{: .notice--warning} diff --git a/_pages/en_PT/installing-boot9strap-(fredtool).txt b/_pages/en_PT/installing-boot9strap-(fredtool).txt index 5720468a71..ef94a89dee 100644 --- a/_pages/en_PT/installing-boot9strap-(fredtool).txt +++ b/_pages/en_PT/installing-boot9strap-(fredtool).txt @@ -6,14 +6,13 @@ title: "Installing boot9strap (Fredtool)"
Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

{: .notice--info} ### What You Need -* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -27,17 +26,32 @@ As an additional safety measure, we will perform an additional check for custom 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button 1. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide +1. Power off ye device -If you see a configuration menu, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. {: .notice--danger} + +#### Section II - BannerBomb3 -#### Section II - Prep Work +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reinsert ye SD card into ye device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically power off + +#### Section III - Prep Work In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. +1. Insert ye SD card into ye computer 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file using the first "Browse..." option +1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option 1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) 1. Click "Build" @@ -46,7 +60,6 @@ In this section, you will copy the files necessary to temporarily replace DS Con 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link -1. Insert ye SD card into ye computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` @@ -60,7 +73,7 @@ In this section, you will copy the files necessary to temporarily replace DS Con ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### Section III - Overwriting DS Connection Settings +#### Section IV - Overwriting DS Connection Settings In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. @@ -73,7 +86,7 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte 1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio -#### Section IV - Flipnote Exploit +#### Section V - Flipnote Exploit If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} @@ -99,7 +112,7 @@ In this section, you will perform a series of very specific steps within Flipnot + If your device shuts down when you try to power it on, ensure that you have copied `boot.firm` from the Luma3DS `.zip` to the root of your SD card + If you see the Luma Configuration screen, press (Start) to reboot, then continue with the guide -#### Section V - Luma3DS Verification +#### Section VI - Luma3DS Verification Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. @@ -113,9 +126,9 @@ At this point, your console will boot to Luma3DS by default. + Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware. + On the next page, you will install useful homebrew applications to complete your setup. -#### Section VI - Restoring DS Connection Settings +#### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card 1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one diff --git a/_pages/en_PT/installing-boot9strap-(usm).txt b/_pages/en_PT/installing-boot9strap-(usm).txt index e37dc399e6..a7f81137da 100644 --- a/_pages/en_PT/installing-boot9strap-(usm).txt +++ b/_pages/en_PT/installing-boot9strap-(usm).txt @@ -18,45 +18,28 @@ title: "Installing boot9strap (USM)" These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. +If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--warning} ### What You Need -* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) * The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. +In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. -1. If your device is powered on, power off your device -1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` and a SAFE_MODE exploit data file called `usm.bin` inside of a zip archive (`unSAFE_MODE.zip`) -1. Insert ye SD card into ye computer +1. Your SD card should be inserted in your computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Create a folder named `boot9strap` on th' root 'o ye SD card 1. Copy `boot9strap.firm` 'n `boot9strap.firm.sha` from th' boot9strap `.zip` to th' `/boot9strap/` folder on ye SD card 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} - ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +1. Copy `usm.bin` to the root of your SD card #### Section II - BannerBomb3 @@ -66,9 +49,9 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana 1. Power on your device 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) - + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Press (A) to select "Inject haxx" + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-usm) +1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + Your device will automatically power off #### Section III - unSAFE_MODE @@ -77,7 +60,7 @@ In this section, you will enter Safe Mode (a feature available on all 3DS family 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) - + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of BannerBomb3](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions @@ -107,8 +90,7 @@ In this section, you will trigger the BannerBomb3 exploit a second time so that 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) -1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" +1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" + Your device will automatically reboot 1. Power off ye device 1. Insert ye SD card into ye computer diff --git a/_pages/en_PT/seedminer.txt b/_pages/en_PT/seedminer.txt index 6782cefb66..64100e935e 100644 --- a/_pages/en_PT/seedminer.txt +++ b/_pages/en_PT/seedminer.txt @@ -56,6 +56,7 @@ In this section, you will use the Bruteforce Movable website to retrieve your de + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages +1. Power off ye device ___ @@ -63,11 +64,11 @@ ___ Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. -#### unSAFE_MODE (Recommended) +#### BannerBomb3 -This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the SAFE_MODE firmware present in all 3DS units. +This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the System Settings application. -Continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +Continue to [BannerBomb3](bannerbomb3) {: .notice--primary} ___ @@ -77,4 +78,4 @@ ___ If you have a Taiwanese device (indicated with a T at the end of the system version, such as 11.15.0-39**T**), you must follow this route. **Other regions may not follow this route.** Continue to [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) -{: .notice--warning} \ No newline at end of file +{: .notice--warning} diff --git a/_pages/en_PT/troubleshooting.txt b/_pages/en_PT/troubleshooting.txt index 7313033b44..5c16ee150c 100644 --- a/_pages/en_PT/troubleshooting.txt +++ b/_pages/en_PT/troubleshooting.txt @@ -126,11 +126,11 @@ If this is unsuccessful, try using another SD card. ## Installing boot9strap (USM) -### DSiWare Management menu crashes without showing USM menu +### DSiWare Management menu crashes without showing BB3 multihax menu (USM) -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php). +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). -Also, ensure that `usm.bin` is on the root of the SD card. If it is missing, then download the latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) (the RELEASE `.zip` file), and copy the `usm.bin` file to the root of your SD card. +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, you will need to follow [an alternate branch of Seedminer](homebrew-launcher-(pichaxx)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. @@ -144,16 +144,24 @@ If neither of these solutions fixes this problem, then custom firmware may have ### DSiWare Management shows a question mark -There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php), ensuring that you use the `movable.sed` file for your console. +There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen), ensuring that you use the `movable.sed` file for your console. ### DSiWare Management menu crashes without purple screen -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. --- ## Installing boot9strap (Fredtool) +### DSiWare Management menu crashes without showing BB3 multihax menu (Fredtool) + +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). + +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. + +If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + ### Error on Fredtool Injector page Ensure that your `movable.sed` and DSiWare backup come from the same console. A mismatch will result in an error. diff --git a/_pages/es_ES/bannerbomb3.txt b/_pages/es_ES/bannerbomb3.txt index 5d603928bf..bf01127fcf 100644 --- a/_pages/es_ES/bannerbomb3.txt +++ b/_pages/es_ES/bannerbomb3.txt @@ -6,8 +6,8 @@ title: "BannerBomb3"
Technical Details (optional) -

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

For a more technical explanation, see here.

{: .notice--info} @@ -27,38 +27,43 @@ If you have a Taiwanese console (indicated by a T after the system version), fol In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. -1. Abre [BannerBomb3 Tool](https://bb3.nhnarwhal.com/3dstools/bannerbomb3.php) en tu computadora -1. Carga tu movable.sed usando la opción "Choose File" -1. Haz click en "Build and Download" - + Esto descargará un archivo de DSiWare exploitado, llamado `F00D43D5.bin`, dentro de un archivo zip (`BannerBomb3.zip`) -1. Si tu consola está encendida, apagala +1. Apaga tu consola 1. Inserta tu tarjeta SD en tu computadora +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + La raíz de tu tarjeta SD se refiere al primer directorio de la tarjeta, donde puedes ver la carpeta Nintendo 3DS pero no estás dentro de ella 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} -#### Sección II - BannerBomb3 +#### Section II - Hardware Button Check -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. +In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. -1. Vuelve a insertar tu tarjeta SD en tu consola -1. Enciende tu consola -1. Entra a Configuración de la consola -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Tu sistema debería parpadear el color magenta (rosa/púrpura) y luego crashear unos segundos después. Esto significa que funcionó +1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) +1. If prompted to update, press Cancel + + If the device boots to the HOME Menu, just continue to the next step 1. Apaga tu consola -1. Inserta tu tarjeta SD en tu computadora -1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page -1. Ve a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` en tu tarjeta SD -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. Este archivo ya no será necesario +___ -Continúa en [Instalar boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +### Next steps: Choose an exploit + +If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. + +If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} + +If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +{: .notice--warning} diff --git a/_pages/es_ES/installing-boot9strap-(fredtool).txt b/_pages/es_ES/installing-boot9strap-(fredtool).txt index 4b282ec594..93494c8875 100644 --- a/_pages/es_ES/installing-boot9strap-(fredtool).txt +++ b/_pages/es_ES/installing-boot9strap-(fredtool).txt @@ -6,14 +6,13 @@ title: "Installing boot9strap (Fredtool)"
Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

{: .notice--info} ### Qué necesitas -* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Tu archivo `movable.sed` proveniente de haber completado [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -27,17 +26,32 @@ As an additional safety measure, we will perform an additional check for custom 1. Mantén pulsado el botón (Select) 1. Enciende la consola mientras mantienes presionado (Select) 1. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide +1. Apaga tu consola -If you see a configuration menu, you already have CFW, and continuing with these instructions may BRICK your device! Sigue la sección de [Comprobación de CFW](checking-for-cfw) para actualizar tu CFW existente. +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Sigue la sección de [Comprobación de CFW](checking-for-cfw) para actualizar tu CFW existente. {: .notice--danger} + +#### Sección II - BannerBomb3 -#### Sección II - Preparativos +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Vuelve a insertar tu tarjeta SD en tu consola +1. Enciende tu consola +1. Entra a Configuración de la consola +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Tu consola se apagará automáticamente + +#### Section III - Prep Work In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. +1. Inserta tu tarjeta SD en tu computadora 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file using the first "Browse..." option +1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option 1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) 1. Click "Build" @@ -46,7 +60,6 @@ In this section, you will copy the files necessary to temporarily replace DS Con 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link -1. Inserta tu tarjeta SD en tu computadora 1. Ve a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` en tu tarjeta SD + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` @@ -60,7 +73,7 @@ In this section, you will copy the files necessary to temporarily replace DS Con ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### Section III - Overwriting DS Connection Settings +#### Section IV - Overwriting DS Connection Settings In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. @@ -73,7 +86,7 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte 1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. Si el exploit fue exitoso, tu consola habrá cargado la versión japonesa de Flipnote Studio -#### Sección IV - Exploit de Flipnote +#### Section V - Flipnote Exploit Si prefieres una guía visual para esta parte, hay una disponible [aquí](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} @@ -99,7 +112,7 @@ In this section, you will perform a series of very specific steps within Flipnot + If your device shuts down when you try to power it on, ensure that you have copied `boot.firm` from the Luma3DS `.zip` to the root of your SD card + If you see the Luma Configuration screen, press (Start) to reboot, then continue with the guide -#### Section V - Luma3DS Verification +#### Section VI - Luma3DS Verification Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. @@ -113,9 +126,9 @@ At this point, your console will boot to Luma3DS by default. + Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware. + On the next page, you will install useful homebrew applications to complete your setup. -#### Sección VI - Restaurar Conexiones de Nintendo DS +#### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. Ve a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` en tu tarjeta SD 1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one diff --git a/_pages/es_ES/installing-boot9strap-(usm).txt b/_pages/es_ES/installing-boot9strap-(usm).txt index 17e3c5eb51..cd05667fc6 100644 --- a/_pages/es_ES/installing-boot9strap-(usm).txt +++ b/_pages/es_ES/installing-boot9strap-(usm).txt @@ -18,45 +18,28 @@ title: "Instalar boot9strap (USM)" Estas instrucciones funcionan en consolas de las regiones USA, Europa, Japón y Corea, indicado por las letras U, E, J o K después de la versión del sistema. -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. +If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--warning} ### Qué necesitas -* Tu archivo `movable.sed` proveniente de haber completado [Seedminer](seedminer) * The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) * The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) #### Sección I - Preparativos -In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. +In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. -1. Si tu consola está encendida, apágala -1. Abre [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) en tu computadora -1. Carga tu movable.sed usando la opción "Choose File" -1. Haz click en "Build and Download" - + Esto descargará un archivo de DSiWare exploitado, llamado `F00D43D5.bin`, y un archivo de datos para el exploit de SAFE_MODE llamado `usm.bin`, ambos dentro de un archivo zip (`unSAFE_MODE.zip`) -1. Inserta tu tarjeta SD en tu computadora +1. Your SD card should be inserted in your computer 1. Copia los archivos `boot.firm` y `boot.3dsx` desde el `.zip` de Luma3DS a la raíz de tu tarjeta SD + La raíz de tu tarjeta SD se refiere al primer directorio de la tarjeta, donde puedes ver la carpeta Nintendo 3DS pero no estás dentro de ella 1. Crea una carpeta llamada `boot9strap` en la raíz de tu tarjeta SD 1. Copia `boot9strap.firm` y `boot9strap.firm.sha` desde el `.zip` de `boot9strap` a la carpeta `/boot9strap/` en tu tarjeta SD 1. Copia `SafeB9SInstaller.bin` desde el `.zip` de SafeB9SInstaller a la raíz de tu tarjeta SD -1. Copia el archivo `usm.bin` desde `unSAFE_MODE.zip` a la raíz de tu tarjeta SD - ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} - ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copia el archivo `F00D43D5.bin` desde `unSAFE_MODE.zip` a la carpeta `Nintendo DSiWare` - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +1. Copy `usm.bin` to the root of your SD card #### Sección II - BannerBomb3 @@ -66,9 +49,9 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana 1. Enciende tu consola 1. Entra a Configuración de la consola 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) - + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Press (A) to select "Inject haxx" + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-usm) +1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + Tu consola se apagará automáticamente #### Sección III - unSAFE_MODE @@ -77,7 +60,7 @@ In this section, you will enter Safe Mode (a feature available on all 3DS family 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) - + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of BannerBomb3](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Presiona "OK" para aceptar la actualización + No hay actualización. Esto es parte del exploit 1. Presiona sobre "Acepto" para aceptar los términos y condiciones @@ -107,8 +90,7 @@ In this section, you will trigger the BannerBomb3 exploit a second time so that 1. Entra a Configuración de la consola 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) -1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" +1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" + Your device will automatically reboot 1. Apaga tu consola 1. Inserta tu tarjeta SD en tu computadora diff --git a/_pages/es_ES/seedminer.txt b/_pages/es_ES/seedminer.txt index 938ebbc0ff..56209be883 100644 --- a/_pages/es_ES/seedminer.txt +++ b/_pages/es_ES/seedminer.txt @@ -56,6 +56,7 @@ In this section, you will use the Bruteforce Movable website to retrieve your de + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site + Conserva este archivo ya que lo necesitarás en las próximas páginas +1. Apaga tu consola ___ @@ -63,11 +64,11 @@ ___ Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. -#### unSAFE_MODE (Recommended) +#### BannerBomb3 -Éste método que emplea Seedminer para mayor acceso utiliza tu archivo `movable.sed` para tomar ventaja de exploits en el firmware SAFE_MODE presente en todas las consolas 3DS. +This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the System Settings application. -Continúa a [Instalar boot9strap (USM)](installing-boot9strap-(usm)) +Continue to [BannerBomb3](bannerbomb3) {: .notice--primary} ___ @@ -77,4 +78,4 @@ ___ If you have a Taiwanese device (indicated with a T at the end of the system version, such as 11.15.0-39**T**), you must follow this route. **Other regions may not follow this route.** Continue to [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) -{: .notice--warning} \ No newline at end of file +{: .notice--warning} diff --git a/_pages/es_ES/troubleshooting.txt b/_pages/es_ES/troubleshooting.txt index 398f8957b6..694d8d8ca3 100644 --- a/_pages/es_ES/troubleshooting.txt +++ b/_pages/es_ES/troubleshooting.txt @@ -126,11 +126,11 @@ If this is unsuccessful, try using another SD card. ## Instalar boot9strap (USM) -### El menú de Gestión de DSiWare crashea sin mostrar el menú de USM +### DSiWare Management menu crashes without showing BB3 multihax menu (USM) -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. Si lo es, entonces vuelve a crear el archivo con [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php). +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). -Also, ensure that `usm.bin` is on the root of the SD card. If it is missing, then download the latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) (the RELEASE `.zip` file), and copy the `usm.bin` file to the root of your SD card. +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, you will need to follow [an alternate branch of Seedminer](homebrew-launcher-(pichaxx)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. @@ -144,16 +144,24 @@ If neither of these solutions fixes this problem, then custom firmware may have ### Gestión de DSiWare muestra un signo de interrogación -Puede haber un problema con el archivo `F00D43D5.bin` (puede estar corrupto o preparado para otra consola 3DS). Re-create your `F00D43D5.bin` file with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php), ensuring that you use the `movable.sed` file for your console. +Puede haber un problema con el archivo `F00D43D5.bin` (puede estar corrupto o preparado para otra consola 3DS). Re-create your `F00D43D5.bin` file with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen), ensuring that you use the `movable.sed` file for your console. ### El menú de Gestión de DSiWare crashea sin mostrar la pantalla morada -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. Si lo es, entonces vuelve a crear el archivo con [BannerBomb3](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php). Si sigue fallando, entonces es posible que se haya instalado y desinstalado Custom Firmware en la consola, de una manera que no permite impide ejecutar este método. En este caso, entra al [Discord de Nintendo Homebrew](https://discord.gg/MWxPgEp) para obtener ayuda. +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). Si sigue fallando, entonces es posible que se haya instalado y desinstalado Custom Firmware en la consola, de una manera que no permite impide ejecutar este método. En este caso, entra al [Discord de Nintendo Homebrew](https://discord.gg/MWxPgEp) para obtener ayuda. --- ## Instalar boot9strap (Fredtool) +### DSiWare Management menu crashes without showing BB3 multihax menu (Fredtool) + +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). + +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. + +If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + ### Error en la página de Fredtool Injector Asegúrate de que tu archivo `movable.sed` y la copia de seguridad de DSiWare provienen de la misma consola. El error aparece cuando los archivos no coinciden. diff --git a/_pages/fi_FI/bannerbomb3.txt b/_pages/fi_FI/bannerbomb3.txt index dec536973d..0f80b0fec9 100644 --- a/_pages/fi_FI/bannerbomb3.txt +++ b/_pages/fi_FI/bannerbomb3.txt @@ -6,8 +6,8 @@ title: "BannerBomb3"
Technical Details (optional) -

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

For a more technical explanation, see here.

{: .notice--info} @@ -27,38 +27,43 @@ If you have a Taiwanese console (indicated by a T after the system version), fol In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. -1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` inside of a zip file (`BannerBomb3.zip`) -1. If your console is powered on, power off your console +1. Sammuta konsolisi 1. Aseta SD-korttisi tietokoneeseesi +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} -#### Section II - BannerBomb3 +#### Section II - Hardware Button Check -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. +In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. -1. Aseta SD-korttisi takaisin konsoliisi -1. Käynnistä konsolisi -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked +1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) +1. If prompted to update, press Cancel + + If the device boots to the HOME Menu, just continue to the next step 1. Sammuta konsolisi -1. Aseta SD-korttisi tietokoneeseesi -1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore +___ -Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +### Next steps: Choose an exploit + +If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. + +If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} + +If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +{: .notice--warning} diff --git a/_pages/fi_FI/installing-boot9strap-(fredtool).txt b/_pages/fi_FI/installing-boot9strap-(fredtool).txt index d456a8ac4a..25813dbed6 100644 --- a/_pages/fi_FI/installing-boot9strap-(fredtool).txt +++ b/_pages/fi_FI/installing-boot9strap-(fredtool).txt @@ -6,14 +6,13 @@ title: "Installing boot9strap (Fredtool)"
Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

{: .notice--info} ### Tarpeet -* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -27,17 +26,32 @@ As an additional safety measure, we will perform an additional check for custom 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button 1. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide +1. Sammuta konsolisi -If you see a configuration menu, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. {: .notice--danger} + +#### Section II - BannerBomb3 -#### Section II - Prep Work +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Aseta SD-korttisi takaisin konsoliisi +1. Käynnistä konsolisi +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically power off + +#### Section III - Prep Work In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. +1. Aseta SD-korttisi tietokoneeseesi 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file using the first "Browse..." option +1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option 1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) 1. Click "Build" @@ -46,7 +60,6 @@ In this section, you will copy the files necessary to temporarily replace DS Con 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link -1. Aseta SD-korttisi tietokoneeseesi 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` @@ -60,7 +73,7 @@ In this section, you will copy the files necessary to temporarily replace DS Con ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### Section III - Overwriting DS Connection Settings +#### Section IV - Overwriting DS Connection Settings In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. @@ -73,7 +86,7 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte 1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio -#### Section IV - Flipnote Exploit +#### Section V - Flipnote Exploit If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} @@ -99,7 +112,7 @@ In this section, you will perform a series of very specific steps within Flipnot + If your device shuts down when you try to power it on, ensure that you have copied `boot.firm` from the Luma3DS `.zip` to the root of your SD card + If you see the Luma Configuration screen, press (Start) to reboot, then continue with the guide -#### Section V - Luma3DS Verification +#### Section VI - Luma3DS Verification Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. @@ -113,9 +126,9 @@ At this point, your console will boot to Luma3DS by default. + Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware. + On the next page, you will install useful homebrew applications to complete your setup. -#### Section VI - Restoring DS Connection Settings +#### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card 1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one diff --git a/_pages/fi_FI/installing-boot9strap-(usm).txt b/_pages/fi_FI/installing-boot9strap-(usm).txt index 00b904c230..256d18aca7 100644 --- a/_pages/fi_FI/installing-boot9strap-(usm).txt +++ b/_pages/fi_FI/installing-boot9strap-(usm).txt @@ -18,45 +18,28 @@ title: "Installing boot9strap (USM)" These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. +If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--warning} ### Tarpeet -* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) * The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) #### Vaihe I – Valmistelut -In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. +In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. -1. If your device is powered on, power off your device -1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` and a SAFE_MODE exploit data file called `usm.bin` inside of a zip archive (`unSAFE_MODE.zip`) -1. Aseta SD-korttisi tietokoneeseesi +1. Your SD card should be inserted in your computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Luo `boot9strap`-niminen kansio SD-korttisi juureen 1. Kopioi boot9strap-`.zip`-pakkauksesta `boot9strap.firm` ja `boot9strap.firm.sha` SD-korttisi `/boot9strap/`-kansioon 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} - ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +1. Copy `usm.bin` to the root of your SD card #### Section II - BannerBomb3 @@ -66,9 +49,9 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana 1. Käynnistä konsolisi 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) - + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Press (A) to select "Inject haxx" + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-usm) +1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + Your device will automatically power off #### Section III - unSAFE_MODE @@ -77,7 +60,7 @@ In this section, you will enter Safe Mode (a feature available on all 3DS family 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) - + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of BannerBomb3](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions @@ -107,8 +90,7 @@ In this section, you will trigger the BannerBomb3 exploit a second time so that 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) -1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" +1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" + Your device will automatically reboot 1. Sammuta konsolisi 1. Aseta SD-korttisi tietokoneeseesi diff --git a/_pages/fi_FI/seedminer.txt b/_pages/fi_FI/seedminer.txt index db735dda3e..fba4707a94 100644 --- a/_pages/fi_FI/seedminer.txt +++ b/_pages/fi_FI/seedminer.txt @@ -56,6 +56,7 @@ In this section, you will use the Bruteforce Movable website to retrieve your de + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages +1. Sammuta konsolisi ___ @@ -63,11 +64,11 @@ ___ Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. -#### unSAFE_MODE (Recommended) +#### BannerBomb3 -This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the SAFE_MODE firmware present in all 3DS units. +This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the System Settings application. -Continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +Continue to [BannerBomb3](bannerbomb3) {: .notice--primary} ___ @@ -77,4 +78,4 @@ ___ If you have a Taiwanese device (indicated with a T at the end of the system version, such as 11.15.0-39**T**), you must follow this route. **Other regions may not follow this route.** Continue to [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) -{: .notice--warning} \ No newline at end of file +{: .notice--warning} diff --git a/_pages/fi_FI/troubleshooting.txt b/_pages/fi_FI/troubleshooting.txt index c1d2c462ee..d0312dab76 100644 --- a/_pages/fi_FI/troubleshooting.txt +++ b/_pages/fi_FI/troubleshooting.txt @@ -126,11 +126,11 @@ If this is unsuccessful, try using another SD card. ## Installing boot9strap (USM) -### DSiWare Management menu crashes without showing USM menu +### DSiWare Management menu crashes without showing BB3 multihax menu (USM) -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php). +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). -Also, ensure that `usm.bin` is on the root of the SD card. If it is missing, then download the latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) (the RELEASE `.zip` file), and copy the `usm.bin` file to the root of your SD card. +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, you will need to follow [an alternate branch of Seedminer](homebrew-launcher-(pichaxx)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. @@ -144,16 +144,24 @@ If neither of these solutions fixes this problem, then custom firmware may have ### DSiWare Management shows a question mark -There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php), ensuring that you use the `movable.sed` file for your console. +There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen), ensuring that you use the `movable.sed` file for your console. ### DSiWare Management menu crashes without purple screen -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. --- ## Installing boot9strap (Fredtool) +### DSiWare Management menu crashes without showing BB3 multihax menu (Fredtool) + +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). + +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. + +If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + ### Error on Fredtool Injector page Ensure that your `movable.sed` and DSiWare backup come from the same console. A mismatch will result in an error. diff --git a/_pages/fr_FR/bannerbomb3.txt b/_pages/fr_FR/bannerbomb3.txt index b2c47fa8ef..f760b74b6e 100644 --- a/_pages/fr_FR/bannerbomb3.txt +++ b/_pages/fr_FR/bannerbomb3.txt @@ -6,8 +6,8 @@ title: "BannerBomb3"
Technical Details (optional) -

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

For a more technical explanation, see here.

{: .notice--info} @@ -27,38 +27,43 @@ If you have a Taiwanese console (indicated by a T after the system version), fol In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. -1. Ouvrez [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) sur votre ordinateur -1. Téléchargez votre movable.sed en utilisant l'option "Choisir le fichier" -1. Sélectionnez "Build and Download" - + Ceci téléchargera un exploit DSiWare nommé `F00D43D5.bin` dans un fichier zip (`BannerBomb3.zip`) -1. Si votre console est allumée, éteignez-la +1. Éteignez votre 3DS 1. Insérez votre carte SD dans votre ordinateur +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + La racine de la carte SD représente le répertoire initial de la carte SD où vous pouvez voir le dossier Nintendo 3DS, mais ce n'est pas à l'intérieur de ce dernier 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} -#### Section II - BannerBomb3 +#### Section II - Hardware Button Check -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. +In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. -1. Réinsérez votre carte SD dans votre 3DS -1. Allumez votre console -1. Lancez les Paramètres de la console -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Votre console devrait clignoter en magenta (rose/violet) et puis planter quelques secondes plus tard. Cela signifie que ça a fonctionné +1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) +1. If prompted to update, press Cancel + + If the device boots to the HOME Menu, just continue to the next step 1. Éteignez votre 3DS -1. Insérez votre carte SD dans votre ordinateur -1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page -1. Naviguez vers `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` sur votre carte SD -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. Ce fichier ne sera plus nécessaire +___ -Continuez vers [Installation de boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +### Next steps: Choose an exploit + +If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. + +If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} + +If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +{: .notice--warning} diff --git a/_pages/fr_FR/installing-boot9strap-(fredtool).txt b/_pages/fr_FR/installing-boot9strap-(fredtool).txt index 1afbec3bfe..0870ab0680 100644 --- a/_pages/fr_FR/installing-boot9strap-(fredtool).txt +++ b/_pages/fr_FR/installing-boot9strap-(fredtool).txt @@ -6,14 +6,13 @@ title: "Installing boot9strap (Fredtool)"
Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

{: .notice--info} ## Ce dont vous avez besoin -* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Votre fichier `movable.sed` obtenu grâce à [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -27,17 +26,32 @@ As an additional safety measure, we will perform an additional check for custom 1. Maintenez le bouton (Select) enfoncé 1. Allumez votre console tout en maintenant le bouton (Select) enfoncé 1. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide +1. Éteignez votre 3DS -If you see a configuration menu, you already have CFW, and continuing with these instructions may BRICK your device! Suivez [Vérifier les CFW](checking-for-cfw) pour mettre à jour votre CFW existant. +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Suivez [Vérifier les CFW](checking-for-cfw) pour mettre à jour votre CFW existant. {: .notice--danger} + +#### Section II - BannerBomb3 -#### Section II - Préparatifs +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Réinsérez votre carte SD dans votre 3DS +1. Allumez votre console +1. Lancez les Paramètres de la console +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Votre console s'éteindra automatiquement + +#### Section III - Prep Work In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. +1. Insérez votre carte SD dans votre ordinateur 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file using the first "Browse..." option +1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option 1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) 1. Click "Build" @@ -46,7 +60,6 @@ In this section, you will copy the files necessary to temporarily replace DS Con 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link -1. Insérez votre carte SD dans votre ordinateur 1. Naviguez vers `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` sur votre carte SD + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` @@ -60,7 +73,7 @@ In this section, you will copy the files necessary to temporarily replace DS Con ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### Section III - Overwriting DS Connection Settings +#### Section IV - Overwriting DS Connection Settings In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. @@ -73,7 +86,7 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte 1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. Si l'exploit a réussi, votre console devrait avoir démarré la version japonaise de Flipnote Studio -#### Section IV - Exploit Flipnote +#### Section V - Flipnote Exploit Si vous préférez un guide visuel pour cette section, un tel guide est disponible [ici](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} @@ -99,7 +112,7 @@ In this section, you will perform a series of very specific steps within Flipnot + If your device shuts down when you try to power it on, ensure that you have copied `boot.firm` from the Luma3DS `.zip` to the root of your SD card + If you see the Luma Configuration screen, press (Start) to reboot, then continue with the guide -#### Section V - Luma3DS Verification +#### Section VI - Luma3DS Verification Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. @@ -113,9 +126,9 @@ At this point, your console will boot to Luma3DS by default. + Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware. + On the next page, you will install useful homebrew applications to complete your setup. -#### Section VI - Restauration des paramètres de Connexions Nintendo DS +#### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. Naviguez vers `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` sur votre carte SD 1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one diff --git a/_pages/fr_FR/installing-boot9strap-(usm).txt b/_pages/fr_FR/installing-boot9strap-(usm).txt index 9faecbd68a..e45e03ffce 100644 --- a/_pages/fr_FR/installing-boot9strap-(usm).txt +++ b/_pages/fr_FR/installing-boot9strap-(usm).txt @@ -18,45 +18,28 @@ title: "Installation de boot9strap (USM)" Ces instructions fonctionnent dans les régions USA, Europe, Japon et Corée indiquées par les lettres U, E, J ou K après le numéro de version de la console. -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. +If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--warning} ## Ce dont vous avez besoin -* Votre fichier `movable.sed` obtenu grâce à [Seedminer](seedminer) * The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) * The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) #### Section I - Préparatifs -In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. +In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. -1. Si votre console est allumée, éteignez la -1. Ouvrez [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) sur votre ordinateur -1. Téléchargez votre movable.sed en utilisant l'option "Choisir le fichier" -1. Sélectionnez "Build and Download" - + Ceci va télécharger un DSiWare d'exploit appelé `F00D43D5.bin` et un fichier d'exploit SAFE_MODE appelé `usm.bin` dans une archive zip (`unSAFE_MODE.zip`) -1. Insérez votre carte SD dans votre ordinateur +1. Your SD card should be inserted in your computer 1. Copiez `boot.firm` et `boot.3dsx` depuis Luma3DS `.zip`vers la racine de votre carte SD + La racine de la carte SD représente le répertoire initial de la carte SD où vous pouvez voir le dossier Nintendo 3DS, mais ce n'est pas à l'intérieur de ce dernier 1. Créez un dossier à la racine de votre carte SD nommé `boot9strap` 1. Copiez `boot9strap.firm` et `boot9strap.firm.sha` depuis le fichier ".zip" de boot9strap vers le dossier `/boot9strap/` sur votre carte SD 1. Copiez `SafeB9SInstaller.bin` depuis le fichier `.zip` de SafeB9SInstaller à la racine de votre carte SD -1. Copiez `usm.bin` depuis l'archive `unSAFE_MODE.zip` vers la racine de votre carte SD - ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} - ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copiez le fichier `F00D43D5.bin` depuis `unSAFE_MODE.zip` vers le dossier `Nintendo DSiWare` - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +1. Copy `usm.bin` to the root of your SD card #### Section II - BannerBomb3 @@ -66,9 +49,9 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana 1. Allumez votre console 1. Lancez les Paramètres de la console 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) - + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Press (A) to select "Inject haxx" + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-usm) +1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + Votre console s'éteindra automatiquement #### Section III - unSAFE_MODE @@ -77,7 +60,7 @@ In this section, you will enter Safe Mode (a feature available on all 3DS family 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) - + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of BannerBomb3](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Appuyez sur "OK" pour accepter la mise à jour + Aucune mise à jour nécessaire. Ceci fait partie de l'exploit 1. Appuyez sur « J'accepte » pour accepter les termes et conditions @@ -107,8 +90,7 @@ In this section, you will trigger the BannerBomb3 exploit a second time so that 1. Lancez les Paramètres de la console 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) -1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" +1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" + Your device will automatically reboot 1. Éteignez votre 3DS 1. Insérez votre carte SD dans votre ordinateur diff --git a/_pages/fr_FR/seedminer.txt b/_pages/fr_FR/seedminer.txt index 6f784d0f03..9ac3b47131 100644 --- a/_pages/fr_FR/seedminer.txt +++ b/_pages/fr_FR/seedminer.txt @@ -56,6 +56,7 @@ In this section, you will use the Bruteforce Movable website to retrieve your de + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site + Gardez ce fichier car vous en aurez besoin dans les pages à venir +1. Éteignez votre 3DS ___ @@ -63,11 +64,11 @@ ___ Une fois que vous avez la clé de chiffrement de votre console (`movable.sed`), vous l'utiliserez en conjonction avec d'autres exploits pour installer un custom firmware sur votre 3DS. -#### unSAFE_MODE (Recommended) +#### BannerBomb3 -Cette méthode d'utilisation de Seedminer pour une exploitation plus poussée utilise votre fichier `movable.sed` pour tirer parti d'exploits du firmware SAFE_MODE présent sur toutes les consoles 3DS. +This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the System Settings application. -Continuer vers [Installation de boot9strap (USM)](installing-boot9strap-(usm)) +Continue to [BannerBomb3](bannerbomb3) {: .notice--primary} ___ @@ -77,4 +78,4 @@ ___ If you have a Taiwanese device (indicated with a T at the end of the system version, such as 11.15.0-39**T**), you must follow this route. **Other regions may not follow this route.** Continue to [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) -{: .notice--warning} \ No newline at end of file +{: .notice--warning} diff --git a/_pages/fr_FR/troubleshooting.txt b/_pages/fr_FR/troubleshooting.txt index a88bcbe59b..79c624fdbc 100644 --- a/_pages/fr_FR/troubleshooting.txt +++ b/_pages/fr_FR/troubleshooting.txt @@ -126,11 +126,11 @@ If this is unsuccessful, try using another SD card. ## Installing boot9strap (USM) -### DSiWare Management menu crashes without showing USM menu +### DSiWare Management menu crashes without showing BB3 multihax menu (USM) -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php). +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). -Also, ensure that `usm.bin` is on the root of the SD card. If it is missing, then download the latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) (the RELEASE `.zip` file), and copy the `usm.bin` file to the root of your SD card. +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, you will need to follow [an alternate branch of Seedminer](homebrew-launcher-(pichaxx)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. @@ -144,16 +144,24 @@ If neither of these solutions fixes this problem, then custom firmware may have ### DSiWare Management shows a question mark -There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php), ensuring that you use the `movable.sed` file for your console. +There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen), ensuring that you use the `movable.sed` file for your console. ### DSiWare Management menu crashes without purple screen -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. --- ## Installing boot9strap (Fredtool) +### DSiWare Management menu crashes without showing BB3 multihax menu (Fredtool) + +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). + +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. + +If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + ### Error on Fredtool Injector page Ensure that your `movable.sed` and DSiWare backup come from the same console. A mismatch will result in an error. diff --git a/_pages/he_IL/bannerbomb3.txt b/_pages/he_IL/bannerbomb3.txt index 6477cc4aa0..5117c425a3 100644 --- a/_pages/he_IL/bannerbomb3.txt +++ b/_pages/he_IL/bannerbomb3.txt @@ -6,8 +6,8 @@ title: "BannerBomb3"
Technical Details (optional) -

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

For a more technical explanation, see here.

