diff --git a/_pages/ar_SA/bannerbomb3.txt b/_pages/ar_SA/bannerbomb3.txt index d2c19abf2f..c39606973e 100644 --- a/_pages/ar_SA/bannerbomb3.txt +++ b/_pages/ar_SA/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

-

For a more technical explanation, see here.

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ar_SA/homebrew-launcher-(pichaxx).txt b/_pages/ar_SA/homebrew-launcher-(pichaxx).txt index 8395805ef0..e75f6b91ea 100644 --- a/_pages/ar_SA/homebrew-launcher-(pichaxx).txt +++ b/_pages/ar_SA/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ar_SA/installing-boot9strap-(fredtool).txt b/_pages/ar_SA/installing-boot9strap-(fredtool).txt index 9b389ee19f..fab9a050c7 100644 --- a/_pages/ar_SA/installing-boot9strap-(fredtool).txt +++ b/_pages/ar_SA/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### What You Need diff --git a/_pages/ar_SA/installing-boot9strap-(hardmod).txt b/_pages/ar_SA/installing-boot9strap-(hardmod).txt index 4f0888d535..3455b87ff5 100644 --- a/_pages/ar_SA/installing-boot9strap-(hardmod).txt +++ b/_pages/ar_SA/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "Installing boot9strap (Hardmod)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

An excellent guide to getting a hardmod can be found here.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-

Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console.

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ar_SA/installing-boot9strap-(hbl-usm).txt b/_pages/ar_SA/installing-boot9strap-(hbl-usm).txt index 65bcd5f692..a24b979948 100644 --- a/_pages/ar_SA/installing-boot9strap-(hbl-usm).txt +++ b/_pages/ar_SA/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

As we already have Homebrew access, we can use slotTool to do this.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ar_SA/installing-boot9strap-(kartdlphax).txt b/_pages/ar_SA/installing-boot9strap-(kartdlphax).txt index a795051412..ef9b29e969 100644 --- a/_pages/ar_SA/installing-boot9strap-(kartdlphax).txt +++ b/_pages/ar_SA/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (kartdlphax)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin.

-

This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: kartdlphax, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ar_SA/installing-boot9strap-(soundhax).txt b/_pages/ar_SA/installing-boot9strap-(soundhax).txt index b94e84c610..d7ce9937c7 100644 --- a/_pages/ar_SA/installing-boot9strap-(soundhax).txt +++ b/_pages/ar_SA/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

-
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ar_SA/installing-boot9strap-(ssloth-browser).txt b/_pages/ar_SA/installing-boot9strap-(ssloth-browser).txt index 016c43be0c..07bbb76a27 100644 --- a/_pages/ar_SA/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/ar_SA/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (SSLoth-Browser)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version.

-

A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check.

-

Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job.

-

For technical details on the exploits that you will be using on this page, see here (SSLoth) and here (universal-otherapp).

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ar_SA/installing-boot9strap-(usm).txt b/_pages/ar_SA/installing-boot9strap-(usm).txt index 58be815045..354ab00213 100644 --- a/_pages/ar_SA/installing-boot9strap-(usm).txt +++ b/_pages/ar_SA/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (USM)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

We can do this using an existing exploit, BannerBomb3.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ar_SA/seedminer.txt b/_pages/ar_SA/seedminer.txt index b6d7e339df..21f019b371 100644 --- a/_pages/ar_SA/seedminer.txt +++ b/_pages/ar_SA/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

-

For information on how Seedminer works, see this presentation.

-

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Section I - Prep Work diff --git a/_pages/bg_BG/bannerbomb3.txt b/_pages/bg_BG/bannerbomb3.txt index d2c19abf2f..c39606973e 100644 --- a/_pages/bg_BG/bannerbomb3.txt +++ b/_pages/bg_BG/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

-

For a more technical explanation, see here.

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/bg_BG/homebrew-launcher-(pichaxx).txt b/_pages/bg_BG/homebrew-launcher-(pichaxx).txt index 8395805ef0..e75f6b91ea 100644 --- a/_pages/bg_BG/homebrew-launcher-(pichaxx).txt +++ b/_pages/bg_BG/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/bg_BG/installing-boot9strap-(fredtool).txt b/_pages/bg_BG/installing-boot9strap-(fredtool).txt index 9b389ee19f..fab9a050c7 100644 --- a/_pages/bg_BG/installing-boot9strap-(fredtool).txt +++ b/_pages/bg_BG/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### What You Need diff --git a/_pages/bg_BG/installing-boot9strap-(hardmod).txt b/_pages/bg_BG/installing-boot9strap-(hardmod).txt index 4f0888d535..3455b87ff5 100644 --- a/_pages/bg_BG/installing-boot9strap-(hardmod).txt +++ b/_pages/bg_BG/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "Installing boot9strap (Hardmod)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

An excellent guide to getting a hardmod can be found here.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-

Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console.

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/bg_BG/installing-boot9strap-(hbl-usm).txt b/_pages/bg_BG/installing-boot9strap-(hbl-usm).txt index 65bcd5f692..a24b979948 100644 --- a/_pages/bg_BG/installing-boot9strap-(hbl-usm).txt +++ b/_pages/bg_BG/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

As we already have Homebrew access, we can use slotTool to do this.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/bg_BG/installing-boot9strap-(kartdlphax).txt b/_pages/bg_BG/installing-boot9strap-(kartdlphax).txt index a795051412..ef9b29e969 100644 --- a/_pages/bg_BG/installing-boot9strap-(kartdlphax).txt +++ b/_pages/bg_BG/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (kartdlphax)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin.

-

This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: kartdlphax, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/bg_BG/installing-boot9strap-(soundhax).txt b/_pages/bg_BG/installing-boot9strap-(soundhax).txt index b94e84c610..d7ce9937c7 100644 --- a/_pages/bg_BG/installing-boot9strap-(soundhax).txt +++ b/_pages/bg_BG/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

-
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/bg_BG/installing-boot9strap-(ssloth-browser).txt b/_pages/bg_BG/installing-boot9strap-(ssloth-browser).txt index 016c43be0c..07bbb76a27 100644 --- a/_pages/bg_BG/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/bg_BG/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (SSLoth-Browser)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version.

-

A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check.

-

Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job.

-

For technical details on the exploits that you will be using on this page, see here (SSLoth) and here (universal-otherapp).

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/bg_BG/installing-boot9strap-(usm).txt b/_pages/bg_BG/installing-boot9strap-(usm).txt index 58be815045..354ab00213 100644 --- a/_pages/bg_BG/installing-boot9strap-(usm).txt +++ b/_pages/bg_BG/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (USM)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

We can do this using an existing exploit, BannerBomb3.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/bg_BG/seedminer.txt b/_pages/bg_BG/seedminer.txt index b6d7e339df..21f019b371 100644 --- a/_pages/bg_BG/seedminer.txt +++ b/_pages/bg_BG/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

-

For information on how Seedminer works, see this presentation.

-

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Section I - Prep Work diff --git a/_pages/ca_ES/bannerbomb3.txt b/_pages/ca_ES/bannerbomb3.txt index d2c19abf2f..c39606973e 100644 --- a/_pages/ca_ES/bannerbomb3.txt +++ b/_pages/ca_ES/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

-

For a more technical explanation, see here.

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ca_ES/homebrew-launcher-(pichaxx).txt b/_pages/ca_ES/homebrew-launcher-(pichaxx).txt index 8395805ef0..e75f6b91ea 100644 --- a/_pages/ca_ES/homebrew-launcher-(pichaxx).txt +++ b/_pages/ca_ES/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ca_ES/installing-boot9strap-(fredtool).txt b/_pages/ca_ES/installing-boot9strap-(fredtool).txt index 9b389ee19f..fab9a050c7 100644 --- a/_pages/ca_ES/installing-boot9strap-(fredtool).txt +++ b/_pages/ca_ES/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### What You Need diff --git a/_pages/ca_ES/installing-boot9strap-(hardmod).txt b/_pages/ca_ES/installing-boot9strap-(hardmod).txt index 4f0888d535..3455b87ff5 100644 --- a/_pages/ca_ES/installing-boot9strap-(hardmod).txt +++ b/_pages/ca_ES/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "Installing boot9strap (Hardmod)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

An excellent guide to getting a hardmod can be found here.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-

Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console.

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ca_ES/installing-boot9strap-(hbl-usm).txt b/_pages/ca_ES/installing-boot9strap-(hbl-usm).txt index 65bcd5f692..a24b979948 100644 --- a/_pages/ca_ES/installing-boot9strap-(hbl-usm).txt +++ b/_pages/ca_ES/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

As we already have Homebrew access, we can use slotTool to do this.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ca_ES/installing-boot9strap-(kartdlphax).txt b/_pages/ca_ES/installing-boot9strap-(kartdlphax).txt index a795051412..ef9b29e969 100644 --- a/_pages/ca_ES/installing-boot9strap-(kartdlphax).txt +++ b/_pages/ca_ES/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (kartdlphax)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin.

-

This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: kartdlphax, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ca_ES/installing-boot9strap-(soundhax).txt b/_pages/ca_ES/installing-boot9strap-(soundhax).txt index b94e84c610..d7ce9937c7 100644 --- a/_pages/ca_ES/installing-boot9strap-(soundhax).txt +++ b/_pages/ca_ES/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

-
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ca_ES/installing-boot9strap-(ssloth-browser).txt b/_pages/ca_ES/installing-boot9strap-(ssloth-browser).txt index 016c43be0c..07bbb76a27 100644 --- a/_pages/ca_ES/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/ca_ES/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (SSLoth-Browser)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version.

-

A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check.

-

Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job.

-

For technical details on the exploits that you will be using on this page, see here (SSLoth) and here (universal-otherapp).

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ca_ES/installing-boot9strap-(usm).txt b/_pages/ca_ES/installing-boot9strap-(usm).txt index 58be815045..354ab00213 100644 --- a/_pages/ca_ES/installing-boot9strap-(usm).txt +++ b/_pages/ca_ES/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (USM)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

We can do this using an existing exploit, BannerBomb3.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ca_ES/seedminer.txt b/_pages/ca_ES/seedminer.txt index b6d7e339df..21f019b371 100644 --- a/_pages/ca_ES/seedminer.txt +++ b/_pages/ca_ES/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

-

For information on how Seedminer works, see this presentation.

-

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Section I - Prep Work diff --git a/_pages/cs_CZ/bannerbomb3.txt b/_pages/cs_CZ/bannerbomb3.txt index d2c19abf2f..c39606973e 100644 --- a/_pages/cs_CZ/bannerbomb3.txt +++ b/_pages/cs_CZ/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

-

For a more technical explanation, see here.

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/cs_CZ/homebrew-launcher-(pichaxx).txt b/_pages/cs_CZ/homebrew-launcher-(pichaxx).txt index 8395805ef0..e75f6b91ea 100644 --- a/_pages/cs_CZ/homebrew-launcher-(pichaxx).txt +++ b/_pages/cs_CZ/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/cs_CZ/installing-boot9strap-(fredtool).txt b/_pages/cs_CZ/installing-boot9strap-(fredtool).txt index 9b389ee19f..fab9a050c7 100644 --- a/_pages/cs_CZ/installing-boot9strap-(fredtool).txt +++ b/_pages/cs_CZ/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### What You Need diff --git a/_pages/cs_CZ/installing-boot9strap-(hardmod).txt b/_pages/cs_CZ/installing-boot9strap-(hardmod).txt index 4f0888d535..3455b87ff5 100644 --- a/_pages/cs_CZ/installing-boot9strap-(hardmod).txt +++ b/_pages/cs_CZ/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "Installing boot9strap (Hardmod)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

An excellent guide to getting a hardmod can be found here.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-

Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console.

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/cs_CZ/installing-boot9strap-(hbl-usm).txt b/_pages/cs_CZ/installing-boot9strap-(hbl-usm).txt index 65bcd5f692..a24b979948 100644 --- a/_pages/cs_CZ/installing-boot9strap-(hbl-usm).txt +++ b/_pages/cs_CZ/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

As we already have Homebrew access, we can use slotTool to do this.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/cs_CZ/installing-boot9strap-(kartdlphax).txt b/_pages/cs_CZ/installing-boot9strap-(kartdlphax).txt index a795051412..ef9b29e969 100644 --- a/_pages/cs_CZ/installing-boot9strap-(kartdlphax).txt +++ b/_pages/cs_CZ/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (kartdlphax)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin.

-

This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: kartdlphax, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/cs_CZ/installing-boot9strap-(soundhax).txt b/_pages/cs_CZ/installing-boot9strap-(soundhax).txt index b94e84c610..d7ce9937c7 100644 --- a/_pages/cs_CZ/installing-boot9strap-(soundhax).txt +++ b/_pages/cs_CZ/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

-
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/cs_CZ/installing-boot9strap-(ssloth-browser).txt b/_pages/cs_CZ/installing-boot9strap-(ssloth-browser).txt index 016c43be0c..07bbb76a27 100644 --- a/_pages/cs_CZ/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/cs_CZ/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (SSLoth-Browser)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version.

-

A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check.

-

Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job.

-

For technical details on the exploits that you will be using on this page, see here (SSLoth) and here (universal-otherapp).

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/cs_CZ/installing-boot9strap-(usm).txt b/_pages/cs_CZ/installing-boot9strap-(usm).txt index 58be815045..354ab00213 100644 --- a/_pages/cs_CZ/installing-boot9strap-(usm).txt +++ b/_pages/cs_CZ/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (USM)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

We can do this using an existing exploit, BannerBomb3.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/cs_CZ/seedminer.txt b/_pages/cs_CZ/seedminer.txt index b6d7e339df..21f019b371 100644 --- a/_pages/cs_CZ/seedminer.txt +++ b/_pages/cs_CZ/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

-

For information on how Seedminer works, see this presentation.

-

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Section I - Prep Work diff --git a/_pages/de_DE/bannerbomb3.txt b/_pages/de_DE/bannerbomb3.txt index 481dea8b26..5d68b73abd 100644 --- a/_pages/de_DE/bannerbomb3.txt +++ b/_pages/de_DE/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title="Inhalt" %} -
+{% capture technical_info %} Technische Details (optional) -

Damit wir unseren Code auf der Konsole ausführen können, nutzen wir eine Schwachstelle im DSiWare-Datenverwaltungs-Fenster der Systemeinstellungen aus.

-

Um dies zu erreichen, nutzen wir die Verschlüsselung deiner Konsole (movable.sed), um ein DSiWare-Backup zu erstellen, welches die Schwachstelle ausnutzt.

-

Für eine ausführlichere Erklärung, siehe hier.

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### Kompatibilitätshinweise diff --git a/_pages/de_DE/homebrew-launcher-(pichaxx).txt b/_pages/de_DE/homebrew-launcher-(pichaxx).txt index d1adbab9c5..87f2883c18 100644 --- a/_pages/de_DE/homebrew-launcher-(pichaxx).txt +++ b/_pages/de_DE/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Inhalt" %} -
+{% capture technical_info %} Technische Details (optional) -This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Kompatibilitätshinweise diff --git a/_pages/de_DE/installing-boot9strap-(fredtool).txt b/_pages/de_DE/installing-boot9strap-(fredtool).txt index cbe1c361a6..8f9c3f14a0 100644 --- a/_pages/de_DE/installing-boot9strap-(fredtool).txt +++ b/_pages/de_DE/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Inhalt" %} -
+{% capture technical_info %} Technische Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Was du brauchst diff --git a/_pages/de_DE/installing-boot9strap-(hardmod).txt b/_pages/de_DE/installing-boot9strap-(hardmod).txt index ac1e9453fd..8ae7c0f41d 100644 --- a/_pages/de_DE/installing-boot9strap-(hardmod).txt +++ b/_pages/de_DE/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "Installieren von boot9strap (Hardmod)" {% include toc title="Inhalt" %} -
+{% capture technical_info %} Technische Details (optional) -

An excellent guide to getting a hardmod can be found here.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-

Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console.

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Kompatibilitätshinweise diff --git a/_pages/de_DE/installing-boot9strap-(hbl-usm).txt b/_pages/de_DE/installing-boot9strap-(hbl-usm).txt index 3fded6d22b..77c1b18532 100644 --- a/_pages/de_DE/installing-boot9strap-(hbl-usm).txt +++ b/_pages/de_DE/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Inhalt" %} -
+{% capture technical_info %} Technische Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

As we already have Homebrew access, we can use slotTool to do this.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Kompatibilitätshinweise diff --git a/_pages/de_DE/installing-boot9strap-(kartdlphax).txt b/_pages/de_DE/installing-boot9strap-(kartdlphax).txt index 646e25b731..da7855c304 100644 --- a/_pages/de_DE/installing-boot9strap-(kartdlphax).txt +++ b/_pages/de_DE/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (kartdlphax)" {% include toc title="Inhalt" %} -
+{% capture technical_info %} Technische Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin.

-

This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: kartdlphax, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Kompatibilitätshinweise diff --git a/_pages/de_DE/installing-boot9strap-(soundhax).txt b/_pages/de_DE/installing-boot9strap-(soundhax).txt index d16d78e278..7c3cb8bf6d 100644 --- a/_pages/de_DE/installing-boot9strap-(soundhax).txt +++ b/_pages/de_DE/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "Installation von boot9strap (Soundhax)" {% include toc title="Inhalt" %} -
+{% capture technical_info %} Technische Details (optional) -

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

-
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Kompatibilitätshinweise diff --git a/_pages/de_DE/installing-boot9strap-(ssloth-browser).txt b/_pages/de_DE/installing-boot9strap-(ssloth-browser).txt index 3082b50a75..1665bb277c 100644 --- a/_pages/de_DE/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/de_DE/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (SSLoth-Browser)" {% include toc title="Inhalt" %} -
+{% capture technical_info %} Technische Details (optional) -

In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version.

-

A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check.

-

Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job.

-

For technical details on the exploits that you will be using on this page, see here (SSLoth) and here (universal-otherapp).

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Kompatibilitätshinweise diff --git a/_pages/de_DE/installing-boot9strap-(usm).txt b/_pages/de_DE/installing-boot9strap-(usm).txt index a8635b49e6..c18185dadd 100644 --- a/_pages/de_DE/installing-boot9strap-(usm).txt +++ b/_pages/de_DE/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (USM)" {% include toc title="Inhalt" %} -
+{% capture technical_info %} Technische Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

We can do this using an existing exploit, BannerBomb3.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Kompatibilitätshinweise diff --git a/_pages/de_DE/seedminer.txt b/_pages/de_DE/seedminer.txt index 8c19d6426b..f7390e0589 100644 --- a/_pages/de_DE/seedminer.txt +++ b/_pages/de_DE/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title="Inhalt" %} -
+{% capture technical_info %} Technische Details (optional) -

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

-

For information on how Seedminer works, see this presentation.

-

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Section I - Prep Work diff --git a/_pages/el_GR/bannerbomb3.txt b/_pages/el_GR/bannerbomb3.txt index 1e0c3e3976..d1032a6b18 100644 --- a/_pages/el_GR/bannerbomb3.txt +++ b/_pages/el_GR/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title="Πίνακας περιεχομένων" %} -
+{% capture technical_info %} Technical Details (optional) -

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

-

For a more technical explanation, see here.

