New Crowdin updates (#2271)
* New translations seedminer-(mii).txt (Greek) * New translations seedminer-(mii).txt (Finnish) * New translations seedminer-(mii).txt (Hebrew) * New translations seedminer-(mii).txt (Hungarian) * New translations seedminer-(mii).txt (Italian) * New translations seedminer-(mii).txt (Japanese) * New translations seedminer-(mii).txt (Korean) * New translations seedminer-(mii).txt (Dutch) * New translations seedminer-(mii).txt (Norwegian) * New translations seedminer-(mii).txt (Polish) * New translations seedminer-(mii).txt (Portuguese) * New translations seedminer-(mii).txt (Russian) * New translations seedminer-(mii).txt (Swedish) * New translations seedminer-(mii).txt (Turkish) * New translations seedminer-(mii).txt (Ukrainian) * New translations seedminer-(mii).txt (Chinese Simplified) * New translations seedminer-(mii).txt (Chinese Traditional) * New translations seedminer-(mii).txt (Vietnamese) * New translations seedminer-(mii).txt (Portuguese, Brazilian) * New translations seedminer-(mii).txt (Indonesian) * New translations seedminer-(mii).txt (Thai) * New translations seedminer-(mii).txt (Croatian) * New translations seedminer-(mii).txt (Malay) * New translations seedminer-(mii).txt (Pirate English) * New translations updating-firmware-(kor).txt (Romanian) * New translations updating-firmware-(kor).txt (French) * New translations updating-firmware-(kor).txt (Spanish) * New translations updating-firmware-(kor).txt (Arabic) * New translations updating-firmware-(kor).txt (Bulgarian) * New translations updating-firmware-(kor).txt (Catalan) * New translations updating-firmware-(kor).txt (Czech) * New translations updating-firmware-(kor).txt (German) * New translations updating-firmware-(kor).txt (Greek) * New translations updating-firmware-(kor).txt (Finnish) * New translations updating-firmware-(kor).txt (Hebrew) * New translations updating-firmware-(kor).txt (Hungarian) * New translations updating-firmware-(kor).txt (Italian) * New translations updating-firmware-(kor).txt (Japanese) * New translations updating-firmware-(kor).txt (Korean) * New translations updating-firmware-(kor).txt (Dutch) * New translations updating-firmware-(kor).txt (Norwegian) * New translations updating-firmware-(kor).txt (Polish) * New translations updating-firmware-(kor).txt (Portuguese) * New translations updating-firmware-(kor).txt (Russian) * New translations updating-firmware-(kor).txt (Swedish) * New translations updating-firmware-(kor).txt (Turkish) * New translations updating-firmware-(kor).txt (Ukrainian) * New translations updating-firmware-(kor).txt (Chinese Simplified) * New translations updating-firmware-(kor).txt (Chinese Traditional) * New translations updating-firmware-(kor).txt (Vietnamese) * New translations updating-firmware-(kor).txt (Portuguese, Brazilian) * New translations updating-firmware-(kor).txt (Indonesian) * New translations updating-firmware-(kor).txt (Thai) * New translations updating-firmware-(kor).txt (Croatian) * New translations updating-firmware-(kor).txt (Malay) * New translations updating-firmware-(kor).txt (Pirate English) * New translations updating-firmware-(new-3ds).txt (Romanian) * New translations updating-firmware-(new-3ds).txt (French) * New translations updating-firmware-(new-3ds).txt (Spanish) * New translations updating-firmware-(new-3ds).txt (Arabic) * New translations updating-firmware-(new-3ds).txt (Bulgarian) * New translations updating-firmware-(new-3ds).txt (Catalan) * New translations updating-firmware-(new-3ds).txt (Czech) * New translations updating-firmware-(new-3ds).txt (German) * New translations updating-firmware-(new-3ds).txt (Greek) * New translations updating-firmware-(new-3ds).txt (Finnish) * New translations updating-firmware-(new-3ds).txt (Hebrew) * New translations updating-firmware-(new-3ds).txt (Hungarian) * New translations updating-firmware-(new-3ds).txt (Italian) * New translations updating-firmware-(new-3ds).txt (Japanese) * New translations updating-firmware-(new-3ds).txt (Korean) * New translations updating-firmware-(new-3ds).txt (Dutch) * New translations updating-firmware-(new-3ds).txt (Norwegian) * New translations updating-firmware-(new-3ds).txt (Polish) * New translations updating-firmware-(new-3ds).txt (Portuguese) * New translations updating-firmware-(new-3ds).txt (Russian) * New translations updating-firmware-(new-3ds).txt (Swedish) * New translations updating-firmware-(new-3ds).txt (Turkish) * New translations updating-firmware-(new-3ds).txt (Ukrainian) * New translations updating-firmware-(new-3ds).txt (Chinese Simplified) * New translations updating-firmware-(new-3ds).txt (Chinese Traditional) * New translations updating-firmware-(new-3ds).txt (Vietnamese) * New translations updating-firmware-(new-3ds).txt (Portuguese, Brazilian) * New translations updating-firmware-(new-3ds).txt (Indonesian) * New translations updating-firmware-(new-3ds).txt (Thai) * New translations updating-firmware-(new-3ds).txt (Croatian) * New translations updating-firmware-(new-3ds).txt (Malay) * New translations updating-firmware-(new-3ds).txt (Pirate English) * New translations updating-firmware-(twn).txt (Romanian) * New translations updating-firmware-(twn).txt (French) * New translations updating-firmware-(twn).txt (Spanish) * New translations updating-firmware-(twn).txt (Arabic) * New translations updating-firmware-(twn).txt (Bulgarian) * New translations updating-firmware-(twn).txt (Catalan) * New translations updating-firmware-(twn).txt (Czech) * New translations updating-firmware-(twn).txt (German) * New translations updating-firmware-(twn).txt (Greek) * New translations updating-firmware-(twn).txt (Finnish) * New translations updating-firmware-(twn).txt (Hebrew) * New translations updating-firmware-(twn).txt (Hungarian) * New translations updating-firmware-(twn).txt (Italian) * New translations updating-firmware-(twn).txt (Japanese) * New translations updating-firmware-(twn).txt (Korean) * New translations updating-firmware-(twn).txt (Dutch) * New translations updating-firmware-(twn).txt (Norwegian) * New translations updating-firmware-(twn).txt (Polish) * New translations updating-firmware-(twn).txt (Portuguese) * New translations updating-firmware-(twn).txt (Russian) * New translations updating-firmware-(twn).txt (Swedish) * New translations updating-firmware-(twn).txt (Turkish) * New translations updating-firmware-(twn).txt (Ukrainian) * New translations updating-firmware-(twn).txt (Chinese Simplified) * New translations updating-firmware-(twn).txt (Chinese Traditional) * New translations updating-firmware-(twn).txt (Vietnamese) * New translations updating-firmware-(twn).txt (Portuguese, Brazilian) * New translations updating-firmware-(twn).txt (Indonesian) * New translations updating-firmware-(twn).txt (Thai) * New translations updating-firmware-(twn).txt (Croatian) * New translations updating-firmware-(twn).txt (Malay) * New translations updating-firmware-(twn).txt (Pirate English) * New translations bb3-prep.txt (Romanian) * New translations bb3-prep.txt (French) * New translations bb3-prep.txt (Spanish) * New translations bb3-prep.txt (Arabic) * New translations bb3-prep.txt (Bulgarian) * New translations bb3-prep.txt (Catalan) * New translations bb3-prep.txt (Czech) * New translations bb3-prep.txt (German) * New translations bb3-prep.txt (Greek) * New translations bb3-prep.txt (Finnish) * New translations bb3-prep.txt (Hebrew) * New translations bb3-prep.txt (Hungarian) * New translations bb3-prep.txt (Italian) * New translations bb3-prep.txt (Japanese) * New translations bb3-prep.txt (Korean) * New translations bb3-prep.txt (Dutch) * New translations bb3-prep.txt (Norwegian) * New translations bb3-prep.txt (Polish) * New translations bb3-prep.txt (Portuguese) * New translations bb3-prep.txt (Russian) * New translations bb3-prep.txt (Swedish) * New translations bb3-prep.txt (Turkish) * New translations bb3-prep.txt (Ukrainian) * New translations bb3-prep.txt (Chinese Simplified) * New translations bb3-prep.txt (Chinese Traditional) * New translations bb3-prep.txt (Vietnamese) * New translations bb3-prep.txt (Portuguese, Brazilian) * New translations bb3-prep.txt (Indonesian) * New translations bb3-prep.txt (Thai) * New translations bb3-prep.txt (Croatian) * New translations bb3-prep.txt (Malay) * New translations bb3-prep.txt (Pirate English) * New translations fredtool-prep.txt (Romanian) * New translations fredtool-prep.txt (French) * New translations fredtool-prep.txt (Spanish) * New translations fredtool-prep.txt (Arabic) * New translations fredtool-prep.txt (Bulgarian) * New translations fredtool-prep.txt (Catalan) * New translations fredtool-prep.txt (Czech) * New translations fredtool-prep.txt (German) * New translations fredtool-prep.txt (Greek) * New translations fredtool-prep.txt (Finnish) * New translations fredtool-prep.txt (Hebrew) * New translations fredtool-prep.txt (Hungarian) * New translations fredtool-prep.txt (Italian) * New translations fredtool-prep.txt (Japanese) * New translations fredtool-prep.txt (Korean) * New translations fredtool-prep.txt (Dutch) * New translations fredtool-prep.txt (Norwegian) * New translations fredtool-prep.txt (Polish) * New translations fredtool-prep.txt (Portuguese) * New translations fredtool-prep.txt (Russian) * New translations fredtool-prep.txt (Swedish) * New translations fredtool-prep.txt (Turkish) * New translations fredtool-prep.txt (Ukrainian) * New translations fredtool-prep.txt (Chinese Simplified) * New translations fredtool-prep.txt (Chinese Traditional) * New translations fredtool-prep.txt (Vietnamese) * New translations fredtool-prep.txt (Portuguese, Brazilian) * New translations fredtool-prep.txt (Indonesian) * New translations fredtool-prep.txt (Thai) * New translations fredtool-prep.txt (Croatian) * New translations fredtool-prep.txt (Malay) * New translations fredtool-prep.txt (Pirate English) * New translations fredtool-restore-dsconn.txt (Romanian) * New translations fredtool-restore-dsconn.txt (French) * New translations fredtool-restore-dsconn.txt (Spanish) * New translations fredtool-restore-dsconn.txt (Arabic) * New translations fredtool-restore-dsconn.txt (Bulgarian) * New translations fredtool-restore-dsconn.txt (Catalan) * New translations fredtool-restore-dsconn.txt (Czech) * New translations fredtool-restore-dsconn.txt (German) * New translations fredtool-restore-dsconn.txt (Greek) * New translations fredtool-restore-dsconn.txt (Finnish) * New translations fredtool-restore-dsconn.txt (Hebrew) * New translations fredtool-restore-dsconn.txt (Hungarian) * New translations fredtool-restore-dsconn.txt (Italian) * New translations fredtool-restore-dsconn.txt (Japanese) * New translations fredtool-restore-dsconn.txt (Korean) * New translations fredtool-restore-dsconn.txt (Dutch) * New translations fredtool-restore-dsconn.txt (Norwegian) * New translations fredtool-restore-dsconn.txt (Polish) * New translations fredtool-restore-dsconn.txt (Portuguese) * New translations fredtool-restore-dsconn.txt (Russian) * New translations fredtool-restore-dsconn.txt (Swedish) * New translations fredtool-restore-dsconn.txt (Turkish) * New translations fredtool-restore-dsconn.txt (Ukrainian) * New translations fredtool-restore-dsconn.txt (Chinese Simplified) * New translations fredtool-restore-dsconn.txt (Chinese Traditional) * New translations fredtool-restore-dsconn.txt (Vietnamese) * New translations fredtool-restore-dsconn.txt (Portuguese, Brazilian) * New translations fredtool-restore-dsconn.txt (Indonesian) * New translations fredtool-restore-dsconn.txt (Thai) * New translations fredtool-restore-dsconn.txt (Croatian) * New translations fredtool-restore-dsconn.txt (Malay) * New translations fredtool-restore-dsconn.txt (Pirate English) * New translations fredtool-write-flipnote.txt (Romanian) * New translations fredtool-write-flipnote.txt (French) * New translations fredtool-write-flipnote.txt (Spanish) * New translations fredtool-write-flipnote.txt (Arabic) * New translations fredtool-write-flipnote.txt (Bulgarian) * New translations fredtool-write-flipnote.txt (Catalan) * New translations fredtool-write-flipnote.txt (Czech) * New translations fredtool-write-flipnote.txt (German) * New translations fredtool-write-flipnote.txt (Greek) * New translations fredtool-write-flipnote.txt (Finnish) * New translations fredtool-write-flipnote.txt (Hebrew) * New translations fredtool-write-flipnote.txt (Hungarian) * New translations fredtool-write-flipnote.txt (Italian) * New translations fredtool-write-flipnote.txt (Japanese) * New translations fredtool-write-flipnote.txt (Korean) * New translations fredtool-write-flipnote.txt (Dutch) * New translations fredtool-write-flipnote.txt (Norwegian) * New translations fredtool-write-flipnote.txt (Polish) * New translations fredtool-write-flipnote.txt (Portuguese) * New translations fredtool-write-flipnote.txt (Russian) * New translations fredtool-write-flipnote.txt (Swedish) * New translations fredtool-write-flipnote.txt (Turkish) * New translations fredtool-write-flipnote.txt (Ukrainian) * New translations fredtool-write-flipnote.txt (Chinese Simplified) * New translations fredtool-write-flipnote.txt (Chinese Traditional) * New translations fredtool-write-flipnote.txt (Vietnamese) * New translations fredtool-write-flipnote.txt (Portuguese, Brazilian) * New translations fredtool-write-flipnote.txt (Indonesian) * New translations fredtool-write-flipnote.txt (Thai) * New translations fredtool-write-flipnote.txt (Croatian) * New translations fredtool-write-flipnote.txt (Malay) * New translations fredtool-write-flipnote.txt (Pirate English) * New translations credits.txt (Korean)
This commit is contained in:
parent
0ab9808b5f
commit
c9f4ab0e1e
685 changed files with 11361 additions and 3777 deletions
50
_pages/ar_SA/bannerbomb3-(legacy).txt
Normal file
50
_pages/ar_SA/bannerbomb3-(legacy).txt
Normal file
|
@ -0,0 +1,50 @@
|
|||
---
|
||||
title: "BannerBomb3 (Legacy)"
|
||||
---
|
||||
|
||||
{% include toc title="Table of Contents" %}
|
||||
|
||||
{% capture technical_info %}
|
||||
<summary><em>Technical Details (optional)</em></summary>
|
||||
|
||||
To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.