{: .notice--info} @@ -27,38 +27,43 @@ If you have a Taiwanese console (indicated by a T after the system version), fol In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. -1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` inside of a zip file (`BannerBomb3.zip`) -1. If your console is powered on, power off your console +1. תכבו את המכשיר 1. תכניסו את ה-SD שלכם למחשב +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} -#### Section II - BannerBomb3 +#### Section II - Hardware Button Check -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. +In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. -1. תכניסו מחדש את כרטיס הSD שלכם לתוך המכשיר שלכם -1. תפעילו את המכשיר -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked +1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) +1. If prompted to update, press Cancel + + If the device boots to the HOME Menu, just continue to the next step 1. תכבו את המכשיר -1. תכניסו את ה-SD שלכם למחשב -1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore +___ -Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +### Next steps: Choose an exploit + +If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. + +If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} + +If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +{: .notice--warning} diff --git a/_pages/he_IL/installing-boot9strap-(fredtool).txt b/_pages/he_IL/installing-boot9strap-(fredtool).txt index 255c6b9ac5..bd3f27f298 100644 --- a/_pages/he_IL/installing-boot9strap-(fredtool).txt +++ b/_pages/he_IL/installing-boot9strap-(fredtool).txt @@ -6,14 +6,13 @@ title: "Installing boot9strap (Fredtool)"
Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

{: .notice--info} ### What You Need -* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -27,17 +26,32 @@ As an additional safety measure, we will perform an additional check for custom 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button 1. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide +1. תכבו את המכשיר -If you see a configuration menu, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. {: .notice--danger} + +#### Section II - BannerBomb3 -#### Section II - Prep Work +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. תכניסו מחדש את כרטיס הSD שלכם לתוך המכשיר שלכם +1. תפעילו את המכשיר +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically power off + +#### Section III - Prep Work In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. +1. תכניסו את ה-SD שלכם למחשב 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file using the first "Browse..." option +1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option 1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) 1. Click "Build" @@ -46,7 +60,6 @@ In this section, you will copy the files necessary to temporarily replace DS Con 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link -1. תכניסו את ה-SD שלכם למחשב 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` @@ -60,7 +73,7 @@ In this section, you will copy the files necessary to temporarily replace DS Con ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### Section III - Overwriting DS Connection Settings +#### Section IV - Overwriting DS Connection Settings In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. @@ -73,7 +86,7 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte 1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio -#### Section IV - Flipnote Exploit +#### Section V - Flipnote Exploit If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} @@ -99,7 +112,7 @@ In this section, you will perform a series of very specific steps within Flipnot + If your device shuts down when you try to power it on, ensure that you have copied `boot.firm` from the Luma3DS `.zip` to the root of your SD card + If you see the Luma Configuration screen, press (Start) to reboot, then continue with the guide -#### Section V - Luma3DS Verification +#### Section VI - Luma3DS Verification Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. @@ -113,9 +126,9 @@ At this point, your console will boot to Luma3DS by default. + Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware. + On the next page, you will install useful homebrew applications to complete your setup. -#### Section VI - Restoring DS Connection Settings +#### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card 1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one diff --git a/_pages/he_IL/installing-boot9strap-(usm).txt b/_pages/he_IL/installing-boot9strap-(usm).txt index 0abca28fb5..9b57f4db44 100644 --- a/_pages/he_IL/installing-boot9strap-(usm).txt +++ b/_pages/he_IL/installing-boot9strap-(usm).txt @@ -18,45 +18,28 @@ title: "Installing boot9strap (USM)" These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. +If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--warning} ### What You Need -* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) * The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) #### חלק I - הכנות -In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. +In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. -1. If your device is powered on, power off your device -1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` and a SAFE_MODE exploit data file called `usm.bin` inside of a zip archive (`unSAFE_MODE.zip`) -1. תכניסו את ה-SD שלכם למחשב +1. Your SD card should be inserted in your computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. תצרו ב-SD שלכם תיקייה חדשה בשם `boot9strap` 1. תעתיקו את`boot9strap.firm` ואת `boot9strap.firm.sha` מה `.zip` של boot9strap אל תיקיית `/boot9strap/`על כרטיס הSD שלכם 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} - ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +1. Copy `usm.bin` to the root of your SD card #### Section II - BannerBomb3 @@ -66,9 +49,9 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana 1. תפעילו את המכשיר 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) - + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Press (A) to select "Inject haxx" + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-usm) +1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + Your device will automatically power off #### Section III - unSAFE_MODE @@ -77,7 +60,7 @@ In this section, you will enter Safe Mode (a feature available on all 3DS family 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) - + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of BannerBomb3](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions @@ -107,8 +90,7 @@ In this section, you will trigger the BannerBomb3 exploit a second time so that 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) -1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" +1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" + Your device will automatically reboot 1. תכבו את המכשיר 1. תכניסו את ה-SD שלכם למחשב diff --git a/_pages/he_IL/seedminer.txt b/_pages/he_IL/seedminer.txt index b82f1a6c97..3fcaf96cc0 100644 --- a/_pages/he_IL/seedminer.txt +++ b/_pages/he_IL/seedminer.txt @@ -56,6 +56,7 @@ In this section, you will use the Bruteforce Movable website to retrieve your de + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages +1. תכבו את המכשיר ___ @@ -63,11 +64,11 @@ ___ Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. -#### unSAFE_MODE (Recommended) +#### BannerBomb3 -This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the SAFE_MODE firmware present in all 3DS units. +This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the System Settings application. -Continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +Continue to [BannerBomb3](bannerbomb3) {: .notice--primary} ___ @@ -77,4 +78,4 @@ ___ If you have a Taiwanese device (indicated with a T at the end of the system version, such as 11.15.0-39**T**), you must follow this route. **Other regions may not follow this route.** Continue to [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) -{: .notice--warning} \ No newline at end of file +{: .notice--warning} diff --git a/_pages/he_IL/troubleshooting.txt b/_pages/he_IL/troubleshooting.txt index 97406e543e..1060499484 100644 --- a/_pages/he_IL/troubleshooting.txt +++ b/_pages/he_IL/troubleshooting.txt @@ -126,11 +126,11 @@ If this is unsuccessful, try using another SD card. ## Installing boot9strap (USM) -### DSiWare Management menu crashes without showing USM menu +### DSiWare Management menu crashes without showing BB3 multihax menu (USM) -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php). +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). -Also, ensure that `usm.bin` is on the root of the SD card. If it is missing, then download the latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) (the RELEASE `.zip` file), and copy the `usm.bin` file to the root of your SD card. +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, you will need to follow [an alternate branch of Seedminer](homebrew-launcher-(pichaxx)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. @@ -144,16 +144,24 @@ If neither of these solutions fixes this problem, then custom firmware may have ### DSiWare Management shows a question mark -There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php), ensuring that you use the `movable.sed` file for your console. +There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen), ensuring that you use the `movable.sed` file for your console. ### DSiWare Management menu crashes without purple screen -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. --- ## Installing boot9strap (Fredtool) +### DSiWare Management menu crashes without showing BB3 multihax menu (Fredtool) + +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). + +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. + +If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + ### Error on Fredtool Injector page Ensure that your `movable.sed` and DSiWare backup come from the same console. A mismatch will result in an error. diff --git a/_pages/hr_HR/bannerbomb3.txt b/_pages/hr_HR/bannerbomb3.txt index 5a46749529..ea5034f134 100644 --- a/_pages/hr_HR/bannerbomb3.txt +++ b/_pages/hr_HR/bannerbomb3.txt @@ -6,8 +6,8 @@ title: "BannerBomb3"
Technical Details (optional) -

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

For a more technical explanation, see here.

{: .notice--info} @@ -27,38 +27,43 @@ If you have a Taiwanese console (indicated by a T after the system version), fol In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. -1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` inside of a zip file (`BannerBomb3.zip`) -1. If your console is powered on, power off your console +1. Power off your device 1. Insert your SD card into your computer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} -#### Section II - BannerBomb3 +#### Section II - Hardware Button Check -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. +In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked +1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) +1. If prompted to update, press Cancel + + If the device boots to the HOME Menu, just continue to the next step 1. Power off your device -1. Insert your SD card into your computer -1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore +___ -Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +### Next steps: Choose an exploit + +If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. + +If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} + +If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +{: .notice--warning} diff --git a/_pages/hr_HR/installing-boot9strap-(fredtool).txt b/_pages/hr_HR/installing-boot9strap-(fredtool).txt index 1f7825ac28..a14f20f6ba 100644 --- a/_pages/hr_HR/installing-boot9strap-(fredtool).txt +++ b/_pages/hr_HR/installing-boot9strap-(fredtool).txt @@ -6,14 +6,13 @@ title: "Installing boot9strap (Fredtool)"
Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

{: .notice--info} ### What You Need -* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -27,17 +26,32 @@ As an additional safety measure, we will perform an additional check for custom 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button 1. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide +1. Power off your device -If you see a configuration menu, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. {: .notice--danger} + +#### Section II - BannerBomb3 -#### Section II - Prep Work +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically power off + +#### Section III - Prep Work In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. +1. Insert your SD card into your computer 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file using the first "Browse..." option +1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option 1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) 1. Click "Build" @@ -46,7 +60,6 @@ In this section, you will copy the files necessary to temporarily replace DS Con 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link -1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` @@ -60,7 +73,7 @@ In this section, you will copy the files necessary to temporarily replace DS Con ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### Section III - Overwriting DS Connection Settings +#### Section IV - Overwriting DS Connection Settings In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. @@ -73,7 +86,7 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte 1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio -#### Section IV - Flipnote Exploit +#### Section V - Flipnote Exploit If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} @@ -99,7 +112,7 @@ In this section, you will perform a series of very specific steps within Flipnot + If your device shuts down when you try to power it on, ensure that you have copied `boot.firm` from the Luma3DS `.zip` to the root of your SD card + If you see the Luma Configuration screen, press (Start) to reboot, then continue with the guide -#### Section V - Luma3DS Verification +#### Section VI - Luma3DS Verification Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. @@ -113,9 +126,9 @@ At this point, your console will boot to Luma3DS by default. + Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware. + On the next page, you will install useful homebrew applications to complete your setup. -#### Section VI - Restoring DS Connection Settings +#### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card 1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one diff --git a/_pages/hr_HR/installing-boot9strap-(usm).txt b/_pages/hr_HR/installing-boot9strap-(usm).txt index b58fa784a2..4861044daf 100644 --- a/_pages/hr_HR/installing-boot9strap-(usm).txt +++ b/_pages/hr_HR/installing-boot9strap-(usm).txt @@ -18,45 +18,28 @@ title: "Installing boot9strap (USM)" These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. +If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--warning} ### What You Need -* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) * The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. +In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. -1. If your device is powered on, power off your device -1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` and a SAFE_MODE exploit data file called `usm.bin` inside of a zip archive (`unSAFE_MODE.zip`) -1. Insert your SD card into your computer +1. Your SD card should be inserted in your computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Create a folder named `boot9strap` on the root of your SD card 1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} - ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +1. Copy `usm.bin` to the root of your SD card #### Section II - BannerBomb3 @@ -66,9 +49,9 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana 1. Power on your device 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) - + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Press (A) to select "Inject haxx" + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-usm) +1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + Your device will automatically power off #### Section III - unSAFE_MODE @@ -77,7 +60,7 @@ In this section, you will enter Safe Mode (a feature available on all 3DS family 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) - + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of BannerBomb3](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions @@ -107,8 +90,7 @@ In this section, you will trigger the BannerBomb3 exploit a second time so that 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) -1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" +1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" + Your device will automatically reboot 1. Power off your device 1. Insert your SD card into your computer diff --git a/_pages/hr_HR/seedminer.txt b/_pages/hr_HR/seedminer.txt index 8ecc9a8637..b6d7e339df 100644 --- a/_pages/hr_HR/seedminer.txt +++ b/_pages/hr_HR/seedminer.txt @@ -56,6 +56,7 @@ In this section, you will use the Bruteforce Movable website to retrieve your de + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages +1. Power off your device ___ @@ -63,11 +64,11 @@ ___ Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. -#### unSAFE_MODE (Recommended) +#### BannerBomb3 -This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the SAFE_MODE firmware present in all 3DS units. +This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the System Settings application. -Continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +Continue to [BannerBomb3](bannerbomb3) {: .notice--primary} ___ @@ -77,4 +78,4 @@ ___ If you have a Taiwanese device (indicated with a T at the end of the system version, such as 11.15.0-39**T**), you must follow this route. **Other regions may not follow this route.** Continue to [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) -{: .notice--warning} \ No newline at end of file +{: .notice--warning} diff --git a/_pages/hr_HR/troubleshooting.txt b/_pages/hr_HR/troubleshooting.txt index 05797b7bdb..2668e098fc 100644 --- a/_pages/hr_HR/troubleshooting.txt +++ b/_pages/hr_HR/troubleshooting.txt @@ -126,11 +126,11 @@ If this is unsuccessful, try using another SD card. ## Installing boot9strap (USM) -### DSiWare Management menu crashes without showing USM menu +### DSiWare Management menu crashes without showing BB3 multihax menu (USM) -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php). +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). -Also, ensure that `usm.bin` is on the root of the SD card. If it is missing, then download the latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) (the RELEASE `.zip` file), and copy the `usm.bin` file to the root of your SD card. +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, you will need to follow [an alternate branch of Seedminer](homebrew-launcher-(pichaxx)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. @@ -144,16 +144,24 @@ If neither of these solutions fixes this problem, then custom firmware may have ### DSiWare Management shows a question mark -There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php), ensuring that you use the `movable.sed` file for your console. +There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen), ensuring that you use the `movable.sed` file for your console. ### DSiWare Management menu crashes without purple screen -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. --- ## Installing boot9strap (Fredtool) +### DSiWare Management menu crashes without showing BB3 multihax menu (Fredtool) + +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). + +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. + +If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + ### Error on Fredtool Injector page Ensure that your `movable.sed` and DSiWare backup come from the same console. A mismatch will result in an error. diff --git a/_pages/hu_HU/bannerbomb3.txt b/_pages/hu_HU/bannerbomb3.txt index 661404cc0d..9c45a24314 100644 --- a/_pages/hu_HU/bannerbomb3.txt +++ b/_pages/hu_HU/bannerbomb3.txt @@ -6,8 +6,8 @@ title: "BannerBomb3"
Technikai részletek (opcionális) -

Ahhoz, hogy a rendszerből kinyerjük a DSiWare adatokat, egy hibát használunk ki a DSiWare adat kezelési ablakában, a rendszer beállításokban.

-

Hogy ezt elérjük, szükségünk van a rendszer titkosítási kulcsára (movable.sed), hogy újra építsünk egy DSiWare mentést, aminek segítségével ki tudjuk nyerni a DSi Internet beállítások alkalmazást az SD kártyára.

+

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

További technikai információkért látogass el ide.

{: .notice--info} @@ -27,38 +27,43 @@ Ha tajvani konzolod van (amit T betű jelez a rendszer verzió mögött), akkor Ebben a fejezetben fel fogod másolni azokat a fájlokat az eszközöd SD kártyájára, amik ahhoz szükségesek, hogy kiváltsák a BannerBomb3 exploit-ot. -1. Nyisd meg a [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) oldalt a számítógépeden -1. Töltsd fel a `movable.sed` fájlod a "Choose File" opcióval -1. Kattints a "Build and Download"-ra - + Ez le fog tölteni egy speciális DSiWare fájlt `F00D43D5.bin` néven, egy zip fájlban (`BannerBomb3.zip`) -1. Ha a konzolod be van kapcsolva, most kapcsold ki +1. Kapcsold ki a készüléked 1. Helyezd az SD kártyád a számítógépbe +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + Az SD kártya gyökere a kezdőkönyvtárt jelenti az SD kártyán, ahol látható a Nintendo 3DS könyvtár, de nem vagyunk benne 1. Navigálj a `Nintendo 3DS` -> `` -> `` mappába az SD kártyádon + Az `` egy 32 karakter hosszú mappanév, amit a [Seedminer](seedminer)-nél másoltál + Az `` egy 32 karakter hosszú nevű mappa az `` mappában ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Hozz létre egy `Nintendo DSiWare` nevű mappát az `` mappában + Ha már van mappád *és* van benne DSiWare mentés fájl (`<8-character-id>.bin`), másold őket a számítógépedre és töröld őket az SD kártyáról -1. Másold az `F00D43D5.bin` fájlt a `BannerBomb3.zip`-ből a `Nintendo DSiWare` mappába +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} -#### II. rész - BannerBomb3 +#### Section II - Hardware Button Check -Ebben a fejezetben elő fogod idézni a BannerBomb3 exploit-ot a DSIWare Management menü használatával és lemásolni az eredmény dump fájlt a számítógépedre, hogy fel tudd használni a következő oldalon. +In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. -1. Helyezd vissza az SD kártyát a készülékedbe -1. Kapcsold be a készüléked -1. Lépj be a "System Settings"-be a készülékeden -1. Navigálj ide: `Data Management` -> `DSiWare` -> `SD Card` ([kép](/images/screenshots/bb3/dsiware-management.png)) - + A rendszer most Magenta (rózsaszín/lila) színen fog világítani, és össze fog omlani. Ez azt jelenti, hogy működött +1. Az eszközöd kikapcsolt állapotában tartsd nyomva a következő gombokat: (Bal Váll) + (Jobb Váll) + (D-Pad Fel) + (A), majd ezen gombok nyomva tartása mellett kapcsold be az eszközöd + + Tartsd nyomva a gombokat, amíg az eszköz be nem bootol a Safe Mode-ba (a "system update" menübe) +1. If prompted to update, press Cancel + + If the device boots to the HOME Menu, just continue to the next step 1. Kapcsold ki a készüléked -1. Helyezd az SD kártyád a számítógépbe -1. Most a `42383841.bin` fájlnak ott kell lennie az SD kártya gyökerében. Másold ezt valahova a számítógépeden, mert használni fogod a következő oldalon -1. Navigálj a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` mappába az SD kártyán -1. Töröld ki a `F00D43D5.bin` fájlt a Nintendo DSiWare mappádból és a számítógépedről. Ez nem fog kelleni többet +___ -Továbblépés a [Boot9strap telepítésére (Fredtool)](installing-boot9strap-(fredtool)) +### Következő lépések: Válassz egy exploit-ot + +If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. + +If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} + +If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +{: .notice--warning} diff --git a/_pages/hu_HU/installing-boot9strap-(fredtool).txt b/_pages/hu_HU/installing-boot9strap-(fredtool).txt index 691003f328..51d5879867 100644 --- a/_pages/hu_HU/installing-boot9strap-(fredtool).txt +++ b/_pages/hu_HU/installing-boot9strap-(fredtool).txt @@ -6,14 +6,13 @@ title: "Boot9strap telepítése (Fredtool)"
Technikai részletek (opcionális) -

Ez a metódusa a Seedminer használatának a további exploitoláshoz használja a movable.sed fájlod, hogy dekriptáljon egy DSiWare címet, azzal az céllal, hogy beinjektáljon egy exploitolható DSiWare címet a DS Internet Settings alkalmazásba. Ez igényli, hogy rendelkezzél egy DSiWare mentéssel, amit az előző fejezetben már meg kellett szerezzél.

+

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

Ez egy jelenleg működő megvalósítása a "FIRM partitions known-plaintext" néven ismert exploitnak, amiről részletesebben olvashatsz itt.

{: .notice--info} ### Amire szükséged lesz -* Egy DSiWare mentésre, normális esetben ez a `42383841.bin` (Kell, hogy legyen egy az SD kártya gyökerében a [BannerBomb3](bannerbomb3) lépeseket követően) * A `movable.sed` fájlodra a [Seedminer](seedminer)-ből * A [Frogminer_save] legújabb kiadása (https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * A [b9sTool] legújabb kiadása (https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -27,17 +26,32 @@ További biztonsági lépésként további ellenőrzést végzünk egyedi firmwa 1. Nyomd le és tartsd nyomva (Select) gombot 1. Kapcsold be az eszközöd, miközben nyomva tartod a (Select) gombot 1. Ha az ellenőrzés sikeres volt, be fogsz bootolni a HOME Menübe és végrehajthatod ezt az útmutatót +1. Kapcsold ki a készüléked -Ha a konfigurációs menüt látod, már van CFW-d és az útmutató folyatása BRICKELHETI az eszközödet! Kövesd a [CFW ellenőrzését](checking-for-cfw) a már meglévő CFW-d frissítéséhez. +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Kövesd a [CFW ellenőrzését](checking-for-cfw) a már meglévő CFW-d frissítéséhez. {: .notice--danger} + +#### II. rész - BannerBomb3 -#### II. rész - Előkészületek +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Tedd vissza az SD kártyád a készülékedbe +1. Kapcsold be a készülékedet +1. Lépj be a System Settings-be a készülékeden +1. Navigálj ide: `Data Management` -> `DSiWare` -> `SD Card` ([kép](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Az eszközöd automatikusan ki fog kapcsolni + +#### Section III - Prep Work Ebben a fejezetben fel fogod másolni azokat a fájlokat, amik átmenetileg lecserélik a DS Connection Settings-t a Flipnote Studio-val, ami arra használt, hogy elindítsa a boot9strap (egyedi firmware) telepítőt. +1. Helyezd az SD kártyád a számítógépbe 1. Nyisd meg a [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec/) oldalt a számítógépeden 1. A "Username" mező alatt adj meg egy tetszőleges alfanumerikus nevet (nem lehet benne szóköz vagy speciális karakter) -1. A "DSiBin" mező alatt töltsd fel a `42383841.bin` fájlod az első "Browse..." opció használatával +1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. A "MovableSed" mező alatt töltsd fel a `movable.sed` fájlod a második "Browse..." opció használatával 1. Az "InjectionTarget" mező alatt válaszd ki az injection target-et `DSinternet`-re (NEM memorypit) 1. Kattints a "Build"-re @@ -46,7 +60,6 @@ Ebben a fejezetben fel fogod másolni azokat a fájlokat, amik átmenetileg lecs 1. Kattints az első keresési találatra + Ennek kell a legutolsó időbélyeggel rendelkeznie 1. Kattints az "output_(name).zip" linkre -1. Helyezd az SD kártyád a számítógépbe 1. Navigálj a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` mappába az SD kártyán + Az `` egy 32 karakter hosszú mappanév, amit a [Seedminer](seedminer)-nél másoltál + Az `` egy 32 karakter hosszú nevű mappa az `` mappában @@ -60,7 +73,7 @@ Ebben a fejezetben fel fogod másolni azokat a fájlokat, amik átmenetileg lecs ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### III. rész - A DS Connection Settings felülírása +#### Section IV - Overwriting DS Connection Settings Ebben a fejezetben másolni fogod a hackelt DS Connection Settings DSiWare-t a belső memóriába, ami átmenetileg lecseréli azt a Flipnote Studio-val. @@ -73,7 +86,7 @@ Ebben a fejezetben másolni fogod a hackelt DS Connection Settings DSiWare-t a b 1. Navigálj az `Internet Settings` -> `Nintendo DS Connections` opcióhoz, majd válaszd az "OK"-t ([kép](/images/screenshots/fredtool/dsconnection.png)) 1. Ha az exploit sikeres volt, a készülékednek ezt követően be kell töltenie a JPN verzióját a Flipnote Studio-nak -#### IV. rész - Flipnote Exploit +#### V. rész - Flipnote Exploit Ha inkább egy vizuális útmutatót szeretnél ehhez a fejezethez, [itt](https://zoogie.github.io/web/flipnote_directions/) elérhető egy. {: .notice--info} @@ -99,7 +112,7 @@ Ebben a fejezetben végrehajtasz egy specifikus lépés sorozatot a Flipnote Stu + Ha a készüléked kikapcsol amikor bekapcsolod, bizonyosodj meg róla, hogy átmásoltad-e a `boot.firm` fájlt a Luma3DS `.zip` fájlból az SD kártya gyökerébe + Ha a Luma konfigurációs képernyőjét látod, nyomj (Start) gombot a reboot-hoz, majd folytasd az útmutatót -#### V. rész - Luma3DS ellenőrzés +#### VI. rész - Luma3DS ellenőrzés A használt exploit természete, hogy alkalmanként (de ritkán) lehetséges, hogy a boot9strap nem kerül telepítésre. Ez a fejezet ezért ellenőrzi, hogy a boot9strap sikeresen telepítésre került-e az által, hogy megvizsgálja, hogy néhány fájl, amit a Luma3DS létrehoz létrejött-e. @@ -113,9 +126,9 @@ Ezen a ponton a konzolod alapértelmezetten bebootol a Luma3DS-be. + A Luma3DS nem néz ki másként, mint a normál HOME Menü. Ha a konzolod bebootolt a HOME Menübe, akkor egyedi firmware-t futtat. + A következő oldalon hasznos homebrew alkalmaásokat telepítünk, hogy teljessé tegyük a telepítésedet. -#### VI. rész - A DS Connection Settings visszaállítása +#### Section VII - Restoring DS Connection Settings -Ebben a fejezetben vissza fogod állítano a DS Connection Settings-et az az előtti állapotára, mielőtt lecserélésre került a Flipnote Studio-ra a III. részben. +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. Navigálj a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` mappába az SD kártyán 1. Másold a `42383841.bin` fájlt az `clean` mappájából a letöltött DSiWare csomagból (output_(name).zip) a `Nintendo DSiWare` mappába, felülírva az ott találhatót diff --git a/_pages/hu_HU/installing-boot9strap-(usm).txt b/_pages/hu_HU/installing-boot9strap-(usm).txt index 7b858c937c..3354a5cb59 100644 --- a/_pages/hu_HU/installing-boot9strap-(usm).txt +++ b/_pages/hu_HU/installing-boot9strap-(usm).txt @@ -18,45 +18,28 @@ title: "Boot9strap telepítése (USM)" Az utasítások az Amerikai, Európai, Japán és Koreai régiójú konzolokon működnek, amik a rendszer verzió mögött egy U, E, J vagy K betű jelöl. -Ha a (Jobb/Bal Váll), (D-Pad Fel) vagy (A) gombjaid nem működnek, [a Seedminer egy alternatív ágát](bannerbomb3) kell követned. Ha támogatásra van szükséged az anyaggal kapcsolatosan, csatlakozz a [Nintendo Homebrew-hoz Discord-on](https://discord.gg/MWxPgEp) és kérj, angolul, támogatást. +If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). Ha támogatásra van szükséged az anyaggal kapcsolatosan, csatlakozz a [Nintendo Homebrew-hoz Discord-on](https://discord.gg/MWxPgEp) és kérj, angolul, támogatást. {: .notice--warning} ### Amire szükséged lesz -* A `movable.sed` fájlodra a [Seedminer](seedminer)-ből * A [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) legfrisseb verziója (közvetlen letöltés) * A [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) legfrisseb verziója (közvetlen letöltés) * A [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) legújabb kiadása (a Luma3DS `.zip` fájl) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) #### I. rész - Előkészületek -Ebben a fejezetben fel fogod másolni azokat a fájlokat az eszközöd SD kártyájára, amik ahhoz szükségesek, hogy kiváltsák a BannerBomb3 és az unSAFE_MODE exploit-okat. +In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. -1. Ha a konzolod be van kapcsolva, most kapcsold ki -1. Nyisd meg az [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php/) oldalt a számítógépeden -1. Töltsd fel a `movable.sed` fájlod a "Choose File" opcióval -1. Kattints a "Build and Download"-ra - + Ez letölt egy exploit DSiWare-t `F00D43D5.bin` néven és egy SAFE_MODE exploit adatfájlt `usm.bin` néven egy zip mappán belül (`unSAFE_MODE.zip`) -1. Helyezd az SD kártyád a számítógépbe +1. Your SD card should be inserted in your computer 1. Másold át a `boot.firm` és `boot.3dsx` fájlt a Luma3DS `.zip`-ből az SD kártya gyökerébe + Az SD kártya gyökere a kezdőkönyvtárt jelenti az SD kártyán, ahol látható a Nintendo 3DS könyvtár, de nem vagyunk benne 1. Hozz létre egy mappát `boot9strap` néven az SD kártya gyökerében 1. Másold át a `boot9strap.firm` fájlt és a `boot9strap.firm.sha` fájlt a boot9strap `.zip` fájlból az SD kártyád `/boot9strap/` mappájába 1. Másold át a `SafeB9SInstaller.bin` fájlt a SafeB9SInstaller `.zip`-ből az SD kártyád gyökerébe -1. Másold át a `usm.bin` fájlt az `unSAFE_MODE.zip`-ből az SD kártya gyökerébe - ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} - ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} -1. Navigálj a `Nintendo 3DS` -> `` -> `` mappába az SD kártyádon - + Az `` egy 32 karakter hosszú mappanév, amit a [Seedminer](seedminer)-nél másoltál - + Az `` egy 32 karakter hosszú nevű mappa az `` mappában - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Hozz létre egy `Nintendo DSiWare` nevű mappát az `` mappában - + Ha már van mappád *és* van benne DSiWare mentés fájl (`<8-character-id>.bin`), másold őket a számítógépedre és töröld őket az SD kártyáról -1. Másold `F00D43D5.bin` fájlt az `unSAFE_MODE.zip`-ből a `Nintendo DSiWare` mappába - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +1. Copy `usm.bin` to the root of your SD card #### II. rész - BannerBomb3 @@ -66,9 +49,9 @@ Ebben a fejezetben elő fogod idézni a BannerBomb3 exploit-ot a DSIWare Managem 1. Kapcsold be a készülékedet 1. Lépj be a System Settings-be a készülékeden 1. Navigálj ide: `Data Management` -> `DSiWare` -> `SD Card` ([kép](/images/screenshots/bb3/dsiware-management.png)) - + Az eszközödnek meg kell jelenítenie a [Bannerbomb3 menüt](/images/screenshots/bb3/usm-menu.png) - + Ha ez a lépés összeomlasztja az eszközödet, [folytasd a hibaelhárítási útmutatóval](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Nyomd meg az (A) gombot, az "Inject haxx" kiválasztásához + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-usm) +1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + Az eszközöd automatikusan ki fog kapcsolni #### III. rész - unSAFE_MODE @@ -77,7 +60,7 @@ Ebben a fejezetben be fogsz lépni a Safe Mode-ba (egy funkció, ami elérhető 1. Az eszközöd kikapcsolt állapotában tartsd nyomva a következő gombokat: (Bal Váll) + (Jobb Váll) + (D-Pad Fel) + (A), majd ezen gombok nyomva tartása mellett kapcsold be az eszközöd + Tartsd nyomva a gombokat, amíg az eszköz be nem bootol a Safe Mode-ba (a "system update" menübe) - + Ha többszöri próbálkozásra sem tudsz bejutni a Safe Mode-ba, valamelyik gombod hibás lehet. Ha ez a helyzet, akkor [a Seedminer alternatív ágát](bannerbomb3) kell követned. Ha támogatásra van szükséged az anyaggal kapcsolatosan, csatlakozz a [Nintendo Homebrew-hoz Discord-on](https://discord.gg/MWxPgEp) és kérj, angolul, támogatást. + + Ha többszöri próbálkozásra sem tudsz bejutni a Safe Mode-ba, valamelyik gombod hibás lehet. If this is the case, you will need to follow [an alternate branch of BannerBomb3](installing-boot9strap-(fredtool)). Ha támogatásra van szükséged az anyaggal kapcsolatosan, csatlakozz a [Nintendo Homebrew-hoz Discord-on](https://discord.gg/MWxPgEp) és kérj, angolul, támogatást. 1. Nyomj "OK"-ot a frissítés elfogadásához + Nincs frissítés. Ez része az exploitnak 1. Nyomj az "I accept"-re a feltételek elfogadásához @@ -107,8 +90,7 @@ Ebben a fejezetben elő fogod idézni a BannerBomb3 exploit-ot egy második alka 1. Lépj be a System Settings-be a készülékeden 1. Navigálj ide: `Data Management` -> `DSiWare` -> `SD Card` ([kép](/images/screenshots/bb3/dsiware-management.png)) - + Az eszközödnek meg kell jelenítenie a [Bannerbomb3 menüt](/images/screenshots/bb3/usm-menu.png) -1. Használd a D-Pad-et a navigáláshoz, és nyomd meg az (A) gombot a "Restore slots" kiválasztásához +1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" + Az eszközöd automatikusan újra fog indulni 1. Kapcsold ki a készüléked 1. Helyezd az SD kártyád a számítógépbe diff --git a/_pages/hu_HU/seedminer.txt b/_pages/hu_HU/seedminer.txt index 7c9c060bbf..985018af90 100644 --- a/_pages/hu_HU/seedminer.txt +++ b/_pages/hu_HU/seedminer.txt @@ -56,6 +56,7 @@ Ebben a fejezetben a Bruteforce Movable weboldalt fogod használni, hogy megszer + Ha egy fél óra után is még mindig várakozol, csatlakozz a [Nintendo Homebrew Discord-on](https://discord.gg/MWxPgEp) csatornához, és kérj segítséget (angol nyelven) valakitől 1. Amikor a folyamat befejeződött, töltsd le a `movable.sed` fájlodat az oldalról + Őrizd meg ezt fájlt, mert szükséged lesz rá a következő oldalkon +1. Kapcsold ki a készüléked ___ @@ -63,11 +64,11 @@ ___ Ha meg van az eszközöd titkosítási kulcsa (`movable.sed`) más exploitokkal együtt fogod használni az egyedi firmware telepítéséhez. -#### unSAFE_MODE (Ajánlott) +#### BannerBomb3 -Ez a módszere a Seedminer használatának további exploitoláshoz használja a `movable.sed` fájlod, hogy kihasználja a SAFE_MODE firmware exploitjait, amelyek megtalálhatók minden 3DS egységen. +This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the System Settings application. -Tovább a [Boot9strap telepítésére (USM)](installing-boot9strap-(usm)) +Continue to [BannerBomb3](bannerbomb3) {: .notice--primary} ___ @@ -77,4 +78,4 @@ ___ Ha tajvani eszközöd van (amit T betű jelez a rendszer verzió mögött, mint például 11.15.0-39**T**), akkor ezt az útvonalat kell követned. **A többi régiónak nem kell követnie ezt az útvonalat.** Folytatás a [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn))-nel -{: .notice--warning} \ No newline at end of file +{: .notice--warning} diff --git a/_pages/hu_HU/troubleshooting.txt b/_pages/hu_HU/troubleshooting.txt index 6009d74280..60c4ddbdcc 100644 --- a/_pages/hu_HU/troubleshooting.txt +++ b/_pages/hu_HU/troubleshooting.txt @@ -126,11 +126,11 @@ Ha ez sikertelen, próbálkozz egy másik SD kártyával. ## Boot9strap telepítése (USM) -### A DSiWare Management menü összeomlik az USM menü megjelenése nélkül +### DSiWare Management menu crashes without showing BB3 multihax menu (USM) -Biztosítsd, hogy az `F00D43D5.bin` az egyetlen fájl a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` mappában. Ha így van, hozd létre újra az [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) segítségével. +Biztosítsd, hogy az `F00D43D5.bin` az egyetlen fájl a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` mappában. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). -Továbbá légy biztos abban, hogy az `usm.bin` fájl megtalálható az SD kártyád gyökerében. Ha hiányzik, töltsd le a legutolsó kiadását az [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest)-nak (a RELEASE `.zip` fájl), és másold az `usm.bin` fájlt az SD kártyád gyökerébe. +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. Ha ezen megoldások egyike sem javítja ezt a probélmát, akkor az egyedi firmware eltávolításra kerülhetett erről az eszközről, úgy, hogy az lehetetlenné teszi ennek a metódusnak a végrehajtását. Ha ez a helyzet, akkor [a Seedminer alternatív ágát](homebrew-launcher-(pichaxx)) kell követned. Ha támogatásra van szükséged az anyaggal kapcsolatosan, csatlakozz a [Nintendo Homebrew-hoz Discord-on](https://discord.gg/MWxPgEp) és kérj, angolul, támogatást. @@ -144,16 +144,24 @@ Az `F00D43D5.bin` hiányzik a `Nintendo 3DS` -> `` - > `` -> `Nintendo ### A DSiWare Management egy kérdőjelet mutat -Probléma van az `F00D43D5.bin` fájloddal (hibás vagy másik 3DS-hez tartozik). Hozd létre újra az `F00D43D5.bin` fájlod a [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) segítségével, biztosítva azt, hogy a konzolod `movable.sed` fájlját használod hozzá. +Probléma van az `F00D43D5.bin` fájloddal (hibás vagy másik 3DS-hez tartozik). Re-create your `F00D43D5.bin` file with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen), ensuring that you use the `movable.sed` file for your console. ### A DSiWare Management menü összeomlik lila képernyővel -Biztosítsd, hogy az `F00D43D5.bin` az egyetlen fájl a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` mappában. Ha így van, hozd létre újra a [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) segítségével. Ha ez sikertelen, az egyedi firmware lehetséges, hogy úgy lett eltávolítva erről az eszközről, hogy lehetetlenné teszi ennek a metódusnak a végrehajtását. Ha ez az eset, csatlakozz a [Nintendo Homebrew-hoz a Discord-on](https://discord.gg/MWxPgEp) segítségért. +Biztosítsd, hogy az `F00D43D5.bin` az egyetlen fájl a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` mappában. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). Ha ez sikertelen, az egyedi firmware lehetséges, hogy úgy lett eltávolítva erről az eszközről, hogy lehetetlenné teszi ennek a metódusnak a végrehajtását. Ha ez az eset, csatlakozz a [Nintendo Homebrew-hoz a Discord-on](https://discord.gg/MWxPgEp) segítségért. --- ## Boot9strap telepítése (Fredtool) +### DSiWare Management menu crashes without showing BB3 multihax menu (Fredtool) + +Biztosítsd, hogy az `F00D43D5.bin` az egyetlen fájl a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` mappában. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). + +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. + +Ha ezen megoldások egyike sem javítja ezt a probélmát, akkor az egyedi firmware eltávolításra kerülhetett erről az eszközről, úgy, hogy az lehetetlenné teszi ennek a metódusnak a végrehajtását. Ebben az esetben csatlakozz a [Nintendo Homebrew-hoz Discord-on](https://discord.gg/MWxPgEp) és kérj, támogatást angolul. + ### Hiba a Fredtool Injector oldalon Biztosítsd, hogy a `movable.sed` és a DSiWare mentés ugyanarról a konzolról származik. Egy eltérés hibához vezet. diff --git a/_pages/id_ID/bannerbomb3.txt b/_pages/id_ID/bannerbomb3.txt index 5a46749529..ea5034f134 100644 --- a/_pages/id_ID/bannerbomb3.txt +++ b/_pages/id_ID/bannerbomb3.txt @@ -6,8 +6,8 @@ title: "BannerBomb3"
Technical Details (optional) -

