diff --git a/_pages/ar_SA/404.md b/_pages/ar_SA/404.txt similarity index 100% rename from _pages/ar_SA/404.md rename to _pages/ar_SA/404.txt diff --git a/_pages/ar_SA/bannerbomb3-(legacy).txt b/_pages/ar_SA/bannerbomb3-(legacy).txt new file mode 100644 index 0000000000..503794c42a --- /dev/null +++ b/_pages/ar_SA/bannerbomb3-(legacy).txt @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title="Table of Contents" %} + +{% capture technical_info %} +Technical Details (optional) + +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### Compatibility Notes + +These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. + +### What You Need + +* Your `movable.sed` file from completing Seedminer or nimhax + +#### Section I - Prep Work + +{% include_relative include/bb3-prep.txt %} + +#### Section II - Hardware Button Check + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### Next steps: Choose an exploit + +If the camera appeared in the previous section, Safe Mode is likely to be working on your device. + +If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/ar_SA/bannerbomb3.txt b/_pages/ar_SA/bannerbomb3.txt index 7767c4aeb1..a8383926fd 100644 --- a/_pages/ar_SA/bannerbomb3.txt +++ b/_pages/ar_SA/bannerbomb3.txt @@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. - -1. Power off your device -1. Insert your SD card into your computer -1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer -1. Upload your movable.sed using the “Choose File” option -1. Click “Build and Download” - + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) -1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it - + This file does not need to be opened or extracted - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.txt %} #### Section II - Hardware Button Check -In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. - -Your SD card should remain in your computer while you perform this check. - {% include_relative include/safemodecheck.txt %} ___ diff --git a/_pages/ar_SA/credits.md b/_pages/ar_SA/credits.txt similarity index 100% rename from _pages/ar_SA/credits.md rename to _pages/ar_SA/credits.txt diff --git a/_pages/ar_SA/donations.md b/_pages/ar_SA/donations.txt similarity index 100% rename from _pages/ar_SA/donations.md rename to _pages/ar_SA/donations.txt diff --git a/_pages/ar_SA/finalizing-setup.txt b/_pages/ar_SA/finalizing-setup.txt index f16b13698a..e41bd44dcd 100644 --- a/_pages/ar_SA/finalizing-setup.txt +++ b/_pages/ar_SA/finalizing-setup.txt @@ -177,9 +177,6 @@ ___ You're done! Custom firmware is now fully configured on your device. {: .notice--success} -Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! -{: .notice--info} - ### Information and Notes {% capture notice-6 %} diff --git a/_pages/ar_SA/homebrew-launcher-(super-skaterhax).txt b/_pages/ar_SA/homebrew-launcher-(super-skaterhax).txt index ea288c3163..7b83fe0d7e 100644 --- a/_pages/ar_SA/homebrew-launcher-(super-skaterhax).txt +++ b/_pages/ar_SA/homebrew-launcher-(super-skaterhax).txt @@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up 1. Select the "GO GO!" button on the top screen + If any prompts appear, approve all of them + If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section + + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) 1. If the exploit was successful, your device will have booted into the Homebrew Launcher 1. Power off your device diff --git a/_pages/ar_SA/include/bb3-prep.txt b/_pages/ar_SA/include/bb3-prep.txt new file mode 100644 index 0000000000..0b0965f3de --- /dev/null +++ b/_pages/ar_SA/include/bb3-prep.txt @@ -0,0 +1,23 @@ +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + +1. Power off your device +1. Insert your SD card into your computer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. Create a folder named `Nintendo DSiWare` inside of the `` + + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/ar_SA/include/fredtool-prep.txt b/_pages/ar_SA/include/fredtool-prep.txt new file mode 100644 index 0000000000..cff8aa806d --- /dev/null +++ b/_pages/ar_SA/include/fredtool-prep.txt @@ -0,0 +1,29 @@ +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. + +1. Insert your SD card into your computer +1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer +1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. Click "Build" + + Wait a few seconds for the build process to complete +1. In the Build History section on the left, type the Username into the "Filter Builds" field +1. Click on the first search result + + This result should have the latest timestamp +1. Click the "output_(name).zip" link +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card +1. Reinsert your SD card into your device +1. Power on your device + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/ar_SA/include/fredtool-restore-dsconn.txt b/_pages/ar_SA/include/fredtool-restore-dsconn.txt new file mode 100644 index 0000000000..3057b3ac9d --- /dev/null +++ b/_pages/ar_SA/include/fredtool-restore-dsconn.txt @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title +1. Select "Copy", then select "OK" diff --git a/_pages/ar_SA/include/fredtool-write-flipnote.txt b/_pages/ar_SA/include/fredtool-write-flipnote.txt new file mode 100644 index 0000000000..cb6f428624 --- /dev/null +++ b/_pages/ar_SA/include/fredtool-write-flipnote.txt @@ -0,0 +1,11 @@ +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Select "Copy", then select "OK" +1. Return to main menu of the System Settings +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/ar_SA/include/safemodecheck.txt b/_pages/ar_SA/include/safemodecheck.txt index 43ebec6575..7035baace8 100644 --- a/_pages/ar_SA/include/safemodecheck.txt +++ b/_pages/ar_SA/include/safemodecheck.txt @@ -1,3 +1,5 @@ +In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page. + 1. Power on your device 1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time + The camera applet should appear diff --git a/_pages/ar_SA/include/seedminer-base.txt b/_pages/ar_SA/include/seedminer-base.txt index e3493c2f87..ad6697a5fa 100644 --- a/_pages/ar_SA/include/seedminer-base.txt +++ b/_pages/ar_SA/include/seedminer-base.txt @@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. +{% capture console_state_info %} Before following this section: + Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data + Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen) -{: .notice--info} +{% endcapture %} +
{{ console_state_info | markdownify }}
1. Power off your device 1. Insert your SD card into your computer diff --git a/_pages/ar_SA/installing-boot9strap-(fredtool).txt b/_pages/ar_SA/installing-boot9strap-(fredtool).txt index ea9d81c010..455c3317a3 100644 --- a/_pages/ar_SA/installing-boot9strap-(fredtool).txt +++ b/_pages/ar_SA/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ### What You Need * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) #### Section I - CFW Check @@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana #### Section III - Prep Work -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Insert your SD card into your computer -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert your SD card into your device -1. Power on your device - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.txt %} #### Section IV - Overwriting DS Connection Settings -In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. - -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Haxxxxxxxxx!" title - + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Select "Copy", then select "OK" -1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) -1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio - + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.txt %} #### Section V - Flipnote Exploit @@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte #### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. - -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Nintendo DSi™" title -1. Select "Copy", then select "OK" +{% include_relative include/fredtool-restore-dsconn.txt %} ___ + ### Continue to [Finalizing Setup](finalizing-setup) {: .notice--primary} diff --git a/_pages/ar_SA/installing-boot9strap-(fredtool-legacy).txt b/_pages/ar_SA/installing-boot9strap-(fredtool-legacy).txt new file mode 100644 index 0000000000..1513694ebd --- /dev/null +++ b/_pages/ar_SA/installing-boot9strap-(fredtool-legacy).txt @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title="Table of Contents" %} + +{% capture technical_info %} +Technical Details (optional) + +To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +### What You Need + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) + +#### Section I - CFW Check + +{% include_relative include/cfw-check-fredtool.txt %} + +#### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically reboot +1. Power off your device + +#### Section III - Prep Work + +{% include_relative include/fredtool-prep.txt %} + +#### Section IV - Overwriting DS Connection Settings + +{% include_relative include/fredtool-write-flipnote.txt %} + +#### Section V - Flipnote Exploit + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### Section VI - Luma3DS Configuration + +1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### Section VII - Restoring DS Connection Settings + +{% include_relative include/fredtool-restore-dsconn.txt %} + +___ + + +### Continue to [Finalizing Setup](finalizing-setup) +{: .notice--primary} diff --git a/_pages/ar_SA/seedminer-(mii).txt b/_pages/ar_SA/seedminer-(mii).txt new file mode 100644 index 0000000000..5faf224c22 --- /dev/null +++ b/_pages/ar_SA/seedminer-(mii).txt @@ -0,0 +1,84 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title="Table of Contents" %} + +{% capture gpu_warning %} +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: ++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) ++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple) ++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) ++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{% endcapture %} +
{{ gpu_warning | markdownify }}
+ +{% capture technical_info %} +Technical Details (optional) + +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### What you need + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### Section I - Prep Work + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/ar_SA/site-navigation.txt b/_pages/ar_SA/site-navigation.txt index a2135747ab..179a8a4b0b 100644 --- a/_pages/ar_SA/site-navigation.txt +++ b/_pages/ar_SA/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [A9LH to B9S](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) + [Credits](credits) + [Checking for CFW](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [Home](/) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) + [Installing boot9strap (Hardmod)](installing-boot9strap-(hardmod)) + [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [Region Changing](region-changing) + [Restoring / Updating CFW](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (TWN)](seedminer-(twn)) + [Troubleshooting](troubleshooting) + [Uninstall CFW](uninstall-cfw) diff --git a/_pages/ar_SA/updating-firmware-(kor-twn).md b/_pages/ar_SA/updating-firmware-(kor).txt similarity index 89% rename from _pages/ar_SA/updating-firmware-(kor-twn).md rename to _pages/ar_SA/updating-firmware-(kor).txt index 74a2b48f90..4b08786c27 100644 --- a/_pages/ar_SA/updating-firmware-(kor-twn).md +++ b/_pages/ar_SA/updating-firmware-(kor).txt @@ -1,5 +1,5 @@ --- -title: "Updating Firmware (KOR/TWN)" +title: "Updating Firmware (KOR)" --- ### Required Reading diff --git a/_pages/ar_SA/updating-firmware-(new-3ds).md b/_pages/ar_SA/updating-firmware-(new-3ds).txt similarity index 100% rename from _pages/ar_SA/updating-firmware-(new-3ds).md rename to _pages/ar_SA/updating-firmware-(new-3ds).txt diff --git a/_pages/ar_SA/updating-firmware-(twn).txt b/_pages/ar_SA/updating-firmware-(twn).txt new file mode 100644 index 0000000000..83e6992b1b --- /dev/null +++ b/_pages/ar_SA/updating-firmware-(twn).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (TWN)" +--- + +### Required Reading + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer (TWN)](seedminer-(twn)) +{: .notice--primary} diff --git a/_pages/bg_BG/404.md b/_pages/bg_BG/404.txt similarity index 100% rename from _pages/bg_BG/404.md rename to _pages/bg_BG/404.txt diff --git a/_pages/bg_BG/bannerbomb3-(legacy).txt b/_pages/bg_BG/bannerbomb3-(legacy).txt new file mode 100644 index 0000000000..503794c42a --- /dev/null +++ b/_pages/bg_BG/bannerbomb3-(legacy).txt @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title="Table of Contents" %} + +{% capture technical_info %} +Technical Details (optional) + +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### Compatibility Notes + +These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. + +### What You Need + +* Your `movable.sed` file from completing Seedminer or nimhax + +#### Section I - Prep Work + +{% include_relative include/bb3-prep.txt %} + +#### Section II - Hardware Button Check + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### Next steps: Choose an exploit + +If the camera appeared in the previous section, Safe Mode is likely to be working on your device. + +If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/bg_BG/bannerbomb3.txt b/_pages/bg_BG/bannerbomb3.txt index 7767c4aeb1..a8383926fd 100644 --- a/_pages/bg_BG/bannerbomb3.txt +++ b/_pages/bg_BG/bannerbomb3.txt @@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. - -1. Power off your device -1. Insert your SD card into your computer -1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer -1. Upload your movable.sed using the “Choose File” option -1. Click “Build and Download” - + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) -1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it - + This file does not need to be opened or extracted - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.txt %} #### Section II - Hardware Button Check -In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. - -Your SD card should remain in your computer while you perform this check. - {% include_relative include/safemodecheck.txt %} ___ diff --git a/_pages/bg_BG/credits.md b/_pages/bg_BG/credits.txt similarity index 100% rename from _pages/bg_BG/credits.md rename to _pages/bg_BG/credits.txt diff --git a/_pages/bg_BG/donations.md b/_pages/bg_BG/donations.txt similarity index 100% rename from _pages/bg_BG/donations.md rename to _pages/bg_BG/donations.txt diff --git a/_pages/bg_BG/finalizing-setup.txt b/_pages/bg_BG/finalizing-setup.txt index f16b13698a..e41bd44dcd 100644 --- a/_pages/bg_BG/finalizing-setup.txt +++ b/_pages/bg_BG/finalizing-setup.txt @@ -177,9 +177,6 @@ ___ You're done! Custom firmware is now fully configured on your device. {: .notice--success} -Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! -{: .notice--info} - ### Information and Notes {% capture notice-6 %} diff --git a/_pages/bg_BG/homebrew-launcher-(super-skaterhax).txt b/_pages/bg_BG/homebrew-launcher-(super-skaterhax).txt index ea288c3163..7b83fe0d7e 100644 --- a/_pages/bg_BG/homebrew-launcher-(super-skaterhax).txt +++ b/_pages/bg_BG/homebrew-launcher-(super-skaterhax).txt @@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up 1. Select the "GO GO!" button on the top screen + If any prompts appear, approve all of them + If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section + + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) 1. If the exploit was successful, your device will have booted into the Homebrew Launcher 1. Power off your device diff --git a/_pages/bg_BG/include/bb3-prep.txt b/_pages/bg_BG/include/bb3-prep.txt new file mode 100644 index 0000000000..0b0965f3de --- /dev/null +++ b/_pages/bg_BG/include/bb3-prep.txt @@ -0,0 +1,23 @@ +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + +1. Power off your device +1. Insert your SD card into your computer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. Create a folder named `Nintendo DSiWare` inside of the `` + + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/bg_BG/include/fredtool-prep.txt b/_pages/bg_BG/include/fredtool-prep.txt new file mode 100644 index 0000000000..cff8aa806d --- /dev/null +++ b/_pages/bg_BG/include/fredtool-prep.txt @@ -0,0 +1,29 @@ +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. + +1. Insert your SD card into your computer +1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer +1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. Click "Build" + + Wait a few seconds for the build process to complete +1. In the Build History section on the left, type the Username into the "Filter Builds" field +1. Click on the first search result + + This result should have the latest timestamp +1. Click the "output_(name).zip" link +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card +1. Reinsert your SD card into your device +1. Power on your device + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/bg_BG/include/fredtool-restore-dsconn.txt b/_pages/bg_BG/include/fredtool-restore-dsconn.txt new file mode 100644 index 0000000000..3057b3ac9d --- /dev/null +++ b/_pages/bg_BG/include/fredtool-restore-dsconn.txt @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title +1. Select "Copy", then select "OK" diff --git a/_pages/bg_BG/include/fredtool-write-flipnote.txt b/_pages/bg_BG/include/fredtool-write-flipnote.txt new file mode 100644 index 0000000000..cb6f428624 --- /dev/null +++ b/_pages/bg_BG/include/fredtool-write-flipnote.txt @@ -0,0 +1,11 @@ +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Select "Copy", then select "OK" +1. Return to main menu of the System Settings +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/bg_BG/include/safemodecheck.txt b/_pages/bg_BG/include/safemodecheck.txt index 43ebec6575..7035baace8 100644 --- a/_pages/bg_BG/include/safemodecheck.txt +++ b/_pages/bg_BG/include/safemodecheck.txt @@ -1,3 +1,5 @@ +In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page. + 1. Power on your device 1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time + The camera applet should appear diff --git a/_pages/bg_BG/include/seedminer-base.txt b/_pages/bg_BG/include/seedminer-base.txt index e3493c2f87..ad6697a5fa 100644 --- a/_pages/bg_BG/include/seedminer-base.txt +++ b/_pages/bg_BG/include/seedminer-base.txt @@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. +{% capture console_state_info %} Before following this section: + Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data + Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen) -{: .notice--info} +{% endcapture %} +
{{ console_state_info | markdownify }}
1. Power off your device 1. Insert your SD card into your computer diff --git a/_pages/bg_BG/installing-boot9strap-(fredtool).txt b/_pages/bg_BG/installing-boot9strap-(fredtool).txt index ea9d81c010..455c3317a3 100644 --- a/_pages/bg_BG/installing-boot9strap-(fredtool).txt +++ b/_pages/bg_BG/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ### What You Need * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) #### Section I - CFW Check @@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana #### Section III - Prep Work -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Insert your SD card into your computer -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert your SD card into your device -1. Power on your device - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.txt %} #### Section IV - Overwriting DS Connection Settings -In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. - -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Haxxxxxxxxx!" title - + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Select "Copy", then select "OK" -1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) -1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio - + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.txt %} #### Section V - Flipnote Exploit @@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte #### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. - -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Nintendo DSi™" title -1. Select "Copy", then select "OK" +{% include_relative include/fredtool-restore-dsconn.txt %} ___ + ### Continue to [Finalizing Setup](finalizing-setup) {: .notice--primary} diff --git a/_pages/bg_BG/installing-boot9strap-(fredtool-legacy).txt b/_pages/bg_BG/installing-boot9strap-(fredtool-legacy).txt new file mode 100644 index 0000000000..1513694ebd --- /dev/null +++ b/_pages/bg_BG/installing-boot9strap-(fredtool-legacy).txt @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title="Table of Contents" %} + +{% capture technical_info %} +Technical Details (optional) + +To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +### What You Need + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) + +#### Section I - CFW Check + +{% include_relative include/cfw-check-fredtool.txt %} + +#### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically reboot +1. Power off your device + +#### Section III - Prep Work + +{% include_relative include/fredtool-prep.txt %} + +#### Section IV - Overwriting DS Connection Settings + +{% include_relative include/fredtool-write-flipnote.txt %} + +#### Section V - Flipnote Exploit + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### Section VI - Luma3DS Configuration + +1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### Section VII - Restoring DS Connection Settings + +{% include_relative include/fredtool-restore-dsconn.txt %} + +___ + + +### Continue to [Finalizing Setup](finalizing-setup) +{: .notice--primary} diff --git a/_pages/bg_BG/seedminer-(mii).txt b/_pages/bg_BG/seedminer-(mii).txt new file mode 100644 index 0000000000..5faf224c22 --- /dev/null +++ b/_pages/bg_BG/seedminer-(mii).txt @@ -0,0 +1,84 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title="Table of Contents" %} + +{% capture gpu_warning %} +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: ++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) ++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple) ++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) ++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{% endcapture %} +
{{ gpu_warning | markdownify }}
+ +{% capture technical_info %} +Technical Details (optional) + +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### What you need + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### Section I - Prep Work + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/bg_BG/site-navigation.txt b/_pages/bg_BG/site-navigation.txt index a2135747ab..179a8a4b0b 100644 --- a/_pages/bg_BG/site-navigation.txt +++ b/_pages/bg_BG/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [A9LH to B9S](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) + [Credits](credits) + [Checking for CFW](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [Home](/) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) + [Installing boot9strap (Hardmod)](installing-boot9strap-(hardmod)) + [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [Region Changing](region-changing) + [Restoring / Updating CFW](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (TWN)](seedminer-(twn)) + [Troubleshooting](troubleshooting) + [Uninstall CFW](uninstall-cfw) diff --git a/_pages/bg_BG/updating-firmware-(kor-twn).md b/_pages/bg_BG/updating-firmware-(kor).txt similarity index 89% rename from _pages/bg_BG/updating-firmware-(kor-twn).md rename to _pages/bg_BG/updating-firmware-(kor).txt index 74a2b48f90..4b08786c27 100644 --- a/_pages/bg_BG/updating-firmware-(kor-twn).md +++ b/_pages/bg_BG/updating-firmware-(kor).txt @@ -1,5 +1,5 @@ --- -title: "Updating Firmware (KOR/TWN)" +title: "Updating Firmware (KOR)" --- ### Required Reading diff --git a/_pages/bg_BG/updating-firmware-(new-3ds).md b/_pages/bg_BG/updating-firmware-(new-3ds).txt similarity index 100% rename from _pages/bg_BG/updating-firmware-(new-3ds).md rename to _pages/bg_BG/updating-firmware-(new-3ds).txt diff --git a/_pages/bg_BG/updating-firmware-(twn).txt b/_pages/bg_BG/updating-firmware-(twn).txt new file mode 100644 index 0000000000..83e6992b1b --- /dev/null +++ b/_pages/bg_BG/updating-firmware-(twn).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (TWN)" +--- + +### Required Reading + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer (TWN)](seedminer-(twn)) +{: .notice--primary} diff --git a/_pages/ca_ES/404.md b/_pages/ca_ES/404.txt similarity index 100% rename from _pages/ca_ES/404.md rename to _pages/ca_ES/404.txt diff --git a/_pages/ca_ES/bannerbomb3-(legacy).txt b/_pages/ca_ES/bannerbomb3-(legacy).txt new file mode 100644 index 0000000000..503794c42a --- /dev/null +++ b/_pages/ca_ES/bannerbomb3-(legacy).txt @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title="Table of Contents" %} + +{% capture technical_info %} +Technical Details (optional) + +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### Compatibility Notes + +These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. + +### What You Need + +* Your `movable.sed` file from completing Seedminer or nimhax + +#### Section I - Prep Work + +{% include_relative include/bb3-prep.txt %} + +#### Section II - Hardware Button Check + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### Next steps: Choose an exploit + +If the camera appeared in the previous section, Safe Mode is likely to be working on your device. + +If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/ca_ES/bannerbomb3.txt b/_pages/ca_ES/bannerbomb3.txt index 7767c4aeb1..a8383926fd 100644 --- a/_pages/ca_ES/bannerbomb3.txt +++ b/_pages/ca_ES/bannerbomb3.txt @@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. - -1. Power off your device -1. Insert your SD card into your computer -1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer -1. Upload your movable.sed using the “Choose File” option -1. Click “Build and Download” - + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) -1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it - + This file does not need to be opened or extracted - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.txt %} #### Section II - Hardware Button Check -In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. - -Your SD card should remain in your computer while you perform this check. - {% include_relative include/safemodecheck.txt %} ___ diff --git a/_pages/ca_ES/credits.md b/_pages/ca_ES/credits.txt similarity index 100% rename from _pages/ca_ES/credits.md rename to _pages/ca_ES/credits.txt diff --git a/_pages/ca_ES/donations.md b/_pages/ca_ES/donations.txt similarity index 100% rename from _pages/ca_ES/donations.md rename to _pages/ca_ES/donations.txt diff --git a/_pages/ca_ES/finalizing-setup.txt b/_pages/ca_ES/finalizing-setup.txt index f07a143549..7daf8451d1 100644 --- a/_pages/ca_ES/finalizing-setup.txt +++ b/_pages/ca_ES/finalizing-setup.txt @@ -177,9 +177,6 @@ ___ You're done! Custom firmware is now fully configured on your device. {: .notice--success} -Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! -{: .notice--info} - ### Information and Notes {% capture notice-6 %} diff --git a/_pages/ca_ES/homebrew-launcher-(super-skaterhax).txt b/_pages/ca_ES/homebrew-launcher-(super-skaterhax).txt index ea288c3163..7b83fe0d7e 100644 --- a/_pages/ca_ES/homebrew-launcher-(super-skaterhax).txt +++ b/_pages/ca_ES/homebrew-launcher-(super-skaterhax).txt @@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up 1. Select the "GO GO!" button on the top screen + If any prompts appear, approve all of them + If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section + + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) 1. If the exploit was successful, your device will have booted into the Homebrew Launcher 1. Power off your device diff --git a/_pages/ca_ES/include/bb3-prep.txt b/_pages/ca_ES/include/bb3-prep.txt new file mode 100644 index 0000000000..0b0965f3de --- /dev/null +++ b/_pages/ca_ES/include/bb3-prep.txt @@ -0,0 +1,23 @@ +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + +1. Power off your device +1. Insert your SD card into your computer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. Create a folder named `Nintendo DSiWare` inside of the `` + + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/ca_ES/include/fredtool-prep.txt b/_pages/ca_ES/include/fredtool-prep.txt new file mode 100644 index 0000000000..cff8aa806d --- /dev/null +++ b/_pages/ca_ES/include/fredtool-prep.txt @@ -0,0 +1,29 @@ +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. + +1. Insert your SD card into your computer +1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer +1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. Click "Build" + + Wait a few seconds for the build process to complete +1. In the Build History section on the left, type the Username into the "Filter Builds" field +1. Click on the first search result + + This result should have the latest timestamp +1. Click the "output_(name).zip" link +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card +1. Reinsert your SD card into your device +1. Power on your device + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/ca_ES/include/fredtool-restore-dsconn.txt b/_pages/ca_ES/include/fredtool-restore-dsconn.txt new file mode 100644 index 0000000000..3057b3ac9d --- /dev/null +++ b/_pages/ca_ES/include/fredtool-restore-dsconn.txt @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title +1. Select "Copy", then select "OK" diff --git a/_pages/ca_ES/include/fredtool-write-flipnote.txt b/_pages/ca_ES/include/fredtool-write-flipnote.txt new file mode 100644 index 0000000000..cb6f428624 --- /dev/null +++ b/_pages/ca_ES/include/fredtool-write-flipnote.txt @@ -0,0 +1,11 @@ +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Select "Copy", then select "OK" +1. Return to main menu of the System Settings +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/ca_ES/include/safemodecheck.txt b/_pages/ca_ES/include/safemodecheck.txt index 43ebec6575..7035baace8 100644 --- a/_pages/ca_ES/include/safemodecheck.txt +++ b/_pages/ca_ES/include/safemodecheck.txt @@ -1,3 +1,5 @@ +In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page. + 1. Power on your device 1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time + The camera applet should appear diff --git a/_pages/ca_ES/include/seedminer-base.txt b/_pages/ca_ES/include/seedminer-base.txt index e3493c2f87..ad6697a5fa 100644 --- a/_pages/ca_ES/include/seedminer-base.txt +++ b/_pages/ca_ES/include/seedminer-base.txt @@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. +{% capture console_state_info %} Before following this section: + Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data + Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen) -{: .notice--info} +{% endcapture %} +
