Updating guide for bannerbomb3

This commit is contained in:
unknown 2019-07-28 04:40:15 -07:00
parent 0387969c3b
commit a1b6927262
8 changed files with 113 additions and 49 deletions

View file

@ -66,6 +66,12 @@ sidebar_pages:
-
title: ntrboot
url: ntrboot
-
title: BannerBomb3
url: bannerbomb3
-
title: DSiDumper
url: dsidumper
-
title: Seedminer
url: seedminer

View file

@ -0,0 +1,47 @@
---
title: "BannerBomb3"
---
{% include toc title="Table of Contents" %}
### Required Reading
To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.
To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.
These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version.
### What You Need
* Your `movable.sed` file from completing [Seedminer](seedminer)
#### Section I - BannerBomb3
1. Open [BannerBomb3 Tool](https://bb3.bruteforcemovable.com/) on your computer
1. Upload your movable.sed using the "Choose File" option
1. Click "Go"
+ This will download an exploit DSiWare called `F00D43D5.bin` inside of a zip file (`tadmuffin_out.zip`)
1. Power off your device
1. Insert your SD card into your computer
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card
+ This `<ID0>` will be the same one that you used in [Seedminer](seedminer)
+ If `Nintendo DSiWare` does not exist, create it
1. If there are any existing DSiWare backup files (`<8-character-id>.bin`) in this folder, move them to your PC
+ This will leave you with an empty Nintendo DSiWare folder. Moving the files to your PC ensures you dont delete any intentional backups
1. Copy the `F00D43D5.bin` file from the `output\Usa_Europe_Japan_Korea\` folder of the downloaded BannerBomb3 archive (`tadmuffin_out.zip`) to the `Nintendo DSiWare` folder
1. Reinsert your SD card into your device
1. Power on your device
1. Launch System Settings on your device
1. Navigate to `Data Management` -> `DSiWare`
1. Click on the SD Card section
+ Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked
1. Power off your device
1. Insert your SD card into your computer
1. You should now have `42383841.bin` in SD root
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card
+ This `<ID0>` will be the same one that you used in [Seedminer](seedminer)
1. Delete `F00D43D5.bin` from the Nintendo DSiWare folder
Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool))
{: .notice--primary}

View file

@ -0,0 +1,35 @@
---
title: "DSiDumper"
---
{% include toc title="Table of Contents" %}
### Required Reading
To dump system DSiWare, we use an existing homebrew launcher exploit.
If during this guide you discovered a broken DS Internet Settings application, follow [TWLFix for Homebrew](https://github.com/MechanicalDragon0687/TWLFix-3DS/releases) before continuing
### What You Need
* Your `movable.sed` file from completing [Seedminer](seedminer)
* The latest release of [DSiWare Dumper](https://github.com/MechanicalDragon0687/3DS-DSiWare_Dumper/releases)
#### Section I - Prep Work
1. Power off your device
1. Insert your SD card into your computer
1. Copy your `movable.sed` file to the root of your SD card
1. Copy `DSiWare_Dump.3dsx` to the `/3ds/` folder on your SD card
1. Reinsert your SD card into your device
1. Power on your device
#### Section I - DSiWare Dumping
1. Open the Homebrew Launcher using any method
1. Launch DSiWare Dumper from the list of homebrew
+ This will dump a DSiWare application to SD root
Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool))
{: .notice--primary}

View file

@ -51,13 +51,6 @@ During this process, we also setup programs such as the following:
1. Create a folder named `payloads` in the `luma` folder on your SD card if it does not already exist
1. Copy `GodMode9.firm` from the GodMode9 `.zip` to the `/luma/payloads/` folder on your SD card
1. Copy the `gm9` folder from the GodMode9 `.zip` to the root of your SD card
![]({{ "/images/screenshots/finalizing-setup-file-layout.png" | absolute_url }})
{: .notice--info}
Note that, depending on the method used to install boot9strap, your device's SD card may not have the `soundhax-usa-n3ds.m4a`, `otherapp.bin`, or `safehaxpayload.bin` files from the above screenshot or may have additional files not shown in the image.
{: .notice--info}
1. Reinsert your SD card into your device
1. Power on your device
@ -71,7 +64,7 @@ If, before following this guide, you already had an EmuNAND setup and would like
1. Update your device by going to System Settings, then "Other Settings", then going all the way to the right and using "System Update"
+ Updates while using B9S + Luma (what you have) are safe
+ The updater may display a message saying "Your system is up to date" instead of updating. This is normal if you are already up to date
+ The updater may display a message saying "Your system is up to date" instead of updating. This is normal if you are already up to date; continue with the next section
+ If this gives you an error, set your DNS settings to "auto"
+ If this still gives you an error, [follow CTRTransfer](ctrtransfer), then try updating again
@ -92,7 +85,6 @@ If, before following this guide, you already had an EmuNAND setup and would like
1. Press (A) to set the offset to 0
+ This will set the system clock to match the RTC date&time (which we will set soon)
1. Press (Start) to return to the Homebrew Launcher
+ If you previously followed [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)), you should now use the "RESTORE clean DS Download Play" option in Frogtool to restore the DS Download Play application to its original state
1. Launch FBI from the list of homebrew
#### Section IV - Installing CIAs