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

For a more technical explanation, see here.

{: .notice--info} @@ -27,38 +27,43 @@ If you have a Taiwanese console (indicated by a T after the system version), fol In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. -1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` inside of a zip file (`BannerBomb3.zip`) -1. If your console is powered on, power off your console +1. Power off your device 1. Insert your SD card into your computer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} -#### Section II - BannerBomb3 +#### Section II - Hardware Button Check -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. +In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked +1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) +1. If prompted to update, press Cancel + + If the device boots to the HOME Menu, just continue to the next step 1. Power off your device -1. Insert your SD card into your computer -1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore +___ -Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +### Next steps: Choose an exploit + +If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. + +If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} + +If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +{: .notice--warning} diff --git a/_pages/id_ID/installing-boot9strap-(fredtool).txt b/_pages/id_ID/installing-boot9strap-(fredtool).txt index 1f7825ac28..a14f20f6ba 100644 --- a/_pages/id_ID/installing-boot9strap-(fredtool).txt +++ b/_pages/id_ID/installing-boot9strap-(fredtool).txt @@ -6,14 +6,13 @@ title: "Installing boot9strap (Fredtool)"
Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

{: .notice--info} ### What You Need -* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -27,17 +26,32 @@ As an additional safety measure, we will perform an additional check for custom 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button 1. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide +1. Power off your device -If you see a configuration menu, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. {: .notice--danger} + +#### Section II - BannerBomb3 -#### Section II - Prep Work +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically power off + +#### Section III - Prep Work In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. +1. Insert your SD card into your computer 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file using the first "Browse..." option +1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option 1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) 1. Click "Build" @@ -46,7 +60,6 @@ In this section, you will copy the files necessary to temporarily replace DS Con 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link -1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` @@ -60,7 +73,7 @@ In this section, you will copy the files necessary to temporarily replace DS Con ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### Section III - Overwriting DS Connection Settings +#### Section IV - Overwriting DS Connection Settings In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. @@ -73,7 +86,7 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte 1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio -#### Section IV - Flipnote Exploit +#### Section V - Flipnote Exploit If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} @@ -99,7 +112,7 @@ In this section, you will perform a series of very specific steps within Flipnot + If your device shuts down when you try to power it on, ensure that you have copied `boot.firm` from the Luma3DS `.zip` to the root of your SD card + If you see the Luma Configuration screen, press (Start) to reboot, then continue with the guide -#### Section V - Luma3DS Verification +#### Section VI - Luma3DS Verification Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. @@ -113,9 +126,9 @@ At this point, your console will boot to Luma3DS by default. + Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware. + On the next page, you will install useful homebrew applications to complete your setup. -#### Section VI - Restoring DS Connection Settings +#### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card 1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one diff --git a/_pages/id_ID/installing-boot9strap-(usm).txt b/_pages/id_ID/installing-boot9strap-(usm).txt index b58fa784a2..4861044daf 100644 --- a/_pages/id_ID/installing-boot9strap-(usm).txt +++ b/_pages/id_ID/installing-boot9strap-(usm).txt @@ -18,45 +18,28 @@ title: "Installing boot9strap (USM)" These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. +If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--warning} ### What You Need -* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) * The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. +In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. -1. If your device is powered on, power off your device -1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` and a SAFE_MODE exploit data file called `usm.bin` inside of a zip archive (`unSAFE_MODE.zip`) -1. Insert your SD card into your computer +1. Your SD card should be inserted in your computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Create a folder named `boot9strap` on the root of your SD card 1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} - ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +1. Copy `usm.bin` to the root of your SD card #### Section II - BannerBomb3 @@ -66,9 +49,9 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana 1. Power on your device 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) - + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Press (A) to select "Inject haxx" + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-usm) +1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + Your device will automatically power off #### Section III - unSAFE_MODE @@ -77,7 +60,7 @@ In this section, you will enter Safe Mode (a feature available on all 3DS family 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) - + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of BannerBomb3](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions @@ -107,8 +90,7 @@ In this section, you will trigger the BannerBomb3 exploit a second time so that 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) -1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" +1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" + Your device will automatically reboot 1. Power off your device 1. Insert your SD card into your computer diff --git a/_pages/id_ID/seedminer.txt b/_pages/id_ID/seedminer.txt index 8ecc9a8637..b6d7e339df 100644 --- a/_pages/id_ID/seedminer.txt +++ b/_pages/id_ID/seedminer.txt @@ -56,6 +56,7 @@ In this section, you will use the Bruteforce Movable website to retrieve your de + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages +1. Power off your device ___ @@ -63,11 +64,11 @@ ___ Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. -#### unSAFE_MODE (Recommended) +#### BannerBomb3 -This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the SAFE_MODE firmware present in all 3DS units. +This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the System Settings application. -Continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +Continue to [BannerBomb3](bannerbomb3) {: .notice--primary} ___ @@ -77,4 +78,4 @@ ___ If you have a Taiwanese device (indicated with a T at the end of the system version, such as 11.15.0-39**T**), you must follow this route. **Other regions may not follow this route.** Continue to [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) -{: .notice--warning} \ No newline at end of file +{: .notice--warning} diff --git a/_pages/id_ID/troubleshooting.txt b/_pages/id_ID/troubleshooting.txt index 05797b7bdb..2668e098fc 100644 --- a/_pages/id_ID/troubleshooting.txt +++ b/_pages/id_ID/troubleshooting.txt @@ -126,11 +126,11 @@ If this is unsuccessful, try using another SD card. ## Installing boot9strap (USM) -### DSiWare Management menu crashes without showing USM menu +### DSiWare Management menu crashes without showing BB3 multihax menu (USM) -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php). +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). -Also, ensure that `usm.bin` is on the root of the SD card. If it is missing, then download the latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) (the RELEASE `.zip` file), and copy the `usm.bin` file to the root of your SD card. +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, you will need to follow [an alternate branch of Seedminer](homebrew-launcher-(pichaxx)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. @@ -144,16 +144,24 @@ If neither of these solutions fixes this problem, then custom firmware may have ### DSiWare Management shows a question mark -There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php), ensuring that you use the `movable.sed` file for your console. +There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen), ensuring that you use the `movable.sed` file for your console. ### DSiWare Management menu crashes without purple screen -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. --- ## Installing boot9strap (Fredtool) +### DSiWare Management menu crashes without showing BB3 multihax menu (Fredtool) + +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). + +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. + +If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + ### Error on Fredtool Injector page Ensure that your `movable.sed` and DSiWare backup come from the same console. A mismatch will result in an error. diff --git a/_pages/it_IT/bannerbomb3.txt b/_pages/it_IT/bannerbomb3.txt index 733f51d683..c43179f377 100644 --- a/_pages/it_IT/bannerbomb3.txt +++ b/_pages/it_IT/bannerbomb3.txt @@ -6,8 +6,8 @@ title: "BannerBomb3"
Dettagli Tecnici (opzionale) -

Per eseguire un dump dei DSiWare di sistema, approfittiamo di una falla di sicurezza nella sezione Gestione Nintendo DSiWare dell'applicazione Impostazioni della console.

-

A questo scopo, utilizziamo la chiave di cifratura della tua console (movable.sed) per generare un backup DSiWare che induce la console a creare un dump dell'applicazione Impostazioni Internet DSi nella directory principale della scheda SD.

+

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

Per una spiegazione più tecnica, consulta questa pagina.

{: .notice--info} @@ -27,38 +27,43 @@ Se hai una console taiwanese (indicata da una T dopo la versione di sistema), se In questa sezione, copierai i file necessari per attivare l'exploit BannerBomb3 nella scheda SD della tua console. -1. Avvia [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) sul tuo computer -1. Carica il tuo file movable.sed scegliendo l'opzione "Choose File" -1. Seleziona "Build and Download" - + Verrà scaricato un DSiWare da usare come exploit chiamato `F00D43D5.bin`all'interno di un file zip (`BannerBomb3.zip`) -1. Se la tua console è accesa, spegnila +1. Spegni il tuo 3DS 1. Inserisci la scheda SD nel tuo computer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + La directory principale della scheda SD è la cartella della tua scheda SD in cui è possibile visualizzare la cartella Nintendo 3DS, ma non il suo interno 1. Nella tua scheda SD, entra in `Nintendo 3DS` -> `` -> `` + `` è il nome a 32 lettere della cartella che hai copiato in [Seedminer](seedminer) + `` è una cartella dal nome lungo 32 caratteri all'interno di `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Crea una cartella chiamata `Nintendo DSiWare` all'interno di `` + Se hai già la cartella *e* sono già presenti dei file di backup DSiWare (`.bin`) all'interno, copiali sul PC e rimuovili dalla scheda SD -1. Copia il file `F00D43D5.bin` da `BannerBomb3.zip` nella cartella `Nintendo DSiWare` +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} -#### Sezione II - BannerBomb3 +#### Section II - Hardware Button Check -In questa sezione, attiverai l'exploit BannerBomb3 utilizzando il menu Gestione Nintendo DSiWare e copierai il file dump risultante sul computer per poterlo utilizzare nella pagina successiva. +In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. -1. Reinserisci la scheda SD nella tua console -1. Accendi la console -1. Avvia "Impostazioni della console" -1. Entra in `Gestione dati` -> `DSiWare` -> `Scheda SD` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Lo schermo della console dovrebbe lampeggiare magenta (rosa/viola), per poi crashare qualche secondo dopo. Ciò significa che l'exploit ha avuto successo +1. Con la console ancora spenta, tieni premuto i pulsanti (L) + (R) + (Su) + (A), dopodiché, tenendo premuti i pulsanti, accendi la console + + Mantieni premuti i pulsanti finché la console non si avvia in Safe Mode (una specie di menu per aggiornare il sistema) +1. If prompted to update, press Cancel + + If the device boots to the HOME Menu, just continue to the next step 1. Spegni il tuo 3DS -1. Inserisci la scheda SD nel tuo computer -1. Ora dovresti avere il file `42383841.bin` nella directory principale della tua scheda SD. Copia questo file da qualche parte sul tuo computer, dato che lo userai nella prossima pagina -1. Nella tua scheda SD, entra in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` -1. Elimina il file `F0D43D5.bin` dalla cartella Nintendo DSiWare e dal tuo computer. Questo file non sarà più necessario +___ -+ Prosegui con l'[Installazione di boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +### Passaggi successivi: Scelta di un exploit + +If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. + +If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} + +If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +{: .notice--warning} diff --git a/_pages/it_IT/installing-boot9strap-(fredtool).txt b/_pages/it_IT/installing-boot9strap-(fredtool).txt index ca4471e77a..ab6369940c 100644 --- a/_pages/it_IT/installing-boot9strap-(fredtool).txt +++ b/_pages/it_IT/installing-boot9strap-(fredtool).txt @@ -6,14 +6,13 @@ title: "Installazione di boot9strap (Fredtool)"
Dettagli Tecnici (opzionale) -

Seedminer utilizza il tuo file movable.sed per decriptare un qualunque titolo DSiWare ed iniettare una particolare applicazione DSiWare nell'applicazione Connessioni Nintendo DS. Questo richiede di avere un backup DSiWare, che dovresti aver ottenuto nella sezione precedente.

+

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

Utilizzeremo una falla, attualmente funzionante, denominata "FIRM partitions known-plaintext" qui.

{: .notice--info} ### Cosa serve -* Un backup DSiWare, di solito `42383841.bin` (dovresti averne uno nella directory principale della tua scheda SD dopo aver seguito [BannerBomb3](bannerbomb3)) * Il tuo file `movable.sed` dalla sezione [Seedminer](seedminer) * L'ultima versione di [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * L'ultima versione di [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -27,17 +26,32 @@ Come precauzione aggiuntiva, controlleremo anche la presenza di un custom firmwa 1. Premi il pulsante (Select) 1. Accendi la tua console continuando a tenere premuto il pulsante (Select) 1. Se il controllo è andato a buon fine, verrà avviato il menu HOME e potrai procedere con questa guida +1. Spegni il tuo 3DS -Se visualizzi un menu di configurazione, hai già un CFW e continuando con queste istruzioni potresti BRICKARE la tua console! Procedi con la [Verifica del CFW](checking-for-cfw) per aggiornare il tuo CFW esistente. +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Procedi con la [Verifica del CFW](checking-for-cfw) per aggiornare il tuo CFW esistente. {: .notice--danger} + +#### Sezione II - BannerBomb3 -#### Sezione II - Preparazione +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reinserisci la scheda SD nella tua console +1. Accendi la console +1. Avvia "Impostazioni della console" +1. Entra in `Gestione dati` -> `DSiWare` -> `Scheda SD` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + La tua console si spegnerà automaticamente + +#### Section III - Prep Work In questa sezione copierai i file necessari per sostituire temporaneamente "Impostazioni di collegamento" con Flipnote Studio, usato per lanciare l'installer di boot9strap (custom firmware). +1. Inserisci la scheda SD nel tuo computer 1. Apri il sito [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) sul tuo computer 1. Sotto il campo "Username" inserisci un nome alfanumerico qualunque (senza spazi o caratteri speciali) -1. Sul il campo "DSiBin", carica il tuo file `42383841.bin` usando la prima opzione "Browse..." +1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. Sul campo "MovableSed", carica il tuo file `movable.sed` usando la seconda opzione "Browse..." 1. Sul campo "InjectionTarget", imposta l'obiettivo dell'iniezione su `DSinternet` (NON memorypit) 1. Clicca "Build" @@ -46,7 +60,6 @@ In questa sezione copierai i file necessari per sostituire temporaneamente "Impo 1. Clicca sul primo risultato della ricerca + Dovrebbe avere la data più recente 1. Clicca il link "output_(name).zip" -1. Inserisci la scheda SD nel tuo computer 1. Nella tua scheda SD, entra in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` + `` è il nome a 32 lettere della cartella che hai copiato in [Seedminer](seedminer) + `` è una cartella dal nome lungo 32 caratteri all'interno di `` @@ -60,7 +73,7 @@ In questa sezione copierai i file necessari per sostituire temporaneamente "Impo ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### Sezione III - Sovrascrittura delle Impostazioni di collegamento DS +#### Section IV - Overwriting DS Connection Settings In questa sezione copierai il DSiWare modificato "Impostazioni di collegamento DS" nella memoria interna, che verrà così temporaneamente sostituito da Flipnote Studio. @@ -73,7 +86,7 @@ In questa sezione copierai il DSiWare modificato "Impostazioni di collegamento D 1. Entra in `Impostazioni Internet` -> `Connessioni Nintendo DS`, quindi seleziona "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. Se l'exploit ha avuto successo, la tua console avrà caricato la versione JPN di Flipnote Studio -#### Sezione IV - Exploit Flipnote +#### Sezione V - Exploit Flipnote Se desideri una guida visiva per questa parte, è disponibile [qui](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} @@ -99,7 +112,7 @@ In questa sezione eseguirai una serie di passaggi molto specifici all'interno di + Se la console dovesse spegnersi quando provi ad accenderla, assicurati di aver copiato il file `boot.firm` dall'archivio `.zip` di Luma3DS nella directory principale della tua scheda SD + Se vedi la schermata di configurazione di Luma, premi (Start) per riavviare la console, quindi continua con la guida -#### Sezione V - Verifica di Luma3DS +#### Sezione VI - Verifica di Luma3DS A causa della natura dell'exploit utilizzato, è, seppur raramente, possibile che boot9strap non venga effettivamente installato. Questa sezione verificherà quindi che boot9strap sia stato installato con successo verificando la presenza di file generati automaticamente da Luma3DS. @@ -113,9 +126,9 @@ A questo punto, la console avvierà sempre Luma3DS. + Luma3DS non è diverso dal normale menu HOME. Se la console avvia il menu HOME, vuol dire che sta eseguendo il custom firmware. + Nella pagina successiva installerai applicazioni homebrew utili per completare la tua installazione. -#### Sezione VI - Ripristino delle Impostazioni di Connessione DS +#### Section VII - Restoring DS Connection Settings -In questa sezione ripristinerai "Impostazioni di collegamento DS" nel modo in cui era prima che fosse temporaneamente sostituito con Flipnote Studio nella Sezione III. +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. Nella tua scheda SD, entra in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 1. Copia il file `42383841.bin` dalla cartella `clean` dall'archivio DSiWare appena scaricato (`output_(name).zip`) nella cartella `Nintendo DSiWare`, sostituendo quello preesistente diff --git a/_pages/it_IT/installing-boot9strap-(usm).txt b/_pages/it_IT/installing-boot9strap-(usm).txt index 5dd4714055..881df30ccc 100644 --- a/_pages/it_IT/installing-boot9strap-(usm).txt +++ b/_pages/it_IT/installing-boot9strap-(usm).txt @@ -18,45 +18,28 @@ title: "Installazione di boot9strap (USM)" Queste istruzioni funzionano su console americane, europee, giapponesi e coreane, indicate rispettivamente dalle lettere U, E, J o K dopo la versione del sistema operativo. -Se i tuoi pulsanti (L/R), (Su) o (A) non funzionano, dovrai usare [una versione alternativa di Seedminer](bannerbomb3). In questi casi, puoi ricevere assistenza chiedendo, in inglese, nel [canale Discord di Nintendo Homebrew](https://discord.gg/MWxPgEp). +If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). In questi casi, puoi ricevere assistenza chiedendo, in inglese, nel [canale Discord di Nintendo Homebrew](https://discord.gg/MWxPgEp). {: .notice--warning} ### Cosa serve -* Il tuo file `movable.sed` dalla sezione [Seedminer](seedminer) * L'ultima versione di [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (download diretto) * L'ultima versione di [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (download diretto) * L'ultima versione di [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (il file `.zip` di Luma3DS) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) #### Sezione I - Preparazione -In questa sezione copierai i file necessari per attivare l'exploit BannerBomb3 e unSAFE_MODE nella scheda SD della tua console. +In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. -1. Se la tua console è accesa, spegnila -1. Avvia [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) sul tuo computer -1. Carica il tuo file movable.sed scegliendo l'opzione "Choose File" -1. Seleziona "Build and Download" - + Verrà scaricato un exploit DSiWare chiamato `F00D43D5.bin` e l'exploit di SAFE_MODE `usm.bin` all'interno di un archivio zip (`unSAFE_MODE.zip`) -1. Inserisci la scheda SD nel tuo computer +1. Your SD card should be inserted in your computer 1. Copia i file `boot.firm` e `boot.3dsx` dall'archivio `.zip` di Luma3DS nella directory principale della tua scheda SD + La directory principale della scheda SD è la cartella della tua scheda SD in cui è possibile visualizzare la cartella Nintendo 3DS, ma non il suo interno 1. Crea una cartella chiamata `boot9strap` nella directory principale della tua scheda SD 1. Copia i file `boot9strap.firm` e `boot9strap.firm.sha` dall'archivio `.zip` di boot9strap nella cartella `/boot9strap/` della tua scheda SD 1. Copia il file `SafeB9SInstaller.bin` dall'archivio `.zip` di SafeB9SInstaller nella directory principale della tua scheda SD -1. Copia il file `usm.bin` da `unSAFE_MODE.zip` nella directory principale della tua scheda SD - ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} - ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} -1. Nella tua scheda SD, entra in `Nintendo 3DS` -> `` -> `` - + `` è il nome a 32 lettere della cartella che hai copiato in [Seedminer](seedminer) - + `` è una cartella dal nome lungo 32 caratteri all'interno di `` - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Crea una cartella chiamata `Nintendo DSiWare` all'interno di `` - + Se hai già la cartella *e* sono già presenti dei file di backup DSiWare (`.bin`) all'interno, copiali sul PC e rimuovili dalla scheda SD -1. Copia il file `F00D43D5.bin` da `unSAFE_MODE.zip` nella cartella `Nintendo DSiWare` - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +1. Copy `usm.bin` to the root of your SD card #### Sezione II - BannerBomb3 @@ -66,9 +49,9 @@ In questa sezione attiverai l'exploit BannerBomb3 utilizzando il menu Gestione N 1. Accendi la console 1. Avvia "Impostazioni della console" 1. Entra in `Gestione dati` -> `DSiWare` -> `Scheda SD` ([image](/images/screenshots/bb3/dsiware-management.png)) - + La tua console dovrebbe mostrare il [menu Bannerbomb3](/images/screenshots/bb3/usm-menu.png) - + Se questo passaggio causa il crash della tua console, [segui questa guida per risolvere il problema](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Premi (A) per selezionare "Inject haxx" + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-usm) +1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + La tua console si spegnerà automaticamente #### Sezione III - unSAFE_MODE @@ -77,7 +60,7 @@ In questa sezione avvierai la Modalità Provvisoria (una funzionalità disponibi 1. Con la console ancora spenta, tieni premuto i pulsanti (L) + (R) + (Su) + (A), dopodiché, tenendo premuti i pulsanti, accendi la console + Mantieni premuti i pulsanti finché la console non si avvia in Safe Mode (una specie di menu per aggiornare il sistema) - + Se dopo molteplici tentativi non riesci ancora ad entrare in Safe Mode, potresti avere uno dei pulsanti difettosi o rotti. In tal caso, dovrai seguire [un metodo alternativo di Seedminer](bannerbomb3). In questi casi, puoi ricevere assistenza chiedendo, in inglese, nel [canale Discord di Nintendo Homebrew](https://discord.gg/MWxPgEp). + + Se dopo molteplici tentativi non riesci ancora ad entrare in Safe Mode, potresti avere uno dei pulsanti difettosi o rotti. If this is the case, you will need to follow [an alternate branch of BannerBomb3](installing-boot9strap-(fredtool)). In questi casi, puoi ricevere assistenza chiedendo, in inglese, nel [canale Discord di Nintendo Homebrew](https://discord.gg/MWxPgEp). 1. Premi "OK" per accettare l'aggiornamento + Non c'è alcun aggiornamento. Fa parte del procedimento 1. Premi "Accetto" per accettare i termini e le condizioni @@ -107,8 +90,7 @@ In questa sezione avvierai l'exploit BannerBomb3 una seconda volta per ripristin 1. Avvia "Impostazioni della console" 1. Entra in `Gestione dati` -> `DSiWare` -> `Scheda SD` ([image](/images/screenshots/bb3/dsiware-management.png)) - + La tua console dovrebbe mostrare il [menu Bannerbomb3](/images/screenshots/bb3/usm-menu.png) -1. Usa il D-Pad per spostarti sul menu "Restore slots", quindi premi il pulsante (A) +1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" + La tua console si riavvierà automaticamente 1. Spegni il tuo 3DS 1. Inserisci la scheda SD nel tuo computer diff --git a/_pages/it_IT/seedminer.txt b/_pages/it_IT/seedminer.txt index 73e6977727..7556ceb640 100644 --- a/_pages/it_IT/seedminer.txt +++ b/_pages/it_IT/seedminer.txt @@ -56,6 +56,7 @@ In questa sezione utilizzerai il sito web Bruteforce Movable per recuperare la c + Se dopo mezz'ora non è successo nulla, entra nel [canale Discord di Nintendo Homebrew](https://discord.gg/MWxPgEp) (in Inglese) per richiedere assistenza 1. Al termine del processo, scarica il tuo file `movable.sed` dal sito + Conserva questo file in quanto ti servirà nelle pagine successive +1. Spegni il tuo 3DS ___ @@ -63,11 +64,11 @@ ___ Una volta ottenuta la chiave di crittografia della tua console (`movable.sed`), la userai in combinazione ad altri exploit per installare un custom firmware sul tuo 3DS. -#### unSAFE_MODE (Consigliato) +#### BannerBomb3 -Seedminer utilizza il tuo file `movable.sed` per sfruttare gli exploit presenti nel firmware SAFE_MODE presente in ogni console 3DS. +This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the System Settings application. -Prosegui con l'[Installazione di boot9strap (USM)](installing-boot9strap-(usm)) +Continue to [BannerBomb3](bannerbomb3) {: .notice--primary} ___ @@ -77,4 +78,4 @@ ___ Se hai una console Taiwanese (indicata con una T al termine della versione del sistema, come ad esempio 11.15.0-39**T**), devi seguire queste istruzioni. **Console di altre regioni non devono seguire queste istruzioni.** Prosegui con [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) -{: .notice--warning} \ No newline at end of file +{: .notice--warning} diff --git a/_pages/it_IT/troubleshooting.txt b/_pages/it_IT/troubleshooting.txt index ade219f9c5..9830fed66f 100644 --- a/_pages/it_IT/troubleshooting.txt +++ b/_pages/it_IT/troubleshooting.txt @@ -126,11 +126,11 @@ Se il problema non si risolve, prova ad usare un'altra scheda SD. ## Installazione di boot9strap (USM) -### Il menu di Gestione Nintendo DSiWare crasha senza mostrare il menu USM +### DSiWare Management menu crashes without showing BB3 multihax menu (USM) -Assicurati che il file `F00D43D5.bin` sia l'unico file presente in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. In tal caso, ricrealo con [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php). +Assicurati che il file `F00D43D5.bin` sia l'unico file presente in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). -Inoltre, assicurati che il file `usm.bin` sia nella directory principale dela tua scheda SD. Se manca, scarica l'ultima versione di [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) (il file RELEASE `.zip`), e copia il file `usm.bin` nella directory principale della tua scheda SD. +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. Se nessuna di queste soluzioni dovesse risolvere il problema, allora un custom firmware potrebbe essere già stato disinstallato da questa console in modo tale da rendere questo metodo impossibile. In questo caso, dovrai seguire [un metodo alternativo di Seedminer](homebrew-launcher-(pichaxx)). In questi casi, puoi ricevere assistenza chiedendo, in inglese, nel [canale Discord di Nintendo Homebrew](https://discord.gg/MWxPgEp). @@ -144,16 +144,24 @@ Manca il file `F00D43D5.bin` da `Nintendo 3DS` -> `` -> `` -> `Nintend ### Gestione Nintendo DSiWare mostra un punto interrogativo -Potrebbe esserci un problema con il tuo file `F00D43D5.bin` (potrebbe essere corrotto o per un diverso 3DS). Ri-crea il tuo file `F00D43D5.bin` con [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php), assicurandoti di utilizzare il file `movable.sed` della tua console. +Potrebbe esserci un problema con il tuo file `F00D43D5.bin` (potrebbe essere corrotto o per un diverso 3DS). Re-create your `F00D43D5.bin` file with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen), ensuring that you use the `movable.sed` file for your console. ### Il menu di Gestione Nintendo DSiWare crasha senza schermata viola -Assicurati che il file `F00D43D5.bin` sia l'unico file presente in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. In tal caso, ricrealo con [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php). Se dovesse di nuovo fallire, potrebbe essere già stato disinstallato un custom firmware su questa console in modo tale da rendere questo metodo impossibile. In tal caso, entra nel [canale Discord di Nintendo Homebrew](https://discord.gg/MWxPgEp) per chiedere assistenza. +Assicurati che il file `F00D43D5.bin` sia l'unico file presente in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). Se dovesse di nuovo fallire, potrebbe essere già stato disinstallato un custom firmware su questa console in modo tale da rendere questo metodo impossibile. In tal caso, entra nel [canale Discord di Nintendo Homebrew](https://discord.gg/MWxPgEp) per chiedere assistenza. --- ## Installazione di boot9strap (Fredtool) +### DSiWare Management menu crashes without showing BB3 multihax menu (Fredtool) + +Assicurati che il file `F00D43D5.bin` sia l'unico file presente in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). + +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. + +Se nessuna di queste soluzioni dovesse risolvere il problema, allora un custom firmware potrebbe essere già stato disinstallato da questa console in modo tale da rendere questo metodo impossibile. In tal caso, puoi ricevere assistenza chiedendo, in inglese, nel [canale Discord di Nintendo Homebrew](https://discord.gg/MWxPgEp). + ### Errore nella pagina Fredtool Injector Assicurati che il file `movable.sed` e il backup DSiWare provengano dalla stessa console. La mancata corrispondenza comporterà un errore. diff --git a/_pages/ja_JP/bannerbomb3.txt b/_pages/ja_JP/bannerbomb3.txt index a64d083664..84b28950f8 100644 --- a/_pages/ja_JP/bannerbomb3.txt +++ b/_pages/ja_JP/bannerbomb3.txt @@ -6,8 +6,8 @@ title: "BannerBomb3"
Technical Details (optional) -

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

For a more technical explanation, see here.