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/el_GR/homebrew-launcher-(pichaxx).txt b/_pages/el_GR/homebrew-launcher-(pichaxx).txt index c7da62a08e..2343dd5c3a 100644 --- a/_pages/el_GR/homebrew-launcher-(pichaxx).txt +++ b/_pages/el_GR/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Πίνακας περιεχομένων" %} -
+{% capture technical_info %} Technical Details (optional) -This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/el_GR/installing-boot9strap-(fredtool).txt b/_pages/el_GR/installing-boot9strap-(fredtool).txt index 13a48e60aa..a7cab5ef28 100644 --- a/_pages/el_GR/installing-boot9strap-(fredtool).txt +++ b/_pages/el_GR/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Πίνακας περιεχομένων" %} -
+{% capture technical_info %} Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### What You Need diff --git a/_pages/el_GR/installing-boot9strap-(hardmod).txt b/_pages/el_GR/installing-boot9strap-(hardmod).txt index 7ee6a61c26..4893b4ad7f 100644 --- a/_pages/el_GR/installing-boot9strap-(hardmod).txt +++ b/_pages/el_GR/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "Installing boot9strap (Hardmod)" {% include toc title="Πίνακας περιεχομένων" %} -
+{% capture technical_info %} Technical Details (optional) -

An excellent guide to getting a hardmod can be found here.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-

Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console.

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/el_GR/installing-boot9strap-(hbl-usm).txt b/_pages/el_GR/installing-boot9strap-(hbl-usm).txt index 914d69d35a..70db6feec7 100644 --- a/_pages/el_GR/installing-boot9strap-(hbl-usm).txt +++ b/_pages/el_GR/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Πίνακας περιεχομένων" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

As we already have Homebrew access, we can use slotTool to do this.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/el_GR/installing-boot9strap-(kartdlphax).txt b/_pages/el_GR/installing-boot9strap-(kartdlphax).txt index 596cd4f1ed..298763e982 100644 --- a/_pages/el_GR/installing-boot9strap-(kartdlphax).txt +++ b/_pages/el_GR/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (kartdlphax)" {% include toc title="Πίνακας περιεχομένων" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin.

-

This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: kartdlphax, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/el_GR/installing-boot9strap-(soundhax).txt b/_pages/el_GR/installing-boot9strap-(soundhax).txt index 28e63806ac..97616f0955 100644 --- a/_pages/el_GR/installing-boot9strap-(soundhax).txt +++ b/_pages/el_GR/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Πίνακας περιεχομένων" %} -
+{% capture technical_info %} Technical Details (optional) -

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

-
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/el_GR/installing-boot9strap-(ssloth-browser).txt b/_pages/el_GR/installing-boot9strap-(ssloth-browser).txt index 6b717b25b8..1eeb28a8b4 100644 --- a/_pages/el_GR/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/el_GR/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (SSLoth-Browser)" {% include toc title="Πίνακας περιεχομένων" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version.

-

A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check.

-

Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job.

-

For technical details on the exploits that you will be using on this page, see here (SSLoth) and here (universal-otherapp).

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/el_GR/installing-boot9strap-(usm).txt b/_pages/el_GR/installing-boot9strap-(usm).txt index b4a0326dcd..98a9c5dce2 100644 --- a/_pages/el_GR/installing-boot9strap-(usm).txt +++ b/_pages/el_GR/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (USM)" {% include toc title="Πίνακας περιεχομένων" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

We can do this using an existing exploit, BannerBomb3.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/el_GR/seedminer.txt b/_pages/el_GR/seedminer.txt index 3ca2714bb4..1ad5ab7c8c 100644 --- a/_pages/el_GR/seedminer.txt +++ b/_pages/el_GR/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title="Πίνακας περιεχομένων" %} -
+{% capture technical_info %} Technical Details (optional) -

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

-

For information on how Seedminer works, see this presentation.

-

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Section I - Prep Work diff --git a/_pages/en_PT/bannerbomb3.txt b/_pages/en_PT/bannerbomb3.txt index c86ddcd383..b03b1f3995 100644 --- a/_pages/en_PT/bannerbomb3.txt +++ b/_pages/en_PT/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

-

For a more technical explanation, see here.

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/en_PT/homebrew-launcher-(pichaxx).txt b/_pages/en_PT/homebrew-launcher-(pichaxx).txt index a0a4788feb..bea9e4f115 100644 --- a/_pages/en_PT/homebrew-launcher-(pichaxx).txt +++ b/_pages/en_PT/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/en_PT/installing-boot9strap-(fredtool).txt b/_pages/en_PT/installing-boot9strap-(fredtool).txt index 2578cf399c..bfac8a8f8c 100644 --- a/_pages/en_PT/installing-boot9strap-(fredtool).txt +++ b/_pages/en_PT/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### What You Need diff --git a/_pages/en_PT/installing-boot9strap-(hardmod).txt b/_pages/en_PT/installing-boot9strap-(hardmod).txt index 0ee0a7c238..ffafd0224a 100644 --- a/_pages/en_PT/installing-boot9strap-(hardmod).txt +++ b/_pages/en_PT/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "Installing boot9strap (Hardmod)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

An excellent guide to getting a hardmod can be found here.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-

Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console.

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/en_PT/installing-boot9strap-(hbl-usm).txt b/_pages/en_PT/installing-boot9strap-(hbl-usm).txt index 20464ab525..6a87b9a979 100644 --- a/_pages/en_PT/installing-boot9strap-(hbl-usm).txt +++ b/_pages/en_PT/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

As we already have Homebrew access, we can use slotTool to do this.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/en_PT/installing-boot9strap-(kartdlphax).txt b/_pages/en_PT/installing-boot9strap-(kartdlphax).txt index dbc609190c..4fa57ab093 100644 --- a/_pages/en_PT/installing-boot9strap-(kartdlphax).txt +++ b/_pages/en_PT/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (kartdlphax)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin.

-

This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: kartdlphax, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/en_PT/installing-boot9strap-(soundhax).txt b/_pages/en_PT/installing-boot9strap-(soundhax).txt index 73b202b251..e71be33e23 100644 --- a/_pages/en_PT/installing-boot9strap-(soundhax).txt +++ b/_pages/en_PT/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

-
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/en_PT/installing-boot9strap-(ssloth-browser).txt b/_pages/en_PT/installing-boot9strap-(ssloth-browser).txt index 0b272de529..dcd2a28707 100644 --- a/_pages/en_PT/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/en_PT/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (SSLoth-Browser)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version.

-

A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check.

-

Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job.

-

For technical details on the exploits that you will be using on this page, see here (SSLoth) and here (universal-otherapp).

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/en_PT/installing-boot9strap-(usm).txt b/_pages/en_PT/installing-boot9strap-(usm).txt index 02a52b415c..c80f4af62c 100644 --- a/_pages/en_PT/installing-boot9strap-(usm).txt +++ b/_pages/en_PT/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (USM)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

We can do this using an existing exploit, BannerBomb3.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/en_PT/seedminer.txt b/_pages/en_PT/seedminer.txt index 64100e935e..235fb17aad 100644 --- a/_pages/en_PT/seedminer.txt +++ b/_pages/en_PT/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

-

For information on how Seedminer works, see this presentation.

-

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Section I - Prep Work diff --git a/_pages/es_ES/bannerbomb3.txt b/_pages/es_ES/bannerbomb3.txt index a02c4f6975..ba4229455a 100644 --- a/_pages/es_ES/bannerbomb3.txt +++ b/_pages/es_ES/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title="Tabla de contenidos" %} -
+{% capture technical_info %} Technical Details (optional) -

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

-

For a more technical explanation, see here.

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/es_ES/homebrew-launcher-(pichaxx).txt b/_pages/es_ES/homebrew-launcher-(pichaxx).txt index 6fb773a749..4d012f6494 100644 --- a/_pages/es_ES/homebrew-launcher-(pichaxx).txt +++ b/_pages/es_ES/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Tabla de contenidos" %} -
+{% capture technical_info %} Technical Details (optional) -This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/es_ES/installing-boot9strap-(fredtool).txt b/_pages/es_ES/installing-boot9strap-(fredtool).txt index 80604a7b14..8d723b3ff4 100644 --- a/_pages/es_ES/installing-boot9strap-(fredtool).txt +++ b/_pages/es_ES/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Tabla de contenidos" %} -
+{% capture technical_info %} Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Qué necesitas diff --git a/_pages/es_ES/installing-boot9strap-(hardmod).txt b/_pages/es_ES/installing-boot9strap-(hardmod).txt index 1be0726211..a39427a5c5 100644 --- a/_pages/es_ES/installing-boot9strap-(hardmod).txt +++ b/_pages/es_ES/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "Instalar boot9strap (hardmod)" {% include toc title="Tabla de contenidos" %} -
+{% capture technical_info %} Technical Details (optional) -

An excellent guide to getting a hardmod can be found here.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-

Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console.

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/es_ES/installing-boot9strap-(hbl-usm).txt b/_pages/es_ES/installing-boot9strap-(hbl-usm).txt index d6abc23943..3d9c3644bb 100644 --- a/_pages/es_ES/installing-boot9strap-(hbl-usm).txt +++ b/_pages/es_ES/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Tabla de contenidos" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

As we already have Homebrew access, we can use slotTool to do this.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/es_ES/installing-boot9strap-(kartdlphax).txt b/_pages/es_ES/installing-boot9strap-(kartdlphax).txt index dd0ca00b75..4c67280b1b 100644 --- a/_pages/es_ES/installing-boot9strap-(kartdlphax).txt +++ b/_pages/es_ES/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "Instalar boot9strap (kartdlphax)" {% include toc title="Tabla de contenidos" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin.

-

This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: kartdlphax, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/es_ES/installing-boot9strap-(soundhax).txt b/_pages/es_ES/installing-boot9strap-(soundhax).txt index 15aa487da5..04b055da45 100644 --- a/_pages/es_ES/installing-boot9strap-(soundhax).txt +++ b/_pages/es_ES/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "Instalar boot9strap (Soundhax)" {% include toc title="Tabla de contenidos" %} -
+{% capture technical_info %} Technical Details (optional) -

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

-
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/es_ES/installing-boot9strap-(ssloth-browser).txt b/_pages/es_ES/installing-boot9strap-(ssloth-browser).txt index 7c40c8a15b..6f3b6a6691 100644 --- a/_pages/es_ES/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/es_ES/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (SSLoth-Browser)" {% include toc title="Tabla de contenidos" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version.

-

A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check.

-

Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job.

-

For technical details on the exploits that you will be using on this page, see here (SSLoth) and here (universal-otherapp).

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/es_ES/installing-boot9strap-(usm).txt b/_pages/es_ES/installing-boot9strap-(usm).txt index df085bfbd4..37c1fd602e 100644 --- a/_pages/es_ES/installing-boot9strap-(usm).txt +++ b/_pages/es_ES/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "Instalar boot9strap (USM)" {% include toc title="Tabla de contenidos" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

We can do this using an existing exploit, BannerBomb3.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/es_ES/seedminer.txt b/_pages/es_ES/seedminer.txt index 56209be883..b419784092 100644 --- a/_pages/es_ES/seedminer.txt +++ b/_pages/es_ES/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title="Tabla de contenidos" %} -
+{% capture technical_info %} Technical Details (optional) -

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

-

For information on how Seedminer works, see this presentation.

-

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Section I - Prep Work diff --git a/_pages/fi_FI/bannerbomb3.txt b/_pages/fi_FI/bannerbomb3.txt index 3330470cf0..4a265a16f9 100644 --- a/_pages/fi_FI/bannerbomb3.txt +++ b/_pages/fi_FI/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title="Sisällysluettelo" %} -
+{% capture technical_info %} Technical Details (optional) -

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

-

For a more technical explanation, see here.

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/fi_FI/homebrew-launcher-(pichaxx).txt b/_pages/fi_FI/homebrew-launcher-(pichaxx).txt index 5ffaade4f7..6b0f60b54a 100644 --- a/_pages/fi_FI/homebrew-launcher-(pichaxx).txt +++ b/_pages/fi_FI/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Sisällysluettelo" %} -
+{% capture technical_info %} Technical Details (optional) -This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/fi_FI/installing-boot9strap-(fredtool).txt b/_pages/fi_FI/installing-boot9strap-(fredtool).txt index 6b044f077f..6af2c94681 100644 --- a/_pages/fi_FI/installing-boot9strap-(fredtool).txt +++ b/_pages/fi_FI/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Sisällysluettelo" %} -
+{% capture technical_info %} Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Tarpeet diff --git a/_pages/fi_FI/installing-boot9strap-(hardmod).txt b/_pages/fi_FI/installing-boot9strap-(hardmod).txt index 6d4c5c4bc2..3c0ada1482 100644 --- a/_pages/fi_FI/installing-boot9strap-(hardmod).txt +++ b/_pages/fi_FI/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "Boot9strapin asentaminen (laitteistomodaus)" {% include toc title="Sisällysluettelo" %} -
+{% capture technical_info %} Technical Details (optional) -

An excellent guide to getting a hardmod can be found here.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-

Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console.

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/fi_FI/installing-boot9strap-(hbl-usm).txt b/_pages/fi_FI/installing-boot9strap-(hbl-usm).txt index 7c6930db54..aa6b25d347 100644 --- a/_pages/fi_FI/installing-boot9strap-(hbl-usm).txt +++ b/_pages/fi_FI/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Sisällysluettelo" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

As we already have Homebrew access, we can use slotTool to do this.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/fi_FI/installing-boot9strap-(kartdlphax).txt b/_pages/fi_FI/installing-boot9strap-(kartdlphax).txt index 765b58818e..057e2675f2 100644 --- a/_pages/fi_FI/installing-boot9strap-(kartdlphax).txt +++ b/_pages/fi_FI/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (kartdlphax)" {% include toc title="Sisällysluettelo" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin.

-

This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: kartdlphax, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/fi_FI/installing-boot9strap-(soundhax).txt b/_pages/fi_FI/installing-boot9strap-(soundhax).txt index 1e3870903e..15fbac2c22 100644 --- a/_pages/fi_FI/installing-boot9strap-(soundhax).txt +++ b/_pages/fi_FI/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Sisällysluettelo" %} -
+{% capture technical_info %} Technical Details (optional) -

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

-
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/fi_FI/installing-boot9strap-(ssloth-browser).txt b/_pages/fi_FI/installing-boot9strap-(ssloth-browser).txt index e791659111..7484d5c1d1 100644 --- a/_pages/fi_FI/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/fi_FI/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (SSLoth-Browser)" {% include toc title="Sisällysluettelo" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version.

-

A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check.

-

Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job.

-

For technical details on the exploits that you will be using on this page, see here (SSLoth) and here (universal-otherapp).

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/fi_FI/installing-boot9strap-(usm).txt b/_pages/fi_FI/installing-boot9strap-(usm).txt index bb26c6b4ae..4b1715df06 100644 --- a/_pages/fi_FI/installing-boot9strap-(usm).txt +++ b/_pages/fi_FI/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (USM)" {% include toc title="Sisällysluettelo" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

We can do this using an existing exploit, BannerBomb3.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/fi_FI/seedminer.txt b/_pages/fi_FI/seedminer.txt index fba4707a94..ad5d5759c3 100644 --- a/_pages/fi_FI/seedminer.txt +++ b/_pages/fi_FI/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title="Sisällysluettelo" %} -
+{% capture technical_info %} Technical Details (optional) -

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

-

For information on how Seedminer works, see this presentation.

-

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Section I - Prep Work diff --git a/_pages/fr_FR/bannerbomb3.txt b/_pages/fr_FR/bannerbomb3.txt index f9086dbdc3..f9d6ddfcfa 100644 --- a/_pages/fr_FR/bannerbomb3.txt +++ b/_pages/fr_FR/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title="Table des matières" %} -
+{% capture technical_info %} Technical Details (optional) -

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

-

For a more technical explanation, see here.

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/fr_FR/homebrew-launcher-(pichaxx).txt b/_pages/fr_FR/homebrew-launcher-(pichaxx).txt index f51ad42812..6c95561d2b 100644 --- a/_pages/fr_FR/homebrew-launcher-(pichaxx).txt +++ b/_pages/fr_FR/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Table des matières" %} -
+{% capture technical_info %} Technical Details (optional) -This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/fr_FR/installing-boot9strap-(fredtool).txt b/_pages/fr_FR/installing-boot9strap-(fredtool).txt index ae0e186338..183dd4f80e 100644 --- a/_pages/fr_FR/installing-boot9strap-(fredtool).txt +++ b/_pages/fr_FR/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Table des matières" %} -
+{% capture technical_info %} Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ## Ce dont vous avez besoin diff --git a/_pages/fr_FR/installing-boot9strap-(hardmod).txt b/_pages/fr_FR/installing-boot9strap-(hardmod).txt index 62cb9eea51..ccb9f53789 100644 --- a/_pages/fr_FR/installing-boot9strap-(hardmod).txt +++ b/_pages/fr_FR/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "Installer boot9strap (Hardmod)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

An excellent guide to getting a hardmod can be found here.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-

Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console.

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/fr_FR/installing-boot9strap-(hbl-usm).txt b/_pages/fr_FR/installing-boot9strap-(hbl-usm).txt index 19f4350998..b02ddc920c 100644 --- a/_pages/fr_FR/installing-boot9strap-(hbl-usm).txt +++ b/_pages/fr_FR/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Table des matières" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

As we already have Homebrew access, we can use slotTool to do this.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/fr_FR/installing-boot9strap-(kartdlphax).txt b/_pages/fr_FR/installing-boot9strap-(kartdlphax).txt index cbfce3feb3..08aa10ccf5 100644 --- a/_pages/fr_FR/installing-boot9strap-(kartdlphax).txt +++ b/_pages/fr_FR/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "Installation de boot9strap (kartdlphax)" {% include toc title="Table des matières" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin.

-

This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: kartdlphax, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/fr_FR/installing-boot9strap-(soundhax).txt b/_pages/fr_FR/installing-boot9strap-(soundhax).txt index 84b5b16ebd..afd74976f2 100644 --- a/_pages/fr_FR/installing-boot9strap-(soundhax).txt +++ b/_pages/fr_FR/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "Installer boot9strap (Soundhax)" {% include toc title="Table des matières" %} -
+{% capture technical_info %} Technical Details (optional) -

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

-
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/fr_FR/installing-boot9strap-(ssloth-browser).txt b/_pages/fr_FR/installing-boot9strap-(ssloth-browser).txt index d150358302..5e551f3639 100644 --- a/_pages/fr_FR/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/fr_FR/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (SSLoth-Browser)" {% include toc title="Table des matières" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version.

-

A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check.

-

Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job.

-

For technical details on the exploits that you will be using on this page, see here (SSLoth) and here (universal-otherapp).

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/fr_FR/installing-boot9strap-(usm).txt b/_pages/fr_FR/installing-boot9strap-(usm).txt index c4e776ec22..37e75f233c 100644 --- a/_pages/fr_FR/installing-boot9strap-(usm).txt +++ b/_pages/fr_FR/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "Installation de boot9strap (USM)" {% include toc title="Table des matières" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

We can do this using an existing exploit, BannerBomb3.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/fr_FR/seedminer.txt b/_pages/fr_FR/seedminer.txt index 9ac3b47131..f833b88380 100644 --- a/_pages/fr_FR/seedminer.txt +++ b/_pages/fr_FR/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title="Table des matières" %} -
+{% capture technical_info %} Technical Details (optional) -

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

-

For information on how Seedminer works, see this presentation.