View file

@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)"
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop.
If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)).
If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [DSiWare Dumper](dsidumper)).
{: .notice--success}
If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file!
@ -59,5 +59,5 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game
___
### Continue to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool))
### Continue to [DSiWare Dumper](dsidumper)
{: .notice--primary}

View file

@ -12,9 +12,7 @@ This is a currently working implementation of the "FIRM partitions known-plainte
### What You Need
* Any eShop DSiWare game
+ JPN region users can download the free title "ほぼ日の健康手帳™" ([![]({{ "/images/qrcodes/50010000005133.png" | absolute_url }}){: height="24px" width="24px"})]({{ "/images/qrcodes/50010000005133.png" | absolute_url }})
+ USA region users can download the free title "Nintendo Fan Network" ([![]({{ "/images/qrcodes/50010000013696.png" | absolute_url }}){: height="24px" width="24px"})]({{ "/images/qrcodes/50010000013696.png" | absolute_url }})
* A DSiWare Backup (such as from [BannerBomb3](bannerbomb3) or [DSiWare Dumper](dsidumper))
* Your `movable.sed` file from completing [Seedminer](seedminer)
* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest)
* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest)
@ -23,11 +21,6 @@ This is a currently working implementation of the "FIRM partitions known-plainte
#### Section I - Prep Work
1. Launch System Settings on your device
1. Navigate to `Data Management` -> `DSiWare`
1. Under the "System Memory" section, select your DSiWare game
1. Select "Copy", then select "OK"
+ If prompted, overwrite any existing copy
1. Power off your device
1. Insert your SD card into your computer
1. Copy your `movable.sed` file to the root of your SD card
@ -35,23 +28,22 @@ This is a currently working implementation of the "FIRM partitions known-plainte
1. Copy `boot.nds` (B9STool) to the root of your SD card
1. Copy `boot.3dsx` to the root of your SD card
1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card
+ This `<ID0>` will be the same one that you used in [Seedminer](seedminer)
1. Copy `<8-character-id>.bin` to a folder on your computer
+ If there are multiple `<8-character-id>.bin` files, just pick one. It doesn't matter which you use.
#### Section II - Fredtool
1. Open [Fredtool](https://fredtool.bruteforcemovable.com/) on your computer
1. Select your `movable.sed` file for the "Your movable.sed" field
1. Select your `<8-character-id>.bin` file for the "Your dsiware.bin" field
1. Select your DSiWare Backup (`<8-character-id>.bin`) file for the "Your dsiware.bin" field
1. Complete the "I'm not a robot" captcha
1. Select "Start"
1. Wait for the process to complete
1. When the process has completed, download your modified DSiWare archive from the site
1. Copy the `42383841.bin` file from the `output/hax/` folder of the downloaded DSiWare archive (`fredtool_output.zip`) to the `Nintendo 3DS/<ID0>/<32-character-id>/Nintendo DSiWare/` folder on your SD card
+ This should be different than your initial `<8-character-id>.bin` file
+ Do not remove any existing `<8-character-id>.bin` files
+ This file contains 2 dsiware backup files, one clean (unmodified) and one hax (exploited)
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` on your SD card
+ This `<ID0>` will be the same one that you used in [Seedminer](seedminer)
+ This `<ID1>` folder will be another 32 letter/number folder inside the ID0 folder
+ The `Nintendo DSiWare` folder may need to be created inside the `<ID1>` folder
1. Copy the `42383841.bin` file from the `output/hax/` folder of the downloaded DSiWare archive (`fredtool_output.zip`) to the `Nintendo DSiWare` folder
1. Reinsert your SD card into your device
1. Power on your device
1. Launch System Settings on your device
@ -71,8 +63,7 @@ If you would prefer a visual guide to this section, one is available [here](http
+ Select the left option whenever prompted during the setup process
1. Using the touch-screen, select the large left box, then select the box with an SD card icon
1. Once the menu loads, select the face icon, then the bottom right icon to continue
1. Select the frog icon at the bottom left
+ Alternatively, press (X) or (UP) on the D-Pad depending on which is shown on the top screen
1. Press (X) or (UP) on the D-Pad depending on which is shown on the top screen
1. Select the second button along the top with a film-reel icon
1. Scroll right until reel "3/3" is selected
1. Tap the third box with the letter "A" in it
@ -80,6 +71,7 @@ If you would prefer a visual guide to this section, one is available [here](http
1. Tap the fourth box with the letter "A" in it
1. If the exploit was successful, your device will have loaded b9sTool
1. Using the D-Pad, move to "Install boot9strap"
+ If you miss this step, the system will exit to home menu instead of installing boot9strap and you will need to open Nintendo DS Connections and start over from the beginning of Section III
1. Press (A), then press START and SELECT at the same time to begin the process
1. Once completed and the bottom screen says "done.", exit b9sTool, then power off your device
+ You may have to force power off by holding the power button

