super-skaterhax and nimhax

super-skaterhax -> HBL-USM
or
super-skaterhax -> nimhax -> BB3 (but at this point why)
This commit is contained in:
lifehackerhansol 2023-03-19 22:29:45 -07:00
parent 40824f908d
commit 76b77c5904
2 changed files with 115 additions and 0 deletions

View file

@ -0,0 +1,44 @@
---
title: "Dumping Movable (nimhax)"
---
{% include toc title="Table of Contents" %}
{% capture technical_info %}
<summary><em>Technical Details (optional)</em></summary>
To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called nimhax (along with another exploit to run nimhax) to dump the data encryption key (movable.sed) from your device.
For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit.
{% endcapture %}
<details>{{ technical_info | markdownify }}</details>
{: .notice--info}
### What You Need
* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file)
### Instructions
#### Section I - Prep Work
1. Power off your device
1. Insert your SD card into your computer
1. Create a folder named `3ds` on the root of your SD card, if it does not already exist
1. Copy the `nimhax` folder from your nimhax `.zip` to the `/3ds/` folder on your SD card
1. Reinsert your SD card into your device
1. Power on your device
#### Section II - nimhax
1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser)
1. Launch nimhax from the list of homebrew
1. If the exploit was successful, a `movable.sed` file will be available on the root of your SD card.
### Next step: BannerBomb3
Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with BannerBomb3, which uses your `movable.sed` file to take advantage of exploits in the System Settings application.
Continue to [BannerBomb3](bannerbomb3)
{: .notice--primary}

View file

@ -0,0 +1,71 @@
---
title: "Installing boot9strap (SSLoth-Browser)"
---
{% include toc title="Table of Contents" %}
{% capture technical_info %}
<summary><em>Technical Details (optional)</em></summary>
For technical details on the exploits that you will be using on this page, see [here](https://github.com/zoogie/super-skaterhax).
{% endcapture %}
<details>{{ technical_info | markdownify }}</details>
{: .notice--info}
### Compatibility Notes
Super-skaterhax (when combined with unSAFE_MODE) is compatible with versions 11.15.0 through 11.16.0 in all regions.
The instructions provided only apply to the New 3DS, New 3DS XL, and New 2DS XL. Please ensure that the device you are modding is a New 3DS, New 3DS XL, or New 2DS XL before continuing.
{: .notice--warning}
### What You Need
* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file)
* The latest release of [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (the release `.zip` file)
* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) (the RELEASE `.zip` file)
#### Section I - Prep Work
In this section, you will copy the files needed to trigger both browserhax and the Homebrew Launcher.
1. Power off your device
1. Insert your SD card into your computer
1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
+ The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
1. Copy all files inside the folder for your device's region in the super-skaterhax `.zip` to the root of your SD card
1. Create a folder named `3ds` on the root of your SD card
1. Copy the `slotTool` folder from the unSAFE_MODE `.zip` to the `3ds` folder on your SD card
1. Reinsert your SD card into your device
1. Power on your device
#### Section II - super-skaterhax
In this section, you will visit the browser exploit webpage, which will launch the Homebrew Launcher.
If you haven't already, make sure you have a working Internet connection set up on your device.
{: .notice--info}
1. On the HOME Menu, press the Left and Right shoulder buttons together to open the camera
+ If you are unable to open the camera, open the Internet Browser and manually type the URL instead (`https://zoogie.github.io/web/nbhax/`)
1. Tap the QR code button and scan one of the following QR codes for your device's region [here](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png)
+ If you get an error, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-ssloth-browser)
+ If you get a security certificate warning, press (A) to allow the connection
1. Press the (Select) button to open the bookmark tab
+ If your (Select) button does not respond, tap the star icon on the bottom-left corner of the screen
1. Tap "Bookmark this page"
1. Press (B) once to return to the browser
1. Press (Start) to open the context menu
+ If your (Start) button does not respond, tap the 3-line menu on the bottom-right corner of the screen
1. Tap on "Settings"
1. Tap on "Delete Cookies"
1. Press (A) to continue
1. Press (Home) to return to the HOME Menu, then immediately press (A) to launch the browser again
1. Select the "GO GO!" button on the top screen
+ If any prompts appear, approve all of them
1. If the exploit was successful, your device will have booted into the Homebrew Launcher
___
### Continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm))
{: .notice--primary}