-

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Section I - Prep Work diff --git a/_pages/he_IL/bannerbomb3.txt b/_pages/he_IL/bannerbomb3.txt index e941b3a1e6..21d90cd73b 100644 --- a/_pages/he_IL/bannerbomb3.txt +++ b/_pages/he_IL/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title="תוכן העניינים" %} -
+{% capture technical_info %} Technical Details (optional) -

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

-

For a more technical explanation, see here.

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/he_IL/homebrew-launcher-(pichaxx).txt b/_pages/he_IL/homebrew-launcher-(pichaxx).txt index 4c6db3eab6..aeabf3f907 100644 --- a/_pages/he_IL/homebrew-launcher-(pichaxx).txt +++ b/_pages/he_IL/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="תוכן העניינים" %} -
+{% capture technical_info %} Technical Details (optional) -This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/he_IL/installing-boot9strap-(fredtool).txt b/_pages/he_IL/installing-boot9strap-(fredtool).txt index 45ece5b468..6759fb916f 100644 --- a/_pages/he_IL/installing-boot9strap-(fredtool).txt +++ b/_pages/he_IL/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="תוכן העניינים" %} -
+{% capture technical_info %} Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### What You Need diff --git a/_pages/he_IL/installing-boot9strap-(hardmod).txt b/_pages/he_IL/installing-boot9strap-(hardmod).txt index 640215392a..23488a2e6a 100644 --- a/_pages/he_IL/installing-boot9strap-(hardmod).txt +++ b/_pages/he_IL/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "התקנת boot9strap (הלחמה)" {% include toc title="תוכן העניינים" %} -
+{% capture technical_info %} Technical Details (optional) -

An excellent guide to getting a hardmod can be found here.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-

Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console.

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/he_IL/installing-boot9strap-(hbl-usm).txt b/_pages/he_IL/installing-boot9strap-(hbl-usm).txt index 3a7e267c99..adc3aa598f 100644 --- a/_pages/he_IL/installing-boot9strap-(hbl-usm).txt +++ b/_pages/he_IL/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="תוכן העניינים" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

As we already have Homebrew access, we can use slotTool to do this.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/he_IL/installing-boot9strap-(kartdlphax).txt b/_pages/he_IL/installing-boot9strap-(kartdlphax).txt index 670acd04e7..938fe61d6d 100644 --- a/_pages/he_IL/installing-boot9strap-(kartdlphax).txt +++ b/_pages/he_IL/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (kartdlphax)" {% include toc title="תוכן העניינים" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin.

-

This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: kartdlphax, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/he_IL/installing-boot9strap-(soundhax).txt b/_pages/he_IL/installing-boot9strap-(soundhax).txt index fdc0baa95f..43c7f8092d 100644 --- a/_pages/he_IL/installing-boot9strap-(soundhax).txt +++ b/_pages/he_IL/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="תוכן העניינים" %} -
+{% capture technical_info %} Technical Details (optional) -

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

-
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/he_IL/installing-boot9strap-(ssloth-browser).txt b/_pages/he_IL/installing-boot9strap-(ssloth-browser).txt index 850f483db7..42db733028 100644 --- a/_pages/he_IL/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/he_IL/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (SSLoth-Browser)" {% include toc title="תוכן העניינים" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version.

-

A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check.

-

Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job.

-

For technical details on the exploits that you will be using on this page, see here (SSLoth) and here (universal-otherapp).

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/he_IL/installing-boot9strap-(usm).txt b/_pages/he_IL/installing-boot9strap-(usm).txt index db3053b1ea..71f082b57a 100644 --- a/_pages/he_IL/installing-boot9strap-(usm).txt +++ b/_pages/he_IL/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (USM)" {% include toc title="תוכן העניינים" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

We can do this using an existing exploit, BannerBomb3.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/he_IL/seedminer.txt b/_pages/he_IL/seedminer.txt index 3fcaf96cc0..d1088670b6 100644 --- a/_pages/he_IL/seedminer.txt +++ b/_pages/he_IL/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title="תוכן העניינים" %} -
+{% capture technical_info %} Technical Details (optional) -

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

-

For information on how Seedminer works, see this presentation.

-

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Section I - Prep Work diff --git a/_pages/hr_HR/bannerbomb3.txt b/_pages/hr_HR/bannerbomb3.txt index d2c19abf2f..c39606973e 100644 --- a/_pages/hr_HR/bannerbomb3.txt +++ b/_pages/hr_HR/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

-

For a more technical explanation, see here.

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/hr_HR/homebrew-launcher-(pichaxx).txt b/_pages/hr_HR/homebrew-launcher-(pichaxx).txt index 8395805ef0..e75f6b91ea 100644 --- a/_pages/hr_HR/homebrew-launcher-(pichaxx).txt +++ b/_pages/hr_HR/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/hr_HR/installing-boot9strap-(fredtool).txt b/_pages/hr_HR/installing-boot9strap-(fredtool).txt index 9b389ee19f..fab9a050c7 100644 --- a/_pages/hr_HR/installing-boot9strap-(fredtool).txt +++ b/_pages/hr_HR/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### What You Need diff --git a/_pages/hr_HR/installing-boot9strap-(hardmod).txt b/_pages/hr_HR/installing-boot9strap-(hardmod).txt index 4f0888d535..3455b87ff5 100644 --- a/_pages/hr_HR/installing-boot9strap-(hardmod).txt +++ b/_pages/hr_HR/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "Installing boot9strap (Hardmod)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

An excellent guide to getting a hardmod can be found here.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-

Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console.

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/hr_HR/installing-boot9strap-(hbl-usm).txt b/_pages/hr_HR/installing-boot9strap-(hbl-usm).txt index 65bcd5f692..a24b979948 100644 --- a/_pages/hr_HR/installing-boot9strap-(hbl-usm).txt +++ b/_pages/hr_HR/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

As we already have Homebrew access, we can use slotTool to do this.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/hr_HR/installing-boot9strap-(kartdlphax).txt b/_pages/hr_HR/installing-boot9strap-(kartdlphax).txt index a795051412..ef9b29e969 100644 --- a/_pages/hr_HR/installing-boot9strap-(kartdlphax).txt +++ b/_pages/hr_HR/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (kartdlphax)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin.

-

This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: kartdlphax, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/hr_HR/installing-boot9strap-(soundhax).txt b/_pages/hr_HR/installing-boot9strap-(soundhax).txt index b94e84c610..d7ce9937c7 100644 --- a/_pages/hr_HR/installing-boot9strap-(soundhax).txt +++ b/_pages/hr_HR/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

-
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/hr_HR/installing-boot9strap-(ssloth-browser).txt b/_pages/hr_HR/installing-boot9strap-(ssloth-browser).txt index 016c43be0c..07bbb76a27 100644 --- a/_pages/hr_HR/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/hr_HR/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (SSLoth-Browser)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version.

-

A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check.

-

Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job.

-

For technical details on the exploits that you will be using on this page, see here (SSLoth) and here (universal-otherapp).

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/hr_HR/installing-boot9strap-(usm).txt b/_pages/hr_HR/installing-boot9strap-(usm).txt index 58be815045..354ab00213 100644 --- a/_pages/hr_HR/installing-boot9strap-(usm).txt +++ b/_pages/hr_HR/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (USM)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

We can do this using an existing exploit, BannerBomb3.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/hr_HR/seedminer.txt b/_pages/hr_HR/seedminer.txt index b6d7e339df..21f019b371 100644 --- a/_pages/hr_HR/seedminer.txt +++ b/_pages/hr_HR/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

-

For information on how Seedminer works, see this presentation.

-

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Section I - Prep Work diff --git a/_pages/hu_HU/bannerbomb3.txt b/_pages/hu_HU/bannerbomb3.txt index 7a23eac7e1..5386fd8f89 100644 --- a/_pages/hu_HU/bannerbomb3.txt +++ b/_pages/hu_HU/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title="Tartalomjegyzék" %} -
+{% capture technical_info %} Technikai részletek (opcionális) -

Ahhoz, hogy saját kódot futtassunk, kihasználunk egy hibát a DSiWare adat kezelési ablakában, a rendszer beállításokban.

-

Ahhoz, hogy ezt elérjük, szükségünk van a rendszer titkosítási kulcsára (movable.sed), hogy újra építsünk egy DSiWare mentést, amivel exploit-olni tudjuk a rendszert.

-

További technikai információkért látogass el ide.

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### Kompatibilitási megjegyzések diff --git a/_pages/hu_HU/homebrew-launcher-(pichaxx).txt b/_pages/hu_HU/homebrew-launcher-(pichaxx).txt index ab295e2892..026dc3d0f9 100644 --- a/_pages/hu_HU/homebrew-launcher-(pichaxx).txt +++ b/_pages/hu_HU/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Tartalomjegyzék" %} -
+{% capture technical_info %} Technikai részletek (opcionális) -Ez a metódusa Seedminer használatának további exploitolás céljából használja a movable.sed fájlt, hogy egy egyedi Pokémon Picross mentés fájlt írjon, amit már használhat az unSAFE_MODE (a Homebrew Launcher-en keresztül) a SafeB9Installer futtatására. A PicHaxx-ról információkért tekintsd meg ezt az oldalt. -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Kompatibilitási megjegyzések diff --git a/_pages/hu_HU/installing-boot9strap-(fredtool).txt b/_pages/hu_HU/installing-boot9strap-(fredtool).txt index 01161f4419..4767c882a4 100644 --- a/_pages/hu_HU/installing-boot9strap-(fredtool).txt +++ b/_pages/hu_HU/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "Boot9strap telepítése (Fredtool)" {% include toc title="Tartalomjegyzék" %} -
+{% capture technical_info %} Technikai részletek (opcionális) -

Ez a metódusa a Seedminer használatának a további exploitoláshoz használja a movable.sed fájlod, hogy dekriptáljon egy DSiWare címet, azzal az céllal, hogy beinjektáljon egy exploitolható DSiWare címet a DS Internet Settings alkalmazásba.

-

Ez egy jelenleg működő megvalósítása a "FIRM partitions known-plaintext" néven ismert exploitnak, amiről részletesebben olvashatsz itt.

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Amire szükséged lesz diff --git a/_pages/hu_HU/installing-boot9strap-(hardmod).txt b/_pages/hu_HU/installing-boot9strap-(hardmod).txt index c85ffd3e76..97d884f578 100644 --- a/_pages/hu_HU/installing-boot9strap-(hardmod).txt +++ b/_pages/hu_HU/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "Boot9strap telepítése (Hardmod)" {% include toc title="Tartalomjegyzék" %} -
+{% capture technical_info %} Technikai részletek (opcionális) -

Egy kiváló útmutató a hardmod beszerzéséhez itt található.

-

Ez egy jelenleg működő megvalósítása a "FIRM partitions known-plaintext" néven ismert exploitnak, amiről részletesebben olvashatsz itt.

-

A hardmod használatával dumpolni tudunk egy NAND képfájlt, telepíteni egyedi firmware-t a NAND képfájlra, majd visszatelepíteni a hackelt NAND fájlt a konzolra.

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Kompatibilitási megjegyzések diff --git a/_pages/hu_HU/installing-boot9strap-(hbl-usm).txt b/_pages/hu_HU/installing-boot9strap-(hbl-usm).txt index df9643fc19..1b63a21fb7 100644 --- a/_pages/hu_HU/installing-boot9strap-(hbl-usm).txt +++ b/_pages/hu_HU/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "Boot9strap telepítése (HBL-USM)" {% include toc title="Tartalomjegyzék" %} -
+{% capture technical_info %} Technikai részletek (opcionális) -

Ahhoz, hogy a SAFE_MODE-ot exploitálhassuk, be kell injektálnunk egy exploitált WiFi profilt.

-

Mivel már van Homebrew hozzáférésünk, használhatjuk a slotTool-t erre a célra.

-

Amint a WiFi profil injektálásra került, a SAFE_MODE-ot fogjuk használni, ami egy helyreállítás szolgáltatás, ami elérhető minden 3DS konzolon, hogy aktiválja az exploitolt WiFi profilt.

-

További technikai információkért az unSAFE_MODE exploit-ról látogass el ide.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Kompatibilitási megjegyzések diff --git a/_pages/hu_HU/installing-boot9strap-(kartdlphax).txt b/_pages/hu_HU/installing-boot9strap-(kartdlphax).txt index e8975330d1..39282a683b 100644 --- a/_pages/hu_HU/installing-boot9strap-(kartdlphax).txt +++ b/_pages/hu_HU/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "Boot9strap telepítése (kartdlphax)" {% include toc title="Tartalomjegyzék" %} -
+{% capture technical_info %} Technikai részletek (opcionális) -

Ahhoz, hogy a SAFE_MODE-ot exploitálhassuk, be kell injektálnunk egy exploitált WiFi profilt.

-

Ennek eléréséhez a Download Play funkcionalitását használjuk a Mario Kart 7-nek, egy egyedi firmware-rel, valamint egy egyedi játék pluginnel már telepített 3DS használatával.

-

Ez az egyedi plugin egy hackelt payload-ot küld a nem hackelt konzolra, ami exploitolja a rendszert, azért, hogy injektálja az exploitolt WiFi profilt a kapcsolatok listájába.

-

Amint a WiFi profil injektálásra került, a SAFE_MODE-ot fogjuk használni, ami egy helyreállítás szolgáltatás, ami elérhető minden 3DS konzolon, hogy aktiválja az exploitolt WiFi profilt.

-

További technikai információkért a kartdlphax és az unSAFE_MODE exploit-ról látogass el ide:kartdlphax, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Kompatibilitási megjegyzések diff --git a/_pages/hu_HU/installing-boot9strap-(soundhax).txt b/_pages/hu_HU/installing-boot9strap-(soundhax).txt index 657c0a38fc..1a3dc80861 100644 --- a/_pages/hu_HU/installing-boot9strap-(soundhax).txt +++ b/_pages/hu_HU/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "Boot9strap telepítése (Soundhax)" {% include toc title="Tartalomjegyzék" %} -
+{% capture technical_info %} Technikai részletek (opcionális) -

A technikai részleteiért az ezen az oldalon használt exploit-oknak tekintsd meg ezt (Soundhax) és ezt (universal-otherapp)

az oldalt -
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Kompatibilitási megjegyzések diff --git a/_pages/hu_HU/installing-boot9strap-(ssloth-browser).txt b/_pages/hu_HU/installing-boot9strap-(ssloth-browser).txt index faad92c5cc..12cfff7872 100644 --- a/_pages/hu_HU/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/hu_HU/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "Boot9strap telepítése (SSLoth-Browser)" {% include toc title="Tartalomjegyzék" %} -
+{% capture technical_info %} Technikai részletek (opcionális) -

A Browser alkalmazás exploit-olásához ki kell kapcsolni a verzió ellenőrzést, ami úgy lett megtervezve, hogy ne engedje a böngésző használatát a nélkül, hogy előtte frissítenénk a rendszert a legfrissebb verzióra.

-

Egy publikus proxy szerver elérhető, ami az SSLoth exploit segítségével ki tudja iktatni ezt az ellenőrzést.

-

Ha ez a kiiktatás aktív, egy exploit weboldal elérhető, ami elvégzi a többi részét a feladatnak.

-

A technikai részleteiért az ezen az oldalon használt exploit-oknak tekintsd meg ezt (SSLoth) és ezt (universal-otherapp) az oldalt

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Kompatibilitási megjegyzések diff --git a/_pages/hu_HU/installing-boot9strap-(usm).txt b/_pages/hu_HU/installing-boot9strap-(usm).txt index 941704d698..5dd898e6fa 100644 --- a/_pages/hu_HU/installing-boot9strap-(usm).txt +++ b/_pages/hu_HU/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "Boot9strap telepítése (USM)" {% include toc title="Tartalomjegyzék" %} -
+{% capture technical_info %} Technikai részletek (opcionális) -

Ahhoz, hogy a SAFE_MODE-ot exploitálhassuk, be kell injektálnunk egy exploitált WiFi profilt.

-

Ezt megtenni egy másik létező exploittal, a BannerBomb3-mal tudjuk.

-

Hogy ezt elérjük, a rendszer titkosítási kulcsoddal (movable.sed) újra építünk egy DSiWare mentést, ami exploitolja a rendszert annak érdekében, hogy be tudjuk injektálni az exploitolt WiFi profilt a kapcsolatok listájára.

-

Amint a WiFi profil injektálásra került, a SAFE_MODE-ot fogjuk használni, ami egy helyreállítás szolgáltatás, ami elérhető minden 3DS konzolon, hogy aktiválja az exploitolt WiFi profilt.

-

További technikai információkért a BannerBomb3 és az unSAFE_MODE exploit-ról látogass el ide:BannerBomb3, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Kompatibilitási megjegyzések diff --git a/_pages/hu_HU/seedminer.txt b/_pages/hu_HU/seedminer.txt index b3ba48954f..20b328ffd0 100644 --- a/_pages/hu_HU/seedminer.txt +++ b/_pages/hu_HU/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title="Tartalomjegyzék" %} -
+{% capture technical_info %} Technikai részletek (opcionális) -

A boot9strap telepítéséhez az eszközödre, megfejtjük az eszköz egyedi titkosító kulcsát. Ennek eléréséhez egy Seedminer nevű eszközt fogunk használni, hogy kiszámítsuk a készüléked adat titkosítási kulcsát (movable.sed).

-

További információért arról, hogyan működik a Seedminer, nézd meg ezt a prezentációt.

-

Ez a módszer egy erős grafikus kártyát használ a szükséges számítások elvégzéséhez. Egy önkéntes által üzemeltetett webhely segít neked ebben a módszerben.

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### I. rész - Előkészületek diff --git a/_pages/id_ID/bannerbomb3.txt b/_pages/id_ID/bannerbomb3.txt index d2c19abf2f..c39606973e 100644 --- a/_pages/id_ID/bannerbomb3.txt +++ b/_pages/id_ID/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

-

For a more technical explanation, see here.

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/id_ID/homebrew-launcher-(pichaxx).txt b/_pages/id_ID/homebrew-launcher-(pichaxx).txt index 8395805ef0..e75f6b91ea 100644 --- a/_pages/id_ID/homebrew-launcher-(pichaxx).txt +++ b/_pages/id_ID/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/id_ID/installing-boot9strap-(fredtool).txt b/_pages/id_ID/installing-boot9strap-(fredtool).txt index 9b389ee19f..fab9a050c7 100644 --- a/_pages/id_ID/installing-boot9strap-(fredtool).txt +++ b/_pages/id_ID/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### What You Need diff --git a/_pages/id_ID/installing-boot9strap-(hardmod).txt b/_pages/id_ID/installing-boot9strap-(hardmod).txt index 4f0888d535..3455b87ff5 100644 --- a/_pages/id_ID/installing-boot9strap-(hardmod).txt +++ b/_pages/id_ID/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "Installing boot9strap (Hardmod)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

An excellent guide to getting a hardmod can be found here.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-

Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console.

