new page: mset9-android (#2402)

* new page: mset9-android

* mset9-android: delete unused image

lol lmao

* mset9: create landing page

current mset9 -> mset9-cli
mset9 shows a landing page asking people to select their operating system

---------

Co-authored-by: lifehackerhansol <lifehackerhansol@ds-homebrew.com>
This commit is contained in:
lily 2023-12-03 09:53:33 +01:00 committed by GitHub
parent 6ccd8094f9
commit bb6b295e4e
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
23 changed files with 256 additions and 121 deletions

View File

@ -64,6 +64,12 @@ sidebar_pages:
-
title: Installing boot9strap (MSET9)
url: installing-boot9strap-(mset9)
-
title: Installing boot9strap (MSET9 CLI)
url: installing-boot9strap-(mset9-cli)
-
title: Installing boot9strap (MSET9 Play Store)
url: installing-boot9strap-(mset9-play-store)
-
title: Multiple Options
url: multiple-options

View File

@ -4,122 +4,12 @@ title: "Installing boot9strap (MSET9)"
{% include toc title="Table of Contents" %}
{% capture technical_info %}
<summary><em>Technical Details (optional)</em></summary>
[MSET9](https://github.com/zoogie/MSET9) is an exploit for the System Settings application developed by [zoogie](https://github.com/zoogie). It exploits a flaw where the ID1 (the second 32-character folder name inside of the Nintendo 3DS folder, inside of the ID0) can be *any* name as long as it is 32 characters. Performing a specific sequence of actions results in the console executing the instructions that are encoded into the ID1 folder name, which can be used to grant full control over the 3DS.
### Choose your operating system
{% endcapture %}
<details>{{ technical_info | markdownify }}</details>
{: .notice--info}
The instructions for MSET9 differ depending on the computer, phone, or tablet **that you are using to mod your console**.
### Compatibility Notes
Choose the operating system of the device **that you will be using to mod your console**. The device will need a way to read and write files onto the 3DS SD card.
This method requires a computer running Windows, Linux, or macOS. ChromeOS and Android devices have an app that is currently not covered here. iOS devices are not supported. If you do not have access to a computer, you will need to use an [alternate exploit](https://wiki.hacks.guide/wiki/3DS:Alternate_Exploits).
{: .notice--warning}
### What You Need
* The latest release of [MSET9](https://github.com/zoogie/MSET9/releases/latest) (the Release `.zip` file)
* Any 3.x version of [Python](https://www.python.org/downloads/) **installed on your computer**
+ If you are on Linux or macOS, you may already have Python 3. Check by opening a Terminal window and entering `python3 -V`. If this returns a version number, it will work for this guide.
### Instructions
On this page, you will use the MSET9 script, which is used to trigger MSET9. If you get a numbered error (e.g. Error 01) when running the script, the solution to that error can most likely be found on the [troubleshooting](troubleshooting#installing-boot9strap-mset9) page.
{: .notice--info}
#### Section I - Prep Work
In this section, you will prepare the SD card data necessary for the MSET9 exploit to trigger.
1. Power on your console **with your SD card inserted**
1. Open Mii Maker
1. Wait for your console to reach the "Welcome to Mii Maker" screen, then exit Mii Maker
+ You may see [this screen](/images/screenshots/mset9/mii-extdata.png), which indicates the necessary data has been created
+ If you just reach the normal Mii Maker screen, exit Mii Maker and continue to the next step
1. Power off your console
1. Insert your SD card into your computer
1. Copy everything from the Release `.zip` to the root of your SD card, overwriting any existing files
![MSET9 root layout](/images/screenshots/mset9/mset9-root-layout.png)
{: .notice--info}
1. Run the MSET9 script:
+ **Windows**: Double-click `mset9.bat`
+ **macOS**: Double-click `mset9.command` and enter your password if prompted
+ **Linux**: open a Terminal window, `cd` to the root of your SD card, then type `python3 mset9.py` and press Enter
![Image: MSET9 setup](/images/screenshots/mset9/mset9-select.png)