|
||||
|
||||
To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.
|
||||
|
||||
For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3).
|
||||
{% endcapture %}
|
||||
|
||||
<details>{{ technical_info | markdownify }}</details>
|
||||
{: .notice--info}
|
||||
|
||||
### Compatibility Notes
|
||||
|
||||
These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version.
|
||||
|
||||
### What You Need
|
||||
|
||||
* Your `movable.sed` file from completing Seedminer or nimhax
|
||||
|
||||
#### Section I - Prep Work
|
||||
|
||||
{% include_relative include/bb3-prep.txt %}
|
||||
|
||||
#### Section II - Hardware Button Check
|
||||
|
||||
In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page.
|
||||
|
||||
Your SD card should remain in your computer while you perform this check.
|
||||
|
||||
{% include_relative include/safemodecheck.txt %}
|
||||
|
||||
___
|
||||
|
||||
### Next steps: Choose an exploit
|
||||
|
||||
If the camera appeared in the previous section, Safe Mode is likely to be working on your device.
|
||||
|
||||
If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm))
|
||||
{: .notice--primary}
|
||||
|
||||
If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy))
|
||||
{: .notice--info}
|
|
@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol
|
|||
|
||||
#### Section I - Prep Work
|
||||
|
||||
In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card.
|
||||
|
||||
1. Power off your device
|
||||
1. Insert your SD card into your computer
|
||||
1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer
|
||||
1. Upload your movable.sed using the “Choose File” option
|
||||
1. Click “Build and Download”
|
||||
+ This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`)
|
||||
1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card
|
||||
+ The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
|
||||
+ This file does not need to be opened or extracted
|
||||
![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info}
|
||||
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` on your SD card
|
||||
+ `<ID0>` is the 32-letter folder name that you copied in [Seedminer](seedminer)
|
||||
+ `<ID1>` is a 32-letter folder inside of the `<ID0>`
|
||||
+ If you have multiple `<ID1>` folders, follow the instructions [here](troubleshooting#bannerbomb3)
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info}
|
||||
1. Create a folder named `Nintendo DSiWare` inside of the `<ID1>`
|
||||
+ If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card
|
||||
1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder
|
||||
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }})
|
||||
{: .notice--info}
|
||||
{% include_relative include/bb3-prep.txt %}
|
||||
|
||||
#### Section II - Hardware Button Check
|
||||
|
||||
In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page.
|
||||
|
||||
Your SD card should remain in your computer while you perform this check.
|
||||
|
||||
{% include_relative include/safemodecheck.txt %}
|
||||
|
||||
___
|
||||
|
|
|
@ -177,9 +177,6 @@ ___
|
|||
You're done! Custom firmware is now fully configured on your device.
|
||||
{: .notice--success}
|
||||
|
||||
Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks!
|
||||
{: .notice--info}
|
||||
|
||||
### Information and Notes
|
||||
|
||||
{% capture notice-6 %}
|
||||
|
|
|
@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up
|
|||
1. Select the "GO GO!" button on the top screen
|
||||
+ If any prompts appear, approve all of them
|
||||
+ If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section
|
||||
+ If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section
|
||||
+ If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section
|
||||
+ If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax)
|
||||
1. If the exploit was successful, your device will have booted into the Homebrew Launcher
|
||||
1. Power off your device
|
||||
|
|
23
_pages/ar_SA/include/bb3-prep.txt
Normal file
23
_pages/ar_SA/include/bb3-prep.txt
Normal file
|
@ -0,0 +1,23 @@
|
|||
In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card.
|
||||
|
||||
1. Power off your device
|
||||
1. Insert your SD card into your computer
|
||||
1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer
|
||||
1. Upload your movable.sed using the “Choose File” option
|
||||
1. Click “Build and Download”
|
||||
+ This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`)
|
||||
1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card
|
||||
+ The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
|
||||
+ This file does not need to be opened or extracted
|
||||
![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info}
|
||||
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` on your SD card
|
||||
+ `<ID0>` is the 32-letter folder name that you copied in [Seedminer](seedminer)
|
||||
+ `<ID1>` is a 32-letter folder inside of the `<ID0>`
|
||||
+ If you have multiple `<ID1>` folders, follow the instructions [here](troubleshooting#bannerbomb3)
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info}
|
||||
1. Create a folder named `Nintendo DSiWare` inside of the `<ID1>`
|
||||
+ If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card
|
||||
1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder
|
||||
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }})
|
||||
{: .notice--info}
|
29
_pages/ar_SA/include/fredtool-prep.txt
Normal file
29
_pages/ar_SA/include/fredtool-prep.txt
Normal file
|
@ -0,0 +1,29 @@
|
|||
In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer.
|
||||
|
||||
1. Insert your SD card into your computer
|
||||
1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer
|
||||
1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters)
|
||||
1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option
|
||||
1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option
|
||||
1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit)
|
||||
1. Click "Build"
|
||||
+ Wait a few seconds for the build process to complete
|
||||
1. In the Build History section on the left, type the Username into the "Filter Builds" field
|
||||
1. Click on the first search result
|
||||
+ This result should have the latest timestamp
|
||||
1. Click the "output_(name).zip" link
|
||||
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` on your SD card
|
||||
+ `<ID0>` is the 32-letter folder name that you copied in [Seedminer](seedminer)
|
||||
+ `<ID1>` is a 32-letter folder inside of the `<ID0>`
|
||||
1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder
|
||||
1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info}
|
||||
1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
|
||||
+ The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
|
||||
1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card
|
||||
1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card
|
||||
1. Reinsert your SD card into your device
|
||||
1. Power on your device
|
||||
|
||||
![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }})
|
||||
{: .notice--info}
|
10
_pages/ar_SA/include/fredtool-restore-dsconn.txt
Normal file
10
_pages/ar_SA/include/fredtool-restore-dsconn.txt
Normal file
|
@ -0,0 +1,10 @@
|
|||
In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section.
|
||||
|
||||
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` on your SD card
|
||||
1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one
|
||||
1. Reinsert your SD card into your device
|
||||
1. Power on your device
|
||||
1. Launch System Settings on your device
|
||||
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
|
||||
1. Select the "Nintendo DSi™" title
|
||||
1. Select "Copy", then select "OK"
|
11
_pages/ar_SA/include/fredtool-write-flipnote.txt
Normal file
11
_pages/ar_SA/include/fredtool-write-flipnote.txt
Normal file
|
@ -0,0 +1,11 @@
|
|||
In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio.
|
||||
|
||||
1. Launch System Settings on your device
|
||||
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
|
||||
1. Select the "Haxxxxxxxxx!" title
|
||||
+ If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
|
||||
1. Select "Copy", then select "OK"
|
||||
1. Return to main menu of the System Settings
|
||||
1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png))
|
||||
1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio
|
||||
+ If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
|
|
@ -1,3 +1,5 @@
|
|||
In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page.
|
||||
|
||||
1. Power on your device
|
||||
1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time
|
||||
+ The camera applet should appear
|
||||
|
|
|
@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A
|
|||
|
||||
In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key.
|
||||
|
||||
{% capture console_state_info %}
|
||||
Before following this section:
|
||||
+ Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data
|
||||
+ Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen)
|
||||
{: .notice--info}
|
||||
{% endcapture %}
|
||||
<div class="notice--info">{{ console_state_info | markdownify }}</div>
|
||||
|
||||
1. Power off your device
|
||||
1. Insert your SD card into your computer
|
||||
|
|
|
@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
|
|||
<details>{{ technical_info | markdownify }}</details>
|
||||
{: .notice--info}
|
||||
|
||||
You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!!
|
||||
{: .notice--warning}
|
||||
|
||||
### What You Need
|
||||
|
||||
* Your `movable.sed` file from completing [Seedminer](seedminer)
|
||||
* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`)
|
||||
* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download)
|
||||
* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download)
|
||||
* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file)
|
||||
|
||||
#### Section I - CFW Check
|
||||
|
@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana
|
|||
|
||||
#### Section III - Prep Work
|
||||
|
||||
In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer.
|
||||
|
||||
1. Insert your SD card into your computer
|
||||
1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer
|
||||
1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters)
|
||||
1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option
|
||||
1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option
|
||||
1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit)
|
||||
1. Click "Build"
|
||||
+ Wait a few seconds for the build process to complete
|
||||
1. In the Build History section on the left, type the Username into the "Filter Builds" field
|
||||
1. Click on the first search result
|
||||
+ This result should have the latest timestamp
|
||||
1. Click the "output_(name).zip" link
|
||||
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` on your SD card
|
||||
+ `<ID0>` is the 32-letter folder name that you copied in [Seedminer](seedminer)
|
||||
+ `<ID1>` is a 32-letter folder inside of the `<ID0>`
|
||||
1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder
|
||||
1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info}
|
||||
1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
|
||||
+ The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
|
||||
1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card
|
||||
1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card
|
||||
1. Reinsert your SD card into your device
|
||||
1. Power on your device
|
||||
|
||||
![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }})
|
||||
{: .notice--info}
|
||||
{% include_relative include/fredtool-prep.txt %}
|
||||
|
||||
#### Section IV - Overwriting DS Connection Settings
|
||||
|
||||
In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio.
|
||||
|
||||
1. Launch System Settings on your device
|
||||
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
|
||||
1. Select the "Haxxxxxxxxx!" title
|
||||
+ If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
|
||||
1. Select "Copy", then select "OK"
|
||||
1. Return to main menu of the System Settings
|
||||
1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png))
|
||||
1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio
|
||||
+ If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
|
||||
{% include_relative include/fredtool-write-flipnote.txt %}
|
||||
|
||||
#### Section V - Flipnote Exploit
|
||||
|
||||
|
@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte
|
|||
|
||||
#### Section VII - Restoring DS Connection Settings
|
||||
|
||||
In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV.
|
||||
|
||||
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` on your SD card
|
||||
1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one
|
||||
1. Reinsert your SD card into your device
|
||||
1. Power on your device
|
||||
1. Launch System Settings on your device
|
||||
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
|
||||
1. Select the "Nintendo DSi™" title
|
||||
1. Select "Copy", then select "OK"
|
||||
{% include_relative include/fredtool-restore-dsconn.txt %}
|
||||
|
||||
___
|
||||
|
||||
|
||||
### Continue to [Finalizing Setup](finalizing-setup)
|
||||
{: .notice--primary}
|
||||
|
|
77
_pages/ar_SA/installing-boot9strap-(fredtool-legacy).txt
Normal file
77
_pages/ar_SA/installing-boot9strap-(fredtool-legacy).txt
Normal file
|
@ -0,0 +1,77 @@
|
|||
---
|
||||
title: "Installing boot9strap (Fredtool, Legacy)"
|
||||
---
|
||||
|
||||
{% include toc title="Table of Contents" %}
|
||||
|
||||
{% capture technical_info %}
|
||||
<summary><em>Technical Details (optional)</em></summary>
|
||||
|
||||
To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.
|
||||
|
||||
To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root.
|
||||
|
||||
Once we have a DSiWare backup, we can inject it into the DS Internet Settings application.
|
||||
|
||||
This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws).
|
||||
|
||||
{% endcapture %}
|
||||
<details>{{ technical_info | markdownify }}</details>
|
||||
{: .notice--info}
|
||||
|
||||
You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!!
|
||||
{: .notice--warning}
|
||||
|
||||
### What You Need
|
||||
|
||||
* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii))
|
||||
* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`)
|
||||
* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download)
|
||||
* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file)
|
||||
|
||||
#### Section I - CFW Check
|
||||
|
||||
{% include_relative include/cfw-check-fredtool.txt %}
|
||||
|
||||
#### Section II - BannerBomb3
|
||||
|
||||
In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section.
|
||||
|
||||
1. Reinsert your SD card into your device
|
||||
1. Power on your device
|
||||
1. Launch System Settings on your device
|
||||
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
|
||||
+ Your device should show the BB3 multihax menu
|
||||
+ If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
|
||||
1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare"
|
||||
+ Your device will automatically reboot
|
||||
1. Power off your device
|
||||
|
||||
#### Section III - Prep Work
|
||||
|
||||
{% include_relative include/fredtool-prep.txt %}
|
||||
|
||||
#### Section IV - Overwriting DS Connection Settings
|
||||
|
||||
{% include_relative include/fredtool-write-flipnote.txt %}
|
||||
|
||||
#### Section V - Flipnote Exploit
|
||||
|
||||
{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %}
|
||||
|
||||
#### Section VI - Luma3DS Configuration
|
||||
|
||||
1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration
|
||||
{% include_relative include/configure-luma3ds.txt %}
|
||||
|
||||
{% include_relative include/luma3ds-installed-note.txt %}
|
||||
|
||||
#### Section VII - Restoring DS Connection Settings
|
||||
|
||||
{% include_relative include/fredtool-restore-dsconn.txt %}
|
||||
|
||||
___
|
||||
|
||||
|
||||
### Continue to [Finalizing Setup](finalizing-setup)
|
||||
{: .notice--primary}
|
84
_pages/ar_SA/seedminer-(mii).txt
Normal file
84
_pages/ar_SA/seedminer-(mii).txt
Normal file
|
@ -0,0 +1,84 @@
|
|||
---
|
||||
title: "Seedminer (Mii)"
|
||||
---
|
||||
|
||||
{% include toc title="Table of Contents" %}
|
||||
|
||||
{% capture gpu_warning %}
|
||||
This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready:
|
||||
+ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself)
|
||||
+ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple)
|
||||
+ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL)
|
||||
+ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important)
|
||||
{% endcapture %}
|
||||
<div class="notice--warning">{{ gpu_warning | markdownify }}</div>
|
||||
|
||||
{% capture technical_info %}
|
||||
<summary><em>Technical Details (optional)</em></summary>
|
||||
|
||||
To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.
|
||||
|
||||
Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange.
|
||||
|
||||
For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3).
|
||||
|
||||
{% endcapture %}
|
||||
<details>{{ technical_info | markdownify }}</details>
|
||||
{: .notice--info}
|
||||
|
||||
## Instructions
|
||||
|
||||
If you are on Linux or macOS, replace `py -3` with `python3` in all commands.
|
||||
{: .notice--info}
|
||||
|
||||
### What you need
|
||||
|
||||
+ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip)
|
||||
+ Any 3.x version of [Python](https://www.python.org/downloads/) installed
|
||||
+ If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide.
|
||||
|
||||
### Section I - Prep Work
|
||||
|
||||
In this section, you will set up Seedminer and obtain your console's files that are needed for mining.