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/id_ID/installing-boot9strap-(hbl-usm).txt b/_pages/id_ID/installing-boot9strap-(hbl-usm).txt index 65bcd5f692..a24b979948 100644 --- a/_pages/id_ID/installing-boot9strap-(hbl-usm).txt +++ b/_pages/id_ID/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

As we already have Homebrew access, we can use slotTool to do this.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/id_ID/installing-boot9strap-(kartdlphax).txt b/_pages/id_ID/installing-boot9strap-(kartdlphax).txt index a795051412..ef9b29e969 100644 --- a/_pages/id_ID/installing-boot9strap-(kartdlphax).txt +++ b/_pages/id_ID/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (kartdlphax)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin.

-

This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: kartdlphax, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/id_ID/installing-boot9strap-(soundhax).txt b/_pages/id_ID/installing-boot9strap-(soundhax).txt index b94e84c610..d7ce9937c7 100644 --- a/_pages/id_ID/installing-boot9strap-(soundhax).txt +++ b/_pages/id_ID/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

-
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/id_ID/installing-boot9strap-(ssloth-browser).txt b/_pages/id_ID/installing-boot9strap-(ssloth-browser).txt index 016c43be0c..07bbb76a27 100644 --- a/_pages/id_ID/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/id_ID/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (SSLoth-Browser)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version.

-

A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check.

-

Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job.

-

For technical details on the exploits that you will be using on this page, see here (SSLoth) and here (universal-otherapp).

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/id_ID/installing-boot9strap-(usm).txt b/_pages/id_ID/installing-boot9strap-(usm).txt index 58be815045..354ab00213 100644 --- a/_pages/id_ID/installing-boot9strap-(usm).txt +++ b/_pages/id_ID/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (USM)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

We can do this using an existing exploit, BannerBomb3.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/id_ID/seedminer.txt b/_pages/id_ID/seedminer.txt index b6d7e339df..21f019b371 100644 --- a/_pages/id_ID/seedminer.txt +++ b/_pages/id_ID/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

-

For information on how Seedminer works, see this presentation.

-

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Section I - Prep Work diff --git a/_pages/it_IT/bannerbomb3.txt b/_pages/it_IT/bannerbomb3.txt index 4d4e9246e7..ffb17b1872 100644 --- a/_pages/it_IT/bannerbomb3.txt +++ b/_pages/it_IT/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title="Indice" %} -
+{% capture technical_info %} Dettagli Tecnici (opzionale) -

Per avviare codice non ufficiale, approfittiamo di una falla di sicurezza nella sezione Gestione Nintendo DSiWare dell'applicazione Impostazioni della console.

-

A questo scopo, useremo la chiave di crittografia della tua console (movable.sed) per generare un backup DSiWare che possa essere avviato dalla console.

-

Per una spiegazione più tecnica, consulta questa pagina.

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### Note di Compatibilità diff --git a/_pages/it_IT/homebrew-launcher-(pichaxx).txt b/_pages/it_IT/homebrew-launcher-(pichaxx).txt index 36bd3f3f5a..af1c2d1b08 100644 --- a/_pages/it_IT/homebrew-launcher-(pichaxx).txt +++ b/_pages/it_IT/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Indice" %} -
+{% capture technical_info %} Dettagli Tecnici (opzionale) -Questo metodo usa Seedminer per servirsi ulteriormente del tuo file movable.sed e scrivere un file di salvataggio personalizzato per Pokémon Picross, che può essere utilizzato con unSAFE_MODE (tramite Homebrew Launcher) per avviare SafeB9SInstaller. Per informazioni su PicHaxx stesso, consulta questa pagina. -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Note di Compatibilità diff --git a/_pages/it_IT/installing-boot9strap-(fredtool).txt b/_pages/it_IT/installing-boot9strap-(fredtool).txt index 62fce0100c..6ec65b32d8 100644 --- a/_pages/it_IT/installing-boot9strap-(fredtool).txt +++ b/_pages/it_IT/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "Installazione di boot9strap (Fredtool)" {% include toc title="Indice" %} -
+{% capture technical_info %} Dettagli Tecnici (opzionale) -

Seedminer utilizza il tuo file movable.sed per decriptare un qualunque titolo DSiWare e iniettare una particolare applicazione DSiWare nell'applicazione Connessioni Nintendo DS.

-

Utilizzeremo una falla, attualmente funzionante, denominata "FIRM partitions known-plaintext" qui.

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Cosa serve diff --git a/_pages/it_IT/installing-boot9strap-(hardmod).txt b/_pages/it_IT/installing-boot9strap-(hardmod).txt index 6adb787435..de9a3a9ce5 100644 --- a/_pages/it_IT/installing-boot9strap-(hardmod).txt +++ b/_pages/it_IT/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "Installazione di boot9strap (Hardmod)" {% include toc title="Indice" %} -
+{% capture technical_info %} Dettagli Tecnici (opzionale) -

Qui puoi trovare un'ottima guida per eseguire un'hardmod.

-

Utilizzeremo una falla, attualmente funzionante, denominata "FIRM partitions known-plaintext" qui.

-

Utilizzando un'hardmod possiamo eseguire un dump della NAND, installare un custom firmware in questa immagine NAND, infine reinstallare la NAND modificata sulla console.

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Note di Compatibilità diff --git a/_pages/it_IT/installing-boot9strap-(hbl-usm).txt b/_pages/it_IT/installing-boot9strap-(hbl-usm).txt index 845f706db2..d87c9cfefb 100644 --- a/_pages/it_IT/installing-boot9strap-(hbl-usm).txt +++ b/_pages/it_IT/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "Installazione di boot9strap (HBL-USM)" {% include toc title="Indice" %} -
+{% capture technical_info %} Dettagli Tecnici (opzionale) -

Per sfruttare il firmware SAFE_MODE del nostro sistema, dobbiamo iniettare un profilo di connessione WiFi modificato.

-

Poiché abbiamo già accesso agli Homebrew, possiamo approfittare di slotTool.

-

Una volta inserito il profilo WiFi utilizzeremo SAFE_MODE, una funzionalità di ripristino presente su ogni console 3DS, per attivare il profilo WiFi modificato.

-

Per una spiegazione più tecnica, consulta questa pagina per informazioni sull'exploit unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Note di Compatibilità diff --git a/_pages/it_IT/installing-boot9strap-(kartdlphax).txt b/_pages/it_IT/installing-boot9strap-(kartdlphax).txt index cbaad9ac0d..096706f2c5 100644 --- a/_pages/it_IT/installing-boot9strap-(kartdlphax).txt +++ b/_pages/it_IT/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "Installazione di boot9strap (kartdlphax)" {% include toc title="Indice" %} -
+{% capture technical_info %} Dettagli Tecnici (opzionale) -

Per sfruttare il firmware SAFE_MODE del nostro sistema, dobbiamo iniettare un profilo di connessione WiFi modificato.

-

Per farlo possiamo utilizzare la funzionalità "Modalità download" del gioco Mario Kart 7, utilizzando un 3DS con custom firmware già installato insieme a un plugin di gioco personalizzato.

-

Questo plugin personalizzato invierà un payload modificato ad una console non modificata, permettendo l'iniezione del profilo WiFi modificato nella tua lista delle connessioni.

-

Una volta inserito il profilo WiFi utilizzeremo SAFE_MODE, una funzionalità di ripristino presente su ogni console 3DS, per attivare il profilo WiFi modificato.

-

Per una spiegazione più tecnica, consulta i seguenti link per informazioni sugli exploit kartdlphax e unSAFE_MODE: kartdlphax, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Note di Compatibilità diff --git a/_pages/it_IT/installing-boot9strap-(soundhax).txt b/_pages/it_IT/installing-boot9strap-(soundhax).txt index 197372ebc6..ca28a3b485 100644 --- a/_pages/it_IT/installing-boot9strap-(soundhax).txt +++ b/_pages/it_IT/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "Installazione di boot9strap (Soundhax)" {% include toc title="Indice" %} -
+{% capture technical_info %} Dettagli Tecnici (opzionale) -

Per dettagli tecnici sugli exploit che utilizzerai in questa pagina, leggi qui (Soundhax) e qui (universal-otherapp).

-
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Note di Compatibilità diff --git a/_pages/it_IT/installing-boot9strap-(ssloth-browser).txt b/_pages/it_IT/installing-boot9strap-(ssloth-browser).txt index e24d5098d6..881e0c20e0 100644 --- a/_pages/it_IT/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/it_IT/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "Installazione di boot9strap (SSLoth-Browser)" {% include toc title="Indice" %} -
+{% capture technical_info %} Dettagli Tecnici (opzionale) -

Per sfruttare l'applicazione Browser Internet dobbiamo bypassare il controllo della versione di sistema che questo effettua, controllo progettato per non consentire l'uso del browser senza aver prima aggiornato all'ultima versione di sistema.

-

È disponibile un server proxy pubblico che, con l'aiuto dell'exploit SSLoth, può bypassare questo controllo.

-

Una volta che il bypass è attivo, viene resa accessibile una pagina web con un exploit che farà il resto del lavoro.

-

Per dettagli tecnici sugli exploit che utilizzerai in questa pagina, leggi qui (SSLoth) e qui (universal-otherapp).

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Note di Compatibilità diff --git a/_pages/it_IT/installing-boot9strap-(usm).txt b/_pages/it_IT/installing-boot9strap-(usm).txt index 8ef239986e..73ee01e306 100644 --- a/_pages/it_IT/installing-boot9strap-(usm).txt +++ b/_pages/it_IT/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "Installazione di boot9strap (USM)" {% include toc title="Indice" %} -
+{% capture technical_info %} Dettagli Tecnici (opzionale) -

Per sfruttare il firmware SAFE_MODE del nostro sistema, dobbiamo iniettare un profilo di connessione WiFi modificato.

-

Lo faremo utilizzando un exploit già esistente, BannerBomb3.

-

Per realizzare l'obiettivo, utilizziamo la chiave di cifratura della tua console (movable.sed) per generare un backup DSiWare che induce la console a iniettare il profilo WiFi modificato nella tua lista di connessioni disponibili.

-

Una volta inserito il profilo WiFi utilizzeremo SAFE_MODE, una funzionalità di ripristino presente su ogni console 3DS, per attivare il profilo WiFi modificato.

-

Per una spiegazione più tecnica, consulta i seguenti link per informazioni sugli exploit BannerBomb3 e unSAFE_MODE: BannerBomb3, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Note di Compatibilità diff --git a/_pages/it_IT/seedminer.txt b/_pages/it_IT/seedminer.txt index 3dae99bac6..1a7e4d1ea3 100644 --- a/_pages/it_IT/seedminer.txt +++ b/_pages/it_IT/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title="Indice" %} -
+{% capture technical_info %} Dettagli Tecnici (opzionale) -

Per installare boot9strap nella tua console, ne ricaviamo la sua univoca chiave di cifratura. Utilizzeremo perciò un'applicazione chiamata Seedminer per calcolare la chiave di cifratura dati (`movable.sed`) per la tua console.

-

Per informazioni su come funziona Seedminer, consulta questa presentazione.

-

Questo metodo utilizza una scheda grafica di fascia alta per eseguire i calcoli necessari. Verrà usato un sito web gestito da volontari per assisterti in questo metodo.

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Sezione I - Preparazione diff --git a/_pages/ja_JP/bannerbomb3.txt b/_pages/ja_JP/bannerbomb3.txt index aba0ba65d3..dc47bda4e0 100644 --- a/_pages/ja_JP/bannerbomb3.txt +++ b/_pages/ja_JP/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title="目次" %} -
+{% capture technical_info %} Technical Details (optional) -

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

-

For a more technical explanation, see here.

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ja_JP/homebrew-launcher-(pichaxx).txt b/_pages/ja_JP/homebrew-launcher-(pichaxx).txt index 8db3c543ee..92bea0ea11 100644 --- a/_pages/ja_JP/homebrew-launcher-(pichaxx).txt +++ b/_pages/ja_JP/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="目次" %} -
+{% capture technical_info %} Technical Details (optional) -This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ja_JP/installing-boot9strap-(fredtool).txt b/_pages/ja_JP/installing-boot9strap-(fredtool).txt index b252dfdddd..5ed64fc3aa 100644 --- a/_pages/ja_JP/installing-boot9strap-(fredtool).txt +++ b/_pages/ja_JP/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="目次" %} -
+{% capture technical_info %} Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### 必要なもの diff --git a/_pages/ja_JP/installing-boot9strap-(hardmod).txt b/_pages/ja_JP/installing-boot9strap-(hardmod).txt index de33425c18..a2ef1f4f54 100644 --- a/_pages/ja_JP/installing-boot9strap-(hardmod).txt +++ b/_pages/ja_JP/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "boot9strapの導入 (Hardmod)" {% include toc title="目次" %} -
+{% capture technical_info %} Technical Details (optional) -

An excellent guide to getting a hardmod can be found here.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-

Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console.

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ja_JP/installing-boot9strap-(hbl-usm).txt b/_pages/ja_JP/installing-boot9strap-(hbl-usm).txt index 078bda355c..cbcc023a12 100644 --- a/_pages/ja_JP/installing-boot9strap-(hbl-usm).txt +++ b/_pages/ja_JP/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="目次" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

As we already have Homebrew access, we can use slotTool to do this.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ja_JP/installing-boot9strap-(kartdlphax).txt b/_pages/ja_JP/installing-boot9strap-(kartdlphax).txt index 3cc854d7af..4eccc537b9 100644 --- a/_pages/ja_JP/installing-boot9strap-(kartdlphax).txt +++ b/_pages/ja_JP/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (kartdlphax)" {% include toc title="目次" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin.

-

This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: kartdlphax, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ja_JP/installing-boot9strap-(soundhax).txt b/_pages/ja_JP/installing-boot9strap-(soundhax).txt index 3276e16b5f..1b431e80de 100644 --- a/_pages/ja_JP/installing-boot9strap-(soundhax).txt +++ b/_pages/ja_JP/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "boot9strapの導入 (Soundhax)" {% include toc title="目次" %} -
+{% capture technical_info %} Technical Details (optional) -

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

-
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ja_JP/installing-boot9strap-(ssloth-browser).txt b/_pages/ja_JP/installing-boot9strap-(ssloth-browser).txt index 7f86c73e23..75baee4ef8 100644 --- a/_pages/ja_JP/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/ja_JP/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (SSLoth-Browser)" {% include toc title="目次" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version.

-

A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check.

-

Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job.

-

For technical details on the exploits that you will be using on this page, see here (SSLoth) and here (universal-otherapp).

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ja_JP/installing-boot9strap-(usm).txt b/_pages/ja_JP/installing-boot9strap-(usm).txt index 9db6afe947..12205a8a39 100644 --- a/_pages/ja_JP/installing-boot9strap-(usm).txt +++ b/_pages/ja_JP/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "boot9strap(USM) の導入" {% include toc title="目次" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

We can do this using an existing exploit, BannerBomb3.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ja_JP/seedminer.txt b/_pages/ja_JP/seedminer.txt index 88bbe2c45d..27ff04af2a 100644 --- a/_pages/ja_JP/seedminer.txt +++ b/_pages/ja_JP/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title="目次" %} -
+{% capture technical_info %} Technical Details (optional) -

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

-

For information on how Seedminer works, see this presentation.

-

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Section I - Prep Work diff --git a/_pages/ko_KR/404.txt b/_pages/ko_KR/404.txt index f3e994d92a..ec74fa1cdc 100644 --- a/_pages/ko_KR/404.txt +++ b/_pages/ko_KR/404.txt @@ -1,5 +1,5 @@ --- -title: 찾을 수 없습니다 +title: "페이지를 찾을 수 없습니다." # excerpt: "페이지를 찾을 수 없습니다. 픽셀이 다른 캔버스에 있습니다." # sitemap: false --- diff --git a/_pages/ko_KR/bannerbomb3.txt b/_pages/ko_KR/bannerbomb3.txt index 2026df6aa9..02448bff37 100644 --- a/_pages/ko_KR/bannerbomb3.txt +++ b/_pages/ko_KR/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title="목차" %} -
+{% capture technical_info %} 기술적 상세 정보 (선택 사항) -

사용자 정의의 코드를 실행하기 위해 DSiWare 데이터 관리 설정 창의 취약점을 악용합니다.

-

이것을 할수 있도록, 기기의 암호화 키 (movable.sed)를 이용해 기기를 익스플로잇 할 DSiWare 백업을 생성 합니다.

-

더 자세한 기술 정보를 확인하려면, 이 페이지 (영문)을 확인해 주세요.

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### 호환성 안내 diff --git a/_pages/ko_KR/homebrew-launcher-(pichaxx).txt b/_pages/ko_KR/homebrew-launcher-(pichaxx).txt index da726a0116..74806c9a0a 100644 --- a/_pages/ko_KR/homebrew-launcher-(pichaxx).txt +++ b/_pages/ko_KR/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="목차" %} -
+{% capture technical_info %} 기술적 상세 정보 (선택 사항) -더 깊은 모딩을 위한 Seedminer의 이 사용법은, 포켓몬 피크로스의 커스텀 세이브 파일을 movable.sed 파일을 사용해서 작성해, unSAFE_MODE과 같이 사용해 SafeB9SInstaller를 실행하는 방식입니다. PicHaxx에 자세한 설명은 이 페이지에서 보시면 됩니다. -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### 호환성 안내 diff --git a/_pages/ko_KR/installing-boot9strap-(fredtool).txt b/_pages/ko_KR/installing-boot9strap-(fredtool).txt index 93693c2e88..02952be934 100644 --- a/_pages/ko_KR/installing-boot9strap-(fredtool).txt +++ b/_pages/ko_KR/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "boot9strap 설치 (Fredtool)" {% include toc title="목차" %} -
+{% capture technical_info %} 기술적 상세 정보 (선택 사항) -

이 방식은 Seedminer에서 얻은 movable.sed 파일을 사용해 어느 DSiWare 타이틀을 해독해 익스플로잇 가능한 DSiWare 타이틀을 DS 소프트웨어용 인터넷 설정에 주입합니다.

-

이 작업은 이곳에 자세히 설명되어 있는 "FIRM partitions known-plaintext" 익스플로잇을 구현한 작업입니다.

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### 준비물 diff --git a/_pages/ko_KR/installing-boot9strap-(hardmod).txt b/_pages/ko_KR/installing-boot9strap-(hardmod).txt index f3ecd1f9a8..6ded37a6c9 100644 --- a/_pages/ko_KR/installing-boot9strap-(hardmod).txt +++ b/_pages/ko_KR/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "boot9strap 설치 (하드모드)" {% include toc title="목차" %} -
+{% capture technical_info %} 기술적 상세 정보 (선택 사항) -

좋은 하드모드 가이드는 여기에서 볼 수 있습니다.

-

이 작업은 이곳에 자세히 설명되어 있는 "FIRM partitions known-plaintext" 익스플로잇을 구현한 작업입니다.

-

하드모드를 사용하여 기기의 NAND 이미지를 덤프하고, 이 NAND 이미지에다가 커스텀 펌웨어를 설치하고, 결과물을 다시 기기에 설치할 수 있습니다.

