diff --git a/_pages/en_US/dumping-movable-(nimhax).txt b/_pages/en_US/dumping-movable-(nimhax).txt new file mode 100644 index 0000000000..619100b7de --- /dev/null +++ b/_pages/en_US/dumping-movable-(nimhax).txt @@ -0,0 +1,44 @@ +--- +title: "Dumping Movable (nimhax)" +--- + +{% include toc title="Table of Contents" %} + +{% capture technical_info %} +Technical Details (optional) + +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called nimhax (along with another exploit to run nimhax) to dump the data encryption key (movable.sed) from your device. + +For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +### What You Need + +* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file) + +### Instructions + +#### Section I - Prep Work + +1. Power off your device +1. Insert your SD card into your computer +1. Create a folder named `3ds` on the root of your SD card, if it does not already exist +1. Copy the `nimhax` folder from your nimhax `.zip` to the `/3ds/` folder on your SD card +1. Reinsert your SD card into your device +1. Power on your device + +#### Section II - nimhax + +1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) +1. Launch nimhax from the list of homebrew +1. If the exploit was successful, a `movable.sed` file will be available on the root of your SD card. + +### Next step: BannerBomb3 + +Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with BannerBomb3, which uses your `movable.sed` file to take advantage of exploits in the System Settings application. + +Continue to [BannerBomb3](bannerbomb3) +{: .notice--primary} diff --git a/_pages/en_US/homebrew-launcher-(super-skaterhax).txt b/_pages/en_US/homebrew-launcher-(super-skaterhax).txt new file mode 100644 index 0000000000..1ba4c61ae2 --- /dev/null +++ b/_pages/en_US/homebrew-launcher-(super-skaterhax).txt @@ -0,0 +1,71 @@ +--- +title: "Installing boot9strap (SSLoth-Browser)" +--- + +{% include toc title="Table of Contents" %} + +{% capture technical_info %} +Technical Details (optional) +For technical details on the exploits that you will be using on this page, see [here](https://github.com/zoogie/super-skaterhax). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +### Compatibility Notes + +Super-skaterhax (when combined with unSAFE_MODE) is compatible with versions 11.15.0 through 11.16.0 in all regions. + +The instructions provided only apply to the New 3DS, New 3DS XL, and New 2DS XL. Please ensure that the device you are modding is a New 3DS, New 3DS XL, or New 2DS XL before continuing. +{: .notice--warning} + +### What You Need + +* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) +* The latest release of [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (the release `.zip` file) +* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) (the RELEASE `.zip` file) + +#### Section I - Prep Work + +In this section, you will copy the files needed to trigger both browserhax and the Homebrew Launcher. + +1. Power off your device +1. Insert your SD card into your computer +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy all files inside the folder for your device's region in the super-skaterhax `.zip` to the root of your SD card +1. Create a folder named `3ds` on the root of your SD card +1. Copy the `slotTool` folder from the unSAFE_MODE `.zip` to the `3ds` folder on your SD card +1. Reinsert your SD card into your device +1. Power on your device + +#### Section II - super-skaterhax + +In this section, you will visit the browser exploit webpage, which will launch the Homebrew Launcher. + +If you haven't already, make sure you have a working Internet connection set up on your device. +{: .notice--info} + +1. On the HOME Menu, press the Left and Right shoulder buttons together to open the camera + + If you are unable to open the camera, open the Internet Browser and manually type the URL instead (`https://zoogie.github.io/web/nbhax/`) +1. Tap the QR code button and scan one of the following QR codes for your device's region [here](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png) + + If you get an error, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-ssloth-browser) + + If you get a security certificate warning, press (A) to allow the connection +1. Press the (Select) button to open the bookmark tab + + If your (Select) button does not respond, tap the star icon on the bottom-left corner of the screen +1. Tap "Bookmark this page" +1. Press (B) once to return to the browser +1. Press (Start) to open the context menu + + If your (Start) button does not respond, tap the 3-line menu on the bottom-right corner of the screen +1. Tap on "Settings" +1. Tap on "Delete Cookies" +1. Press (A) to continue +1. Press (Home) to return to the HOME Menu, then immediately press (A) to launch the browser again +1. Select the "GO GO!" button on the top screen + + If any prompts appear, approve all of them +1. If the exploit was successful, your device will have booted into the Homebrew Launcher + +___ + +### Continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) +{: .notice--primary}