{: .notice--info}
1. Type the number corresponding to your console model and version, then press Enter
+ The window should change to this:
![Image: MSET9 setup](/images/screenshots/mset9/mset9-setup.png)
{: .notice--info}
+ Ensure that the correct console model and version is displayed
1. Type `1`, then press Enter to ensure your console is prepared for MSET9
+ If you get an error, check the [troubleshooting](troubleshooting#installing-boot9strap-mset9), then try again
1. If you see the message "Everything appears to be functional!", MSET9 is ready to be injected. Press Enter to close the MSET9 script
1. Reinsert your SD card into your console
1. Power on your console
#### Section II - MSET9
In this section, you will trigger MSET9 to launch SafeB9SInstaller (the custom firmware installer).
These instructions must be followed **EXACTLY**, so double-check EVERYTHING you are doing to avoid errors!
{: .notice--danger}
1. **[Hover over](/images/screenshots/mset9/hover-settings.png)** the System Settings icon using the D-Pad (do not select it yet)
1. Power off, then power on your console
1. Press (A) to launch System Settings
1. Navigate to `Data Management` -> `Nintendo 3DS` -> `Extra Data` ([image](/images/screenshots/mset9/settings-extdata.png))
1. **Do not press any buttons or touch the screen** - ensure that you see the Mii Maker icon
1. **With the console STILL ON, and without pressing any buttons or touching the screen**, remove your SD card from your console
+ The menu will refresh and say that no SD card is inserted, which is expected
1. Insert your SD card into your computer
1. Run the MSET9 script:
+ **Windows**: Double-click `mset9.bat`
+ **macOS**: Double-click `mset9.command` and enter your password if prompted
+ **Linux**: open a Terminal window, `cd` to the root of your SD card, then type `python3 mset9.py` and press Enter
1. Type the number corresponding to your console model and version, then press Enter
1. In the MSET9 window, type `2`, then press Enter to inject MSET9
+ You should see "MSET9 successfully injected!"
1. Press Enter to close the MSET9 script
1. Reinsert your SD card into your console **without pressing any buttons or touching the screen**
1. If the exploit was successful, you will have booted into SafeB9SInstaller
+ If you get a red screen or the console gets stuck on a loading screen, follow the [troubleshooting guide](troubleshooting#installing-boot9strap-mset9)
#### Section III - Installing boot9strap
{% include_relative include/install-boot9strap-safeb9sinstaller.txt %}
{%- include_relative include/configure-luma3ds.txt %}
#### Section IV - Removing MSET9
In this section, you will remove MSET9 to prevent further issues. (This will not remove the custom firmware that you just installed.)
Do NOT skip this section! If you skip it, applications may crash unexpectedly and you will encounter errors on the next page!
{: .notice--danger}
1. Power off your console
1. Insert your SD card into your computer
1. Run the MSET9 script:
+ **Windows**: Double-click `mset9.bat`
+ **macOS**: Double-click `mset9.command` and enter your password if prompted
+ **Linux**: open a Terminal window, `cd` to the root of your SD card, then type `python3 mset9.py` and press Enter
1. Type the number corresponding to your console model and version, then press Enter
1. In the MSET9 window, type `3`, then press Enter to remove MSET9
+ You should see "Successfully removed MSET9!"
1. Press Enter to close the MSET9 script
{% include_relative include/luma3ds-installed-note.txt %}
___
Did you follow Section IV (Removing MSET9)? That section is MANDATORY!
{: .notice--danger}
### Continue to [Finalizing Setup](finalizing-setup)
{: .notice--primary}
| Windows, macOS, Linux | Android, ChromeOS |
|:-:|:-:|
| [![Windows](/images/windows.png)](installing-boot9strap-(mset9-cli)) <br><br> [![macOS](/images/macos.png)](installing-boot9strap-(mset9-cli)) <br><br> [![Linux](/images/linux.png)](installing-boot9strap-(mset9-cli)) | [![Android](/images/android.png)](installing-boot9strap-(mset9-play-store)) <br><br> [![chromeOS](/images/chromeos.png)](installing-boot9strap-(mset9-play-store)) |