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### 호환성 안내 diff --git a/_pages/ko_KR/installing-boot9strap-(hbl-usm).txt b/_pages/ko_KR/installing-boot9strap-(hbl-usm).txt index 08462d9d51..8cd9bde76a 100644 --- a/_pages/ko_KR/installing-boot9strap-(hbl-usm).txt +++ b/_pages/ko_KR/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "boot9strap 설치 (HBL-USM)" {% include toc title="목차" %} -
+{% capture technical_info %} 기술적 상세 정보 (선택 사항) -

SAFE_MODE 펌웨어를 해킹하기 위해, 익스플로잇이 되어있는 Wi-Fi 프로필을 설치해야 합니다.

-

이미 홈브류 기능을 사용할수 있으니, slotTool을 이용하면 됩니다.

-

그 후, 시스템 복구 모드, SAFE_MODE를 사용해 인터넷 설정을 활용화 시킵니다.

-

unSAFE_MODE의 더 자세한 설명은 이 (영어) 페이지를 참고해 주세요.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### 호환성 안내 diff --git a/_pages/ko_KR/installing-boot9strap-(kartdlphax).txt b/_pages/ko_KR/installing-boot9strap-(kartdlphax).txt index f269803227..9a37c85a95 100644 --- a/_pages/ko_KR/installing-boot9strap-(kartdlphax).txt +++ b/_pages/ko_KR/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "boot9strap 설치 (kartdlphax)" {% include toc title="목차" %} -
+{% capture technical_info %} 기술적 상세 정보 (선택 사항) -

SAFE_MODE 펌웨어를 해킹하기 위해, 익스플로잇이 되어있는 Wi-Fi 프로필을 설치해야 합니다.

-

이 취약점을 사용하기 위해, 마리오 카트 7 게임에 존재하는 다운로드 플레이 기능, 이미 커스텀 펌웨어가 설치되어 있는 기기, 그리고 어떤 게임 플러그인을 사용합니다.

-

이 플러그인은 아직 해킹되지 않은 기기로 해킹된 WiFi 프로필을 설치 할 페이로드를 전송합니다.

-

그 후, 시스템 복구 모드, SAFE_MODE를 사용해 인터넷 설정을 활용화 시킵니다.

-

kartdlphax와 unSAFE_MODE의 더 자세한 설명은 다음 (영어) 페이지를 참고해 주세요: kartdlphax, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### 호환성 안내 diff --git a/_pages/ko_KR/installing-boot9strap-(soundhax).txt b/_pages/ko_KR/installing-boot9strap-(soundhax).txt index 18afd28117..558f4144e0 100644 --- a/_pages/ko_KR/installing-boot9strap-(soundhax).txt +++ b/_pages/ko_KR/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "boot9strap 설치 (Soundhax)" {% include toc title="목차" %} -
+{% capture technical_info %} 기술적 상세 정보 (선택 사항) -

이 페이지에 사용되는 익스플로잇에 자세한 설명은 여기 (Soundhax) 하고 여기 (universal-otherapp) (영어) 페이지를 참고해 주세요.

-
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### 호환성 안내 diff --git a/_pages/ko_KR/installing-boot9strap-(ssloth-browser).txt b/_pages/ko_KR/installing-boot9strap-(ssloth-browser).txt index 358a6d38f8..bd3626a292 100644 --- a/_pages/ko_KR/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/ko_KR/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "boot9strap 설치 (SSLoth-Browser)" {% include toc title="목차" %} -
+{% capture technical_info %} 기술적 상세 정보 (선택 사항) -

브라우저 앱을 해킹하기 위해서는, 최신 버전으로의 시스템 업데이트 없이 브라우저 앱을 이용하지 못하게 하는 버전 확인 과정을 건너뛰어야 합니다.

-

이러한 확인을 SSLoth 익스플로잇의 도움을 받아 건너뛸 수 있는 프록시 서버가 있습니다.

-

확인을 건너뛴 후, 나머지 작업을 진행하게 될 익스플로잇 사이트가 준비되어 있습니다.

-

이 페이지에 사용되는 익스플로잇에 자세한 설명은 여기 (SSLoth) 하고 여기 (universal-otherapp) (영어) 페이지를 참고해 주세요.

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### 호환성 안내 diff --git a/_pages/ko_KR/installing-boot9strap-(usm).txt b/_pages/ko_KR/installing-boot9strap-(usm).txt index 0676423b55..c758d61128 100644 --- a/_pages/ko_KR/installing-boot9strap-(usm).txt +++ b/_pages/ko_KR/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "boot9strap 설치 (USM)" {% include toc title="목차" %} -
+{% capture technical_info %} 기술적 상세 정보 (선택 사항) -

SAFE_MODE 펌웨어를 해킹하기 위해, 익스플로잇이 되어있는 Wi-Fi 프로필을 설치해야 합니다.

-

이미 존재하는 BannerBomb3 익스플로잇을 사용해 이걸 할 수 있습니다.

-

이것은 시스템의 암호화 키 (movable.sed)를 이용해 DSiWare 백업을 만들고, 이걸 사용해 인터넷 설정에 익스플로잇을 설치할 수 있도록 만듭니다.

-

그 후, 시스템 복구 모드, SAFE_MODE를 사용해 인터넷 설정을 활용화 시킵니다.

-

BannerBomb3와 unSAFE_MODE의 더 자세한 설명은 다음 (영어) 페이지를 참고해 주세요: BannerBomb3, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### 호환성 안내 diff --git a/_pages/ko_KR/seedminer.txt b/_pages/ko_KR/seedminer.txt index db2700bd36..eadd0962b5 100644 --- a/_pages/ko_KR/seedminer.txt +++ b/_pages/ko_KR/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title="목차" %} -
+{% capture technical_info %} 기술적 상세 정보 (선택 사항) -

boot9Strap을 설치하려면 우선 각 기기의 고유 암호화 키를 알아내야합니다. 그러기 위해서 이 가이드에서는 Seedminer을 사용해 그 암호화 키 (movable.sed) 를 계산해낼 것입니다.

-

Seedminer에 자세한 설명을 보고 싶다면, 이 프레젠테이션 (영어)을 참고해 주세요.

-

이 방법은 원래 혼자 할 경우 강력한 계산력을 가진 그래픽카드를 사용해야 합니다. 이 가이드에서는 다른 사람들이 기부하는 계산력을 제공하는 웹사이트를 사용할 것입니다.

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### 섹션 I - 준비 작업 diff --git a/_pages/ko_KR/troubleshooting.txt b/_pages/ko_KR/troubleshooting.txt index 6382f19084..342d5a0cee 100644 --- a/_pages/ko_KR/troubleshooting.txt +++ b/_pages/ko_KR/troubleshooting.txt @@ -70,7 +70,7 @@ title: "문제 해결" `00000001.sav` 또는 `otherapp.bin` 파일이 잘못 들어갔습니다. `00000000.sav`가 `Nintendo 3DS` -> `` -> `` -> `title` -> `00004000` -> 0017c100` -> `data` 안에 있고 `otherapp.bin`이 SD카드 최상위 디렉토리에 있는지 다시 한 번 확인해주세요. -만약 위치가 정확하다면, [PicHaxx Save Tool](https://3dstools.nhnarwhal.com/#/pichaxx)을 이용해 세이브를 다시 생성한 후, `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `0017c100` -> `data` 폴더 안에 다시 복사해주세요. 반드시 파일의 이름이 `00000001.sav`이고 기기의 `movable.sed`를 이용해야 합니다. Re-download the latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest), place the `.bin` file relevant to your console from the `otherapps_with_CfgS` folder to the root of your SD card, and rename it to `otherapp.bin`. `.bin` 확장자는 보이지 않는 이상 추가하지 말아 주세요. +만약 위치가 정확하다면, [PicHaxx Save Tool](https://3dstools.nhnarwhal.com/#/pichaxx)을 이용해 세이브를 다시 생성한 후, `Nintendo 3DS` -> `` -> `` -> `title` -> `00040000` -> `0017c100` -> `data` 폴더 안에 다시 복사해주세요. 반드시 파일의 이름이 `00000001.sav`이고 기기의 `movable.sed`를 이용해야 합니다. 최신 버전의 [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest)를 다시 다운받아, `otherapps_with_CfgS` 폴더 안에 있는 기기에 맞는 `.bin` 파일을 SD 카드의 최상위 디렉토리로 복사해 `otherapp.bin`으로 이름을 변경해주세요. `.bin` 확장자는 보이지 않는 이상 추가하지 말아 주세요. ### Picross 열을 시 "An exception occurred" or Errdisp diff --git a/_pages/ms_MY/bannerbomb3.txt b/_pages/ms_MY/bannerbomb3.txt index 1fc4767ffd..fc45f96824 100644 --- a/_pages/ms_MY/bannerbomb3.txt +++ b/_pages/ms_MY/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

-

For a more technical explanation, see here.

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ms_MY/homebrew-launcher-(pichaxx).txt b/_pages/ms_MY/homebrew-launcher-(pichaxx).txt index b4dc206763..301488c3cd 100644 --- a/_pages/ms_MY/homebrew-launcher-(pichaxx).txt +++ b/_pages/ms_MY/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ms_MY/installing-boot9strap-(fredtool).txt b/_pages/ms_MY/installing-boot9strap-(fredtool).txt index 021b023546..8aa86d2407 100644 --- a/_pages/ms_MY/installing-boot9strap-(fredtool).txt +++ b/_pages/ms_MY/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### What You Need diff --git a/_pages/ms_MY/installing-boot9strap-(hardmod).txt b/_pages/ms_MY/installing-boot9strap-(hardmod).txt index 5f010a00a9..32e573918f 100644 --- a/_pages/ms_MY/installing-boot9strap-(hardmod).txt +++ b/_pages/ms_MY/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "Installing boot9strap (Hardmod)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

An excellent guide to getting a hardmod can be found here.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-

Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console.

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ms_MY/installing-boot9strap-(hbl-usm).txt b/_pages/ms_MY/installing-boot9strap-(hbl-usm).txt index 592590bca3..091ea4fd61 100644 --- a/_pages/ms_MY/installing-boot9strap-(hbl-usm).txt +++ b/_pages/ms_MY/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

As we already have Homebrew access, we can use slotTool to do this.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ms_MY/installing-boot9strap-(kartdlphax).txt b/_pages/ms_MY/installing-boot9strap-(kartdlphax).txt index bcd398f0ac..f22d1af044 100644 --- a/_pages/ms_MY/installing-boot9strap-(kartdlphax).txt +++ b/_pages/ms_MY/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (kartdlphax)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin.

-

This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: kartdlphax, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ms_MY/installing-boot9strap-(soundhax).txt b/_pages/ms_MY/installing-boot9strap-(soundhax).txt index 67704e5aeb..8ca5a916c7 100644 --- a/_pages/ms_MY/installing-boot9strap-(soundhax).txt +++ b/_pages/ms_MY/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

-
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ms_MY/installing-boot9strap-(ssloth-browser).txt b/_pages/ms_MY/installing-boot9strap-(ssloth-browser).txt index fe795316a9..51ad3579db 100644 --- a/_pages/ms_MY/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/ms_MY/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (SSLoth-Browser)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version.

-

A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check.

-

Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job.

-

For technical details on the exploits that you will be using on this page, see here (SSLoth) and here (universal-otherapp).

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ms_MY/installing-boot9strap-(usm).txt b/_pages/ms_MY/installing-boot9strap-(usm).txt index 936c803d35..57a1234e35 100644 --- a/_pages/ms_MY/installing-boot9strap-(usm).txt +++ b/_pages/ms_MY/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (USM)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

We can do this using an existing exploit, BannerBomb3.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ms_MY/seedminer.txt b/_pages/ms_MY/seedminer.txt index fd720a2bd8..0256c620f9 100644 --- a/_pages/ms_MY/seedminer.txt +++ b/_pages/ms_MY/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

-

For information on how Seedminer works, see this presentation.

-

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Section I - Prep Work diff --git a/_pages/nl_NL/bannerbomb3.txt b/_pages/nl_NL/bannerbomb3.txt index 9ef5f93a25..4a97296925 100644 --- a/_pages/nl_NL/bannerbomb3.txt +++ b/_pages/nl_NL/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title="Inhoudsopgave" %} -
+{% capture technical_info %} Technical Details (optional) -

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

-

For a more technical explanation, see here.

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/nl_NL/homebrew-launcher-(pichaxx).txt b/_pages/nl_NL/homebrew-launcher-(pichaxx).txt index 95cfed4b8c..3dd897435c 100644 --- a/_pages/nl_NL/homebrew-launcher-(pichaxx).txt +++ b/_pages/nl_NL/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Inhoudsopgave" %} -
+{% capture technical_info %} Technical Details (optional) -This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/nl_NL/installing-boot9strap-(fredtool).txt b/_pages/nl_NL/installing-boot9strap-(fredtool).txt index a355bda1d9..417bc70fec 100644 --- a/_pages/nl_NL/installing-boot9strap-(fredtool).txt +++ b/_pages/nl_NL/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Inhoudsopgave" %} -
+{% capture technical_info %} Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Wat je nodig hebt diff --git a/_pages/nl_NL/installing-boot9strap-(hardmod).txt b/_pages/nl_NL/installing-boot9strap-(hardmod).txt index b29dce67b3..d857c3ab4b 100644 --- a/_pages/nl_NL/installing-boot9strap-(hardmod).txt +++ b/_pages/nl_NL/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "boot9strap installeren (Hardmod)" {% include toc title="Inhoudsopgave" %} -
+{% capture technical_info %} Technical Details (optional) -

An excellent guide to getting a hardmod can be found here.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-

Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console.

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/nl_NL/installing-boot9strap-(hbl-usm).txt b/_pages/nl_NL/installing-boot9strap-(hbl-usm).txt index 640e6c6329..9d93495500 100644 --- a/_pages/nl_NL/installing-boot9strap-(hbl-usm).txt +++ b/_pages/nl_NL/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Inhoudsopgave" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

As we already have Homebrew access, we can use slotTool to do this.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/nl_NL/installing-boot9strap-(kartdlphax).txt b/_pages/nl_NL/installing-boot9strap-(kartdlphax).txt index 547010bab8..3c2411bfaf 100644 --- a/_pages/nl_NL/installing-boot9strap-(kartdlphax).txt +++ b/_pages/nl_NL/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "Boot9strap installeren (kartdlphax)" {% include toc title="Inhoudsopgave" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin.

-

This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: kartdlphax, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/nl_NL/installing-boot9strap-(soundhax).txt b/_pages/nl_NL/installing-boot9strap-(soundhax).txt index 871001822f..6c0299bfec 100644 --- a/_pages/nl_NL/installing-boot9strap-(soundhax).txt +++ b/_pages/nl_NL/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "Boot9strap installeren (Soundhax)" {% include toc title="Inhoudsopgave" %} -
+{% capture technical_info %} Technical Details (optional) -

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

-
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/nl_NL/installing-boot9strap-(ssloth-browser).txt b/_pages/nl_NL/installing-boot9strap-(ssloth-browser).txt index a44c10d5ae..c2b94f0ab0 100644 --- a/_pages/nl_NL/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/nl_NL/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (SSLoth-Browser)" {% include toc title="Inhoudsopgave" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version.

-

A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check.

-

Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job.

-

For technical details on the exploits that you will be using on this page, see here (SSLoth) and here (universal-otherapp).

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/nl_NL/installing-boot9strap-(usm).txt b/_pages/nl_NL/installing-boot9strap-(usm).txt index 4d1705313d..2abc652472 100644 --- a/_pages/nl_NL/installing-boot9strap-(usm).txt +++ b/_pages/nl_NL/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "Boot9strap installeren (USM)" {% include toc title="Inhoudsopgave" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

We can do this using an existing exploit, BannerBomb3.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/nl_NL/seedminer.txt b/_pages/nl_NL/seedminer.txt index fbb553e71f..c6a0fa4716 100644 --- a/_pages/nl_NL/seedminer.txt +++ b/_pages/nl_NL/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title="Inhoudsopgave" %} -
+{% capture technical_info %} Technical Details (optional) -

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

-

For information on how Seedminer works, see this presentation.

-

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Section I - Prep Work diff --git a/_pages/no_NO/bannerbomb3.txt b/_pages/no_NO/bannerbomb3.txt index 55450a9133..000dc71df3 100644 --- a/_pages/no_NO/bannerbomb3.txt +++ b/_pages/no_NO/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

-

For a more technical explanation, see here.

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/no_NO/homebrew-launcher-(pichaxx).txt b/_pages/no_NO/homebrew-launcher-(pichaxx).txt index 96069894b0..c72687aeca 100644 --- a/_pages/no_NO/homebrew-launcher-(pichaxx).txt +++ b/_pages/no_NO/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/no_NO/installing-boot9strap-(fredtool).txt b/_pages/no_NO/installing-boot9strap-(fredtool).txt index 4193b2c036..ad578552ed 100644 --- a/_pages/no_NO/installing-boot9strap-(fredtool).txt +++ b/_pages/no_NO/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### What You Need diff --git a/_pages/no_NO/installing-boot9strap-(hardmod).txt b/_pages/no_NO/installing-boot9strap-(hardmod).txt index 96a64d9f54..7d565e46af 100644 --- a/_pages/no_NO/installing-boot9strap-(hardmod).txt +++ b/_pages/no_NO/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "Installing boot9strap (Hardmod)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

An excellent guide to getting a hardmod can be found here.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-

Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console.

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/no_NO/installing-boot9strap-(hbl-usm).txt b/_pages/no_NO/installing-boot9strap-(hbl-usm).txt index 6523c7d937..4e29d44f5e 100644 --- a/_pages/no_NO/installing-boot9strap-(hbl-usm).txt +++ b/_pages/no_NO/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

As we already have Homebrew access, we can use slotTool to do this.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/no_NO/installing-boot9strap-(kartdlphax).txt b/_pages/no_NO/installing-boot9strap-(kartdlphax).txt index cec19c24f6..cb3226390a 100644 --- a/_pages/no_NO/installing-boot9strap-(kartdlphax).txt +++ b/_pages/no_NO/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (kartdlphax)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin.

-

This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: kartdlphax, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/no_NO/installing-boot9strap-(soundhax).txt b/_pages/no_NO/installing-boot9strap-(soundhax).txt index c2282e1185..53252314da 100644 --- a/_pages/no_NO/installing-boot9strap-(soundhax).txt +++ b/_pages/no_NO/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

-
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/no_NO/installing-boot9strap-(ssloth-browser).txt b/_pages/no_NO/installing-boot9strap-(ssloth-browser).txt index e7222babb2..6090a88199 100644 --- a/_pages/no_NO/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/no_NO/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (SSLoth-Browser)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version.

-

A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check.

-

Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job.

-

For technical details on the exploits that you will be using on this page, see here (SSLoth) and here (universal-otherapp).