View file

@ -16,26 +16,18 @@ This method uses a powerful graphics card to perform the calculations needed. A
### Instructions
#### Section I - Compatibility Tests
#### Section I - Compatibility Test
While these tests are not strictly necessary to perform the Seedminer exploit, the follow-up exploits to this do require this test to be performed and it would be a waste of time and effort to perform Seedminer without the ability to use the other exploits.
While this test is not strictly necessary to perform the Seedminer exploit, the follow-up exploits to this do require this test to be performed and it would be a waste of time and effort to perform Seedminer without the ability to use the other exploits.
There are two different methods for building on the Seedminer exploit (described in more detail at the bottom of this page), so even if one of these test fails you can still use another method as long as the other does not fail.
There are two different methods for building on the Seedminer exploit (described in more detail at the bottom of this page), so even if this test fails you can still use another method.
#### DS Internet Settings Test (used for Fredtool)
1. Go to System Settings, then "Internet Settings", then "Nintendo DS Connections"
1. Press "OK"
1. If your device loads into a "Nintendo Wi-Fi Connection Setup" menu, the test was successful
+ If the screen stays black or appears to freeze, the test has failed and you will not be able to use the Fredtool method which requires a functioning DS Internet Settings
1. Exit this menu
#### DS Download Play Test (used for Frogtool)
1. Launch the Download Play application (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"})
1. Select "Nintendo DS"
1. If your device loads into a "Download software via DS Download Play" menu, the test was successful
+ If the screen stays black or appears to freeze, the test has failed and you will not be able to use the Frogtool method which requires a functioning DS Download Play
+ If the screen stays black or appears to freeze, the test has failed and you will not be able to use the bannerbomb3 method which requires a functioning DS Internet Settings
1. Exit this menu
#### Section II - Prep Work
@ -87,26 +79,24 @@ ___
___
#### Seedminer + Fredtool
#### Seedminer + BannerBomb3 + Fredtool
This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare eShop title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to already own (or download / buy) a DSiWare game from the eShop.
This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.
This method is compatible with all regions, though only the JPN and USA regions have free DSiWare titles in the eShop.
This method is compatible with all regions, though CHN region is not covered by this guide.
This method requires that the DS Internet Settings be functioning properly (see the test at the top of this page).
Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool))
Continue to [BannerBomb3](bannerbomb3)
{: .notice--primary}
___
#### Seedminer + Steelhax + Frogtool
#### Seedminer + Steelhax + DSiDumper + Fredtool
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop.
This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason.
This method requires that the DS Download Play be functioning properly (see the test at the top of this page).
This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you do not have a functioning DS Internet Settings application.
Continue to [Homebrew Launcher (Steelhax)](homebrew-launcher-(steelhax))
{: .notice--primary}

View file

@ -17,9 +17,11 @@ sitemap: false
**All**
+ [A9LH to B9S](a9lh-to-b9s)
+ [BannerBomb3](bannerbomb3)
+ [Cartridge Update](cart-update)
+ [Credits](credits)
+ [CTRTransfer](ctrtransfer)
+ [DSiWare Dumper](dsidumper)
+ [Donations](donations)
+ [F3 (Linux)](f3-(linux))
+ [F3X (Mac)](f3x-(mac))