{: .notice--info} @@ -27,38 +27,43 @@ If you have a Taiwanese console (indicated by a T after the system version), fol In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. -1. [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) をあなたのコンピューターで開いてください。 -1. "ファイルを選択"から movable.sed ファイルをアップロードします。 -1. 「Build and Download」をクリックしてください。 - + 脆弱性を含んだDSiWareである `F00D43D5.bin` が入ったZIPファイルをダウンロードします。 (`BannerBomb3.zip`) -1. コンソールの電源が入っている場合は、コンソールの電源を切ります +1. 本体の電源を切ります。 1. パソコンにSDカードを入れます +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + SDカードのルートとは、Nintendo 3DSのフォルダなどがある最初の項目のことであり、フォルダの中ではありません。 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} -#### セクション II - BannerBomb3 +#### Section II - Hardware Button Check -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. +In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. -1. 再度、SDカードを本体に挿入してください。 -1. デバイスの電源を入れます -1. デバイスの「本体設定」を開きます。 -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + システムはマゼンダ(ピンク/パープル)色で点滅してから数秒でクラッシュするはずです。 それは成功したことを意味します。 +1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) +1. If prompted to update, press Cancel + + If the device boots to the HOME Menu, just continue to the next step 1. 本体の電源を切ります。 -1. パソコンにSDカードを入れます -1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page -1. SDカードの`Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`へ移動します -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. このファイルはもう必要ありません。 +___ -引き続き [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) へ進んでください。 +### Next steps: Choose an exploit + +If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. + +If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} + +If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +{: .notice--warning} diff --git a/_pages/ja_JP/installing-boot9strap-(fredtool).txt b/_pages/ja_JP/installing-boot9strap-(fredtool).txt index 6a1387a29d..76211936bc 100644 --- a/_pages/ja_JP/installing-boot9strap-(fredtool).txt +++ b/_pages/ja_JP/installing-boot9strap-(fredtool).txt @@ -6,14 +6,13 @@ title: "Installing boot9strap (Fredtool)"
Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

{: .notice--info} ### 必要なもの -* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * [Seedminer](seedminer) より作成した、 `movable.sed` ファイル * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -27,17 +26,32 @@ As an additional safety measure, we will perform an additional check for custom 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button 1. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide +1. 本体の電源を切ります。 -If you see a configuration menu, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. {: .notice--danger} + +#### セクション II - BannerBomb3 -####セクションⅡ-準備 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. 再度、SDカードを本体に挿入してください。 +1. デバイスの電源を入れます +1. 「本体設定」を開きます。 +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically power off + +#### Section III - Prep Work In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. +1. パソコンにSDカードを入れます 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file using the first "Browse..." option +1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option 1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) 1. Click "Build" @@ -46,7 +60,6 @@ In this section, you will copy the files necessary to temporarily replace DS Con 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link -1. パソコンにSDカードを入れます 1. SDカードの`Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`へ移動します + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` @@ -60,7 +73,7 @@ In this section, you will copy the files necessary to temporarily replace DS Con ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### Section III - Overwriting DS Connection Settings +#### Section IV - Overwriting DS Connection Settings In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. @@ -73,7 +86,7 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte 1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. 完了した場合、日本語のうごくメモ帳が開きます -#### Section IV - Flipnote Exploit +#### Section V - Flipnote Exploit このセクションのビジュアルガイドをご希望の場合は、 [このリンク](https://zoogie.github.io/web/flipnote_directions/) からご利用いただけます。 {: .notice--info} @@ -99,7 +112,7 @@ In this section, you will perform a series of very specific steps within Flipnot + If your device shuts down when you try to power it on, ensure that you have copied `boot.firm` from the Luma3DS `.zip` to the root of your SD card + If you see the Luma Configuration screen, press (Start) to reboot, then continue with the guide -#### Section V - Luma3DS Verification +#### Section VI - Luma3DS Verification Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. @@ -113,9 +126,9 @@ At this point, your console will boot to Luma3DS by default. + Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware. + On the next page, you will install useful homebrew applications to complete your setup. -#### Section VI - Restoring DS Connection Settings +#### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. SDカードの`Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`へ移動します 1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one diff --git a/_pages/ja_JP/installing-boot9strap-(usm).txt b/_pages/ja_JP/installing-boot9strap-(usm).txt index 26d191ed13..8c377dbc43 100644 --- a/_pages/ja_JP/installing-boot9strap-(usm).txt +++ b/_pages/ja_JP/installing-boot9strap-(usm).txt @@ -18,45 +18,28 @@ title: "boot9strap(USM) の導入" これらのガイドは、システムバージョン末尾にある「U、E、J、K」にあるように、米国、欧州、日本、韓国の端末で機能します。 -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. +If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--warning} ### 必要なもの -* [Seedminer](seedminer) でダウンロードした `movable.sed` ファイル * The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) * The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) #### セクション I - 準備 -In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. +In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. -1. 本体の電源が入っている場合、本体の電源を切ります -1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer -1. "ファイルを選択"から movable.sed ファイルをアップロードします。 -1. 「Build and Download」をクリックしてください。 - + This will download an exploit DSiWare called `F00D43D5.bin` and a SAFE_MODE exploit data file called `usm.bin` inside of a zip archive (`unSAFE_MODE.zip`) -1. パソコンにSDカードを入れます +1. Your SD card should be inserted in your computer 1. `boot.firm` と `boot.3dsx` をLuma3DSの `.zip` からSDカードのルートにコピーします + SDカードのルートとは、Nintendo 3DSのフォルダなどがある最初の項目のことであり、フォルダの中ではありません。 1. `boot9strap`という名前のフォルダをSDカードのルート上に作成します。 1. `boot9strap.firm`と`boot9strap.firm.sha`を boot9strap `.zip` ファイルから解凍し、SD カードのboot9strapフォルダにコピーします。 1. SafeB9SInstaller `.zip` から`SafeB9SInstaller.bin`をSDカードのルートへコピーします -1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} - ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +1. Copy `usm.bin` to the root of your SD card #### セクション II - BannerBomb3 @@ -66,9 +49,9 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana 1. 本体の電源を入れます 1. 「本体設定」を開きます。 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) - + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Press (A) to select "Inject haxx" + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-usm) +1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + Your device will automatically power off #### セクション III - unSAFE_MODE @@ -77,7 +60,7 @@ In this section, you will enter Safe Mode (a feature available on all 3DS family 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) - + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of BannerBomb3](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. 「OK」を押して更新を承認します + アップデートはありません。 そういう仕組みになっています 1. 「承諾」を押して利用規約に同意します @@ -107,8 +90,7 @@ In this section, you will trigger the BannerBomb3 exploit a second time so that 1. 「本体設定」を開きます。 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) -1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" +1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" + Your device will automatically reboot 1. 本体の電源を切ります。 1. パソコンにSDカードを入れます diff --git a/_pages/ja_JP/seedminer.txt b/_pages/ja_JP/seedminer.txt index 27036ed64a..88bbe2c45d 100644 --- a/_pages/ja_JP/seedminer.txt +++ b/_pages/ja_JP/seedminer.txt @@ -56,6 +56,7 @@ In this section, you will use the Bruteforce Movable website to retrieve your de + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site + このファイルは今後必要になるので、保管してください +1. 本体の電源を切ります。 ___ @@ -63,11 +64,11 @@ ___ Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. -#### unSAFE_MODE (Recommended) +#### BannerBomb3 -This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the SAFE_MODE firmware present in all 3DS units. +This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the System Settings application. -Continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +Continue to [BannerBomb3](bannerbomb3) {: .notice--primary} ___ @@ -77,4 +78,4 @@ ___ If you have a Taiwanese device (indicated with a T at the end of the system version, such as 11.15.0-39**T**), you must follow this route. **Other regions may not follow this route.** Continue to [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) -{: .notice--warning} \ No newline at end of file +{: .notice--warning} diff --git a/_pages/ja_JP/troubleshooting.txt b/_pages/ja_JP/troubleshooting.txt index 0358d43ab2..dbd63e311d 100644 --- a/_pages/ja_JP/troubleshooting.txt +++ b/_pages/ja_JP/troubleshooting.txt @@ -126,11 +126,11 @@ If this is unsuccessful, try using another SD card. ## Installing boot9strap (USM) -### DSiWare Management menu crashes without showing USM menu +### DSiWare Management menu crashes without showing BB3 multihax menu (USM) -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php). +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). -Also, ensure that `usm.bin` is on the root of the SD card. If it is missing, then download the latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) (the RELEASE `.zip` file), and copy the `usm.bin` file to the root of your SD card. +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, you will need to follow [an alternate branch of Seedminer](homebrew-launcher-(pichaxx)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. @@ -144,16 +144,24 @@ If neither of these solutions fixes this problem, then custom firmware may have ### DSiWare Management shows a question mark -There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php), ensuring that you use the `movable.sed` file for your console. +There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen), ensuring that you use the `movable.sed` file for your console. ### DSiWare Management menu crashes without purple screen -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. --- ## Installing boot9strap (Fredtool) +### DSiWare Management menu crashes without showing BB3 multihax menu (Fredtool) + +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). + +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. + +If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + ### Error on Fredtool Injector page Ensure that your `movable.sed` and DSiWare backup come from the same console. A mismatch will result in an error. diff --git a/_pages/ko_KR/bannerbomb3.txt b/_pages/ko_KR/bannerbomb3.txt index 040f818a59..04dec90bbf 100644 --- a/_pages/ko_KR/bannerbomb3.txt +++ b/_pages/ko_KR/bannerbomb3.txt @@ -6,8 +6,8 @@ title: "BannerBomb3"
Technical Details (optional) -

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

For a more technical explanation, see here.

{: .notice--info} @@ -27,38 +27,43 @@ title: "BannerBomb3" In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. -1. 컴퓨터에서 [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php)를 열어 주세요 -1. "Choose File"를 선택하여 `movable.sed`를 업로드 해 주세요 -1. "Build and Download"를 선택해 주세요 - + 이것은 `F00D43D5.bin`이라는 취약점 DSiWare이 들어 있는 zip 파일 (`BannerBomb3.zip`)을 다운로드 합니다 -1. 기기의 전원이 켜져 있다면, 전원을 꺼 주세요 +1. 기기를 종료해 주세요 1. SD 카드를 컴퓨터에 삽입해 주세요 +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + SD 카드의 루트는 SD 카드를 열 때 보이는 디렉토리이고, Nintendo 3DS 폴더가 보이지만 그 안에 않 들어가 있는 상태의 폴더 입니다 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} -#### 섹션 II - BannerBomb3 +#### Section II - Hardware Button Check -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. +In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. -1. SD 카드를 기기에 다시 삽입해 주세요 -1. 기기를 시작해 주세요 -1. 기기에서 본체 설정을 열어 주세요 -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + 기기가 마젠타 (분홍/보라)색이 번쩍 하다가 몇 초 후 크래시 할 겁니다. 이것은 재대로 됐다는 뜻 입니다 +1. 전원이 꺼져 있는 상태에서 (L 어깨) + (R 어깨) + (십자 Up) + (A) 를 길게 눌르고, 누르는 상태에서 전원을 켜 주세요 + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) +1. If prompted to update, press Cancel + + If the device boots to the HOME Menu, just continue to the next step 1. 기기를 종료해 주세요 -1. SD 카드를 컴퓨터에 삽입해 주세요 -1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page -1. SD 카드의 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 폴더로 이동해 주세요 -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. 더 이상 이 파일은 필요가 없습니다 +___ -[boot9strap 설치 (Fredtool)](installing-boot9strap-(fredtool))로 계속 +### Next steps: Choose an exploit + +If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. + +If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} + +If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +{: .notice--warning} diff --git a/_pages/ko_KR/installing-boot9strap-(fredtool).txt b/_pages/ko_KR/installing-boot9strap-(fredtool).txt index 5d071dfdf4..d06a547237 100644 --- a/_pages/ko_KR/installing-boot9strap-(fredtool).txt +++ b/_pages/ko_KR/installing-boot9strap-(fredtool).txt @@ -6,14 +6,13 @@ title: "Installing boot9strap (Fredtool)"
Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

{: .notice--info} ### 준비물 -* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * [Seedminer](seedminer)에서 받은 `movable.sed` 파일 * 최신 버전의 [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest`) (`Frogminer_save.zip`) * 최신 버전의 [b9sTool](https://github.com/zoogie/b9sTool/releases/latest`) (`boot.nds`) @@ -27,17 +26,32 @@ As an additional safety measure, we will perform an additional check for custom 1. (Select) 버튼을 길게 눌러 주세요 1. (Select) 버튼을 계속 눌러 있는 상태에서 기기의 전원을 켜 주세요 1. 만약 HOME 메뉴가 켜지면, 이 확인은 성공적이고, 가이드를 진행하면 됩니다 +1. 기기를 종료해 주세요 -만약 설정 메뉴가 보이면, 이 기기는 이미 커스텀 펌웨어가 설치되어 있고, 이 작업을 진행하면 기기가 벽돌 될수가 있습니다! 이미 존재하는 CFW를 업데이트 할 수 있도록 [CFW 확인](checking-for-cfw)를 진행해 주세요. +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! 이미 존재하는 CFW를 업데이트 할 수 있도록 [CFW 확인](checking-for-cfw)를 진행해 주세요. {: .notice--danger} + +#### 섹션 II - BannerBomb3 -#### 섹션 II - 준비 작업 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. SD 카드를 기기에 다시 삽입해 주세요 +1. 기기를 시작해 주세요 +1. 기기에서 본체 설정을 열어 주세요 +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + 기기가 자동으로 종료될 겁니다 + +#### Section III - Prep Work In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. +1. SD 카드를 컴퓨터에 삽입해 주세요 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. "Username"에 영어/숫자를 사용한 이름을 아무거나 입력해 주세요 (스페이스나 특수 문자는 사용 불가) -1. Under the "DSiBin" field, upload your `42383841.bin` file using the first "Browse..." option +1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option 1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) 1. Click "Build" @@ -46,7 +60,6 @@ In this section, you will copy the files necessary to temporarily replace DS Con 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link -1. SD 카드를 컴퓨터에 삽입해 주세요 1. SD 카드의 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 폴더로 이동해 주세요 + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` @@ -60,7 +73,7 @@ In this section, you will copy the files necessary to temporarily replace DS Con ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### Section III - Overwriting DS Connection Settings +#### Section IV - Overwriting DS Connection Settings In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. @@ -73,7 +86,7 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte 1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. 만약 익스플로잇이 성공적이었다면, 기기는 JPN 버전의 Flipnote Studio를 실행할 겁니다 -#### 섹션 IV - Flipnote 익스플로잇 +#### 섹션 V - Flipnote 익스플로잇 만약 이 섹션의 비주얼 가이드를 선호한다면, [여기서] (https://zoogie.github.io/web/flipnote_directions/) 그 중 하나를 보실 수가 있습니다. {: .notice--info} @@ -99,7 +112,7 @@ In this section, you will perform a series of very specific steps within Flipnot + 만약 기기가 부팅시에 꺼진다면 Luma3DS `.zip` 파일 안에 압축 되있는 `boot.firm`을 SD카드의 루트로 복사 했는지 확인하세요 + If you see the Luma Configuration screen, press (Start) to reboot, then continue with the guide -#### 섹션 V - Luma3DS 검증 +#### Section VI - Luma3DS Verification Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. @@ -113,9 +126,9 @@ Due to the nature of the exploit used, it is occasionally (but rarely) possible + Luma3DS는 보통 HOME 메뉴와 똑같이 보입니다. 만약 기기가 HOME 메뉴로 부팅되었다면, 커스텀 펌웨어가 설치되어 있습니다. + 다음 페이지에서는 커펌에 유용한 홈브류를 설치해 기기 준비를 완료할 것 입니다. -#### 섹션 VI - DS 소프트웨어용 설정 복구 +#### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. SD 카드의 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 폴더로 이동해 주세요 1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one diff --git a/_pages/ko_KR/installing-boot9strap-(usm).txt b/_pages/ko_KR/installing-boot9strap-(usm).txt index 64ef10a862..dfced355cf 100644 --- a/_pages/ko_KR/installing-boot9strap-(usm).txt +++ b/_pages/ko_KR/installing-boot9strap-(usm).txt @@ -18,45 +18,28 @@ title: "boot9strap 설치 (USM)" 이 설명서는 미주, 유럽, 일본, 그리고 한국 지역 기기들 (시스템 버전 다음 글짜가 U, E, J, 아니면 K 인 경우) 와 호환됩니다. -만약 (L/R 어깨 버튼), (위 십자 패드), 또는 (A) 버튼이 동작되지 않다면, [다른 Seedminer 방법](bannerbomb3)을 따라야 합니다. 이 방법에 도움이 필요하다면, [Discord의 Nintendo Homebrew](https://discord.gg/MWxPgEp)에서 영어로 도움을 요청해 주세요. +If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). 이 방법에 도움이 필요하다면, [Discord의 Nintendo Homebrew](https://discord.gg/MWxPgEp)에서 영어로 도움을 요청해 주세요. {: .notice--warning} ### 준비물 -* [Seedminer](seedminer)에서 받은 `movable.sed` 파일 * 최신 버전의 [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (직접 다운로드) * 최신 버전의 [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (직접 다운로드) * 최신 버전의 [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (`.zip` 파일) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) #### 섹션 I - 준비 작업 -In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. +In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. -1. 기기의 전원이 켜져 있다면, 전원을 꺼 주세요 -1. 컴퓨터에서 [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) 를 열어 주세요 -1. "Choose File"를 선택하여 `movable.sed`를 업로드 해 주세요 -1. "Build and Download"를 선택해 주세요 - + 이 작업은 `F00D43D5.bin` DSiWare 파일과 `usm.bin` SAFE_MODE 익스플로잇 데이터를 zip 파일로 다운로드 합니다 (`unSAFE_MODE.zip`) -1. SD 카드를 컴퓨터에 삽입해 주세요 +1. Your SD card should be inserted in your computer 1. Luma3DS `.zip`안에 있는 `boot.firm`과 `boot.3dsx`를 SD 카드의 루트에 복사해 주세요 + SD 카드의 루트는 SD 카드를 열 때 보이는 디렉토리이고, Nintendo 3DS 폴더가 보이지만 그 안에 않 들어가 있는 상태의 폴더 입니다 1. SD 카드이 루트에 `boot9strap` 라는 이름으로 새 폴더를 생성해 주세요 1. SD 카드에 있는 `/boot9strap/` 폴더에 boot9strap `.zip` 파일 안에 압축되있는 `boot9strap.firm`과 `boot9strap.firm.sha`을 복사해 주세요 1. SafeB9SInstaller `.zip`의 `SafeB9SInstaller.bin`을 SD 카드의 루트로 복사해 주세요 -1. `unSAFE_MODE.zip` 안에 있는 `usm.bin`을 SD 카드의 루트에 복사해 주세요 - ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} - ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} -1. SD 카드의 `Nintendo 3DS` -> `` -> `` 폴더로 이동해 주세요 - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. `` 폴더에 `Nintendo DSiWare` 폴더를 생성해 주세요 - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. `F00D43D5.bin` 파일을 `unSAFE_MODE.zip` 에서 `Nintendo DSiWare` 폴더로 복사해 주세요 - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +1. Copy `usm.bin` to the root of your SD card #### 섹션 II - BannerBomb3 @@ -66,9 +49,9 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana 1. 기기를 시작해 주세요 1. 기기에서 본체 설정을 열어 주세요 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) - + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Press (A) to select "Inject haxx" + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-usm) +1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + 기기가 자동으로 종료될 겁니다 #### 섹션 III - unSAFE_MODE @@ -77,7 +60,7 @@ In this section, you will enter Safe Mode (a feature available on all 3DS family 1. 전원이 꺼져 있는 상태에서 (L 어깨) + (R 어깨) + (십자 Up) + (A) 를 길게 눌르고, 누르는 상태에서 전원을 켜 주세요 + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) - + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). 이 방법에 도움이 필요하다면, [Discord의 Nintendo Homebrew](https://discord.gg/MWxPgEp)에서 영어로 도움을 요청해 주세요. + + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of BannerBomb3](installing-boot9strap-(fredtool)). 이 방법에 도움이 필요하다면, [Discord의 Nintendo Homebrew](https://discord.gg/MWxPgEp)에서 영어로 도움을 요청해 주세요. 1. "OK"를 선택해서 업데이트를 확인해 주세요 + 실제로 업데이트를 하는 것은 아닙니다. 이것은 익스플로잇의 일부입니다 1. "동의함"를 눌러서 이용 약관에 동의해 주세요 @@ -107,8 +90,7 @@ In this section, you will trigger the BannerBomb3 exploit a second time so that 1. 기기에서 본체 설정을 열어 주세요 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) -1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" +1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" + 기기가 자동으로 재부팅될 겁니다 1. 기기를 종료해 주세요 1. SD 카드를 컴퓨터에 삽입해 주세요 diff --git a/_pages/ko_KR/seedminer.txt b/_pages/ko_KR/seedminer.txt index c12a39a21b..3a29dd505c 100644 --- a/_pages/ko_KR/seedminer.txt +++ b/_pages/ko_KR/seedminer.txt @@ -56,6 +56,7 @@ In this section, you will use the Bruteforce Movable website to retrieve your de + 만약 30분이 지나서도 완료가 안된다면, [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp)에서 영어로 물어보세요. "Bruteforce Movable is not working. Could someone help me?"정도 질문이 적당할 것 입니다 1. 과정이 끝나면, `movable.sed` 파일을 다운로드 해 주세요 + 이 파일은 나중에도 사용되니 일단 보관해 두세요 +1. 기기를 종료해 주세요 ___ @@ -63,11 +64,11 @@ ___ 기기의 암호화 키 (`movable.sed`)를 구한 후, 이것을 다른 익스플로잇하고 함깨 사용해 커스텀 펌웨어를 설치할 것 입니다. -#### unSAFE_MODE (추천) +#### BannerBomb3 -더 깊은 모딩을 위한 Seedminer의 이 사용법은, 모든 3DS 기기에 존제하는 SAFE_MODE 펌웨어의 익스플로잇을 사용하는 방식입니다. +This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the System Settings application. -[boot9strap 설치 (USM)](installing-boot9strap-(usm))로 계속합니다 +Continue to [BannerBomb3](bannerbomb3) {: .notice--primary} ___ @@ -77,4 +78,4 @@ ___ 만약 대만 (TWN) 지역 기기 (시스템 버전 끝에 T가 표시됨, 예를 들어 11.15.0-39**T**)을 가지고 계시다면 이 작업을 해야 합니다. **나머지 지역 기기들은 따르면 않됩니다.** [BannerBomb3 + Fredtool (타이완)](bannerbomb3-fredtool-(twn))으로 계속합니다 -{: .notice--warning} \ No newline at end of file +{: .notice--warning} diff --git a/_pages/ko_KR/troubleshooting.txt b/_pages/ko_KR/troubleshooting.txt index d8be1d499b..04bc760ec3 100644 --- a/_pages/ko_KR/troubleshooting.txt +++ b/_pages/ko_KR/troubleshooting.txt @@ -126,11 +126,11 @@ If this is unsuccessful, try using another SD card. ## boot9strap 설치 (USM) -### DSiWare Management menu crashes without showing USM menu +### DSiWare Management menu crashes without showing BB3 multihax menu (USM) -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php). +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). -Also, ensure that `usm.bin` is on the root of the SD card. If it is missing, then download the latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) (the RELEASE `.zip` file), and copy the `usm.bin` file to the root of your SD card. +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, you will need to follow [an alternate branch of Seedminer](homebrew-launcher-(pichaxx)). 이 방법에 도움이 필요하다면, [Discord의 Nintendo Homebrew](https://discord.gg/MWxPgEp)에서 영어로 도움을 요청해 주세요. @@ -144,16 +144,24 @@ If neither of these solutions fixes this problem, then custom firmware may have ### DSiWare Management shows a question mark -There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php), ensuring that you use the `movable.sed` file for your console. +There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen), ensuring that you use the `movable.sed` file for your console. ### DSiWare Management menu crashes without purple screen -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. --- ## boot9strap 설치 (Fredtool) +### DSiWare Management menu crashes without showing BB3 multihax menu (Fredtool) + +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). + +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. + +If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + ### Error on Fredtool Injector page Ensure that your `movable.sed` and DSiWare backup come from the same console. A mismatch will result in an error. diff --git a/_pages/ms_MY/bannerbomb3.txt b/_pages/ms_MY/bannerbomb3.txt index ca32bd1e1a..10e9876f06 100644 --- a/_pages/ms_MY/bannerbomb3.txt +++ b/_pages/ms_MY/bannerbomb3.txt @@ -6,8 +6,8 @@ title: "BannerBomb3"
Technical Details (optional) -

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

For a more technical explanation, see here.

{: .notice--info} @@ -27,38 +27,43 @@ If you have a Taiwanese console (indicated by a T after the system version), fol In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. -1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` inside of a zip file (`BannerBomb3.zip`) -1. If your console is powered on, power off your console +1. Power off your device 1. Pasang kad SD anda ke dalam komputer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} -#### Section II - BannerBomb3 +#### Section II - Hardware Button Check -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. +In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked +1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) +1. If prompted to update, press Cancel + + If the device boots to the HOME Menu, just continue to the next step 1. Power off your device -1. Pasang kad SD anda ke dalam komputer -1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore +___ -Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +### Next steps: Choose an exploit + +If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. + +If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} + +If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +{: .notice--warning} diff --git a/_pages/ms_MY/installing-boot9strap-(fredtool).txt b/_pages/ms_MY/installing-boot9strap-(fredtool).txt index 60161e0b86..4831912e4b 100644 --- a/_pages/ms_MY/installing-boot9strap-(fredtool).txt +++ b/_pages/ms_MY/installing-boot9strap-(fredtool).txt @@ -6,14 +6,13 @@ title: "Installing boot9strap (Fredtool)"
Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

{: .notice--info} ### What You Need -* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -27,17 +26,32 @@ As an additional safety measure, we will perform an additional check for custom 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button 1. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide +1. Power off your device -If you see a configuration menu, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. {: .notice--danger} + +#### Section II - BannerBomb3 -#### Section II - Prep Work +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically power off + +#### Section III - Prep Work In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. +1. Pasang kad SD anda ke dalam komputer 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file using the first "Browse..." option +1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option 1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) 1. Click "Build" @@ -46,7 +60,6 @@ In this section, you will copy the files necessary to temporarily replace DS Con 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link -1. Pasang kad SD anda ke dalam komputer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` @@ -60,7 +73,7 @@ In this section, you will copy the files necessary to temporarily replace DS Con ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### Section III - Overwriting DS Connection Settings +#### Section IV - Overwriting DS Connection Settings In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. @@ -73,7 +86,7 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte 1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio -#### Section IV - Flipnote Exploit +#### Section V - Flipnote Exploit If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} @@ -99,7 +112,7 @@ In this section, you will perform a series of very specific steps within Flipnot + If your device shuts down when you try to power it on, ensure that you have copied `boot.firm` from the Luma3DS `.zip` to the root of your SD card + If you see the Luma Configuration screen, press (Start) to reboot, then continue with the guide -#### Section V - Luma3DS Verification +#### Section VI - Luma3DS Verification Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. @@ -113,9 +126,9 @@ At this point, your console will boot to Luma3DS by default. + Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware. + On the next page, you will install useful homebrew applications to complete your setup. -#### Section VI - Restoring DS Connection Settings +#### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card 1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one diff --git a/_pages/ms_MY/installing-boot9strap-(usm).txt b/_pages/ms_MY/installing-boot9strap-(usm).txt index 7b8503879c..6861d74035 100644 --- a/_pages/ms_MY/installing-boot9strap-(usm).txt +++ b/_pages/ms_MY/installing-boot9strap-(usm).txt @@ -18,45 +18,28 @@ title: "Installing boot9strap (USM)" These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. +If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--warning} ### What You Need -* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) * The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. +In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. -1. If your device is powered on, power off your device -1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` and a SAFE_MODE exploit data file called `usm.bin` inside of a zip archive (`unSAFE_MODE.zip`) -1. Pasang kad SD anda ke dalam komputer +1. Your SD card should be inserted in your computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Create a folder named `boot9strap` on the root of your SD card 1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} - ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +1. Copy `usm.bin` to the root of your SD card #### Section II - BannerBomb3 @@ -66,9 +49,9 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana 1. Power on your device 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) - + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Press (A) to select "Inject haxx" + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-usm) +1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + Your device will automatically power off #### Section III - unSAFE_MODE @@ -77,7 +60,7 @@ In this section, you will enter Safe Mode (a feature available on all 3DS family 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) - + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of BannerBomb3](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions @@ -107,8 +90,7 @@ In this section, you will trigger the BannerBomb3 exploit a second time so that 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) -1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" +1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" + Your device will automatically reboot 1. Power off your device 1. Pasang kad SD anda ke dalam komputer diff --git a/_pages/ms_MY/seedminer.txt b/_pages/ms_MY/seedminer.txt index 10f26333b0..fd720a2bd8 100644 --- a/_pages/ms_MY/seedminer.txt +++ b/_pages/ms_MY/seedminer.txt @@ -56,6 +56,7 @@ In this section, you will use the Bruteforce Movable website to retrieve your de + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages +1. Power off your device ___ @@ -63,11 +64,11 @@ ___ Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. -#### unSAFE_MODE (Recommended) +#### BannerBomb3 -This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the SAFE_MODE firmware present in all 3DS units. +This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the System Settings application. -Continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +Continue to [BannerBomb3](bannerbomb3) {: .notice--primary} ___ @@ -77,4 +78,4 @@ ___ If you have a Taiwanese device (indicated with a T at the end of the system version, such as 11.15.0-39**T**), you must follow this route. **Other regions may not follow this route.** Continue to [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) -{: .notice--warning} \ No newline at end of file +{: .notice--warning} diff --git a/_pages/ms_MY/troubleshooting.txt b/_pages/ms_MY/troubleshooting.txt index 05ca24071d..d120c7c9a3 100644 --- a/_pages/ms_MY/troubleshooting.txt +++ b/_pages/ms_MY/troubleshooting.txt @@ -126,11 +126,11 @@ If this is unsuccessful, try using another SD card. ## Installing boot9strap (USM) -### DSiWare Management menu crashes without showing USM menu +### DSiWare Management menu crashes without showing BB3 multihax menu (USM) -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php). +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). -Also, ensure that `usm.bin` is on the root of the SD card. If it is missing, then download the latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) (the RELEASE `.zip` file), and copy the `usm.bin` file to the root of your SD card. +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, you will need to follow [an alternate branch of Seedminer](homebrew-launcher-(pichaxx)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. @@ -144,16 +144,24 @@ If neither of these solutions fixes this problem, then custom firmware may have ### DSiWare Management shows a question mark -There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php), ensuring that you use the `movable.sed` file for your console. +There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen), ensuring that you use the `movable.sed` file for your console. ### DSiWare Management menu crashes without purple screen -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. --- ## Installing boot9strap (Fredtool) +### DSiWare Management menu crashes without showing BB3 multihax menu (Fredtool) + +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). + +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. + +If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + ### Error on Fredtool Injector page Ensure that your `movable.sed` and DSiWare backup come from the same console. A mismatch will result in an error. diff --git a/_pages/nl_NL/bannerbomb3.txt b/_pages/nl_NL/bannerbomb3.txt index 6e4b6c88ce..f6e5d0b073 100644 --- a/_pages/nl_NL/bannerbomb3.txt +++ b/_pages/nl_NL/bannerbomb3.txt @@ -6,8 +6,8 @@ title: "BannerBomb3"
Technical Details (optional) -

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

For a more technical explanation, see here.