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/no_NO/installing-boot9strap-(usm).txt b/_pages/no_NO/installing-boot9strap-(usm).txt index 91433d9c9f..f0fe243fa2 100644 --- a/_pages/no_NO/installing-boot9strap-(usm).txt +++ b/_pages/no_NO/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (USM)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

We can do this using an existing exploit, BannerBomb3.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/no_NO/seedminer.txt b/_pages/no_NO/seedminer.txt index 68ac4e7e0d..159b7c5bff 100644 --- a/_pages/no_NO/seedminer.txt +++ b/_pages/no_NO/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

-

For information on how Seedminer works, see this presentation.

-

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Section I - Prep Work diff --git a/_pages/pl_PL/bannerbomb3.txt b/_pages/pl_PL/bannerbomb3.txt index 86e345eec6..698c30a2ab 100644 --- a/_pages/pl_PL/bannerbomb3.txt +++ b/_pages/pl_PL/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title="Spis Treści" %} -
+{% capture technical_info %} Technical Details (optional) -

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

-

For a more technical explanation, see here.

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/pl_PL/homebrew-launcher-(pichaxx).txt b/_pages/pl_PL/homebrew-launcher-(pichaxx).txt index 9ab3eceadd..38c064c6a7 100644 --- a/_pages/pl_PL/homebrew-launcher-(pichaxx).txt +++ b/_pages/pl_PL/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Spis Treści" %} -
+{% capture technical_info %} Technical Details (optional) -This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/pl_PL/installing-boot9strap-(fredtool).txt b/_pages/pl_PL/installing-boot9strap-(fredtool).txt index 81d3dcb6f2..74b0dbbdb1 100644 --- a/_pages/pl_PL/installing-boot9strap-(fredtool).txt +++ b/_pages/pl_PL/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Spis Treści" %} -
+{% capture technical_info %} Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Czego Potrzebujesz diff --git a/_pages/pl_PL/installing-boot9strap-(hardmod).txt b/_pages/pl_PL/installing-boot9strap-(hardmod).txt index 24f6e3984a..d95c481bf9 100644 --- a/_pages/pl_PL/installing-boot9strap-(hardmod).txt +++ b/_pages/pl_PL/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "Instalacja boot9strap (Hardmod)" {% include toc title="Spis Treści" %} -
+{% capture technical_info %} Technical Details (optional) -

An excellent guide to getting a hardmod can be found here.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-

Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console.

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/pl_PL/installing-boot9strap-(hbl-usm).txt b/_pages/pl_PL/installing-boot9strap-(hbl-usm).txt index 5600754916..3aedc6c7ec 100644 --- a/_pages/pl_PL/installing-boot9strap-(hbl-usm).txt +++ b/_pages/pl_PL/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Spis Treści" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

As we already have Homebrew access, we can use slotTool to do this.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/pl_PL/installing-boot9strap-(kartdlphax).txt b/_pages/pl_PL/installing-boot9strap-(kartdlphax).txt index af6257f4f2..5ea572b9af 100644 --- a/_pages/pl_PL/installing-boot9strap-(kartdlphax).txt +++ b/_pages/pl_PL/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (kartdlphax)" {% include toc title="Spis Treści" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin.

-

This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: kartdlphax, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/pl_PL/installing-boot9strap-(soundhax).txt b/_pages/pl_PL/installing-boot9strap-(soundhax).txt index e318b4218e..4ca6dfbf3e 100644 --- a/_pages/pl_PL/installing-boot9strap-(soundhax).txt +++ b/_pages/pl_PL/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "Instalacja boot9strap (Soundhax)" {% include toc title="Spis Treści" %} -
+{% capture technical_info %} Technical Details (optional) -

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

-
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/pl_PL/installing-boot9strap-(ssloth-browser).txt b/_pages/pl_PL/installing-boot9strap-(ssloth-browser).txt index 5a2683f937..92d4ad0cb1 100644 --- a/_pages/pl_PL/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/pl_PL/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (SSLoth-Browser)" {% include toc title="Spis Treści" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version.

-

A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check.

-

Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job.

-

For technical details on the exploits that you will be using on this page, see here (SSLoth) and here (universal-otherapp).

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/pl_PL/installing-boot9strap-(usm).txt b/_pages/pl_PL/installing-boot9strap-(usm).txt index e5bd9eb17c..6c3738dd7a 100644 --- a/_pages/pl_PL/installing-boot9strap-(usm).txt +++ b/_pages/pl_PL/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (USM)" {% include toc title="Spis Treści" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

We can do this using an existing exploit, BannerBomb3.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/pl_PL/seedminer.txt b/_pages/pl_PL/seedminer.txt index 3647b2f8ab..e89b8a7446 100644 --- a/_pages/pl_PL/seedminer.txt +++ b/_pages/pl_PL/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title="Spis Treści" %} -
+{% capture technical_info %} Technical Details (optional) -

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

-

For information on how Seedminer works, see this presentation.

-

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Section I - Prep Work diff --git a/_pages/pt_BR/bannerbomb3.txt b/_pages/pt_BR/bannerbomb3.txt index 8ec1efe8e1..f2ac5ea2e9 100644 --- a/_pages/pt_BR/bannerbomb3.txt +++ b/_pages/pt_BR/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title="Tabela de Conteúdo" %} -
+{% capture technical_info %} Detalhes técnicos (opcional) -

Para iniciar o código personalizado, exploramos uma falha na janela de Gerenciamento de Dados DSiWare do aplicativo Configurações do Sistema.

-

Para fazer isso, usamos a chave de criptografia do seu sistema (movable.sed) para construir um backup de DSiWare que faz exploit do sistema.

-

Para obter uma explicação mais técnica, consulte aqui.

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### Notas de Compatibilidade diff --git a/_pages/pt_BR/homebrew-launcher-(pichaxx).txt b/_pages/pt_BR/homebrew-launcher-(pichaxx).txt index 577232efe6..6b32078e57 100644 --- a/_pages/pt_BR/homebrew-launcher-(pichaxx).txt +++ b/_pages/pt_BR/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Tabela de Conteúdo" %} -
+{% capture technical_info %} Detalhes técnicos (opcional) -Este método de usar o Seedminer para exploiting adicional usa seu arquivo movable.sed para escrever um arquivo de save personalizado para Pokémon Picross, que pode então ser usado com unSAFE_MODE (via Homebrew Launcher) para executar SafeB9SInstaller. Para obter informações sobre o próprio PicHaxx, consulte aqui. -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Notas de Compatibilidade diff --git a/_pages/pt_BR/installing-boot9strap-(fredtool).txt b/_pages/pt_BR/installing-boot9strap-(fredtool).txt index b250518668..2cf0e29db4 100644 --- a/_pages/pt_BR/installing-boot9strap-(fredtool).txt +++ b/_pages/pt_BR/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "Instalando boot9strap (Fredtool)" {% include toc title="Tabela de Conteúdo" %} -
+{% capture technical_info %} Detalhes técnicos (opcional) -

Este método de usar o Seedminer para exploiting usa seu arquivo `movable.sed` para descriptografar qualquer aplicativo DSiWare para fins de injetar um título de DSiWare exploitable nas Configurações de Internet do DS.

-

Esta é uma implementação atualmente funcional do exploit "FIRM partitions known-plaintext" detalhado aqui.

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### O que é necessário diff --git a/_pages/pt_BR/installing-boot9strap-(hardmod).txt b/_pages/pt_BR/installing-boot9strap-(hardmod).txt index f30048ac9a..ebb6e3bd7e 100644 --- a/_pages/pt_BR/installing-boot9strap-(hardmod).txt +++ b/_pages/pt_BR/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "Instalando boot9strap (Hardmod)" {% include toc title="Tabela de Conteúdo" %} -
+{% capture technical_info %} Detalhes técnicos (opcional) -

Um excelente guia para hardmod pode ser encontrado aqui.

-

Esta é uma implementação atualmente funcional do exploit "FIRM partitions known-plaintext" detalhado aqui.

-

Usando um hardmod, podemos fazer um dump da imagem da NAND, instalar custom firmware para a imagem da NAND, então reinstalar a imagem da NAND hackeada no console.

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Notas de Compatibilidade diff --git a/_pages/pt_BR/installing-boot9strap-(hbl-usm).txt b/_pages/pt_BR/installing-boot9strap-(hbl-usm).txt index 29114b2b96..919cac3bc2 100644 --- a/_pages/pt_BR/installing-boot9strap-(hbl-usm).txt +++ b/_pages/pt_BR/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "Instalando boot9strap (HBL-USM)" {% include toc title="Tabela de Conteúdo" %} -
+{% capture technical_info %} Detalhes técnicos (opcional) -

Para explorar o firmware SAFE_MODE do nosso sistema, precisamos injetar um perfil de WiFi com exploit.

-

Como já temos acesso a Homebrew, podemos usar slotTool para fazer isso.

-

Assim que o perfil WiFi for injetado, usaremos o SAFE_MODE, que é um recurso de recuperação presente em todos os consoles 3DS, para ativar o perfil de Wi-Fi com exploit.

-

Para obter mais uma explicação técnica, consulte aqui para obter informações sobre o exploit unSAFE_MODE

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Notas de Compatibilidade diff --git a/_pages/pt_BR/installing-boot9strap-(kartdlphax).txt b/_pages/pt_BR/installing-boot9strap-(kartdlphax).txt index 7d740e780f..3d081b504d 100644 --- a/_pages/pt_BR/installing-boot9strap-(kartdlphax).txt +++ b/_pages/pt_BR/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "Instalando boot9strap (kartdlphax)" {% include toc title="Tabela de Conteúdo" %} -
+{% capture technical_info %} Detalhes técnicos (opcional) -

Para explorar o firmware SAFE_MODE do nosso sistema, precisamos injetar um perfil de WiFi com exploit.

-

Para fazer isso, podemos usar a funcionalidade Download Play do jogo Mario Kart 7, usando um 3DS com custom firmware já instalado junto com um plugin personalizado de jogo.

-

Este plugin personalizado enviará um payload com hack para um console sem hack, que depois faz exploit do sistema para injetar o perfil WiFi exploited na sua lista de conexões.

-

Assim que o perfil WiFi for injetado, usaremos o SAFE_MODE, que é um recurso de recuperação presente em todos os consoles 3DS, para ativar o perfil de Wi-Fi com exploit.

-

Para uma explicação mais técnica, veja os seguintes links para informações sobre os exploits kartdlphax e unSAFE_MODE: kartdlphax, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Notas de Compatibilidade diff --git a/_pages/pt_BR/installing-boot9strap-(soundhax).txt b/_pages/pt_BR/installing-boot9strap-(soundhax).txt index 3c9a0ec808..fee79812ad 100644 --- a/_pages/pt_BR/installing-boot9strap-(soundhax).txt +++ b/_pages/pt_BR/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "Instalando boot9strap (Soundhax)" {% include toc title="Tabela de Conteúdo" %} -
+{% capture technical_info %} Detalhes técnicos (opcional) -

Para detalhes técnicos sobre os exploits que você usará nesta página veja aqui (Soundhax) e aqui (universal-otherapp).

-
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Notas de Compatibilidade diff --git a/_pages/pt_BR/installing-boot9strap-(ssloth-browser).txt b/_pages/pt_BR/installing-boot9strap-(ssloth-browser).txt index 44d548e00d..4c61a614c8 100644 --- a/_pages/pt_BR/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/pt_BR/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "Instalando boot9strap (SSLoth-Browser)" {% include toc title="Tabela de Conteúdo" %} -
+{% capture technical_info %} Detalhes técnicos (opcional) -

Para explorar o aplicativo do navegador, precisamos ignorar a verificação da versão do navegador, que é projetado para impedir o uso do navegador sem atualizar para a versão mais recente do sistema.

-

Um servidor proxy público está disponível, o que, com a ajuda do exploit SSLoth, pode ignorar esta verificação.

-

Uma vez que o desvio estiver ativo, será acessível uma página de exploit que fará o restante do trabalho.

-

Para detalhes técnicos sobre os exploits que você usará nesta página veja aqui (SSLoth) e aqui (universal-otherapp).

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Notas de Compatibilidade diff --git a/_pages/pt_BR/installing-boot9strap-(usm).txt b/_pages/pt_BR/installing-boot9strap-(usm).txt index 41086044a7..4d1183d1b5 100644 --- a/_pages/pt_BR/installing-boot9strap-(usm).txt +++ b/_pages/pt_BR/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "Instalando boot9strap (USM)" {% include toc title="Tabela de Conteúdo" %} -
+{% capture technical_info %} Detalhes técnicos (opcional) -

Para explorar o firmware SAFE_MODE do nosso sistema, precisamos injetar um perfil de WiFi com exploit.

-

Podemos fazer isso usando um exploit existente, BannerBomb3.

-

Para fazer isso, usamos a chave de criptografia do seu sistema (movable.sed) para construir um backup de DSiWare que faz exploit no sistema para injetar o perfil Wi-Fi exploited na sua lista de conexões.

-

Assim que o perfil WiFi for injetado, usaremos o SAFE_MODE, que é um recurso de recuperação presente em todos os consoles 3DS, para ativar o perfil de Wi-Fi com exploit.

-

Para uma explicação mais técnica, veja os seguintes links para informações sobre as características do BannerBomb3 e unSAFE_MODE: BannerBomb3, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Notas de Compatibilidade diff --git a/_pages/pt_BR/seedminer.txt b/_pages/pt_BR/seedminer.txt index 672b708c2b..fa5655dffc 100644 --- a/_pages/pt_BR/seedminer.txt +++ b/_pages/pt_BR/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title="Tabela de Conteúdo" %} -
+{% capture technical_info %} Detalhes técnicos (opcional) -

Para instalar o boot9strap em seu dispositivo, nós derivamos a chave de criptografia exclusiva do seu dispositivo. Para fazer isso, usamos uma ferramenta chamada Seedminer para calcular a chave de criptografia de dados (movable.sed) do seu dispositivo.

-

Para informações sobre como Seedminer funciona, veja esta apresentação.

-

Este método usa uma placa de vídeo poderosa para realizar os cálculos necessários. Um site de execução voluntária é usado para a finalidade de ajudá-lo com este método.

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Seção I - Preparação diff --git a/_pages/pt_PT/bannerbomb3.txt b/_pages/pt_PT/bannerbomb3.txt index d2c19abf2f..c39606973e 100644 --- a/_pages/pt_PT/bannerbomb3.txt +++ b/_pages/pt_PT/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

-

For a more technical explanation, see here.

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/pt_PT/homebrew-launcher-(pichaxx).txt b/_pages/pt_PT/homebrew-launcher-(pichaxx).txt index 8395805ef0..e75f6b91ea 100644 --- a/_pages/pt_PT/homebrew-launcher-(pichaxx).txt +++ b/_pages/pt_PT/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/pt_PT/installing-boot9strap-(fredtool).txt b/_pages/pt_PT/installing-boot9strap-(fredtool).txt index 9b389ee19f..fab9a050c7 100644 --- a/_pages/pt_PT/installing-boot9strap-(fredtool).txt +++ b/_pages/pt_PT/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### What You Need diff --git a/_pages/pt_PT/installing-boot9strap-(hardmod).txt b/_pages/pt_PT/installing-boot9strap-(hardmod).txt index 4f0888d535..3455b87ff5 100644 --- a/_pages/pt_PT/installing-boot9strap-(hardmod).txt +++ b/_pages/pt_PT/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "Installing boot9strap (Hardmod)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

An excellent guide to getting a hardmod can be found here.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-

Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console.

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/pt_PT/installing-boot9strap-(hbl-usm).txt b/_pages/pt_PT/installing-boot9strap-(hbl-usm).txt index 65bcd5f692..a24b979948 100644 --- a/_pages/pt_PT/installing-boot9strap-(hbl-usm).txt +++ b/_pages/pt_PT/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

As we already have Homebrew access, we can use slotTool to do this.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/pt_PT/installing-boot9strap-(kartdlphax).txt b/_pages/pt_PT/installing-boot9strap-(kartdlphax).txt index a795051412..ef9b29e969 100644 --- a/_pages/pt_PT/installing-boot9strap-(kartdlphax).txt +++ b/_pages/pt_PT/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (kartdlphax)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin.

-

This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: kartdlphax, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/pt_PT/installing-boot9strap-(soundhax).txt b/_pages/pt_PT/installing-boot9strap-(soundhax).txt index 81aff24d34..83c6a4f8b3 100644 --- a/_pages/pt_PT/installing-boot9strap-(soundhax).txt +++ b/_pages/pt_PT/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

-
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/pt_PT/installing-boot9strap-(ssloth-browser).txt b/_pages/pt_PT/installing-boot9strap-(ssloth-browser).txt index 016c43be0c..07bbb76a27 100644 --- a/_pages/pt_PT/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/pt_PT/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (SSLoth-Browser)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version.

-

A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check.

-

Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job.

-

For technical details on the exploits that you will be using on this page, see here (SSLoth) and here (universal-otherapp).

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/pt_PT/installing-boot9strap-(usm).txt b/_pages/pt_PT/installing-boot9strap-(usm).txt index 58be815045..354ab00213 100644 --- a/_pages/pt_PT/installing-boot9strap-(usm).txt +++ b/_pages/pt_PT/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (USM)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

We can do this using an existing exploit, BannerBomb3.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/pt_PT/seedminer.txt b/_pages/pt_PT/seedminer.txt index b6d7e339df..21f019b371 100644 --- a/_pages/pt_PT/seedminer.txt +++ b/_pages/pt_PT/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

-

For information on how Seedminer works, see this presentation.

-

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Section I - Prep Work diff --git a/_pages/ro_RO/bannerbomb3.txt b/_pages/ro_RO/bannerbomb3.txt index 3a85ccd445..82e50c6ca0 100644 --- a/_pages/ro_RO/bannerbomb3.txt +++ b/_pages/ro_RO/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title="Cuprins" %} -
+{% capture technical_info %} Technical Details (optional) -

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

-

For a more technical explanation, see here.

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ro_RO/homebrew-launcher-(pichaxx).txt b/_pages/ro_RO/homebrew-launcher-(pichaxx).txt index 7137b023e4..e3f420281f 100644 --- a/_pages/ro_RO/homebrew-launcher-(pichaxx).txt +++ b/_pages/ro_RO/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Cuprins" %} -
+{% capture technical_info %} Technical Details (optional) -This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ro_RO/installing-boot9strap-(fredtool).txt b/_pages/ro_RO/installing-boot9strap-(fredtool).txt index 5910347456..d10669a414 100644 --- a/_pages/ro_RO/installing-boot9strap-(fredtool).txt +++ b/_pages/ro_RO/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Cuprins" %} -
+{% capture technical_info %} Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Ce aveți nevoie diff --git a/_pages/ro_RO/installing-boot9strap-(hardmod).txt b/_pages/ro_RO/installing-boot9strap-(hardmod).txt index a9fb234def..ed7a372cbc 100644 --- a/_pages/ro_RO/installing-boot9strap-(hardmod).txt +++ b/_pages/ro_RO/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "Instalând boot9strap (Hardmod)" # {% include toc title="Cuprins" %} -
+{% capture technical_info %} Technical Details (optional) -

An excellent guide to getting a hardmod can be found here.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-

Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console.