View File

@ -0,0 +1,125 @@
---
title: "Installing boot9strap (MSET9 CLI)"
---
{% include toc title="Table of Contents" %}
{% capture technical_info %}
<summary><em>Technical Details (optional)</em></summary>
[MSET9](https://github.com/zoogie/MSET9) is an exploit for the System Settings application developed by [zoogie](https://github.com/zoogie). It exploits a flaw where the ID1 (the second 32-character folder name inside of the Nintendo 3DS folder, inside of the ID0) can be *any* name as long as it is 32 characters. Performing a specific sequence of actions results in the console executing the instructions that are encoded into the ID1 folder name, which can be used to grant full control over the 3DS.
{% endcapture %}
<details>{{ technical_info | markdownify }}</details>
{: .notice--info}
### Compatibility Notes
This page requires a computer running Windows, Linux, or macOS. If you have an Android phone/tablet or a Chromebook, follow [Installing boot9strap (MSET9 Play Store)](installing-boot9strap-(mset9-play-store)) instead. If you do not have access to any of these devices, you will need to use an [alternate exploit](https://wiki.hacks.guide/wiki/3DS:Alternate_Exploits).
{: .notice--warning}
### What You Need
* The latest release of [MSET9](https://github.com/zoogie/MSET9/releases/latest) (the Release `.zip` file)
* Any 3.x version of [Python](https://www.python.org/downloads/) **installed on your computer**
+ If you are on Linux or macOS, you may already have Python 3. Check by opening a Terminal window and entering `python3 -V`. If this returns a version number, it will work for this guide.
### Instructions
On this page, you will use the MSET9 script, which is used to trigger MSET9. If you get a numbered error (e.g. Error 01) when running the script, the solution to that error can most likely be found on the [troubleshooting](troubleshooting#installing-boot9strap-mset9) page.
{: .notice--info}
#### Section I - Prep Work
In this section, you will prepare the SD card data necessary for the MSET9 exploit to trigger.
1. Power on your console **with your SD card inserted**
1. Open Mii Maker
1. Wait for your console to reach the "Welcome to Mii Maker" screen, then exit Mii Maker
+ You may see [this screen](/images/screenshots/mset9/mii-extdata.png), which indicates the necessary data has been created
+ If you just reach the normal Mii Maker screen, exit Mii Maker and continue to the next step
1. Power off your console
1. Insert your SD card into your computer
1. Copy everything from the Release `.zip` to the root of your SD card, overwriting any existing files
![MSET9 root layout](/images/screenshots/mset9/mset9-root-layout.png)
{: .notice--info}
1. Run the MSET9 script:
+ **Windows**: Double-click `mset9.bat`
+ **macOS**: Double-click `mset9.command` and enter your password if prompted
+ **Linux**: open a Terminal window, `cd` to the root of your SD card, then type `python3 mset9.py` and press Enter
![Image: MSET9 setup](/images/screenshots/mset9/mset9-select.png)
{: .notice--info}
1. Type the number corresponding to your console model and version, then press Enter
+ The window should change to this:
![Image: MSET9 setup](/images/screenshots/mset9/mset9-setup.png)
{: .notice--info}
+ Ensure that the correct console model and version is displayed
1. Type `1`, then press Enter to ensure your console is prepared for MSET9