{{ console_state_info | markdownify }}
1. Power off your device 1. Insert your SD card into your computer diff --git a/_pages/ca_ES/installing-boot9strap-(fredtool).txt b/_pages/ca_ES/installing-boot9strap-(fredtool).txt index ea9d81c010..455c3317a3 100644 --- a/_pages/ca_ES/installing-boot9strap-(fredtool).txt +++ b/_pages/ca_ES/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ### What You Need * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) #### Section I - CFW Check @@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana #### Section III - Prep Work -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Insert your SD card into your computer -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert your SD card into your device -1. Power on your device - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.txt %} #### Section IV - Overwriting DS Connection Settings -In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. - -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Haxxxxxxxxx!" title - + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Select "Copy", then select "OK" -1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) -1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio - + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.txt %} #### Section V - Flipnote Exploit @@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte #### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. - -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Nintendo DSi™" title -1. Select "Copy", then select "OK" +{% include_relative include/fredtool-restore-dsconn.txt %} ___ + ### Continue to [Finalizing Setup](finalizing-setup) {: .notice--primary} diff --git a/_pages/ca_ES/installing-boot9strap-(fredtool-legacy).txt b/_pages/ca_ES/installing-boot9strap-(fredtool-legacy).txt new file mode 100644 index 0000000000..1513694ebd --- /dev/null +++ b/_pages/ca_ES/installing-boot9strap-(fredtool-legacy).txt @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title="Table of Contents" %} + +{% capture technical_info %} +Technical Details (optional) + +To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +### What You Need + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) + +#### Section I - CFW Check + +{% include_relative include/cfw-check-fredtool.txt %} + +#### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically reboot +1. Power off your device + +#### Section III - Prep Work + +{% include_relative include/fredtool-prep.txt %} + +#### Section IV - Overwriting DS Connection Settings + +{% include_relative include/fredtool-write-flipnote.txt %} + +#### Section V - Flipnote Exploit + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### Section VI - Luma3DS Configuration + +1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### Section VII - Restoring DS Connection Settings + +{% include_relative include/fredtool-restore-dsconn.txt %} + +___ + + +### Continue to [Finalizing Setup](finalizing-setup) +{: .notice--primary} diff --git a/_pages/ca_ES/seedminer-(mii).txt b/_pages/ca_ES/seedminer-(mii).txt new file mode 100644 index 0000000000..5faf224c22 --- /dev/null +++ b/_pages/ca_ES/seedminer-(mii).txt @@ -0,0 +1,84 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title="Table of Contents" %} + +{% capture gpu_warning %} +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: ++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) ++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple) ++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) ++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{% endcapture %} +
{{ gpu_warning | markdownify }}
+ +{% capture technical_info %} +Technical Details (optional) + +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### What you need + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### Section I - Prep Work + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/ca_ES/site-navigation.txt b/_pages/ca_ES/site-navigation.txt index a2135747ab..179a8a4b0b 100644 --- a/_pages/ca_ES/site-navigation.txt +++ b/_pages/ca_ES/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [A9LH to B9S](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) + [Credits](credits) + [Checking for CFW](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [Home](/) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) + [Installing boot9strap (Hardmod)](installing-boot9strap-(hardmod)) + [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [Region Changing](region-changing) + [Restoring / Updating CFW](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (TWN)](seedminer-(twn)) + [Troubleshooting](troubleshooting) + [Uninstall CFW](uninstall-cfw) diff --git a/_pages/ca_ES/updating-firmware-(kor-twn).md b/_pages/ca_ES/updating-firmware-(kor).txt similarity index 89% rename from _pages/ca_ES/updating-firmware-(kor-twn).md rename to _pages/ca_ES/updating-firmware-(kor).txt index 74a2b48f90..4b08786c27 100644 --- a/_pages/ca_ES/updating-firmware-(kor-twn).md +++ b/_pages/ca_ES/updating-firmware-(kor).txt @@ -1,5 +1,5 @@ --- -title: "Updating Firmware (KOR/TWN)" +title: "Updating Firmware (KOR)" --- ### Required Reading diff --git a/_pages/ca_ES/updating-firmware-(new-3ds).md b/_pages/ca_ES/updating-firmware-(new-3ds).txt similarity index 100% rename from _pages/ca_ES/updating-firmware-(new-3ds).md rename to _pages/ca_ES/updating-firmware-(new-3ds).txt diff --git a/_pages/ca_ES/updating-firmware-(twn).txt b/_pages/ca_ES/updating-firmware-(twn).txt new file mode 100644 index 0000000000..83e6992b1b --- /dev/null +++ b/_pages/ca_ES/updating-firmware-(twn).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (TWN)" +--- + +### Required Reading + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer (TWN)](seedminer-(twn)) +{: .notice--primary} diff --git a/_pages/cs_CZ/404.md b/_pages/cs_CZ/404.txt similarity index 100% rename from _pages/cs_CZ/404.md rename to _pages/cs_CZ/404.txt diff --git a/_pages/cs_CZ/bannerbomb3-(legacy).txt b/_pages/cs_CZ/bannerbomb3-(legacy).txt new file mode 100644 index 0000000000..503794c42a --- /dev/null +++ b/_pages/cs_CZ/bannerbomb3-(legacy).txt @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title="Table of Contents" %} + +{% capture technical_info %} +Technical Details (optional) + +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### Compatibility Notes + +These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. + +### What You Need + +* Your `movable.sed` file from completing Seedminer or nimhax + +#### Section I - Prep Work + +{% include_relative include/bb3-prep.txt %} + +#### Section II - Hardware Button Check + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### Next steps: Choose an exploit + +If the camera appeared in the previous section, Safe Mode is likely to be working on your device. + +If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/cs_CZ/bannerbomb3.txt b/_pages/cs_CZ/bannerbomb3.txt index 7767c4aeb1..a8383926fd 100644 --- a/_pages/cs_CZ/bannerbomb3.txt +++ b/_pages/cs_CZ/bannerbomb3.txt @@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. - -1. Power off your device -1. Insert your SD card into your computer -1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer -1. Upload your movable.sed using the “Choose File” option -1. Click “Build and Download” - + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) -1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it - + This file does not need to be opened or extracted - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.txt %} #### Section II - Hardware Button Check -In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. - -Your SD card should remain in your computer while you perform this check. - {% include_relative include/safemodecheck.txt %} ___ diff --git a/_pages/cs_CZ/credits.md b/_pages/cs_CZ/credits.txt similarity index 100% rename from _pages/cs_CZ/credits.md rename to _pages/cs_CZ/credits.txt diff --git a/_pages/cs_CZ/donations.md b/_pages/cs_CZ/donations.txt similarity index 100% rename from _pages/cs_CZ/donations.md rename to _pages/cs_CZ/donations.txt diff --git a/_pages/cs_CZ/finalizing-setup.txt b/_pages/cs_CZ/finalizing-setup.txt index f16b13698a..e41bd44dcd 100644 --- a/_pages/cs_CZ/finalizing-setup.txt +++ b/_pages/cs_CZ/finalizing-setup.txt @@ -177,9 +177,6 @@ ___ You're done! Custom firmware is now fully configured on your device. {: .notice--success} -Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! -{: .notice--info} - ### Information and Notes {% capture notice-6 %} diff --git a/_pages/cs_CZ/homebrew-launcher-(super-skaterhax).txt b/_pages/cs_CZ/homebrew-launcher-(super-skaterhax).txt index ea288c3163..7b83fe0d7e 100644 --- a/_pages/cs_CZ/homebrew-launcher-(super-skaterhax).txt +++ b/_pages/cs_CZ/homebrew-launcher-(super-skaterhax).txt @@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up 1. Select the "GO GO!" button on the top screen + If any prompts appear, approve all of them + If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section + + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) 1. If the exploit was successful, your device will have booted into the Homebrew Launcher 1. Power off your device diff --git a/_pages/cs_CZ/include/bb3-prep.txt b/_pages/cs_CZ/include/bb3-prep.txt new file mode 100644 index 0000000000..0b0965f3de --- /dev/null +++ b/_pages/cs_CZ/include/bb3-prep.txt @@ -0,0 +1,23 @@ +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + +1. Power off your device +1. Insert your SD card into your computer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. Create a folder named `Nintendo DSiWare` inside of the `` + + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/cs_CZ/include/fredtool-prep.txt b/_pages/cs_CZ/include/fredtool-prep.txt new file mode 100644 index 0000000000..cff8aa806d --- /dev/null +++ b/_pages/cs_CZ/include/fredtool-prep.txt @@ -0,0 +1,29 @@ +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. + +1. Insert your SD card into your computer +1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer +1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. Click "Build" + + Wait a few seconds for the build process to complete +1. In the Build History section on the left, type the Username into the "Filter Builds" field +1. Click on the first search result + + This result should have the latest timestamp +1. Click the "output_(name).zip" link +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card +1. Reinsert your SD card into your device +1. Power on your device + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/cs_CZ/include/fredtool-restore-dsconn.txt b/_pages/cs_CZ/include/fredtool-restore-dsconn.txt new file mode 100644 index 0000000000..3057b3ac9d --- /dev/null +++ b/_pages/cs_CZ/include/fredtool-restore-dsconn.txt @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title +1. Select "Copy", then select "OK" diff --git a/_pages/cs_CZ/include/fredtool-write-flipnote.txt b/_pages/cs_CZ/include/fredtool-write-flipnote.txt new file mode 100644 index 0000000000..cb6f428624 --- /dev/null +++ b/_pages/cs_CZ/include/fredtool-write-flipnote.txt @@ -0,0 +1,11 @@ +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Select "Copy", then select "OK" +1. Return to main menu of the System Settings +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/cs_CZ/include/safemodecheck.txt b/_pages/cs_CZ/include/safemodecheck.txt index 43ebec6575..7035baace8 100644 --- a/_pages/cs_CZ/include/safemodecheck.txt +++ b/_pages/cs_CZ/include/safemodecheck.txt @@ -1,3 +1,5 @@ +In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page. + 1. Power on your device 1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time + The camera applet should appear diff --git a/_pages/cs_CZ/include/seedminer-base.txt b/_pages/cs_CZ/include/seedminer-base.txt index e3493c2f87..ad6697a5fa 100644 --- a/_pages/cs_CZ/include/seedminer-base.txt +++ b/_pages/cs_CZ/include/seedminer-base.txt @@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. +{% capture console_state_info %} Before following this section: + Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data + Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen) -{: .notice--info} +{% endcapture %} +
{{ console_state_info | markdownify }}
1. Power off your device 1. Insert your SD card into your computer diff --git a/_pages/cs_CZ/installing-boot9strap-(fredtool).txt b/_pages/cs_CZ/installing-boot9strap-(fredtool).txt index ea9d81c010..455c3317a3 100644 --- a/_pages/cs_CZ/installing-boot9strap-(fredtool).txt +++ b/_pages/cs_CZ/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ### What You Need * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) #### Section I - CFW Check @@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana #### Section III - Prep Work -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Insert your SD card into your computer -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert your SD card into your device -1. Power on your device - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.txt %} #### Section IV - Overwriting DS Connection Settings -In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. - -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Haxxxxxxxxx!" title - + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Select "Copy", then select "OK" -1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) -1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio - + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.txt %} #### Section V - Flipnote Exploit @@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte #### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. - -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Nintendo DSi™" title -1. Select "Copy", then select "OK" +{% include_relative include/fredtool-restore-dsconn.txt %} ___ + ### Continue to [Finalizing Setup](finalizing-setup) {: .notice--primary} diff --git a/_pages/cs_CZ/installing-boot9strap-(fredtool-legacy).txt b/_pages/cs_CZ/installing-boot9strap-(fredtool-legacy).txt new file mode 100644 index 0000000000..1513694ebd --- /dev/null +++ b/_pages/cs_CZ/installing-boot9strap-(fredtool-legacy).txt @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title="Table of Contents" %} + +{% capture technical_info %} +Technical Details (optional) + +To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +### What You Need + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) + +#### Section I - CFW Check + +{% include_relative include/cfw-check-fredtool.txt %} + +#### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically reboot +1. Power off your device + +#### Section III - Prep Work + +{% include_relative include/fredtool-prep.txt %} + +#### Section IV - Overwriting DS Connection Settings + +{% include_relative include/fredtool-write-flipnote.txt %} + +#### Section V - Flipnote Exploit + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### Section VI - Luma3DS Configuration + +1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### Section VII - Restoring DS Connection Settings + +{% include_relative include/fredtool-restore-dsconn.txt %} + +___ + + +### Continue to [Finalizing Setup](finalizing-setup) +{: .notice--primary} diff --git a/_pages/cs_CZ/seedminer-(mii).txt b/_pages/cs_CZ/seedminer-(mii).txt new file mode 100644 index 0000000000..5faf224c22 --- /dev/null +++ b/_pages/cs_CZ/seedminer-(mii).txt @@ -0,0 +1,84 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title="Table of Contents" %} + +{% capture gpu_warning %} +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: ++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) ++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple) ++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) ++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{% endcapture %} +
{{ gpu_warning | markdownify }}
+ +{% capture technical_info %} +Technical Details (optional) + +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### What you need + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### Section I - Prep Work + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/cs_CZ/site-navigation.txt b/_pages/cs_CZ/site-navigation.txt index a2135747ab..179a8a4b0b 100644 --- a/_pages/cs_CZ/site-navigation.txt +++ b/_pages/cs_CZ/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [A9LH to B9S](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) + [Credits](credits) + [Checking for CFW](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [Home](/) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) + [Installing boot9strap (Hardmod)](installing-boot9strap-(hardmod)) + [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [Region Changing](region-changing) + [Restoring / Updating CFW](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (TWN)](seedminer-(twn)) + [Troubleshooting](troubleshooting) + [Uninstall CFW](uninstall-cfw) diff --git a/_pages/cs_CZ/updating-firmware-(kor-twn).md b/_pages/cs_CZ/updating-firmware-(kor).txt similarity index 89% rename from _pages/cs_CZ/updating-firmware-(kor-twn).md rename to _pages/cs_CZ/updating-firmware-(kor).txt index 74a2b48f90..4b08786c27 100644 --- a/_pages/cs_CZ/updating-firmware-(kor-twn).md +++ b/_pages/cs_CZ/updating-firmware-(kor).txt @@ -1,5 +1,5 @@ --- -title: "Updating Firmware (KOR/TWN)" +title: "Updating Firmware (KOR)" --- ### Required Reading diff --git a/_pages/cs_CZ/updating-firmware-(new-3ds).md b/_pages/cs_CZ/updating-firmware-(new-3ds).txt similarity index 100% rename from _pages/cs_CZ/updating-firmware-(new-3ds).md rename to _pages/cs_CZ/updating-firmware-(new-3ds).txt diff --git a/_pages/cs_CZ/updating-firmware-(twn).txt b/_pages/cs_CZ/updating-firmware-(twn).txt new file mode 100644 index 0000000000..83e6992b1b --- /dev/null +++ b/_pages/cs_CZ/updating-firmware-(twn).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (TWN)" +--- + +### Required Reading + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer (TWN)](seedminer-(twn)) +{: .notice--primary} diff --git a/_pages/de_DE/404.md b/_pages/de_DE/404.txt similarity index 100% rename from _pages/de_DE/404.md rename to _pages/de_DE/404.txt diff --git a/_pages/de_DE/bannerbomb3-(legacy).txt b/_pages/de_DE/bannerbomb3-(legacy).txt new file mode 100644 index 0000000000..9c24ed8885 --- /dev/null +++ b/_pages/de_DE/bannerbomb3-(legacy).txt @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title="Inhalt" %} + +{% capture technical_info %} +Technische Details (optional) + +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### Kompatibilitätshinweise + +Diese Anleitung funktioniert mit den folgenden Konsolenregionen: USA, Europa, Japan und Korea. Diese werden mit den Buchstaben U, E, J oder K nach der Systemversion angezeigt. + +### Was du brauchst + +* Your `movable.sed` file from completing Seedminer or nimhax + +#### Abschnitt I - Vorbereitungen + +{% include_relative include/bb3-prep.txt %} + +#### Abschnitt II - Tastenfunktionalität überprüfen + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### Nächste Schritte: Wähle einen Exploit + +If the camera appeared in the previous section, Safe Mode is likely to be working on your device. + +If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/de_DE/bannerbomb3.txt b/_pages/de_DE/bannerbomb3.txt index fe50f02b16..f332fb1404 100644 --- a/_pages/de_DE/bannerbomb3.txt +++ b/_pages/de_DE/bannerbomb3.txt @@ -30,36 +30,10 @@ Falls du eine Taiwanesische Konsole besitzen solltest (gekennzeichnet durch ein #### Abschnitt I - Vorbereitungen -In diesem Schritt wirst du die Dateien, die zum Auslösen des Bannerbomb3 Exploits benutzt werden, auf die SD-Karte deiner Konsole kopieren. - -1. Schalte deine Konsole aus -1. Stecke deine SD-Karte in deinen Computer -1. Öffne den [BannerBomb3 Injector](https://3dstools.nhnarwhal.com/#/bb3gen) auf deinem Computer -1. Lade deine movable.sed mit der "Choose File" Option hoch -1. Klicke "Build and Download" - + Dies wird ein DSiWare-Backup namens `F00D43D5.bin` und einen Payload namens `bb3.bin` in einer zip Datei herunterladen (`DSIWARE_EXPLOIT.zip`) -1. Kopiere `bb3.bin` von der `DSIWARE_EXPLOIT.zip` in das Stammverzeichnis der SD-Karte - + Das Stammverzeichnis der SD-Karte bezieht sich auf das ursprüngliche Verzeichnis deiner SD-Karte, wo du den Nintendo 3DS Ordner sehen kannst, aber nicht in ihm drin bist - + This file does not need to be opened or extracted - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. Gehe zu `Nintendo 3DS` -> `` -> `` auf deiner SD-Karte - + Diese `` ist die, die du beim [Seedminer](seedminer) verwendet hast - + Die `` ist ein 32 Zeichen langer Ordner in der `` - + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Erstelle einen Ordner mit dem Namen `Nintendo DSiWare` innerhalb der `` - Wenn du bereits den Ordner hattest, *und* du hast schon DSiWare Backup Dateien darin hast (`<8-Charakter-ID>.bin`), kopiere sie zu deinem Computer und lösche sie von deiner SD-Karte -1. Kopiere die `F00D43D5.bin` Datei aus `DSIWARE_EXPLOIT.zip` in den `Nintendo DSiWare` Ordner - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.txt %} #### Abschnitt II - Tastenfunktionalität überprüfen -In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. - -Your SD card should remain in your computer while you perform this check. - {% include_relative include/safemodecheck.txt %} ___ diff --git a/_pages/el_GR/credits.md b/_pages/de_DE/credits.txt similarity index 100% rename from _pages/el_GR/credits.md rename to _pages/de_DE/credits.txt diff --git a/_pages/de_DE/donations.md b/_pages/de_DE/donations.txt similarity index 100% rename from _pages/de_DE/donations.md rename to _pages/de_DE/donations.txt diff --git a/_pages/de_DE/finalizing-setup.txt b/_pages/de_DE/finalizing-setup.txt index a41379daa5..2c726c1925 100644 --- a/_pages/de_DE/finalizing-setup.txt +++ b/_pages/de_DE/finalizing-setup.txt @@ -69,7 +69,7 @@ The screenshots below indicate the minimum SD card layout that is required to fo Als zusätzliche Sicherheitsmaßnahme führen wir eine zusätzliche Überprüfung auf Custom Firmware durch. If custom firmware is not installed by this point for any reason, the next section may render your console unable to be hacked without external hardware. -1. Schalte deine Konsole aus +1. Schalte dein Gerät aus 1. Halte den (Select)-Knopf 1. Schalte deine Konsole an während du den (Select) Knopf gedrückt hältst 1. If the check was successful, your device should have booted into the Luma3DS configuration menu @@ -139,7 +139,7 @@ In this section, you will use a script to remove some unnecessary files from you 1. Select "Cleanup SD Card" 1. Drücke (A), wenn du dazu aufgefordert wirst, um fortzufahren -1. Drücke (A) um fortzufahren +1. Drücke (A), um fortzufahren 1. Drücke (B), um zum Hauptmenü zurückzukehren #### Section IX - Backup Essential Files @@ -159,7 +159,7 @@ In this section, you will make backups of files that can be used to recover from 1. Press (A) on `essential.exefs` to select it 1. Select "Copy to 0:/gm9/out" + If you see "Destination already exists", press (A) on "Overwrite file(s)" -1. Drücke (A), um fortzufahren +1. Drücke (A) um fortzufahren 1. Drücke (Home), um das Aktionsmenü aufzurufen 1. Select "Poweroff system" to power off your device 1. Stecke deine SD-Karte in deinen Computer @@ -169,7 +169,7 @@ In this section, you will make backups of files that can be used to recover from 1. Delete `__sysnand_##.bin` and `__sysnand_##.bin.sha` from the `/gm9/out/` folder on your SD card after copying it + The other backup files are negligible in size and may be kept on your SD card for ease of access 1. If you have it, copy the `/luma/backups/` folder on your SD card to a safe location on your computer -1. Stecke deine SD-Karte nun wieder in deinen 3DS +1. Stecke deine SD-Karte wieder in dein Gerät 1. Schalte deine Konsole an ___ @@ -177,9 +177,6 @@ ___ You're done! Custom firmware is now fully configured on your device. {: .notice--success} -Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! -{: .notice--info} - ### Information and Notes {% capture notice-6 %} diff --git a/_pages/de_DE/homebrew-launcher-(super-skaterhax).txt b/_pages/de_DE/homebrew-launcher-(super-skaterhax).txt index 58575d007c..455eb5ca3f 100644 --- a/_pages/de_DE/homebrew-launcher-(super-skaterhax).txt +++ b/_pages/de_DE/homebrew-launcher-(super-skaterhax).txt @@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up 1. Select the "GO GO!" button on the top screen + If any prompts appear, approve all of them + If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section + + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) 1. If the exploit was successful, your device will have booted into the Homebrew Launcher 1. Schalte deine Konsole aus diff --git a/_pages/de_DE/include/bb3-prep.txt b/_pages/de_DE/include/bb3-prep.txt new file mode 100644 index 0000000000..51d6efaa1d --- /dev/null +++ b/_pages/de_DE/include/bb3-prep.txt @@ -0,0 +1,23 @@ +In diesem Schritt wirst du die Dateien, die zum Auslösen des Bannerbomb3 Exploits benutzt werden, auf die SD-Karte deiner Konsole kopieren. + +1. Schalte deine Konsole aus +1. Stecke deine SD-Karte in deinen Computer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Lade deine movable.sed mit der "Choose File" Option hoch +1. Klicke "Build and Download" + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. Gehe zu `Nintendo 3DS` -> `` -> ` auf deiner SD-Karte` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. Erstelle einen Ordner mit dem Namen `Nintendo DSiWare` innerhalb der `` + Wenn du bereits den Ordner hattest, *und* du hast schon DSiWare Backup Dateien darin hast (`<8-Charakter-ID>.bin`), kopiere sie zu deinem Computer und lösche sie von deiner SD-Karte +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/de_DE/include/fredtool-prep.txt b/_pages/de_DE/include/fredtool-prep.txt new file mode 100644 index 0000000000..d53e87c2f6 --- /dev/null +++ b/_pages/de_DE/include/fredtool-prep.txt @@ -0,0 +1,29 @@ +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. + +1. Stecke deine SD-Karte in deinen Computer +1. Öffne die [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) Webseite auf deinem Computer +1. Bei dem "Username" Feld, gib irgendeinen normalen Namen (keine Leerzeichen oder Sonderzeichen) an +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. Wähle beim "MovableSed" Feld deine `movable.sed` Datei mit der "Browse..." Option aus +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. Drücke auf "Build" + + Warte ein paar Sekunden, bis der Erstellungsprozess abgeschlossen ist +1. Gib im Abschnitt Build-Verlauf links den Benutzernamen in das "suchen" Feld ein +1. Klicke das erste Suchergebnis + + Dieses Ergebnis sollte das neuste sein +1. Drücke auf den "output_(name).zip" Link +1. Navigiere zu `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` auf deiner SD-Karte + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card +1. Kopiere den `private` Ordner von der Frogminer_save `.zip` in das Stammverzeichnis deiner SD-Karte +1. Stecke deine SD-Karte nun wieder in deinen 3DS +1. Schalte deine Konsole an + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/de_DE/include/fredtool-restore-dsconn.txt b/_pages/de_DE/include/fredtool-restore-dsconn.txt new file mode 100644 index 0000000000..5a002114b7 --- /dev/null +++ b/_pages/de_DE/include/fredtool-restore-dsconn.txt @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. Navigiere zu `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` auf deiner SD-Karte +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. Stecke deine SD-Karte nun wieder in deinen 3DS +1. Schalte deine Konsole an +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title +1. Select "Copy", then select "OK" diff --git a/_pages/de_DE/include/fredtool-write-flipnote.txt b/_pages/de_DE/include/fredtool-write-flipnote.txt new file mode 100644 index 0000000000..cb6f428624 --- /dev/null +++ b/_pages/de_DE/include/fredtool-write-flipnote.txt @@ -0,0 +1,11 @@ +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Select "Copy", then select "OK" +1. Return to main menu of the System Settings +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/de_DE/include/safemodecheck.txt b/_pages/de_DE/include/safemodecheck.txt index 9395e90ac0..04e35c12e4 100644 --- a/_pages/de_DE/include/safemodecheck.txt +++ b/_pages/de_DE/include/safemodecheck.txt @@ -1,3 +1,5 @@ +In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page. + 1. Schalte deine Konsole an 1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time + The camera applet should appear diff --git a/_pages/de_DE/include/seedminer-base.txt b/_pages/de_DE/include/seedminer-base.txt index eb5c19fbda..fb2745b670 100644 --- a/_pages/de_DE/include/seedminer-base.txt +++ b/_pages/de_DE/include/seedminer-base.txt @@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. +{% capture console_state_info %} Before following this section: + Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data + Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen) -{: .notice--info} +{% endcapture %} +