{: .notice--info} @@ -27,38 +27,43 @@ Als je een Taiwanese console hebt (aangegeven door een T na de systeemversie), v In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. -1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) op je computer -1. Upload je movable.sed met de "Choose File" optie -1. Selecteer "Build and Download" - + Dit gaat een geëxploiteerde DSiWare titel genaamd `F00D43D5.bin` in een zip bestand (`BannerBomb3.zip`) downloaden -1. Als je console aanstaat, zet hem dan uit +1. Schakel je 3DS uit 1. Plaats je SD-kaart in je computer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + De hoofdmap van de SD-kaart verwijst naar de bovenste map van de SD-kaart, waarin je alle mappen op de SD-kaart kunt zien, waaronder de Nintendo 3DS map, zonder je in de Nintendo 3DS map te bevinden 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} -#### Deel II - BannerBomb3 +#### Section II - Hardware Button Check -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. +In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. -1. Stop je SD-kaart terug in je 3DS -1. Zet je 3DS aan -1. Open Systeem Instellingen op je 3DS -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Je 3DS zou Magenta (roze/paars) moeten flashen en vervolgens een paar seconden later moeten crashen. Dit betekent dat het heeft gewerkt +1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) +1. If prompted to update, press Cancel + + If the device boots to the HOME Menu, just continue to the next step 1. Schakel je 3DS uit -1. Plaats je SD kaart in je computer -1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page -1. Navigeer naar `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` op je SD-kaart -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. Dit bestand is niet meer nodig +___ -Ga door met [boot9strap installeren (Fredtool)](installing-boot9strap-(fredtool)) +### Next steps: Choose an exploit + +If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. + +If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} + +If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +{: .notice--warning} diff --git a/_pages/nl_NL/installing-boot9strap-(fredtool).txt b/_pages/nl_NL/installing-boot9strap-(fredtool).txt index 737c6795b7..da7b8a74ad 100644 --- a/_pages/nl_NL/installing-boot9strap-(fredtool).txt +++ b/_pages/nl_NL/installing-boot9strap-(fredtool).txt @@ -6,14 +6,13 @@ title: "Installing boot9strap (Fredtool)"
Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

{: .notice--info} ### Wat je nodig hebt -* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * je `movable.sed` bestand van het voltooien van [Seedminer](seedminer) * De nieuwste versie van [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * De nieuwste versie van [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -27,17 +26,32 @@ As an additional safety measure, we will perform an additional check for custom 1. Houd de (Select) knop ingedrukt 1. Zet je 3DS aan terwijl je de (Select) knop ingedrukt houdt 1. Als de check succesvol was, zul je opstarten naar het HOME Menu en kun je doorgaan met deze handleiding +1. Schakel je 3DS uit -Als je een configuratiemenu ziet, heb je al CFW en zal het doorgaan met deze instructies je apparaat BRICKEN! Volg [Controleren op CFW](checking-for-cfw) om je bestaande CFW te upgraden. +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Volg [Controleren op CFW](checking-for-cfw) om je bestaande CFW te upgraden. {: .notice--danger} + +#### Deel II - BannerBomb3 -#### Deel II - Voorbereiding +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Stop je SD kaart terug in je 3DS +1. Zet je 3DS aan +1. Open System Settings op je apparaat +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Je apparaat zal automatisch uitschakelen + +#### Section III - Prep Work In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. +1. Plaats je SD kaart in je computer 1. Open de [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website op je computer 1. Voer een alfanumerieke naam in onder het "Username" veld (geen spaties of speciale tekens) -1. Under the "DSiBin" field, upload your `42383841.bin` file using the first "Browse..." option +1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. Onder het veld "MovableSed", upload je `movable.sed` bestand met behulp van de tweede "Browse..." optie 1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) 1. Klik op "Build" @@ -46,7 +60,6 @@ In this section, you will copy the files necessary to temporarily replace DS Con 1. Click on the first search result + This result should have the latest timestamp 1. Klik op de "output_(name).zip" link -1. Plaats je SD kaart in je computer 1. Navigeer naar `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` op je SD-kaart + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` @@ -60,7 +73,7 @@ In this section, you will copy the files necessary to temporarily replace DS Con ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### Section III - Overwriting DS Connection Settings +#### Section IV - Overwriting DS Connection Settings In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. @@ -73,7 +86,7 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte 1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. Als de exploit successful was, zal jouw 3DS de JPN versie van Flipnote Studio hebben opgestart -#### Deel IV - Flipnote Exploit +#### Deel V - Flipnote Exploit Als je liever een visuele handleiding hebt in dit deel, is er [hier](https://zoogie.github.io/web/flipnote_directions/) een te vinden. {: .notice--info} @@ -99,7 +112,7 @@ In this section, you will perform a series of very specific steps within Flipnot + Als je apparaat afsluit als je het probeert aan te zetten, zorg er dan voor dat je `boot.firm` hebt gekopieerd van de Luma3DS `.zip` naar de hoofdmap van je SD-kaart + Als je het Luma configuratiescherm ziet, druk op (Start) om opnieuw op te starten en ga dan verder met de handleiding -#### Deel V - Luma3DS verificatie +#### Deel VI - Luma3DS verificatie Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. @@ -113,9 +126,9 @@ Op dit moment zal je console standaard opstarten naar Luma3DS. + Luma3DS ziet er niet anders uit dan het normale HOME Menu. Als je console in het HOME Menu is opgestart, gebruikt hij custom firmware. + Op de volgende pagina zal je handige homebrew applicaties installeren om je installatie te voltooien. -#### Deel VI - DS Connection Settings herstellen +#### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. Navigeer naar `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` op je SD-kaart 1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one diff --git a/_pages/nl_NL/installing-boot9strap-(usm).txt b/_pages/nl_NL/installing-boot9strap-(usm).txt index 986a47d1db..723230dc16 100644 --- a/_pages/nl_NL/installing-boot9strap-(usm).txt +++ b/_pages/nl_NL/installing-boot9strap-(usm).txt @@ -18,45 +18,28 @@ title: "Boot9strap installeren (USM)" Deze instructies werken aan de consoles van de VS, Europa, Japan en Korea zoals aangegeven in de letters U, E, J, of K na de systeemversie. -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. +If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--warning} ### Wat je nodig hebt -* je `movable.sed` bestand van het voltooien van [Seedminer](seedminer) * De nieuwste versie van [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (directe download) * De nieuwste versie van [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (directe download) * De nieuwste versie van [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (het Luma3DS `.zip` bestand) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) #### Deel I - Voorbereiding -In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. +In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. -1. Als je 3DS aanstaat, zet hem dan af -1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) op je computer -1. Upload je movable.sed met de "Choose File" optie -1. Selecteer "Build and Download" - + Dit zal een exploit DSiWare `F00D43D5.bin` en een SAFE_MODE exploit data bestand genaamd `usm.bin` in een zip-archief (`unSAFE_MODE.zip`) downloaden -1. Plaats je SD kaart in je computer +1. Your SD card should be inserted in your computer 1. Kopieer `boot.firm` en `boot.3dsx` van de Luma3DS `.zip` naar de hoofdmap van je SD-kaart + De hoofdmap van de SD-kaart verwijst naar de bovenste map van de SD-kaart, waarin je alle mappen op de SD-kaart kunt zien, waaronder de Nintendo 3DS map, zonder je in de Nintendo 3DS map te bevinden 1. Maak een map genaamd `boot9strap` op de hoofdmap van je SD-kaart 1. Kopieer `boot9strap.firm` en `boot9strap.firm.sha` van de boot9strap `.zip` naar de `/boot9strap/` map op je SD-kaart 1. Kopieer `SafeB9SInstaller.bin` van de SafeB9SInstaller `.zip` naar de hoofdmap van je SD-kaart -1. Kopieer `usm.bin` van de `unSAFE_MODE.zip` naar de hoofdmap van je SD-kaart - ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} - ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Kopieer het `F00D43D5.bin` bestand van `unSAFE_MODE.zip` naar de `Nintendo DSiWare` map - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +1. Copy `usm.bin` to the root of your SD card #### Deel II - BannerBomb3 @@ -66,9 +49,9 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana 1. Zet je 3DS aan 1. Open Systeeminstellingen op je apparaat 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) - + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Press (A) to select "Inject haxx" + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-usm) +1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + Je apparaat zal automatisch uitschakelen #### Deel III - unSAFE_MODE @@ -77,7 +60,7 @@ In this section, you will enter Safe Mode (a feature available on all 3DS family 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) - + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of BannerBomb3](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Druk op "OK" om de update te accepteren + Er is geen update. Dit is deel van de exploit 1. Druk op "I accept" om de algemene voorwaarden te accepteren @@ -107,8 +90,7 @@ In this section, you will trigger the BannerBomb3 exploit a second time so that 1. Open System Settings op je apparaat 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) -1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" +1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" + Your device will automatically reboot 1. Schakel je 3DS uit 1. Plaats je SD kaart in je computer diff --git a/_pages/nl_NL/seedminer.txt b/_pages/nl_NL/seedminer.txt index ceeccbe05a..fbb553e71f 100644 --- a/_pages/nl_NL/seedminer.txt +++ b/_pages/nl_NL/seedminer.txt @@ -56,6 +56,7 @@ In this section, you will use the Bruteforce Movable website to retrieve your de + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site + Bewaar dit bestand omdat je het nodig hebt op de komende pagina's +1. Schakel je 3DS uit ___ @@ -63,11 +64,11 @@ ___ Zodra je de encryptiesleutel (`movable.sed`) hebt, zal je deze gebruiken in combinatie met andere exploits om custom firmware te installeren op je 3DS. -#### unSAFE_MODE (Recommended) +#### BannerBomb3 -Deze methode om Seedminer te gebruiken voor verdere exploitatie maakt gebruik van je `movable.sed` bestand om te profiteren van exploits in de SAFE_MODE firmware aanwezig in alle 3DS consoles. +This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the System Settings application. -Ga verder naar [boot9strap installeren (USM)](installing-boot9strap-(usm)) +Continue to [BannerBomb3](bannerbomb3) {: .notice--primary} ___ @@ -77,4 +78,4 @@ ___ If you have a Taiwanese device (indicated with a T at the end of the system version, such as 11.15.0-39**T**), you must follow this route. **Other regions may not follow this route.** Continue to [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) -{: .notice--warning} \ No newline at end of file +{: .notice--warning} diff --git a/_pages/nl_NL/troubleshooting.txt b/_pages/nl_NL/troubleshooting.txt index 08b565f287..10ead47aed 100644 --- a/_pages/nl_NL/troubleshooting.txt +++ b/_pages/nl_NL/troubleshooting.txt @@ -126,11 +126,11 @@ Mocht dit niet lukken, gebruik dan een andere SD-kaart. ## Boot9strap installeren (USM) -### DSiWare Management menu crasht zonder het USM menu te tonen +### DSiWare Management menu crashes without showing BB3 multihax menu (USM) -Zorg ervoor dat `F00D43D5.bin` het enige bestand in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` is. Als dat zo is, maak het opnieuw aan met de [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php). +Zorg ervoor dat `F00D43D5.bin` het enige bestand in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` is. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). -Also, ensure that `usm.bin` is on the root of the SD card. If it is missing, then download the latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) (the RELEASE `.zip` file), and copy the `usm.bin` file to the root of your SD card. +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, you will need to follow [an alternate branch of Seedminer](homebrew-launcher-(pichaxx)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. @@ -144,16 +144,24 @@ If neither of these solutions fixes this problem, then custom firmware may have ### DSiWare Management toont een vraagteken -Er kan een probleem zijn met je `F00D43D5.bin` bestand (het kan beschadigd zijn of bedoeld voor een andere 3DS). Maak je `F00D43D5.bin` bestand opnieuw aan met de [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php), om ervoor te zorgen dat je het `movable.sed` bestand voor je console gebruikt. +Er kan een probleem zijn met je `F00D43D5.bin` bestand (het kan beschadigd zijn of bedoeld voor een andere 3DS). Re-create your `F00D43D5.bin` file with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen), ensuring that you use the `movable.sed` file for your console. ### DSiWare Management menu crasht zonder paars scherm -Zorg ervoor dat `F00D43D5.bin` het enige bestand in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` is. Als dat zo is, maak het opnieuw aan met de [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php). Als dit niet lukt, kan het zijn dat custom firmware op dit apparaat is gedeïnstalleerd op een manier die deze methode niet uitvoerbaar maakt. Als dit het geval is, neem dan deel aan [Nintendo Homebrew op Discord](https://discord.gg/MWxPgEp) voor hulp. +Zorg ervoor dat `F00D43D5.bin` het enige bestand in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` is. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). Als dit niet lukt, kan het zijn dat custom firmware op dit apparaat is gedeïnstalleerd op een manier die deze methode niet uitvoerbaar maakt. Als dit het geval is, neem dan deel aan [Nintendo Homebrew op Discord](https://discord.gg/MWxPgEp) voor hulp. --- ## Boot9strap installeren (Fredtool) +### DSiWare Management menu crashes without showing BB3 multihax menu (Fredtool) + +Zorg ervoor dat `F00D43D5.bin` het enige bestand in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` is. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). + +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. + +If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + ### Error op de Fredtool Injector pagina Zorg ervoor dat je `movable.sed` en DSiWare back-up van dezelfde console komen. Een mismatch resulteert in een error. diff --git a/_pages/no_NO/bannerbomb3.txt b/_pages/no_NO/bannerbomb3.txt index 417795b8b9..3f6d4213a5 100644 --- a/_pages/no_NO/bannerbomb3.txt +++ b/_pages/no_NO/bannerbomb3.txt @@ -6,8 +6,8 @@ title: "BannerBomb3"
Technical Details (optional) -

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

For a more technical explanation, see here.

{: .notice--info} @@ -27,38 +27,43 @@ If you have a Taiwanese console (indicated by a T after the system version), fol In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. -1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` inside of a zip file (`BannerBomb3.zip`) -1. If your console is powered on, power off your console +1. Slå av enheten 1. Sett inn SD-kortet i datamaskinen din +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} -#### Section II - BannerBomb3 +#### Section II - Hardware Button Check -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. +In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. -1. Sett inn SD-kortet i konsollen igjen -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked +1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) +1. If prompted to update, press Cancel + + If the device boots to the HOME Menu, just continue to the next step 1. Slå av enheten -1. Sett inn SD-kortet i datamaskinen din -1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore +___ -Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +### Next steps: Choose an exploit + +If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. + +If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} + +If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +{: .notice--warning} diff --git a/_pages/no_NO/installing-boot9strap-(fredtool).txt b/_pages/no_NO/installing-boot9strap-(fredtool).txt index 8c0e2604b3..0721765a54 100644 --- a/_pages/no_NO/installing-boot9strap-(fredtool).txt +++ b/_pages/no_NO/installing-boot9strap-(fredtool).txt @@ -6,14 +6,13 @@ title: "Installing boot9strap (Fredtool)"
Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

{: .notice--info} ### What You Need -* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -27,17 +26,32 @@ As an additional safety measure, we will perform an additional check for custom 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button 1. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide +1. Slå av enheten -If you see a configuration menu, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. {: .notice--danger} + +#### Section II - BannerBomb3 -#### Section II - Prep Work +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Sett inn SD-kortet i konsollen igjen +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically power off + +#### Section III - Prep Work In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. +1. Sett inn SD-kortet i datamaskinen din 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file using the first "Browse..." option +1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option 1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) 1. Click "Build" @@ -46,7 +60,6 @@ In this section, you will copy the files necessary to temporarily replace DS Con 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link -1. Sett inn SD-kortet i datamaskinen din 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` @@ -60,7 +73,7 @@ In this section, you will copy the files necessary to temporarily replace DS Con ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### Section III - Overwriting DS Connection Settings +#### Section IV - Overwriting DS Connection Settings In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. @@ -73,7 +86,7 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte 1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio -#### Section IV - Flipnote Exploit +#### Section V - Flipnote Exploit If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} @@ -99,7 +112,7 @@ In this section, you will perform a series of very specific steps within Flipnot + If your device shuts down when you try to power it on, ensure that you have copied `boot.firm` from the Luma3DS `.zip` to the root of your SD card + If you see the Luma Configuration screen, press (Start) to reboot, then continue with the guide -#### Section V - Luma3DS Verification +#### Section VI - Luma3DS Verification Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. @@ -113,9 +126,9 @@ At this point, your console will boot to Luma3DS by default. + Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware. + On the next page, you will install useful homebrew applications to complete your setup. -#### Section VI - Restoring DS Connection Settings +#### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card 1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one diff --git a/_pages/no_NO/installing-boot9strap-(usm).txt b/_pages/no_NO/installing-boot9strap-(usm).txt index 894bb89acd..f19321055f 100644 --- a/_pages/no_NO/installing-boot9strap-(usm).txt +++ b/_pages/no_NO/installing-boot9strap-(usm).txt @@ -18,45 +18,28 @@ title: "Installing boot9strap (USM)" These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. +If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--warning} ### What You Need -* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) * The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. +In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. -1. If your device is powered on, power off your device -1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` and a SAFE_MODE exploit data file called `usm.bin` inside of a zip archive (`unSAFE_MODE.zip`) -1. Sett inn SD-kortet i datamaskinen din +1. Your SD card should be inserted in your computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Create a folder named `boot9strap` on the root of your SD card 1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} - ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +1. Copy `usm.bin` to the root of your SD card #### Section II - BannerBomb3 @@ -66,9 +49,9 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana 1. Power on your device 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) - + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Press (A) to select "Inject haxx" + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-usm) +1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + Your device will automatically power off #### Section III - unSAFE_MODE @@ -77,7 +60,7 @@ In this section, you will enter Safe Mode (a feature available on all 3DS family 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) - + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of BannerBomb3](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions @@ -107,8 +90,7 @@ In this section, you will trigger the BannerBomb3 exploit a second time so that 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) -1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" +1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" + Your device will automatically reboot 1. Slå av enheten 1. Sett inn SD-kortet i datamaskinen din diff --git a/_pages/no_NO/seedminer.txt b/_pages/no_NO/seedminer.txt index b9729acb16..68ac4e7e0d 100644 --- a/_pages/no_NO/seedminer.txt +++ b/_pages/no_NO/seedminer.txt @@ -56,6 +56,7 @@ In this section, you will use the Bruteforce Movable website to retrieve your de + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages +1. Slå av enheten ___ @@ -63,11 +64,11 @@ ___ Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. -#### unSAFE_MODE (Recommended) +#### BannerBomb3 -This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the SAFE_MODE firmware present in all 3DS units. +This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the System Settings application. -Continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +Continue to [BannerBomb3](bannerbomb3) {: .notice--primary} ___ @@ -77,4 +78,4 @@ ___ If you have a Taiwanese device (indicated with a T at the end of the system version, such as 11.15.0-39**T**), you must follow this route. **Other regions may not follow this route.** Continue to [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) -{: .notice--warning} \ No newline at end of file +{: .notice--warning} diff --git a/_pages/no_NO/troubleshooting.txt b/_pages/no_NO/troubleshooting.txt index f9bac4aee0..590e0b5baa 100644 --- a/_pages/no_NO/troubleshooting.txt +++ b/_pages/no_NO/troubleshooting.txt @@ -126,11 +126,11 @@ If this is unsuccessful, try using another SD card. ## Installing boot9strap (USM) -### DSiWare Management menu crashes without showing USM menu +### DSiWare Management menu crashes without showing BB3 multihax menu (USM) -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php). +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). -Also, ensure that `usm.bin` is on the root of the SD card. If it is missing, then download the latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) (the RELEASE `.zip` file), and copy the `usm.bin` file to the root of your SD card. +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, you will need to follow [an alternate branch of Seedminer](homebrew-launcher-(pichaxx)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. @@ -144,16 +144,24 @@ If neither of these solutions fixes this problem, then custom firmware may have ### DSiWare Management shows a question mark -There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php), ensuring that you use the `movable.sed` file for your console. +There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen), ensuring that you use the `movable.sed` file for your console. ### DSiWare Management menu crashes without purple screen -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. --- ## Installing boot9strap (Fredtool) +### DSiWare Management menu crashes without showing BB3 multihax menu (Fredtool) + +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). + +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. + +If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + ### Error on Fredtool Injector page Ensure that your `movable.sed` and DSiWare backup come from the same console. A mismatch will result in an error. diff --git a/_pages/pl_PL/bannerbomb3.txt b/_pages/pl_PL/bannerbomb3.txt index 8d95f9244b..1fa66655df 100644 --- a/_pages/pl_PL/bannerbomb3.txt +++ b/_pages/pl_PL/bannerbomb3.txt @@ -6,8 +6,8 @@ title: "BannerBomb3"
Technical Details (optional) -

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

For a more technical explanation, see here.

{: .notice--info} @@ -27,38 +27,43 @@ If you have a Taiwanese console (indicated by a T after the system version), fol In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. -1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` inside of a zip file (`BannerBomb3.zip`) -1. If your console is powered on, power off your console +1. Wyłącz konsolę 1. Włóż kartę SD do komputera +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} -#### Section II - BannerBomb3 +#### Section II - Hardware Button Check -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. +In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. -1. Włóż ponownie kartę SD do konsoli -1. Włącz konsolę -1. Uruchom "System Settings" na twoim urządzeniu -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked +1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) +1. If prompted to update, press Cancel + + If the device boots to the HOME Menu, just continue to the next step 1. Wyłącz konsolę -1. Włóż kartę SD do komputera -1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore +___ -Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +### Next steps: Choose an exploit + +If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. + +If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} + +If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +{: .notice--warning} diff --git a/_pages/pl_PL/installing-boot9strap-(fredtool).txt b/_pages/pl_PL/installing-boot9strap-(fredtool).txt index 36fd77d2ba..96bf848983 100644 --- a/_pages/pl_PL/installing-boot9strap-(fredtool).txt +++ b/_pages/pl_PL/installing-boot9strap-(fredtool).txt @@ -6,14 +6,13 @@ title: "Installing boot9strap (Fredtool)"
Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

{: .notice--info} ### Czego Potrzebujesz -* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Twojego pliku `movable.sed` z ukończenia [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -27,17 +26,32 @@ As an additional safety measure, we will perform an additional check for custom 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button 1. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide +1. Wyłącz konsolę -If you see a configuration menu, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. {: .notice--danger} + +#### Section II - BannerBomb3 -#### Sekcja II - Przygotowanie +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Włóż ponownie kartę SD do konsoli +1. Włącz konsolę +1. Uruchom "System Settings" na twoim urządzeniu +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically power off + +#### Section III - Prep Work In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. +1. Włóż kartę SD do komputera 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file using the first "Browse..." option +1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option 1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) 1. Click "Build" @@ -46,7 +60,6 @@ In this section, you will copy the files necessary to temporarily replace DS Con 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link -1. Włóż kartę SD do komputera 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` @@ -60,7 +73,7 @@ In this section, you will copy the files necessary to temporarily replace DS Con ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### Section III - Overwriting DS Connection Settings +#### Section IV - Overwriting DS Connection Settings In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. @@ -73,7 +86,7 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte 1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. Jeżeli exploit zadziałał, na urządzeniu uruchomi się Japońska wersja Flipnote Studio -#### Section IV - Flipnote Exploit +#### Section V - Flipnote Exploit Jeśli wolisz skorzystać z obrazkowego poradnika dotyczącego tej sekcji przejdź [tutaj](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} @@ -99,7 +112,7 @@ In this section, you will perform a series of very specific steps within Flipnot + If your device shuts down when you try to power it on, ensure that you have copied `boot.firm` from the Luma3DS `.zip` to the root of your SD card + If you see the Luma Configuration screen, press (Start) to reboot, then continue with the guide -#### Section V - Luma3DS Verification +#### Section VI - Luma3DS Verification Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. @@ -113,9 +126,9 @@ At this point, your console will boot to Luma3DS by default. + Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware. + On the next page, you will install useful homebrew applications to complete your setup. -#### Section VI - Restoring DS Connection Settings +#### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card 1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one diff --git a/_pages/pl_PL/installing-boot9strap-(usm).txt b/_pages/pl_PL/installing-boot9strap-(usm).txt index 53dceeda72..da8ed736a2 100644 --- a/_pages/pl_PL/installing-boot9strap-(usm).txt +++ b/_pages/pl_PL/installing-boot9strap-(usm).txt @@ -18,45 +18,28 @@ title: "Installing boot9strap (USM)" These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. +If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--warning} ### Czego Potrzebujesz -* Twojego pliku `movable.sed` z ukończenia [Seedminer](seedminer) * The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) * The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) #### Sekcja I - Przygotowanie -In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. +In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. -1. If your device is powered on, power off your device -1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` and a SAFE_MODE exploit data file called `usm.bin` inside of a zip archive (`unSAFE_MODE.zip`) -1. Włóż kartę SD do komputera +1. Your SD card should be inserted in your computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Stwórz folder o nazwie `boot9strap` w katalogu głównym karty SD 1. Skopiuj `boot9strap.firm` i `boot9strap.firm.sha` z boot9strap `.zip` do folderu `/boot9strap/` na karcie SD 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} - ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +1. Copy `usm.bin` to the root of your SD card #### Section II - BannerBomb3 @@ -66,9 +49,9 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana 1. Włącz konsolę 1. Uruchom "System Settings" na twoim urządzeniu 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) - + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Press (A) to select "Inject haxx" + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-usm) +1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + Your device will automatically power off #### Section III - unSAFE_MODE @@ -77,7 +60,7 @@ In this section, you will enter Safe Mode (a feature available on all 3DS family 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) - + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of BannerBomb3](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions @@ -107,8 +90,7 @@ In this section, you will trigger the BannerBomb3 exploit a second time so that 1. Uruchom "System Settings" na twoim urządzeniu 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) -1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" +1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" + Your device will automatically reboot 1. Wyłącz konsolę 1. Włóż kartę SD do komputera diff --git a/_pages/pl_PL/seedminer.txt b/_pages/pl_PL/seedminer.txt index 6d792a5558..3647b2f8ab 100644 --- a/_pages/pl_PL/seedminer.txt +++ b/_pages/pl_PL/seedminer.txt @@ -56,6 +56,7 @@ In this section, you will use the Bruteforce Movable website to retrieve your de + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages +1. Wyłącz konsolę ___ @@ -63,11 +64,11 @@ ___ Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. -#### unSAFE_MODE (Recommended) +#### BannerBomb3 -This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the SAFE_MODE firmware present in all 3DS units. +This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the System Settings application. -Continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +Continue to [BannerBomb3](bannerbomb3) {: .notice--primary} ___ @@ -77,4 +78,4 @@ ___ If you have a Taiwanese device (indicated with a T at the end of the system version, such as 11.15.0-39**T**), you must follow this route. **Other regions may not follow this route.** Continue to [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) -{: .notice--warning} \ No newline at end of file +{: .notice--warning} diff --git a/_pages/pl_PL/troubleshooting.txt b/_pages/pl_PL/troubleshooting.txt index 6452c44007..1f9188bbc7 100644 --- a/_pages/pl_PL/troubleshooting.txt +++ b/_pages/pl_PL/troubleshooting.txt @@ -126,11 +126,11 @@ If this is unsuccessful, try using another SD card. ## Installing boot9strap (USM) -### DSiWare Management menu crashes without showing USM menu +### DSiWare Management menu crashes without showing BB3 multihax menu (USM) -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php). +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). -Also, ensure that `usm.bin` is on the root of the SD card. If it is missing, then download the latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) (the RELEASE `.zip` file), and copy the `usm.bin` file to the root of your SD card. +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, you will need to follow [an alternate branch of Seedminer](homebrew-launcher-(pichaxx)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. @@ -144,16 +144,24 @@ If neither of these solutions fixes this problem, then custom firmware may have ### DSiWare Management shows a question mark -There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php), ensuring that you use the `movable.sed` file for your console. +There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen), ensuring that you use the `movable.sed` file for your console. ### DSiWare Management menu crashes without purple screen -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. --- ## Installing boot9strap (Fredtool) +### DSiWare Management menu crashes without showing BB3 multihax menu (Fredtool) + +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). + +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. + +If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + ### Error on Fredtool Injector page Ensure that your `movable.sed` and DSiWare backup come from the same console. A mismatch will result in an error. diff --git a/_pages/pt_BR/bannerbomb3.txt b/_pages/pt_BR/bannerbomb3.txt index 401200cd8c..8742f23a12 100644 --- a/_pages/pt_BR/bannerbomb3.txt +++ b/_pages/pt_BR/bannerbomb3.txt @@ -6,8 +6,8 @@ title: "BannerBomb3"
Detalhes técnicos (opcional) -

Para fazer o dump do sistema DSiWare, nós executamos um exploit em uma falha na janela do Gerenciador de Dados do DSiWare no aplicativo Configuração do Console.

-

Para fazer isso, usamos a chave de criptografia do seu sistema (movable.sed) para construir um backup de DSiWare que faz exploit do sistema para fazer um dump do aplicativo Conexões Nintendo DS para a raiz do SD.

+

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

Para obter uma explicação mais técnica, consulte aqui.

{: .notice--info} @@ -27,38 +27,43 @@ Seu arquivo 'movable.sed' baixado ao completar o processo [Seedminer](seedminer) Nesta seção, você irá copiar os arquivos necessários para ativar o exploit BannerBomb3 em seu cartão SD. -1. Abra [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) no seu computador -1. Envie seu movable.sed usando a opção "Choose File" -1. Clique em "Build and Download" - Isto vai baixar um exploit DSiWare chamado `F00D43D5.bin` dentro de um arquivo zip (`BannerBomb3.zip`) -1. Se seu console estiver ligado, desligue-o +1. Desligue o seu dispositivo 1. Insira o cartão SD no seu computador +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + A raiz do cartão SD refere-se ao diretório inicial no seu cartão SD onde você pode ver a pasta Nintendo 3DS, mas não está dentro dela 1. Navegue até `Nintendo 3DS` -> `` ->` em seu cartão SD + `` é o nome da pasta 32 letras que você copiou em [Seedminer](seedminer) + `` é uma pasta de 32 letras dentro da pasta `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Crie uma pasta chamada `Nintendo DSiWare` dentro do `` + Se você já teve a pasta *e* já existe algum arquivo de backup de DSiWare existente (`. dentro) dentro, copie-os para seu PC e remova-os do seu cartão SD -1. Copie o arquivo `F00D43D5.bin` do `BannerBomb3.zip` para a pasta `Nintendo DSiWare` +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} -#### Seção II - BannerBomb3 +#### Section II - Hardware Button Check -Nesta seção, você irá acionar o exploit do BannerBomb3 usando o Menu de Gerenciamento de DSiWare e copiará o dump de arquivos resultantes para o seu computador para que você possa usá-lo na próxima página. +In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. -1. Reinsira seu cartão SD no seu dispositivo -1. Ligue o seu dispositivo -1. Abra a Configuração do Console em seu dispositivo -1. Navegue para `Gerenciamento de Dados` -> `DSiWare` -> `Cartão SD` ([imagem](/images/screenshots/bb3/dsiware-management.png)) - + Seu sistema deve piscar na cor Magenta (rosa/roxo) e então travar alguns segundos depois. Isso significa que funcionou -1. Desligue o seu dispositivo -1. Insira o cartão SD no seu computador -1. Agora você deve ter `42383841.bin` na raiz do seu cartão SD. Copie este arquivo para algum lugar no seu computador, você o usará na próxima página -1. Navegue até `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` no seu cartão SD -1. Apague `F00D43D5.bin` da sua pasta Nintendo DSiWare e do seu computador. Esse arquivo não será mais necessário +1. Com o seu dispositivo ainda desligado, segure os seguintes botões: (Gatilho Esquerdo) + (Gatilho Direito) + (Botão Direcional para Cima) + (A), e enquanto segura esses botões juntos, ligue seu dispositivo + + Continue segurando os botões até o dispositivo iniciar o Safe Mode (um menu de "atualização do sistema") +1. If prompted to update, press Cancel + + If the device boots to the HOME Menu, just continue to the next step +1. Desligue seu dispositivo +___ -Continue em [Instalando boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +### Próximos passos: Escolha um exploit + +If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. + +If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} + +If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +{: .notice--warning} diff --git a/_pages/pt_BR/installing-boot9strap-(fredtool).txt b/_pages/pt_BR/installing-boot9strap-(fredtool).txt index 2eeb024911..d7405d2987 100644 --- a/_pages/pt_BR/installing-boot9strap-(fredtool).txt +++ b/_pages/pt_BR/installing-boot9strap-(fredtool).txt @@ -6,14 +6,13 @@ title: "Instalando boot9strap (Fredtool)"
Detalhes técnicos (opcional) -

Este método de usar o Seedminer para exploiting usa seu arquivo `movable.sed` para descriptografar qualquer aplicativo DSiWare para fins de injetar um título de DSiWare exploitable nas Configurações de Internet do DS. Isso requer que você tenha um backup de DSiWare, que você deveria ter obtido na seção anterior.

+

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

Esta é uma implementação atualmente funcional do exploit "FIRM partitions known-plaintext" detalhado aqui.