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ro_RO/installing-boot9strap-(hbl-usm).txt b/_pages/ro_RO/installing-boot9strap-(hbl-usm).txt index 6278f4bef2..acbb12b009 100644 --- a/_pages/ro_RO/installing-boot9strap-(hbl-usm).txt +++ b/_pages/ro_RO/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Cuprins" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

As we already have Homebrew access, we can use slotTool to do this.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ro_RO/installing-boot9strap-(kartdlphax).txt b/_pages/ro_RO/installing-boot9strap-(kartdlphax).txt index 4fcca7efbe..f6699807cb 100644 --- a/_pages/ro_RO/installing-boot9strap-(kartdlphax).txt +++ b/_pages/ro_RO/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (kartdlphax)" {% include toc title="Cuprins" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin.

-

This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: kartdlphax, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ro_RO/installing-boot9strap-(soundhax).txt b/_pages/ro_RO/installing-boot9strap-(soundhax).txt index c44d485099..8b5d0cc75c 100644 --- a/_pages/ro_RO/installing-boot9strap-(soundhax).txt +++ b/_pages/ro_RO/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "Instalând boot9strap (Soundhax)" {% include toc title="Cuprins" %} -
+{% capture technical_info %} Technical Details (optional) -

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

-
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ro_RO/installing-boot9strap-(ssloth-browser).txt b/_pages/ro_RO/installing-boot9strap-(ssloth-browser).txt index bafdc5e660..3a6139d9c4 100644 --- a/_pages/ro_RO/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/ro_RO/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (SSLoth-Browser)" {% include toc title="Cuprins" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version.

-

A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check.

-

Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job.

-

For technical details on the exploits that you will be using on this page, see here (SSLoth) and here (universal-otherapp).

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ro_RO/installing-boot9strap-(usm).txt b/_pages/ro_RO/installing-boot9strap-(usm).txt index c74eb648ff..9bf1c43f4d 100644 --- a/_pages/ro_RO/installing-boot9strap-(usm).txt +++ b/_pages/ro_RO/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (USM)" {% include toc title="Cuprins" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

We can do this using an existing exploit, BannerBomb3.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ro_RO/seedminer.txt b/_pages/ro_RO/seedminer.txt index 0210f94eea..fb1e25b372 100644 --- a/_pages/ro_RO/seedminer.txt +++ b/_pages/ro_RO/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title="Cuprins" %} -
+{% capture technical_info %} Technical Details (optional) -

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

-

For information on how Seedminer works, see this presentation.

-

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Section I - Prep Work diff --git a/_pages/ru_RU/bannerbomb3.txt b/_pages/ru_RU/bannerbomb3.txt index c61f3f49f3..f20f97f529 100644 --- a/_pages/ru_RU/bannerbomb3.txt +++ b/_pages/ru_RU/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title="Содержание" %} -
+{% capture technical_info %} Technical Details (optional) -

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

-

For a more technical explanation, see here.

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ru_RU/homebrew-launcher-(pichaxx).txt b/_pages/ru_RU/homebrew-launcher-(pichaxx).txt index 61840d74da..b6c96d4dc4 100644 --- a/_pages/ru_RU/homebrew-launcher-(pichaxx).txt +++ b/_pages/ru_RU/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Содержание" %} -
+{% capture technical_info %} Technical Details (optional) -This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ru_RU/installing-boot9strap-(fredtool).txt b/_pages/ru_RU/installing-boot9strap-(fredtool).txt index 5ebba74493..f4eb04f7fe 100644 --- a/_pages/ru_RU/installing-boot9strap-(fredtool).txt +++ b/_pages/ru_RU/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Содержание" %} -
+{% capture technical_info %} Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Что понадобится diff --git a/_pages/ru_RU/installing-boot9strap-(hardmod).txt b/_pages/ru_RU/installing-boot9strap-(hardmod).txt index 0739126424..872052b305 100644 --- a/_pages/ru_RU/installing-boot9strap-(hardmod).txt +++ b/_pages/ru_RU/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "Установка boot9strap (Hardmod)" {% include toc title="Содержание" %} -
+{% capture technical_info %} Technical Details (optional) -

An excellent guide to getting a hardmod can be found here.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-

Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console.

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ru_RU/installing-boot9strap-(hbl-usm).txt b/_pages/ru_RU/installing-boot9strap-(hbl-usm).txt index 976751056d..eb4420efea 100644 --- a/_pages/ru_RU/installing-boot9strap-(hbl-usm).txt +++ b/_pages/ru_RU/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Содержание" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

As we already have Homebrew access, we can use slotTool to do this.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ru_RU/installing-boot9strap-(kartdlphax).txt b/_pages/ru_RU/installing-boot9strap-(kartdlphax).txt index fef213d8f1..2d24cb847c 100644 --- a/_pages/ru_RU/installing-boot9strap-(kartdlphax).txt +++ b/_pages/ru_RU/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (kartdlphax)" {% include toc title="Содержание" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin.

-

This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: kartdlphax, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ru_RU/installing-boot9strap-(soundhax).txt b/_pages/ru_RU/installing-boot9strap-(soundhax).txt index a197772bbf..bf7d808b3b 100644 --- a/_pages/ru_RU/installing-boot9strap-(soundhax).txt +++ b/_pages/ru_RU/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "Установка boot9strap (Soundhax)" {% include toc title="Содержание" %} -
+{% capture technical_info %} Technical Details (optional) -

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

-
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ru_RU/installing-boot9strap-(ssloth-browser).txt b/_pages/ru_RU/installing-boot9strap-(ssloth-browser).txt index 681789f029..75a555ec58 100644 --- a/_pages/ru_RU/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/ru_RU/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (SSLoth-Browser)" {% include toc title="Содержание" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version.

-

A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check.

-

Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job.

-

For technical details on the exploits that you will be using on this page, see here (SSLoth) and here (universal-otherapp).

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ru_RU/installing-boot9strap-(usm).txt b/_pages/ru_RU/installing-boot9strap-(usm).txt index 796f6969c2..570d3dd965 100644 --- a/_pages/ru_RU/installing-boot9strap-(usm).txt +++ b/_pages/ru_RU/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "Установка boot9strap (USM)" {% include toc title="Содержание" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

We can do this using an existing exploit, BannerBomb3.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/ru_RU/seedminer.txt b/_pages/ru_RU/seedminer.txt index dc85aea080..8e34fe5c47 100644 --- a/_pages/ru_RU/seedminer.txt +++ b/_pages/ru_RU/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title="Содержание" %} -
+{% capture technical_info %} Technical Details (optional) -

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

-

For information on how Seedminer works, see this presentation.

-

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Section I - Prep Work diff --git a/_pages/sv_SE/bannerbomb3.txt b/_pages/sv_SE/bannerbomb3.txt index 7032237623..d13cc8984a 100644 --- a/_pages/sv_SE/bannerbomb3.txt +++ b/_pages/sv_SE/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

-

For a more technical explanation, see here.

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/sv_SE/homebrew-launcher-(pichaxx).txt b/_pages/sv_SE/homebrew-launcher-(pichaxx).txt index 917b9c96bc..b3a75df2c9 100644 --- a/_pages/sv_SE/homebrew-launcher-(pichaxx).txt +++ b/_pages/sv_SE/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/sv_SE/installing-boot9strap-(fredtool).txt b/_pages/sv_SE/installing-boot9strap-(fredtool).txt index 70245c74cf..5dfe892e7b 100644 --- a/_pages/sv_SE/installing-boot9strap-(fredtool).txt +++ b/_pages/sv_SE/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### What You Need diff --git a/_pages/sv_SE/installing-boot9strap-(hardmod).txt b/_pages/sv_SE/installing-boot9strap-(hardmod).txt index 2b5ba832cb..a190ab080f 100644 --- a/_pages/sv_SE/installing-boot9strap-(hardmod).txt +++ b/_pages/sv_SE/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "Installing boot9strap (Hardmod)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

An excellent guide to getting a hardmod can be found here.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-

Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console.

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/sv_SE/installing-boot9strap-(hbl-usm).txt b/_pages/sv_SE/installing-boot9strap-(hbl-usm).txt index 65bcd5f692..a24b979948 100644 --- a/_pages/sv_SE/installing-boot9strap-(hbl-usm).txt +++ b/_pages/sv_SE/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

As we already have Homebrew access, we can use slotTool to do this.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/sv_SE/installing-boot9strap-(kartdlphax).txt b/_pages/sv_SE/installing-boot9strap-(kartdlphax).txt index a795051412..ef9b29e969 100644 --- a/_pages/sv_SE/installing-boot9strap-(kartdlphax).txt +++ b/_pages/sv_SE/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (kartdlphax)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin.

-

This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: kartdlphax, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/sv_SE/installing-boot9strap-(soundhax).txt b/_pages/sv_SE/installing-boot9strap-(soundhax).txt index 3d997b2886..1e7b82e565 100644 --- a/_pages/sv_SE/installing-boot9strap-(soundhax).txt +++ b/_pages/sv_SE/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

-
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/sv_SE/installing-boot9strap-(ssloth-browser).txt b/_pages/sv_SE/installing-boot9strap-(ssloth-browser).txt index 9ee332f394..c95fe65d19 100644 --- a/_pages/sv_SE/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/sv_SE/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (SSLoth-Browser)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version.

-

A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check.

-

Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job.

-

For technical details on the exploits that you will be using on this page, see here (SSLoth) and here (universal-otherapp).

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/sv_SE/installing-boot9strap-(usm).txt b/_pages/sv_SE/installing-boot9strap-(usm).txt index 4e09559e1b..6bcd717258 100644 --- a/_pages/sv_SE/installing-boot9strap-(usm).txt +++ b/_pages/sv_SE/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (USM)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

We can do this using an existing exploit, BannerBomb3.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/sv_SE/seedminer.txt b/_pages/sv_SE/seedminer.txt index 2f55a2d211..c1fbc5ae08 100644 --- a/_pages/sv_SE/seedminer.txt +++ b/_pages/sv_SE/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

-

For information on how Seedminer works, see this presentation.

-

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Section I - Prep Work diff --git a/_pages/th_TH/bannerbomb3.txt b/_pages/th_TH/bannerbomb3.txt index d2c19abf2f..c39606973e 100644 --- a/_pages/th_TH/bannerbomb3.txt +++ b/_pages/th_TH/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

-

For a more technical explanation, see here.

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/th_TH/homebrew-launcher-(pichaxx).txt b/_pages/th_TH/homebrew-launcher-(pichaxx).txt index 8395805ef0..e75f6b91ea 100644 --- a/_pages/th_TH/homebrew-launcher-(pichaxx).txt +++ b/_pages/th_TH/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/th_TH/installing-boot9strap-(fredtool).txt b/_pages/th_TH/installing-boot9strap-(fredtool).txt index 9b389ee19f..fab9a050c7 100644 --- a/_pages/th_TH/installing-boot9strap-(fredtool).txt +++ b/_pages/th_TH/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### What You Need diff --git a/_pages/th_TH/installing-boot9strap-(hardmod).txt b/_pages/th_TH/installing-boot9strap-(hardmod).txt index 4f0888d535..3455b87ff5 100644 --- a/_pages/th_TH/installing-boot9strap-(hardmod).txt +++ b/_pages/th_TH/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "Installing boot9strap (Hardmod)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

An excellent guide to getting a hardmod can be found here.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-

Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console.

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/th_TH/installing-boot9strap-(hbl-usm).txt b/_pages/th_TH/installing-boot9strap-(hbl-usm).txt index 65bcd5f692..a24b979948 100644 --- a/_pages/th_TH/installing-boot9strap-(hbl-usm).txt +++ b/_pages/th_TH/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

As we already have Homebrew access, we can use slotTool to do this.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/th_TH/installing-boot9strap-(kartdlphax).txt b/_pages/th_TH/installing-boot9strap-(kartdlphax).txt index a795051412..ef9b29e969 100644 --- a/_pages/th_TH/installing-boot9strap-(kartdlphax).txt +++ b/_pages/th_TH/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (kartdlphax)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin.

-

This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: kartdlphax, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/th_TH/installing-boot9strap-(soundhax).txt b/_pages/th_TH/installing-boot9strap-(soundhax).txt index b94e84c610..d7ce9937c7 100644 --- a/_pages/th_TH/installing-boot9strap-(soundhax).txt +++ b/_pages/th_TH/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

-
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/th_TH/installing-boot9strap-(ssloth-browser).txt b/_pages/th_TH/installing-boot9strap-(ssloth-browser).txt index 016c43be0c..07bbb76a27 100644 --- a/_pages/th_TH/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/th_TH/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (SSLoth-Browser)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version.

-

A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check.

-

Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job.

-

For technical details on the exploits that you will be using on this page, see here (SSLoth) and here (universal-otherapp).

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/th_TH/installing-boot9strap-(usm).txt b/_pages/th_TH/installing-boot9strap-(usm).txt index 58be815045..354ab00213 100644 --- a/_pages/th_TH/installing-boot9strap-(usm).txt +++ b/_pages/th_TH/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (USM)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

We can do this using an existing exploit, BannerBomb3.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/th_TH/seedminer.txt b/_pages/th_TH/seedminer.txt index b6d7e339df..21f019b371 100644 --- a/_pages/th_TH/seedminer.txt +++ b/_pages/th_TH/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

-

For information on how Seedminer works, see this presentation.

-

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Section I - Prep Work diff --git a/_pages/tr_TR/bannerbomb3.txt b/_pages/tr_TR/bannerbomb3.txt index c4e6f12908..e6ba3798dc 100644 --- a/_pages/tr_TR/bannerbomb3.txt +++ b/_pages/tr_TR/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title = "İçindekiler"%} -
+{% capture technical_info %} Technical Details (optional) -

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

-

For a more technical explanation, see here.

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/tr_TR/homebrew-launcher-(pichaxx).txt b/_pages/tr_TR/homebrew-launcher-(pichaxx).txt index 796fdaa5e8..bcb53fb8d1 100644 --- a/_pages/tr_TR/homebrew-launcher-(pichaxx).txt +++ b/_pages/tr_TR/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title = "İçindekiler"%} -
+{% capture technical_info %} Technical Details (optional) -This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/tr_TR/installing-boot9strap-(fredtool).txt b/_pages/tr_TR/installing-boot9strap-(fredtool).txt index ba4784bac3..ad4b0a6a0a 100644 --- a/_pages/tr_TR/installing-boot9strap-(fredtool).txt +++ b/_pages/tr_TR/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "Installing boot9strap (Fredtool)" {% include toc title = "İçindekiler"%} -
+{% capture technical_info %} Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### What You Need diff --git a/_pages/tr_TR/installing-boot9strap-(hardmod).txt b/_pages/tr_TR/installing-boot9strap-(hardmod).txt index 83d3c2d6b5..32624c215e 100644 --- a/_pages/tr_TR/installing-boot9strap-(hardmod).txt +++ b/_pages/tr_TR/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "Installing boot9strap (Hardmod)" {% include toc title = "İçindekiler"%} -
+{% capture technical_info %} Technical Details (optional) -

An excellent guide to getting a hardmod can be found here.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-

Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console.

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/tr_TR/installing-boot9strap-(hbl-usm).txt b/_pages/tr_TR/installing-boot9strap-(hbl-usm).txt index 024ea6f2c1..36cea036b9 100644 --- a/_pages/tr_TR/installing-boot9strap-(hbl-usm).txt +++ b/_pages/tr_TR/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title = "İçindekiler"%} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

As we already have Homebrew access, we can use slotTool to do this.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/tr_TR/installing-boot9strap-(kartdlphax).txt b/_pages/tr_TR/installing-boot9strap-(kartdlphax).txt index 7ece5728b1..0561ca5ef6 100644 --- a/_pages/tr_TR/installing-boot9strap-(kartdlphax).txt +++ b/_pages/tr_TR/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (kartdlphax)" {% include toc title = "İçindekiler"%} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin.

-

This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: kartdlphax, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/tr_TR/installing-boot9strap-(soundhax).txt b/_pages/tr_TR/installing-boot9strap-(soundhax).txt index f9814e3c97..6f9d010c8c 100644 --- a/_pages/tr_TR/installing-boot9strap-(soundhax).txt +++ b/_pages/tr_TR/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title = "İçindekiler"%} -
+{% capture technical_info %} Technical Details (optional) -

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

-
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/tr_TR/installing-boot9strap-(ssloth-browser).txt b/_pages/tr_TR/installing-boot9strap-(ssloth-browser).txt index 1637f04389..ffb0b4813f 100644 --- a/_pages/tr_TR/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/tr_TR/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (SSLoth-Browser)" {% include toc title = "İçindekiler"%} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version.

-

A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check.

-

Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job.

-

For technical details on the exploits that you will be using on this page, see here (SSLoth) and here (universal-otherapp).

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/tr_TR/installing-boot9strap-(usm).txt b/_pages/tr_TR/installing-boot9strap-(usm).txt index 53cee172b5..88ea4c8d5d 100644 --- a/_pages/tr_TR/installing-boot9strap-(usm).txt +++ b/_pages/tr_TR/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (USM)" {% include toc title = "İçindekiler"%} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

We can do this using an existing exploit, BannerBomb3.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/tr_TR/seedminer.txt b/_pages/tr_TR/seedminer.txt index ed727be6ff..a7ae3c215f 100644 --- a/_pages/tr_TR/seedminer.txt +++ b/_pages/tr_TR/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title = "İçindekiler"%} -
+{% capture technical_info %} Technical Details (optional) -

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

-

For information on how Seedminer works, see this presentation.

-

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Section I - Prep Work diff --git a/_pages/uk_UA/bannerbomb3.txt b/_pages/uk_UA/bannerbomb3.txt index d2c19abf2f..c39606973e 100644 --- a/_pages/uk_UA/bannerbomb3.txt +++ b/_pages/uk_UA/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

-

For a more technical explanation, see here.

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/uk_UA/homebrew-launcher-(pichaxx).txt b/_pages/uk_UA/homebrew-launcher-(pichaxx).txt index 8395805ef0..e75f6b91ea 100644 --- a/_pages/uk_UA/homebrew-launcher-(pichaxx).txt +++ b/_pages/uk_UA/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/uk_UA/installing-boot9strap-(fredtool).txt b/_pages/uk_UA/installing-boot9strap-(fredtool).txt index 9b389ee19f..fab9a050c7 100644 --- a/_pages/uk_UA/installing-boot9strap-(fredtool).txt +++ b/_pages/uk_UA/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### What You Need diff --git a/_pages/uk_UA/installing-boot9strap-(hardmod).txt b/_pages/uk_UA/installing-boot9strap-(hardmod).txt index 4f0888d535..3455b87ff5 100644 --- a/_pages/uk_UA/installing-boot9strap-(hardmod).txt +++ b/_pages/uk_UA/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "Installing boot9strap (Hardmod)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

An excellent guide to getting a hardmod can be found here.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-

Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console.

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/uk_UA/installing-boot9strap-(hbl-usm).txt b/_pages/uk_UA/installing-boot9strap-(hbl-usm).txt index 65bcd5f692..a24b979948 100644 --- a/_pages/uk_UA/installing-boot9strap-(hbl-usm).txt +++ b/_pages/uk_UA/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

As we already have Homebrew access, we can use slotTool to do this.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/uk_UA/installing-boot9strap-(kartdlphax).txt b/_pages/uk_UA/installing-boot9strap-(kartdlphax).txt index a795051412..ef9b29e969 100644 --- a/_pages/uk_UA/installing-boot9strap-(kartdlphax).txt +++ b/_pages/uk_UA/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (kartdlphax)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin.