|
||||
|
||||
1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC
|
||||
+ Keep this location handy, as this Seedminer folder will be where multiple other files are placed
|
||||
1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt
|
||||
1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install
|
||||
+ If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/).
|
||||
1. Turn your console on while the SD card is inserted
|
||||
1. Open the Mii Maker app
|
||||
1. Tap the "QR Code/Image Options" button
|
||||
1. Tap "Save Mii as QR Code"
|
||||
1. Select any Mii Character (make a new one first if you don't have any), and press "OK"
|
||||
1. Turn the console off
|
||||
1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside
|
||||
+ This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer)
|
||||
+ Once you have the ID0, paste it into a document so you can reference it later
|
||||
1. Navigate to the `DCIM` folder on the SD card
|
||||
1. Look for the QR Code, which will be a `.JPG` file starting with `HNI`
|
||||
+ You may have many other files in here already if you use the Nintendo 3DS Camera app
|
||||
1. Copy this file to the Seedminer folder on your PC
|
||||
|
||||
### Section II - Processing Mii QR and Mining
|
||||
|
||||
In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it.
|
||||
|
||||
1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer
|
||||
1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier
|
||||
1. Click on "Export to...", then select "encrypted (.bin)"
|
||||
+ This will download a file named `input.bin`
|
||||
1. Copy this `input.bin` to the Seedminer folder
|
||||
1. Open the terminal/PowerShell/Command Prompt window from earlier
|
||||
1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 <id0>`
|
||||
+ Replace `<id0>` with the ID0 you copied into a document
|
||||
+ Do not include the angle brackets
|
||||
1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii <model> <year>`
|
||||
+ Replace `<model>` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new
|
||||
+ Replace `<year>` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle
|
||||
+ If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there
|
||||
+ The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength
|
||||
1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder
|
||||
|
||||
Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy))
|
||||
{: .notice--primary}
|
|
@ -18,6 +18,7 @@ sitemap: false
|
|||
|
||||
+ [A9LH to B9S](a9lh-to-b9s)
|
||||
+ [BannerBomb3](bannerbomb3)
|
||||
+ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy))
|
||||
+ [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn))
|
||||
+ [Credits](credits)
|
||||
+ [Checking for CFW](checking-for-cfw)
|
||||
|
@ -44,6 +45,7 @@ sitemap: false
|
|||
+ [Home](/)
|
||||
+ [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax))
|
||||
+ [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool))
|
||||
+ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy))
|
||||
+ [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool))
|
||||
+ [Installing boot9strap (Hardmod)](installing-boot9strap-(hardmod))
|
||||
+ [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm))
|
||||
|
@ -59,6 +61,7 @@ sitemap: false
|
|||
+ [Region Changing](region-changing)
|
||||
+ [Restoring / Updating CFW](restoring-updating-cfw)
|
||||
+ [Seedminer](seedminer)
|
||||
+ [Seedminer](seedminer-(mii))
|
||||
+ [Seedminer (TWN)](seedminer-(twn))
|
||||
+ [Troubleshooting](troubleshooting)
|
||||
+ [Uninstall CFW](uninstall-cfw)
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
---
|
||||
title: "Updating Firmware (KOR/TWN)"
|
||||
title: "Updating Firmware (KOR)"
|
||||
---
|
||||
|
||||
### Required Reading
|
18
_pages/ar_SA/updating-firmware-(twn).txt
Normal file
18
_pages/ar_SA/updating-firmware-(twn).txt
Normal file
|
@ -0,0 +1,18 @@
|
|||
---
|
||||
title: "Updating Firmware (TWN)"
|
||||
---
|
||||
|
||||
### Required Reading
|
||||
|
||||
To use the Seedminer exploit, you must update your device to the latest system version.
|
||||
|
||||
### What you need
|
||||
|
||||
* An internet connection on your device
|
||||
|
||||
#### Section I - Updating the System
|
||||
|
||||
{% include_relative include/sysupdate.txt cfw="false" %}
|
||||
|
||||
Continue to [Seedminer (TWN)](seedminer-(twn))
|
||||
{: .notice--primary}
|
50
_pages/bg_BG/bannerbomb3-(legacy).txt
Normal file
50
_pages/bg_BG/bannerbomb3-(legacy).txt
Normal file
|
@ -0,0 +1,50 @@
|
|||
---
|
||||
title: "BannerBomb3 (Legacy)"
|
||||
---
|
||||
|
||||
{% include toc title="Table of Contents" %}
|
||||
|
||||
{% capture technical_info %}
|
||||
<summary><em>Technical Details (optional)</em></summary>
|
||||
|
||||
To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.
|
||||
|
||||
To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.
|
||||
|
||||
For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3).
|
||||
{% endcapture %}
|
||||
|
||||
<details>{{ technical_info | markdownify }}</details>
|
||||
{: .notice--info}
|
||||
|
||||
### Compatibility Notes
|
||||
|
||||
These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version.
|
||||
|
||||
### What You Need
|
||||
|
||||
* Your `movable.sed` file from completing Seedminer or nimhax
|
||||
|
||||
#### Section I - Prep Work
|
||||
|
||||
{% include_relative include/bb3-prep.txt %}
|
||||
|
||||
#### Section II - Hardware Button Check
|
||||
|
||||
In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page.
|
||||
|
||||
Your SD card should remain in your computer while you perform this check.
|
||||
|
||||
{% include_relative include/safemodecheck.txt %}
|
||||
|
||||
___
|
||||
|
||||
### Next steps: Choose an exploit
|
||||
|
||||
If the camera appeared in the previous section, Safe Mode is likely to be working on your device.
|
||||
|
||||
If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm))
|
||||
{: .notice--primary}
|
||||
|
||||
If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy))
|
||||
{: .notice--info}
|
|
@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol
|
|||
|
||||
#### Section I - Prep Work
|
||||
|
||||
In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card.
|
||||
|
||||
1. Power off your device
|
||||
1. Insert your SD card into your computer
|
||||
1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer
|
||||
1. Upload your movable.sed using the “Choose File” option
|
||||
1. Click “Build and Download”
|
||||
+ This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`)
|
||||
1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card
|
||||
+ The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
|
||||
+ This file does not need to be opened or extracted
|
||||
![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info}
|
||||
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` on your SD card
|
||||
+ `<ID0>` is the 32-letter folder name that you copied in [Seedminer](seedminer)
|
||||
+ `<ID1>` is a 32-letter folder inside of the `<ID0>`
|
||||
+ If you have multiple `<ID1>` folders, follow the instructions [here](troubleshooting#bannerbomb3)
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info}
|
||||
1. Create a folder named `Nintendo DSiWare` inside of the `<ID1>`
|
||||
+ If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card
|
||||
1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder
|
||||
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }})
|
||||
{: .notice--info}
|
||||
{% include_relative include/bb3-prep.txt %}
|
||||
|
||||
#### Section II - Hardware Button Check
|
||||
|
||||
In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page.
|
||||
|
||||
Your SD card should remain in your computer while you perform this check.
|
||||
|
||||
{% include_relative include/safemodecheck.txt %}
|
||||
|
||||
___
|
||||
|
|
|
@ -177,9 +177,6 @@ ___
|
|||
You're done! Custom firmware is now fully configured on your device.
|
||||
{: .notice--success}
|
||||
|
||||
Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks!
|
||||
{: .notice--info}
|
||||
|
||||
### Information and Notes
|
||||
|
||||
{% capture notice-6 %}
|
||||
|
|
|
@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up
|
|||
1. Select the "GO GO!" button on the top screen
|
||||
+ If any prompts appear, approve all of them
|
||||
+ If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section
|
||||
+ If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section
|
||||
+ If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section
|
||||
+ If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax)
|
||||
1. If the exploit was successful, your device will have booted into the Homebrew Launcher
|
||||
1. Power off your device
|
||||
|
|
23
_pages/bg_BG/include/bb3-prep.txt
Normal file
23
_pages/bg_BG/include/bb3-prep.txt
Normal file
|
@ -0,0 +1,23 @@
|
|||
In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card.
|
||||
|
||||
1. Power off your device
|
||||
1. Insert your SD card into your computer
|
||||
1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer
|
||||
1. Upload your movable.sed using the “Choose File” option
|
||||
1. Click “Build and Download”
|
||||
+ This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`)
|
||||
1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card
|
||||
+ The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
|
||||
+ This file does not need to be opened or extracted
|
||||
![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info}
|
||||
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` on your SD card
|
||||
+ `<ID0>` is the 32-letter folder name that you copied in [Seedminer](seedminer)
|
||||
+ `<ID1>` is a 32-letter folder inside of the `<ID0>`
|
||||
+ If you have multiple `<ID1>` folders, follow the instructions [here](troubleshooting#bannerbomb3)
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info}
|
||||
1. Create a folder named `Nintendo DSiWare` inside of the `<ID1>`
|
||||
+ If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card
|
||||
1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder
|
||||
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }})
|
||||
{: .notice--info}
|
29
_pages/bg_BG/include/fredtool-prep.txt
Normal file
29
_pages/bg_BG/include/fredtool-prep.txt
Normal file
|
@ -0,0 +1,29 @@
|
|||
In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer.
|
||||
|
||||
1. Insert your SD card into your computer
|
||||
1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer
|
||||
1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters)
|
||||
1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option
|
||||
1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option
|
||||
1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit)
|
||||
1. Click "Build"
|
||||
+ Wait a few seconds for the build process to complete
|
||||
1. In the Build History section on the left, type the Username into the "Filter Builds" field
|
||||
1. Click on the first search result
|
||||
+ This result should have the latest timestamp
|
||||
1. Click the "output_(name).zip" link
|
||||
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` on your SD card
|
||||
+ `<ID0>` is the 32-letter folder name that you copied in [Seedminer](seedminer)
|
||||
+ `<ID1>` is a 32-letter folder inside of the `<ID0>`
|
||||
1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder
|
||||
1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info}
|
||||
1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
|
||||
+ The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
|
||||
1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card
|
||||
1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card
|
||||
1. Reinsert your SD card into your device
|
||||
1. Power on your device
|
||||
|
||||
![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }})
|
||||
{: .notice--info}
|
10
_pages/bg_BG/include/fredtool-restore-dsconn.txt
Normal file
10
_pages/bg_BG/include/fredtool-restore-dsconn.txt
Normal file
|
@ -0,0 +1,10 @@
|
|||
In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section.
|
||||
|
||||
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` on your SD card
|
||||
1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one
|
||||
1. Reinsert your SD card into your device
|
||||
1. Power on your device
|
||||
1. Launch System Settings on your device
|
||||
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
|
||||
1. Select the "Nintendo DSi™" title
|
||||
1. Select "Copy", then select "OK"
|
11
_pages/bg_BG/include/fredtool-write-flipnote.txt
Normal file
11
_pages/bg_BG/include/fredtool-write-flipnote.txt
Normal file
|
@ -0,0 +1,11 @@
|
|||
In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio.
|
||||
|
||||
1. Launch System Settings on your device
|
||||
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
|
||||
1. Select the "Haxxxxxxxxx!" title
|
||||
+ If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
|
||||
1. Select "Copy", then select "OK"
|
||||
1. Return to main menu of the System Settings
|
||||
1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png))
|
||||
1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio
|
||||
+ If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
|
|
@ -1,3 +1,5 @@
|
|||
In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page.
|
||||
|
||||
1. Power on your device
|
||||
1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time
|
||||
+ The camera applet should appear
|
||||
|
|
|
@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A
|
|||
|
||||
In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key.
|
||||
|
||||
{% capture console_state_info %}
|
||||
Before following this section:
|
||||
+ Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data
|
||||
+ Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen)
|
||||
{: .notice--info}
|
||||
{% endcapture %}
|
||||
<div class="notice--info">{{ console_state_info | markdownify }}</div>
|
||||
|
||||
1. Power off your device
|
||||
1. Insert your SD card into your computer
|
||||
|
|
|
@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
|
|||
<details>{{ technical_info | markdownify }}</details>
|
||||
{: .notice--info}
|
||||
|
||||
You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!!
|
||||
{: .notice--warning}
|
||||
|
||||
### What You Need
|
||||
|
||||
* Your `movable.sed` file from completing [Seedminer](seedminer)
|
||||
* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`)
|
||||
* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download)
|
||||
* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download)
|
||||
* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file)
|
||||
|
||||
#### Section I - CFW Check
|
||||
|
@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana
|
|||
|
||||
#### Section III - Prep Work
|
||||
|
||||
In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer.
|
||||
|
||||
1. Insert your SD card into your computer
|
||||
1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer
|
||||
1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters)
|
||||
1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option
|
||||
1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option
|
||||
1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit)
|
||||
1. Click "Build"
|
||||
+ Wait a few seconds for the build process to complete
|
||||
1. In the Build History section on the left, type the Username into the "Filter Builds" field
|
||||
1. Click on the first search result
|
||||
+ This result should have the latest timestamp
|
||||
1. Click the "output_(name).zip" link
|
||||
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` on your SD card
|
||||
+ `<ID0>` is the 32-letter folder name that you copied in [Seedminer](seedminer)
|
||||
+ `<ID1>` is a 32-letter folder inside of the `<ID0>`
|
||||
1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder
|
||||
1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info}
|
||||
1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
|
||||
+ The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
|
||||
1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card
|
||||
1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card
|
||||
1. Reinsert your SD card into your device
|
||||
1. Power on your device
|
||||
|
||||
![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }})
|
||||
{: .notice--info}
|
||||
{% include_relative include/fredtool-prep.txt %}
|
||||
|
||||
#### Section IV - Overwriting DS Connection Settings
|
||||
|
||||
In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio.
|
||||
|
||||
1. Launch System Settings on your device
|
||||
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
|
||||
1. Select the "Haxxxxxxxxx!" title
|
||||
+ If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
|
||||
1. Select "Copy", then select "OK"
|
||||
1. Return to main menu of the System Settings
|
||||
1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png))
|
||||
1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio
|
||||
+ If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
|
||||
{% include_relative include/fredtool-write-flipnote.txt %}
|
||||
|
||||
#### Section V - Flipnote Exploit
|
||||
|
||||
|
@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte
|
|||
|
||||
#### Section VII - Restoring DS Connection Settings
|
||||
|
||||
In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV.