+ If you get an error, check the [troubleshooting](troubleshooting#installing-boot9strap-mset9), then try again
1. If you see the message "Everything appears to be functional!", MSET9 is ready to be injected. Press Enter to close the MSET9 script
1. Reinsert your SD card into your console
1. Power on your console
#### Section II - MSET9
In this section, you will trigger MSET9 to launch SafeB9SInstaller (the custom firmware installer).
These instructions must be followed **EXACTLY**, so double-check EVERYTHING you are doing to avoid errors!
{: .notice--danger}
1. **[Hover over](/images/screenshots/mset9/hover-settings.png)** the System Settings icon using the D-Pad (do not select it yet)
1. Power off, then power on your console
1. Press (A) to launch System Settings
1. Navigate to `Data Management` -> `Nintendo 3DS` -> `Extra Data` ([image](/images/screenshots/mset9/settings-extdata.png))
1. **Do not press any buttons or touch the screen** - ensure that you see the Mii Maker icon
1. **With the console STILL ON, and without pressing any buttons or touching the screen**, remove your SD card from your console
+ The menu will refresh and say that no SD card is inserted, which is expected
1. Insert your SD card into your computer
1. Run the MSET9 script:
+ **Windows**: Double-click `mset9.bat`
+ **macOS**: Double-click `mset9.command` and enter your password if prompted
+ **Linux**: open a Terminal window, `cd` to the root of your SD card, then type `python3 mset9.py` and press Enter
1. Type the number corresponding to your console model and version, then press Enter
1. In the MSET9 window, type `2`, then press Enter to inject MSET9
+ You should see "MSET9 successfully injected!"
1. Press Enter to close the MSET9 script
1. Reinsert your SD card into your console **without pressing any buttons or touching the screen**
1. If the exploit was successful, you will have booted into SafeB9SInstaller
+ If you get a red screen or the console gets stuck on a loading screen, follow the [troubleshooting guide](troubleshooting#installing-boot9strap-mset9)
#### Section III - Installing boot9strap
{% include_relative include/install-boot9strap-safeb9sinstaller.txt %}
{%- include_relative include/configure-luma3ds.txt %}
#### Section IV - Removing MSET9
In this section, you will remove MSET9 to prevent further issues. (This will not remove the custom firmware that you just installed.)
Do NOT skip this section! If you skip it, applications may crash unexpectedly and you will encounter errors on the next page!
{: .notice--danger}
1. Power off your console
1. Insert your SD card into your computer
1. Run the MSET9 script:
+ **Windows**: Double-click `mset9.bat`
+ **macOS**: Double-click `mset9.command` and enter your password if prompted
+ **Linux**: open a Terminal window, `cd` to the root of your SD card, then type `python3 mset9.py` and press Enter
1. Type the number corresponding to your console model and version, then press Enter
1. In the MSET9 window, type `3`, then press Enter to remove MSET9
+ You should see "Successfully removed MSET9!"
1. Press Enter to close the MSET9 script
{% include_relative include/luma3ds-installed-note.txt %}
___
Did you follow Section IV (Removing MSET9)? That section is MANDATORY!
{: .notice--danger}
### Continue to [Finalizing Setup](finalizing-setup)
{: .notice--primary}