{{ console_state_info | markdownify }}
1. Schalte deine Konsole aus 1. Stecke deine SD-Karte in deinen Computer diff --git a/_pages/de_DE/installing-boot9strap-(fredtool).txt b/_pages/de_DE/installing-boot9strap-(fredtool).txt index 29f9eb15e5..8afc1431c6 100644 --- a/_pages/de_DE/installing-boot9strap-(fredtool).txt +++ b/_pages/de_DE/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ### Was du brauchst * Deine `movable.sed` Datei vom [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * Die neueste Version von [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (die Luma3DS `.zip` Datei) #### Abschnitt I - CFW Check @@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana #### Section III - Prep Work -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Stecke deine SD-Karte in deinen Computer -1. Öffne die [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) Webseite auf deinem Computer -1. Bei dem "Username" Feld, gib irgendeinen normalen Namen (keine Leerzeichen oder Sonderzeichen) an -1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option -1. Wähle beim "MovableSed" Feld deine `movable.sed` Datei mit der "Browse..." Option aus -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Drücke auf "Build" - + Warte ein paar Sekunden, bis der Erstellungsprozess abgeschlossen ist -1. Gib im Abschnitt Build-Verlauf links den Benutzernamen in das "suchen" Feld ein -1. Klicke das erste Suchergebnis - + Dieses Ergebnis sollte das neuste sein -1. Drücke auf den "output_(name).zip" Link -1. Navigiere zu `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` auf deiner SD-Karte - + Diese `` ist die, die du beim [Seedminer](seedminer) verwendet hast - + Die `` ist ein 32 Zeichen langer Ordner in der `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Stecke deine SD-Karte nun wieder in deinen 3DS -1. Schalte deine Konsole an - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.txt %} #### Section IV - Overwriting DS Connection Settings -In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. - -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Haxxxxxxxxx!" title - + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Select "Copy", then select "OK" -1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) -1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio - + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.txt %} #### Abschnitt V - Flipnote Exploit @@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte #### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. - -1. Navigiere zu `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` auf deiner SD-Karte -1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one -1. Stecke deine SD-Karte nun wieder in deinen 3DS -1. Schalte deine Konsole an -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Nintendo DSi™" title -1. Select "Copy", then select "OK" +{% include_relative include/fredtool-restore-dsconn.txt %} ___ + ### Fortfahren mit [Setup fertigstellen](finalizing-setup) {: .notice--primary} diff --git a/_pages/de_DE/installing-boot9strap-(fredtool-legacy).txt b/_pages/de_DE/installing-boot9strap-(fredtool-legacy).txt new file mode 100644 index 0000000000..a160b9a714 --- /dev/null +++ b/_pages/de_DE/installing-boot9strap-(fredtool-legacy).txt @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title="Inhalt" %} + +{% capture technical_info %} +Technische Details (optional) + +Um ein DSiWare-Backup erstellen zu können, nutzen wir eine Schwachstelle im DSiWare-Datenverwaltungs-Fenster der Systemeinstellungen aus. + +Um das zu erreichen, werden wir die Verschlüsselung (movable.sed) nutzen, um ein DSiWare-Backup zu erstellen, das das System dazu bringen wird, die DSi Internet Einstellungs-Software zur SD-Karte zu kopieren. + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +### Was du brauchst + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* Die neueste Version von [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (die Luma3DS `.zip` Datei) + +#### Abschnitt I - CFW Check + +{% include_relative include/cfw-check-fredtool.txt %} + +#### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Stecke deine SD-Karte nun wieder in deinen 3DS +1. Schalte deine Konsole an +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically reboot +1. Schalte deine Konsole aus + +#### Section III - Prep Work + +{% include_relative include/fredtool-prep.txt %} + +#### Section IV - Overwriting DS Connection Settings + +{% include_relative include/fredtool-write-flipnote.txt %} + +#### Abschnitt V - Flipnote Exploit + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### Section VI - Luma3DS Configuration + +1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### Section VII - Restoring DS Connection Settings + +{% include_relative include/fredtool-restore-dsconn.txt %} + +___ + + +### Fortfahren mit [Setup fertigstellen](finalizing-setup) +{: .notice--primary} diff --git a/_pages/de_DE/seedminer-(mii).txt b/_pages/de_DE/seedminer-(mii).txt new file mode 100644 index 0000000000..bbc037f47e --- /dev/null +++ b/_pages/de_DE/seedminer-(mii).txt @@ -0,0 +1,84 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title="Inhalt" %} + +{% capture gpu_warning %} +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: ++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) ++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple) ++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) ++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{% endcapture %} +
{{ gpu_warning | markdownify }}
+ +{% capture technical_info %} +Technische Details (optional) + +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### Was du benötigst + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### Section I - Prep Work + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/de_DE/site-navigation.txt b/_pages/de_DE/site-navigation.txt index ddf290fff3..5f5a3c6d6e 100644 --- a/_pages/de_DE/site-navigation.txt +++ b/_pages/de_DE/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [A9LH zu B9S](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) + [Danksagungen](credits) + [Checking for CFW](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [Startseite](/) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) + [Installation von boot9strap (Hardmod)](installing-boot9strap-(hardmod)) + [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [Wechseln der Region](region-changing) + [Restoring / Updating CFW](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (TWN)](seedminer-(twn)) + [Problembehandlung](troubleshooting) + [CFW deinstallieren](uninstall-cfw) diff --git a/_pages/de_DE/updating-firmware-(kor).txt b/_pages/de_DE/updating-firmware-(kor).txt new file mode 100644 index 0000000000..9f9fbdeb19 --- /dev/null +++ b/_pages/de_DE/updating-firmware-(kor).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (KOR)" +--- + +### Lesen erforderlich + +To use the Seedminer exploit, you must update your device to the latest system version. + +### Was du benötigst + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer](seedminer) +{: .notice--primary} diff --git a/_pages/de_DE/updating-firmware-(kor-twn).md b/_pages/de_DE/updating-firmware-(kor-twn).md deleted file mode 100644 index 74a2b48f90..0000000000 --- a/_pages/de_DE/updating-firmware-(kor-twn).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (KOR/TWN)" ---- - -### Required Reading - -To use the Seedminer exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Seedminer](seedminer) -{: .notice--primary} diff --git a/_pages/de_DE/updating-firmware-(new-3ds).txt b/_pages/de_DE/updating-firmware-(new-3ds).txt new file mode 100644 index 0000000000..28f8778001 --- /dev/null +++ b/_pages/de_DE/updating-firmware-(new-3ds).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (New 3DS)" +--- + +### Lesen erforderlich + +To use the super-skaterhax exploit, you must update your device to the latest system version. + +### Was du benötigst + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) +{: .notice--primary} diff --git a/_pages/de_DE/updating-firmware-(twn).txt b/_pages/de_DE/updating-firmware-(twn).txt new file mode 100644 index 0000000000..2e6a0d9c66 --- /dev/null +++ b/_pages/de_DE/updating-firmware-(twn).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (TWN)" +--- + +### Lesen erforderlich + +To use the Seedminer exploit, you must update your device to the latest system version. + +### Was du benötigst + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer (TWN)](seedminer-(twn)) +{: .notice--primary} diff --git a/_pages/el_GR/404.md b/_pages/el_GR/404.txt similarity index 100% rename from _pages/el_GR/404.md rename to _pages/el_GR/404.txt diff --git a/_pages/el_GR/bannerbomb3-(legacy).txt b/_pages/el_GR/bannerbomb3-(legacy).txt new file mode 100644 index 0000000000..857a70632b --- /dev/null +++ b/_pages/el_GR/bannerbomb3-(legacy).txt @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title="Πίνακας περιεχομένων" %} + +{% capture technical_info %} +Technical Details (optional) + +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### Compatibility Notes + +These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. + +### What You Need + +* Your `movable.sed` file from completing Seedminer or nimhax + +#### Section I - Prep Work + +{% include_relative include/bb3-prep.txt %} + +#### Section II - Hardware Button Check + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### Next steps: Choose an exploit + +If the camera appeared in the previous section, Safe Mode is likely to be working on your device. + +If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/el_GR/bannerbomb3.txt b/_pages/el_GR/bannerbomb3.txt index 9acd887467..2a9cad9b39 100644 --- a/_pages/el_GR/bannerbomb3.txt +++ b/_pages/el_GR/bannerbomb3.txt @@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. - -1. Power off your device -1. Εισάγετε την κάρτα SD στον υπολογιστή σας -1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer -1. Upload your movable.sed using the “Choose File” option -1. Click “Build and Download” - + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) -1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it - + This file does not need to be opened or extracted - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.txt %} #### Section II - Hardware Button Check -In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. - -Your SD card should remain in your computer while you perform this check. - {% include_relative include/safemodecheck.txt %} ___ diff --git a/_pages/en_PT/credits.md b/_pages/el_GR/credits.txt similarity index 100% rename from _pages/en_PT/credits.md rename to _pages/el_GR/credits.txt diff --git a/_pages/el_GR/donations.md b/_pages/el_GR/donations.txt similarity index 100% rename from _pages/el_GR/donations.md rename to _pages/el_GR/donations.txt diff --git a/_pages/el_GR/finalizing-setup.txt b/_pages/el_GR/finalizing-setup.txt index cbefafdd6a..065c97fc6a 100644 --- a/_pages/el_GR/finalizing-setup.txt +++ b/_pages/el_GR/finalizing-setup.txt @@ -177,9 +177,6 @@ ___ You're done! Custom firmware is now fully configured on your device. {: .notice--success} -Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! -{: .notice--info} - ### Information and Notes {% capture notice-6 %} diff --git a/_pages/el_GR/homebrew-launcher-(super-skaterhax).txt b/_pages/el_GR/homebrew-launcher-(super-skaterhax).txt index 1c44abfc63..b548d2446e 100644 --- a/_pages/el_GR/homebrew-launcher-(super-skaterhax).txt +++ b/_pages/el_GR/homebrew-launcher-(super-skaterhax).txt @@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up 1. Select the "GO GO!" button on the top screen + If any prompts appear, approve all of them + If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section + + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) 1. If the exploit was successful, your device will have booted into the Homebrew Launcher 1. Power off your device diff --git a/_pages/el_GR/include/bb3-prep.txt b/_pages/el_GR/include/bb3-prep.txt new file mode 100644 index 0000000000..1ffc8f1e76 --- /dev/null +++ b/_pages/el_GR/include/bb3-prep.txt @@ -0,0 +1,23 @@ +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + +1. Power off your device +1. Εισάγετε την κάρτα SD στον υπολογιστή σας +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. Create a folder named `Nintendo DSiWare` inside of the `` + + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/el_GR/include/fredtool-prep.txt b/_pages/el_GR/include/fredtool-prep.txt new file mode 100644 index 0000000000..caca23f27d --- /dev/null +++ b/_pages/el_GR/include/fredtool-prep.txt @@ -0,0 +1,29 @@ +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. + +1. Εισάγετε την κάρτα SD στον υπολογιστή σας +1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer +1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. Click "Build" + + Wait a few seconds for the build process to complete +1. In the Build History section on the left, type the Username into the "Filter Builds" field +1. Click on the first search result + + This result should have the latest timestamp +1. Click the "output_(name).zip" link +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card +1. Reinsert your SD card into your device +1. Power on your device + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/el_GR/include/fredtool-restore-dsconn.txt b/_pages/el_GR/include/fredtool-restore-dsconn.txt new file mode 100644 index 0000000000..3057b3ac9d --- /dev/null +++ b/_pages/el_GR/include/fredtool-restore-dsconn.txt @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title +1. Select "Copy", then select "OK" diff --git a/_pages/el_GR/include/fredtool-write-flipnote.txt b/_pages/el_GR/include/fredtool-write-flipnote.txt new file mode 100644 index 0000000000..cb6f428624 --- /dev/null +++ b/_pages/el_GR/include/fredtool-write-flipnote.txt @@ -0,0 +1,11 @@ +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Select "Copy", then select "OK" +1. Return to main menu of the System Settings +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/el_GR/include/safemodecheck.txt b/_pages/el_GR/include/safemodecheck.txt index 43ebec6575..7035baace8 100644 --- a/_pages/el_GR/include/safemodecheck.txt +++ b/_pages/el_GR/include/safemodecheck.txt @@ -1,3 +1,5 @@ +In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page. + 1. Power on your device 1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time + The camera applet should appear diff --git a/_pages/el_GR/include/seedminer-base.txt b/_pages/el_GR/include/seedminer-base.txt index a4730df700..fd8beb8060 100644 --- a/_pages/el_GR/include/seedminer-base.txt +++ b/_pages/el_GR/include/seedminer-base.txt @@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. +{% capture console_state_info %} Before following this section: + Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data + Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen) -{: .notice--info} +{% endcapture %} +
{{ console_state_info | markdownify }}
1. Power off your device 1. Εισάγετε την κάρτα SD στον υπολογιστή σας diff --git a/_pages/el_GR/installing-boot9strap-(fredtool).txt b/_pages/el_GR/installing-boot9strap-(fredtool).txt index d370acad4b..2d8f638dc8 100644 --- a/_pages/el_GR/installing-boot9strap-(fredtool).txt +++ b/_pages/el_GR/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ### What You Need * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) #### Section I - CFW Check @@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana #### Section III - Prep Work -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Εισάγετε την κάρτα SD στον υπολογιστή σας -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert your SD card into your device -1. Power on your device - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.txt %} #### Section IV - Overwriting DS Connection Settings -In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. - -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Haxxxxxxxxx!" title - + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Select "Copy", then select "OK" -1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) -1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio - + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.txt %} #### Section V - Flipnote Exploit @@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte #### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. - -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Nintendo DSi™" title -1. Select "Copy", then select "OK" +{% include_relative include/fredtool-restore-dsconn.txt %} ___ + ### Continue to [Finalizing Setup](finalizing-setup) {: .notice--primary} diff --git a/_pages/el_GR/installing-boot9strap-(fredtool-legacy).txt b/_pages/el_GR/installing-boot9strap-(fredtool-legacy).txt new file mode 100644 index 0000000000..b4c1c16148 --- /dev/null +++ b/_pages/el_GR/installing-boot9strap-(fredtool-legacy).txt @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title="Πίνακας περιεχομένων" %} + +{% capture technical_info %} +Technical Details (optional) + +To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +### What You Need + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) + +#### Section I - CFW Check + +{% include_relative include/cfw-check-fredtool.txt %} + +#### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically reboot +1. Power off your device + +#### Section III - Prep Work + +{% include_relative include/fredtool-prep.txt %} + +#### Section IV - Overwriting DS Connection Settings + +{% include_relative include/fredtool-write-flipnote.txt %} + +#### Section V - Flipnote Exploit + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### Section VI - Luma3DS Configuration + +1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### Section VII - Restoring DS Connection Settings + +{% include_relative include/fredtool-restore-dsconn.txt %} + +___ + + +### Continue to [Finalizing Setup](finalizing-setup) +{: .notice--primary} diff --git a/_pages/el_GR/seedminer-(mii).txt b/_pages/el_GR/seedminer-(mii).txt new file mode 100644 index 0000000000..47e693ed45 --- /dev/null +++ b/_pages/el_GR/seedminer-(mii).txt @@ -0,0 +1,84 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title="Πίνακας περιεχομένων" %} + +{% capture gpu_warning %} +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: ++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) ++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple) ++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) ++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{% endcapture %} +
{{ gpu_warning | markdownify }}
+ +{% capture technical_info %} +Technical Details (optional) + +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### What you need + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### Section I - Prep Work + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/el_GR/site-navigation.txt b/_pages/el_GR/site-navigation.txt index 658e3c3a7a..7784055039 100644 --- a/_pages/el_GR/site-navigation.txt +++ b/_pages/el_GR/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [A9LH to B9S](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) + [Ευχαριστίες](credits) + [Checking for CFW](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [Home](/) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) + [Installing boot9strap (Hardmod)](installing-boot9strap-(hardmod)) + [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [Αλλαγή Περιοχής](region-changing) + [Restoring / Updating CFW](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (TWN)](seedminer-(twn)) + [Αντιμετώπιση Προβλημάτων](troubleshooting) + [Uninstall CFW](uninstall-cfw) diff --git a/_pages/el_GR/updating-firmware-(kor).txt b/_pages/el_GR/updating-firmware-(kor).txt new file mode 100644 index 0000000000..4b08786c27 --- /dev/null +++ b/_pages/el_GR/updating-firmware-(kor).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (KOR)" +--- + +### Required Reading + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer](seedminer) +{: .notice--primary} diff --git a/_pages/el_GR/updating-firmware-(kor-twn).md b/_pages/el_GR/updating-firmware-(kor-twn).md deleted file mode 100644 index 74a2b48f90..0000000000 --- a/_pages/el_GR/updating-firmware-(kor-twn).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (KOR/TWN)" ---- - -### Required Reading - -To use the Seedminer exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Seedminer](seedminer) -{: .notice--primary} diff --git a/_pages/de_DE/updating-firmware-(new-3ds).md b/_pages/el_GR/updating-firmware-(new-3ds).txt similarity index 100% rename from _pages/de_DE/updating-firmware-(new-3ds).md rename to _pages/el_GR/updating-firmware-(new-3ds).txt diff --git a/_pages/el_GR/updating-firmware-(twn).txt b/_pages/el_GR/updating-firmware-(twn).txt new file mode 100644 index 0000000000..83e6992b1b --- /dev/null +++ b/_pages/el_GR/updating-firmware-(twn).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (TWN)" +--- + +### Required Reading + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer (TWN)](seedminer-(twn)) +{: .notice--primary} diff --git a/_pages/en_PT/404.md b/_pages/en_PT/404.txt similarity index 100% rename from _pages/en_PT/404.md rename to _pages/en_PT/404.txt diff --git a/_pages/en_PT/bannerbomb3-(legacy).txt b/_pages/en_PT/bannerbomb3-(legacy).txt new file mode 100644 index 0000000000..503794c42a --- /dev/null +++ b/_pages/en_PT/bannerbomb3-(legacy).txt @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title="Table of Contents" %} + +{% capture technical_info %} +Technical Details (optional) + +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### Compatibility Notes + +These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. + +### What You Need + +* Your `movable.sed` file from completing Seedminer or nimhax + +#### Section I - Prep Work + +{% include_relative include/bb3-prep.txt %} + +#### Section II - Hardware Button Check + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### Next steps: Choose an exploit + +If the camera appeared in the previous section, Safe Mode is likely to be working on your device. + +If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/en_PT/bannerbomb3.txt b/_pages/en_PT/bannerbomb3.txt index 1dab8a9825..a8383926fd 100644 --- a/_pages/en_PT/bannerbomb3.txt +++ b/_pages/en_PT/bannerbomb3.txt @@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. - -1. Power off ye device -1. Insert ye SD card into ye computer -1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer -1. Upload your movable.sed using the “Choose File” option -1. Click “Build and Download” - + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) -1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it - + This file does not need to be opened or extracted - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.txt %} #### Section II - Hardware Button Check -In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. - -Your SD card should remain in your computer while you perform this check. - {% include_relative include/safemodecheck.txt %} ___ diff --git a/_pages/fi_FI/credits.md b/_pages/en_PT/credits.txt similarity index 100% rename from _pages/fi_FI/credits.md rename to _pages/en_PT/credits.txt diff --git a/_pages/en_PT/donations.md b/_pages/en_PT/donations.txt similarity index 100% rename from _pages/en_PT/donations.md rename to _pages/en_PT/donations.txt diff --git a/_pages/en_PT/finalizing-setup.txt b/_pages/en_PT/finalizing-setup.txt index b365ff52b6..ffead17f02 100644 --- a/_pages/en_PT/finalizing-setup.txt +++ b/_pages/en_PT/finalizing-setup.txt @@ -177,9 +177,6 @@ ___ You're done! Custom firmware is now fully configured on your device. {: .notice--success} -Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! -{: .notice--info} - ### Information and Notes {% capture notice-6 %} diff --git a/_pages/en_PT/homebrew-launcher-(super-skaterhax).txt b/_pages/en_PT/homebrew-launcher-(super-skaterhax).txt index 77bf5c0f8f..c76c55cf7c 100644 --- a/_pages/en_PT/homebrew-launcher-(super-skaterhax).txt +++ b/_pages/en_PT/homebrew-launcher-(super-skaterhax).txt @@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up 1. Select the "GO GO!" button on the top screen + If any prompts appear, approve all of them + If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section + + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) 1. If the exploit was successful, your device will have booted into the Homebrew Launcher 1. Power off ye device diff --git a/_pages/en_PT/include/bb3-prep.txt b/_pages/en_PT/include/bb3-prep.txt new file mode 100644 index 0000000000..2957080e6e --- /dev/null +++ b/_pages/en_PT/include/bb3-prep.txt @@ -0,0 +1,23 @@ +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + +1. Power off ye device +1. Insert ye SD card into ye computer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. Create a folder named `Nintendo DSiWare` inside of the `` + + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/en_PT/include/fredtool-prep.txt b/_pages/en_PT/include/fredtool-prep.txt new file mode 100644 index 0000000000..245ac40a9a --- /dev/null +++ b/_pages/en_PT/include/fredtool-prep.txt @@ -0,0 +1,29 @@ +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. + +1. Insert ye SD card into ye computer +1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer +1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. Click "Build" + + Wait a few seconds for the build process to complete +1. In the Build History section on the left, type the Username into the "Filter Builds" field +1. Click on the first search result + + This result should have the latest timestamp +1. Click the "output_(name).zip" link +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card +1. Reinsert ye SD card into ye device +1. Power on your device + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/en_PT/include/fredtool-restore-dsconn.txt b/_pages/en_PT/include/fredtool-restore-dsconn.txt new file mode 100644 index 0000000000..33392efb4d --- /dev/null +++ b/_pages/en_PT/include/fredtool-restore-dsconn.txt @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. Reinsert ye SD card into ye device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title +1. Select "Copy", then select "OK" diff --git a/_pages/en_PT/include/fredtool-write-flipnote.txt b/_pages/en_PT/include/fredtool-write-flipnote.txt new file mode 100644 index 0000000000..cb6f428624 --- /dev/null +++ b/_pages/en_PT/include/fredtool-write-flipnote.txt @@ -0,0 +1,11 @@ +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Select "Copy", then select "OK" +1. Return to main menu of the System Settings +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/en_PT/include/safemodecheck.txt b/_pages/en_PT/include/safemodecheck.txt index cc5e12d9ac..286dbf27b0 100644 --- a/_pages/en_PT/include/safemodecheck.txt +++ b/_pages/en_PT/include/safemodecheck.txt @@ -1,3 +1,5 @@ +In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page. + 1. Power on your device 1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time + The camera applet should appear diff --git a/_pages/en_PT/include/seedminer-base.txt b/_pages/en_PT/include/seedminer-base.txt index 5225e89c8b..6886f5c9f4 100644 --- a/_pages/en_PT/include/seedminer-base.txt +++ b/_pages/en_PT/include/seedminer-base.txt @@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. +{% capture console_state_info %} Before following this section: + Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data + Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen) -{: .notice--info} +{% endcapture %} +
{{ console_state_info | markdownify }}