|
||||
|
||||
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` on your SD card
|
||||
1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one
|
||||
1. Reinsert your SD card into your device
|
||||
1. Power on your device
|
||||
1. Launch System Settings on your device
|
||||
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
|
||||
1. Select the "Nintendo DSi™" title
|
||||
1. Select "Copy", then select "OK"
|
||||
{% include_relative include/fredtool-restore-dsconn.txt %}
|
||||
|
||||
___
|
||||
|
||||
|
||||
### Continue to [Finalizing Setup](finalizing-setup)
|
||||
{: .notice--primary}
|
||||
|
|
77
_pages/bg_BG/installing-boot9strap-(fredtool-legacy).txt
Normal file
77
_pages/bg_BG/installing-boot9strap-(fredtool-legacy).txt
Normal file
|
@ -0,0 +1,77 @@
|
|||
---
|
||||
title: "Installing boot9strap (Fredtool, Legacy)"
|
||||
---
|
||||
|
||||
{% include toc title="Table of Contents" %}
|
||||
|
||||
{% capture technical_info %}
|
||||
<summary><em>Technical Details (optional)</em></summary>
|
||||
|
||||
To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.
|
||||
|
||||
To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root.
|
||||
|
||||
Once we have a DSiWare backup, we can inject it into the DS Internet Settings application.
|
||||
|
||||
This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws).
|
||||
|
||||
{% endcapture %}
|
||||
<details>{{ technical_info | markdownify }}</details>
|
||||
{: .notice--info}
|
||||
|
||||
You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!!
|
||||
{: .notice--warning}
|
||||
|
||||
### What You Need
|
||||
|
||||
* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii))
|
||||
* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`)
|
||||
* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download)
|
||||
* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file)
|
||||
|
||||
#### Section I - CFW Check
|
||||
|
||||
{% include_relative include/cfw-check-fredtool.txt %}
|
||||
|
||||
#### Section II - BannerBomb3
|
||||
|
||||
In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section.
|
||||
|
||||
1. Reinsert your SD card into your device
|
||||
1. Power on your device
|
||||
1. Launch System Settings on your device
|
||||
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
|
||||
+ Your device should show the BB3 multihax menu
|
||||
+ If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
|
||||
1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare"
|
||||
+ Your device will automatically reboot
|
||||
1. Power off your device
|
||||
|
||||
#### Section III - Prep Work
|
||||
|
||||
{% include_relative include/fredtool-prep.txt %}
|
||||
|
||||
#### Section IV - Overwriting DS Connection Settings
|
||||
|
||||
{% include_relative include/fredtool-write-flipnote.txt %}
|
||||
|
||||
#### Section V - Flipnote Exploit
|
||||
|
||||
{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %}
|
||||
|
||||
#### Section VI - Luma3DS Configuration
|
||||
|
||||
1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration
|
||||
{% include_relative include/configure-luma3ds.txt %}
|
||||
|
||||
{% include_relative include/luma3ds-installed-note.txt %}
|
||||
|
||||
#### Section VII - Restoring DS Connection Settings
|
||||
|
||||
{% include_relative include/fredtool-restore-dsconn.txt %}
|
||||
|
||||
___
|
||||
|
||||
|
||||
### Continue to [Finalizing Setup](finalizing-setup)
|
||||
{: .notice--primary}
|
84
_pages/bg_BG/seedminer-(mii).txt
Normal file
84
_pages/bg_BG/seedminer-(mii).txt
Normal file
|
@ -0,0 +1,84 @@
|
|||
---
|
||||
title: "Seedminer (Mii)"
|
||||
---
|
||||
|
||||
{% include toc title="Table of Contents" %}
|
||||
|
||||
{% capture gpu_warning %}
|
||||
This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready:
|
||||
+ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself)
|
||||
+ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple)
|
||||
+ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL)
|
||||
+ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important)
|
||||
{% endcapture %}
|
||||
<div class="notice--warning">{{ gpu_warning | markdownify }}</div>
|
||||
|
||||
{% capture technical_info %}
|
||||
<summary><em>Technical Details (optional)</em></summary>
|
||||
|
||||
To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.
|
||||
|
||||
Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange.
|
||||
|
||||
For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3).
|
||||
|
||||
{% endcapture %}
|
||||
<details>{{ technical_info | markdownify }}</details>
|
||||
{: .notice--info}
|
||||
|
||||
## Instructions
|
||||
|
||||
If you are on Linux or macOS, replace `py -3` with `python3` in all commands.
|
||||
{: .notice--info}
|
||||
|
||||
### What you need
|
||||
|
||||
+ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip)
|
||||
+ Any 3.x version of [Python](https://www.python.org/downloads/) installed
|
||||
+ If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide.
|
||||
|
||||
### Section I - Prep Work
|
||||
|
||||
In this section, you will set up Seedminer and obtain your console's files that are needed for mining.
|
||||
|
||||
1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC
|
||||
+ Keep this location handy, as this Seedminer folder will be where multiple other files are placed
|
||||
1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt
|
||||
1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install
|
||||
+ If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/).
|
||||
1. Turn your console on while the SD card is inserted
|
||||
1. Open the Mii Maker app
|
||||
1. Tap the "QR Code/Image Options" button
|
||||
1. Tap "Save Mii as QR Code"
|
||||
1. Select any Mii Character (make a new one first if you don't have any), and press "OK"
|
||||
1. Turn the console off
|
||||
1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside
|
||||
+ This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer)
|
||||
+ Once you have the ID0, paste it into a document so you can reference it later
|
||||
1. Navigate to the `DCIM` folder on the SD card
|
||||
1. Look for the QR Code, which will be a `.JPG` file starting with `HNI`
|
||||
+ You may have many other files in here already if you use the Nintendo 3DS Camera app
|
||||
1. Copy this file to the Seedminer folder on your PC
|
||||
|
||||
### Section II - Processing Mii QR and Mining
|
||||
|
||||
In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it.
|
||||
|
||||
1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer
|
||||
1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier
|
||||
1. Click on "Export to...", then select "encrypted (.bin)"
|
||||
+ This will download a file named `input.bin`
|
||||
1. Copy this `input.bin` to the Seedminer folder
|
||||
1. Open the terminal/PowerShell/Command Prompt window from earlier
|
||||
1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 <id0>`
|
||||
+ Replace `<id0>` with the ID0 you copied into a document
|
||||
+ Do not include the angle brackets
|
||||
1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii <model> <year>`
|
||||
+ Replace `<model>` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new
|
||||
+ Replace `<year>` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle
|
||||
+ If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there
|
||||
+ The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength
|
||||
1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder
|
||||
|
||||
Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy))
|
||||
{: .notice--primary}
|
|
@ -18,6 +18,7 @@ sitemap: false
|
|||
|
||||
+ [A9LH to B9S](a9lh-to-b9s)
|
||||
+ [BannerBomb3](bannerbomb3)
|
||||
+ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy))
|
||||
+ [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn))
|
||||
+ [Credits](credits)
|
||||
+ [Checking for CFW](checking-for-cfw)
|
||||
|
@ -44,6 +45,7 @@ sitemap: false
|
|||
+ [Home](/)
|
||||
+ [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax))
|
||||
+ [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool))
|
||||
+ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy))
|
||||
+ [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool))
|
||||
+ [Installing boot9strap (Hardmod)](installing-boot9strap-(hardmod))
|
||||
+ [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm))
|
||||
|
@ -59,6 +61,7 @@ sitemap: false
|
|||
+ [Region Changing](region-changing)
|
||||
+ [Restoring / Updating CFW](restoring-updating-cfw)
|
||||
+ [Seedminer](seedminer)
|
||||
+ [Seedminer](seedminer-(mii))
|
||||
+ [Seedminer (TWN)](seedminer-(twn))
|
||||
+ [Troubleshooting](troubleshooting)
|
||||
+ [Uninstall CFW](uninstall-cfw)
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
---
|
||||
title: "Updating Firmware (KOR/TWN)"
|
||||
title: "Updating Firmware (KOR)"
|
||||
---
|
||||
|
||||
### Required Reading
|
18
_pages/bg_BG/updating-firmware-(twn).txt
Normal file
18
_pages/bg_BG/updating-firmware-(twn).txt
Normal file
|
@ -0,0 +1,18 @@
|
|||
---
|
||||
title: "Updating Firmware (TWN)"
|
||||
---
|
||||
|
||||
### Required Reading
|
||||
|
||||
To use the Seedminer exploit, you must update your device to the latest system version.
|
||||
|
||||
### What you need
|
||||
|
||||
* An internet connection on your device
|
||||
|
||||
#### Section I - Updating the System
|
||||
|
||||
{% include_relative include/sysupdate.txt cfw="false" %}
|
||||
|
||||
Continue to [Seedminer (TWN)](seedminer-(twn))
|
||||
{: .notice--primary}
|
50
_pages/ca_ES/bannerbomb3-(legacy).txt
Normal file
50
_pages/ca_ES/bannerbomb3-(legacy).txt
Normal file
|
@ -0,0 +1,50 @@
|
|||
---
|
||||
title: "BannerBomb3 (Legacy)"
|
||||
---
|
||||
|
||||
{% include toc title="Table of Contents" %}
|
||||
|
||||
{% capture technical_info %}
|
||||
<summary><em>Technical Details (optional)</em></summary>
|
||||
|
||||
To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.
|
||||
|
||||
To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.
|
||||
|
||||
For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3).
|
||||
{% endcapture %}
|
||||
|
||||
<details>{{ technical_info | markdownify }}</details>
|
||||
{: .notice--info}
|
||||
|
||||
### Compatibility Notes
|
||||
|
||||
These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version.
|
||||
|
||||
### What You Need
|
||||
|
||||
* Your `movable.sed` file from completing Seedminer or nimhax
|
||||
|
||||
#### Section I - Prep Work
|
||||
|
||||
{% include_relative include/bb3-prep.txt %}
|
||||
|
||||
#### Section II - Hardware Button Check
|
||||
|
||||
In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page.
|
||||
|
||||
Your SD card should remain in your computer while you perform this check.
|
||||
|
||||
{% include_relative include/safemodecheck.txt %}
|
||||
|
||||
___
|
||||
|
||||
### Next steps: Choose an exploit
|
||||
|
||||
If the camera appeared in the previous section, Safe Mode is likely to be working on your device.
|
||||
|
||||
If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm))
|
||||
{: .notice--primary}
|
||||
|
||||
If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy))
|
||||
{: .notice--info}
|
|
@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol
|
|||
|
||||
#### Section I - Prep Work
|
||||
|
||||
In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card.
|
||||
|
||||
1. Power off your device
|
||||
1. Insert your SD card into your computer
|
||||
1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer
|
||||
1. Upload your movable.sed using the “Choose File” option
|
||||
1. Click “Build and Download”
|
||||
+ This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`)
|
||||
1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card
|
||||
+ The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
|
||||
+ This file does not need to be opened or extracted
|
||||
![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info}
|
||||
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` on your SD card
|
||||
+ `<ID0>` is the 32-letter folder name that you copied in [Seedminer](seedminer)
|
||||
+ `<ID1>` is a 32-letter folder inside of the `<ID0>`
|
||||
+ If you have multiple `<ID1>` folders, follow the instructions [here](troubleshooting#bannerbomb3)
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info}
|
||||
1. Create a folder named `Nintendo DSiWare` inside of the `<ID1>`
|
||||
+ If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card
|
||||
1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder
|
||||
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }})
|
||||
{: .notice--info}
|
||||
{% include_relative include/bb3-prep.txt %}
|
||||
|
||||
#### Section II - Hardware Button Check
|
||||
|
||||
In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page.
|
||||
|
||||
Your SD card should remain in your computer while you perform this check.
|
||||
|
||||
{% include_relative include/safemodecheck.txt %}
|
||||
|
||||
___
|
||||
|
|
|
@ -177,9 +177,6 @@ ___
|
|||
You're done! Custom firmware is now fully configured on your device.
|
||||
{: .notice--success}
|
||||
|
||||
Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks!
|
||||
{: .notice--info}
|
||||
|
||||
### Information and Notes
|
||||
|
||||
{% capture notice-6 %}
|
||||
|
|
|
@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up
|
|||
1. Select the "GO GO!" button on the top screen
|
||||
+ If any prompts appear, approve all of them
|
||||
+ If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section
|
||||
+ If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section
|
||||
+ If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section
|
||||
+ If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax)
|
||||
1. If the exploit was successful, your device will have booted into the Homebrew Launcher
|
||||
1. Power off your device
|
||||
|
|
23
_pages/ca_ES/include/bb3-prep.txt
Normal file
23
_pages/ca_ES/include/bb3-prep.txt
Normal file
|
@ -0,0 +1,23 @@
|
|||
In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card.
|
||||
|
||||
1. Power off your device
|
||||
1. Insert your SD card into your computer
|
||||
1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer
|
||||
1. Upload your movable.sed using the “Choose File” option
|
||||
1. Click “Build and Download”
|
||||
+ This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`)
|
||||
1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card
|
||||
+ The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
|
||||
+ This file does not need to be opened or extracted
|
||||
![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info}
|
||||
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` on your SD card
|
||||
+ `<ID0>` is the 32-letter folder name that you copied in [Seedminer](seedminer)
|
||||
+ `<ID1>` is a 32-letter folder inside of the `<ID0>`
|
||||
+ If you have multiple `<ID1>` folders, follow the instructions [here](troubleshooting#bannerbomb3)
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info}
|
||||
1. Create a folder named `Nintendo DSiWare` inside of the `<ID1>`
|
||||
+ If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card
|
||||
1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder
|
||||
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }})
|
||||
{: .notice--info}
|
29
_pages/ca_ES/include/fredtool-prep.txt
Normal file
29
_pages/ca_ES/include/fredtool-prep.txt
Normal file
|
@ -0,0 +1,29 @@
|
|||
In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer.
|
||||
|
||||
1. Insert your SD card into your computer
|
||||
1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer
|
||||
1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters)
|
||||
1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option
|
||||
1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option
|
||||
1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit)
|
||||
1. Click "Build"
|
||||
+ Wait a few seconds for the build process to complete
|
||||
1. In the Build History section on the left, type the Username into the "Filter Builds" field
|
||||
1. Click on the first search result
|
||||
+ This result should have the latest timestamp
|
||||
1. Click the "output_(name).zip" link
|
||||
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` on your SD card
|
||||
+ `<ID0>` is the 32-letter folder name that you copied in [Seedminer](seedminer)
|
||||
+ `<ID1>` is a 32-letter folder inside of the `<ID0>`
|
||||
1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder
|
||||
1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info}
|
||||
1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
|
||||
+ The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
|
||||
1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card
|
||||
1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card
|
||||
1. Reinsert your SD card into your device
|
||||
1. Power on your device
|
||||
|
||||
![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }})
|
||||
{: .notice--info}
|
10
_pages/ca_ES/include/fredtool-restore-dsconn.txt
Normal file
10
_pages/ca_ES/include/fredtool-restore-dsconn.txt
Normal file
|
@ -0,0 +1,10 @@
|
|||
In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section.