View File

@ -0,0 +1,110 @@
---
title: "Installing boot9strap (MSET9 Play Store)"
---
{% include toc title="Table of Contents" %}
{% capture technical_info %}
<summary><em>Technical Details (optional)</em></summary>
[MSET9](https://github.com/zoogie/MSET9) is an exploit for the System Settings application developed by [zoogie](https://github.com/zoogie). It exploits a flaw where the ID1 (the second 32-character folder name inside of the Nintendo 3DS folder, inside of the ID0) can be *any* name as long as it is 32 characters. Performing a specific sequence of actions results in the console executing the instructions that are encoded into the ID1 folder name, which can be used to grant full control over the 3DS.
{% endcapture %}
<details>{{ technical_info | markdownify }}</details>
{: .notice--info}
### Compatibility Notes
This page requires an Android phone/tablet or a Chromebook. If you have a computer running Windows, macOS, or Linux, follow [Installing boot9strap (MSET9)](installing-boot9strap-(mset9)) instead. If you do not have access to any of these devices, you will need to use an [alternate exploit](alternate-exploits).
{: .notice--warning}
On Android phones/tablets, the minimum Android version required is 6.0 (Marshmallow).
{: .notice--warning}
### What You Need
* The following applications installed from the Google Play Store:
* [MSET9 Installer](https://play.google.com/store/apps/details?id=moe.saru.homebrew.console3ds.mset9_installer_android)
* [ZArchiver](https://play.google.com/store/apps/details?id=ru.zdevs.zarchiver)
* If you wish, you can sideload these applications instead
* The latest release of [MSET9](https://github.com/zoogie/MSET9/releases/latest) (the Release `.zip` file)
### Instructions
#### Section I - Prep Work
In this section, you will prepare the SD card data necessary for the MSET9 exploit to trigger.
1. Power on your console **with your SD card inserted**
1. Open Mii Maker
1. Wait for your console to reach the "Welcome to Mii Maker" screen, then exit Mii Maker
+ You may see [this screen](/images/screenshots/mset9/mii-extdata.png), which indicates the necessary data has been created
+ If you just reach the normal Mii Maker screen, exit Mii Maker and continue to the next step
1. Power off your console
1. Insert your SD card into your phone/tablet/computer
1. Copy everything from the Release `.zip` to the root of your SD card, overwriting any existing files:
+ Open ZArchiver
+ If prompted, [allow ZArchiver to access files on your SD card](/images/screenshots/mset9/zarchiver-allow.png)
+ Navigate to where the downloaded MSET9 Release `.zip` is located ([likely in the Downloads folder](/images/screenshots/mset9/zarchiver-zip-location.png))
+ Select the Release `.zip`, then select "Extract..." ([image](/images/screenshots/mset9/zarchiver-extract-1.png))
+ Navigate to your SD card, then tap the blue 'down arrow' icon to extract the files to the root of your SD card ([image](/images/screenshots/mset9/zarchiver-extract-2.png))
![MSET9 root layout](/images/screenshots/mset9/mset9-root-layout-android.png)
{: .notice--info}
1. Run the [MSET9 Installer application](/images/screenshots/mset9/mset9-setup-android.png)
1. Tap on `Select "Nintendo 3DS" Folder`, then navigate to your `Nintendo 3DS` folder on your SD card ([image](/images/screenshots/mset9/select-mset9-folder-1.png))
1. Once inside the `Nintendo 3DS` folder, tap on "Use this folder", then "Allow" if asked ([image](/images/screenshots/mset9/select-mset9-folder-2.png))
1. If "Setup MSET9" is [highlighted](/images/screenshots/mset9/setup-mset9-highlighted.png), MSET9 is ready to be injected. Close the MSET9 Installer for now
+ If "Check Again" is highlighted, there is a problem that you need to resolve before you can use MSET9. Refer to the [troubleshooting](troubleshooting#installing-boot9strap-mset9)
1. Reinsert your SD card into your console
1. Power on your console
#### Section II - MSET9
In this section, you will trigger MSET9 to launch SafeB9SInstaller (the custom firmware installer).
These instructions must be followed **EXACTLY**, so double-check EVERYTHING you are doing to avoid errors!
{: .notice--danger}
1. **[Hover over](/images/screenshots/mset9/hover-settings.png)** the System Settings icon using the D-Pad (do not select it yet)
1. Power off, then power on your console
1. Press (A) to launch System Settings
1. Navigate to `Data Management` -> `Nintendo 3DS` -> `Extra Data` ([image](/images/screenshots/mset9/settings-extdata.png))
1. **Do not press any buttons or touch the screen** - ensure that you see the Mii Maker icon
1. **With the console STILL ON, and without pressing any buttons or touching the screen**, remove your SD card from your console
+ The menu will refresh and say that no SD card is inserted, which is expected
1. Insert your SD card into your phone/tablet/computer
1. Open the MSET9 Installer application
1. Tap "Setup MSET9"
1. Tap on the photo corresponding to your console model, then on the button corresponding to your current firmware version
+ If the injection was successful, all buttons should become grayed out except for "Remove MSET9"
1. Reinsert your SD card into your console **without pressing any buttons or touching the screen**
1. If the exploit was successful, you will have booted into SafeB9SInstaller
+ If you get a red screen or the console gets stuck on a loading screen, follow the [troubleshooting guide](troubleshooting#installing-boot9strap-mset9)
#### Section III - Installing boot9strap
{% include_relative include/install-boot9strap-safeb9sinstaller.txt %}
{%- include_relative include/configure-luma3ds.txt %}
#### Section IV - Removing MSET9
In this section, you will remove MSET9 to prevent further issues. (This will not remove the custom firmware that you just installed.)
Do NOT skip this section! If you skip it, applications may crash unexpectedly and you will encounter errors on the next page!
{: .notice--danger}
1. Power off your console
1. Insert your SD card into your phone/tablet/computer
1. Open the MSET9 Installer application
1. Tap "Remove MSET9"
1. Close the MSET9 Installer application
{% include_relative include/luma3ds-installed-note.txt %}
___
Did you follow Section IV (Removing MSET9)? That section is MANDATORY!
{: .notice--danger}
### Continue to [Finalizing Setup](finalizing-setup)
{: .notice--primary}