1. Power off ye device 1. Insert ye SD card into ye computer diff --git a/_pages/en_PT/installing-boot9strap-(fredtool).txt b/_pages/en_PT/installing-boot9strap-(fredtool).txt index a292553a8c..15c210e5f8 100644 --- a/_pages/en_PT/installing-boot9strap-(fredtool).txt +++ b/_pages/en_PT/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ### What You Need * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) #### Section I - CFW Check @@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana #### Section III - Prep Work -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Insert ye SD card into ye computer -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert ye SD card into ye device -1. Power on your device - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.txt %} #### Section IV - Overwriting DS Connection Settings -In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. - -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Haxxxxxxxxx!" title - + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Select "Copy", then select "OK" -1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) -1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio - + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.txt %} #### Section V - Flipnote Exploit @@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte #### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. - -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one -1. Reinsert ye SD card into ye device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Nintendo DSi™" title -1. Select "Copy", then select "OK" +{% include_relative include/fredtool-restore-dsconn.txt %} ___ + ### Continue to [Finalizing Setup](finalizing-setup) {: .notice--primary} diff --git a/_pages/en_PT/installing-boot9strap-(fredtool-legacy).txt b/_pages/en_PT/installing-boot9strap-(fredtool-legacy).txt new file mode 100644 index 0000000000..a9cc332cba --- /dev/null +++ b/_pages/en_PT/installing-boot9strap-(fredtool-legacy).txt @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title="Table of Contents" %} + +{% capture technical_info %} +Technical Details (optional) + +To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +### What You Need + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) + +#### Section I - CFW Check + +{% include_relative include/cfw-check-fredtool.txt %} + +#### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reinsert ye SD card into ye device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically reboot +1. Power off ye device + +#### Section III - Prep Work + +{% include_relative include/fredtool-prep.txt %} + +#### Section IV - Overwriting DS Connection Settings + +{% include_relative include/fredtool-write-flipnote.txt %} + +#### Section V - Flipnote Exploit + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### Section VI - Luma3DS Configuration + +1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### Section VII - Restoring DS Connection Settings + +{% include_relative include/fredtool-restore-dsconn.txt %} + +___ + + +### Continue to [Finalizing Setup](finalizing-setup) +{: .notice--primary} diff --git a/_pages/en_PT/seedminer-(mii).txt b/_pages/en_PT/seedminer-(mii).txt new file mode 100644 index 0000000000..5faf224c22 --- /dev/null +++ b/_pages/en_PT/seedminer-(mii).txt @@ -0,0 +1,84 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title="Table of Contents" %} + +{% capture gpu_warning %} +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: ++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) ++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple) ++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) ++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{% endcapture %} +
{{ gpu_warning | markdownify }}
+ +{% capture technical_info %} +Technical Details (optional) + +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### What you need + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### Section I - Prep Work + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/en_PT/site-navigation.txt b/_pages/en_PT/site-navigation.txt index f4455a209f..e0d200e7e4 100644 --- a/_pages/en_PT/site-navigation.txt +++ b/_pages/en_PT/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [A9LH to B9S](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) + [Credits](credits) + [Checking for CFW](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [Home](/en_PT/) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) + [Installin' boot9strap (Hardmod)](installing-boot9strap-(hardmod)) + [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [Region Changin'](region-changing) + [Restoring / Updating CFW](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (TWN)](seedminer-(twn)) + [Troubleshootin'](troubleshooting) + [Uninstall CFW](uninstall-cfw) diff --git a/_pages/en_PT/updating-firmware-(kor).txt b/_pages/en_PT/updating-firmware-(kor).txt new file mode 100644 index 0000000000..4b08786c27 --- /dev/null +++ b/_pages/en_PT/updating-firmware-(kor).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (KOR)" +--- + +### Required Reading + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer](seedminer) +{: .notice--primary} diff --git a/_pages/en_PT/updating-firmware-(kor-twn).md b/_pages/en_PT/updating-firmware-(kor-twn).md deleted file mode 100644 index 74a2b48f90..0000000000 --- a/_pages/en_PT/updating-firmware-(kor-twn).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (KOR/TWN)" ---- - -### Required Reading - -To use the Seedminer exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Seedminer](seedminer) -{: .notice--primary} diff --git a/_pages/el_GR/updating-firmware-(new-3ds).md b/_pages/en_PT/updating-firmware-(new-3ds).txt similarity index 100% rename from _pages/el_GR/updating-firmware-(new-3ds).md rename to _pages/en_PT/updating-firmware-(new-3ds).txt diff --git a/_pages/en_PT/updating-firmware-(twn).txt b/_pages/en_PT/updating-firmware-(twn).txt new file mode 100644 index 0000000000..83e6992b1b --- /dev/null +++ b/_pages/en_PT/updating-firmware-(twn).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (TWN)" +--- + +### Required Reading + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer (TWN)](seedminer-(twn)) +{: .notice--primary} diff --git a/_pages/es_ES/404.md b/_pages/es_ES/404.txt similarity index 100% rename from _pages/es_ES/404.md rename to _pages/es_ES/404.txt diff --git a/_pages/es_ES/bannerbomb3-(legacy).txt b/_pages/es_ES/bannerbomb3-(legacy).txt new file mode 100644 index 0000000000..ef6369c87e --- /dev/null +++ b/_pages/es_ES/bannerbomb3-(legacy).txt @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title="Tabla de contenidos" %} + +{% capture technical_info %} +Technical Details (optional) + +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### Compatibility Notes + +Estas instrucciones funcionan en consolas de las regiones USA, Europa, Japón y Corea, indicado por las letras U, E, J o K después de la versión del sistema. + +### Qué necesitas + +* Your `movable.sed` file from completing Seedminer or nimhax + +#### Sección I - Preparativos + +{% include_relative include/bb3-prep.txt %} + +#### Section II - Hardware Button Check + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### Next steps: Choose an exploit + +If the camera appeared in the previous section, Safe Mode is likely to be working on your device. + +If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/es_ES/bannerbomb3.txt b/_pages/es_ES/bannerbomb3.txt index 6c8f364199..d96abdf2e6 100644 --- a/_pages/es_ES/bannerbomb3.txt +++ b/_pages/es_ES/bannerbomb3.txt @@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol #### Sección I - Preparativos -In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. - -1. Apaga tu consola -1. Inserta tu tarjeta SD en tu computadora -1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer -1. Upload your movable.sed using the “Choose File” option -1. Click “Build and Download” - + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) -1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card - + La raíz de tu tarjeta SD se refiere al primer directorio de la tarjeta, donde puedes ver la carpeta Nintendo 3DS pero no estás dentro de ella - + This file does not need to be opened or extracted - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.txt %} #### Section II - Hardware Button Check -In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. - -Your SD card should remain in your computer while you perform this check. - {% include_relative include/safemodecheck.txt %} ___ diff --git a/_pages/he_IL/credits.md b/_pages/es_ES/credits.txt similarity index 100% rename from _pages/he_IL/credits.md rename to _pages/es_ES/credits.txt diff --git a/_pages/es_ES/donations.md b/_pages/es_ES/donations.txt similarity index 100% rename from _pages/es_ES/donations.md rename to _pages/es_ES/donations.txt diff --git a/_pages/es_ES/finalizing-setup.txt b/_pages/es_ES/finalizing-setup.txt index 0889d41ad9..25abbacd50 100644 --- a/_pages/es_ES/finalizing-setup.txt +++ b/_pages/es_ES/finalizing-setup.txt @@ -177,9 +177,6 @@ ___ You're done! Custom firmware is now fully configured on your device. {: .notice--success} -Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! -{: .notice--info} - ### Information and Notes {% capture notice-6 %} diff --git a/_pages/es_ES/homebrew-launcher-(super-skaterhax).txt b/_pages/es_ES/homebrew-launcher-(super-skaterhax).txt index 736a8878c6..12665ec29c 100644 --- a/_pages/es_ES/homebrew-launcher-(super-skaterhax).txt +++ b/_pages/es_ES/homebrew-launcher-(super-skaterhax).txt @@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up 1. Select the "GO GO!" button on the top screen + If any prompts appear, approve all of them + If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section + + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) 1. If the exploit was successful, your device will have booted into the Homebrew Launcher 1. Apaga tu consola diff --git a/_pages/es_ES/include/bb3-prep.txt b/_pages/es_ES/include/bb3-prep.txt new file mode 100644 index 0000000000..0366318d47 --- /dev/null +++ b/_pages/es_ES/include/bb3-prep.txt @@ -0,0 +1,23 @@ +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + +1. Apaga tu consola +1. Inserta tu tarjeta SD en tu computadora +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + La raíz de tu tarjeta SD se refiere al primer directorio de la tarjeta, donde puedes ver la carpeta Nintendo 3DS pero no estás dentro de ella + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. Create a folder named `Nintendo DSiWare` inside of the `` + + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/es_ES/include/fredtool-prep.txt b/_pages/es_ES/include/fredtool-prep.txt new file mode 100644 index 0000000000..de8e8ed913 --- /dev/null +++ b/_pages/es_ES/include/fredtool-prep.txt @@ -0,0 +1,29 @@ +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. + +1. Inserta tu tarjeta SD en tu computadora +1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer +1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. Click "Build" + + Wait a few seconds for the build process to complete +1. In the Build History section on the left, type the Username into the "Filter Builds" field +1. Click on the first search result + + This result should have the latest timestamp +1. Click the "output_(name).zip" link +1. Ve a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` en tu tarjeta SD + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copia los archivos `boot.firm` y `boot.3dsx` desde el `.zip` de Luma3DS a la raíz de tu tarjeta SD + + La raíz de tu tarjeta SD se refiere al primer directorio de la tarjeta, donde puedes ver la carpeta Nintendo 3DS pero no estás dentro de ella +1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card +1. Copia la carpeta `private` contenida en el `.zip` de Frogminer_save a la raíz de tu tarjeta SD +1. Reinserta tu tarjeta SD en tu consola +1. Enciende tu consola + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/es_ES/include/fredtool-restore-dsconn.txt b/_pages/es_ES/include/fredtool-restore-dsconn.txt new file mode 100644 index 0000000000..0d0c48b51f --- /dev/null +++ b/_pages/es_ES/include/fredtool-restore-dsconn.txt @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. Ve a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` en tu tarjeta SD +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. Reinserta tu tarjeta SD en tu consola +1. Enciende tu consola +1. Entra a Configuración de la consola +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title +1. Selecciona "Copiar", luego "OK" diff --git a/_pages/es_ES/include/fredtool-write-flipnote.txt b/_pages/es_ES/include/fredtool-write-flipnote.txt new file mode 100644 index 0000000000..66cd21d537 --- /dev/null +++ b/_pages/es_ES/include/fredtool-write-flipnote.txt @@ -0,0 +1,11 @@ +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + +1. Entra a Configuración de la consola +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Selecciona "Copiar", luego "OK" +1. Regresa al menú principal de Configuración de la Consola +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. Si el exploit fue exitoso, tu consola habrá cargado la versión japonesa de Flipnote Studio + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/es_ES/include/safemodecheck.txt b/_pages/es_ES/include/safemodecheck.txt index 06587fc0db..31b51edb32 100644 --- a/_pages/es_ES/include/safemodecheck.txt +++ b/_pages/es_ES/include/safemodecheck.txt @@ -1,3 +1,5 @@ +In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page. + 1. Enciende tu consola 1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time + The camera applet should appear diff --git a/_pages/es_ES/include/seedminer-base.txt b/_pages/es_ES/include/seedminer-base.txt index a7ec09e560..9f3cc406a8 100644 --- a/_pages/es_ES/include/seedminer-base.txt +++ b/_pages/es_ES/include/seedminer-base.txt @@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. +{% capture console_state_info %} Before following this section: + Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data + Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen) -{: .notice--info} +{% endcapture %} +
{{ console_state_info | markdownify }}
1. Apaga tu consola 1. Inserta tu tarjeta SD en tu computadora diff --git a/_pages/es_ES/installing-boot9strap-(fredtool).txt b/_pages/es_ES/installing-boot9strap-(fredtool).txt index 111141aa8c..e9a93d5b92 100644 --- a/_pages/es_ES/installing-boot9strap-(fredtool).txt +++ b/_pages/es_ES/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ### Qué necesitas * Tu archivo `movable.sed` proveniente de haber completado [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) #### Sección I - Verificación de CFW @@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana #### Section III - Prep Work -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Inserta tu tarjeta SD en tu computadora -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Ve a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` en tu tarjeta SD - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copia los archivos `boot.firm` y `boot.3dsx` desde el `.zip` de Luma3DS a la raíz de tu tarjeta SD - + La raíz de tu tarjeta SD se refiere al primer directorio de la tarjeta, donde puedes ver la carpeta Nintendo 3DS pero no estás dentro de ella -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copia la carpeta `private` contenida en el `.zip` de Frogminer_save a la raíz de tu tarjeta SD -1. Reinserta tu tarjeta SD en tu consola -1. Enciende tu consola - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.txt %} #### Section IV - Overwriting DS Connection Settings -In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. - -1. Entra a Configuración de la consola -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Haxxxxxxxxx!" title - + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Selecciona "Copiar", luego "OK" -1. Regresa al menú principal de Configuración de la Consola -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) -1. Si el exploit fue exitoso, tu consola habrá cargado la versión japonesa de Flipnote Studio - + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.txt %} #### Section V - Flipnote Exploit @@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte #### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. - -1. Ve a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` en tu tarjeta SD -1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one -1. Reinserta tu tarjeta SD en tu consola -1. Enciende tu consola -1. Entra a Configuración de la consola -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Nintendo DSi™" title -1. Selecciona "Copiar", luego "OK" +{% include_relative include/fredtool-restore-dsconn.txt %} ___ + ### Continúa en [Finalizar instalación](finalizing-setup) {: .notice--primary} diff --git a/_pages/es_ES/installing-boot9strap-(fredtool-legacy).txt b/_pages/es_ES/installing-boot9strap-(fredtool-legacy).txt new file mode 100644 index 0000000000..bbffaaf9a9 --- /dev/null +++ b/_pages/es_ES/installing-boot9strap-(fredtool-legacy).txt @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title="Tabla de contenidos" %} + +{% capture technical_info %} +Technical Details (optional) + +Para volcar una aplicación DSiWare del sistema, aprovecharemos un fallo en la ventana de Gestión de datos DSiWare de la aplicación Configuración. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +### Qué necesitas + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) + +#### Sección I - Verificación de CFW + +{% include_relative include/cfw-check-fredtool.txt %} + +#### Sección II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reinserta tu tarjeta SD en tu consola +1. Enciende tu consola +1. Entra a Configuración de la consola +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically reboot +1. Apaga tu consola + +#### Section III - Prep Work + +{% include_relative include/fredtool-prep.txt %} + +#### Section IV - Overwriting DS Connection Settings + +{% include_relative include/fredtool-write-flipnote.txt %} + +#### Section V - Flipnote Exploit + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### Section VI - Luma3DS Configuration + +1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### Section VII - Restoring DS Connection Settings + +{% include_relative include/fredtool-restore-dsconn.txt %} + +___ + + +### Continúa en [Finalizar instalación](finalizing-setup) +{: .notice--primary} diff --git a/_pages/es_ES/seedminer-(mii).txt b/_pages/es_ES/seedminer-(mii).txt new file mode 100644 index 0000000000..fa5e776e41 --- /dev/null +++ b/_pages/es_ES/seedminer-(mii).txt @@ -0,0 +1,84 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title="Tabla de contenidos" %} + +{% capture gpu_warning %} +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: ++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) ++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple) ++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) ++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{% endcapture %} +
{{ gpu_warning | markdownify }}
+ +{% capture technical_info %} +Technical Details (optional) + +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### What you need + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### Section I - Prep Work + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/es_ES/site-navigation.txt b/_pages/es_ES/site-navigation.txt index 7a4ca8f3cb..95a8e213cb 100644 --- a/_pages/es_ES/site-navigation.txt +++ b/_pages/es_ES/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [A9LH a B9S](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) + [Créditos](credits) + [Comprobar CFW](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [Inicio](/) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [Instalar boot9strap (Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) + [Instalar boot9strap (Hardmod)](installing-boot9strap-(hardmod)) + [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [Cambio de Región](region-changing) + [Restaurar / Actualizar CFW](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (TWN)](seedminer-(twn)) + [Solución de Problemas](troubleshooting) + [Desinstalar CFW](uninstall-cfw) diff --git a/_pages/es_ES/updating-firmware-(kor).txt b/_pages/es_ES/updating-firmware-(kor).txt new file mode 100644 index 0000000000..a9532f8d53 --- /dev/null +++ b/_pages/es_ES/updating-firmware-(kor).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (KOR)" +--- + +### Lectura requerida + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer](seedminer) +{: .notice--primary} diff --git a/_pages/es_ES/updating-firmware-(kor-twn).md b/_pages/es_ES/updating-firmware-(kor-twn).md deleted file mode 100644 index 74a2b48f90..0000000000 --- a/_pages/es_ES/updating-firmware-(kor-twn).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (KOR/TWN)" ---- - -### Required Reading - -To use the Seedminer exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Seedminer](seedminer) -{: .notice--primary} diff --git a/_pages/ko_KR/updating-firmware-(new-3ds).md b/_pages/es_ES/updating-firmware-(new-3ds).txt similarity index 94% rename from _pages/ko_KR/updating-firmware-(new-3ds).md rename to _pages/es_ES/updating-firmware-(new-3ds).txt index 5366fdd3b9..b75ee26f64 100644 --- a/_pages/ko_KR/updating-firmware-(new-3ds).md +++ b/_pages/es_ES/updating-firmware-(new-3ds).txt @@ -2,7 +2,7 @@ title: "Updating Firmware (New 3DS)" --- -### Required Reading +### Lectura requerida To use the super-skaterhax exploit, you must update your device to the latest system version. diff --git a/_pages/es_ES/updating-firmware-(twn).txt b/_pages/es_ES/updating-firmware-(twn).txt new file mode 100644 index 0000000000..ab0039e762 --- /dev/null +++ b/_pages/es_ES/updating-firmware-(twn).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (TWN)" +--- + +### Lectura requerida + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer (TWN)](seedminer-(twn)) +{: .notice--primary} diff --git a/_pages/fi_FI/404.md b/_pages/fi_FI/404.txt similarity index 100% rename from _pages/fi_FI/404.md rename to _pages/fi_FI/404.txt diff --git a/_pages/fi_FI/bannerbomb3-(legacy).txt b/_pages/fi_FI/bannerbomb3-(legacy).txt new file mode 100644 index 0000000000..0635211689 --- /dev/null +++ b/_pages/fi_FI/bannerbomb3-(legacy).txt @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title="Sisällysluettelo" %} + +{% capture technical_info %} +Technical Details (optional) + +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### Compatibility Notes + +These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. + +### Tarpeet + +* Your `movable.sed` file from completing Seedminer or nimhax + +#### Vaihe I – Valmistelut + +{% include_relative include/bb3-prep.txt %} + +#### Section II - Hardware Button Check + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### Next steps: Choose an exploit + +If the camera appeared in the previous section, Safe Mode is likely to be working on your device. + +If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/fi_FI/bannerbomb3.txt b/_pages/fi_FI/bannerbomb3.txt index 49dbdccd14..4822d8fa58 100644 --- a/_pages/fi_FI/bannerbomb3.txt +++ b/_pages/fi_FI/bannerbomb3.txt @@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol #### Vaihe I – Valmistelut -In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. - -1. Sammuta konsolisi -1. Aseta SD-korttisi tietokoneeseesi -1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer -1. Upload your movable.sed using the “Choose File” option -1. Click “Build and Download” - + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) -1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it - + This file does not need to be opened or extracted - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.txt %} #### Section II - Hardware Button Check -In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. - -Your SD card should remain in your computer while you perform this check. - {% include_relative include/safemodecheck.txt %} ___ diff --git a/_pages/hr_HR/credits.md b/_pages/fi_FI/credits.txt similarity index 100% rename from _pages/hr_HR/credits.md rename to _pages/fi_FI/credits.txt diff --git a/_pages/fi_FI/donations.md b/_pages/fi_FI/donations.txt similarity index 100% rename from _pages/fi_FI/donations.md rename to _pages/fi_FI/donations.txt diff --git a/_pages/fi_FI/finalizing-setup.txt b/_pages/fi_FI/finalizing-setup.txt index 2544e41733..3f6f086bd1 100644 --- a/_pages/fi_FI/finalizing-setup.txt +++ b/_pages/fi_FI/finalizing-setup.txt @@ -177,9 +177,6 @@ ___ You're done! Custom firmware is now fully configured on your device. {: .notice--success} -Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! -{: .notice--info} - ### Information and Notes {% capture notice-6 %} diff --git a/_pages/fi_FI/homebrew-launcher-(super-skaterhax).txt b/_pages/fi_FI/homebrew-launcher-(super-skaterhax).txt index f03642d171..aefceb1c00 100644 --- a/_pages/fi_FI/homebrew-launcher-(super-skaterhax).txt +++ b/_pages/fi_FI/homebrew-launcher-(super-skaterhax).txt @@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up 1. Select the "GO GO!" button on the top screen + If any prompts appear, approve all of them + If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section + + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) 1. If the exploit was successful, your device will have booted into the Homebrew Launcher 1. Sammuta konsolisi diff --git a/_pages/fi_FI/include/bb3-prep.txt b/_pages/fi_FI/include/bb3-prep.txt new file mode 100644 index 0000000000..8093d4aad9 --- /dev/null +++ b/_pages/fi_FI/include/bb3-prep.txt @@ -0,0 +1,23 @@ +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + +1. Sammuta konsolisi +1. Aseta SD-korttisi tietokoneeseesi +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. Create a folder named `Nintendo DSiWare` inside of the `` + + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/fi_FI/include/fredtool-prep.txt b/_pages/fi_FI/include/fredtool-prep.txt new file mode 100644 index 0000000000..d0787739d1 --- /dev/null +++ b/_pages/fi_FI/include/fredtool-prep.txt @@ -0,0 +1,29 @@ +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. + +1. Aseta SD-korttisi tietokoneeseesi +1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer +1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. Click "Build" + + Wait a few seconds for the build process to complete +1. In the Build History section on the left, type the Username into the "Filter Builds" field +1. Click on the first search result + + This result should have the latest timestamp +1. Click the "output_(name).zip" link +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card +1. Aseta SD-korttisi takaisin konsoliisi +1. Käynnistä konsolisi + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/fi_FI/include/fredtool-restore-dsconn.txt b/_pages/fi_FI/include/fredtool-restore-dsconn.txt new file mode 100644 index 0000000000..774851a6d6 --- /dev/null +++ b/_pages/fi_FI/include/fredtool-restore-dsconn.txt @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. Aseta SD-korttisi takaisin konsoliisi +1. Käynnistä konsolisi +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title +1. Select "Copy", then select "OK" diff --git a/_pages/fi_FI/include/fredtool-write-flipnote.txt b/_pages/fi_FI/include/fredtool-write-flipnote.txt new file mode 100644 index 0000000000..cb6f428624 --- /dev/null +++ b/_pages/fi_FI/include/fredtool-write-flipnote.txt @@ -0,0 +1,11 @@ +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Select "Copy", then select "OK" +1. Return to main menu of the System Settings +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/fi_FI/include/safemodecheck.txt b/_pages/fi_FI/include/safemodecheck.txt index 52dc179d45..e379451f50 100644 --- a/_pages/fi_FI/include/safemodecheck.txt +++ b/_pages/fi_FI/include/safemodecheck.txt @@ -1,3 +1,5 @@ +In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page. + 1. Käynnistä konsolisi 1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time + The camera applet should appear diff --git a/_pages/fi_FI/include/seedminer-base.txt b/_pages/fi_FI/include/seedminer-base.txt index 831e95d51f..de1283f414 100644 --- a/_pages/fi_FI/include/seedminer-base.txt +++ b/_pages/fi_FI/include/seedminer-base.txt @@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. +{% capture console_state_info %} Before following this section: + Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data + Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen) -{: .notice--info} +{% endcapture %} +
{{ console_state_info | markdownify }}