|
||||
|
||||
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` on your SD card
|
||||
1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one
|
||||
1. Reinsert your SD card into your device
|
||||
1. Power on your device
|
||||
1. Launch System Settings on your device
|
||||
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
|
||||
1. Select the "Nintendo DSi™" title
|
||||
1. Select "Copy", then select "OK"
|
11
_pages/ca_ES/include/fredtool-write-flipnote.txt
Normal file
11
_pages/ca_ES/include/fredtool-write-flipnote.txt
Normal file
|
@ -0,0 +1,11 @@
|
|||
In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio.
|
||||
|
||||
1. Launch System Settings on your device
|
||||
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
|
||||
1. Select the "Haxxxxxxxxx!" title
|
||||
+ If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
|
||||
1. Select "Copy", then select "OK"
|
||||
1. Return to main menu of the System Settings
|
||||
1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png))
|
||||
1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio
|
||||
+ If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
|
|
@ -1,3 +1,5 @@
|
|||
In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page.
|
||||
|
||||
1. Power on your device
|
||||
1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time
|
||||
+ The camera applet should appear
|
||||
|
|
|
@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A
|
|||
|
||||
In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key.
|
||||
|
||||
{% capture console_state_info %}
|
||||
Before following this section:
|
||||
+ Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data
|
||||
+ Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen)
|
||||
{: .notice--info}
|
||||
{% endcapture %}
|
||||
<div class="notice--info">{{ console_state_info | markdownify }}</div>
|
||||
|
||||
1. Power off your device
|
||||
1. Insert your SD card into your computer
|
||||
|
|
|
@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
|
|||
<details>{{ technical_info | markdownify }}</details>
|
||||
{: .notice--info}
|
||||
|
||||
You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!!
|
||||
{: .notice--warning}
|
||||
|
||||
### What You Need
|
||||
|
||||
* Your `movable.sed` file from completing [Seedminer](seedminer)
|
||||
* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`)
|
||||
* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download)
|
||||
* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download)
|
||||
* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file)
|
||||
|
||||
#### Section I - CFW Check
|
||||
|
@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana
|
|||
|
||||
#### Section III - Prep Work
|
||||
|
||||
In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer.
|
||||
|
||||
1. Insert your SD card into your computer
|
||||
1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer
|
||||
1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters)
|
||||
1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option
|
||||
1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option
|
||||
1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit)
|
||||
1. Click "Build"
|
||||
+ Wait a few seconds for the build process to complete
|
||||
1. In the Build History section on the left, type the Username into the "Filter Builds" field
|
||||
1. Click on the first search result
|
||||
+ This result should have the latest timestamp
|
||||
1. Click the "output_(name).zip" link
|
||||
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` on your SD card
|
||||
+ `<ID0>` is the 32-letter folder name that you copied in [Seedminer](seedminer)
|
||||
+ `<ID1>` is a 32-letter folder inside of the `<ID0>`
|
||||
1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder
|
||||
1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info}
|
||||
1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
|
||||
+ The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
|
||||
1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card
|
||||
1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card
|
||||
1. Reinsert your SD card into your device
|
||||
1. Power on your device
|
||||
|
||||
![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }})
|
||||
{: .notice--info}
|
||||
{% include_relative include/fredtool-prep.txt %}
|
||||
|
||||
#### Section IV - Overwriting DS Connection Settings
|
||||
|
||||
In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio.
|
||||
|
||||
1. Launch System Settings on your device
|
||||
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
|
||||
1. Select the "Haxxxxxxxxx!" title
|
||||
+ If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
|
||||
1. Select "Copy", then select "OK"
|
||||
1. Return to main menu of the System Settings
|
||||
1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png))
|
||||
1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio
|
||||
+ If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
|
||||
{% include_relative include/fredtool-write-flipnote.txt %}
|
||||
|
||||
#### Section V - Flipnote Exploit
|
||||
|
||||
|
@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte
|
|||
|
||||
#### Section VII - Restoring DS Connection Settings
|
||||
|
||||
In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV.
|
||||
|
||||
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` on your SD card
|
||||
1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one
|
||||
1. Reinsert your SD card into your device
|
||||
1. Power on your device
|
||||
1. Launch System Settings on your device
|
||||
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
|
||||
1. Select the "Nintendo DSi™" title
|
||||
1. Select "Copy", then select "OK"
|
||||
{% include_relative include/fredtool-restore-dsconn.txt %}
|
||||
|
||||
___
|
||||
|
||||
|
||||
### Continue to [Finalizing Setup](finalizing-setup)
|
||||
{: .notice--primary}
|
||||
|
|
77
_pages/ca_ES/installing-boot9strap-(fredtool-legacy).txt
Normal file
77
_pages/ca_ES/installing-boot9strap-(fredtool-legacy).txt
Normal file
|
@ -0,0 +1,77 @@
|
|||
---
|
||||
title: "Installing boot9strap (Fredtool, Legacy)"
|
||||
---
|
||||
|
||||
{% include toc title="Table of Contents" %}
|
||||
|
||||
{% capture technical_info %}
|
||||
<summary><em>Technical Details (optional)</em></summary>
|
||||
|
||||
To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.
|
||||
|
||||
To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root.
|
||||
|
||||
Once we have a DSiWare backup, we can inject it into the DS Internet Settings application.
|
||||
|
||||
This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws).
|
||||
|
||||
{% endcapture %}
|
||||
<details>{{ technical_info | markdownify }}</details>
|
||||
{: .notice--info}
|
||||
|
||||
You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!!
|
||||
{: .notice--warning}
|
||||
|
||||
### What You Need
|
||||
|
||||
* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii))
|
||||
* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`)
|
||||
* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download)
|
||||
* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file)
|
||||
|
||||
#### Section I - CFW Check
|
||||
|
||||
{% include_relative include/cfw-check-fredtool.txt %}
|
||||
|
||||
#### Section II - BannerBomb3
|
||||
|
||||
In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section.
|
||||
|
||||
1. Reinsert your SD card into your device
|
||||
1. Power on your device
|
||||
1. Launch System Settings on your device
|
||||
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
|
||||
+ Your device should show the BB3 multihax menu
|
||||
+ If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
|
||||
1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare"
|
||||
+ Your device will automatically reboot
|
||||
1. Power off your device
|
||||
|
||||
#### Section III - Prep Work
|
||||
|
||||
{% include_relative include/fredtool-prep.txt %}
|
||||
|
||||
#### Section IV - Overwriting DS Connection Settings
|
||||
|
||||
{% include_relative include/fredtool-write-flipnote.txt %}
|
||||
|
||||
#### Section V - Flipnote Exploit
|
||||
|
||||
{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %}
|
||||
|
||||
#### Section VI - Luma3DS Configuration
|
||||
|
||||
1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration
|
||||
{% include_relative include/configure-luma3ds.txt %}
|
||||
|
||||
{% include_relative include/luma3ds-installed-note.txt %}
|
||||
|
||||
#### Section VII - Restoring DS Connection Settings
|
||||
|
||||
{% include_relative include/fredtool-restore-dsconn.txt %}
|
||||
|
||||
___
|
||||
|
||||
|
||||
### Continue to [Finalizing Setup](finalizing-setup)
|
||||
{: .notice--primary}
|
84
_pages/ca_ES/seedminer-(mii).txt
Normal file
84
_pages/ca_ES/seedminer-(mii).txt
Normal file
|
@ -0,0 +1,84 @@
|
|||
---
|
||||
title: "Seedminer (Mii)"
|
||||
---
|
||||
|
||||
{% include toc title="Table of Contents" %}
|
||||
|
||||
{% capture gpu_warning %}
|
||||
This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready:
|
||||
+ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself)
|
||||
+ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple)
|
||||
+ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL)
|
||||
+ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important)
|
||||
{% endcapture %}
|
||||
<div class="notice--warning">{{ gpu_warning | markdownify }}</div>
|
||||
|
||||
{% capture technical_info %}
|
||||
<summary><em>Technical Details (optional)</em></summary>
|
||||
|
||||
To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.
|
||||
|
||||
Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange.
|
||||
|
||||
For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3).
|
||||
|
||||
{% endcapture %}
|
||||
<details>{{ technical_info | markdownify }}</details>
|
||||
{: .notice--info}
|
||||
|
||||
## Instructions
|
||||
|
||||
If you are on Linux or macOS, replace `py -3` with `python3` in all commands.
|
||||
{: .notice--info}
|
||||
|
||||
### What you need
|
||||
|
||||
+ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip)
|
||||
+ Any 3.x version of [Python](https://www.python.org/downloads/) installed
|
||||
+ If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide.
|
||||
|
||||
### Section I - Prep Work
|
||||
|
||||
In this section, you will set up Seedminer and obtain your console's files that are needed for mining.
|
||||
|
||||
1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC
|
||||
+ Keep this location handy, as this Seedminer folder will be where multiple other files are placed
|
||||
1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt
|
||||
1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install
|
||||
+ If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/).
|
||||
1. Turn your console on while the SD card is inserted
|
||||
1. Open the Mii Maker app
|
||||
1. Tap the "QR Code/Image Options" button
|
||||
1. Tap "Save Mii as QR Code"
|
||||
1. Select any Mii Character (make a new one first if you don't have any), and press "OK"
|
||||
1. Turn the console off
|
||||
1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside
|
||||
+ This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer)
|
||||
+ Once you have the ID0, paste it into a document so you can reference it later
|
||||
1. Navigate to the `DCIM` folder on the SD card
|
||||
1. Look for the QR Code, which will be a `.JPG` file starting with `HNI`
|
||||
+ You may have many other files in here already if you use the Nintendo 3DS Camera app
|
||||
1. Copy this file to the Seedminer folder on your PC
|
||||
|
||||
### Section II - Processing Mii QR and Mining
|
||||
|
||||
In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it.
|
||||
|
||||
1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer
|
||||
1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier
|
||||
1. Click on "Export to...", then select "encrypted (.bin)"
|
||||
+ This will download a file named `input.bin`
|
||||
1. Copy this `input.bin` to the Seedminer folder
|
||||
1. Open the terminal/PowerShell/Command Prompt window from earlier
|
||||
1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 <id0>`
|
||||
+ Replace `<id0>` with the ID0 you copied into a document
|
||||
+ Do not include the angle brackets
|
||||
1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii <model> <year>`
|
||||
+ Replace `<model>` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new
|
||||
+ Replace `<year>` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle
|
||||
+ If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there
|
||||
+ The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength
|
||||
1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder
|
||||
|
||||
Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy))
|
||||
{: .notice--primary}
|
|
@ -18,6 +18,7 @@ sitemap: false
|
|||
|
||||
+ [A9LH to B9S](a9lh-to-b9s)
|
||||
+ [BannerBomb3](bannerbomb3)
|
||||
+ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy))
|
||||
+ [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn))
|
||||
+ [Credits](credits)
|
||||
+ [Checking for CFW](checking-for-cfw)
|
||||
|
@ -44,6 +45,7 @@ sitemap: false
|
|||
+ [Home](/)
|
||||
+ [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax))
|
||||
+ [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool))
|
||||
+ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy))
|
||||
+ [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool))
|
||||
+ [Installing boot9strap (Hardmod)](installing-boot9strap-(hardmod))
|
||||
+ [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm))
|
||||
|
@ -59,6 +61,7 @@ sitemap: false
|
|||
+ [Region Changing](region-changing)
|
||||
+ [Restoring / Updating CFW](restoring-updating-cfw)
|
||||
+ [Seedminer](seedminer)
|
||||
+ [Seedminer](seedminer-(mii))
|
||||
+ [Seedminer (TWN)](seedminer-(twn))
|
||||
+ [Troubleshooting](troubleshooting)
|
||||
+ [Uninstall CFW](uninstall-cfw)
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
---
|
||||
title: "Updating Firmware (KOR/TWN)"
|
||||
title: "Updating Firmware (KOR)"
|
||||
---
|
||||
|
||||
### Required Reading
|
18
_pages/ca_ES/updating-firmware-(twn).txt
Normal file
18
_pages/ca_ES/updating-firmware-(twn).txt
Normal file
|
@ -0,0 +1,18 @@
|
|||
---
|
||||
title: "Updating Firmware (TWN)"
|
||||
---
|
||||
|
||||
### Required Reading
|
||||
|
||||
To use the Seedminer exploit, you must update your device to the latest system version.
|
||||
|
||||
### What you need
|
||||
|
||||
* An internet connection on your device
|
||||
|
||||
#### Section I - Updating the System
|
||||
|
||||
{% include_relative include/sysupdate.txt cfw="false" %}
|
||||
|
||||
Continue to [Seedminer (TWN)](seedminer-(twn))
|
||||
{: .notice--primary}
|
50
_pages/cs_CZ/bannerbomb3-(legacy).txt
Normal file
50
_pages/cs_CZ/bannerbomb3-(legacy).txt
Normal file
|
@ -0,0 +1,50 @@
|
|||
---
|
||||
title: "BannerBomb3 (Legacy)"
|
||||
---
|
||||
|
||||
{% include toc title="Table of Contents" %}
|
||||
|
||||
{% capture technical_info %}
|
||||
<summary><em>Technical Details (optional)</em></summary>
|
||||
|
||||
To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.
|
||||
|
||||
To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.
|
||||
|
||||
For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3).
|
||||
{% endcapture %}
|
||||
|
||||
<details>{{ technical_info | markdownify }}</details>
|
||||
{: .notice--info}
|
||||
|
||||
### Compatibility Notes
|
||||
|
||||
These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version.
|
||||
|
||||
### What You Need
|
||||
|
||||
* Your `movable.sed` file from completing Seedminer or nimhax
|
||||
|
||||
#### Section I - Prep Work
|
||||
|
||||
{% include_relative include/bb3-prep.txt %}
|
||||
|
||||
#### Section II - Hardware Button Check
|
||||
|
||||
In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page.
|
||||
|
||||
Your SD card should remain in your computer while you perform this check.
|
||||
|
||||
{% include_relative include/safemodecheck.txt %}
|
||||
|
||||
___
|
||||
|
||||
### Next steps: Choose an exploit
|
||||
|
||||
If the camera appeared in the previous section, Safe Mode is likely to be working on your device.
|
||||
|
||||
If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm))
|
||||
{: .notice--primary}
|
||||
|
||||
If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy))
|
||||
{: .notice--info}
|
|
@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol
|
|||
|
||||
#### Section I - Prep Work
|
||||
|
||||
In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card.
