Wrap technical explanation in a info-notice box

Also remove the text-expand includes, it's not needed
This commit is contained in:
lifehackerhansol 2022-10-01 16:36:54 -07:00
parent 020e21508f
commit 9c90bbf980
8 changed files with 7 additions and 28 deletions

View file

@ -3,17 +3,14 @@ title: "BannerBomb3"
--- ---
{% include toc title="Table of Contents" %} {% include toc title="Table of Contents" %}
{% include text-expand.html %}
<details> <details>
<summary><em>Technical Details (optional)</em></summary> <summary><em>Technical Details (optional)</em></summary>
<p>To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.</p> <p>To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.</p>
<p>To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.</p> <p>To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.</p>
<p>For a more technical explanation, see <a href="https://github.com/zoogie/Bannerbomb3">here</a>.</p> <p>For a more technical explanation, see <a href="https://github.com/zoogie/Bannerbomb3">here</a>.</p>
</details> </details>
{: .notice--info}
### Compatibility Notes ### Compatibility Notes

View file

@ -3,7 +3,6 @@ title: "Finalizing Setup"
--- ---
{% include toc title="Table of Contents" %} {% include toc title="Table of Contents" %}
{% include text-expand.html %}
### Required Reading ### Required Reading

View file

@ -3,13 +3,12 @@ title: "Homebrew Launcher (PicHaxx)"
--- ---
{% include toc title="Table of Contents" %} {% include toc title="Table of Contents" %}
{% include text-expand.html %}
<details> <details>
<summary><em>Technical Details (optional)</em></summary> <summary><em>Technical Details (optional)</em></summary>
This method of using Seedminer for further exploitation uses your <code>movable.sed</code> file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. This method of using Seedminer for further exploitation uses your <code>movable.sed</code> file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller.
</details> </details>
{: .notice--info}
### Compatibility Notes ### Compatibility Notes

View file

@ -3,15 +3,13 @@ title: "Installing boot9strap (Fredtool)"
--- ---
{% include toc title="Table of Contents" %} {% include toc title="Table of Contents" %}
{% include text-expand.html %}
<details> <details>
<summary><em>Technical Details (optional)</em></summary> <summary><em>Technical Details (optional)</em></summary>
<p>This method of using Seedminer for further exploitation uses your <code>movable.sed</code> file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.</p> <p>This method of using Seedminer for further exploitation uses your <code>movable.sed</code> file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.</p>
<p>This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed <a href="https://www.3dbrew.org/wiki/3DS_System_Flaws">here</a>.</p> <p>This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed <a href="https://www.3dbrew.org/wiki/3DS_System_Flaws">here</a>.</p>
</details> </details>
{: .notice--info}
### What You Need ### What You Need

View file

@ -3,19 +3,15 @@ title: "Installing boot9strap (HBL-USM)"
--- ---
{% include toc title="Table of Contents" %} {% include toc title="Table of Contents" %}
{% include text-expand.html %}
<details> <details>
<summary><em>Technical Details (optional)</em></summary> <summary><em>Technical Details (optional)</em></summary>
<p>In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.</p> <p>In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.</p>
<p>As we already have Homebrew access, we can use slotTool to do this.</p> <p>As we already have Homebrew access, we can use slotTool to do this.</p>
<p>Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.</p> <p>Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.</p>
<p>For a more technical explanation, see <a href="https://github.com/zoogie/unSAFE_MODE/">here</a> for information about the unSAFE_MODE exploit.</p> <p>For a more technical explanation, see <a href="https://github.com/zoogie/unSAFE_MODE/">here</a> for information about the unSAFE_MODE exploit.</p>
</details> </details>
{: .notice--info}
### Compatibility Notes ### Compatibility Notes

View file

@ -3,13 +3,12 @@ title: "Installing boot9strap (Soundhax)"
--- ---
{% include toc title="Table of Contents" %} {% include toc title="Table of Contents" %}
{% include text-expand.html %}
<details> <details>
<summary><em>Technical Details (optional)</em></summary> <summary><em>Technical Details (optional)</em></summary>
<p>For technical details on the exploits that you will be using on this page, see <a href="https://github.com/nedwill/soundhax">here</a> (Soundhax) and <a href="https://github.com/TuxSH/universal-otherapp/">here</a> (universal-otherapp).</p> <p>For technical details on the exploits that you will be using on this page, see <a href="https://github.com/nedwill/soundhax">here</a> (Soundhax) and <a href="https://github.com/TuxSH/universal-otherapp/">here</a> (universal-otherapp).</p>
</details> </details>
{: .notice--info}
### Compatibility Notes ### Compatibility Notes

View file

@ -3,22 +3,16 @@ title: "Installing boot9strap (USM)"
--- ---
{% include toc title="Table of Contents" %} {% include toc title="Table of Contents" %}
{% include text-expand.html %}
<details> <details>
<summary><em>Technical Details (optional)</em></summary> <summary><em>Technical Details (optional)</em></summary>
<p>In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.</p> <p>In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.</p>
<p>We can do this using an existing exploit, BannerBomb3.</p> <p>We can do this using an existing exploit, BannerBomb3.</p>
<p>To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.</p> <p>To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.</p>
<p>Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.</p> <p>Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.</p>
<p>For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: <a href="https://github.com/zoogie/Bannerbomb3">BannerBomb3</a>, <a href="https://github.com/zoogie/unSAFE_MODE/">unSAFE_MODE</a>.</p> <p>For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: <a href="https://github.com/zoogie/Bannerbomb3">BannerBomb3</a>, <a href="https://github.com/zoogie/unSAFE_MODE/">unSAFE_MODE</a>.</p>
</details> </details>
{: .notice--info}
### Compatibility Notes ### Compatibility Notes

View file

@ -3,17 +3,14 @@ title: "Seedminer"
--- ---
{% include toc title="Table of Contents" %} {% include toc title="Table of Contents" %}
{% include text-expand.html %}
<details> <details>
<summary><em>Technical Details (optional)</em></summary> <summary><em>Technical Details (optional)</em></summary>
<p>To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.</p> <p>To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.</p>
<p>For information on how Seedminer works, see <a href="https://zoogie.github.io/web/34⅕c3">this presentation</a>.</p> <p>For information on how Seedminer works, see <a href="https://zoogie.github.io/web/34⅕c3">this presentation</a>.</p>
<p>This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.</p> <p>This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.</p>
</details> </details>
{: .notice--info}
### Section I - Prep Work ### Section I - Prep Work