{: .notice--info} ### O que é necessário -* Um backup de DSiWare, normalmente `42383841.bin` (Você deve ter um na raiz do seu cartão SD após [BannerBomb3](bannerbomb3)) * Seu arquivo `movable.sed` de completar [Seedminer](seedminer) * A versão mais recente do [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * A versão mais recente do [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -27,17 +26,32 @@ Como uma medida de segurança adicional, realizaremos uma verificação adiciona 1. Segure o botão (Select) 1. Ligue seu dispositivo enquanto segura o botão (Select) 1. Se a verificação foi bem-sucedida, você iniciará no Menu HOME e poderá prosseguir com este guia +1. Desligue seu dispositivo -Se você ver um menu de configuração, você já tem CFW e continuar com estas instruções pode causar um BRICK em seu dispositivo! Siga [Checando por CFW](checking-for-cfw) para atualizar o seu CFW existente. +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Siga [Checando por CFW](checking-for-cfw) para atualizar o seu CFW existente. {: .notice--danger} + +#### Seção II - BannerBomb3 -### Seção II - Preparação +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reinsira seu cartão SD no seu dispositivo +1. Ligue o seu dispositivo +1. Abra a Configuração do Console em seu dispositivo +1. Navegue para `Gerenciamento de Dados` -> `DSiWare` -> `Cartão SD` ([imagem](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Seu dispositivo será desligado automaticamente + +#### Section III - Prep Work Nesta seção, você copiará os arquivos necessários para substituir temporariamente as Configurações de Conexões Nintendo DS com Flipnote Studio, que é usado para iniciar o instalador boot9strap (custom firmware). +1. Insira o cartão SD no seu computador 1. Abra o site [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) no seu computador 1. Sob o campo "Username", digite qualquer nome alfanumérico (sem espaços ou caracteres especiais) -1. Sob o campo "DSiBin", faça upload do seu arquivo `42383841.bin` usando a primeira opção "Browse..." +1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. Sob o campo "MovableSed", coloque seu arquivo `movable.sed` usando a segunda opção "Browse..." 1. Sob o campo "InjectionTarget", defina o alvo de injeção como `DSinternet` (NÃO o memorypit) 1. Clique em "Build" @@ -46,7 +60,6 @@ Nesta seção, você copiará os arquivos necessários para substituir temporari 1. Clique no primeiro resultado da pesquisa + Esse resultado deve ter a última marcação de tempo 1. Clique no link "output_(nome).zip" -1. Insira o cartão SD no seu computador 1. Navegue até `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` no seu cartão SD + `` é o nome da pasta 32 letras que você copiou em [Seedminer](seedminer) + `` é uma pasta de 32 letras dentro da pasta `` @@ -60,7 +73,7 @@ Nesta seção, você copiará os arquivos necessários para substituir temporari ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### Seção III - Substituindo as Configurações de Conexão Nintendo DS +#### Section IV - Overwriting DS Connection Settings In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. @@ -73,7 +86,7 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte 1. Navegue até `Configurações da Internet` -> `Conexões Nintendo DS`, depois selecione "OK" ([imagem](/images/screenshots/fredtool/dsconnection.png)) 1. Se o exploit foi bem sucedido, seu dispositivo irá abrir a versão JPN do Flipnote Studio -#### Seção IV - Flipnote Exploit +#### Seção V - Flipnote Exploit Caso você prefira um guia visual para esta seção, há um disponível [aqui](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} @@ -99,7 +112,7 @@ Nesta seção, você executará uma série de passos muito específicos dentro d + Se seu dispositivo desligar quando você tentar ligá-lo, certifique-se de que você copiou `boot.firm` do `.zip` do Luma3DS para a raiz do seu cartão SD + Caso veja a tela de configuração do Luma, aperte (Start) para reiniciar, depois continue com o guia -#### Seção V - Verificação do Luma3DS +#### Seção VI - Verificação do Luma3DS Devido à natureza do exploit usado, é possível ocasionalmente (mas raramente) que o boot9strap não seja instalado. Esta seção irá verificar se o boot9strap foi instalado com sucesso ao ver se alguns arquivos que são normalmente automaticamente gerados pelo Luma3DS foram criados. @@ -113,9 +126,9 @@ Neste momento, o seu console iniciará no Luma3DS por padrão. + O Luma3DS não é diferente do Menu HOME normal. Se seu console foi inicializado no HOME Menu, ele está executando custom firmware. + Na próxima página, você irá instalar aplicativos homebrew úteis para concluir sua instalação. -#### Seção VI - Restaurando as Conexões Nintendo DS +#### Section VII - Restoring DS Connection Settings -Nesta seção, você irá restaurar as Configurações de Conexão DS da maneira que elas eram antes de serem temporariamente substituídas pelo Flipnote Studio na Seção III. +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. Navegue até `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` no seu cartão SD 1. Copie o arquivo `42383841.bin` da pasta `clean` do arquivo DSiWare baixado (output_(nome).zip) para a pasta `Nintendo DSiWare`, substituindo a pasta existente diff --git a/_pages/pt_BR/installing-boot9strap-(usm).txt b/_pages/pt_BR/installing-boot9strap-(usm).txt index ec1e87d2a6..518b86890e 100644 --- a/_pages/pt_BR/installing-boot9strap-(usm).txt +++ b/_pages/pt_BR/installing-boot9strap-(usm).txt @@ -18,45 +18,28 @@ title: "Instalando boot9strap (USM)" Essas instruções funcionam nas versões de consoles EUA, Europa, Japão e Coréia, indicadas pelas letras U, E, J ou K após a versão do sistema. -Se os seus botões (Gatilho Esquerdo/Direito), (Botão direcional pra cima), ou (A) não funcionarem, você precisará seguir [um ramo alternativo de Seedminer](bannerbomb3). Para obter ajuda com isso, entre no [Discord do Nintendo Homebrew](https://discord.gg/MWxPgEp) e peça, em inglês, por ajuda. +If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). Para obter ajuda com isso, entre no [Discord do Nintendo Homebrew](https://discord.gg/MWxPgEp) e peça, em inglês, por ajuda. {: .notice--warning} ### O que é necessário -* Seu arquivo `movable.sed` obtido por completar [Seedminer](seedminer) * A versão mais recente do [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (download direto) * A versão mais recente do [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (download direto) * A versão mais recente do [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (o arquivo `.zip` do Luma3DS) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) #### Seção I - Preparação -Em seguida, você copiará os arquivos necessários para acionar o exploit BannerBomb3 e unSAFE_MODE no cartão SD do seu dispositivo. +In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. -1. Se seu dispositivo estiver ligado, desligue seu dispositivo -1. Abra [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) no seu computador -1. Envie seu movable.sed usando a opção "Choose File" -1. Clique em "Build and Download" - + Isto irá baixar um DSiWare exploit chamado `F00D43D5.bin` e um arquivo de exploit SAFE_MODE chamado `usm.bin` dentro de um arquivo zip (`unSAFE_MODE.zip`) -1. Insira o cartão SD no seu computador +1. Your SD card should be inserted in your computer 1. Copie `boot.firm` e `boot.3dsx` do `.zip` do Luma3DS para a raiz do seu cartão SD + A raiz do cartão SD refere-se ao diretório inicial no seu cartão SD onde você pode ver a pasta Nintendo 3DS, mas não está dentro dela 1. Crie uma pasta chamada `boot9strap` na raiz do seu cartão SD 1. Copie o `boot9strap.firm` e o `boot9strap.firm.sha` do `.zip` do boot9strap para a pasta `/boot9strap/` no seu cartão SD 1. Copie `SafeB9SInstaller.bin` do `.zip` do SafeB9SInstaller para a raiz do seu cartão SD -1. Copie `usm.bin` do `unSAFE_MODE.zip` para a raiz do seu cartão SD - ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} - ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} -1. Navegue até `Nintendo 3DS` -> `` ->` em seu cartão SD - + `` é o nome da pasta 32 letras que você copiou em [Seedminer](seedminer) - + `` é uma pasta de 32 letras dentro da pasta `` - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Crie uma pasta chamada `Nintendo DSiWare` dentro do `` - + Se você já teve a pasta *e* já existe algum arquivo de backup de DSiWare existente (`. dentro) dentro, copie-os para seu PC e remova-os do seu cartão SD -1. Copie o arquivo `F00D43D5.bin` do `unSAFE_MODE.zip` para a pasta `Nintendo DSiWare` - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +1. Copy `usm.bin` to the root of your SD card #### Seção II - BannerBomb3 @@ -66,9 +49,9 @@ Nesta seção, você irá acionar o exploit BannerBomb3 usando o menu de Gerenci 1. Ligue o seu dispositivo 1. Abra a Configuração do Console em seu dispositivo 1. Navegue para `Gerenciamento de Dados` -> `DSiWare` -> `Cartão SD` ([imagem](/images/screenshots/bb3/dsiware-management.png)) - + Seu dispositivo deve mostrar o menu [do BannerBomb3](/images/screenshots/bb3/usm-menu.png) - + Se esta etapa fazer com que seu dispositivo trave, [siga este guia de troubleshooting](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Aperte (A) para selecionar "Inject haxx" + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-usm) +1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + Seu dispositivo será desligado automaticamente #### Seção III - unSAFE_MODE @@ -77,7 +60,7 @@ Nesta seção, você entrará no Safe Mode (uma funcionalidade disponível em to 1. Com o seu dispositivo ainda desligado, segure os seguintes botões: (Gatilho Esquerdo) + (Gatilho Direito) + (Botão Direcional para Cima) + (A), e enquanto segura esses botões juntos, ligue seu dispositivo + Continue segurando os botões até o dispositivo iniciar o Safe Mode (um menu de "atualização do sistema") - + Caso não consiga entrar no Modo de Segurança após várias tentativas, um de seus botões pode estar falhando ou quebrado. Se esse for o caso, você precisará seguir [um ramo alternativo de Seedminer](bannerbomb3). Para obter ajuda com isso, entre no [Discord do Nintendo Homebrew](https://discord.gg/MWxPgEp) e peça, em inglês, por ajuda. + + Caso não consiga entrar no Modo de Segurança após várias tentativas, um de seus botões pode estar falhando ou quebrado. If this is the case, you will need to follow [an alternate branch of BannerBomb3](installing-boot9strap-(fredtool)). Para obter ajuda com isso, entre no [Discord do Nintendo Homebrew](https://discord.gg/MWxPgEp) e peça, em inglês, por ajuda. 1. Pressione "OK" para aceitar a atualização + Não há atualização. Isto faz parte do exploit 1. Pressione "Eu aceito" para aceitar os termos e condições @@ -107,8 +90,7 @@ Nesta seção, ativará o exploit BannerBomb3 pela segunda vez para restaurar os 1. Abra a Configuração do Console em seu dispositivo 1. Navegue para `Gerenciamento de Dados` -> `DSiWare` -> `Cartão SD` ([imagem](/images/screenshots/bb3/dsiware-management.png)) - + Seu dispositivo deve mostrar o menu [do BannerBomb3](/images/screenshots/bb3/usm-menu.png) -1. Use os botões direcionais para navegar e pressione o botão (A) para selecionar "Restore slots" +1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" + Seu dispositivo será reiniciado automaticamente 1. Desligue seu dispositivo 1. Insira o cartão SD no seu computador diff --git a/_pages/pt_BR/seedminer.txt b/_pages/pt_BR/seedminer.txt index e65910f4e8..801c9456b6 100644 --- a/_pages/pt_BR/seedminer.txt +++ b/_pages/pt_BR/seedminer.txt @@ -56,6 +56,7 @@ Nesta seção, você usará o site Bruteforce Movable para obter a chave de crip + Se você ainda está esperando após o período de meia hora, entre no [Discord do Nintendo Homebrew](https://discord.gg/MWxPgEp) e pergunte (em Inglês) para alguém te ajudar 1. Quando o processo for concluído, baixe seu arquivo `movable.sed` do site + Guarde esse arquivo em um lugar seguro pois você precisará dele nas páginas seguintes +1. Desligue seu dispositivo ___ @@ -63,11 +64,11 @@ ___ Assim que você tiver a chave de criptografia do seu dispositivo (`movable.sed`), você o usará em conjunto com outros exploits para instalar custom firmware no seu 3DS. -#### unSAFE_MODE (Recomendado) +#### BannerBomb3 -Esse método que utiliza o Seedminer para exploiting usa o seu arquivo `movable.sed` para tirar vantagem do firmware SAFE_MODE presente em todas as unidades de 3DS. +This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the System Settings application. -Continue em [Instalando boot9strap (USM)](installing-boot9strap-(usm)) +Continue to [BannerBomb3](bannerbomb3) {: .notice--primary} ___ @@ -77,4 +78,4 @@ ___ Se você tiver um dispositivo tailandês (indicado com T no final da versão do sistema, como 11.15.0-39**T**), você deve seguir esta rota. **Outras regiões não devem seguir esta rota.** Continue em [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) -{: .notice--warning} \ No newline at end of file +{: .notice--warning} diff --git a/_pages/pt_BR/troubleshooting.txt b/_pages/pt_BR/troubleshooting.txt index 6b35866a6c..449fea6095 100644 --- a/_pages/pt_BR/troubleshooting.txt +++ b/_pages/pt_BR/troubleshooting.txt @@ -94,7 +94,7 @@ Se o seu dispositivo está na versão 9.4.0, 9.5.0, ou 9.6.0, você pode estar e Se seu dispositivo não está em algum desses firmwares, isso provavelmente indica que você já tem custom firmware. Você deve [checar por CFW](checking-for-cfw). -### "An error has occurred, forcing the software to close..." (mensagem branca) +### "An error has occurred, forcing the software to close..." (texto branco) Há um problema com seu arquivo `otherapp.bin` (ele está faltando, colocado no lugar errado ou corrompido). Baixe a última versão do [universal-otherapp](https://github.com/TuxSH/universal-otherapp/releases/latest) e coloque-a na raiz do seu cartão SD. @@ -126,11 +126,11 @@ Se isso falhar, tente usar outro cartão SD. ## Instalando boot9strap (USM) -### Menu do Gerenciador de Dados do DSiWare mostra um crash sem mostrar o menu do USM +### DSiWare Management menu crashes without showing BB3 multihax menu (USM) -Certifique-se de que `F00D43D5.bin` seja o único arquivo em `Nintendo 3DS` -> `` ->` -> `Nintendo DSiWare`. Se for, então re-crie-o com o [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php). +Certifique-se de que `F00D43D5.bin` seja o único arquivo em `Nintendo 3DS` -> `` ->` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). -Além disso, certifique-se de que o arquivo `usm.bin` está na raiz do cartão SD. Se ele estiver faltando, baixe a versão mais recente do [unSAFE_MODE](https://github. om/zoogie/unSAFE_MODE/releases/latest) (o arquivo RELEASE `.zip`) e copie o arquivo `usm.bin` para a raiz do seu cartão SD. +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. Se nenhuma destas soluções resolver o problema, então custom firmware pode ter sido desinstalado no seu dispositivo de uma forma que torna esse método impossível de executar. Se esse for o caso, você precisará seguir [um ramo alternativo de Seedminer](homebrew-launcher-(pichaxx)). Para obter ajuda com isso, entre no [Discord do Nintendo Homebrew](https://discord.gg/MWxPgEp) e peça, em inglês, por ajuda. @@ -144,16 +144,24 @@ Se nenhuma destas soluções resolver o problema, então custom firmware pode te ### O Gerenciamento de DSiWare mostra um ponto de interrogação -Pode haver um problema com o seu arquivo `F00D43D5.bin` (pode estar corrompido ou destinado ao 3DS errado). Crie novamente seu arquivo `F00D43D5.bin` com a [ferramenta BannerBomb3](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php), garantindo que você utilize o arquivo `movable.sed` para o seu console. +Pode haver um problema com o seu arquivo `F00D43D5.bin` (pode estar corrompido ou destinado ao 3DS errado). Re-create your `F00D43D5.bin` file with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen), ensuring that you use the `movable.sed` file for your console. ### O Gerenciador de Dados do DSiWare mostra um crash sem uma tela roxa -Certifique-se de que `F00D43D5.bin` seja o único arquivo em `Nintendo 3DS` -> `` ->` -> `Nintendo DSiWare`. Se for o caso, então re-crie-o com a [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php). Se isso falhar, então custom firmware pode ter sido desinstalado deste dispositivo de uma maneira que torna esse método impossível de executar. Se for esse o caso, entre no [Discord do Nintendo Homebrew](https://discord.gg/MWxPgEp) para obter ajuda. +Certifique-se de que `F00D43D5.bin` seja o único arquivo em `Nintendo 3DS` -> `` ->` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). Se isso falhar, então custom firmware pode ter sido desinstalado deste dispositivo de uma maneira que torna esse método impossível de executar. Se for esse o caso, entre no [Discord do Nintendo Homebrew](https://discord.gg/MWxPgEp) para obter ajuda. --- ## Instalando boot9strap (Fredtool) +### DSiWare Management menu crashes without showing BB3 multihax menu (Fredtool) + +Certifique-se de que `F00D43D5.bin` seja o único arquivo em `Nintendo 3DS` -> `` ->` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). + +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. + +Se nenhuma destas soluções resolver o problema, então custom firmware pode ter sido desinstalado no seu dispositivo de uma forma que torna esse método impossível de executar. Se for esse o caso, junte-se ao [Discord do Nintendo Homebrew](https://discord.gg/MWxPgEp) e peça ajuda, em Inglês. + ### Erro na página do Fredtool Injector Certifique-se de que o seu `movable.sed` e backup de DSiWare venham do mesmo console. Uma incompatibilidade resultará em erro. diff --git a/_pages/pt_PT/bannerbomb3.txt b/_pages/pt_PT/bannerbomb3.txt index 5a46749529..ea5034f134 100644 --- a/_pages/pt_PT/bannerbomb3.txt +++ b/_pages/pt_PT/bannerbomb3.txt @@ -6,8 +6,8 @@ title: "BannerBomb3"
Technical Details (optional) -

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

For a more technical explanation, see here.

{: .notice--info} @@ -27,38 +27,43 @@ If you have a Taiwanese console (indicated by a T after the system version), fol In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. -1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` inside of a zip file (`BannerBomb3.zip`) -1. If your console is powered on, power off your console +1. Power off your device 1. Insert your SD card into your computer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} -#### Section II - BannerBomb3 +#### Section II - Hardware Button Check -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. +In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked +1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) +1. If prompted to update, press Cancel + + If the device boots to the HOME Menu, just continue to the next step 1. Power off your device -1. Insert your SD card into your computer -1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore +___ -Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +### Next steps: Choose an exploit + +If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. + +If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} + +If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +{: .notice--warning} diff --git a/_pages/pt_PT/installing-boot9strap-(fredtool).txt b/_pages/pt_PT/installing-boot9strap-(fredtool).txt index 1f7825ac28..a14f20f6ba 100644 --- a/_pages/pt_PT/installing-boot9strap-(fredtool).txt +++ b/_pages/pt_PT/installing-boot9strap-(fredtool).txt @@ -6,14 +6,13 @@ title: "Installing boot9strap (Fredtool)"
Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

{: .notice--info} ### What You Need -* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -27,17 +26,32 @@ As an additional safety measure, we will perform an additional check for custom 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button 1. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide +1. Power off your device -If you see a configuration menu, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. {: .notice--danger} + +#### Section II - BannerBomb3 -#### Section II - Prep Work +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically power off + +#### Section III - Prep Work In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. +1. Insert your SD card into your computer 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file using the first "Browse..." option +1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option 1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) 1. Click "Build" @@ -46,7 +60,6 @@ In this section, you will copy the files necessary to temporarily replace DS Con 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link -1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` @@ -60,7 +73,7 @@ In this section, you will copy the files necessary to temporarily replace DS Con ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### Section III - Overwriting DS Connection Settings +#### Section IV - Overwriting DS Connection Settings In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. @@ -73,7 +86,7 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte 1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio -#### Section IV - Flipnote Exploit +#### Section V - Flipnote Exploit If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} @@ -99,7 +112,7 @@ In this section, you will perform a series of very specific steps within Flipnot + If your device shuts down when you try to power it on, ensure that you have copied `boot.firm` from the Luma3DS `.zip` to the root of your SD card + If you see the Luma Configuration screen, press (Start) to reboot, then continue with the guide -#### Section V - Luma3DS Verification +#### Section VI - Luma3DS Verification Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. @@ -113,9 +126,9 @@ At this point, your console will boot to Luma3DS by default. + Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware. + On the next page, you will install useful homebrew applications to complete your setup. -#### Section VI - Restoring DS Connection Settings +#### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card 1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one diff --git a/_pages/pt_PT/installing-boot9strap-(usm).txt b/_pages/pt_PT/installing-boot9strap-(usm).txt index b58fa784a2..4861044daf 100644 --- a/_pages/pt_PT/installing-boot9strap-(usm).txt +++ b/_pages/pt_PT/installing-boot9strap-(usm).txt @@ -18,45 +18,28 @@ title: "Installing boot9strap (USM)" These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. +If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--warning} ### What You Need -* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) * The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. +In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. -1. If your device is powered on, power off your device -1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` and a SAFE_MODE exploit data file called `usm.bin` inside of a zip archive (`unSAFE_MODE.zip`) -1. Insert your SD card into your computer +1. Your SD card should be inserted in your computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Create a folder named `boot9strap` on the root of your SD card 1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} - ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +1. Copy `usm.bin` to the root of your SD card #### Section II - BannerBomb3 @@ -66,9 +49,9 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana 1. Power on your device 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) - + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Press (A) to select "Inject haxx" + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-usm) +1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + Your device will automatically power off #### Section III - unSAFE_MODE @@ -77,7 +60,7 @@ In this section, you will enter Safe Mode (a feature available on all 3DS family 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) - + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of BannerBomb3](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions @@ -107,8 +90,7 @@ In this section, you will trigger the BannerBomb3 exploit a second time so that 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) -1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" +1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" + Your device will automatically reboot 1. Power off your device 1. Insert your SD card into your computer diff --git a/_pages/pt_PT/seedminer.txt b/_pages/pt_PT/seedminer.txt index 8ecc9a8637..b6d7e339df 100644 --- a/_pages/pt_PT/seedminer.txt +++ b/_pages/pt_PT/seedminer.txt @@ -56,6 +56,7 @@ In this section, you will use the Bruteforce Movable website to retrieve your de + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages +1. Power off your device ___ @@ -63,11 +64,11 @@ ___ Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. -#### unSAFE_MODE (Recommended) +#### BannerBomb3 -This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the SAFE_MODE firmware present in all 3DS units. +This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the System Settings application. -Continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +Continue to [BannerBomb3](bannerbomb3) {: .notice--primary} ___ @@ -77,4 +78,4 @@ ___ If you have a Taiwanese device (indicated with a T at the end of the system version, such as 11.15.0-39**T**), you must follow this route. **Other regions may not follow this route.** Continue to [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) -{: .notice--warning} \ No newline at end of file +{: .notice--warning} diff --git a/_pages/pt_PT/troubleshooting.txt b/_pages/pt_PT/troubleshooting.txt index 05797b7bdb..2668e098fc 100644 --- a/_pages/pt_PT/troubleshooting.txt +++ b/_pages/pt_PT/troubleshooting.txt @@ -126,11 +126,11 @@ If this is unsuccessful, try using another SD card. ## Installing boot9strap (USM) -### DSiWare Management menu crashes without showing USM menu +### DSiWare Management menu crashes without showing BB3 multihax menu (USM) -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php). +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). -Also, ensure that `usm.bin` is on the root of the SD card. If it is missing, then download the latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) (the RELEASE `.zip` file), and copy the `usm.bin` file to the root of your SD card. +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, you will need to follow [an alternate branch of Seedminer](homebrew-launcher-(pichaxx)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. @@ -144,16 +144,24 @@ If neither of these solutions fixes this problem, then custom firmware may have ### DSiWare Management shows a question mark -There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php), ensuring that you use the `movable.sed` file for your console. +There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen), ensuring that you use the `movable.sed` file for your console. ### DSiWare Management menu crashes without purple screen -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. --- ## Installing boot9strap (Fredtool) +### DSiWare Management menu crashes without showing BB3 multihax menu (Fredtool) + +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). + +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. + +If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + ### Error on Fredtool Injector page Ensure that your `movable.sed` and DSiWare backup come from the same console. A mismatch will result in an error. diff --git a/_pages/ro_RO/bannerbomb3.txt b/_pages/ro_RO/bannerbomb3.txt index a6824be585..fbe77798a8 100644 --- a/_pages/ro_RO/bannerbomb3.txt +++ b/_pages/ro_RO/bannerbomb3.txt @@ -6,8 +6,8 @@ title: "BannerBomb3"
Technical Details (optional) -

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

For a more technical explanation, see here.

{: .notice--info} @@ -27,38 +27,43 @@ If you have a Taiwanese console (indicated by a T after the system version), fol In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. -1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer -1. Încărcați fișierul movable.sed folosind opțiunea "Choose File" -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` inside of a zip file (`BannerBomb3.zip`) -1. Dacă dispozitivul este pornit, închideți-l +1. Închideți dispozitivul 1. Introduceți cardul SD în calculator +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} -#### Section II - BannerBomb3 +#### Section II - Hardware Button Check -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. +In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. -1. Reintroduceți cardul SD în dispozitivul dumneavoastră -1. Porniți dispozitivul -1. Porniți System Settings pe consolă -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Dispozitivul ar trebui să clipească culoarea magenta (roz/purpuriu) și apoi să facă crash câteva secunde mai târziu. Asta înseamnă că a funcționat +1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) +1. If prompted to update, press Cancel + + If the device boots to the HOME Menu, just continue to the next step 1. Închideți dispozitivul -1. Introduceți cardul SD în calculator -1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page -1. Navigați spre `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` pe cardul SD -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. Acest fișier nu mai este necesar +___ -Continuați la [Instalând boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +### Next steps: Choose an exploit + +If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. + +If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} + +If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +{: .notice--warning} diff --git a/_pages/ro_RO/installing-boot9strap-(fredtool).txt b/_pages/ro_RO/installing-boot9strap-(fredtool).txt index 11cdeba953..2172b86634 100644 --- a/_pages/ro_RO/installing-boot9strap-(fredtool).txt +++ b/_pages/ro_RO/installing-boot9strap-(fredtool).txt @@ -6,14 +6,13 @@ title: "Installing boot9strap (Fredtool)"
Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

{: .notice--info} ### Ce aveți nevoie -* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Fișierul 'movable.sed' de la completarea lui [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -27,17 +26,32 @@ As an additional safety measure, we will perform an additional check for custom 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button 1. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide +1. Închideți dispozitivul -If you see a configuration menu, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. {: .notice--danger} + +#### Section II - BannerBomb3 -#### Secțiunea II - Preparații +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reintroduceți cardul SD în dispozitivul dumneavoastră +1. Porniți dispozitivul +1. Porniți System Settings pe consolă +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically power off + +#### Section III - Prep Work In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. +1. Introduceți cardul SD în calculator 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file using the first "Browse..." option +1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option 1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) 1. Click "Build" @@ -46,7 +60,6 @@ In this section, you will copy the files necessary to temporarily replace DS Con 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link -1. Introduceți cardul SD în calculator 1. Navigați spre `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` pe cardul SD + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` @@ -60,7 +73,7 @@ In this section, you will copy the files necessary to temporarily replace DS Con ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### Section III - Overwriting DS Connection Settings +#### Section IV - Overwriting DS Connection Settings In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. @@ -73,7 +86,7 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte 1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. În cazul în care exploit-ul a mers, dispozitivul va încărca versiunea JPN de Flipnote Studio -#### Section IV - Flipnote Exploit +#### Section V - Flipnote Exploit Dacă preferați un ghid vizual pentru aceasta secțiune, deja este disponibil unul [aici](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} @@ -99,7 +112,7 @@ In this section, you will perform a series of very specific steps within Flipnot + If your device shuts down when you try to power it on, ensure that you have copied `boot.firm` from the Luma3DS `.zip` to the root of your SD card + If you see the Luma Configuration screen, press (Start) to reboot, then continue with the guide -#### Section V - Luma3DS Verification +#### Section VI - Luma3DS Verification Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. @@ -113,9 +126,9 @@ At this point, your console will boot to Luma3DS by default. + Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware. + On the next page, you will install useful homebrew applications to complete your setup. -#### Section VI - Restoring DS Connection Settings +#### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. Navigați spre `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` pe cardul SD 1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one diff --git a/_pages/ro_RO/installing-boot9strap-(usm).txt b/_pages/ro_RO/installing-boot9strap-(usm).txt index ff4f3fab3a..539a1049a3 100644 --- a/_pages/ro_RO/installing-boot9strap-(usm).txt +++ b/_pages/ro_RO/installing-boot9strap-(usm).txt @@ -18,45 +18,28 @@ title: "Installing boot9strap (USM)" Aceste instrucțiuni funcționează pe consolele din regiunea SUA, Europa, Japonia și Coreea, indicate de literele U, E, J, sau K după versiunea de sistem. -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. +If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--warning} ### Ce aveți nevoie -* Fișierul 'movable.sed' de la completarea lui [Seedminer](seedminer) * The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) * The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) #### Secțiunea I - Preparații -In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. +In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. -1. If your device is powered on, power off your device -1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer -1. Încărcați fișierul movable.sed folosind opțiunea "Choose File" -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` and a SAFE_MODE exploit data file called `usm.bin` inside of a zip archive (`unSAFE_MODE.zip`) -1. Introduceți cardul SD în calculator +1. Your SD card should be inserted in your computer 1. Copiați `boot.firm` și `boot.3dsx` de la Luma3DS `.zip` pe rădăcina cardului SD + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Creați un folder numit `boot9strap` pe rădăcina cardului SD 1. Copiați `boot9strap.firm` și `boot9strap.firm.sha` din arhiva `.zip` boot9strap în folderul `/boot9strap/` de pe cardul SD 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} - ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +1. Copy `usm.bin` to the root of your SD card #### Section II - BannerBomb3 @@ -66,9 +49,9 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana 1. Porniți dispozitivul 1. Porniți System Settings pe consolă 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) - + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Press (A) to select "Inject haxx" + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-usm) +1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + Your device will automatically power off #### Section III - unSAFE_MODE @@ -77,7 +60,7 @@ In this section, you will enter Safe Mode (a feature available on all 3DS family 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) - + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of BannerBomb3](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions @@ -107,8 +90,7 @@ In this section, you will trigger the BannerBomb3 exploit a second time so that 1. Porniți System Settings pe consolă 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) -1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" +1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" + Your device will automatically reboot 1. Închideți dispozitivul 1. Introduceți cardul SD în calculator diff --git a/_pages/ro_RO/seedminer.txt b/_pages/ro_RO/seedminer.txt index 152da0d9da..0210f94eea 100644 --- a/_pages/ro_RO/seedminer.txt +++ b/_pages/ro_RO/seedminer.txt @@ -56,6 +56,7 @@ In this section, you will use the Bruteforce Movable website to retrieve your de + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site + Păstrați acest fișier de vreme ce veți avea nevoie de el în următoarele pagini +1. Închideți dispozitivul ___ @@ -63,11 +64,11 @@ ___ Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. -#### unSAFE_MODE (Recommended) +#### BannerBomb3 -This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the SAFE_MODE firmware present in all 3DS units. +This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the System Settings application. -Continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +Continue to [BannerBomb3](bannerbomb3) {: .notice--primary} ___ @@ -77,4 +78,4 @@ ___ If you have a Taiwanese device (indicated with a T at the end of the system version, such as 11.15.0-39**T**), you must follow this route. **Other regions may not follow this route.** Continue to [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) -{: .notice--warning} \ No newline at end of file +{: .notice--warning} diff --git a/_pages/ro_RO/troubleshooting.txt b/_pages/ro_RO/troubleshooting.txt index 0aa0a67f06..b054ff8823 100644 --- a/_pages/ro_RO/troubleshooting.txt +++ b/_pages/ro_RO/troubleshooting.txt @@ -126,11 +126,11 @@ If this is unsuccessful, try using another SD card. ## Installing boot9strap (USM) -### DSiWare Management menu crashes without showing USM menu +### DSiWare Management menu crashes without showing BB3 multihax menu (USM) -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php). +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). -Also, ensure that `usm.bin` is on the root of the SD card. If it is missing, then download the latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) (the RELEASE `.zip` file), and copy the `usm.bin` file to the root of your SD card. +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, you will need to follow [an alternate branch of Seedminer](homebrew-launcher-(pichaxx)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. @@ -144,16 +144,24 @@ If neither of these solutions fixes this problem, then custom firmware may have ### DSiWare Management shows a question mark -There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php), ensuring that you use the `movable.sed` file for your console. +There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen), ensuring that you use the `movable.sed` file for your console. ### DSiWare Management menu crashes without purple screen -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. --- ## Installing boot9strap (Fredtool) +### DSiWare Management menu crashes without showing BB3 multihax menu (Fredtool) + +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). + +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. + +If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + ### Error on Fredtool Injector page Ensure that your `movable.sed` and DSiWare backup come from the same console. A mismatch will result in an error. diff --git a/_pages/ru_RU/bannerbomb3.txt b/_pages/ru_RU/bannerbomb3.txt index 58086b4b22..c081da6cf1 100644 --- a/_pages/ru_RU/bannerbomb3.txt +++ b/_pages/ru_RU/bannerbomb3.txt @@ -6,8 +6,8 @@ title: "BannerBomb3"
Technical Details (optional) -

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

For a more technical explanation, see here.

{: .notice--info} @@ -27,38 +27,43 @@ If you have a Taiwanese console (indicated by a T after the system version), fol In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. -1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer -1. Загрузите свой movable.sed, используя опцию "Выберите файл" -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` inside of a zip file (`BannerBomb3.zip`) -1. Если консоль включена, выключите консоль +1. Выключите консоль 1. Вставьте SD-карту в компьютер +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} -#### Часть II - BannerBomb3 +#### Section II - Hardware Button Check -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. +In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. -1. Вставьте SD-карту обратно в консоль -1. Включите консоль -1. Откройте Системные настройки на вашей консоли -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Экран должен мигнуть розовым (ярко-фиолетовым), через несколько секунд приложение закроется с ошибкой. Это означает, что эксплойт сработал +1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) +1. If prompted to update, press Cancel + + If the device boots to the HOME Menu, just continue to the next step 1. Выключите консоль -1. Вставьте SD-карту в компьютер -1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page -1. Перейдите в папку `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` на SD-карте -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. Этот файл больше не нужен +___ -Следующий шаг: [Установка boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +### Next steps: Choose an exploit + +If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. + +If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} + +If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +{: .notice--warning} diff --git a/_pages/ru_RU/installing-boot9strap-(fredtool).txt b/_pages/ru_RU/installing-boot9strap-(fredtool).txt index d53a50512e..56d89e746d 100644 --- a/_pages/ru_RU/installing-boot9strap-(fredtool).txt +++ b/_pages/ru_RU/installing-boot9strap-(fredtool).txt @@ -6,14 +6,13 @@ title: "Installing boot9strap (Fredtool)"
Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

{: .notice--info} ### Что понадобится -* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Ваш файл `movable.sed`, полученный на странице [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -27,17 +26,32 @@ As an additional safety measure, we will perform an additional check for custom 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button 1. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide +1. Выключите консоль -If you see a configuration menu, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. {: .notice--danger} + +#### Часть II - BannerBomb3 -#### Часть II - Подготовка +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Вставьте SD-карту обратно в консоль +1. Включите консоль +1. Откройте Системные настройки на вашей консоли +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically power off + +#### Section III - Prep Work In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. +1. Вставьте SD-карту в компьютер 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file using the first "Browse..." option +1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option 1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) 1. Click "Build" @@ -46,7 +60,6 @@ In this section, you will copy the files necessary to temporarily replace DS Con 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link -1. Вставьте SD-карту в компьютер 1. Перейдите в папку `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` на SD-карте + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` @@ -60,7 +73,7 @@ In this section, you will copy the files necessary to temporarily replace DS Con ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### Section III - Overwriting DS Connection Settings +#### Section IV - Overwriting DS Connection Settings In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. @@ -73,7 +86,7 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte 1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. Если эксплойт сработал корректно, запустится японская версия Flipnote Studio -#### Section IV - Flipnote Exploit +#### Section V - Flipnote Exploit Если вы предпочитаете визуальное руководство вместо этой части, оно доступно [здесь](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} @@ -99,7 +112,7 @@ In this section, you will perform a series of very specific steps within Flipnot + If your device shuts down when you try to power it on, ensure that you have copied `boot.firm` from the Luma3DS `.zip` to the root of your SD card + If you see the Luma Configuration screen, press (Start) to reboot, then continue with the guide -#### Section V - Luma3DS Verification +#### Section VI - Luma3DS Verification Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. @@ -113,9 +126,9 @@ At this point, your console will boot to Luma3DS by default. + Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware. + On the next page, you will install useful homebrew applications to complete your setup. -#### Section VI - Restoring DS Connection Settings +#### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. Перейдите в папку `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` на SD-карте 1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one diff --git a/_pages/ru_RU/installing-boot9strap-(usm).txt b/_pages/ru_RU/installing-boot9strap-(usm).txt index a584371d0b..3417b00b06 100644 --- a/_pages/ru_RU/installing-boot9strap-(usm).txt +++ b/_pages/ru_RU/installing-boot9strap-(usm).txt @@ -18,45 +18,28 @@ title: "Установка boot9strap (USM)" Эти инструкции работают на консолях регионов USA, Europe, Japan и Korea. На регион консоли указывает буква U, E, J или K после версии прошивки. -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. +If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--warning} ### Что понадобится -* Ваш файл `movable.sed`, полученный на странице [Seedminer](seedminer) * The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) * The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) #### Часть I - Подготовительные работы -In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. +In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. -1. If your device is powered on, power off your device -1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer -1. Загрузите свой movable.sed, используя опцию "Выберите файл" -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` and a SAFE_MODE exploit data file called `usm.bin` inside of a zip archive (`unSAFE_MODE.zip`) -1. Вставьте SD-карту в компьютер +1. Your SD card should be inserted in your computer 1. Скопируйте файлы `boot.firm` и `boot.3dsx` из `.zip-архива` Luma3DS в корень SD-карты + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Создайте папку `boot9strap` в корне SD-карты 1. Скопируйте `boot9strap.firm` и `boot9strap.firm.sha` из `.zip-архива` boot9strap в папку `/boot9strap/` в корне SD-карты 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} - ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +1. Copy `usm.bin` to the root of your SD card #### Часть II - BannerBomb3 @@ -66,9 +49,9 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana 1. Включите консоль 1. Откройте Системные настройки на вашей консоли 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) - + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Press (A) to select "Inject haxx" + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-usm) +1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + Your device will automatically power off #### Часть III - unSAFE_MODE @@ -77,7 +60,7 @@ In this section, you will enter Safe Mode (a feature available on all 3DS family 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) - + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of BannerBomb3](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Нажмите "OK" чтобы начать обновление + Обновления не будет. Это часть эксплойта 1. Нажмите "Я принимаю" чтобы принять условия @@ -107,8 +90,7 @@ In this section, you will trigger the BannerBomb3 exploit a second time so that 1. Откройте Системные настройки на вашей консоли 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) -1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" +1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" + Your device will automatically reboot 1. Выключите консоль 1. Вставьте SD-карту в компьютер diff --git a/_pages/ru_RU/seedminer.txt b/_pages/ru_RU/seedminer.txt index c1b9b779fc..dc85aea080 100644 --- a/_pages/ru_RU/seedminer.txt +++ b/_pages/ru_RU/seedminer.txt @@ -56,6 +56,7 @@ In this section, you will use the Bruteforce Movable website to retrieve your de + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site + Сохраните этот файл, так как он понадобится вам на следующих страницах +1. Выключите консоль ___ @@ -63,11 +64,11 @@ ___ Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. -#### unSAFE_MODE (Recommended) +#### BannerBomb3 -This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the SAFE_MODE firmware present in all 3DS units. +This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the System Settings application. -Continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +Continue to [BannerBomb3](bannerbomb3) {: .notice--primary} ___ @@ -77,4 +78,4 @@ ___ If you have a Taiwanese device (indicated with a T at the end of the system version, such as 11.15.0-39**T**), you must follow this route. **Other regions may not follow this route.** Continue to [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) -{: .notice--warning} \ No newline at end of file +{: .notice--warning} diff --git a/_pages/ru_RU/troubleshooting.txt b/_pages/ru_RU/troubleshooting.txt index a609d07363..12549f7500 100644 --- a/_pages/ru_RU/troubleshooting.txt +++ b/_pages/ru_RU/troubleshooting.txt @@ -126,11 +126,11 @@ If this is unsuccessful, try using another SD card. ## Installing boot9strap (USM) -### DSiWare Management menu crashes without showing USM menu +### DSiWare Management menu crashes without showing BB3 multihax menu (USM) -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php). +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). -Also, ensure that `usm.bin` is on the root of the SD card. If it is missing, then download the latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) (the RELEASE `.zip` file), and copy the `usm.bin` file to the root of your SD card. +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, you will need to follow [an alternate branch of Seedminer](homebrew-launcher-(pichaxx)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. @@ -144,16 +144,24 @@ If neither of these solutions fixes this problem, then custom firmware may have ### DSiWare Management shows a question mark -There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php), ensuring that you use the `movable.sed` file for your console. +There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen), ensuring that you use the `movable.sed` file for your console. ### DSiWare Management menu crashes without purple screen -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. --- ## Installing boot9strap (Fredtool) +### DSiWare Management menu crashes without showing BB3 multihax menu (Fredtool) + +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). + +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. + +If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + ### Error on Fredtool Injector page Ensure that your `movable.sed` and DSiWare backup come from the same console. A mismatch will result in an error. diff --git a/_pages/sv_SE/bannerbomb3.txt b/_pages/sv_SE/bannerbomb3.txt index 4105739a69..85d5f9d801 100644 --- a/_pages/sv_SE/bannerbomb3.txt +++ b/_pages/sv_SE/bannerbomb3.txt @@ -6,8 +6,8 @@ title: "BannerBomb3"
Technical Details (optional) -

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

For a more technical explanation, see here.