|
||||
|
||||
1. Power off your device
|
||||
1. Insert your SD card into your computer
|
||||
1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer
|
||||
1. Upload your movable.sed using the “Choose File” option
|
||||
1. Click “Build and Download”
|
||||
+ This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`)
|
||||
1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card
|
||||
+ The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
|
||||
+ This file does not need to be opened or extracted
|
||||
![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info}
|
||||
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` on your SD card
|
||||
+ `<ID0>` is the 32-letter folder name that you copied in [Seedminer](seedminer)
|
||||
+ `<ID1>` is a 32-letter folder inside of the `<ID0>`
|
||||
+ If you have multiple `<ID1>` folders, follow the instructions [here](troubleshooting#bannerbomb3)
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info}
|
||||
1. Create a folder named `Nintendo DSiWare` inside of the `<ID1>`
|
||||
+ If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card
|
||||
1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder
|
||||
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }})
|
||||
{: .notice--info}
|
||||
{% include_relative include/bb3-prep.txt %}
|
||||
|
||||
#### Section II - Hardware Button Check
|
||||
|
||||
In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page.
|
||||
|
||||
Your SD card should remain in your computer while you perform this check.
|
||||
|
||||
{% include_relative include/safemodecheck.txt %}
|
||||
|
||||
___
|
||||
|
|
|
@ -177,9 +177,6 @@ ___
|
|||
You're done! Custom firmware is now fully configured on your device.
|
||||
{: .notice--success}
|
||||
|
||||
Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks!
|
||||
{: .notice--info}
|
||||
|
||||
### Information and Notes
|
||||
|
||||
{% capture notice-6 %}
|
||||
|
|
|
@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up
|
|||
1. Select the "GO GO!" button on the top screen
|
||||
+ If any prompts appear, approve all of them
|
||||
+ If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section
|
||||
+ If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section
|
||||
+ If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section
|
||||
+ If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax)
|
||||
1. If the exploit was successful, your device will have booted into the Homebrew Launcher
|
||||
1. Power off your device
|
||||
|
|
23
_pages/cs_CZ/include/bb3-prep.txt
Normal file
23
_pages/cs_CZ/include/bb3-prep.txt
Normal file
|
@ -0,0 +1,23 @@
|
|||
In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card.
|
||||
|
||||
1. Power off your device
|
||||
1. Insert your SD card into your computer
|
||||
1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer
|
||||
1. Upload your movable.sed using the “Choose File” option
|
||||
1. Click “Build and Download”
|
||||
+ This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`)
|
||||
1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card
|
||||
+ The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
|
||||
+ This file does not need to be opened or extracted
|
||||
![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info}
|
||||
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` on your SD card
|
||||
+ `<ID0>` is the 32-letter folder name that you copied in [Seedminer](seedminer)
|
||||
+ `<ID1>` is a 32-letter folder inside of the `<ID0>`
|
||||
+ If you have multiple `<ID1>` folders, follow the instructions [here](troubleshooting#bannerbomb3)
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info}
|
||||
1. Create a folder named `Nintendo DSiWare` inside of the `<ID1>`
|
||||
+ If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card
|
||||
1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder
|
||||
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }})
|
||||
{: .notice--info}
|
29
_pages/cs_CZ/include/fredtool-prep.txt
Normal file
29
_pages/cs_CZ/include/fredtool-prep.txt
Normal file
|
@ -0,0 +1,29 @@
|
|||
In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer.
|
||||
|
||||
1. Insert your SD card into your computer
|
||||
1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer
|
||||
1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters)
|
||||
1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option
|
||||
1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option
|
||||
1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit)
|
||||
1. Click "Build"
|
||||
+ Wait a few seconds for the build process to complete
|
||||
1. In the Build History section on the left, type the Username into the "Filter Builds" field
|
||||
1. Click on the first search result
|
||||
+ This result should have the latest timestamp
|
||||
1. Click the "output_(name).zip" link
|
||||
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` on your SD card
|
||||
+ `<ID0>` is the 32-letter folder name that you copied in [Seedminer](seedminer)
|
||||
+ `<ID1>` is a 32-letter folder inside of the `<ID0>`
|
||||
1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder
|
||||
1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info}
|
||||
1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
|
||||
+ The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
|
||||
1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card
|
||||
1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card
|
||||
1. Reinsert your SD card into your device
|
||||
1. Power on your device
|
||||
|
||||
![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }})
|
||||
{: .notice--info}
|
10
_pages/cs_CZ/include/fredtool-restore-dsconn.txt
Normal file
10
_pages/cs_CZ/include/fredtool-restore-dsconn.txt
Normal file
|
@ -0,0 +1,10 @@
|
|||
In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section.
|
||||
|
||||
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` on your SD card
|
||||
1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one
|
||||
1. Reinsert your SD card into your device
|
||||
1. Power on your device
|
||||
1. Launch System Settings on your device
|
||||
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
|
||||
1. Select the "Nintendo DSi™" title
|
||||
1. Select "Copy", then select "OK"
|
11
_pages/cs_CZ/include/fredtool-write-flipnote.txt
Normal file
11
_pages/cs_CZ/include/fredtool-write-flipnote.txt
Normal file
|
@ -0,0 +1,11 @@
|
|||
In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio.
|
||||
|
||||
1. Launch System Settings on your device
|
||||
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
|
||||
1. Select the "Haxxxxxxxxx!" title
|
||||
+ If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
|
||||
1. Select "Copy", then select "OK"
|
||||
1. Return to main menu of the System Settings
|
||||
1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png))
|
||||
1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio
|
||||
+ If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
|
|
@ -1,3 +1,5 @@
|
|||
In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page.
|
||||
|
||||
1. Power on your device
|
||||
1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time
|
||||
+ The camera applet should appear
|
||||
|
|
|
@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A
|
|||
|
||||
In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key.
|
||||
|
||||
{% capture console_state_info %}
|
||||
Before following this section:
|
||||
+ Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data
|
||||
+ Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen)
|
||||
{: .notice--info}
|
||||
{% endcapture %}
|
||||
<div class="notice--info">{{ console_state_info | markdownify }}</div>
|
||||
|
||||
1. Power off your device
|
||||
1. Insert your SD card into your computer
|
||||
|
|
|
@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
|
|||
<details>{{ technical_info | markdownify }}</details>
|
||||
{: .notice--info}
|
||||
|
||||
You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!!
|
||||
{: .notice--warning}
|
||||
|
||||
### What You Need
|
||||
|
||||
* Your `movable.sed` file from completing [Seedminer](seedminer)
|
||||
* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`)
|
||||
* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download)
|
||||
* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download)
|
||||
* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file)
|
||||
|
||||
#### Section I - CFW Check
|
||||
|
@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana
|
|||
|
||||
#### Section III - Prep Work
|
||||
|
||||
In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer.
|
||||
|
||||
1. Insert your SD card into your computer
|
||||
1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer
|
||||
1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters)
|
||||
1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option
|
||||
1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option
|
||||
1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit)
|
||||
1. Click "Build"
|
||||
+ Wait a few seconds for the build process to complete
|
||||
1. In the Build History section on the left, type the Username into the "Filter Builds" field
|
||||
1. Click on the first search result
|
||||
+ This result should have the latest timestamp
|
||||
1. Click the "output_(name).zip" link
|
||||
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` on your SD card
|
||||
+ `<ID0>` is the 32-letter folder name that you copied in [Seedminer](seedminer)
|
||||
+ `<ID1>` is a 32-letter folder inside of the `<ID0>`
|
||||
1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder
|
||||
1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info}
|
||||
1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
|
||||
+ The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
|
||||
1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card
|
||||
1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card
|
||||
1. Reinsert your SD card into your device
|
||||
1. Power on your device
|
||||
|
||||
![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }})
|
||||
{: .notice--info}
|
||||
{% include_relative include/fredtool-prep.txt %}
|
||||
|
||||
#### Section IV - Overwriting DS Connection Settings
|
||||
|
||||
In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio.
|
||||
|
||||
1. Launch System Settings on your device
|
||||
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
|
||||
1. Select the "Haxxxxxxxxx!" title
|
||||
+ If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
|
||||
1. Select "Copy", then select "OK"
|
||||
1. Return to main menu of the System Settings
|
||||
1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png))
|
||||
1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio
|
||||
+ If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
|
||||
{% include_relative include/fredtool-write-flipnote.txt %}
|
||||
|
||||
#### Section V - Flipnote Exploit
|
||||
|
||||
|
@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte
|
|||
|
||||
#### Section VII - Restoring DS Connection Settings
|
||||
|
||||
In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV.
|
||||
|
||||
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` on your SD card
|
||||
1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one
|
||||
1. Reinsert your SD card into your device
|
||||
1. Power on your device
|
||||
1. Launch System Settings on your device
|
||||
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
|
||||
1. Select the "Nintendo DSi™" title
|
||||
1. Select "Copy", then select "OK"
|
||||
{% include_relative include/fredtool-restore-dsconn.txt %}
|
||||
|
||||
___
|
||||
|
||||
|
||||
### Continue to [Finalizing Setup](finalizing-setup)
|
||||
{: .notice--primary}
|
||||
|
|
77
_pages/cs_CZ/installing-boot9strap-(fredtool-legacy).txt
Normal file
77
_pages/cs_CZ/installing-boot9strap-(fredtool-legacy).txt
Normal file
|
@ -0,0 +1,77 @@
|
|||
---
|
||||
title: "Installing boot9strap (Fredtool, Legacy)"
|
||||
---
|
||||
|
||||
{% include toc title="Table of Contents" %}
|
||||
|
||||
{% capture technical_info %}
|
||||
<summary><em>Technical Details (optional)</em></summary>
|
||||
|
||||
To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.
|
||||
|
||||
To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root.
|
||||
|
||||
Once we have a DSiWare backup, we can inject it into the DS Internet Settings application.
|
||||
|
||||
This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws).
|
||||
|
||||
{% endcapture %}
|
||||
<details>{{ technical_info | markdownify }}</details>
|
||||
{: .notice--info}
|
||||
|
||||
You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!!
|
||||
{: .notice--warning}
|
||||
|
||||
### What You Need
|
||||
|
||||
* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii))
|
||||
* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`)
|
||||
* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download)
|
||||
* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file)
|
||||
|
||||
#### Section I - CFW Check
|
||||
|
||||
{% include_relative include/cfw-check-fredtool.txt %}
|
||||
|
||||
#### Section II - BannerBomb3
|
||||
|
||||
In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section.
|
||||
|
||||
1. Reinsert your SD card into your device
|
||||
1. Power on your device
|
||||
1. Launch System Settings on your device
|
||||
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
|
||||
+ Your device should show the BB3 multihax menu
|
||||
+ If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
|
||||
1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare"
|
||||
+ Your device will automatically reboot
|
||||
1. Power off your device
|
||||
|
||||
#### Section III - Prep Work
|
||||
|
||||
{% include_relative include/fredtool-prep.txt %}
|
||||
|
||||
#### Section IV - Overwriting DS Connection Settings
|
||||
|
||||
{% include_relative include/fredtool-write-flipnote.txt %}
|
||||
|
||||
#### Section V - Flipnote Exploit
|
||||
|
||||
{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %}
|
||||
|
||||
#### Section VI - Luma3DS Configuration
|
||||
|
||||
1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration
|
||||
{% include_relative include/configure-luma3ds.txt %}
|
||||
|
||||
{% include_relative include/luma3ds-installed-note.txt %}
|
||||
|
||||
#### Section VII - Restoring DS Connection Settings
|
||||
|
||||
{% include_relative include/fredtool-restore-dsconn.txt %}
|
||||
|
||||
___
|
||||
|
||||
|
||||
### Continue to [Finalizing Setup](finalizing-setup)
|
||||
{: .notice--primary}
|
84
_pages/cs_CZ/seedminer-(mii).txt
Normal file
84
_pages/cs_CZ/seedminer-(mii).txt
Normal file
|
@ -0,0 +1,84 @@
|
|||
---
|
||||
title: "Seedminer (Mii)"
|
||||
---
|
||||
|
||||
{% include toc title="Table of Contents" %}
|
||||
|
||||
{% capture gpu_warning %}
|
||||
This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready:
|
||||
+ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself)
|
||||
+ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple)
|
||||
+ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL)
|
||||
+ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important)
|
||||
{% endcapture %}
|
||||
<div class="notice--warning">{{ gpu_warning | markdownify }}</div>
|
||||
|
||||
{% capture technical_info %}
|
||||
<summary><em>Technical Details (optional)</em></summary>
|
||||
|
||||
To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.
|
||||
|
||||
Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange.
|
||||
|
||||
For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3).
|
||||
|
||||
{% endcapture %}
|
||||
<details>{{ technical_info | markdownify }}</details>
|
||||
{: .notice--info}
|
||||
|
||||
## Instructions
|
||||
|
||||
If you are on Linux or macOS, replace `py -3` with `python3` in all commands.
|
||||
{: .notice--info}
|
||||
|
||||
### What you need
|
||||
|
||||
+ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip)
|
||||
+ Any 3.x version of [Python](https://www.python.org/downloads/) installed
|
||||
+ If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide.
|
||||
|
||||
### Section I - Prep Work
|
||||
|
||||
In this section, you will set up Seedminer and obtain your console's files that are needed for mining.
|
||||
|
||||
1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC
|
||||
+ Keep this location handy, as this Seedminer folder will be where multiple other files are placed
|
||||
1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt
|
||||
1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install
|
||||
+ If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/).
|
||||
1. Turn your console on while the SD card is inserted
|
||||
1. Open the Mii Maker app
|
||||
1. Tap the "QR Code/Image Options" button
|
||||
1. Tap "Save Mii as QR Code"
|
||||
1. Select any Mii Character (make a new one first if you don't have any), and press "OK"
|
||||
1. Turn the console off
|
||||
1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside
|
||||
+ This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer)
|
||||
+ Once you have the ID0, paste it into a document so you can reference it later
|
||||
1. Navigate to the `DCIM` folder on the SD card
|
||||
1. Look for the QR Code, which will be a `.JPG` file starting with `HNI`
|
||||
+ You may have many other files in here already if you use the Nintendo 3DS Camera app
|
||||
1. Copy this file to the Seedminer folder on your PC
|
||||
|
||||
### Section II - Processing Mii QR and Mining
|
||||
|
||||
In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it.