1. Sammuta konsolisi 1. Aseta SD-korttisi tietokoneeseesi diff --git a/_pages/fi_FI/installing-boot9strap-(fredtool).txt b/_pages/fi_FI/installing-boot9strap-(fredtool).txt index 3284576b58..7e6b1b9ce4 100644 --- a/_pages/fi_FI/installing-boot9strap-(fredtool).txt +++ b/_pages/fi_FI/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ### Tarpeet * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) #### Section I - CFW Check @@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana #### Section III - Prep Work -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Aseta SD-korttisi tietokoneeseesi -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Aseta SD-korttisi takaisin konsoliisi -1. Käynnistä konsolisi - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.txt %} #### Section IV - Overwriting DS Connection Settings -In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. - -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Haxxxxxxxxx!" title - + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Select "Copy", then select "OK" -1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) -1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio - + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.txt %} #### Section V - Flipnote Exploit @@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte #### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. - -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one -1. Aseta SD-korttisi takaisin konsoliisi -1. Käynnistä konsolisi -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Nintendo DSi™" title -1. Select "Copy", then select "OK" +{% include_relative include/fredtool-restore-dsconn.txt %} ___ + ### Jatka osioon [Asennuksen viimeistely](finalizing-setup) {: .notice--primary} diff --git a/_pages/fi_FI/installing-boot9strap-(fredtool-legacy).txt b/_pages/fi_FI/installing-boot9strap-(fredtool-legacy).txt new file mode 100644 index 0000000000..33a0017161 --- /dev/null +++ b/_pages/fi_FI/installing-boot9strap-(fredtool-legacy).txt @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title="Sisällysluettelo" %} + +{% capture technical_info %} +Technical Details (optional) + +To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +### Tarpeet + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) + +#### Section I - CFW Check + +{% include_relative include/cfw-check-fredtool.txt %} + +#### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Aseta SD-korttisi takaisin konsoliisi +1. Käynnistä konsolisi +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically reboot +1. Sammuta konsolisi + +#### Section III - Prep Work + +{% include_relative include/fredtool-prep.txt %} + +#### Section IV - Overwriting DS Connection Settings + +{% include_relative include/fredtool-write-flipnote.txt %} + +#### Section V - Flipnote Exploit + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### Section VI - Luma3DS Configuration + +1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### Section VII - Restoring DS Connection Settings + +{% include_relative include/fredtool-restore-dsconn.txt %} + +___ + + +### Jatka osioon [Asennuksen viimeistely](finalizing-setup) +{: .notice--primary} diff --git a/_pages/fi_FI/seedminer-(mii).txt b/_pages/fi_FI/seedminer-(mii).txt new file mode 100644 index 0000000000..baa6f9c70d --- /dev/null +++ b/_pages/fi_FI/seedminer-(mii).txt @@ -0,0 +1,84 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title="Sisällysluettelo" %} + +{% capture gpu_warning %} +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: ++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) ++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple) ++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) ++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{% endcapture %} +
{{ gpu_warning | markdownify }}
+ +{% capture technical_info %} +Technical Details (optional) + +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### What you need + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### Section I - Prep Work + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/fi_FI/site-navigation.txt b/_pages/fi_FI/site-navigation.txt index b014b9c180..1af628c3ab 100644 --- a/_pages/fi_FI/site-navigation.txt +++ b/_pages/fi_FI/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [A9LH → B9S](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) + [Kiitokset](credits) + [Checking for CFW](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [Etusivu](/) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) + [Boot9strapin asentaminen (laitteistomodaus)](installing-boot9strap-(hardmod)) + [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [Alueen vaihtaminen](region-changing) + [Restoring / Updating CFW](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (TWN)](seedminer-(twn)) + [Vianmääritys](troubleshooting) + [CFW:n poistaminen](uninstall-cfw) diff --git a/_pages/fi_FI/updating-firmware-(kor).txt b/_pages/fi_FI/updating-firmware-(kor).txt new file mode 100644 index 0000000000..2dcf2e2109 --- /dev/null +++ b/_pages/fi_FI/updating-firmware-(kor).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (KOR)" +--- + +### Tärkeää tietoa + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer](seedminer) +{: .notice--primary} diff --git a/_pages/fi_FI/updating-firmware-(kor-twn).md b/_pages/fi_FI/updating-firmware-(kor-twn).md deleted file mode 100644 index 74a2b48f90..0000000000 --- a/_pages/fi_FI/updating-firmware-(kor-twn).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (KOR/TWN)" ---- - -### Required Reading - -To use the Seedminer exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Seedminer](seedminer) -{: .notice--primary} diff --git a/_pages/ms_MY/updating-firmware-(new-3ds).md b/_pages/fi_FI/updating-firmware-(new-3ds).txt similarity index 94% rename from _pages/ms_MY/updating-firmware-(new-3ds).md rename to _pages/fi_FI/updating-firmware-(new-3ds).txt index 5366fdd3b9..7e89249d24 100644 --- a/_pages/ms_MY/updating-firmware-(new-3ds).md +++ b/_pages/fi_FI/updating-firmware-(new-3ds).txt @@ -2,7 +2,7 @@ title: "Updating Firmware (New 3DS)" --- -### Required Reading +### Tärkeää tietoa To use the super-skaterhax exploit, you must update your device to the latest system version. diff --git a/_pages/fi_FI/updating-firmware-(twn).txt b/_pages/fi_FI/updating-firmware-(twn).txt new file mode 100644 index 0000000000..2375c9cf94 --- /dev/null +++ b/_pages/fi_FI/updating-firmware-(twn).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (TWN)" +--- + +### Tärkeää tietoa + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer (TWN)](seedminer-(twn)) +{: .notice--primary} diff --git a/_pages/fr_FR/404.md b/_pages/fr_FR/404.txt similarity index 100% rename from _pages/fr_FR/404.md rename to _pages/fr_FR/404.txt diff --git a/_pages/fr_FR/bannerbomb3-(legacy).txt b/_pages/fr_FR/bannerbomb3-(legacy).txt new file mode 100644 index 0000000000..6eeda4b185 --- /dev/null +++ b/_pages/fr_FR/bannerbomb3-(legacy).txt @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title="Table des matières" %} + +{% capture technical_info %} +Détails techniques (facultatif) + +Pour lancer du code personnalisé, nous exploitons une faille dans la fenêtre de Gestion des Nintendo DSiWare de l'application Paramètres de la console. + +Pour ce faire, nous utilisons la clé de chiffrement de votre console (movable.sed) pour créer une sauvegarde DSiWare qui exploite le système. + +Pour une explication plus technique, consultez [cette page](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### Notes de compatibilité + +Ces instructions fonctionnent sur les consoles des régions USA, Europe, Japon et Corée, comme indiqué par les lettres U, E, J ou K après la version du logiciel système de la console. + +## Ce dont vous avez besoin + +* Votre fichier `movable.sed` obetnu grâce à Seedminer ou nimhax + +#### Section I - Préparatifs + +{% include_relative include/bb3-prep.txt %} + +#### Section II - Contrôle du bon fonctionnement des boutons + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### Étape suivante : Choisissez un exploit + +If the camera appeared in the previous section, Safe Mode is likely to be working on your device. + +If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/fr_FR/bannerbomb3.txt b/_pages/fr_FR/bannerbomb3.txt index adde0d9463..638c7bd29f 100644 --- a/_pages/fr_FR/bannerbomb3.txt +++ b/_pages/fr_FR/bannerbomb3.txt @@ -30,36 +30,10 @@ Si vous possédez une console taïwanaise (indiquée par un T après la version #### Section I - Préparatifs -Dans cette section, vous allez copier les fichiers nécessaires pour déclencher l'exploit BannerBomb3 sur la carte SD de votre console. - -1. Éteignez votre console -1. Insérez votre carte SD dans votre ordinateur -1. Ouvrez [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) sur votre ordinateur -1. Téléchargez votre movable.sed en utilisant l'option « Choisir un fichier » -1. Cliquez sur "Build and Download" - + Ceci va télécharger un exploit DSiWare appelé `F00D43D5.bin` et un payload appelé `bb3.bin` à l'intérieur d'une archive zip (`DSIWARE_EXPLOIT.zip`) -1. Copiez `bb3.bin` de `DSIWARE_EXPLOIT.zip` à la racine de votre carte SD - + La racine de la carte SD représente le répertoire initial de la carte SD où vous pouvez voir le dossier Nintendo 3DS, mais ce n'est pas à l'intérieur de ce dernier - + Ce fichier n'a pas besoin d'être ouvert ou extrait - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. Naviguez vers `Nintendo 3DS` -> `` -> `` sur votre carte SD - + `` est le nom du dossier à 32 lettres que vous avez copié dans [Seedminer](seedminer) - + `` est un dossier de 32 caractères à l'intérieur de `` - + Si vous avez plusieurs dossiers ``, suivez les instructions [ici](troubleshooting#bannerbomb3) - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Créez un dossier nommé `Nintendo DSiWare` à l'intérieur de `` - + Si vous aviez déjà le dossier *et* qu'il y a des fichiers de sauvegarde DSiWare existants (`<8-character-id>.bin`) à l'intérieur, copiez-les sur votre PC et retirez-les de votre carte SD -1. Copiez le fichier `F00D43D5.bin` depuis `DSIWARE_EXPLOIT.zip` vers le dossier `Nintendo DSiWare` - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.txt %} #### Section II - Contrôle du bon fonctionnement des boutons -Dans cette section, vous verrez si vous pouvez accéder au mode sans échec sur votre console. Cela déterminera la méthode que vous allez suivre sur la page suivante. - -Votre carte SD doit rester dans votre ordinateur pendant que vous effectuez cette vérification. - {% include_relative include/safemodecheck.txt %} ___ diff --git a/_pages/fr_FR/credits.md b/_pages/fr_FR/credits.md deleted file mode 100644 index 3d6015359c..0000000000 --- a/_pages/fr_FR/credits.md +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Remerciements" ---- - -**Un grand merci à Plailect, le créateur et mainteneur original du guide !** -{: .notice--primary} - -**Un grand merci à tous les [#Cakey sur Freenode](http://webchat.freenode.net/?channels=%23Cakey) d'être géniaux !** -{: .notice--primary} - -**Un grand merci à tous les [traducteurs](https://crowdin.com/project/3ds-guide) d'être géniaux !** -{: .notice--primary} - -Si je vous ai oublié, contactez-moi et j'ajouterai votre nom. - -{% capture notice-1 %} - - + Al3x_10m - + aliaspider - + AngelSL - + ashinnblunts - + AuroraWright - + b1l1s - + BernardoGiordano - + Cartman123 - + Cell9 - + coder65535 - + Cruel - + d0k3 - + dank101 - + Dazzozo - + DeadPhoenix - + Delebile - + DinohScene - + dukesrg - + elementalcode - + elSeledonio - + erman1337 - + felipejfc - + figgyc - + fox8091 - + Frozen_Chen - + Gelex - + Hamcha - + icecream - + ihaveamac - + IngeniousDefault - + J-D-K - + Jisagi - + jkcgs - + kartik - + LordBass - + mid-kid - + MrNbaYoh - + Mrrraou - + Night_Fallen_Wolf - + Normmatt - + Plailect - + plutooo - + Psi-Hate - + RandallHoffman - + Raugo - + Reboot.ms - + s_99 - + SciresM - + Shadowtrance - + shinyquagsire23 - + skiptirengu - + smealum - + Steveice10 - + stuckpixel - + Syphurith - + Tech0verlord - + TiniVi - + TuxSH - + Urbanshadow - + Vappy - + vegaroxas - + Wolfvak - + WulfyStylez - + xy2_ - + yellows8 - + yifan_lu - + zoogie - -{% endcapture %} - -
{{ notice-1 | markdownify }}
diff --git a/_pages/de_DE/credits.md b/_pages/fr_FR/credits.txt similarity index 95% rename from _pages/de_DE/credits.md rename to _pages/fr_FR/credits.txt index 05237dc8b9..6349aaf64c 100644 --- a/_pages/de_DE/credits.md +++ b/_pages/fr_FR/credits.txt @@ -1,5 +1,5 @@ --- -title: "Danksagungen" +title: "Credits" --- **Special thanks to Plailect, the original creator and maintainer of the guide!** @@ -11,7 +11,7 @@ title: "Danksagungen" **Special thanks to all of [the translators](https://crowdin.com/project/3ds-guide) for being awesome!** {: .notice--primary} -If I forgot you here, contact me and I'll add your name. +Si je vous ai oublié, contactez-moi et j'ajouterai votre nom. {% capture notice-1 %} diff --git a/_pages/fr_FR/donations.md b/_pages/fr_FR/donations.txt similarity index 100% rename from _pages/fr_FR/donations.md rename to _pages/fr_FR/donations.txt diff --git a/_pages/fr_FR/finalizing-setup.txt b/_pages/fr_FR/finalizing-setup.txt index cbbbebe181..5d2f5d5673 100644 --- a/_pages/fr_FR/finalizing-setup.txt +++ b/_pages/fr_FR/finalizing-setup.txt @@ -138,7 +138,7 @@ Dans cette section, vous utiliserez un script pour copier certains fichiers de L Dans cette section, vous utiliserez un script pour supprimer des fichiers inutiles de votre carte SD. 1. Sélectionnez "Cleanup SD Card" -1. Lorsque vous êtes invité, appuyez sur (A) +1. Lorsque vous y êtes invité, appuyez sur (A) 1. Appuyez sur (A) pour continuer 1. Appuyez sur (B) pour revenir au menu principal @@ -160,7 +160,7 @@ Dans cette section, vous ferez des sauvegardes de fichiers qui peuvent être uti 1. Sélectionnez "Copy to 0:/gm9/out" + Si vous voyez "Destination already exists", appuyez sur (A) sur "Overwrite file(s)" 1. Appuyez sur (A) pour continuer -1. Appuyez sur (Home) pour faire apparaître le menu d’actions (action menu) +1. Appuyez sur (HOME) pour faire apparaître le menu d’actions 1. Sélectionnez "Poweroff system" pour éteindre votre appareil 1. Insérez votre carte SD dans votre ordinateur 1. Copiez `__sysnand_##.bin`, `__sysnand_##.bin.sha`, et `essentiel.exefs` du dossier `/gm9/out/` de votre carte SD vers un emplacement sûr sur votre ordinateur @@ -169,7 +169,7 @@ Dans cette section, vous ferez des sauvegardes de fichiers qui peuvent être uti 1. Supprimez `__sysnand_##.bin` et `__sysnand_##.bin.sha` du dossier `/gm9/out/` de votre carte SD après l'avoir copié + Les autres fichiers de sauvegarde sont négligeables en taille et peuvent être conservés sur votre carte SD pour un accès facilité 1. Si vous l'avez, copiez le dossier `/luma/backups/` de votre carte SD vers un endroit sûr sur votre ordinateur -1. Retirez la carte SD de votre ordinateur et réinsérez-la dans votre console +1. Réinsérez votre carte SD dans votre console 1. Allumez votre console ___ @@ -177,9 +177,6 @@ ___ Vous avez terminé! Le custom firmware est maintenant entièrement installé et configuré sur votre console. {: .notice--success} -Bonjour ! Nous cherchons à obtenir des commentaires sur l'expérience globale vécue en suivant notre guide. Si vous souhaitez nous aider, consultez le sondage [ici](https://forms.gle/vZNoc4QLCz5MEXCK7) (uniquement disponible en anglais). Merci ! -{: .notice--info} - ### Informations et notes {% capture notice-6 %} diff --git a/_pages/fr_FR/homebrew-launcher-(super-skaterhax).txt b/_pages/fr_FR/homebrew-launcher-(super-skaterhax).txt index f110bb3aa3..57cc2b20e0 100644 --- a/_pages/fr_FR/homebrew-launcher-(super-skaterhax).txt +++ b/_pages/fr_FR/homebrew-launcher-(super-skaterhax).txt @@ -64,7 +64,7 @@ Si vous ne l'avez pas déjà fait, assurez-vous d'avoir une connexion Internet f 1. Appuyez sur le bouton "GO GO!" en haut de l'écran + Si des invites apparaissent, approuvez les tous + Si votre console se bloque sur un écran jaune, maintenez le bouton POWER jusqu'à ce qu'elle s'éteigne, puis réessayez cette section - + Si votre console se bloque sur un écran rouge, maintenez le bouton POWER jusqu'à ce qu'elle s'éteigne, refaites l'étape 3 de la section II, puis recommencez cette section + + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) 1. Si l'exploit a réussi, votre console aura démarré dans l'Homebrew Launcher 1. Éteignez votre console diff --git a/_pages/fr_FR/include/bb3-prep.txt b/_pages/fr_FR/include/bb3-prep.txt new file mode 100644 index 0000000000..b167d6478d --- /dev/null +++ b/_pages/fr_FR/include/bb3-prep.txt @@ -0,0 +1,23 @@ +Dans cette section, vous allez copier les fichiers nécessaires pour déclencher l'exploit BannerBomb3 sur la carte SD de votre console. + +1. Éteignez votre console +1. Insérez votre carte SD dans votre ordinateur +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Téléchargez votre movable.sed en utilisant l'option « Choisir un fichier » +1. Cliquez sur "Build and Download" + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + La racine de la carte SD représente le répertoire initial de la carte SD où vous pouvez voir le dossier Nintendo 3DS, mais ce n'est pas à l'intérieur de ce dernier + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. Naviguez vers `Nintendo 3DS` -> `` -> `` sur votre carte SD + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. Créez un dossier nommé `Nintendo DSiWare` à l'intérieur de `` + + Si vous aviez déjà le dossier *et* qu'il y a des fichiers de sauvegarde DSiWare existants (`<8-character-id>. in`) à l'intérieur, copiez-les sur votre PC et retirez-les de votre carte SD +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/fr_FR/include/fredtool-prep.txt b/_pages/fr_FR/include/fredtool-prep.txt new file mode 100644 index 0000000000..010c7c0701 --- /dev/null +++ b/_pages/fr_FR/include/fredtool-prep.txt @@ -0,0 +1,29 @@ +Dans cette section, vous copierez les fichiers nécessaires pour remplacer temporairement Connexions Nintendo DS par Flipnote Studio, qui est utilisé pour lancer l'installateur de boot9strap (custom firmware). + +1. Insérez votre carte SD dans votre ordinateur +1. Ouvrez le site Web [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) sur votre ordinateur +1. Dans le champ "Username", entrez n'importe quel nom alphanumérique (sans espaces ni caractères spéciaux) +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. Sous le champ "MovableSed", uploadez votre fichier `movable.sed` en utilisant la deuxième option "Choisir un fichier" +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. Cliquez sur "Build" + + Attendez quelques secondes que le processus de compilation soit terminé +1. Dans la section Historique des builds à gauche, tapez le nom d'utilisateur dans le champ "Filter builds..." +1. Cliquez sur le premier résultat de recherche + + Ce résultat devrait avoir l'horodatage le plus récent +1. Cliquez sur le lien "output_(name).zip" +1. Naviguez vers `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` sur votre carte SD + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copiez `boot.firm` et `boot.3dsx` depuis Luma3DS `.zip`vers la racine de votre carte SD + + La racine de la carte SD représente le répertoire initial de la carte SD où vous pouvez voir le dossier Nintendo 3DS, mais ce n'est pas à l'intérieur de ce dernier +1. Copiez `boot.nds` (B9STool) de l'archive `.zip` à la racine de votre carte SD +1. Copiez le dossier `private` du fichier `.zip` de Frogminer_save vers la racine de votre carte SD +1. Retirez la carte SD de votre ordinateur et réinsérez-la dans votre console +1. Allumez votre console + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/fr_FR/include/fredtool-restore-dsconn.txt b/_pages/fr_FR/include/fredtool-restore-dsconn.txt new file mode 100644 index 0000000000..23a71d8c49 --- /dev/null +++ b/_pages/fr_FR/include/fredtool-restore-dsconn.txt @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. Naviguez vers `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` sur votre carte SD +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. Retirez la carte SD de votre ordinateur et réinsérez-la dans votre console +1. Allumez votre console +1. Lancez les Paramètres de la console +1. Naviguez vers `Gestion des données` -> `DSiWare`-> `Carte SD` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Sélectionnez le titre "Nintendo DSi™" +1. Sélectionnez "Copier", puis sélectionnez "OK" diff --git a/_pages/fr_FR/include/fredtool-write-flipnote.txt b/_pages/fr_FR/include/fredtool-write-flipnote.txt new file mode 100644 index 0000000000..da0fcdcaef --- /dev/null +++ b/_pages/fr_FR/include/fredtool-write-flipnote.txt @@ -0,0 +1,11 @@ +Dans cette section, vous copierez le DSiWare hacké de Connexions Nintendo DS dans la mémoire interne, qui le remplacera temporairement par Flipnote Studio. + +1. Lancez les Paramètres de la console +1. Naviguez vers `Gestion des données` -> `DSiWare`-> `Carte SD` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Sélectionnez le titre "Haxxxxxxxxx!" + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Sélectionnez "Copier", puis sélectionnez "OK" +1. Retournez au menu principal des Paramètres de la console +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. Si l'exploit a réussi, votre console devrait avoir démarré la version japonaise de Flipnote Studio + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/fr_FR/include/safemodecheck.txt b/_pages/fr_FR/include/safemodecheck.txt index a5bfea0fd6..535e494dfa 100644 --- a/_pages/fr_FR/include/safemodecheck.txt +++ b/_pages/fr_FR/include/safemodecheck.txt @@ -1,3 +1,5 @@ +In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page. + 1. Allumez votre console 1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time + The camera applet should appear diff --git a/_pages/fr_FR/include/seedminer-base.txt b/_pages/fr_FR/include/seedminer-base.txt index 04e8b2d514..09647fdaf9 100644 --- a/_pages/fr_FR/include/seedminer-base.txt +++ b/_pages/fr_FR/include/seedminer-base.txt @@ -15,10 +15,12 @@ Cette méthode utilise une carte graphique puissante pour effectuer les calculs Dans cette section, vous obtiendrez de votre 3DS les informations nécessaires pour déterminer la clé de chiffrement de votre console. +{% capture console_state_info %} Avant de suivre cette section : + Assurez-vous d'avoir allumé votre console avec la carte SD insérée au moins une fois pour générer les données nécessaires + Assurez-vous que votre console est connectée à Internet (vous devriez voir un indicateur bleu « Internet » dans le coin supérieur gauche du Menu HOME) -{: .notice--info} +{% endcapture %} +
{{ console_state_info | markdownify }}
1. Éteignez votre console 1. Insérez votre carte SD dans votre ordinateur diff --git a/_pages/fr_FR/installing-boot9strap-(fredtool).txt b/_pages/fr_FR/installing-boot9strap-(fredtool).txt index 7703297def..a20197617f 100644 --- a/_pages/fr_FR/installing-boot9strap-(fredtool).txt +++ b/_pages/fr_FR/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ Ceci est une implémentation de l'exploit "FIRM partitions known-plaintext" qui
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ## Ce dont vous avez besoin * Votre fichier `movable.sed` obtenu grâce à [Seedminer](seedminer) * La dernière version de [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* La dernière version de [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (téléchargement direct) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * La dernière version de [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (le fichier `.zip' de Luma3DS) #### Section I - Vérification de la présence d’un CFW @@ -42,49 +45,11 @@ Dans cette section, vous allez déclencher l'exploit BannerBomb3 à l'aide du me #### Section III - Préparatifs -Dans cette section, vous copierez les fichiers nécessaires pour remplacer temporairement Connexions Nintendo DS par Flipnote Studio, qui est utilisé pour lancer l'installateur de boot9strap (custom firmware). - -1. Insérez votre carte SD dans votre ordinateur -1. Ouvrez le site Web [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) sur votre ordinateur -1. Dans le champ "Username", entrez n'importe quel nom alphanumérique (sans espaces ni caractères spéciaux) -1. Dans le champ "DSiBin", téléchargez votre fichier `42383841.bin` depuis la racine de votre carte SD en utilisant la première option "Choisir un fichier" -1. Sous le champ "MovableSed", uploadez votre fichier `movable.sed` en utilisant la deuxième option "Choisir un fichier" -1. Dans le champ "InjectionTarget", définissez la cible d'injection à `DSinternet` (PAS memorypit) -1. Cliquez sur "Build" - + Attendez quelques secondes que le processus de compilation soit terminé -1. Dans la section Historique des builds à gauche, tapez le nom d'utilisateur dans le champ "Filter builds..." -1. Cliquez sur le premier résultat de recherche - + Ce résultat devrait avoir l'horodatage le plus récent -1. Cliquez sur le lien "output_(name).zip" -1. Naviguez vers `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` sur votre carte SD - + `` est le nom du dossier à 32 lettres que vous avez copié dans [Seedminer](seedminer) - + `` est un dossier de 32 caractères à l'intérieur de `` -1. Supprimez `F00D43D5.bin` de votre dossier Nintendo DSiWare -1. Copiez le fichier `42383841.bin` du dossier `hax` de l'archive DSiWare téléchargée (output_(name).zip) vers le dossier `Nintendo DSiWare` - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copiez `boot.firm` et `boot.3dsx` depuis Luma3DS `.zip`vers la racine de votre carte SD - + La racine de la carte SD représente le répertoire initial de la carte SD où vous pouvez voir le dossier Nintendo 3DS, mais ce n'est pas à l'intérieur de ce dernier -1. Copiez `boot.nds` (B9STool) de l'archive `.zip` à la racine de votre carte SD -1. Copiez le dossier `private` du fichier `.zip` de Frogminer_save vers la racine de votre carte SD -1. Retirez la carte SD de votre ordinateur et réinsérez-la dans votre console -1. Allumez votre console - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.txt %} #### Section IV - Écrasement de Connexions Nintendo DS -Dans cette section, vous copierez le DSiWare hacké de Connexions Nintendo DS dans la mémoire interne, qui le remplacera temporairement par Flipnote Studio. - -1. Lancez les Paramètres de la console -1. Naviguez vers `Gestion des données` -> `DSiWare`-> `Carte SD` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Sélectionnez le titre "Haxxxxxxxxx!" - + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Sélectionnez "Copier", puis sélectionnez "OK" -1. Retournez au menu principal des Paramètres de la console -1. Naviguez vers `Paramètres Internet` -> `Connexions Nintendo DS`, puis sélectionnez "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) -1. Si l'exploit a réussi, votre console devrait avoir démarré la version japonaise de Flipnote Studio - + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.txt %} #### Section V - Exploit Flipnote @@ -99,18 +64,10 @@ Dans cette section, vous copierez le DSiWare hacké de Connexions Nintendo DS da #### Section VII - Restauration des paramètres de Connexions Nintendo DS -Dans cette section, vous allez restaurer Connexions Nintendo DS comme il était avant d'être remplacé temporairement par Flipnote Studio dans Section IV. - -1. Naviguez vers `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` sur votre carte SD -1. Copiez le fichier `42383841.bin` du dossier `clean` de l'archive DSiWare téléchargée (output_(nom).zip) dans le dossier `Nintendo DSiWare` -1. Retirez la carte SD de votre ordinateur et réinsérez-la dans votre console -1. Allumez votre console -1. Lancez les Paramètres de la console -1. Naviguez vers `Gestion des données` -> `DSiWare`-> `Carte SD` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Sélectionnez le titre "Nintendo DSi™" -1. Sélectionnez "Copier", puis sélectionnez "OK" +{% include_relative include/fredtool-restore-dsconn.txt %} ___ + ### Continuer vers [Finalisation de l'installation](finalizing-setup) {: .notice--primary} diff --git a/_pages/fr_FR/installing-boot9strap-(fredtool-legacy).txt b/_pages/fr_FR/installing-boot9strap-(fredtool-legacy).txt new file mode 100644 index 0000000000..c66bcf5218 --- /dev/null +++ b/_pages/fr_FR/installing-boot9strap-(fredtool-legacy).txt @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title="Table des matières" %} + +{% capture technical_info %} +Détails techniques (facultatif) + +Pour extraire un DSiWare système, nous exploitons une faille dans l'onglet de gestion des données DSiWare présent dans les paramètres système. + +Pour ce faire, nous utilisons la clé de chiffrement de votre console (movable.sed) pour créer une sauvegarde DSiWare qui exploite le système pour dumper l'application DSi Internet Settings à la racine SD. + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +Ceci est une implémentation de l'exploit "FIRM partitions known-plaintext" qui est décrit [ici](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +## Ce dont vous avez besoin + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* La dernière version de [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* La dernière version de [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (le fichier `.zip' de Luma3DS) + +#### Section I - Vérification de la présence d’un CFW + +{% include_relative include/cfw-check-fredtool.txt %} + +#### Section II - BannerBomb3 + +Dans cette section, vous allez déclencher l'exploit BannerBomb3 à l'aide du menu de Gestion des Nintendo DSiWare et copier le fichier dumpé sur votre ordinateur afin de pouvoir l'utiliser dans la section suivante. + +1. Retirez la carte SD de votre ordinateur et réinsérez-la dans votre console +1. Allumez votre console +1. Lancez les Paramètres de la console +1. Naviguez vers `Gestion des données` -> `DSiWare`-> `Carte SD` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Votre console devrait afficher le menu BB3 multihax + + Si cette étape provoque un plantage de votre console, [suivez ce guide de dépannage](troubleshooting#installing-boot9strap-fredtool) +1. Utilisez la croix directionnelle pour naviguer et appuyez sur le bouton (A) pour sélectionner "Dump DSiWare" + + Votre console redémarrera automatiquement +1. Éteignez votre console + +#### Section III - Préparatifs + +{% include_relative include/fredtool-prep.txt %} + +#### Section IV - Écrasement de Connexions Nintendo DS + +{% include_relative include/fredtool-write-flipnote.txt %} + +#### Section V - Exploit Flipnote + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### Section VI - Configuration de Luma3DS + +1. Appuyez sur le bouton (Select) et maintenez-le, et tout en maintenant le bouton (Select), allumez votre console. Ceci va lancer la configuration de Luma3DS +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### Section VII - Restauration des paramètres de Connexions Nintendo DS + +{% include_relative include/fredtool-restore-dsconn.txt %} + +___ + + +### Continuer vers [Finalisation de l'installation](finalizing-setup) +{: .notice--primary} diff --git a/_pages/fr_FR/seedminer-(mii).txt b/_pages/fr_FR/seedminer-(mii).txt new file mode 100644 index 0000000000..87229dc757 --- /dev/null +++ b/_pages/fr_FR/seedminer-(mii).txt @@ -0,0 +1,84 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title="Table des matières" %} + +{% capture gpu_warning %} +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: ++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) ++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple) ++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) ++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{% endcapture %} +