{: .notice--info} @@ -27,38 +27,43 @@ If you have a Taiwanese console (indicated by a T after the system version), fol In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. -1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` inside of a zip file (`BannerBomb3.zip`) -1. If your console is powered on, power off your console +1. Stäng av din enhet 1. Insert your SD card into your computer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} -#### Section II - BannerBomb3 +#### Section II - Hardware Button Check -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. +In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. -1. Sätt tillbaka ditt SD-kort i din enhet -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked +1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) +1. If prompted to update, press Cancel + + If the device boots to the HOME Menu, just continue to the next step 1. Stäng av din enhet -1. Insert your SD card into your computer -1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore +___ -Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +### Next steps: Choose an exploit + +If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. + +If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} + +If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +{: .notice--warning} diff --git a/_pages/sv_SE/installing-boot9strap-(fredtool).txt b/_pages/sv_SE/installing-boot9strap-(fredtool).txt index f3fa4501f4..a1311bc43c 100644 --- a/_pages/sv_SE/installing-boot9strap-(fredtool).txt +++ b/_pages/sv_SE/installing-boot9strap-(fredtool).txt @@ -6,14 +6,13 @@ title: "Installing boot9strap (Fredtool)"
Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

{: .notice--info} ### What You Need -* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -27,17 +26,32 @@ As an additional safety measure, we will perform an additional check for custom 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button 1. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide +1. Stäng av din enhet -If you see a configuration menu, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. {: .notice--danger} + +#### Section II - BannerBomb3 -#### Section II - Prep Work +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Sätt tillbaka ditt SD-kort i din enhet +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically power off + +#### Section III - Prep Work In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. +1. Insert your SD card into your computer 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file using the first "Browse..." option +1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option 1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) 1. Click "Build" @@ -46,7 +60,6 @@ In this section, you will copy the files necessary to temporarily replace DS Con 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link -1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` @@ -60,7 +73,7 @@ In this section, you will copy the files necessary to temporarily replace DS Con ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### Section III - Overwriting DS Connection Settings +#### Section IV - Overwriting DS Connection Settings In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. @@ -73,7 +86,7 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte 1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio -#### Section IV - Flipnote Exploit +#### Section V - Flipnote Exploit If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} @@ -99,7 +112,7 @@ In this section, you will perform a series of very specific steps within Flipnot + If your device shuts down when you try to power it on, ensure that you have copied `boot.firm` from the Luma3DS `.zip` to the root of your SD card + If you see the Luma Configuration screen, press (Start) to reboot, then continue with the guide -#### Section V - Luma3DS Verification +#### Section VI - Luma3DS Verification Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. @@ -113,9 +126,9 @@ At this point, your console will boot to Luma3DS by default. + Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware. + On the next page, you will install useful homebrew applications to complete your setup. -#### Section VI - Restoring DS Connection Settings +#### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card 1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one diff --git a/_pages/sv_SE/installing-boot9strap-(usm).txt b/_pages/sv_SE/installing-boot9strap-(usm).txt index 4c1fbb512f..82f4fc1407 100644 --- a/_pages/sv_SE/installing-boot9strap-(usm).txt +++ b/_pages/sv_SE/installing-boot9strap-(usm).txt @@ -18,45 +18,28 @@ title: "Installing boot9strap (USM)" These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. +If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--warning} ### What You Need -* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) * The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. +In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. -1. If your device is powered on, power off your device -1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` and a SAFE_MODE exploit data file called `usm.bin` inside of a zip archive (`unSAFE_MODE.zip`) -1. Insert your SD card into your computer +1. Your SD card should be inserted in your computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Create a folder named `boot9strap` on the root of your SD card 1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} - ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +1. Copy `usm.bin` to the root of your SD card #### Section II - BannerBomb3 @@ -66,9 +49,9 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana 1. Power on your device 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) - + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Press (A) to select "Inject haxx" + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-usm) +1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + Your device will automatically power off #### Section III - unSAFE_MODE @@ -77,7 +60,7 @@ In this section, you will enter Safe Mode (a feature available on all 3DS family 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) - + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of BannerBomb3](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions @@ -107,8 +90,7 @@ In this section, you will trigger the BannerBomb3 exploit a second time so that 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) -1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" +1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" + Your device will automatically reboot 1. Stäng av din enhet 1. Insert your SD card into your computer diff --git a/_pages/sv_SE/seedminer.txt b/_pages/sv_SE/seedminer.txt index 8ecc9a8637..2f55a2d211 100644 --- a/_pages/sv_SE/seedminer.txt +++ b/_pages/sv_SE/seedminer.txt @@ -56,6 +56,7 @@ In this section, you will use the Bruteforce Movable website to retrieve your de + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages +1. Stäng av din enhet ___ @@ -63,11 +64,11 @@ ___ Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. -#### unSAFE_MODE (Recommended) +#### BannerBomb3 -This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the SAFE_MODE firmware present in all 3DS units. +This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the System Settings application. -Continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +Continue to [BannerBomb3](bannerbomb3) {: .notice--primary} ___ @@ -77,4 +78,4 @@ ___ If you have a Taiwanese device (indicated with a T at the end of the system version, such as 11.15.0-39**T**), you must follow this route. **Other regions may not follow this route.** Continue to [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) -{: .notice--warning} \ No newline at end of file +{: .notice--warning} diff --git a/_pages/sv_SE/troubleshooting.txt b/_pages/sv_SE/troubleshooting.txt index 6947846c36..b8b2983aa4 100644 --- a/_pages/sv_SE/troubleshooting.txt +++ b/_pages/sv_SE/troubleshooting.txt @@ -126,11 +126,11 @@ If this is unsuccessful, try using another SD card. ## Installing boot9strap (USM) -### DSiWare Management menu crashes without showing USM menu +### DSiWare Management menu crashes without showing BB3 multihax menu (USM) -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php). +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). -Also, ensure that `usm.bin` is on the root of the SD card. If it is missing, then download the latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) (the RELEASE `.zip` file), and copy the `usm.bin` file to the root of your SD card. +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, you will need to follow [an alternate branch of Seedminer](homebrew-launcher-(pichaxx)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. @@ -144,16 +144,24 @@ If neither of these solutions fixes this problem, then custom firmware may have ### DSiWare Management shows a question mark -There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php), ensuring that you use the `movable.sed` file for your console. +There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen), ensuring that you use the `movable.sed` file for your console. ### DSiWare Management menu crashes without purple screen -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. --- ## Installing boot9strap (Fredtool) +### DSiWare Management menu crashes without showing BB3 multihax menu (Fredtool) + +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). + +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. + +If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + ### Error on Fredtool Injector page Ensure that your `movable.sed` and DSiWare backup come from the same console. A mismatch will result in an error. diff --git a/_pages/th_TH/bannerbomb3.txt b/_pages/th_TH/bannerbomb3.txt index 5a46749529..ea5034f134 100644 --- a/_pages/th_TH/bannerbomb3.txt +++ b/_pages/th_TH/bannerbomb3.txt @@ -6,8 +6,8 @@ title: "BannerBomb3"
Technical Details (optional) -

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

For a more technical explanation, see here.

{: .notice--info} @@ -27,38 +27,43 @@ If you have a Taiwanese console (indicated by a T after the system version), fol In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. -1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` inside of a zip file (`BannerBomb3.zip`) -1. If your console is powered on, power off your console +1. Power off your device 1. Insert your SD card into your computer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} -#### Section II - BannerBomb3 +#### Section II - Hardware Button Check -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. +In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked +1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) +1. If prompted to update, press Cancel + + If the device boots to the HOME Menu, just continue to the next step 1. Power off your device -1. Insert your SD card into your computer -1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore +___ -Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +### Next steps: Choose an exploit + +If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. + +If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} + +If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +{: .notice--warning} diff --git a/_pages/th_TH/installing-boot9strap-(fredtool).txt b/_pages/th_TH/installing-boot9strap-(fredtool).txt index 1f7825ac28..a14f20f6ba 100644 --- a/_pages/th_TH/installing-boot9strap-(fredtool).txt +++ b/_pages/th_TH/installing-boot9strap-(fredtool).txt @@ -6,14 +6,13 @@ title: "Installing boot9strap (Fredtool)"
Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

{: .notice--info} ### What You Need -* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -27,17 +26,32 @@ As an additional safety measure, we will perform an additional check for custom 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button 1. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide +1. Power off your device -If you see a configuration menu, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. {: .notice--danger} + +#### Section II - BannerBomb3 -#### Section II - Prep Work +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically power off + +#### Section III - Prep Work In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. +1. Insert your SD card into your computer 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file using the first "Browse..." option +1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option 1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) 1. Click "Build" @@ -46,7 +60,6 @@ In this section, you will copy the files necessary to temporarily replace DS Con 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link -1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` @@ -60,7 +73,7 @@ In this section, you will copy the files necessary to temporarily replace DS Con ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### Section III - Overwriting DS Connection Settings +#### Section IV - Overwriting DS Connection Settings In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. @@ -73,7 +86,7 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte 1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio -#### Section IV - Flipnote Exploit +#### Section V - Flipnote Exploit If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} @@ -99,7 +112,7 @@ In this section, you will perform a series of very specific steps within Flipnot + If your device shuts down when you try to power it on, ensure that you have copied `boot.firm` from the Luma3DS `.zip` to the root of your SD card + If you see the Luma Configuration screen, press (Start) to reboot, then continue with the guide -#### Section V - Luma3DS Verification +#### Section VI - Luma3DS Verification Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. @@ -113,9 +126,9 @@ At this point, your console will boot to Luma3DS by default. + Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware. + On the next page, you will install useful homebrew applications to complete your setup. -#### Section VI - Restoring DS Connection Settings +#### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card 1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one diff --git a/_pages/th_TH/installing-boot9strap-(usm).txt b/_pages/th_TH/installing-boot9strap-(usm).txt index b58fa784a2..4861044daf 100644 --- a/_pages/th_TH/installing-boot9strap-(usm).txt +++ b/_pages/th_TH/installing-boot9strap-(usm).txt @@ -18,45 +18,28 @@ title: "Installing boot9strap (USM)" These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. +If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--warning} ### What You Need -* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) * The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. +In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. -1. If your device is powered on, power off your device -1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` and a SAFE_MODE exploit data file called `usm.bin` inside of a zip archive (`unSAFE_MODE.zip`) -1. Insert your SD card into your computer +1. Your SD card should be inserted in your computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Create a folder named `boot9strap` on the root of your SD card 1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} - ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +1. Copy `usm.bin` to the root of your SD card #### Section II - BannerBomb3 @@ -66,9 +49,9 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana 1. Power on your device 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) - + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Press (A) to select "Inject haxx" + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-usm) +1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + Your device will automatically power off #### Section III - unSAFE_MODE @@ -77,7 +60,7 @@ In this section, you will enter Safe Mode (a feature available on all 3DS family 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) - + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of BannerBomb3](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions @@ -107,8 +90,7 @@ In this section, you will trigger the BannerBomb3 exploit a second time so that 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) -1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" +1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" + Your device will automatically reboot 1. Power off your device 1. Insert your SD card into your computer diff --git a/_pages/th_TH/seedminer.txt b/_pages/th_TH/seedminer.txt index 8ecc9a8637..b6d7e339df 100644 --- a/_pages/th_TH/seedminer.txt +++ b/_pages/th_TH/seedminer.txt @@ -56,6 +56,7 @@ In this section, you will use the Bruteforce Movable website to retrieve your de + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages +1. Power off your device ___ @@ -63,11 +64,11 @@ ___ Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. -#### unSAFE_MODE (Recommended) +#### BannerBomb3 -This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the SAFE_MODE firmware present in all 3DS units. +This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the System Settings application. -Continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +Continue to [BannerBomb3](bannerbomb3) {: .notice--primary} ___ @@ -77,4 +78,4 @@ ___ If you have a Taiwanese device (indicated with a T at the end of the system version, such as 11.15.0-39**T**), you must follow this route. **Other regions may not follow this route.** Continue to [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) -{: .notice--warning} \ No newline at end of file +{: .notice--warning} diff --git a/_pages/th_TH/troubleshooting.txt b/_pages/th_TH/troubleshooting.txt index 05797b7bdb..2668e098fc 100644 --- a/_pages/th_TH/troubleshooting.txt +++ b/_pages/th_TH/troubleshooting.txt @@ -126,11 +126,11 @@ If this is unsuccessful, try using another SD card. ## Installing boot9strap (USM) -### DSiWare Management menu crashes without showing USM menu +### DSiWare Management menu crashes without showing BB3 multihax menu (USM) -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php). +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). -Also, ensure that `usm.bin` is on the root of the SD card. If it is missing, then download the latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) (the RELEASE `.zip` file), and copy the `usm.bin` file to the root of your SD card. +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, you will need to follow [an alternate branch of Seedminer](homebrew-launcher-(pichaxx)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. @@ -144,16 +144,24 @@ If neither of these solutions fixes this problem, then custom firmware may have ### DSiWare Management shows a question mark -There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php), ensuring that you use the `movable.sed` file for your console. +There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen), ensuring that you use the `movable.sed` file for your console. ### DSiWare Management menu crashes without purple screen -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. --- ## Installing boot9strap (Fredtool) +### DSiWare Management menu crashes without showing BB3 multihax menu (Fredtool) + +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). + +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. + +If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + ### Error on Fredtool Injector page Ensure that your `movable.sed` and DSiWare backup come from the same console. A mismatch will result in an error. diff --git a/_pages/tr_TR/bannerbomb3.txt b/_pages/tr_TR/bannerbomb3.txt index 9fb706ad61..a7ac556fea 100644 --- a/_pages/tr_TR/bannerbomb3.txt +++ b/_pages/tr_TR/bannerbomb3.txt @@ -6,8 +6,8 @@ title: "BannerBomb3"
Technical Details (optional) -

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

For a more technical explanation, see here.

{: .notice--info} @@ -27,38 +27,43 @@ If you have a Taiwanese console (indicated by a T after the system version), fol In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. -1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` inside of a zip file (`BannerBomb3.zip`) -1. If your console is powered on, power off your console +1. Cihazınızı kapatın 1. SD kartınızı bilgisayarınıza takın +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} -#### Section II - BannerBomb3 +#### Section II - Hardware Button Check -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. +In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. -1. SD kartınızı cihazınıza tekrar takın -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked +1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) +1. If prompted to update, press Cancel + + If the device boots to the HOME Menu, just continue to the next step 1. Cihazınızı kapatın -1. SD kartınızı bilgisayarınıza takın -1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore +___ -Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +### Next steps: Choose an exploit + +If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. + +If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} + +If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +{: .notice--warning} diff --git a/_pages/tr_TR/installing-boot9strap-(fredtool).txt b/_pages/tr_TR/installing-boot9strap-(fredtool).txt index 2cfb0934bb..8baf55d1ad 100644 --- a/_pages/tr_TR/installing-boot9strap-(fredtool).txt +++ b/_pages/tr_TR/installing-boot9strap-(fredtool).txt @@ -6,14 +6,13 @@ title: "Installing boot9strap (Fredtool)"
Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

{: .notice--info} ### What You Need -* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -27,17 +26,32 @@ As an additional safety measure, we will perform an additional check for custom 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button 1. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide +1. Cihazınızı kapatın -If you see a configuration menu, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. {: .notice--danger} + +#### Section II - BannerBomb3 -#### Section II - Prep Work +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. SD kartınızı cihazınıza tekrar takın +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically power off + +#### Section III - Prep Work In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. +1. SD kartınızı bilgisayarınıza takın 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file using the first "Browse..." option +1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option 1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) 1. Click "Build" @@ -46,7 +60,6 @@ In this section, you will copy the files necessary to temporarily replace DS Con 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link -1. SD kartınızı bilgisayarınıza takın 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` @@ -60,7 +73,7 @@ In this section, you will copy the files necessary to temporarily replace DS Con ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### Section III - Overwriting DS Connection Settings +#### Section IV - Overwriting DS Connection Settings In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. @@ -73,7 +86,7 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte 1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio -#### Section IV - Flipnote Exploit +#### Section V - Flipnote Exploit If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} @@ -99,7 +112,7 @@ In this section, you will perform a series of very specific steps within Flipnot + If your device shuts down when you try to power it on, ensure that you have copied `boot.firm` from the Luma3DS `.zip` to the root of your SD card + If you see the Luma Configuration screen, press (Start) to reboot, then continue with the guide -#### Section V - Luma3DS Verification +#### Section VI - Luma3DS Verification Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. @@ -113,9 +126,9 @@ At this point, your console will boot to Luma3DS by default. + Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware. + On the next page, you will install useful homebrew applications to complete your setup. -#### Section VI - Restoring DS Connection Settings +#### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card 1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one diff --git a/_pages/tr_TR/installing-boot9strap-(usm).txt b/_pages/tr_TR/installing-boot9strap-(usm).txt index 014c4bf320..b52d0f1a4d 100644 --- a/_pages/tr_TR/installing-boot9strap-(usm).txt +++ b/_pages/tr_TR/installing-boot9strap-(usm).txt @@ -18,45 +18,28 @@ title: "Installing boot9strap (USM)" These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. +If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--warning} ### What You Need -* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) * The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. +In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. -1. If your device is powered on, power off your device -1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` and a SAFE_MODE exploit data file called `usm.bin` inside of a zip archive (`unSAFE_MODE.zip`) -1. SD kartınızı bilgisayarınıza takın +1. Your SD card should be inserted in your computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Create a folder named `boot9strap` on the root of your SD card 1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} - ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +1. Copy `usm.bin` to the root of your SD card #### Section II - BannerBomb3 @@ -66,9 +49,9 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana 1. Power on your device 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) - + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Press (A) to select "Inject haxx" + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-usm) +1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + Your device will automatically power off #### Section III - unSAFE_MODE @@ -77,7 +60,7 @@ In this section, you will enter Safe Mode (a feature available on all 3DS family 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) - + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of BannerBomb3](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions @@ -107,8 +90,7 @@ In this section, you will trigger the BannerBomb3 exploit a second time so that 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) -1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" +1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" + Your device will automatically reboot 1. Cihazınızı kapatın 1. SD kartınızı bilgisayarınıza takın diff --git a/_pages/tr_TR/seedminer.txt b/_pages/tr_TR/seedminer.txt index 85a6607db3..ed727be6ff 100644 --- a/_pages/tr_TR/seedminer.txt +++ b/_pages/tr_TR/seedminer.txt @@ -56,6 +56,7 @@ In this section, you will use the Bruteforce Movable website to retrieve your de + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages +1. Cihazınızı kapatın ___ @@ -63,11 +64,11 @@ ___ Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. -#### unSAFE_MODE (Recommended) +#### BannerBomb3 -This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the SAFE_MODE firmware present in all 3DS units. +This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the System Settings application. -Continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +Continue to [BannerBomb3](bannerbomb3) {: .notice--primary} ___ @@ -77,4 +78,4 @@ ___ If you have a Taiwanese device (indicated with a T at the end of the system version, such as 11.15.0-39**T**), you must follow this route. **Other regions may not follow this route.** Continue to [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) -{: .notice--warning} \ No newline at end of file +{: .notice--warning} diff --git a/_pages/tr_TR/troubleshooting.txt b/_pages/tr_TR/troubleshooting.txt index 99b7779c3f..3859da5010 100644 --- a/_pages/tr_TR/troubleshooting.txt +++ b/_pages/tr_TR/troubleshooting.txt @@ -126,11 +126,11 @@ If this is unsuccessful, try using another SD card. ## Installing boot9strap (USM) -### DSiWare Management menu crashes without showing USM menu +### DSiWare Management menu crashes without showing BB3 multihax menu (USM) -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php). +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). -Also, ensure that `usm.bin` is on the root of the SD card. If it is missing, then download the latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) (the RELEASE `.zip` file), and copy the `usm.bin` file to the root of your SD card. +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, you will need to follow [an alternate branch of Seedminer](homebrew-launcher-(pichaxx)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. @@ -144,16 +144,24 @@ If neither of these solutions fixes this problem, then custom firmware may have ### DSiWare Management shows a question mark -There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php), ensuring that you use the `movable.sed` file for your console. +There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen), ensuring that you use the `movable.sed` file for your console. ### DSiWare Management menu crashes without purple screen -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. --- ## Installing boot9strap (Fredtool) +### DSiWare Management menu crashes without showing BB3 multihax menu (Fredtool) + +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). + +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. + +If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + ### Error on Fredtool Injector page Ensure that your `movable.sed` and DSiWare backup come from the same console. A mismatch will result in an error. diff --git a/_pages/uk_UA/bannerbomb3.txt b/_pages/uk_UA/bannerbomb3.txt index 5a46749529..ea5034f134 100644 --- a/_pages/uk_UA/bannerbomb3.txt +++ b/_pages/uk_UA/bannerbomb3.txt @@ -6,8 +6,8 @@ title: "BannerBomb3"
Technical Details (optional) -

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

For a more technical explanation, see here.

{: .notice--info} @@ -27,38 +27,43 @@ If you have a Taiwanese console (indicated by a T after the system version), fol In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. -1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` inside of a zip file (`BannerBomb3.zip`) -1. If your console is powered on, power off your console +1. Power off your device 1. Insert your SD card into your computer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} -#### Section II - BannerBomb3 +#### Section II - Hardware Button Check -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. +In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked +1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) +1. If prompted to update, press Cancel + + If the device boots to the HOME Menu, just continue to the next step 1. Power off your device -1. Insert your SD card into your computer -1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore +___ -Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +### Next steps: Choose an exploit + +If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. + +If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} + +If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +{: .notice--warning} diff --git a/_pages/uk_UA/installing-boot9strap-(fredtool).txt b/_pages/uk_UA/installing-boot9strap-(fredtool).txt index 1f7825ac28..a14f20f6ba 100644 --- a/_pages/uk_UA/installing-boot9strap-(fredtool).txt +++ b/_pages/uk_UA/installing-boot9strap-(fredtool).txt @@ -6,14 +6,13 @@ title: "Installing boot9strap (Fredtool)"
Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

{: .notice--info} ### What You Need -* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -27,17 +26,32 @@ As an additional safety measure, we will perform an additional check for custom 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button 1. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide +1. Power off your device -If you see a configuration menu, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. {: .notice--danger} + +#### Section II - BannerBomb3 -#### Section II - Prep Work +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically power off + +#### Section III - Prep Work In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. +1. Insert your SD card into your computer 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file using the first "Browse..." option +1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option 1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) 1. Click "Build" @@ -46,7 +60,6 @@ In this section, you will copy the files necessary to temporarily replace DS Con 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link -1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` @@ -60,7 +73,7 @@ In this section, you will copy the files necessary to temporarily replace DS Con ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### Section III - Overwriting DS Connection Settings +#### Section IV - Overwriting DS Connection Settings In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. @@ -73,7 +86,7 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte 1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio -#### Section IV - Flipnote Exploit +#### Section V - Flipnote Exploit If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} @@ -99,7 +112,7 @@ In this section, you will perform a series of very specific steps within Flipnot + If your device shuts down when you try to power it on, ensure that you have copied `boot.firm` from the Luma3DS `.zip` to the root of your SD card + If you see the Luma Configuration screen, press (Start) to reboot, then continue with the guide -#### Section V - Luma3DS Verification +#### Section VI - Luma3DS Verification Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. @@ -113,9 +126,9 @@ At this point, your console will boot to Luma3DS by default. + Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware. + On the next page, you will install useful homebrew applications to complete your setup. -#### Section VI - Restoring DS Connection Settings +#### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card 1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one diff --git a/_pages/uk_UA/installing-boot9strap-(usm).txt b/_pages/uk_UA/installing-boot9strap-(usm).txt index b58fa784a2..4861044daf 100644 --- a/_pages/uk_UA/installing-boot9strap-(usm).txt +++ b/_pages/uk_UA/installing-boot9strap-(usm).txt @@ -18,45 +18,28 @@ title: "Installing boot9strap (USM)" These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. +If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--warning} ### What You Need -* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) * The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. +In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. -1. If your device is powered on, power off your device -1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` and a SAFE_MODE exploit data file called `usm.bin` inside of a zip archive (`unSAFE_MODE.zip`) -1. Insert your SD card into your computer +1. Your SD card should be inserted in your computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Create a folder named `boot9strap` on the root of your SD card 1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} - ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +1. Copy `usm.bin` to the root of your SD card #### Section II - BannerBomb3 @@ -66,9 +49,9 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana 1. Power on your device 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) - + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Press (A) to select "Inject haxx" + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-usm) +1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + Your device will automatically power off #### Section III - unSAFE_MODE @@ -77,7 +60,7 @@ In this section, you will enter Safe Mode (a feature available on all 3DS family 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) - + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of BannerBomb3](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions @@ -107,8 +90,7 @@ In this section, you will trigger the BannerBomb3 exploit a second time so that 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) -1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" +1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" + Your device will automatically reboot 1. Power off your device 1. Insert your SD card into your computer diff --git a/_pages/uk_UA/seedminer.txt b/_pages/uk_UA/seedminer.txt index 8ecc9a8637..b6d7e339df 100644 --- a/_pages/uk_UA/seedminer.txt +++ b/_pages/uk_UA/seedminer.txt @@ -56,6 +56,7 @@ In this section, you will use the Bruteforce Movable website to retrieve your de + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages +1. Power off your device ___ @@ -63,11 +64,11 @@ ___ Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. -#### unSAFE_MODE (Recommended) +#### BannerBomb3 -This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the SAFE_MODE firmware present in all 3DS units. +This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the System Settings application. -Continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +Continue to [BannerBomb3](bannerbomb3) {: .notice--primary} ___ @@ -77,4 +78,4 @@ ___ If you have a Taiwanese device (indicated with a T at the end of the system version, such as 11.15.0-39**T**), you must follow this route. **Other regions may not follow this route.** Continue to [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) -{: .notice--warning} \ No newline at end of file +{: .notice--warning} diff --git a/_pages/uk_UA/troubleshooting.txt b/_pages/uk_UA/troubleshooting.txt index 05797b7bdb..2668e098fc 100644 --- a/_pages/uk_UA/troubleshooting.txt +++ b/_pages/uk_UA/troubleshooting.txt @@ -126,11 +126,11 @@ If this is unsuccessful, try using another SD card. ## Installing boot9strap (USM) -### DSiWare Management menu crashes without showing USM menu +### DSiWare Management menu crashes without showing BB3 multihax menu (USM) -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php). +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). -Also, ensure that `usm.bin` is on the root of the SD card. If it is missing, then download the latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) (the RELEASE `.zip` file), and copy the `usm.bin` file to the root of your SD card. +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, you will need to follow [an alternate branch of Seedminer](homebrew-launcher-(pichaxx)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. @@ -144,16 +144,24 @@ If neither of these solutions fixes this problem, then custom firmware may have ### DSiWare Management shows a question mark -There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php), ensuring that you use the `movable.sed` file for your console. +There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen), ensuring that you use the `movable.sed` file for your console. ### DSiWare Management menu crashes without purple screen -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. --- ## Installing boot9strap (Fredtool) +### DSiWare Management menu crashes without showing BB3 multihax menu (Fredtool) + +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). + +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. + +If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + ### Error on Fredtool Injector page Ensure that your `movable.sed` and DSiWare backup come from the same console. A mismatch will result in an error. diff --git a/_pages/vi_VN/bannerbomb3.txt b/_pages/vi_VN/bannerbomb3.txt index 5a46749529..ea5034f134 100644 --- a/_pages/vi_VN/bannerbomb3.txt +++ b/_pages/vi_VN/bannerbomb3.txt @@ -6,8 +6,8 @@ title: "BannerBomb3"
Technical Details (optional) -

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

For a more technical explanation, see here.

{: .notice--info} @@ -27,38 +27,43 @@ If you have a Taiwanese console (indicated by a T after the system version), fol In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. -1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` inside of a zip file (`BannerBomb3.zip`) -1. If your console is powered on, power off your console +1. Power off your device 1. Insert your SD card into your computer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} -#### Section II - BannerBomb3 +#### Section II - Hardware Button Check -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. +In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked +1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) +1. If prompted to update, press Cancel + + If the device boots to the HOME Menu, just continue to the next step 1. Power off your device -1. Insert your SD card into your computer -1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore +___ -Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +### Next steps: Choose an exploit + +If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. + +If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} + +If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +{: .notice--warning} diff --git a/_pages/vi_VN/installing-boot9strap-(fredtool).txt b/_pages/vi_VN/installing-boot9strap-(fredtool).txt index 1f7825ac28..a14f20f6ba 100644 --- a/_pages/vi_VN/installing-boot9strap-(fredtool).txt +++ b/_pages/vi_VN/installing-boot9strap-(fredtool).txt @@ -6,14 +6,13 @@ title: "Installing boot9strap (Fredtool)"
Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

{: .notice--info} ### What You Need -* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -27,17 +26,32 @@ As an additional safety measure, we will perform an additional check for custom 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button 1. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide +1. Power off your device -If you see a configuration menu, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. {: .notice--danger} + +#### Section II - BannerBomb3 -#### Section II - Prep Work +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically power off + +#### Section III - Prep Work In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. +1. Insert your SD card into your computer 1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file using the first "Browse..." option +1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option 1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) 1. Click "Build" @@ -46,7 +60,6 @@ In this section, you will copy the files necessary to temporarily replace DS Con 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link -1. Insert your SD card into your computer 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` @@ -60,7 +73,7 @@ In this section, you will copy the files necessary to temporarily replace DS Con ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### Section III - Overwriting DS Connection Settings +#### Section IV - Overwriting DS Connection Settings In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. @@ -73,7 +86,7 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte 1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio -#### Section IV - Flipnote Exploit +#### Section V - Flipnote Exploit If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} @@ -99,7 +112,7 @@ In this section, you will perform a series of very specific steps within Flipnot + If your device shuts down when you try to power it on, ensure that you have copied `boot.firm` from the Luma3DS `.zip` to the root of your SD card + If you see the Luma Configuration screen, press (Start) to reboot, then continue with the guide -#### Section V - Luma3DS Verification +#### Section VI - Luma3DS Verification Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. @@ -113,9 +126,9 @@ At this point, your console will boot to Luma3DS by default. + Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware. + On the next page, you will install useful homebrew applications to complete your setup. -#### Section VI - Restoring DS Connection Settings +#### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card 1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one diff --git a/_pages/vi_VN/installing-boot9strap-(usm).txt b/_pages/vi_VN/installing-boot9strap-(usm).txt index b58fa784a2..4861044daf 100644 --- a/_pages/vi_VN/installing-boot9strap-(usm).txt +++ b/_pages/vi_VN/installing-boot9strap-(usm).txt @@ -18,45 +18,28 @@ title: "Installing boot9strap (USM)" These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. +If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--warning} ### What You Need -* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) * The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. +In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. -1. If your device is powered on, power off your device -1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer -1. Upload your movable.sed using the "Choose File" option -1. Click "Build and Download" - + This will download an exploit DSiWare called `F00D43D5.bin` and a SAFE_MODE exploit data file called `usm.bin` inside of a zip archive (`unSAFE_MODE.zip`) -1. Insert your SD card into your computer +1. Your SD card should be inserted in your computer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it 1. Create a folder named `boot9strap` on the root of your SD card 1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card 1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card -1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card - ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} - ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +1. Copy `usm.bin` to the root of your SD card #### Section II - BannerBomb3 @@ -66,9 +49,9 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana 1. Power on your device 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) - + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Press (A) to select "Inject haxx" + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-usm) +1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + Your device will automatically power off #### Section III - unSAFE_MODE @@ -77,7 +60,7 @@ In this section, you will enter Safe Mode (a feature available on all 3DS family 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) - + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of BannerBomb3](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Press "OK" to accept the update + There is no update. This is part of the exploit 1. Press "I accept" to accept the terms and conditions @@ -107,8 +90,7 @@ In this section, you will trigger the BannerBomb3 exploit a second time so that 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) -1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" +1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" + Your device will automatically reboot 1. Power off your device 1. Insert your SD card into your computer diff --git a/_pages/vi_VN/seedminer.txt b/_pages/vi_VN/seedminer.txt index 8ecc9a8637..b6d7e339df 100644 --- a/_pages/vi_VN/seedminer.txt +++ b/_pages/vi_VN/seedminer.txt @@ -56,6 +56,7 @@ In this section, you will use the Bruteforce Movable website to retrieve your de + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages +1. Power off your device ___ @@ -63,11 +64,11 @@ ___ Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. -#### unSAFE_MODE (Recommended) +#### BannerBomb3 -This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the SAFE_MODE firmware present in all 3DS units. +This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the System Settings application. -Continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +Continue to [BannerBomb3](bannerbomb3) {: .notice--primary} ___ @@ -77,4 +78,4 @@ ___ If you have a Taiwanese device (indicated with a T at the end of the system version, such as 11.15.0-39**T**), you must follow this route. **Other regions may not follow this route.** Continue to [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) -{: .notice--warning} \ No newline at end of file +{: .notice--warning} diff --git a/_pages/vi_VN/troubleshooting.txt b/_pages/vi_VN/troubleshooting.txt index 05797b7bdb..2668e098fc 100644 --- a/_pages/vi_VN/troubleshooting.txt +++ b/_pages/vi_VN/troubleshooting.txt @@ -126,11 +126,11 @@ If this is unsuccessful, try using another SD card. ## Installing boot9strap (USM) -### DSiWare Management menu crashes without showing USM menu +### DSiWare Management menu crashes without showing BB3 multihax menu (USM) -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php). +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). -Also, ensure that `usm.bin` is on the root of the SD card. If it is missing, then download the latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) (the RELEASE `.zip` file), and copy the `usm.bin` file to the root of your SD card. +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, you will need to follow [an alternate branch of Seedminer](homebrew-launcher-(pichaxx)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. @@ -144,16 +144,24 @@ If neither of these solutions fixes this problem, then custom firmware may have ### DSiWare Management shows a question mark -There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php), ensuring that you use the `movable.sed` file for your console. +There may be an issue with your `F00D43D5.bin` file (it may be corrupted or intended for the wrong 3DS). Re-create your `F00D43D5.bin` file with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen), ensuring that you use the `movable.sed` file for your console. ### DSiWare Management menu crashes without purple screen -Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). If this fails, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) for assistance. --- ## Installing boot9strap (Fredtool) +### DSiWare Management menu crashes without showing BB3 multihax menu (Fredtool) + +Ensure that `F00D43D5.bin` is the only file in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`. If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). + +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. + +If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + ### Error on Fredtool Injector page Ensure that your `movable.sed` and DSiWare backup come from the same console. A mismatch will result in an error. diff --git a/_pages/zh_CN/bannerbomb3.txt b/_pages/zh_CN/bannerbomb3.txt index d3eabeb9fa..b3892dbd74 100644 --- a/_pages/zh_CN/bannerbomb3.txt +++ b/_pages/zh_CN/bannerbomb3.txt @@ -6,8 +6,8 @@ title: "BannerBomb3"
Technical Details (optional) -

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

For a more technical explanation, see here.