|
||||
|
||||
1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer
|
||||
1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier
|
||||
1. Click on "Export to...", then select "encrypted (.bin)"
|
||||
+ This will download a file named `input.bin`
|
||||
1. Copy this `input.bin` to the Seedminer folder
|
||||
1. Open the terminal/PowerShell/Command Prompt window from earlier
|
||||
1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 <id0>`
|
||||
+ Replace `<id0>` with the ID0 you copied into a document
|
||||
+ Do not include the angle brackets
|
||||
1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii <model> <year>`
|
||||
+ Replace `<model>` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new
|
||||
+ Replace `<year>` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle
|
||||
+ If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there
|
||||
+ The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength
|
||||
1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder
|
||||
|
||||
Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy))
|
||||
{: .notice--primary}
|
|
@ -18,6 +18,7 @@ sitemap: false
|
|||
|
||||
+ [A9LH to B9S](a9lh-to-b9s)
|
||||
+ [BannerBomb3](bannerbomb3)
|
||||
+ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy))
|
||||
+ [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn))
|
||||
+ [Credits](credits)
|
||||
+ [Checking for CFW](checking-for-cfw)
|
||||
|
@ -44,6 +45,7 @@ sitemap: false
|
|||
+ [Home](/)
|
||||
+ [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax))
|
||||
+ [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool))
|
||||
+ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy))
|
||||
+ [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool))
|
||||
+ [Installing boot9strap (Hardmod)](installing-boot9strap-(hardmod))
|
||||
+ [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm))
|
||||
|
@ -59,6 +61,7 @@ sitemap: false
|
|||
+ [Region Changing](region-changing)
|
||||
+ [Restoring / Updating CFW](restoring-updating-cfw)
|
||||
+ [Seedminer](seedminer)
|
||||
+ [Seedminer](seedminer-(mii))
|
||||
+ [Seedminer (TWN)](seedminer-(twn))
|
||||
+ [Troubleshooting](troubleshooting)
|
||||
+ [Uninstall CFW](uninstall-cfw)
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
---
|
||||
title: "Updating Firmware (KOR/TWN)"
|
||||
title: "Updating Firmware (KOR)"
|
||||
---
|
||||
|
||||
### Required Reading
|
18
_pages/cs_CZ/updating-firmware-(twn).txt
Normal file
18
_pages/cs_CZ/updating-firmware-(twn).txt
Normal file
|
@ -0,0 +1,18 @@
|
|||
---
|
||||
title: "Updating Firmware (TWN)"
|
||||
---
|
||||
|
||||
### Required Reading
|
||||
|
||||
To use the Seedminer exploit, you must update your device to the latest system version.
|
||||
|
||||
### What you need
|
||||
|
||||
* An internet connection on your device
|
||||
|
||||
#### Section I - Updating the System
|
||||
|
||||
{% include_relative include/sysupdate.txt cfw="false" %}
|
||||
|
||||
Continue to [Seedminer (TWN)](seedminer-(twn))
|
||||
{: .notice--primary}
|
50
_pages/de_DE/bannerbomb3-(legacy).txt
Normal file
50
_pages/de_DE/bannerbomb3-(legacy).txt
Normal file
|
@ -0,0 +1,50 @@
|
|||
---
|
||||
title: "BannerBomb3 (Legacy)"
|
||||
---
|
||||
|
||||
{% include toc title="Inhalt" %}
|
||||
|
||||
{% capture technical_info %}
|
||||
<summary><em>Technische Details (optional)</em></summary>
|
||||
|
||||
To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.
|
||||
|
||||
To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.
|
||||
|
||||
For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3).
|
||||
{% endcapture %}
|
||||
|
||||
<details>{{ technical_info | markdownify }}</details>
|
||||
{: .notice--info}
|
||||
|
||||
### Kompatibilitätshinweise
|
||||
|
||||
Diese Anleitung funktioniert mit den folgenden Konsolenregionen: USA, Europa, Japan und Korea. Diese werden mit den Buchstaben U, E, J oder K nach der Systemversion angezeigt.
|
||||
|
||||
### Was du brauchst
|
||||
|
||||
* Your `movable.sed` file from completing Seedminer or nimhax
|
||||
|
||||
#### Abschnitt I - Vorbereitungen
|
||||
|
||||
{% include_relative include/bb3-prep.txt %}
|
||||
|
||||
#### Abschnitt II - Tastenfunktionalität überprüfen
|
||||
|
||||
In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page.
|
||||
|
||||
Your SD card should remain in your computer while you perform this check.
|
||||
|
||||
{% include_relative include/safemodecheck.txt %}
|
||||
|
||||
___
|
||||
|
||||
### Nächste Schritte: Wähle einen Exploit
|
||||
|
||||
If the camera appeared in the previous section, Safe Mode is likely to be working on your device.
|
||||
|
||||
If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm))
|
||||
{: .notice--primary}
|
||||
|
||||
If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy))
|
||||
{: .notice--info}
|
|
@ -30,36 +30,10 @@ Falls du eine Taiwanesische Konsole besitzen solltest (gekennzeichnet durch ein
|
|||
|
||||
#### Abschnitt I - Vorbereitungen
|
||||
|
||||
In diesem Schritt wirst du die Dateien, die zum Auslösen des Bannerbomb3 Exploits benutzt werden, auf die SD-Karte deiner Konsole kopieren.
|
||||
|
||||
1. Schalte deine Konsole aus
|
||||
1. Stecke deine SD-Karte in deinen Computer
|
||||
1. Öffne den [BannerBomb3 Injector](https://3dstools.nhnarwhal.com/#/bb3gen) auf deinem Computer
|
||||
1. Lade deine movable.sed mit der "Choose File" Option hoch
|
||||
1. Klicke "Build and Download"
|
||||
+ Dies wird ein DSiWare-Backup namens `F00D43D5.bin` und einen Payload namens `bb3.bin` in einer zip Datei herunterladen (`DSIWARE_EXPLOIT.zip`)
|
||||
1. Kopiere `bb3.bin` von der `DSIWARE_EXPLOIT.zip` in das Stammverzeichnis der SD-Karte
|
||||
+ Das Stammverzeichnis der SD-Karte bezieht sich auf das ursprüngliche Verzeichnis deiner SD-Karte, wo du den Nintendo 3DS Ordner sehen kannst, aber nicht in ihm drin bist
|
||||
+ This file does not need to be opened or extracted
|
||||
![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info}
|
||||
1. Gehe zu `Nintendo 3DS` -> `<ID0>` -> `<ID1>` auf deiner SD-Karte
|
||||
+ Diese `<ID0>` ist die, die du beim [Seedminer](seedminer) verwendet hast
|
||||
+ Die `<ID1>` ist ein 32 Zeichen langer Ordner in der `<ID0>`
|
||||
+ If you have multiple `<ID1>` folders, follow the instructions [here](troubleshooting#bannerbomb3)
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info}
|
||||
1. Erstelle einen Ordner mit dem Namen `Nintendo DSiWare` innerhalb der `<ID1>`
|
||||
Wenn du bereits den Ordner hattest, *und* du hast schon DSiWare Backup Dateien darin hast (`<8-Charakter-ID>.bin`), kopiere sie zu deinem Computer und lösche sie von deiner SD-Karte
|
||||
1. Kopiere die `F00D43D5.bin` Datei aus `DSIWARE_EXPLOIT.zip` in den `Nintendo DSiWare` Ordner
|
||||
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }})
|
||||
{: .notice--info}
|
||||
{% include_relative include/bb3-prep.txt %}
|
||||
|
||||
#### Abschnitt II - Tastenfunktionalität überprüfen
|
||||
|
||||
In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page.
|
||||
|
||||
Your SD card should remain in your computer while you perform this check.
|
||||
|
||||
{% include_relative include/safemodecheck.txt %}
|
||||
|
||||
___
|
||||
|
|
|
@ -69,7 +69,7 @@ The screenshots below indicate the minimum SD card layout that is required to fo
|
|||
|
||||
Als zusätzliche Sicherheitsmaßnahme führen wir eine zusätzliche Überprüfung auf Custom Firmware durch. If custom firmware is not installed by this point for any reason, the next section may render your console unable to be hacked without external hardware.
|
||||
|
||||
1. Schalte deine Konsole aus
|
||||
1. Schalte dein Gerät aus
|
||||
1. Halte den (Select)-Knopf
|
||||
1. Schalte deine Konsole an während du den (Select) Knopf gedrückt hältst
|
||||
1. If the check was successful, your device should have booted into the Luma3DS configuration menu
|
||||
|
@ -139,7 +139,7 @@ In this section, you will use a script to remove some unnecessary files from you
|
|||
|
||||
1. Select "Cleanup SD Card"
|
||||
1. Drücke (A), wenn du dazu aufgefordert wirst, um fortzufahren
|
||||
1. Drücke (A) um fortzufahren
|
||||
1. Drücke (A), um fortzufahren
|
||||
1. Drücke (B), um zum Hauptmenü zurückzukehren
|
||||
|
||||
#### Section IX - Backup Essential Files
|
||||
|
@ -159,7 +159,7 @@ In this section, you will make backups of files that can be used to recover from
|
|||
1. Press (A) on `essential.exefs` to select it
|
||||
1. Select "Copy to 0:/gm9/out"
|
||||
+ If you see "Destination already exists", press (A) on "Overwrite file(s)"
|
||||
1. Drücke (A), um fortzufahren
|
||||
1. Drücke (A) um fortzufahren
|
||||
1. Drücke (Home), um das Aktionsmenü aufzurufen
|
||||
1. Select "Poweroff system" to power off your device
|
||||
1. Stecke deine SD-Karte in deinen Computer
|
||||
|
@ -169,7 +169,7 @@ In this section, you will make backups of files that can be used to recover from
|
|||
1. Delete `<date>_<serialnumber>_sysnand_##.bin` and `<date>_<serialnumber>_sysnand_##.bin.sha` from the `/gm9/out/` folder on your SD card after copying it
|
||||
+ The other backup files are negligible in size and may be kept on your SD card for ease of access
|
||||
1. If you have it, copy the `/luma/backups/` folder on your SD card to a safe location on your computer
|
||||
1. Stecke deine SD-Karte nun wieder in deinen 3DS
|
||||
1. Stecke deine SD-Karte wieder in dein Gerät
|
||||
1. Schalte deine Konsole an
|
||||
|
||||
___
|
||||
|
@ -177,9 +177,6 @@ ___
|
|||
You're done! Custom firmware is now fully configured on your device.
|
||||
{: .notice--success}
|
||||
|
||||
Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks!
|
||||
{: .notice--info}
|
||||
|
||||
### Information and Notes
|
||||
|
||||
{% capture notice-6 %}
|
||||
|
|
|
@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up
|
|||
1. Select the "GO GO!" button on the top screen
|
||||
+ If any prompts appear, approve all of them
|
||||
+ If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section
|
||||
+ If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section
|
||||
+ If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section
|
||||
+ If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax)
|
||||
1. If the exploit was successful, your device will have booted into the Homebrew Launcher
|
||||
1. Schalte deine Konsole aus
|
||||
|
|
23
_pages/de_DE/include/bb3-prep.txt
Normal file
23
_pages/de_DE/include/bb3-prep.txt
Normal file
|
@ -0,0 +1,23 @@
|
|||
In diesem Schritt wirst du die Dateien, die zum Auslösen des Bannerbomb3 Exploits benutzt werden, auf die SD-Karte deiner Konsole kopieren.
|
||||
|
||||
1. Schalte deine Konsole aus
|
||||
1. Stecke deine SD-Karte in deinen Computer
|
||||
1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer
|
||||
1. Lade deine movable.sed mit der "Choose File" Option hoch
|
||||
1. Klicke "Build and Download"
|
||||
+ This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`)
|
||||
1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card
|
||||
+ The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
|
||||
+ This file does not need to be opened or extracted
|
||||
![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info}
|
||||
1. Gehe zu `Nintendo 3DS` -> `<ID0>` -> `<ID1> auf deiner SD-Karte`
|
||||
+ `<ID0>` is the 32-letter folder name that you copied in [Seedminer](seedminer)
|
||||
+ `<ID1>` is a 32-letter folder inside of the `<ID0>`
|
||||
+ If you have multiple `<ID1>` folders, follow the instructions [here](troubleshooting#bannerbomb3)
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info}
|
||||
1. Erstelle einen Ordner mit dem Namen `Nintendo DSiWare` innerhalb der `<ID1>`
|
||||
Wenn du bereits den Ordner hattest, *und* du hast schon DSiWare Backup Dateien darin hast (`<8-Charakter-ID>.bin`), kopiere sie zu deinem Computer und lösche sie von deiner SD-Karte
|
||||
1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder
|
||||
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }})
|
||||
{: .notice--info}
|
29
_pages/de_DE/include/fredtool-prep.txt
Normal file
29
_pages/de_DE/include/fredtool-prep.txt
Normal file
|
@ -0,0 +1,29 @@
|
|||
In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer.
|
||||
|
||||
1. Stecke deine SD-Karte in deinen Computer
|
||||
1. Öffne die [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) Webseite auf deinem Computer
|
||||
1. Bei dem "Username" Feld, gib irgendeinen normalen Namen (keine Leerzeichen oder Sonderzeichen) an
|
||||
1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option
|
||||
1. Wähle beim "MovableSed" Feld deine `movable.sed` Datei mit der "Browse..." Option aus
|
||||
1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit)
|
||||
1. Drücke auf "Build"
|
||||
+ Warte ein paar Sekunden, bis der Erstellungsprozess abgeschlossen ist
|
||||
1. Gib im Abschnitt Build-Verlauf links den Benutzernamen in das "suchen" Feld ein
|
||||
1. Klicke das erste Suchergebnis
|
||||
+ Dieses Ergebnis sollte das neuste sein
|
||||
1. Drücke auf den "output_(name).zip" Link
|
||||
1. Navigiere zu `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` auf deiner SD-Karte
|
||||
+ `<ID0>` is the 32-letter folder name that you copied in [Seedminer](seedminer)
|
||||
+ `<ID1>` is a 32-letter folder inside of the `<ID0>`
|
||||
1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder
|
||||
1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info}
|
||||
1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
|
||||
+ The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
|
||||
1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card
|
||||
1. Kopiere den `private` Ordner von der Frogminer_save `.zip` in das Stammverzeichnis deiner SD-Karte
|
||||
1. Stecke deine SD-Karte nun wieder in deinen 3DS
|
||||
1. Schalte deine Konsole an
|
||||
|
||||
![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }})
|
||||
{: .notice--info}
|
10
_pages/de_DE/include/fredtool-restore-dsconn.txt
Normal file
10
_pages/de_DE/include/fredtool-restore-dsconn.txt
Normal file
|
@ -0,0 +1,10 @@
|
|||
In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section.
|
||||
|
||||
1. Navigiere zu `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` auf deiner SD-Karte
|
||||
1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one
|
||||
1. Stecke deine SD-Karte nun wieder in deinen 3DS
|
||||
1. Schalte deine Konsole an
|
||||
1. Launch System Settings on your device
|
||||
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
|
||||
1. Select the "Nintendo DSi™" title
|
||||
1. Select "Copy", then select "OK"
|
11
_pages/de_DE/include/fredtool-write-flipnote.txt
Normal file
11
_pages/de_DE/include/fredtool-write-flipnote.txt
Normal file
|
@ -0,0 +1,11 @@
|
|||
In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio.