-

This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: kartdlphax, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/uk_UA/installing-boot9strap-(soundhax).txt b/_pages/uk_UA/installing-boot9strap-(soundhax).txt index b94e84c610..d7ce9937c7 100644 --- a/_pages/uk_UA/installing-boot9strap-(soundhax).txt +++ b/_pages/uk_UA/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

-
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/uk_UA/installing-boot9strap-(ssloth-browser).txt b/_pages/uk_UA/installing-boot9strap-(ssloth-browser).txt index 016c43be0c..07bbb76a27 100644 --- a/_pages/uk_UA/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/uk_UA/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (SSLoth-Browser)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version.

-

A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check.

-

Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job.

-

For technical details on the exploits that you will be using on this page, see here (SSLoth) and here (universal-otherapp).

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/uk_UA/installing-boot9strap-(usm).txt b/_pages/uk_UA/installing-boot9strap-(usm).txt index 58be815045..354ab00213 100644 --- a/_pages/uk_UA/installing-boot9strap-(usm).txt +++ b/_pages/uk_UA/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (USM)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

We can do this using an existing exploit, BannerBomb3.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/uk_UA/seedminer.txt b/_pages/uk_UA/seedminer.txt index b6d7e339df..21f019b371 100644 --- a/_pages/uk_UA/seedminer.txt +++ b/_pages/uk_UA/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

-

For information on how Seedminer works, see this presentation.

-

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Section I - Prep Work diff --git a/_pages/vi_VN/bannerbomb3.txt b/_pages/vi_VN/bannerbomb3.txt index d2c19abf2f..c39606973e 100644 --- a/_pages/vi_VN/bannerbomb3.txt +++ b/_pages/vi_VN/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

-

For a more technical explanation, see here.

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/vi_VN/homebrew-launcher-(pichaxx).txt b/_pages/vi_VN/homebrew-launcher-(pichaxx).txt index 8395805ef0..e75f6b91ea 100644 --- a/_pages/vi_VN/homebrew-launcher-(pichaxx).txt +++ b/_pages/vi_VN/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/vi_VN/installing-boot9strap-(fredtool).txt b/_pages/vi_VN/installing-boot9strap-(fredtool).txt index 9b389ee19f..fab9a050c7 100644 --- a/_pages/vi_VN/installing-boot9strap-(fredtool).txt +++ b/_pages/vi_VN/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### What You Need diff --git a/_pages/vi_VN/installing-boot9strap-(hardmod).txt b/_pages/vi_VN/installing-boot9strap-(hardmod).txt index 4f0888d535..3455b87ff5 100644 --- a/_pages/vi_VN/installing-boot9strap-(hardmod).txt +++ b/_pages/vi_VN/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "Installing boot9strap (Hardmod)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

An excellent guide to getting a hardmod can be found here.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-

Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console.

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/vi_VN/installing-boot9strap-(hbl-usm).txt b/_pages/vi_VN/installing-boot9strap-(hbl-usm).txt index 65bcd5f692..a24b979948 100644 --- a/_pages/vi_VN/installing-boot9strap-(hbl-usm).txt +++ b/_pages/vi_VN/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

As we already have Homebrew access, we can use slotTool to do this.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/vi_VN/installing-boot9strap-(kartdlphax).txt b/_pages/vi_VN/installing-boot9strap-(kartdlphax).txt index a795051412..ef9b29e969 100644 --- a/_pages/vi_VN/installing-boot9strap-(kartdlphax).txt +++ b/_pages/vi_VN/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (kartdlphax)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin.

-

This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: kartdlphax, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/vi_VN/installing-boot9strap-(soundhax).txt b/_pages/vi_VN/installing-boot9strap-(soundhax).txt index b94e84c610..d7ce9937c7 100644 --- a/_pages/vi_VN/installing-boot9strap-(soundhax).txt +++ b/_pages/vi_VN/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

-
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/vi_VN/installing-boot9strap-(ssloth-browser).txt b/_pages/vi_VN/installing-boot9strap-(ssloth-browser).txt index 016c43be0c..07bbb76a27 100644 --- a/_pages/vi_VN/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/vi_VN/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (SSLoth-Browser)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version.

-

A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check.

-

Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job.

-

For technical details on the exploits that you will be using on this page, see here (SSLoth) and here (universal-otherapp).

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/vi_VN/installing-boot9strap-(usm).txt b/_pages/vi_VN/installing-boot9strap-(usm).txt index 58be815045..354ab00213 100644 --- a/_pages/vi_VN/installing-boot9strap-(usm).txt +++ b/_pages/vi_VN/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (USM)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

We can do this using an existing exploit, BannerBomb3.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/vi_VN/seedminer.txt b/_pages/vi_VN/seedminer.txt index b6d7e339df..21f019b371 100644 --- a/_pages/vi_VN/seedminer.txt +++ b/_pages/vi_VN/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

-

For information on how Seedminer works, see this presentation.

-

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Section I - Prep Work diff --git a/_pages/zh_CN/bannerbomb3.txt b/_pages/zh_CN/bannerbomb3.txt index 8e5c0b133d..5b1a42e543 100644 --- a/_pages/zh_CN/bannerbomb3.txt +++ b/_pages/zh_CN/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title="目录内容" %} -
+{% capture technical_info %} 技术细节(选看) -

我们使用了 3DS 系统设置中的 DSiWare 数据管理中的一个漏洞来启动自制代码。

-

为达到此目的,我们将使用你主机系统中的加密密钥(movable.sed)来构建一个带有漏洞的 DSiWare 备份。

-

若想知道更多技术细节,请见这里

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### 兼容性注意 diff --git a/_pages/zh_CN/homebrew-launcher-(pichaxx).txt b/_pages/zh_CN/homebrew-launcher-(pichaxx).txt index b44269ef14..fbf317be37 100644 --- a/_pages/zh_CN/homebrew-launcher-(pichaxx).txt +++ b/_pages/zh_CN/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "启动 Homebrew Launcher(通过 PicHaxx)" {% include toc title="目录内容" %} -
+{% capture technical_info %} 技术细节(选看) -此方法使用 Seedminer 来取得你的 `movable.sed` 文件,然后更进一步地利用漏洞,将为《宝可梦:绘图方块》(Pokémon Picross)自制的存档写入游戏,然后利用 unSAFE_MODE (通过 Homebrew Launcher)启动 SafeB9SInstaller。 关于 PicHaxx 的详细介绍,请见这里。 -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### 兼容性注意 diff --git a/_pages/zh_CN/installing-boot9strap-(fredtool).txt b/_pages/zh_CN/installing-boot9strap-(fredtool).txt index 1cba695edf..f194bb05c3 100644 --- a/_pages/zh_CN/installing-boot9strap-(fredtool).txt +++ b/_pages/zh_CN/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "安装 boot9strap(通过 Fredtool)" {% include toc title="目录内容" %} -
+{% capture technical_info %} 技术细节(选看) -

本章节 Seedminer 将使用你的 movable.sed 文件来解密所有的 DSiWare 程序,以便在主机内置的 DS 网络设置中注入修改后的 DSiWare 程序。

-

本教程是使用 “FIRM partitions known-plaintext” 漏洞来进行破解的,欲知相关资料请查阅这里

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### 你需要准备点啥? @@ -71,7 +75,7 @@ title: "安装 boot9strap(通过 Fredtool)" + 根目录指的是你点进 SD 卡看到的目录,你可以在这个目录下看到 Nintendo 3DS 文件夹,但请不要点进去 1. 复制 `boot.nds` (B9STool)到你的 SD 卡根目录 1. 从 Frogminer_save `.zip` 压缩包中复制 `private` 文件夹到内存卡的根目录 -1. 将 SD 卡重新插入你的主机 +1. 将SD卡重新插入你的主机 1. 启动你的主机 ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) diff --git a/_pages/zh_CN/installing-boot9strap-(hardmod).txt b/_pages/zh_CN/installing-boot9strap-(hardmod).txt index 590f88ad1a..b53afdbde1 100644 --- a/_pages/zh_CN/installing-boot9strap-(hardmod).txt +++ b/_pages/zh_CN/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "安装 boot9strap(通过硬改)" {% include toc title="目录内容" %} -
+{% capture technical_info %} 技术细节(选看) -

这里有一个进行硬改的绝佳教程。

-

本教程是使用 “FIRM partitions known-plaintext” 漏洞来进行破解的,欲知相关资料请查阅这里

-

利用硬改,我们可以直接导出主机的 NAND 镜像,然后直接将自制固件打进 NAND 镜像中,并重新导入回主机。

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### 兼容性注意 diff --git a/_pages/zh_CN/installing-boot9strap-(hbl-usm).txt b/_pages/zh_CN/installing-boot9strap-(hbl-usm).txt index 2509de506e..9914b252a6 100644 --- a/_pages/zh_CN/installing-boot9strap-(hbl-usm).txt +++ b/_pages/zh_CN/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "安装 boot9strap(通过 HBL-USM)" {% include toc title="目录内容" %} -
+{% capture technical_info %} 技术细节(选看) -

为了破解系统的 SAFE_MODE 固件,我们需要注入一个已被破解的 WiFi 配置文件到主机中。

-

现在我们能够使用 Homebrew 程序了,接下来我们会利用它进入 slotTool 继续破解下去。

-

一旦 WiFi 配置文件被注入,我们将会使用到 SAFE_MODE 来继续此教程。SAVE_MODE 是一个所有的 3DS 主机都存在的修复功能,之后它将用于激活被破解的 WiFi 配置文件。

-

如果你想知道有关 unSAFE_MODE 的更多技术细节,请见这里。 -

+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### 兼容性注意 diff --git a/_pages/zh_CN/installing-boot9strap-(kartdlphax).txt b/_pages/zh_CN/installing-boot9strap-(kartdlphax).txt index ea567a3598..963b6fc54f 100644 --- a/_pages/zh_CN/installing-boot9strap-(kartdlphax).txt +++ b/_pages/zh_CN/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "安装 boot9strap(通过 kartdlphax)" {% include toc title="目录内容" %} -
+{% capture technical_info %} 技术细节(选看) -

为了破解系统的 SAFE_MODE 固件,我们需要注入一个已被破解的 WiFi 配置文件到主机中。

-

为了做到这一点,我们将用一台已安装了自制固件的 3DS 安装一个插件,然后利用马里奥赛车 7 这个游戏中的下载通信功能进行一些操作。

-

这个插件将会发送带有漏洞的代码到未破解的主机中,然后它将会向未破解的主机中注入带有漏洞的配置文件到 WiFi 连接点列表。

-

一旦 WiFi 配置文件被注入,我们将会使用到 SAFE_MODE 来继续此教程。SAVE_MODE 是一个所有的 3DS 主机都存在的修复功能,之后它将用于激活被破解的 WiFi 配置文件。

-

如果想知道更多的技术细节,请参阅以下链接:kartdlphaxunSAFE_MODE

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### 兼容性注意 diff --git a/_pages/zh_CN/installing-boot9strap-(soundhax).txt b/_pages/zh_CN/installing-boot9strap-(soundhax).txt index b99db930f0..8b71a3476f 100644 --- a/_pages/zh_CN/installing-boot9strap-(soundhax).txt +++ b/_pages/zh_CN/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "安装 boot9strap(通过 Soundhax)" {% include toc title="目录内容" %} -
+{% capture technical_info %} 技术细节(选看) -

关于本页所使用漏洞的技术细节,请见这里(Soundhax)这里(universal-otherapp)

-
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### 兼容性注意 @@ -51,7 +54,7 @@ Soundhax(和 universal-otherapp 一起使用时)与所有区域 1.0.0 至 11 本节中,你将通过 Nintendo 3DS 音乐程序启动 Soundhax,它将使用 universal-otherapp 启动 boot9strap(自制固件)安装程序。 -1. 将 SD 卡重新插入你的主机 +1. 将SD卡重新插入你的主机 1. 启动你的主机 1. 启动 “任天堂 3DS 音乐(Nintendo 3DS Sound)” diff --git a/_pages/zh_CN/installing-boot9strap-(ssloth-browser).txt b/_pages/zh_CN/installing-boot9strap-(ssloth-browser).txt index c679d10a32..602c66d15e 100644 --- a/_pages/zh_CN/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/zh_CN/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "安装 boot9strap(通过 SSLoth-浏览器破解)" {% include toc title="目录内容" %} -
+{% capture technical_info %} 技术细节(选看) -

为了通过浏览器进行破解,我们需要通过一些手段来绕过系统版本检查,因为它会阻止版本非为最新的系统使用浏览器。

-

这里有一个公共的代理服务器可供使用,它将会利用 SSLoth 漏洞来绕过版本检查。

-

一旦更新检查被成功绕过,我们就可以通过一个漏洞页面来完成接下来的任务。

-

关于本页所使用漏洞的技术细节,请见这里(SSLoth)这里(universal-otherapp)

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### 兼容性注意 diff --git a/_pages/zh_CN/installing-boot9strap-(usm).txt b/_pages/zh_CN/installing-boot9strap-(usm).txt index 7ac1476cfc..7b752ab310 100644 --- a/_pages/zh_CN/installing-boot9strap-(usm).txt +++ b/_pages/zh_CN/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "安装 boot9strap(通过 USM)" {% include toc title="目录内容" %} -
+{% capture technical_info %} 技术细节(选看) -

为了破解系统的 SAFE_MODE 固件,我们需要注入一个已被破解的 WiFi 配置文件到主机中。

-

我们可以利用 BannerBomb3 这个现有的漏洞进行以下操作。

-

为了做到这一点,我们使用了你的主机系统中的加密密钥(movable.sed)来构建一个 DSiWare 备份,以便于将被破解的 WiFi 配置文件注入到 WiFi 接入点列表。

-

一旦 WiFi 配置文件被注入,我们将会使用到 SAFE_MODE 来继续此教程。SAVE_MODE 是一个所有的 3DS 主机都存在的修复功能,之后它将用于激活被破解的 WiFi 配置文件。

-

如果想知道更多 BannerBomb3 和 unSAFE_MODE 的技术细节,请参阅以下链接:BannerBomb3unSAFE_MODE

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### 兼容性注意 diff --git a/_pages/zh_CN/seedminer.txt b/_pages/zh_CN/seedminer.txt index 851c6ca1be..eb9a06b51e 100644 --- a/_pages/zh_CN/seedminer.txt +++ b/_pages/zh_CN/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title="内容目录" %} -
+{% capture technical_info %} 技术细节(选看) -

为了在你的主机上安装 boot9strap,我们需要获得你主机上的唯一加密密钥。 为了做到这点,我们使用了一个叫 Seedminer 的工具来计算你主机的数据加密密钥(movable.sed)。

-

有关 Seedminer 是如何运作的详细过程,请看此演示

-

本教程需要利用一个高性能的显卡来进行一些计算。 不过有一个志愿者网站可以帮助你做需要显卡的步骤。

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### 第一步 – 准备工作 diff --git a/_pages/zh_TW/bannerbomb3.txt b/_pages/zh_TW/bannerbomb3.txt index 69c91fe423..505cb83652 100644 --- a/_pages/zh_TW/bannerbomb3.txt +++ b/_pages/zh_TW/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title="條目內容" %} -
+{% capture technical_info %} Technical Details (optional) -

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

-

For a more technical explanation, see here.

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/zh_TW/homebrew-launcher-(pichaxx).txt b/_pages/zh_TW/homebrew-launcher-(pichaxx).txt index 4b93464e61..fa3f79bb74 100644 --- a/_pages/zh_TW/homebrew-launcher-(pichaxx).txt +++ b/_pages/zh_TW/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="條目內容" %} -
+{% capture technical_info %} Technical Details (optional) -This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/zh_TW/installing-boot9strap-(fredtool).txt b/_pages/zh_TW/installing-boot9strap-(fredtool).txt index 206db7de8a..1a1868ccfb 100644 --- a/_pages/zh_TW/installing-boot9strap-(fredtool).txt +++ b/_pages/zh_TW/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="條目內容" %} -
+{% capture technical_info %} Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### 必備項目 diff --git a/_pages/zh_TW/installing-boot9strap-(hardmod).txt b/_pages/zh_TW/installing-boot9strap-(hardmod).txt index 92f98e789e..d0d484b1ca 100644 --- a/_pages/zh_TW/installing-boot9strap-(hardmod).txt +++ b/_pages/zh_TW/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "安裝 boot9strap (透過硬改)" {% include toc title="條目內容" %} -
+{% capture technical_info %} Technical Details (optional) -

An excellent guide to getting a hardmod can be found here.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-

Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console.

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/zh_TW/installing-boot9strap-(hbl-usm).txt b/_pages/zh_TW/installing-boot9strap-(hbl-usm).txt index 4cf180e56f..b0c3e67403 100644 --- a/_pages/zh_TW/installing-boot9strap-(hbl-usm).txt +++ b/_pages/zh_TW/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="條目內容" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

As we already have Homebrew access, we can use slotTool to do this.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/zh_TW/installing-boot9strap-(kartdlphax).txt b/_pages/zh_TW/installing-boot9strap-(kartdlphax).txt index d85c153099..58d59112c1 100644 --- a/_pages/zh_TW/installing-boot9strap-(kartdlphax).txt +++ b/_pages/zh_TW/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "安裝 boot9strap (透過 kartdlphax)" {% include toc title="條目內容" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin.

-

This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: kartdlphax, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/zh_TW/installing-boot9strap-(soundhax).txt b/_pages/zh_TW/installing-boot9strap-(soundhax).txt index ff2a2fdb27..d399d35ab4 100644 --- a/_pages/zh_TW/installing-boot9strap-(soundhax).txt +++ b/_pages/zh_TW/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "安裝 boot9strap (透過 Soundhax)" {% include toc title="條目內容" %} -
+{% capture technical_info %} Technical Details (optional) -

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

-
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/zh_TW/installing-boot9strap-(ssloth-browser).txt b/_pages/zh_TW/installing-boot9strap-(ssloth-browser).txt index 69072e8623..04bbd55c50 100644 --- a/_pages/zh_TW/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/zh_TW/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (SSLoth-Browser)" {% include toc title="條目內容" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version.

-

A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check.

-

Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job.

-

For technical details on the exploits that you will be using on this page, see here (SSLoth) and here (universal-otherapp).

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/zh_TW/installing-boot9strap-(usm).txt b/_pages/zh_TW/installing-boot9strap-(usm).txt index d74c47c152..98fe6455ac 100644 --- a/_pages/zh_TW/installing-boot9strap-(usm).txt +++ b/_pages/zh_TW/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "安裝 boot9strap (透過 USM)" {% include toc title="條目內容" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

We can do this using an existing exploit, BannerBomb3.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/zh_TW/seedminer.txt b/_pages/zh_TW/seedminer.txt index 96c2be7c1b..1a6da42beb 100644 --- a/_pages/zh_TW/seedminer.txt +++ b/_pages/zh_TW/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title="條目內容" %} -
+{% capture technical_info %} Technical Details (optional) -

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

-

For information on how Seedminer works, see this presentation.

-

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Section I - Prep Work