{{ gpu_warning | markdownify }}
+ +{% capture technical_info %} +Détails techniques (facultatif) + +Pour installer boot9strap sur votre 3DS, nous dérivons la clé de chiffrement unique de votre console. Pour ce faire, nous utilisons un outil appelé Seedminer pour calculer la clé de chiffrement des données (movable.sed) de votre console. + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +Pour plus d'informations sur le fonctionnement de Seedminer, regardez [cette présentation](https://zoogie.github.io/web/34⅕c3). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### Ce dont vous avez besoin + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### Section I - Prep Work + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/fr_FR/site-navigation.txt b/_pages/fr_FR/site-navigation.txt index 6e9c0a8a1b..98827ef78b 100644 --- a/_pages/fr_FR/site-navigation.txt +++ b/_pages/fr_FR/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [Mise à jour vers boot9strap](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) + [Crédits](credits) + [Vérification de la présence d'un CFW](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [Home](/fr_FR/) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [Installation de boot9strap (Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [Installation de boot9strap (Frogtool)](installing-boot9strap-(frogtool)) + [Installation de boot9strap (Hardmod)](installing-boot9strap-(hardmod)) + [Installation de boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [Changement de Région](region-changing) + [Restauration / Mise à jour du CFW](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (TWN)](seedminer-(twn)) + [Dépannage](troubleshooting) + [Désinstallation du CFW](uninstall-cfw) diff --git a/_pages/fr_FR/updating-firmware-(kor).txt b/_pages/fr_FR/updating-firmware-(kor).txt new file mode 100644 index 0000000000..06f7e0f9d9 --- /dev/null +++ b/_pages/fr_FR/updating-firmware-(kor).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (KOR)" +--- + +### Lecture requise + +To use the Seedminer exploit, you must update your device to the latest system version. + +### Ce dont vous avez besoin + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer](seedminer) +{: .notice--primary} diff --git a/_pages/fr_FR/updating-firmware-(kor-twn).md b/_pages/fr_FR/updating-firmware-(kor-twn).md deleted file mode 100644 index 74a2b48f90..0000000000 --- a/_pages/fr_FR/updating-firmware-(kor-twn).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (KOR/TWN)" ---- - -### Required Reading - -To use the Seedminer exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Seedminer](seedminer) -{: .notice--primary} diff --git a/_pages/fr_FR/updating-firmware-(new-3ds).txt b/_pages/fr_FR/updating-firmware-(new-3ds).txt new file mode 100644 index 0000000000..bfed328ad2 --- /dev/null +++ b/_pages/fr_FR/updating-firmware-(new-3ds).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (New 3DS)" +--- + +### Lecture requise + +To use the super-skaterhax exploit, you must update your device to the latest system version. + +### Ce dont vous avez besoin + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) +{: .notice--primary} diff --git a/_pages/fr_FR/updating-firmware-(twn).txt b/_pages/fr_FR/updating-firmware-(twn).txt new file mode 100644 index 0000000000..147818645d --- /dev/null +++ b/_pages/fr_FR/updating-firmware-(twn).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (TWN)" +--- + +### Lecture requise + +To use the Seedminer exploit, you must update your device to the latest system version. + +### Ce dont vous avez besoin + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer (TWN)](seedminer-(twn)) +{: .notice--primary} diff --git a/_pages/he_IL/404.md b/_pages/he_IL/404.txt similarity index 100% rename from _pages/he_IL/404.md rename to _pages/he_IL/404.txt diff --git a/_pages/he_IL/bannerbomb3-(legacy).txt b/_pages/he_IL/bannerbomb3-(legacy).txt new file mode 100644 index 0000000000..73be0157cc --- /dev/null +++ b/_pages/he_IL/bannerbomb3-(legacy).txt @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title="תוכן העניינים" %} + +{% capture technical_info %} +Technical Details (optional) + +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### Compatibility Notes + +These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. + +### What You Need + +* Your `movable.sed` file from completing Seedminer or nimhax + +#### חלק I - הכנות + +{% include_relative include/bb3-prep.txt %} + +#### Section II - Hardware Button Check + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### Next steps: Choose an exploit + +If the camera appeared in the previous section, Safe Mode is likely to be working on your device. + +If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/he_IL/bannerbomb3.txt b/_pages/he_IL/bannerbomb3.txt index f9e3b68ad9..b506d32b35 100644 --- a/_pages/he_IL/bannerbomb3.txt +++ b/_pages/he_IL/bannerbomb3.txt @@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol #### חלק I - הכנות -In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. - -1. תכבו את המכשיר -1. תכניסו את ה-SD שלכם למחשב -1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer -1. Upload your movable.sed using the “Choose File” option -1. Click “Build and Download” - + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) -1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it - + This file does not need to be opened or extracted - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.txt %} #### Section II - Hardware Button Check -In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. - -Your SD card should remain in your computer while you perform this check. - {% include_relative include/safemodecheck.txt %} ___ diff --git a/_pages/id_ID/credits.md b/_pages/he_IL/credits.txt similarity index 100% rename from _pages/id_ID/credits.md rename to _pages/he_IL/credits.txt diff --git a/_pages/he_IL/donations.md b/_pages/he_IL/donations.txt similarity index 100% rename from _pages/he_IL/donations.md rename to _pages/he_IL/donations.txt diff --git a/_pages/he_IL/finalizing-setup.txt b/_pages/he_IL/finalizing-setup.txt index 7a5a25515a..d778a85b6b 100644 --- a/_pages/he_IL/finalizing-setup.txt +++ b/_pages/he_IL/finalizing-setup.txt @@ -177,9 +177,6 @@ ___ You're done! Custom firmware is now fully configured on your device. {: .notice--success} -Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! -{: .notice--info} - ### Information and Notes {% capture notice-6 %} diff --git a/_pages/he_IL/homebrew-launcher-(super-skaterhax).txt b/_pages/he_IL/homebrew-launcher-(super-skaterhax).txt index a18a35f7ae..3b1a671cbd 100644 --- a/_pages/he_IL/homebrew-launcher-(super-skaterhax).txt +++ b/_pages/he_IL/homebrew-launcher-(super-skaterhax).txt @@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up 1. Select the "GO GO!" button on the top screen + If any prompts appear, approve all of them + If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section + + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) 1. If the exploit was successful, your device will have booted into the Homebrew Launcher 1. תכבו את המכשיר diff --git a/_pages/he_IL/include/bb3-prep.txt b/_pages/he_IL/include/bb3-prep.txt new file mode 100644 index 0000000000..f1b96a5668 --- /dev/null +++ b/_pages/he_IL/include/bb3-prep.txt @@ -0,0 +1,23 @@ +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + +1. תכבו את המכשיר +1. תכניסו את ה-SD שלכם למחשב +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. Create a folder named `Nintendo DSiWare` inside of the `` + + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/he_IL/include/fredtool-prep.txt b/_pages/he_IL/include/fredtool-prep.txt new file mode 100644 index 0000000000..c7370b31b4 --- /dev/null +++ b/_pages/he_IL/include/fredtool-prep.txt @@ -0,0 +1,29 @@ +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. + +1. תכניסו את ה-SD שלכם למחשב +1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer +1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. Click "Build" + + Wait a few seconds for the build process to complete +1. In the Build History section on the left, type the Username into the "Filter Builds" field +1. Click on the first search result + + This result should have the latest timestamp +1. Click the "output_(name).zip" link +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card +1. תכניסו מחדש את כרטיס הSD שלכם לתוך המכשיר שלכם +1. תפעילו את המכשיר + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/he_IL/include/fredtool-restore-dsconn.txt b/_pages/he_IL/include/fredtool-restore-dsconn.txt new file mode 100644 index 0000000000..a3ee4fbfa5 --- /dev/null +++ b/_pages/he_IL/include/fredtool-restore-dsconn.txt @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. תכניסו מחדש את כרטיס הSD שלכם לתוך המכשיר שלכם +1. תפעילו את המכשיר +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title +1. Select "Copy", then select "OK" diff --git a/_pages/he_IL/include/fredtool-write-flipnote.txt b/_pages/he_IL/include/fredtool-write-flipnote.txt new file mode 100644 index 0000000000..cb6f428624 --- /dev/null +++ b/_pages/he_IL/include/fredtool-write-flipnote.txt @@ -0,0 +1,11 @@ +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Select "Copy", then select "OK" +1. Return to main menu of the System Settings +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/he_IL/include/safemodecheck.txt b/_pages/he_IL/include/safemodecheck.txt index 02c245653c..2ab2756a3c 100644 --- a/_pages/he_IL/include/safemodecheck.txt +++ b/_pages/he_IL/include/safemodecheck.txt @@ -1,3 +1,5 @@ +In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page. + 1. תפעילו את המכשיר 1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time + The camera applet should appear diff --git a/_pages/he_IL/include/seedminer-base.txt b/_pages/he_IL/include/seedminer-base.txt index 5ee44512c5..2807f0c39d 100644 --- a/_pages/he_IL/include/seedminer-base.txt +++ b/_pages/he_IL/include/seedminer-base.txt @@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. +{% capture console_state_info %} Before following this section: + Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data + Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen) -{: .notice--info} +{% endcapture %} +
{{ console_state_info | markdownify }}
1. תכבו את המכשיר 1. תכניסו את ה-SD שלכם למחשב diff --git a/_pages/he_IL/installing-boot9strap-(fredtool).txt b/_pages/he_IL/installing-boot9strap-(fredtool).txt index 0383483ee9..55ac195e63 100644 --- a/_pages/he_IL/installing-boot9strap-(fredtool).txt +++ b/_pages/he_IL/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ### What You Need * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) #### Section I - CFW Check @@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana #### Section III - Prep Work -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. תכניסו את ה-SD שלכם למחשב -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. תכניסו מחדש את כרטיס הSD שלכם לתוך המכשיר שלכם -1. תפעילו את המכשיר - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.txt %} #### Section IV - Overwriting DS Connection Settings -In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. - -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Haxxxxxxxxx!" title - + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Select "Copy", then select "OK" -1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) -1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio - + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.txt %} #### Section V - Flipnote Exploit @@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte #### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. - -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one -1. תכניסו מחדש את כרטיס הSD שלכם לתוך המכשיר שלכם -1. תפעילו את המכשיר -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Nintendo DSi™" title -1. Select "Copy", then select "OK" +{% include_relative include/fredtool-restore-dsconn.txt %} ___ + ### Continue to [Finalizing Setup](finalizing-setup) {: .notice--primary} diff --git a/_pages/he_IL/installing-boot9strap-(fredtool-legacy).txt b/_pages/he_IL/installing-boot9strap-(fredtool-legacy).txt new file mode 100644 index 0000000000..27a3b64265 --- /dev/null +++ b/_pages/he_IL/installing-boot9strap-(fredtool-legacy).txt @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title="תוכן העניינים" %} + +{% capture technical_info %} +Technical Details (optional) + +To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +### What You Need + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) + +#### Section I - CFW Check + +{% include_relative include/cfw-check-fredtool.txt %} + +#### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. תכניסו מחדש את כרטיס הSD שלכם לתוך המכשיר שלכם +1. תפעילו את המכשיר +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically reboot +1. תכבו את המכשיר + +#### Section III - Prep Work + +{% include_relative include/fredtool-prep.txt %} + +#### Section IV - Overwriting DS Connection Settings + +{% include_relative include/fredtool-write-flipnote.txt %} + +#### Section V - Flipnote Exploit + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### Section VI - Luma3DS Configuration + +1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### Section VII - Restoring DS Connection Settings + +{% include_relative include/fredtool-restore-dsconn.txt %} + +___ + + +### Continue to [Finalizing Setup](finalizing-setup) +{: .notice--primary} diff --git a/_pages/he_IL/seedminer-(mii).txt b/_pages/he_IL/seedminer-(mii).txt new file mode 100644 index 0000000000..efa811f433 --- /dev/null +++ b/_pages/he_IL/seedminer-(mii).txt @@ -0,0 +1,84 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title="תוכן העניינים" %} + +{% capture gpu_warning %} +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: ++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) ++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple) ++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) ++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{% endcapture %} +
{{ gpu_warning | markdownify }}
+ +{% capture technical_info %} +Technical Details (optional) + +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### What you need + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### Section I - Prep Work + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/he_IL/site-navigation.txt b/_pages/he_IL/site-navigation.txt index eca40250fb..8983f8de38 100644 --- a/_pages/he_IL/site-navigation.txt +++ b/_pages/he_IL/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [A9LH אל B9S](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) + [תודות](credits) + [Checking for CFW](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [בית](/) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) + [התקנת boot9strap (הלחמה)](installing-boot9strap-(hardmod)) + [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [שינוי אזור](region-changing) + [Restoring / Updating CFW](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (TWN)](seedminer-(twn)) + [פתרון בעיות](troubleshooting) + [הסרת CFW](uninstall-cfw) diff --git a/_pages/he_IL/updating-firmware-(kor).txt b/_pages/he_IL/updating-firmware-(kor).txt new file mode 100644 index 0000000000..1c6c5d0832 --- /dev/null +++ b/_pages/he_IL/updating-firmware-(kor).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (KOR)" +--- + +### קריאה דרושה + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer](seedminer) +{: .notice--primary} diff --git a/_pages/he_IL/updating-firmware-(kor-twn).md b/_pages/he_IL/updating-firmware-(kor-twn).md deleted file mode 100644 index 74a2b48f90..0000000000 --- a/_pages/he_IL/updating-firmware-(kor-twn).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (KOR/TWN)" ---- - -### Required Reading - -To use the Seedminer exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Seedminer](seedminer) -{: .notice--primary} diff --git a/_pages/he_IL/updating-firmware-(new-3ds).txt b/_pages/he_IL/updating-firmware-(new-3ds).txt new file mode 100644 index 0000000000..3d970d0f8c --- /dev/null +++ b/_pages/he_IL/updating-firmware-(new-3ds).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (New 3DS)" +--- + +### קריאה דרושה + +To use the super-skaterhax exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) +{: .notice--primary} diff --git a/_pages/he_IL/updating-firmware-(twn).txt b/_pages/he_IL/updating-firmware-(twn).txt new file mode 100644 index 0000000000..cee43158ad --- /dev/null +++ b/_pages/he_IL/updating-firmware-(twn).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (TWN)" +--- + +### קריאה דרושה + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer (TWN)](seedminer-(twn)) +{: .notice--primary} diff --git a/_pages/hr_HR/404.md b/_pages/hr_HR/404.txt similarity index 100% rename from _pages/hr_HR/404.md rename to _pages/hr_HR/404.txt diff --git a/_pages/hr_HR/bannerbomb3-(legacy).txt b/_pages/hr_HR/bannerbomb3-(legacy).txt new file mode 100644 index 0000000000..503794c42a --- /dev/null +++ b/_pages/hr_HR/bannerbomb3-(legacy).txt @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title="Table of Contents" %} + +{% capture technical_info %} +Technical Details (optional) + +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### Compatibility Notes + +These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. + +### What You Need + +* Your `movable.sed` file from completing Seedminer or nimhax + +#### Section I - Prep Work + +{% include_relative include/bb3-prep.txt %} + +#### Section II - Hardware Button Check + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### Next steps: Choose an exploit + +If the camera appeared in the previous section, Safe Mode is likely to be working on your device. + +If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/hr_HR/bannerbomb3.txt b/_pages/hr_HR/bannerbomb3.txt index 7767c4aeb1..a8383926fd 100644 --- a/_pages/hr_HR/bannerbomb3.txt +++ b/_pages/hr_HR/bannerbomb3.txt @@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. - -1. Power off your device -1. Insert your SD card into your computer -1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer -1. Upload your movable.sed using the “Choose File” option -1. Click “Build and Download” - + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) -1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it - + This file does not need to be opened or extracted - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.txt %} #### Section II - Hardware Button Check -In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. - -Your SD card should remain in your computer while you perform this check. - {% include_relative include/safemodecheck.txt %} ___ diff --git a/_pages/ms_MY/credits.md b/_pages/hr_HR/credits.txt similarity index 100% rename from _pages/ms_MY/credits.md rename to _pages/hr_HR/credits.txt diff --git a/_pages/hr_HR/donations.md b/_pages/hr_HR/donations.txt similarity index 100% rename from _pages/hr_HR/donations.md rename to _pages/hr_HR/donations.txt diff --git a/_pages/hr_HR/finalizing-setup.txt b/_pages/hr_HR/finalizing-setup.txt index f16b13698a..e41bd44dcd 100644 --- a/_pages/hr_HR/finalizing-setup.txt +++ b/_pages/hr_HR/finalizing-setup.txt @@ -177,9 +177,6 @@ ___ You're done! Custom firmware is now fully configured on your device. {: .notice--success} -Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! -{: .notice--info} - ### Information and Notes {% capture notice-6 %} diff --git a/_pages/hr_HR/homebrew-launcher-(super-skaterhax).txt b/_pages/hr_HR/homebrew-launcher-(super-skaterhax).txt index ea288c3163..7b83fe0d7e 100644 --- a/_pages/hr_HR/homebrew-launcher-(super-skaterhax).txt +++ b/_pages/hr_HR/homebrew-launcher-(super-skaterhax).txt @@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up 1. Select the "GO GO!" button on the top screen + If any prompts appear, approve all of them + If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section + + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) 1. If the exploit was successful, your device will have booted into the Homebrew Launcher 1. Power off your device diff --git a/_pages/hr_HR/include/bb3-prep.txt b/_pages/hr_HR/include/bb3-prep.txt new file mode 100644 index 0000000000..0b0965f3de --- /dev/null +++ b/_pages/hr_HR/include/bb3-prep.txt @@ -0,0 +1,23 @@ +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + +1. Power off your device +1. Insert your SD card into your computer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. Create a folder named `Nintendo DSiWare` inside of the `` + + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/hr_HR/include/fredtool-prep.txt b/_pages/hr_HR/include/fredtool-prep.txt new file mode 100644 index 0000000000..cff8aa806d --- /dev/null +++ b/_pages/hr_HR/include/fredtool-prep.txt @@ -0,0 +1,29 @@ +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. + +1. Insert your SD card into your computer +1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer +1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. Click "Build" + + Wait a few seconds for the build process to complete +1. In the Build History section on the left, type the Username into the "Filter Builds" field +1. Click on the first search result + + This result should have the latest timestamp +1. Click the "output_(name).zip" link +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card +1. Reinsert your SD card into your device +1. Power on your device + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/hr_HR/include/fredtool-restore-dsconn.txt b/_pages/hr_HR/include/fredtool-restore-dsconn.txt new file mode 100644 index 0000000000..3057b3ac9d --- /dev/null +++ b/_pages/hr_HR/include/fredtool-restore-dsconn.txt @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title +1. Select "Copy", then select "OK" diff --git a/_pages/hr_HR/include/fredtool-write-flipnote.txt b/_pages/hr_HR/include/fredtool-write-flipnote.txt new file mode 100644 index 0000000000..cb6f428624 --- /dev/null +++ b/_pages/hr_HR/include/fredtool-write-flipnote.txt @@ -0,0 +1,11 @@ +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Select "Copy", then select "OK" +1. Return to main menu of the System Settings +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/hr_HR/include/safemodecheck.txt b/_pages/hr_HR/include/safemodecheck.txt index 43ebec6575..7035baace8 100644 --- a/_pages/hr_HR/include/safemodecheck.txt +++ b/_pages/hr_HR/include/safemodecheck.txt @@ -1,3 +1,5 @@ +In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page. + 1. Power on your device 1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time + The camera applet should appear diff --git a/_pages/hr_HR/include/seedminer-base.txt b/_pages/hr_HR/include/seedminer-base.txt index e3493c2f87..ad6697a5fa 100644 --- a/_pages/hr_HR/include/seedminer-base.txt +++ b/_pages/hr_HR/include/seedminer-base.txt @@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. +{% capture console_state_info %} Before following this section: + Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data + Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen) -{: .notice--info} +{% endcapture %} +
{{ console_state_info | markdownify }}
1. Power off your device 1. Insert your SD card into your computer diff --git a/_pages/hr_HR/installing-boot9strap-(fredtool).txt b/_pages/hr_HR/installing-boot9strap-(fredtool).txt index ea9d81c010..455c3317a3 100644 --- a/_pages/hr_HR/installing-boot9strap-(fredtool).txt +++ b/_pages/hr_HR/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ### What You Need * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) #### Section I - CFW Check @@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana #### Section III - Prep Work -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Insert your SD card into your computer -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert your SD card into your device -1. Power on your device - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.txt %} #### Section IV - Overwriting DS Connection Settings -In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. - -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Haxxxxxxxxx!" title - + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Select "Copy", then select "OK" -1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) -1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio - + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.txt %} #### Section V - Flipnote Exploit @@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte #### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. - -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Nintendo DSi™" title -1. Select "Copy", then select "OK" +{% include_relative include/fredtool-restore-dsconn.txt %} ___ + ### Continue to [Finalizing Setup](finalizing-setup) {: .notice--primary} diff --git a/_pages/hr_HR/installing-boot9strap-(fredtool-legacy).txt b/_pages/hr_HR/installing-boot9strap-(fredtool-legacy).txt new file mode 100644 index 0000000000..1513694ebd --- /dev/null +++ b/_pages/hr_HR/installing-boot9strap-(fredtool-legacy).txt @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title="Table of Contents" %} + +{% capture technical_info %} +Technical Details (optional) + +To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +### What You Need + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) + +#### Section I - CFW Check + +{% include_relative include/cfw-check-fredtool.txt %} + +#### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically reboot +1. Power off your device + +#### Section III - Prep Work + +{% include_relative include/fredtool-prep.txt %} + +#### Section IV - Overwriting DS Connection Settings + +{% include_relative include/fredtool-write-flipnote.txt %} + +#### Section V - Flipnote Exploit + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### Section VI - Luma3DS Configuration + +1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### Section VII - Restoring DS Connection Settings + +{% include_relative include/fredtool-restore-dsconn.txt %} + +___ + + +### Continue to [Finalizing Setup](finalizing-setup) +{: .notice--primary} diff --git a/_pages/hr_HR/seedminer-(mii).txt b/_pages/hr_HR/seedminer-(mii).txt new file mode 100644 index 0000000000..5faf224c22 --- /dev/null +++ b/_pages/hr_HR/seedminer-(mii).txt @@ -0,0 +1,84 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title="Table of Contents" %} + +{% capture gpu_warning %} +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: ++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) ++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple) ++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) ++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{% endcapture %} +
{{ gpu_warning | markdownify }}