|
||||
|
||||
1. Launch System Settings on your device
|
||||
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
|
||||
1. Select the "Haxxxxxxxxx!" title
|
||||
+ If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
|
||||
1. Select "Copy", then select "OK"
|
||||
1. Return to main menu of the System Settings
|
||||
1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png))
|
||||
1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio
|
||||
+ If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
|
|
@ -1,3 +1,5 @@
|
|||
In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page.
|
||||
|
||||
1. Schalte deine Konsole an
|
||||
1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time
|
||||
+ The camera applet should appear
|
||||
|
|
|
@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A
|
|||
|
||||
In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key.
|
||||
|
||||
{% capture console_state_info %}
|
||||
Before following this section:
|
||||
+ Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data
|
||||
+ Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen)
|
||||
{: .notice--info}
|
||||
{% endcapture %}
|
||||
<div class="notice--info">{{ console_state_info | markdownify }}</div>
|
||||
|
||||
1. Schalte deine Konsole aus
|
||||
1. Stecke deine SD-Karte in deinen Computer
|
||||
|
|
|
@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
|
|||
<details>{{ technical_info | markdownify }}</details>
|
||||
{: .notice--info}
|
||||
|
||||
You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!!
|
||||
{: .notice--warning}
|
||||
|
||||
### Was du brauchst
|
||||
|
||||
* Deine `movable.sed` Datei vom [Seedminer](seedminer)
|
||||
* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`)
|
||||
* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download)
|
||||
* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download)
|
||||
* Die neueste Version von [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (die Luma3DS `.zip` Datei)
|
||||
|
||||
#### Abschnitt I - CFW Check
|
||||
|
@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana
|
|||
|
||||
#### Section III - Prep Work
|
||||
|
||||
In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer.
|
||||
|
||||
1. Stecke deine SD-Karte in deinen Computer
|
||||
1. Öffne die [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) Webseite auf deinem Computer
|
||||
1. Bei dem "Username" Feld, gib irgendeinen normalen Namen (keine Leerzeichen oder Sonderzeichen) an
|
||||
1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option
|
||||
1. Wähle beim "MovableSed" Feld deine `movable.sed` Datei mit der "Browse..." Option aus
|
||||
1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit)
|
||||
1. Drücke auf "Build"
|
||||
+ Warte ein paar Sekunden, bis der Erstellungsprozess abgeschlossen ist
|
||||
1. Gib im Abschnitt Build-Verlauf links den Benutzernamen in das "suchen" Feld ein
|
||||
1. Klicke das erste Suchergebnis
|
||||
+ Dieses Ergebnis sollte das neuste sein
|
||||
1. Drücke auf den "output_(name).zip" Link
|
||||
1. Navigiere zu `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` auf deiner SD-Karte
|
||||
+ Diese `<ID0>` ist die, die du beim [Seedminer](seedminer) verwendet hast
|
||||
+ Die `<ID1>` ist ein 32 Zeichen langer Ordner in der `<ID0>`
|
||||
1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder
|
||||
1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder
|
||||
![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info}
|
||||
1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
|
||||
+ The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
|
||||
1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card
|
||||
1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card
|
||||
1. Stecke deine SD-Karte nun wieder in deinen 3DS
|
||||
1. Schalte deine Konsole an
|
||||
|
||||
![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }})
|
||||
{: .notice--info}
|
||||
{% include_relative include/fredtool-prep.txt %}
|
||||
|
||||
#### Section IV - Overwriting DS Connection Settings
|
||||
|
||||
In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio.
|
||||
|
||||
1. Launch System Settings on your device
|
||||
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
|
||||
1. Select the "Haxxxxxxxxx!" title
|
||||
+ If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
|
||||
1. Select "Copy", then select "OK"
|
||||
1. Return to main menu of the System Settings
|
||||
1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png))
|
||||
1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio
|
||||
+ If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
|
||||
{% include_relative include/fredtool-write-flipnote.txt %}
|
||||
|
||||
#### Abschnitt V - Flipnote Exploit
|
||||
|
||||
|
@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte
|
|||
|
||||
#### Section VII - Restoring DS Connection Settings
|
||||
|
||||
In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV.
|
||||
|
||||
1. Navigiere zu `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` auf deiner SD-Karte
|
||||
1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one
|
||||
1. Stecke deine SD-Karte nun wieder in deinen 3DS
|
||||
1. Schalte deine Konsole an
|
||||
1. Launch System Settings on your device
|
||||
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
|
||||
1. Select the "Nintendo DSi™" title
|
||||
1. Select "Copy", then select "OK"
|
||||
{% include_relative include/fredtool-restore-dsconn.txt %}
|
||||
|
||||
___
|
||||
|
||||
|
||||
### Fortfahren mit [Setup fertigstellen](finalizing-setup)
|
||||
{: .notice--primary}
|
||||
|
|
77
_pages/de_DE/installing-boot9strap-(fredtool-legacy).txt
Normal file
77
_pages/de_DE/installing-boot9strap-(fredtool-legacy).txt
Normal file
|
@ -0,0 +1,77 @@
|
|||
---
|
||||
title: "Installing boot9strap (Fredtool, Legacy)"
|
||||
---
|
||||
|
||||
{% include toc title="Inhalt" %}
|
||||
|
||||
{% capture technical_info %}
|
||||
<summary><em>Technische Details (optional)</em></summary>
|
||||
|
||||
Um ein DSiWare-Backup erstellen zu können, nutzen wir eine Schwachstelle im DSiWare-Datenverwaltungs-Fenster der Systemeinstellungen aus.
|
||||
|
||||
Um das zu erreichen, werden wir die Verschlüsselung (movable.sed) nutzen, um ein DSiWare-Backup zu erstellen, das das System dazu bringen wird, die DSi Internet Einstellungs-Software zur SD-Karte zu kopieren.
|
||||
|
||||
Once we have a DSiWare backup, we can inject it into the DS Internet Settings application.
|
||||
|
||||
This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws).
|
||||
|
||||
{% endcapture %}
|
||||
<details>{{ technical_info | markdownify }}</details>
|
||||
{: .notice--info}
|
||||
|
||||
You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!!
|
||||
{: .notice--warning}
|
||||
|
||||
### Was du brauchst
|
||||
|
||||
* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii))
|
||||
* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`)
|
||||
* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download)
|
||||
* Die neueste Version von [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (die Luma3DS `.zip` Datei)
|
||||
|
||||
#### Abschnitt I - CFW Check
|
||||
|
||||
{% include_relative include/cfw-check-fredtool.txt %}
|
||||
|
||||
#### Section II - BannerBomb3
|
||||
|
||||
In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section.
|
||||
|
||||
1. Stecke deine SD-Karte nun wieder in deinen 3DS
|
||||
1. Schalte deine Konsole an
|
||||
1. Launch System Settings on your device
|
||||
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
|
||||
+ Your device should show the BB3 multihax menu
|
||||
+ If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
|
||||
1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare"
|
||||
+ Your device will automatically reboot
|
||||
1. Schalte deine Konsole aus
|
||||
|
||||
#### Section III - Prep Work
|
||||
|
||||
{% include_relative include/fredtool-prep.txt %}
|
||||
|
||||
#### Section IV - Overwriting DS Connection Settings
|
||||
|
||||
{% include_relative include/fredtool-write-flipnote.txt %}
|
||||
|
||||
#### Abschnitt V - Flipnote Exploit
|
||||
|
||||
{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %}
|
||||
|
||||
#### Section VI - Luma3DS Configuration
|
||||
|
||||
1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration
|
||||
{% include_relative include/configure-luma3ds.txt %}
|
||||
|
||||
{% include_relative include/luma3ds-installed-note.txt %}
|
||||
|
||||
#### Section VII - Restoring DS Connection Settings
|
||||
|
||||
{% include_relative include/fredtool-restore-dsconn.txt %}
|
||||
|
||||
___
|
||||
|
||||
|
||||
### Fortfahren mit [Setup fertigstellen](finalizing-setup)
|
||||
{: .notice--primary}
|
84
_pages/de_DE/seedminer-(mii).txt
Normal file
84
_pages/de_DE/seedminer-(mii).txt
Normal file
|
@ -0,0 +1,84 @@
|
|||
---
|
||||
title: "Seedminer (Mii)"
|
||||
---
|
||||
|
||||
{% include toc title="Inhalt" %}
|
||||
|
||||
{% capture gpu_warning %}
|
||||
This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready:
|
||||
+ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself)
|
||||
+ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple)
|
||||
+ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL)
|
||||
+ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important)
|
||||
{% endcapture %}
|
||||
<div class="notice--warning">{{ gpu_warning | markdownify }}</div>
|
||||
|
||||
{% capture technical_info %}
|
||||
<summary><em>Technische Details (optional)</em></summary>
|
||||
|
||||
To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.
|
||||
|
||||
Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange.
|
||||
|
||||
For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3).
|
||||
|
||||
{% endcapture %}
|
||||
<details>{{ technical_info | markdownify }}</details>
|
||||
{: .notice--info}
|
||||
|
||||
## Instructions
|
||||
|
||||
If you are on Linux or macOS, replace `py -3` with `python3` in all commands.
|
||||
{: .notice--info}
|
||||
|
||||
### Was du benötigst
|
||||
|
||||
+ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip)
|
||||
+ Any 3.x version of [Python](https://www.python.org/downloads/) installed
|
||||
+ If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide.
|
||||
|
||||
### Section I - Prep Work
|
||||
|
||||
In this section, you will set up Seedminer and obtain your console's files that are needed for mining.
|
||||
|
||||
1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC
|
||||
+ Keep this location handy, as this Seedminer folder will be where multiple other files are placed
|
||||
1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt
|
||||
1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install
|
||||
+ If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/).
|
||||
1. Turn your console on while the SD card is inserted
|
||||
1. Open the Mii Maker app
|
||||
1. Tap the "QR Code/Image Options" button
|
||||
1. Tap "Save Mii as QR Code"
|
||||
1. Select any Mii Character (make a new one first if you don't have any), and press "OK"
|
||||
1. Turn the console off
|
||||
1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside
|
||||
+ This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer)
|
||||
+ Once you have the ID0, paste it into a document so you can reference it later
|
||||
1. Navigate to the `DCIM` folder on the SD card
|
||||
1. Look for the QR Code, which will be a `.JPG` file starting with `HNI`
|
||||
+ You may have many other files in here already if you use the Nintendo 3DS Camera app
|
||||
1. Copy this file to the Seedminer folder on your PC
|
||||
|
||||
### Section II - Processing Mii QR and Mining
|
||||
|
||||
In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it.
|
||||
|
||||
1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer
|
||||
1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier
|
||||
1. Click on "Export to...", then select "encrypted (.bin)"
|
||||
+ This will download a file named `input.bin`
|
||||
1. Copy this `input.bin` to the Seedminer folder
|
||||
1. Open the terminal/PowerShell/Command Prompt window from earlier
|
||||
1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 <id0>`
|
||||
+ Replace `<id0>` with the ID0 you copied into a document
|
||||
+ Do not include the angle brackets
|
||||
1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii <model> <year>`
|
||||
+ Replace `<model>` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new
|
||||
+ Replace `<year>` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle
|
||||
+ If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there
|
||||
+ The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength
|
||||
1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder
|
||||
|
||||
Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy))
|
||||
{: .notice--primary}
|
|
@ -18,6 +18,7 @@ sitemap: false
|
|||
|
||||
+ [A9LH zu B9S](a9lh-to-b9s)
|
||||
+ [BannerBomb3](bannerbomb3)
|
||||
+ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy))
|
||||
+ [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn))
|
||||
+ [Danksagungen](credits)
|
||||
+ [Checking for CFW](checking-for-cfw)
|
||||
|
@ -44,6 +45,7 @@ sitemap: false
|
|||
+ [Startseite](/)
|
||||
+ [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax))
|
||||
+ [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool))
|
||||
+ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy))
|
||||
+ [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool))
|
||||
+ [Installation von boot9strap (Hardmod)](installing-boot9strap-(hardmod))
|
||||
+ [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm))
|
||||
|
@ -59,6 +61,7 @@ sitemap: false
|
|||
+ [Wechseln der Region](region-changing)
|
||||
+ [Restoring / Updating CFW](restoring-updating-cfw)
|
||||
+ [Seedminer](seedminer)
|
||||
+ [Seedminer](seedminer-(mii))
|
||||
+ [Seedminer (TWN)](seedminer-(twn))
|
||||
+ [Problembehandlung](troubleshooting)
|
||||
+ [CFW deinstallieren](uninstall-cfw)
|
||||
|
|
18
_pages/de_DE/updating-firmware-(kor).txt
Normal file
18
_pages/de_DE/updating-firmware-(kor).txt
Normal file
|
@ -0,0 +1,18 @@
|
|||
---
|
||||
title: "Updating Firmware (KOR)"
|
||||
---
|
||||
|
||||
### Lesen erforderlich
|
||||
|
||||
To use the Seedminer exploit, you must update your device to the latest system version.
|
||||
|
||||
### Was du benötigst
|
||||
|
||||
* An internet connection on your device
|
||||
|
||||
#### Section I - Updating the System
|
||||
|
||||
{% include_relative include/sysupdate.txt cfw="false" %}
|
||||
|
||||
Continue to [Seedminer](seedminer)
|
||||
{: .notice--primary}
|
|
@ -1,18 +0,0 @@
|
|||
---
|
||||
title: "Updating Firmware (KOR/TWN)"
|
||||
---
|
||||
|
||||
### Required Reading
|
||||
|
||||
To use the Seedminer exploit, you must update your device to the latest system version.
|
||||
|
||||
### What you need
|
||||
|
||||
* An internet connection on your device
|
||||
|
||||
#### Section I - Updating the System
|
||||
|
||||
{% include_relative include/sysupdate.txt cfw="false" %}
|
||||
|
||||
Continue to [Seedminer](seedminer)
|
||||
{: .notice--primary}
|
18
_pages/de_DE/updating-firmware-(new-3ds).txt
Normal file
18
_pages/de_DE/updating-firmware-(new-3ds).txt
Normal file
|
@ -0,0 +1,18 @@
|
|||
---
|
||||
title: "Updating Firmware (New 3DS)"
|
||||
---
|
||||
|
||||
### Lesen erforderlich
|
||||
|
||||
To use the super-skaterhax exploit, you must update your device to the latest system version.
|
||||
|
||||
### Was du benötigst
|
||||
|
||||
* An internet connection on your device
|
||||
|
||||
#### Section I - Updating the System
|
||||
|
||||
{% include_relative include/sysupdate.txt cfw="false" %}
|
||||
|
||||
Continue to [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax))
|
||||
{: .notice--primary}
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Reference in a new issue