View File

@ -33,8 +33,6 @@ This guide works with every retail console in the Nintendo 3DS family of console
![]({{ "/images/screenshots/onboarding/os.jpg" | absolute_url }})
{: .notice--info}
In most cases, you can follow this guide as long as you are able to download files from the Internet and copy them to your SD card. Depending on your computer/phone/electronic device, you may need to purchase a USB to SD card adapter to allow your computer to read your SD card.
Some methods (notably, Kartminer7 and MSET9) may require a traditional computer running Windows, macOS, or Linux. If you are unable to get access to a computer using those operating systems, you will need to follow another method.
{% endcapture %}
<details>{{ compat | markdownify }}</details>

View File

@ -42,6 +42,8 @@ sitemap: false
+ [Installing boot9strap (Hardmod)](installing-boot9strap-(hardmod))
+ [Installing boot9strap (kartdlphax)](installing-boot9strap-(kartdlphax))
+ [Installing boot9strap (MSET9)](installing-boot9strap-(mset9))
+ [Installing boot9strap (MSET9 CLI)](installing-boot9strap-(mset9-cli))
+ [Installing boot9strap (MSET9 Play Store)](installing-boot9strap-(mset9-play-store))
+ [Installing boot9strap (ntrboot)](installing-boot9strap-(ntrboot))
+ [Installing boot9strap (safecerthax)](installing-boot9strap-(safecerthax))
+ [Installing boot9strap (Soundhax)](installing-boot9strap-(soundhax))

View File

@ -213,7 +213,9 @@ $(document).ready(function() {
"installing-boot9strap-(mset9)": "9",
"installing-boot9strap-(ssloth-browser)": "10",
"installing-boot9strap-(safecerthax)": "11",
"installing-boot9strap-(super-skaterhax)": "12"
"installing-boot9strap-(super-skaterhax)": "12",
"installing-boot9strap-(mset9-play-store)": "13",
"installing-boot9strap-(mset9-cli)": "14"
};
for(var device in devices){
@ -257,7 +259,9 @@ $(document).ready(function() {
"9": ["installing-boot9strap-(mset9)", "finalizing-setup"],
"10": ["installing-boot9strap-(ssloth-browser)", "finalizing-setup"],
"11": ["installing-boot9strap-(safecerthax)", "finalizing-setup"],
"12": ["installing-boot9strap-(super-skaterhax)", "finalizing-setup"]
"12": ["installing-boot9strap-(super-skaterhax)", "finalizing-setup"],
"13": ["installing-boot9strap-(mset9-play-store)", "finalizing-setup"],
"14": ["installing-boot9strap-(mset9-cli)", "finalizing-setup"]
}
// Can add custom routing if necessary but currently both routes are identical
var device_old = Object.assign({}, device_common,{

File diff suppressed because one or more lines are too long

BIN
images/android.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 9.3 KiB

BIN
images/chromeos.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 13 KiB

BIN
images/linux.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 19 KiB

BIN
images/macos.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 8.0 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 199 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 198 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 69 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 61 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 119 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 63 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 120 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 129 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 134 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 66 KiB

BIN
images/windows.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 6.2 KiB