{: .notice--info} @@ -27,38 +27,43 @@ title: "BannerBomb3" In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. -1. 在你的电脑上打开 [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) -1. 点击 “选择文件” 选项,然后选择你的 movable.sed 上传 -1. 点击 “Build and Download” - + 这个操作将下载一个 zip 文件(`BannerBomb3.zip`),解压后可得到一个叫做 `F00D43D5.bin` 的文件,此文件用来利用 DSiWare 漏洞 -1. 如果你的主机已经被你开机了,那么将其关机 +1. 将主机关机 1. 将你的 SD 卡插入到电脑 +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + 根目录指的是你点进 SD 卡看到的目录,你可以在这个目录下看到 Nintendo 3DS 文件夹,但请不要点进去 1. 打开内存卡的 `Nintendo 3DS` -> `` -> `` 文件夹 + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. 在 `` 文件夹内创建一个名为 `Nintendo DSiWare` 的文件夹 + 如果这个位置已经存在了这个文件夹,**且**有一些名为 `<8位ID>.bin` 文件(DSiWare 备份文件)在里面,请将它们备份到电脑上,然后从 SD 卡中移除这些文件 -1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} -#### 第二步 – BannerBomb3 +#### Section II - Hardware Button Check -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. +In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. -1. 将 SD 卡重新插入你的主机 -1. 启动你的主机 -1. 启动你主机上的 “系统设置(System settings)” -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + 你的主机屏幕应该会开始品红色(粉色 / 紫色)的闪烁,然后在几秒钟后崩溃。 这意味着它生效了 +1. 将你的主机置于关机状态,按住 L + R + ↑ + A 四个按键,然后按下电源键 + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) +1. If prompted to update, press Cancel + + If the device boots to the HOME Menu, just continue to the next step 1. 将主机关机 -1. 将你的 SD 卡插入到电脑 -1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page -1. 打开内存卡的 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 文件夹 -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. 此文件之后不再需要使用 +___ -继续至[安装 boot9strap(通过Fredtool)](installing-boot9strap-(fredtool)) +### Next steps: Choose an exploit + +If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. + +If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} + +If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +{: .notice--warning} diff --git a/_pages/zh_CN/installing-boot9strap-(fredtool).txt b/_pages/zh_CN/installing-boot9strap-(fredtool).txt index 9c229b82c0..3ec42a5515 100644 --- a/_pages/zh_CN/installing-boot9strap-(fredtool).txt +++ b/_pages/zh_CN/installing-boot9strap-(fredtool).txt @@ -6,14 +6,13 @@ title: "安装 boot9strap(通过 Fredtool)"
Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

{: .notice--info} ### 你需要准备点啥? -* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * 你在 [Seedminer](seedminer) 步骤中获得的 `movable.sed` 文件 * 最新版本的 [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest)(下载 `Frogminer_save.zip`) * 最新版本的 [b9sTool](https://github.com/zoogie/b9sTool/releases/latest)(下载 `boot.nds`) @@ -27,17 +26,32 @@ As an additional safety measure, we will perform an additional check for custom 1. 按住 “Select” 键 1. 在按住 “Select” 键的同时按下电源键开机 1. 如果主机自动启动到了主菜单,则测试成功,你可以继续做此教程中的余下内容 +1. 将主机关机 -如果主机进入到了一个配置菜单,那就表示你的主机之前已经安装过自制固件了。**如果继续操作的话可能会导致主机变砖!** 继续至[检查自制固件](checking-for-cfw)来更新你现有的自制固件。 +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! 继续至[检查自制固件](checking-for-cfw)来更新你现有的自制固件。 {: .notice--danger} + +#### 第二步 – BannerBomb3 -#### 第二步 – 准备工作 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. 将 SD 卡重新插入你的主机 +1. 启动你的主机 +1. 启动你主机上的 “系统设置(System settings)” +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + 主机将会自动关机 + +#### Section III - Prep Work In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. +1. 将你的 SD 卡插入到电脑 1. 在电脑上打开 [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) 站点 1. 于“Username”一行,填入一个你的英文名(不带空格或特殊字符) -1. 于 “DSiBin” 一行,点击“Browse...”(选择文件)来上传先前的 `42383841.bin` 文件 +1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. 于“MovableSed”一行,点击“Browse...”(选择文件)上传你的 `movable.sed` 文件 1. 于“InjectionTarget”一行,设置注入对象为 `DSinternet`(**不是带有** memorypit 字串的那个) 1. 点击 “Build” @@ -46,7 +60,6 @@ In this section, you will copy the files necessary to temporarily replace DS Con 1. 点击第一个搜索结果 + 它应该是所有显示的结果中时间最新的那一个 1. 点击 "output_(<你的名字>).zip" 的链接 -1. 将你的 SD 卡插入到电脑 1. 打开内存卡的 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 文件夹 + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` @@ -60,7 +73,7 @@ In this section, you will copy the files necessary to temporarily replace DS Con ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### Section III - Overwriting DS Connection Settings +#### Section IV - Overwriting DS Connection Settings In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. @@ -73,7 +86,7 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte 1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. 如果漏洞执行成功,你的主机将进入到日版的“うごくメモ帳 (Flipnote Studio)” -#### 第四步 – 触发 Flipnote 漏洞 +#### 第五步 – 触发 Flipnote 漏洞 如果你需要图片帮助,请点击 [这里](https://zoogie.github.io/web/flipnote_directions/)。 {: .notice--info} @@ -99,7 +112,7 @@ In this section, you will perform a series of very specific steps within Flipnot + 如果你的主机在你尝试开机后自动关机了,请确认你已经从 Luma3DS `.zip` 中复制了 `boot.firm` 文件到你的 SD 卡根目录中 + 如果你看到主机显示了 Luma 配置菜单,请按下 START 键重启然后继续教程 -#### 第五步 – 验证 Luma3DS +#### 第六步 – 验证 Luma3DS Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. @@ -113,13 +126,13 @@ Due to the nature of the exploit used, it is occasionally (but rarely) possible + Luma3DS 不会给正常的主菜单增添任何看上去十分特别的东西。 如果你的主机现在已经启动到主菜单了,说明自制固件已经在运行了。 + 在下一页中,我们将会教你安装一些有用的自制程序来完成安装步骤。 -#### 第六步 – 还原 “DS 连接设置(DS Connection Settings)” +#### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. 打开内存卡的 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 文件夹 1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one -1. 将 SD 卡重新插入你的主机 +1. 将SD卡重新插入你的主机 1. 启动你的主机 1. 启动你主机上的 “系统设置(System settings)” 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) diff --git a/_pages/zh_CN/installing-boot9strap-(usm).txt b/_pages/zh_CN/installing-boot9strap-(usm).txt index 98616d8c30..5c9309436d 100644 --- a/_pages/zh_CN/installing-boot9strap-(usm).txt +++ b/_pages/zh_CN/installing-boot9strap-(usm).txt @@ -18,45 +18,28 @@ title: "安装 boot9strap(通过 USM)" 这些操作可在美、欧、日、韩版的主机上工作,你可通过系统版本号末尾的 U,E,J,K 字符来区分主机版本。 -如果你的主机 L 键、R 键、↑ 键和 A 键中有一个坏了无法使用,则你只能使用[替代方法](bannerbomb3)。 如需帮助,请加入 [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) 并使用英文求助。(请注意,如果你身处中国大陆,访问 Discord 可能需要科学上网),你也可以到译者的 [QQ 群](https://stray-soul.site/index.php/qqgroup)寻求帮助,群号为 942052497。 +If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). 如需帮助,请加入 [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) 并使用英文求助。(请注意,如果你身处中国大陆,访问 Discord 可能需要科学上网),你也可以到译者的 [QQ 群](https://stray-soul.site/index.php/qqgroup)寻求帮助,群号为 942052497。 {: .notice--warning} ### 你需要准备点啥? -* 你在 [Seedminer](seedminer) 步骤中获得的 `movable.sed` 文件 * 最新版本的 [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip)(直链) * 最新版本的 [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip)(直链) * 最新版本的 [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest)(下载 Luma3DS `.zip` 文件) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) #### 第一步 – 准备工作 -In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. +In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. -1. 如果你的主机已经被你开机了,那么将其关机 -1. 在你的电脑上打开 [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) -1. 点击 “选择文件” 选项,然后选择你的 movable.sed 上传 -1. 点击 “Build and Download” - + 这将下载一个包含了名为 `F00D43D5.bin` 的 DSiWare 备份和一个名为 `usm.bin` 的 SAFE_MODE 存档的 zip 文件(`unSAFE_MODE.zip`)到你的电脑上 -1. 将你的 SD 卡插入到电脑 +1. Your SD card should be inserted in your computer 1. 解压 Luma3DS `.zip` 里的 `boot.firm` 和 `boot.3dsx` 到你 SD 卡的根目录 + 根目录指的是你点进 SD 卡看到的目录,你可以在这个目录下看到 Nintendo 3DS 文件夹,但请不要点进去 1. 在 SD 卡根目录创建一个名为 `boot9strap` 的文件夹 1. 从boot9strap `.zip` 文件中复制 `boot9strap.firm` 和 `boot9strap.firm.sha` 到你SD卡的 `/boot9strap/` 文件夹中 1. 从 SafeB9SInstaller `.zip` 压缩包中复制 `SafeB9SInstaller.bin` 到 SD 卡根目录下 -1. 从 `unSAFE_MODE.zip` 复制 `usm.bin` 到 SD 卡的根目录 - ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} - ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} -1. 打开内存卡的 `Nintendo 3DS` -> `` -> `` 文件夹 - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. 在 `` 文件夹内创建一个名为 `Nintendo DSiWare` 的文件夹 - + 如果这个位置已经存在了这个文件夹,**且**有一些名为 `<8位ID>.bin` 文件(DSiWare 备份文件)在里面,请将它们备份到电脑上,然后从 SD 卡中移除这些文件 -1. 从 `unSAFE_MODE.zip` 压缩文件中解压 `F00D43D5.bin` 到 `Nintendo DSiWare` 文件夹下 - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +1. Copy `usm.bin` to the root of your SD card #### 第二步 – BannerBomb3 @@ -66,9 +49,9 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana 1. 启动你的主机 1. 启动你主机上的 “系统设置(System settings)” 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) - + 如果做完这步之后你的主机崩溃了,[请参照此故障排查](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu)。 -1. Press (A) to select "Inject haxx" + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-usm) +1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + 主机将会自动关机 #### 第三步 – unSAFE_MODE @@ -77,7 +60,7 @@ In this section, you will enter Safe Mode (a feature available on all 3DS family 1. 将你的主机置于关机状态,按住 L + R + ↑ + A 四个按键,然后按下电源键 + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) - + 如果你试了很多次依然无法进入安全模式,则也许这四个按键中有一个按错了,或是坏掉了。 如果确实如此,则请更换 [Seedminer 的另一种方法](bannerbomb3)。 如需帮助,请加入 [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) 并使用英文求助。(请注意,如果你身处中国大陆,访问 Discord 可能需要科学上网),你也可以到译者的 [QQ 群](https://stray-soul.site/index.php/qqgroup)寻求帮助,群号为 942052497。 + + 如果你试了很多次依然无法进入安全模式,则也许这四个按键中有一个按错了,或是坏掉了。 If this is the case, you will need to follow [an alternate branch of BannerBomb3](installing-boot9strap-(fredtool)). 如需帮助,请加入 [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) 并使用英文求助。(请注意,如果你身处中国大陆,访问 Discord 可能需要科学上网),你也可以到译者的 [QQ 群](https://stray-soul.site/index.php/qqgroup)寻求帮助,群号为 942052497。 1. 点击 “OK” 来允许更新 + 这个步骤实际上不存在更新。 这只是触发漏洞的一部分 1. 点击 “I accept(我同意/同意する)” @@ -107,8 +90,7 @@ In this section, you will trigger the BannerBomb3 exploit a second time so that 1. 启动你主机上的 “系统设置(System settings)” 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) -1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" +1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" + 主机将会自动重启 1. 将主机关机 1. 将你的 SD 卡插入到电脑 diff --git a/_pages/zh_CN/seedminer.txt b/_pages/zh_CN/seedminer.txt index 447ec35ff2..bd3e8bb92f 100644 --- a/_pages/zh_CN/seedminer.txt +++ b/_pages/zh_CN/seedminer.txt @@ -56,6 +56,7 @@ In this section, you will use the Bruteforce Movable website to retrieve your de + 如果你已经等待了半个小时,那么请加入 [Nintendo Homebrew Discord 服务器](https://discord.gg/MWxPgEp) 并使用英文求助。你也可以到译者的 [QQ 群](https://stray-soul.site/index.php/qqgroup)寻求帮助,群号为 942052497 1. 等待程序自动完成后,从站点下载 `movable.sed` 文件 + 你在之后还会用到这个文件,请先把这个文件存起来 +1. 将主机关机 ___ @@ -63,11 +64,11 @@ ___ 一旦得到了你主机的加密密钥(`movable.sed`)后,你将需要选一个方法使用它来触发 3DS 系统漏洞,并利用漏洞来安装自制固件。 -#### unSAFE_MODE(推荐) +#### BannerBomb3 -这种将使用 Seedminer 进行进一步破解的方法使用了你的 `movable.sed` 来利用所有机型都有的 SAFE_MODE 固件来进行破解系统。 +This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the System Settings application. -继续至[安装 boot9strap(通过 USM)](installing-boot9strap-(usm)) +Continue to [BannerBomb3](bannerbomb3) {: .notice--primary} ___ @@ -77,4 +78,4 @@ ___ 如果你的主机是港台版的(例如系统版本 11.15.0-39**T**,T 字结尾 ),则你必须使用这个方法。 **其他区域的主机无法使用此方法。** + 继续至 [BannerBomb3 + Fredtool(仅港台版)](bannerbomb3-fredtool-(twn)) -{: .notice--warning} \ No newline at end of file +{: .notice--warning} diff --git a/_pages/zh_CN/troubleshooting.txt b/_pages/zh_CN/troubleshooting.txt index bcb41f3da9..ceb5ad8ebf 100644 --- a/_pages/zh_CN/troubleshooting.txt +++ b/_pages/zh_CN/troubleshooting.txt @@ -126,11 +126,11 @@ title: "问题排查" ## 安装 boot9strap(通过 USM) -### DSiWare 数据管理菜单崩溃,而非跳转至 USM 菜单 +### DSiWare Management menu crashes without showing BB3 multihax menu (USM) -确保 `F00D43D5.bin` 是 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 里面的唯一文件。 如果确定没问题的话,尝试重新使用 [unSAFE_MODE 漏洞注入器](https://3ds.nhnarwhal.com/3dstools/unsafemode.php)重新创建文件。 +确保 `F00D43D5.bin` 是 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 里面的唯一文件。 If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). -另外,请确保 `usm.bin` 已正确放置在 SD 卡的根目录下。 如果缺失了这个文件,请下载最新版本的 [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest)(RELEASE `.zip` 文件),然后将 `usm.bin` 复制到内存卡的根目录中。 +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. 如果还是不行,则可能是因为曾经这台主机安装过自制固件,且后来又卸载了自制固件,从而导致此方法失效。 如果确实如此,则请更换 [Seedminer 的另一种方法](homebrew-launcher-(pichaxx))。 如需帮助,请加入 [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) 并使用英文求助。(请注意,如果你身处中国大陆,访问 Discord 可能需要科学上网),你也可以到译者的 [QQ 群](https://stray-soul.site/index.php/qqgroup)寻求帮助,群号为 942052497。 @@ -144,16 +144,24 @@ title: "问题排查" ### DSiWare 数据管理里面显示了一个问号图标的程序 -你放的 `F00D43D5.bin` 文件可能有问题(损坏或被用于错误的 3DS)。 使用 [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) 重新创建 `F00D43D5.bin` 文件,且确保你使用的 `movable.sed` 文件是你这台主机的。 +你放的 `F00D43D5.bin` 文件可能有问题(损坏或被用于错误的 3DS)。 Re-create your `F00D43D5.bin` file with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen), ensuring that you use the `movable.sed` file for your console. ### DSiWare 数据管理菜单没有闪烁紫屏就崩溃了 -确保 `F00D43D5.bin` 是 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 里面的唯一文件。 如果确定没问题的话,尝试重新使用 [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) 重新创建文件。 如果还是不行,则可能是因为自制固件在此主机上被卸载过一次,从而导致此方法失效。 如果是这样,请加入 [Nintendo Homebrew Discord 服务器](https://discord.gg/MWxPgEp)以寻求帮助。 +确保 `F00D43D5.bin` 是 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 里面的唯一文件。 If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). 如果还是不行,则可能是因为自制固件在此主机上被卸载过一次,从而导致此方法失效。 如果是这样,请加入 [Nintendo Homebrew Discord 服务器](https://discord.gg/MWxPgEp)以寻求帮助。 --- ## 安装 boot9strap(通过 Fredtool) +### DSiWare Management menu crashes without showing BB3 multihax menu (Fredtool) + +确保 `F00D43D5.bin` 是 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 里面的唯一文件。 If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). + +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. + +如果还是不行,则可能是因为曾经这台主机安装过自制固件,且后来又卸载了自制固件,从而导致此方法失效。 如果确实如此,请加入 [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) 并使用英文求助。(请注意,如果你身处中国大陆,访问 Discord 可能需要科学上网),你也可以到译者的 [QQ 群](https://stray-soul.site/index.php/qqgroup)寻求帮助,群号为 942052497。 + ### Fredtool 注入页报错 请确认 `movable.sed` 和 DSiWare 备份是从同一台主机导出的。 如果不匹配就会报错。 diff --git a/_pages/zh_TW/bannerbomb3.txt b/_pages/zh_TW/bannerbomb3.txt index 7458fc748f..40bf08b9cf 100644 --- a/_pages/zh_TW/bannerbomb3.txt +++ b/_pages/zh_TW/bannerbomb3.txt @@ -6,8 +6,8 @@ title: "BannerBomb3"
Technical Details (optional) -

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

+

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

+

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

For a more technical explanation, see here.

{: .notice--info} @@ -27,38 +27,43 @@ title: "BannerBomb3" In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. -1. 於您的電腦中開啟 [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) -1. 點選「Choose File」,並選取您的 movable.sed 檔案 -1. 點選『Build and Download』 - + 這個步驟將可以從下載後的 zip 檔 (`BannerBomb3.zip`) 中解壓出一個叫做 `F00D43D5.bin` 的寫入了漏洞的 DSiWare 檔 -1. 如果您的主機正處於開機狀態,那麼請將其關機 +1. 關閉您的主機 1. 將 SD 卡插入至電腦中 +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + 「SD 卡的根目錄」指的是你的 SD 卡含有 Nintendo 3DS 資料夾的目錄,而非該資料夾內部 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} -#### 第二節 — BannerBomb3 +#### Section II - Hardware Button Check -In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page. +In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. -1. 將 SD 卡插回主機中 -1. 啟動您的主機 -1. 於您主機上啟動系統設定 (System Settings) -1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + 您的主機螢幕應該會開始品紅色(粉色 / 紫色)的閃爍,隨後幾秒當機並重啟。 這代表此漏洞成功執行了。 +1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) +1. If prompted to update, press Cancel + + If the device boots to the HOME Menu, just continue to the next step 1. 關閉您的主機 -1. 將 SD 卡插入至電腦中 -1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page -1. 於您的 SD 卡中,移動至 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. 這個檔案之後不再需要了 +___ -繼續至[安裝 boot9strap (透過 Fredtool)](installing-boot9strap-(fredtool)) +### Next steps: Choose an exploit + +If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. + +If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} + +If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +{: .notice--warning} diff --git a/_pages/zh_TW/installing-boot9strap-(fredtool).txt b/_pages/zh_TW/installing-boot9strap-(fredtool).txt index 9270f0d3e3..0949f2bac9 100644 --- a/_pages/zh_TW/installing-boot9strap-(fredtool).txt +++ b/_pages/zh_TW/installing-boot9strap-(fredtool).txt @@ -6,14 +6,13 @@ title: "Installing boot9strap (Fredtool)"
Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

+

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

{: .notice--info} ### 必備項目 -* A DSiWare Backup, normally `42383841.bin` (You should have one on the root of your SD card from following [BannerBomb3](bannerbomb3)) * 您自 [Seedminer](seedminer) 步驟中所取得的 `movable.sed` 檔案 * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) @@ -27,17 +26,32 @@ As an additional safety measure, we will perform an additional check for custom 1. 按住「Select」鍵 1. 在開機時按住「Select」鍵 1. 如果您能正常開機至 HOME 主選單的話,則代表檢查通過,您能放心地繼續遵循以下步驟。 +1. 關閉您的主機 -If you see a configuration menu, you already have CFW, and continuing with these instructions may BRICK your device! 前往至 [檢查是否已安裝自製韌體](checking-for-cfw) 以更新您現有的自製韌體。 +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! 前往至 [檢查是否已安裝自製韌體](checking-for-cfw) 以更新您現有的自製韌體。 {: .notice--danger} + +#### 第二節 — BannerBomb3 -#### 第二節 — 準備工作 +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. 將 SD 卡插回主機中 +1. 啟動您的主機 +1. 於您主機上啟動系統設定 (System Settings) +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + 主機將會自動關機 + +#### Section III - Prep Work In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. +1. 將 SD 卡插入至電腦中 1. 在電腦上開啟 [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file using the first "Browse..." option +1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option 1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) 1. 選擇『Build』 @@ -46,7 +60,6 @@ In this section, you will copy the files necessary to temporarily replace DS Con 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link -1. 將 SD 卡插入至電腦中 1. 於您的 SD 卡中,移動至 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` @@ -60,7 +73,7 @@ In this section, you will copy the files necessary to temporarily replace DS Con ![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} -#### Section III - Overwriting DS Connection Settings +#### Section IV - Overwriting DS Connection Settings In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. @@ -73,7 +86,7 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte 1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. 如果漏洞成功執行,您的主機將自動啟動『うごくメモ帳 (Flipnote Studio)』 -##### 第四節 — Flipnote 漏洞 +##### 第五節 — Flipnote 漏洞 如果您需要圖片幫助請見[此](https://zoogie.github.io/web/flipnote_directions/)。 {: .notice--info} @@ -99,7 +112,7 @@ In this section, you will perform a series of very specific steps within Flipnot + If your device shuts down when you try to power it on, ensure that you have copied `boot.firm` from the Luma3DS `.zip` to the root of your SD card + If you see the Luma Configuration screen, press (Start) to reboot, then continue with the guide -#### Section V - Luma3DS Verification +#### Section VI - Luma3DS Verification Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created. @@ -113,9 +126,9 @@ At this point, your console will boot to Luma3DS by default. + Luma3DS 不會特別在 HOME 主選單中新增任何特別的東西。 如果你的主機已經啟動到了 HOME 主選單,這代表自製韌體已經在運行了。 + On the next page, you will install useful homebrew applications to complete your setup. -#### 第六節 — 還原 DS 連線設定 +#### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section III. +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. 於您的 SD 卡中,移動至 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one diff --git a/_pages/zh_TW/installing-boot9strap-(usm).txt b/_pages/zh_TW/installing-boot9strap-(usm).txt index b217ed5742..02a164e633 100644 --- a/_pages/zh_TW/installing-boot9strap-(usm).txt +++ b/_pages/zh_TW/installing-boot9strap-(usm).txt @@ -18,45 +18,28 @@ title: "安裝 boot9strap (透過 USM)" 這些操作在美、歐、日、韓版可用,可透過系統版本號末尾的 「U、E、J、K」 字元來辨別。 -If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. +If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--warning} ### 必備項目 -* 您自 [Seedminer](seedminer) 步驟中所取得的 `movable.sed` 檔案 * The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) * The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/usm.bin) (direct download) #### 第一節 — 準備工作 -In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. +In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. -1. 如果您的主機正處於開機狀態,那麼請將其關機 -1. 於您的電腦中開啟 [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) -1. 點選「Choose File」,並選取您的 movable.sed 檔案 -1. 點選『Build and Download』 - + 這將會下載一個 ZIP 檔 (`unSAFE_MODE.zip`),其中應含有名為 `F00D43D5.bin` 的 DSiWare 檔案,及一個名為 `usm.bin` 的 SAFE_MODE 漏洞的資料檔。 -1. 將 SD 卡插入至電腦中 +1. Your SD card should be inserted in your computer 1. 解壓 Luma3DS `.zip` 內的 `boot.firm` 與 `boot.3dsx` 到 SD 卡的根目錄底下 + 「SD 卡的根目錄」指的是你的 SD 卡含有 Nintendo 3DS 資料夾的目錄,而非該資料夾內部 1. 在 SD 卡的根目錄底下建立一個新的資料夾 `boot9strap` 1. 解壓 boot9strap `.zip` 的 `boot9strap.firm` 及 `boot9strap.firm.sha` 檔案至 SD 卡的 `/boot9strap/` 資料夾中 1. 將 SafeB9SInstaller `.zip` 中的 `SafeB9SInstaller.bin` 複製到 SD 卡的根目錄 -1. 解壓 `unSAFE_MODE.zip` 內的 `usm.bin` 到 SD 卡的根目錄底下 - ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} - ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. 解壓 `unSAFE_MODE.zip` 內的 `F00D43D5.bin` 到 `Nintendo DSiWare` 資料夾中 - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +1. Copy `usm.bin` to the root of your SD card #### 第二節 — BannerBomb3 @@ -66,9 +49,9 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana 1. 啟動您的主機 1. 於您主機上啟動系統設定 (System Settings) 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) - + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) -1. Press (A) to select "Inject haxx" + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-usm) +1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + 主機將會自動關機 #### 第三節 — unSAFE_MODE @@ -77,7 +60,7 @@ In this section, you will enter Safe Mode (a feature available on all 3DS family 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) - + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of BannerBomb3](installing-boot9strap-(fredtool)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. 按下『OK』以允許更新 + 此步驟將不會進行任何更新, 這只是觸發漏洞的一部分。 1. 按下「I accept(我同意/同意します)」鍵以接受聲明條款 @@ -107,8 +90,7 @@ In this section, you will trigger the BannerBomb3 exploit a second time so that 1. 於您主機上啟動系統設定 (System Settings) 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) - + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) -1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" +1. Use the D-Pad to navigate and press the (A) button to select "Uninstall unSAFE_MODE" + Your device will automatically reboot 1. 關閉您的主機 1. 將 SD 卡插入至電腦中 diff --git a/_pages/zh_TW/seedminer.txt b/_pages/zh_TW/seedminer.txt index 2ccb513089..96c2be7c1b 100644 --- a/_pages/zh_TW/seedminer.txt +++ b/_pages/zh_TW/seedminer.txt @@ -56,6 +56,7 @@ In this section, you will use the Bruteforce Movable website to retrieve your de + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process is completed, download your `movable.sed` file from the site + 您在待會還會用到該檔案,請先將其保留 +1. 關閉您的主機 ___ @@ -63,11 +64,11 @@ ___ Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with other exploits to install custom firmware on your 3DS. -#### unSAFE_MODE (Recommended) +#### BannerBomb3 -這種將使用 Seedminer 進行進一步破解的方法使用了你的 『movable.sed』 來利用所有機型都有的 SAFE_MODE 韌體來進行破解系統。 +This method of using Seedminer for further exploitation uses your `movable.sed` file to take advantage of exploits in the System Settings application. -繼續至[安裝 boot9strap (透過 USM)](installing-boot9strap-(usm)) +Continue to [BannerBomb3](bannerbomb3) {: .notice--primary} ___ @@ -77,4 +78,4 @@ ___ If you have a Taiwanese device (indicated with a T at the end of the system version, such as 11.15.0-39**T**), you must follow this route. **Other regions may not follow this route.** Continue to [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) -{: .notice--warning} \ No newline at end of file +{: .notice--warning} diff --git a/_pages/zh_TW/troubleshooting.txt b/_pages/zh_TW/troubleshooting.txt index 686c60d977..f4cbaf31e2 100644 --- a/_pages/zh_TW/troubleshooting.txt +++ b/_pages/zh_TW/troubleshooting.txt @@ -126,11 +126,11 @@ Back up your data and reformat your SD card as FAT32 with the recommended tool d ## 安裝 boot9strap (透過 USM) -### DSiWare 資料管理選單沒有顯示 USM 選單就當機了 +### DSiWare Management menu crashes without showing BB3 multihax menu (USM) -確保 `F00D43D5.bin` 是 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 裡面的唯一檔案。 如果確定沒問題的話,嘗試重新使用 [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) 重新建立此檔案。 +確保 `F00D43D5.bin` 是 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 裡面的唯一檔案。 If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). -Also, ensure that `usm.bin` is on the root of the SD card. If it is missing, then download the latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) (the RELEASE `.zip` file), and copy the `usm.bin` file to the root of your SD card. +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, you will need to follow [an alternate branch of Seedminer](homebrew-launcher-(pichaxx)). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. @@ -144,16 +144,24 @@ If neither of these solutions fixes this problem, then custom firmware may have ### DSiWare 資料管理選單裡面出現了一個問號圖案的程式 -您所使用的 `F00D43D5.bin` 檔案可能有問題(損壞或用於錯誤的 3DS 主機)。 使用 [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) 重新建立 `F00D43D5.bin` 檔案,且確保您所使用的 `movable.sed` 檔案是你這台主機的。 +您所使用的 `F00D43D5.bin` 檔案可能有問題(損壞或用於錯誤的 3DS 主機)。 Re-create your `F00D43D5.bin` file with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen), ensuring that you use the `movable.sed` file for your console. ### DSiWare 資料管理選單沒有閃爍紫屏就當機了 -確保 `F00D43D5.bin` 是 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 裡面的唯一檔案。 如果確定沒問題的話,嘗試重新使用 [BannerBomb3 tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) 重新建立此檔案。 如果還是不行,則可能是因為自製韌體可能在此主機上被不正確地移除過,導致此方法失效。 若是這樣,請加入 [Discord 上的 Nintendo Homebrew](https://discord.gg/MWxPgEp) 頻道尋求幫助。 +確保 `F00D43D5.bin` 是 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 裡面的唯一檔案。 If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). 如果還是不行,則可能是因為自製韌體可能在此主機上被不正確地移除過,導致此方法失效。 若是這樣,請加入 [Discord 上的 Nintendo Homebrew](https://discord.gg/MWxPgEp) 頻道尋求幫助。 --- ## 安裝 boot9strap (透過 Fredtool) +### DSiWare Management menu crashes without showing BB3 multihax menu (Fredtool) + +確保 `F00D43D5.bin` 是 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 裡面的唯一檔案。 If it is, then re-create it with the [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen). + +Also, ensure that `bb3.bin` is on the root of the SD card. If it is missing, then download the latest release of [Bannerbomb3](https://github.com/lifehackerhansol/Bannerbomb3/releases/download/v3.0-lhs1/bb3.bin) (direct download), and copy the `bb3.bin` file to the root of your SD card. + +If neither of these solutions fixes this problem, then custom firmware may have been uninstalled on this device in a way that makes this method impossible to perform. If this is the case, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. + ### Fredtool 注入頁面顯示錯誤 請確保您的 `movable.sed` 檔案和 DSiWare 備份是從同一台主機匯出的。 若兩者並不匹配則會跳出錯誤。