+ +{% capture technical_info %} +Technical Details (optional) + +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### What you need + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### Section I - Prep Work + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/hr_HR/site-navigation.txt b/_pages/hr_HR/site-navigation.txt index a2135747ab..179a8a4b0b 100644 --- a/_pages/hr_HR/site-navigation.txt +++ b/_pages/hr_HR/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [A9LH to B9S](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) + [Credits](credits) + [Checking for CFW](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [Home](/) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) + [Installing boot9strap (Hardmod)](installing-boot9strap-(hardmod)) + [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [Region Changing](region-changing) + [Restoring / Updating CFW](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (TWN)](seedminer-(twn)) + [Troubleshooting](troubleshooting) + [Uninstall CFW](uninstall-cfw) diff --git a/_pages/hr_HR/updating-firmware-(kor).txt b/_pages/hr_HR/updating-firmware-(kor).txt new file mode 100644 index 0000000000..4b08786c27 --- /dev/null +++ b/_pages/hr_HR/updating-firmware-(kor).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (KOR)" +--- + +### Required Reading + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer](seedminer) +{: .notice--primary} diff --git a/_pages/hr_HR/updating-firmware-(kor-twn).md b/_pages/hr_HR/updating-firmware-(kor-twn).md deleted file mode 100644 index 74a2b48f90..0000000000 --- a/_pages/hr_HR/updating-firmware-(kor-twn).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (KOR/TWN)" ---- - -### Required Reading - -To use the Seedminer exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Seedminer](seedminer) -{: .notice--primary} diff --git a/_pages/en_PT/updating-firmware-(new-3ds).md b/_pages/hr_HR/updating-firmware-(new-3ds).txt similarity index 100% rename from _pages/en_PT/updating-firmware-(new-3ds).md rename to _pages/hr_HR/updating-firmware-(new-3ds).txt diff --git a/_pages/hr_HR/updating-firmware-(twn).txt b/_pages/hr_HR/updating-firmware-(twn).txt new file mode 100644 index 0000000000..83e6992b1b --- /dev/null +++ b/_pages/hr_HR/updating-firmware-(twn).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (TWN)" +--- + +### Required Reading + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer (TWN)](seedminer-(twn)) +{: .notice--primary} diff --git a/_pages/hu_HU/404.md b/_pages/hu_HU/404.txt similarity index 100% rename from _pages/hu_HU/404.md rename to _pages/hu_HU/404.txt diff --git a/_pages/hu_HU/bannerbomb3-(legacy).txt b/_pages/hu_HU/bannerbomb3-(legacy).txt new file mode 100644 index 0000000000..90f0daa682 --- /dev/null +++ b/_pages/hu_HU/bannerbomb3-(legacy).txt @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title="Tartalomjegyzék" %} + +{% capture technical_info %} +Technikai részletek (opcionális) + +Ahhoz, hogy saját kódot futtassunk, kihasználunk egy hibát a DSiWare Data Management ablakában, a Settings alkalmazásban. + +Ahhoz, hogy ezt elérjük, szükségünk van a rendszer titkosítási kulcsára (movable.sed), hogy újra építsünk egy DSiWare mentést, amivel exploit-olni tudjuk a rendszert. + +További technikai információkért látogass el [ide](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### Kompatibilitási megjegyzések + +Az utasítások az Amerikai, Európai, Japán és Koreai régiójú konzolokon működnek, amik a rendszer verzió mögött egy U, E, J vagy K betű jelöl. + +### Amire szükséged lesz + +* A `movable.sed` fájlodra a Seedminer vagy a nimhax végrehajtásából + +#### I. rész - Előkészületek + +{% include_relative include/bb3-prep.txt %} + +#### II. rész - Fizikai gombok ellenőrzése + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### Következő lépések: Válassz egy exploit-ot + +Ha a kamera megjelent az előző szakaszban, a Safe Mode valószínűleg működik az eszközödön. + +Ha a kamera megjelent, folytasd a [boot9strap telepítésével (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/hu_HU/bannerbomb3.txt b/_pages/hu_HU/bannerbomb3.txt index 0c370a2249..1cc2b8ea65 100644 --- a/_pages/hu_HU/bannerbomb3.txt +++ b/_pages/hu_HU/bannerbomb3.txt @@ -30,36 +30,10 @@ Ha tajvani konzolod van (amit T betű jelez a rendszer verzió mögött), akkor #### I. rész - Előkészületek -Ebben a fejezetben fel fogod másolni azokat a fájlokat az eszközöd SD kártyájára, amik ahhoz szükségesek, hogy kiváltsák a BannerBomb3 exploit-ot. - -1. Kapcsold ki a készüléked -1. Helyezd az SD kártyád a számítógépbe -1. Nyisd meg a [BannerBomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) oldalt a számítógépeden -1. Töltsd fel a `movable.sed` fájlod a "Choose File" opcióval -1. Kattints a "Build and Download"-ra - + Ez letölt egy exploit DSiWare-t `F00D43D5.bin` néven és egy payload adatfájlt `bb3.bin` néven egy zip mappán belül (`DSIWARE_EXPLOIT.zip`) -1. Másold át a `bb3.bin` fájlt a `DSIWARE_EXPLOIT.zip`-ből az SD kártya gyökerébe - + Az SD kártya gyökere a kezdőkönyvtárt jelenti az SD kártyán, ahol látható a Nintendo 3DS könyvtár, de nem vagyunk benne - + A fájlokat nem kell megnyitni, vagy kicsomagolni - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. Navigálj a `Nintendo 3DS` -> `` -> `` mappába az SD kártyádon - + Az `` egy 32 karakter hosszú mappanév, amit a [Seedminer](seedminer)-nél másoltál - + Az `` egy 32 karakter hosszú nevű mappa az `` mappában - + Ha több `` nevű mappát látsz, kövesd [ezeket a lépéseket](troubleshooting#bannerbomb3) - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Hozz létre egy `Nintendo DSiWare` nevű mappát az `` mappában - + Ha már van mappád *és* van benne DSiWare mentés fájl (`<8-character-id>.bin`), másold őket a számítógépedre és töröld őket az SD kártyáról -1. Másold `F00D43D5.bin` fájlt a `DSIWARE_EXPLOIT.zip`-ből a `Nintendo DSiWare` mappába - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.txt %} #### II. rész - Fizikai gombok ellenőrzése -Ebben a fejezetben tesztelni fogod azt, hogy egyáltalán eléred-e a SAFE_MODE funkcióját az eszközödnek. Ez meghatározza, hogy melyik metódust kell követned a következő oldalon. - -Az SD kártyádnak be kell helyezve lennie a számítógépedbe, amíg ez az ellenőrzés folyik. - {% include_relative include/safemodecheck.txt %} ___ diff --git a/_pages/hu_HU/credits.md b/_pages/hu_HU/credits.md deleted file mode 100644 index 01110ef8d5..0000000000 --- a/_pages/hu_HU/credits.md +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Készítők" ---- - -**Külön köszönet Plailect-nek, a guide eredeti készítőjének és karbantartójának!** -{: .notice--primary} - -**Külön köszönet mindenkinek [#Cakey-n Freenode-on](http://webchat.freenode.net/?channels=%23Cakey) a királyságért!** -{: .notice--primary} - -**Külön köszönet minden [fordítónak](https://crowdin.com/project/3ds-guide), amiért ilyen királyok!** -{: .notice--primary} - -Ha kihagytunk volna innen, lépj kapcsolatba velünk, és hozzáadjuk a neved. - -{% capture notice-1 %} - - + Al3x_10m - + aliaspider - + AngelSL - + ashinnblunts - + AuroraWright - + b1l1s - + BernardoGiordano - + Cartman123 - + Cell9 - + coder65535 - + Cruel - + d0k3 - + dank101 - + Dazzozo - + DeadPhoenix - + Delebile - + DinohScene - + dukesrg - + elementalcode - + elSeledonio - + erman1337 - + felipejfc - + figgyc - + fox8091 - + Frozen_Chen - + Gelex - + Hamcha - + icecream - + ihaveamac - + IngeniousDefault - + J-D-K - + Jisagi - + jkcgs - + kartik - + LordBass - + mid-kid - + MrNbaYoh - + Mrrraou - + Night_Fallen_Wolf - + Normmatt - + Plailect - + plutooo - + Psi-Hate - + RandallHoffman - + Raugo - + Reboot.ms - + s_99 - + SciresM - + Shadowtrance - + shinyquagsire23 - + skiptirengu - + smealum - + Steveice10 - + stuckpixel - + Syphurith - + Tech0verlord - + TiniVi - + TuxSH - + Urbanshadow - + Vappy - + vegaroxas - + Wolfvak - + WulfyStylez - + xy2_ - + yellows8 - + yifan_lu - + zoogie - -{% endcapture %} - -
{{ notice-1 | markdownify }}
diff --git a/_pages/hu_HU/credits.txt b/_pages/hu_HU/credits.txt new file mode 100644 index 0000000000..00ba0bf59b --- /dev/null +++ b/_pages/hu_HU/credits.txt @@ -0,0 +1,88 @@ +--- +title: "Credits" +--- + +**Special thanks to Plailect, the original creator and maintainer of the guide!** +{: .notice--primary} + +**Special thanks to all of [#Cakey on Freenode](http://webchat.freenode.net/?channels=%23Cakey) for being awesome!** +{: .notice--primary} + +**Special thanks to all of [the translators](https://crowdin.com/project/3ds-guide) for being awesome!** +{: .notice--primary} + +Ha kihagytunk volna innen, lépj kapcsolatba velünk, és hozzáadjuk a neved. + +{% capture notice-1 %} + + + Al3x_10m + + aliaspider + + AngelSL + + ashinnblunts + + AuroraWright + + b1l1s + + BernardoGiordano + + Cartman123 + + Cell9 + + coder65535 + + Cruel + + d0k3 + + dank101 + + Dazzozo + + DeadPhoenix + + Delebile + + DinohScene + + dukesrg + + elementalcode + + elSeledonio + + erman1337 + + felipejfc + + figgyc + + fox8091 + + Frozen_Chen + + Gelex + + Hamcha + + icecream + + ihaveamac + + IngeniousDefault + + J-D-K + + Jisagi + + jkcgs + + kartik + + LordBass + + mid-kid + + MrNbaYoh + + Mrrraou + + Night_Fallen_Wolf + + Normmatt + + Plailect + + plutooo + + Psi-Hate + + RandallHoffman + + Raugo + + Reboot.ms + + s_99 + + SciresM + + Shadowtrance + + shinyquagsire23 + + skiptirengu + + smealum + + Steveice10 + + stuckpixel + + Syphurith + + Tech0verlord + + TiniVi + + TuxSH + + Urbanshadow + + Vappy + + vegaroxas + + Wolfvak + + WulfyStylez + + xy2_ + + yellows8 + + yifan_lu + + zoogie + +{% endcapture %} + +
{{ notice-1 | markdownify }}
diff --git a/_pages/hu_HU/donations.md b/_pages/hu_HU/donations.txt similarity index 100% rename from _pages/hu_HU/donations.md rename to _pages/hu_HU/donations.txt diff --git a/_pages/hu_HU/finalizing-setup.txt b/_pages/hu_HU/finalizing-setup.txt index 31d396cacb..0d21124098 100644 --- a/_pages/hu_HU/finalizing-setup.txt +++ b/_pages/hu_HU/finalizing-setup.txt @@ -177,9 +177,6 @@ ___ Kész vagy! Az egyedi firmware most már teljesen be van állítva az eszközödön. {: .notice--success} -Szia! Szívesen veszünk visszajelzéseket az útmutatónk követéséről. Ha szeretnél segíteni, töltsd ki a kérdőívünket [itt](https://forms.gle/vZNoc4QLCz5MEXCK7) (csak angolul elérhető). Köszönjük! -{: .notice--info} - ### Információk és megjegyzések {% capture notice-6 %} diff --git a/_pages/hu_HU/homebrew-launcher-(super-skaterhax).txt b/_pages/hu_HU/homebrew-launcher-(super-skaterhax).txt index eeb180dd1a..5a8468f36e 100644 --- a/_pages/hu_HU/homebrew-launcher-(super-skaterhax).txt +++ b/_pages/hu_HU/homebrew-launcher-(super-skaterhax).txt @@ -64,7 +64,7 @@ Ha még nem történt meg, biztosítsd, hogy legyen működő Internet kapcsolat 1. Válaszd a "GO GO!" gombot a felső képernyőn + Ha bármilyen kérdés előjön, fogadd el mind + Ha az eszközöd lefagy egy sárga képernyőn, tartsd nyomva a POWER gombot, amíg ki nem kapcsol, és próbáld újra ezt a részt - + Ha az eszközöd lefagy egy piros képernyőn, tartsd nyomva a POWER gombot, amíg ki nem kapcsol, csináld újra a 3. lépést a II. részben, majd próbáld újra ezt a részt + + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section + Ha más hibát kapsz, próbáld meg 5x, és ha még minden nem megy [kövesd ezt a hibaelhárítási útmutatót](troubleshooting#homebrew-launcher-super-skaterhax) 1. Ha az exploit sikeres volt, a készülékének ezt követően be kell bootolnia a Homebrew Launcherbe 1. Kapcsold ki a készüléked diff --git a/_pages/hu_HU/include/bb3-prep.txt b/_pages/hu_HU/include/bb3-prep.txt new file mode 100644 index 0000000000..eadb7c2c20 --- /dev/null +++ b/_pages/hu_HU/include/bb3-prep.txt @@ -0,0 +1,23 @@ +Ebben a fejezetben fel fogod másolni azokat a fájlokat az eszközöd SD kártyájára, amik ahhoz szükségesek, hogy kiváltsák a BannerBomb3 exploit-ot. + +1. Kapcsold ki a készüléked +1. Helyezd az SD kártyád a számítógépbe +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Töltsd fel a `movable.sed` fájlod a "Choose File" opcióval +1. Kattints a "Build and Download"-ra + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + Az SD kártya gyökere a kezdőkönyvtárt jelenti az SD kártyán, ahol látható a Nintendo 3DS könyvtár, de nem vagyunk benne + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. Navigálj a `Nintendo 3DS` -> `` -> `` mappába az SD kártyádon + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. Hozz létre egy `Nintendo DSiWare` nevű mappát az `` mappában + + Ha már van mappád *és* van benne DSiWare mentés fájl (`<8-character-id>.bin`), másold őket a számítógépedre és töröld őket az SD kártyáról +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/hu_HU/include/fredtool-prep.txt b/_pages/hu_HU/include/fredtool-prep.txt new file mode 100644 index 0000000000..ff89b34ea7 --- /dev/null +++ b/_pages/hu_HU/include/fredtool-prep.txt @@ -0,0 +1,29 @@ +Ebben a fejezetben fel fogod másolni azokat a fájlokat, amik átmenetileg lecserélik a DS Connection Settings-t a Flipnote Studio-val, ami arra használt, hogy elindítsa a boot9strap (egyedi firmware) telepítőt. + +1. Helyezd az SD kártyád a számítógépbe +1. Nyisd meg a [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec/) oldalt a számítógépeden +1. A "Username" mező alatt adj meg egy tetszőleges alfanumerikus nevet (nem lehet benne szóköz vagy speciális karakter) +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. A "MovableSed" mező alatt töltsd fel a `movable.sed` fájlod a második "Browse..." opció használatával +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. Kattints a "Build"-re + + Várj néhány másodpercet a build folyamat befejezésére +1. A Build History szekcióban a bal oldalon gépeld be a felhasználónevet (Username) a "Filter Builds" mezőbe +1. Kattints az első keresési találatra + + Ennek kell a legutolsó időbélyeggel rendelkeznie +1. Kattints az "output_(name).zip" linkre +1. Navigálj a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` mappába az SD kártyán + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Másold át a `boot.firm` és `boot.3dsx` fájlt a Luma3DS `.zip`-ből az SD kártya gyökerébe + + Az SD kártya gyökere a kezdőkönyvtárt jelenti az SD kártyán, ahol látható a Nintendo 3DS könyvtár, de nem vagyunk benne +1. Másold át a `boot.nds`-t (B9STool) a release `.zip`-ből az SD kártyád gyökerébe +1. Másold át a `private` mappát a Frogminer_save `.zip`-ből az SD kártyád gyökerébe +1. Tedd vissza az SD kártyád a készülékedbe +1. Kapcsold be a készülékedet + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/hu_HU/include/fredtool-restore-dsconn.txt b/_pages/hu_HU/include/fredtool-restore-dsconn.txt new file mode 100644 index 0000000000..5c1e2e9618 --- /dev/null +++ b/_pages/hu_HU/include/fredtool-restore-dsconn.txt @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. Navigálj a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` mappába az SD kártyán +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. Tedd vissza az SD kártyád a készülékedbe +1. Kapcsold be a készülékedet +1. Lépj be a System Settings-be a készülékeden +1. Navigálj ide: `Data Management` -> `DSiWare` -> `SD Card` ([kép](/images/screenshots/bb3/dsiware-management.png)) +1. Válaszd "Nintendo DSi™" címet +1. Válaszd a "Copy"-t, majd az "OK"-t diff --git a/_pages/hu_HU/include/fredtool-write-flipnote.txt b/_pages/hu_HU/include/fredtool-write-flipnote.txt new file mode 100644 index 0000000000..b9e5c2a934 --- /dev/null +++ b/_pages/hu_HU/include/fredtool-write-flipnote.txt @@ -0,0 +1,11 @@ +Ebben a fejezetben másolni fogod a hackelt DS Connection Settings DSiWare-t a belső memóriába, ami átmenetileg lecseréli azt a Flipnote Studio-val. + +1. Lépj be a System Settings-be a készülékeden +1. Navigálj ide: `Data Management` -> `DSiWare` -> `SD Card` ([kép](/images/screenshots/bb3/dsiware-management.png)) +1. Válaszd a "Haxxxxxxxxx!" címet + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Válaszd a "Copy"-t, majd az "OK"-t +1. Térj vissza a System Settings főmenüjébe +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. Ha az exploit sikeres volt, a készülékednek ezt követően be kell töltenie a JPN verzióját a Flipnote Studio-nak + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/hu_HU/include/safemodecheck.txt b/_pages/hu_HU/include/safemodecheck.txt index 807c7498c1..5b7616553a 100644 --- a/_pages/hu_HU/include/safemodecheck.txt +++ b/_pages/hu_HU/include/safemodecheck.txt @@ -1,3 +1,5 @@ +In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page. + 1. Kapcsold be a készülékedet 1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time + The camera applet should appear diff --git a/_pages/hu_HU/include/seedminer-base.txt b/_pages/hu_HU/include/seedminer-base.txt index fdccc7d655..e4cf99eaf9 100644 --- a/_pages/hu_HU/include/seedminer-base.txt +++ b/_pages/hu_HU/include/seedminer-base.txt @@ -15,10 +15,12 @@ Ez a módszer egy erős grafikus kártyát használ a szükséges számítások Ebben a fejezetben összeszedjük a szükséges információkat a 3DS-edről, ami ahhoz kell, hogy kitaláljuk az eszközöd titkosító kulcsát. +{% capture console_state_info %} Mielőtt követnéd ezt a fejezetet: + Biztosítsd, hogy a konzolod bekapcsolásra kerüljön a behelyezett SD kártyával legalább egyszer, hogy létre jöjjön rajta a szükséges adat + Biztosítsd, hogy a konzolod csatlakoztatva legyen az Internethez (látnod kell egy kék "Internet" jelzőt, a bal felső sarkában a HOME képernyőnek) -{: .notice--info} +{% endcapture %} +
{{ console_state_info | markdownify }}
1. Kapcsold ki a készüléked 1. Helyezd az SD kártyád a számítógépbe diff --git a/_pages/hu_HU/installing-boot9strap-(fredtool).txt b/_pages/hu_HU/installing-boot9strap-(fredtool).txt index 6808a197de..f2344b2eb2 100644 --- a/_pages/hu_HU/installing-boot9strap-(fredtool).txt +++ b/_pages/hu_HU/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ Ez egy jelenleg működő megvalósítása a "FIRM partitions known-plaintext" n
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ### Amire szükséged lesz * A `movable.sed` fájlodra a [Seedminer](seedminer)-ből * A [Frogminer_save] legújabb kiadása (https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* A [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) legfrissebb verziója (közvetlen letöltés) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * A [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) legújabb kiadása (a Luma3DS `.zip` fájl) #### I. rész - CHF ellenőrzés @@ -42,49 +45,11 @@ Ebben a fejezetben elő fogod idézni a BannerBomb3 exploit-ot a DSIWare Managem #### III. rész - Előkészületek -Ebben a fejezetben fel fogod másolni azokat a fájlokat, amik átmenetileg lecserélik a DS Connection Settings-t a Flipnote Studio-val, ami arra használt, hogy elindítsa a boot9strap (egyedi firmware) telepítőt. - -1. Helyezd az SD kártyád a számítógépbe -1. Nyisd meg a [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec/) oldalt a számítógépeden -1. A "Username" mező alatt adj meg egy tetszőleges alfanumerikus nevet (nem lehet benne szóköz vagy speciális karakter) -1. A "DSiBin" mező alatt töltsd fel a `42383841.bin` fájlodat az SD kártyád gyökeréről az első "Browse..." opció használatával -1. A "MovableSed" mező alatt töltsd fel a `movable.sed` fájlod a második "Browse..." opció használatával -1. Az "InjectionTarget" mező alatt válaszd ki az injection target-et `DSinternet`-re (NEM memorypit) -1. Kattints a "Build"-re - + Várj néhány másodpercet a build folyamat befejezésére -1. A Build History szekcióban a bal oldalon gépeld be a felhasználónevet (Username) a "Filter Builds" mezőbe -1. Kattints az első keresési találatra - + Ennek kell a legutolsó időbélyeggel rendelkeznie -1. Kattints az "output_(name).zip" linkre -1. Navigálj a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` mappába az SD kártyán - + Az `` egy 32 karakter hosszú mappanév, amit a [Seedminer](seedminer)-nél másoltál - + Az `` egy 32 karakter hosszú nevű mappa az `` mappában -1. Töröld `F00D43D5.bin` fájlt a Nintendo DSiWare mappából -1. Másold a `42383841.bin` fájlt az `hax` mappájából a letöltött DSiWare csomagból (output_(name).zip) a `Nintendo DSiWare` mappába - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Másold át a `boot.firm` és `boot.3dsx` fájlt a Luma3DS `.zip`-ből az SD kártya gyökerébe - + Az SD kártya gyökere a kezdőkönyvtárt jelenti az SD kártyán, ahol látható a Nintendo 3DS könyvtár, de nem vagyunk benne -1. Másold át a `boot.nds`-t (B9STool) a release `.zip`-ből az SD kártyád gyökerébe -1. Másold át a `private` mappát a Frogminer_save `.zip`-ből az SD kártyád gyökerébe -1. Tedd vissza az SD kártyád a készülékedbe -1. Kapcsold be a készülékedet - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.txt %} #### IV. rész - A DS Connection Settings felülírása -Ebben a fejezetben másolni fogod a hackelt DS Connection Settings DSiWare-t a belső memóriába, ami átmenetileg lecseréli azt a Flipnote Studio-val. - -1. Lépj be a System Settings-be a készülékeden -1. Navigálj ide: `Data Management` -> `DSiWare` -> `SD Card` ([kép](/images/screenshots/bb3/dsiware-management.png)) -1. Válaszd a "Haxxxxxxxxx!" címet - + IHa nem tudod kiválasztani a "Haxxxxxxxxx" címet, [kövesd ezt a hibaelhárítási útmutatót](troubleshooting#installing-boot9strap-fredtool) -1. Válaszd a "Copy"-t, majd az "OK"-t -1. Térj vissza a System Settings főmenüjébe -1. Navigálj az `Internet Settings` -> `Nintendo DS Connections` opcióhoz, majd válaszd az "OK"-t ([kép](/images/screenshots/fredtool/dsconnection.png)) -1. Ha az exploit sikeres volt, a készülékednek ezt követően be kell töltenie a JPN verzióját a Flipnote Studio-nak - + Ha az eszközöd nem tölti be a Flipnote Studio JPN verzióját, [kövesd ezt a hibaelhárítási útmutatót](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.txt %} #### V. rész - Flipnote Exploit @@ -99,18 +64,10 @@ Ebben a fejezetben másolni fogod a hackelt DS Connection Settings DSiWare-t a b #### VII. rész - A DS Connection Settings visszaállítása -Ebben a fejezetben vissza fogod állítano a DS Connection Settings-et az az előtti állapotára, mielőtt lecserélésre került a Flipnote Studio-ra a IV. részben. - -1. Navigálj a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` mappába az SD kártyán -1. Másold a `42383841.bin` fájlt az `clean` mappájából a letöltött DSiWare csomagból (output_(name).zip) a `Nintendo DSiWare` mappába, felülírva az ott találhatót -1. Tedd vissza az SD kártyád a készülékedbe -1. Kapcsold be a készülékedet -1. Lépj be a System Settings-be a készülékeden -1. Navigálj ide: `Data Management` -> `DSiWare` -> `SD Card` ([kép](/images/screenshots/bb3/dsiware-management.png)) -1. Válaszd "Nintendo DSi™" címet -1. Válaszd a "Copy"-t, majd az "OK"-t +{% include_relative include/fredtool-restore-dsconn.txt %} ___ + ### Tovább a [telepítés véglegesítésére](finalizing-setup) {: .notice--primary} diff --git a/_pages/hu_HU/installing-boot9strap-(fredtool-legacy).txt b/_pages/hu_HU/installing-boot9strap-(fredtool-legacy).txt new file mode 100644 index 0000000000..4de9860741 --- /dev/null +++ b/_pages/hu_HU/installing-boot9strap-(fredtool-legacy).txt @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title="Tartalomjegyzék" %} + +{% capture technical_info %} +Technikai részletek (opcionális) + +Ahhoz, hogy a rendszerből kinyerjük a DSiWare adatokat, egy hibát használunk ki a DSiWare adat kezelési ablakában, a rendszer beállításokban. + +Hogy ezt elérjük, szükségünk van a rendszer titkosítási kulcsára (movable.sed), hogy újra építsünk egy DSiWare mentést, aminek segítségével ki tudjuk nyerni a DSi Internet beállítások alkalmazást az SD kártyára. + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +Ez egy jelenleg működő megvalósítása a "FIRM partitions known-plaintext" néven ismert exploitnak, amiről részletesebben olvashatsz [itt](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +### Amire szükséged lesz + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* A [Frogminer_save] legújabb kiadása (https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* A [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) legújabb kiadása (a Luma3DS `.zip` fájl) + +#### I. rész - CHF ellenőrzés + +{% include_relative include/cfw-check-fredtool.txt %} + +#### II. rész - BannerBomb3 + +Ebben a fejezetben elő fogod idézni a BannerBomb3 exploit-ot a DSIWare Management menü használatával és lemásolni az eredmény dump fájlt a számítógépedre, hogy fel tudd használni a következő fejezetben. + +1. Tedd vissza az SD kártyád a készülékedbe +1. Kapcsold be a készülékedet +1. Lépj be a System Settings-be a készülékeden +1. Navigálj ide: `Data Management` -> `DSiWare` -> `SD Card` ([kép](/images/screenshots/bb3/dsiware-management.png)) + + Az eszközödnek a BB3 multihax menüt kell mutatnia + + Ha összeomlik a rendszered ebben a lépésben, [kövesd ezt a hibaelhárítási útmutatót](troubleshooting#installing-boot9strap-fredtool) +1. Használd a D-Pad-et a navigáláshoz, és nyomd meg az (A) gombot a "Dump DSiWare" kiválasztásához + + Az eszközöd automatikusan újra fog indulni +1. Kapcsold ki a készüléked + +#### III. rész - Előkészületek + +{% include_relative include/fredtool-prep.txt %} + +#### IV. rész - A DS Connection Settings felülírása + +{% include_relative include/fredtool-write-flipnote.txt %} + +#### V. rész - Flipnote Exploit + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### VI. rész - Luma3DS beállítás + +1. Nyomd le és tartsd nyomva a (Select) gombot, és a (Select) nyomva tartása mellett kapcsold be az eszközödet. Ez el fogja indítani a Luma3DS beállításokat +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### VII. rész - A DS Connection Settings visszaállítása + +{% include_relative include/fredtool-restore-dsconn.txt %} + +___ + + +### Tovább a [telepítés véglegesítésére](finalizing-setup) +{: .notice--primary} diff --git a/_pages/hu_HU/seedminer-(mii).txt b/_pages/hu_HU/seedminer-(mii).txt new file mode 100644 index 0000000000..035e498f48 --- /dev/null +++ b/_pages/hu_HU/seedminer-(mii).txt @@ -0,0 +1,84 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title="Tartalomjegyzék" %} + +{% capture gpu_warning %} +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: ++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) ++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple) ++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) ++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{% endcapture %} +
{{ gpu_warning | markdownify }}
+ +{% capture technical_info %} +Technikai részletek (opcionális) + +A boot9strap telepítéséhez az eszközödre, megfejtjük az eszköz egyedi titkosító kulcsát. Ennek eléréséhez egy Seedminer nevű eszközt fogunk használni, hogy kiszámítsuk a készüléked adat titkosítási kulcsát (movable.sed). + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +További információért arról, hogyan működik a Seedminer, nézd meg [ezt a prezentációt](https://zoogie.github.io/web/34⅕c3). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### Amire szükséged lesz + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### I. rész - Előkészületek + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/hu_HU/site-navigation.txt b/_pages/hu_HU/site-navigation.txt index 9f09cf44b5..aaf22994bb 100644 --- a/_pages/hu_HU/site-navigation.txt +++ b/_pages/hu_HU/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [A9LH-ről B9S-re](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) + [Közreműködők](credits) + [CFW ellenőrzése](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [Főoldal](/) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [Boot9strap telepítése (Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [Boot9strap telepítése (Frogtool)](installing-boot9strap-(frogtool)) + [Boot9strap telepítése (Hardmod)](installing-boot9strap-(hardmod)) + [Boot9strap telepítése (HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [Régióváltás](region-changing) + [CFW visszaállítása / frissítése](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (TWN)](seedminer-(twn)) + [Hibaelhárítás](troubleshooting) + [CFW eltávolítása](uninstall-cfw) diff --git a/_pages/hu_HU/updating-firmware-(kor).txt b/_pages/hu_HU/updating-firmware-(kor).txt new file mode 100644 index 0000000000..e010f4dca4 --- /dev/null +++ b/_pages/hu_HU/updating-firmware-(kor).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (KOR)" +--- + +### Fontos tudnivalók + +To use the Seedminer exploit, you must update your device to the latest system version. + +### Amire szükséged lesz + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer](seedminer) +{: .notice--primary} diff --git a/_pages/hu_HU/updating-firmware-(kor-twn).md b/_pages/hu_HU/updating-firmware-(kor-twn).md deleted file mode 100644 index 74a2b48f90..0000000000 --- a/_pages/hu_HU/updating-firmware-(kor-twn).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (KOR/TWN)" ---- - -### Required Reading - -To use the Seedminer exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Seedminer](seedminer) -{: .notice--primary} diff --git a/_pages/hu_HU/updating-firmware-(new-3ds).txt b/_pages/hu_HU/updating-firmware-(new-3ds).txt new file mode 100644 index 0000000000..f23f5f5eb0 --- /dev/null +++ b/_pages/hu_HU/updating-firmware-(new-3ds).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (New 3DS)" +--- + +### Fontos tudnivalók + +To use the super-skaterhax exploit, you must update your device to the latest system version. + +### Amire szükséged lesz + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) +{: .notice--primary} diff --git a/_pages/hu_HU/updating-firmware-(twn).txt b/_pages/hu_HU/updating-firmware-(twn).txt new file mode 100644 index 0000000000..1b9df7eaf6 --- /dev/null +++ b/_pages/hu_HU/updating-firmware-(twn).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (TWN)" +--- + +### Fontos tudnivalók + +To use the Seedminer exploit, you must update your device to the latest system version. + +### Amire szükséged lesz + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer (TWN)](seedminer-(twn)) +{: .notice--primary} diff --git a/_pages/id_ID/404.md b/_pages/id_ID/404.txt similarity index 100% rename from _pages/id_ID/404.md rename to _pages/id_ID/404.txt diff --git a/_pages/id_ID/bannerbomb3-(legacy).txt b/_pages/id_ID/bannerbomb3-(legacy).txt new file mode 100644 index 0000000000..503794c42a --- /dev/null +++ b/_pages/id_ID/bannerbomb3-(legacy).txt @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title="Table of Contents" %} + +{% capture technical_info %} +Technical Details (optional) + +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### Compatibility Notes + +These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. + +### What You Need + +* Your `movable.sed` file from completing Seedminer or nimhax + +#### Section I - Prep Work + +{% include_relative include/bb3-prep.txt %} + +#### Section II - Hardware Button Check + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### Next steps: Choose an exploit + +If the camera appeared in the previous section, Safe Mode is likely to be working on your device. + +If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/id_ID/bannerbomb3.txt b/_pages/id_ID/bannerbomb3.txt index 7767c4aeb1..a8383926fd 100644 --- a/_pages/id_ID/bannerbomb3.txt +++ b/_pages/id_ID/bannerbomb3.txt @@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. - -1. Power off your device -1. Insert your SD card into your computer -1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer -1. Upload your movable.sed using the “Choose File” option -1. Click “Build and Download” - + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) -1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it - + This file does not need to be opened or extracted - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.txt %} #### Section II - Hardware Button Check -In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. - -Your SD card should remain in your computer while you perform this check. - {% include_relative include/safemodecheck.txt %} ___ diff --git a/_pages/nl_NL/credits.md b/_pages/id_ID/credits.txt similarity index 100% rename from _pages/nl_NL/credits.md rename to _pages/id_ID/credits.txt diff --git a/_pages/id_ID/donations.md b/_pages/id_ID/donations.txt similarity index 100% rename from _pages/id_ID/donations.md rename to _pages/id_ID/donations.txt diff --git a/_pages/id_ID/finalizing-setup.txt b/_pages/id_ID/finalizing-setup.txt index f16b13698a..e41bd44dcd 100644 --- a/_pages/id_ID/finalizing-setup.txt +++ b/_pages/id_ID/finalizing-setup.txt @@ -177,9 +177,6 @@ ___ You're done! Custom firmware is now fully configured on your device. {: .notice--success} -Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! -{: .notice--info} - ### Information and Notes {% capture notice-6 %} diff --git a/_pages/id_ID/homebrew-launcher-(super-skaterhax).txt b/_pages/id_ID/homebrew-launcher-(super-skaterhax).txt index ea288c3163..7b83fe0d7e 100644 --- a/_pages/id_ID/homebrew-launcher-(super-skaterhax).txt +++ b/_pages/id_ID/homebrew-launcher-(super-skaterhax).txt @@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up 1. Select the "GO GO!" button on the top screen + If any prompts appear, approve all of them + If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section + + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) 1. If the exploit was successful, your device will have booted into the Homebrew Launcher 1. Power off your device diff --git a/_pages/id_ID/include/bb3-prep.txt b/_pages/id_ID/include/bb3-prep.txt new file mode 100644 index 0000000000..0b0965f3de --- /dev/null +++ b/_pages/id_ID/include/bb3-prep.txt @@ -0,0 +1,23 @@ +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + +1. Power off your device +1. Insert your SD card into your computer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. Create a folder named `Nintendo DSiWare` inside of the `` + + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/id_ID/include/fredtool-prep.txt b/_pages/id_ID/include/fredtool-prep.txt new file mode 100644 index 0000000000..cff8aa806d --- /dev/null +++ b/_pages/id_ID/include/fredtool-prep.txt @@ -0,0 +1,29 @@ +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. + +1. Insert your SD card into your computer +1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer +1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. Click "Build" + + Wait a few seconds for the build process to complete +1. In the Build History section on the left, type the Username into the "Filter Builds" field +1. Click on the first search result + + This result should have the latest timestamp +1. Click the "output_(name).zip" link +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card +1. Reinsert your SD card into your device +1. Power on your device + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/id_ID/include/fredtool-restore-dsconn.txt b/_pages/id_ID/include/fredtool-restore-dsconn.txt new file mode 100644 index 0000000000..3057b3ac9d --- /dev/null +++ b/_pages/id_ID/include/fredtool-restore-dsconn.txt @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title +1. Select "Copy", then select "OK" diff --git a/_pages/id_ID/include/fredtool-write-flipnote.txt b/_pages/id_ID/include/fredtool-write-flipnote.txt new file mode 100644 index 0000000000..cb6f428624 --- /dev/null +++ b/_pages/id_ID/include/fredtool-write-flipnote.txt @@ -0,0 +1,11 @@ +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Select "Copy", then select "OK" +1. Return to main menu of the System Settings +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/id_ID/include/safemodecheck.txt b/_pages/id_ID/include/safemodecheck.txt index 43ebec6575..7035baace8 100644 --- a/_pages/id_ID/include/safemodecheck.txt +++ b/_pages/id_ID/include/safemodecheck.txt @@ -1,3 +1,5 @@ +In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page. + 1. Power on your device 1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time + The camera applet should appear diff --git a/_pages/id_ID/include/seedminer-base.txt b/_pages/id_ID/include/seedminer-base.txt index e3493c2f87..ad6697a5fa 100644 --- a/_pages/id_ID/include/seedminer-base.txt +++ b/_pages/id_ID/include/seedminer-base.txt @@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. +{% capture console_state_info %} Before following this section: + Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data + Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen) -{: .notice--info} +{% endcapture %} +
{{ console_state_info | markdownify }}
1. Power off your device 1. Insert your SD card into your computer diff --git a/_pages/id_ID/installing-boot9strap-(fredtool).txt b/_pages/id_ID/installing-boot9strap-(fredtool).txt index ea9d81c010..455c3317a3 100644 --- a/_pages/id_ID/installing-boot9strap-(fredtool).txt +++ b/_pages/id_ID/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ### What You Need * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) #### Section I - CFW Check @@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana #### Section III - Prep Work -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Insert your SD card into your computer -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert your SD card into your device -1. Power on your device - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.txt %} #### Section IV - Overwriting DS Connection Settings -In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. - -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Haxxxxxxxxx!" title - + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Select "Copy", then select "OK" -1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) -1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio - + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.txt %} #### Section V - Flipnote Exploit @@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte #### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. - -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Nintendo DSi™" title -1. Select "Copy", then select "OK" +{% include_relative include/fredtool-restore-dsconn.txt %} ___ + ### Continue to [Finalizing Setup](finalizing-setup) {: .notice--primary} diff --git a/_pages/id_ID/installing-boot9strap-(fredtool-legacy).txt b/_pages/id_ID/installing-boot9strap-(fredtool-legacy).txt new file mode 100644 index 0000000000..1513694ebd --- /dev/null +++ b/_pages/id_ID/installing-boot9strap-(fredtool-legacy).txt @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title="Table of Contents" %} + +{% capture technical_info %} +Technical Details (optional) + +To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +### What You Need + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) + +#### Section I - CFW Check + +{% include_relative include/cfw-check-fredtool.txt %} + +#### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically reboot +1. Power off your device + +#### Section III - Prep Work + +{% include_relative include/fredtool-prep.txt %} + +#### Section IV - Overwriting DS Connection Settings + +{% include_relative include/fredtool-write-flipnote.txt %} + +#### Section V - Flipnote Exploit + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### Section VI - Luma3DS Configuration + +1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### Section VII - Restoring DS Connection Settings + +{% include_relative include/fredtool-restore-dsconn.txt %} + +___ + + +### Continue to [Finalizing Setup](finalizing-setup) +{: .notice--primary} diff --git a/_pages/id_ID/seedminer-(mii).txt b/_pages/id_ID/seedminer-(mii).txt new file mode 100644 index 0000000000..5faf224c22 --- /dev/null +++ b/_pages/id_ID/seedminer-(mii).txt @@ -0,0 +1,84 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title="Table of Contents" %} + +{% capture gpu_warning %} +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: ++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) ++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple) ++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) ++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{% endcapture %} +
{{ gpu_warning | markdownify }}
+ +{% capture technical_info %} +Technical Details (optional) + +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### What you need + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### Section I - Prep Work + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/id_ID/site-navigation.txt b/_pages/id_ID/site-navigation.txt index a2135747ab..179a8a4b0b 100644 --- a/_pages/id_ID/site-navigation.txt +++ b/_pages/id_ID/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [A9LH to B9S](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) + [Credits](credits) + [Checking for CFW](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [Home](/) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) + [Installing boot9strap (Hardmod)](installing-boot9strap-(hardmod)) + [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [Region Changing](region-changing) + [Restoring / Updating CFW](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (TWN)](seedminer-(twn)) + [Troubleshooting](troubleshooting) + [Uninstall CFW](uninstall-cfw) diff --git a/_pages/id_ID/updating-firmware-(kor).txt b/_pages/id_ID/updating-firmware-(kor).txt new file mode 100644 index 0000000000..4b08786c27 --- /dev/null +++ b/_pages/id_ID/updating-firmware-(kor).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (KOR)" +--- + +### Required Reading + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer](seedminer) +{: .notice--primary} diff --git a/_pages/id_ID/updating-firmware-(kor-twn).md b/_pages/id_ID/updating-firmware-(kor-twn).md deleted file mode 100644 index 74a2b48f90..0000000000 --- a/_pages/id_ID/updating-firmware-(kor-twn).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (KOR/TWN)" ---- - -### Required Reading - -To use the Seedminer exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Seedminer](seedminer) -{: .notice--primary} diff --git a/_pages/es_ES/updating-firmware-(new-3ds).md b/_pages/id_ID/updating-firmware-(new-3ds).txt similarity index 100% rename from _pages/es_ES/updating-firmware-(new-3ds).md rename to _pages/id_ID/updating-firmware-(new-3ds).txt diff --git a/_pages/id_ID/updating-firmware-(twn).txt b/_pages/id_ID/updating-firmware-(twn).txt new file mode 100644 index 0000000000..83e6992b1b --- /dev/null +++ b/_pages/id_ID/updating-firmware-(twn).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (TWN)" +--- + +### Required Reading + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer (TWN)](seedminer-(twn)) +{: .notice--primary} diff --git a/_pages/it_IT/404.md b/_pages/it_IT/404.txt similarity index 100% rename from _pages/it_IT/404.md rename to _pages/it_IT/404.txt diff --git a/_pages/it_IT/bannerbomb3-(legacy).txt b/_pages/it_IT/bannerbomb3-(legacy).txt new file mode 100644 index 0000000000..1f252d0588 --- /dev/null +++ b/_pages/it_IT/bannerbomb3-(legacy).txt @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title="Indice" %} + +{% capture technical_info %} +Dettagli Tecnici (opzionale) + +Per avviare codice non ufficiale, approfittiamo di una falla di sicurezza nella sezione Gestione Nintendo DSiWare dell'applicazione Impostazioni della console. + +A questo scopo, useremo la chiave di crittografia della tua console (movable.sed) per generare un backup DSiWare che possa essere avviato dalla console. + +Per una spiegazione più tecnica, vedi [qui](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### Note di Compatibilità + +Queste istruzioni funzionano su console americane, europee, giapponesi e coreane, indicate rispettivamente dalle lettere U, E, J o K dopo la versione del sistema operativo. + +### Cosa serve + +* Il tuo file `movable.sed` ottenuto completando Seedminer o nimhax + +#### Sezione I - Preparazione + +{% include_relative include/bb3-prep.txt %} + +#### Sezione II - Verifica Pulsanti Hardware + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### Passaggi successivi: Scelta di un exploit + +If the camera appeared in the previous section, Safe Mode is likely to be working on your device. + +If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/it_IT/bannerbomb3.txt b/_pages/it_IT/bannerbomb3.txt index 62f1624202..21ab809892 100644 --- a/_pages/it_IT/bannerbomb3.txt +++ b/_pages/it_IT/bannerbomb3.txt @@ -30,36 +30,10 @@ Se hai una console taiwanese (indicata da una T dopo la versione di sistema), se #### Sezione I - Preparazione -In questa sezione, copierai i file necessari per attivare l'exploit BannerBomb3 nella scheda SD della tua console. - -1. Spegni il tuo 3DS -1. Inserisci la scheda SD nel tuo computer -1. Avvia [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) sul tuo computer -1. Carica il tuo file movable.sed scegliendo l'opzione “Choose File” -1. Seleziona "Build and Download” - + Verrà scaricato un exploit DSiWare chiamato `F00D43D5.bin` e un payload chiamato `bb3.bin` all'interno di un archivio zip (`DSIWARE_EXPLOIT.zip`) -1. Copia il file `bb3.bin` da `DSIWARE_EXPLOIT.zip` nella directory principale della tua scheda SD - + La directory principale della scheda SD è la cartella della tua scheda SD in cui è possibile visualizzare la cartella Nintendo 3DS, ma non il suo interno - + Questo file non ha bisogno di essere aperto o estratto - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. Nella tua scheda SD, entra in `Nintendo 3DS` -> `` -> `` - + `` è il nome a 32 lettere della cartella che hai copiato in [Seedminer](seedminer) - + `` è una cartella dal nome lungo 32 caratteri all'interno di `` - + Se hai più cartelle ``, segui le istruzioni [here](troubleshooting#bannerbomb3) - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Crea una cartella chiamata `Nintendo DSiWare` all'interno di `` - + Se hai già la cartella *e* sono già presenti dei file di backup DSiWare (`.bin`) all'interno, copiali sul PC e rimuovili dalla scheda SD -1. Copia il file `F00D43D5.bin` da `DSIWARE_EXPLOIT.zip` nella cartella `Nintendo DSiWare` - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.txt %} #### Sezione II - Verifica Pulsanti Hardware -In questa sezione controllerai se la tua console può accedere alla Modalità Provvisoria. Serve per determinare quale metodo seguirai nella prossima pagina. - -La tua scheda SD dovrebbe rimanere nel tuo computer mentre effettui questo controllo. - {% include_relative include/safemodecheck.txt %} ___ diff --git a/_pages/it_IT/credits.md b/_pages/it_IT/credits.md deleted file mode 100644 index 205035bb07..0000000000 --- a/_pages/it_IT/credits.md +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Riconoscimenti" ---- - -**Un ringraziamento speciale a Plailect, il creatore e manutentore originale della guida!** -{: .notice--primary} - -**Un ringraziamento speciale a tutti gli utenti di [#Cakey su Freenode](http://webchat.freenode.net/?channels=%23Cakey)! Siete fantastici!** -{: .notice--primary} - -**Un ringraziamento speciale a tutti [i traduttori](https://crowdin.com/project/3ds-guide)! Siete fantastici!** -{: .notice--primary} - -Se ho dimenticato di inserirti in questa lista, contattami e ti aggiungerò. - -{% capture notice-1 %} - - + Al3x_10m - + aliaspider - + AngelSL - + ashinnblunts - + AuroraWright - + b1l1s - + BernardoGiordano - + Cartman123 - + Cell9 - + coder65535 - + Cruel - + d0k3 - + dank101 - + Dazzozo - + DeadPhoenix - + Delebile - + DinohScene - + dukesrg - + elementalcode - + elSeledonio - + erman1337 - + felipejfc - + figgyc - + fox8091 - + Frozen_Chen - + Gelex - + Hamcha - + icecream - + ihaveamac - + IngeniousDefault - + J-D-K - + Jisagi - + jkcgs - + kartik - + LordBass - + mid-kid - + MrNbaYoh - + Mrrraou - + Night_Fallen_Wolf - + Normmatt - + Plailect - + plutooo - + Psi-Hate - + RandallHoffman - + Raugo - + Reboot.ms - + s_99 - + SciresM - + Shadowtrance - + shinyquagsire23 - + skiptirengu - + smealum - + Steveice10 - + stuckpixel - + Syphurith - + Tech0verlord - + TiniVi - + TuxSH - + Urbanshadow - + Vappy - + vegaroxas - + Wolfvak - + WulfyStylez - + xy2_ - + yellows8 - + yifan_lu - + zoogie - -{% endcapture %} - -
{{ notice-1 | markdownify }}
diff --git a/_pages/it_IT/credits.txt b/_pages/it_IT/credits.txt new file mode 100644 index 0000000000..37f3525e31 --- /dev/null +++ b/_pages/it_IT/credits.txt @@ -0,0 +1,88 @@ +--- +title: "Credits" +--- + +**Special thanks to Plailect, the original creator and maintainer of the guide!** +{: .notice--primary} + +**Special thanks to all of [#Cakey on Freenode](http://webchat.freenode.net/?channels=%23Cakey) for being awesome!** +{: .notice--primary} + +**Special thanks to all of [the translators](https://crowdin.com/project/3ds-guide) for being awesome!** +{: .notice--primary} + +Se ho dimenticato di inserirti in questa lista, contattami e ti aggiungerò. + +{% capture notice-1 %} + + + Al3x_10m + + aliaspider + + AngelSL + + ashinnblunts + + AuroraWright + + b1l1s + + BernardoGiordano + + Cartman123 + + Cell9 + + coder65535 + + Cruel + + d0k3 + + dank101 + + Dazzozo + + DeadPhoenix + + Delebile + + DinohScene + + dukesrg + + elementalcode + + elSeledonio + + erman1337 + + felipejfc + + figgyc + + fox8091 + + Frozen_Chen + + Gelex + + Hamcha + + icecream + + ihaveamac + + IngeniousDefault + + J-D-K + + Jisagi + + jkcgs + + kartik + + LordBass + + mid-kid + + MrNbaYoh + + Mrrraou + + Night_Fallen_Wolf + + Normmatt + + Plailect + + plutooo + + Psi-Hate + + RandallHoffman + + Raugo + + Reboot.ms + + s_99 + + SciresM + + Shadowtrance + + shinyquagsire23 + + skiptirengu + + smealum + + Steveice10 + + stuckpixel + + Syphurith + + Tech0verlord + + TiniVi + + TuxSH + + Urbanshadow + + Vappy + + vegaroxas + + Wolfvak + + WulfyStylez + + xy2_ + + yellows8 + + yifan_lu + + zoogie + +{% endcapture %} + +
{{ notice-1 | markdownify }}
diff --git a/_pages/it_IT/donations.md b/_pages/it_IT/donations.txt similarity index 100% rename from _pages/it_IT/donations.md rename to _pages/it_IT/donations.txt diff --git a/_pages/it_IT/finalizing-setup.txt b/_pages/it_IT/finalizing-setup.txt index 1c7859de86..0eb0ccc973 100644 --- a/_pages/it_IT/finalizing-setup.txt +++ b/_pages/it_IT/finalizing-setup.txt @@ -177,9 +177,6 @@ ___ Hai finito! Il custom firmware nella tua console è stato completamente configurato. {: .notice--success} -Ciao! Siamo interessati ad avere un feedback sull'esperienza complessiva sulla nostra guida. Se vuoi aiutarci, dai un'occhiata a [questo](https://forms.gle/vZNoc4QLCz5MEXCK7) sondaggio (disponibile solo in inglese). Grazie! -{: .notice--info} - ### Informazioni e Note {% capture notice-6 %} diff --git a/_pages/it_IT/homebrew-launcher-(super-skaterhax).txt b/_pages/it_IT/homebrew-launcher-(super-skaterhax).txt index 7b46104641..148d4d0cf4 100644 --- a/_pages/it_IT/homebrew-launcher-(super-skaterhax).txt +++ b/_pages/it_IT/homebrew-launcher-(super-skaterhax).txt @@ -64,7 +64,7 @@ Se non l'hai già fatto, assicurati di avere una connessione Internet funzionant 1. Seleziona il pulsante "GO GO!" nella schermata superiore + Se vengono visualizzate delle richieste, approvale tutte + Se la tua console si blocca con una schermata gialla, tieni premuto il pulsante POWER finché non si spegne, quindi riprova questa sezione - + Se la tua console si blocca con una schermata rossa, tieni premuto il pulsante POWER finché non si spegne, riprova il passo 3 della Sezione II, quindi riprova questa sezione + + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) 1. Se l'exploit ha avuto successo, la tua console avrà avviato l'Homebrew Launcher 1. Spegni il tuo 3DS diff --git a/_pages/it_IT/include/bb3-prep.txt b/_pages/it_IT/include/bb3-prep.txt new file mode 100644 index 0000000000..2e119ba847 --- /dev/null +++ b/_pages/it_IT/include/bb3-prep.txt @@ -0,0 +1,23 @@ +In questa sezione, copierai i file necessari per attivare l'exploit BannerBomb3 nella scheda SD della tua console. + +1. Spegni il tuo 3DS +1. Inserisci la scheda SD nel tuo computer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Carica il tuo file movable.sed scegliendo l'opzione “Choose File” +1. Seleziona "Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + La directory principale della scheda SD è la cartella della tua scheda SD in cui è possibile visualizzare la cartella Nintendo 3DS, ma non il suo interno + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. Nella tua scheda SD, entra in `Nintendo 3DS` -> `` -> `` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. Crea una cartella chiamata `Nintendo DSiWare` all'interno di `` + + Se hai già la cartella *e* sono già presenti dei file di backup DSiWare (`.bin`) all'interno, copiali sul PC e rimuovili dalla scheda SD +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/it_IT/include/fredtool-prep.txt b/_pages/it_IT/include/fredtool-prep.txt new file mode 100644 index 0000000000..f92a4c253c --- /dev/null +++ b/_pages/it_IT/include/fredtool-prep.txt @@ -0,0 +1,29 @@ +In questa sezione copierai i file necessari per sostituire temporaneamente "Impostazioni di collegamento" con Flipnote Studio, usato per lanciare l'installer di boot9strap (custom firmware). + +1. Inserisci la scheda SD nel tuo computer +1. Apri il sito [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) sul tuo computer +1. Sotto il campo "Username" inserisci un nome alfanumerico qualunque (senza spazi o caratteri speciali) +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. Sul campo "MovableSed", carica il tuo file `movable.sed` usando la seconda opzione "Browse..." +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. Clicca "Build" + + Attendi qualche secondo che termini il processo di compilazione +1. Nella sezione "Build History" a sinistra, inserisci l'Username nel campo "Filter Builds" +1. Clicca sul primo risultato della ricerca + + Dovrebbe avere la data più recente +1. Clicca il link "output_(name).zip" +1. Nella tua scheda SD, entra in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copia i file `boot.firm` e `boot.3dsx` dall'archivio `.zip` di Luma3DS nella directory principale della tua scheda SD + + La directory principale della scheda SD è la cartella della tua scheda SD in cui è possibile visualizzare la cartella Nintendo 3DS, ma non il suo interno +1. Copia il file `boot.nds` (B9STool) dall'archivio `.zip` di b9sTool nella directory principale della tua scheda SD +1. Copia la cartella `private` presente nell'archivio `.zip` di Frogminer_save nella directory principale della tua scheda SD +1. Reinserisci la scheda SD nella tua console +1. Accendi la console + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/it_IT/include/fredtool-restore-dsconn.txt b/_pages/it_IT/include/fredtool-restore-dsconn.txt new file mode 100644 index 0000000000..7bb5f717dc --- /dev/null +++ b/_pages/it_IT/include/fredtool-restore-dsconn.txt @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. Nella tua scheda SD, entra in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. Reinserisci la scheda SD nella tua console +1. Accendi la console +1. Avvia "Impostazioni della console" +1. Entra in `Gestione dati` -> `DSiWare` -> `Scheda SD` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Seleziona "Nintendo DSi™" +1. Seleziona "Copia", quindi "OK" diff --git a/_pages/it_IT/include/fredtool-write-flipnote.txt b/_pages/it_IT/include/fredtool-write-flipnote.txt new file mode 100644 index 0000000000..4339903582 --- /dev/null +++ b/_pages/it_IT/include/fredtool-write-flipnote.txt @@ -0,0 +1,11 @@ +In questa sezione copierai il DSiWare modificato "Impostazioni di collegamento DS" nella memoria interna, che verrà così temporaneamente sostituito da Flipnote Studio. + +1. Avvia "Impostazioni della console" +1. Entra in `Gestione dati` -> `DSiWare` -> `Scheda SD` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Seleziona "Haxxxxxxxxx!" + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Seleziona "Copia", quindi "OK" +1. Ritorna al menu principale delle Impostazioni della console +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. Se l'exploit ha avuto successo, la tua console avrà caricato la versione JPN di Flipnote Studio + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/it_IT/include/safemodecheck.txt b/_pages/it_IT/include/safemodecheck.txt index e62111505f..ae90a55258 100644 --- a/_pages/it_IT/include/safemodecheck.txt +++ b/_pages/it_IT/include/safemodecheck.txt @@ -1,3 +1,5 @@ +In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page. + 1. Accendi la console 1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time + The camera applet should appear diff --git a/_pages/it_IT/include/seedminer-base.txt b/_pages/it_IT/include/seedminer-base.txt index 8e2ef00246..6e9eff4e1e 100644 --- a/_pages/it_IT/include/seedminer-base.txt +++ b/_pages/it_IT/include/seedminer-base.txt @@ -15,10 +15,12 @@ Questo metodo utilizza una scheda grafica di fascia alta per eseguire i calcoli In questa sezione otterrai dal tuo 3DS i dati necessari per scoprire la chiave di crittografia della tua console. +{% capture console_state_info %} Prima di seguire questa sezione: + Assicurati di aver acceso la console con la scheda SD inserita almeno una volta per generare i dati necessari + Assicurati che la tua console sia collegata a Internet (dovresti vedere un indicatore blu "Internet" nell'angolo in alto a sinistra nel menu HOME) -{: .notice--info} +{% endcapture %} +
{{ console_state_info | markdownify }}
1. Spegni il tuo 3DS 1. Inserisci la scheda SD nel tuo computer diff --git a/_pages/it_IT/installing-boot9strap-(fredtool).txt b/_pages/it_IT/installing-boot9strap-(fredtool).txt index 2ecfd57cb8..2bd3e6e1a7 100644 --- a/_pages/it_IT/installing-boot9strap-(fredtool).txt +++ b/_pages/it_IT/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ Questa è un'implementazione funzionante dell'exploit del "testo in chiaro noto
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ### Cosa serve * Il tuo file `movable.sed` dalla sezione [Seedminer](seedminer) * L'ultima versione di [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* L'ultima versione di [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (download diretto) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * L'ultima versione di [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (il file `.zip` di Luma3DS) #### Sezione I - Controllo del CFW @@ -42,49 +45,11 @@ In questa sezione attiverai l'exploit BannerBomb3 utilizzando il menu Gestione N #### Sezione III - Preparazione -In questa sezione copierai i file necessari per sostituire temporaneamente "Impostazioni di collegamento" con Flipnote Studio, usato per lanciare l'installer di boot9strap (custom firmware). - -1. Inserisci la scheda SD nel tuo computer -1. Apri il sito [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) sul tuo computer -1. Sotto il campo "Username" inserisci un nome alfanumerico qualunque (senza spazi o caratteri speciali) -1. Sul il campo "DSiBin", carica il tuo file `42383841.bin` presente nella directory principale della tua scheda SD usando la prima opzione "Browse..." -1. Sul campo "MovableSed", carica il tuo file `movable.sed` usando la seconda opzione "Browse..." -1. Sul campo "InjectionTarget", imposta l'obiettivo dell'iniezione su `DSinternet` (NON memorypit) -1. Clicca "Build" - + Attendi qualche secondo che termini il processo di compilazione -1. Nella sezione "Build History" a sinistra, inserisci l'Username nel campo "Filter Builds" -1. Clicca sul primo risultato della ricerca - + Dovrebbe avere la data più recente -1. Clicca il link "output_(name).zip" -1. Nella tua scheda SD, entra in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` - + `` è il nome a 32 lettere della cartella che hai copiato in [Seedminer](seedminer) - + `` è una cartella dal nome lungo 32 caratteri all'interno di `` -1. Elimina il file `F0D43D5.bin` dalla cartella Nintendo DSiWare -1. Copia il file `42383841.bin` dalla cartella `hax` dall'archivio DSiWare appena scaricato (`output_(name).zip`) nella cartella `Nintendo DSiWare` - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copia i file `boot.firm` e `boot.3dsx` dall'archivio `.zip` di Luma3DS nella directory principale della tua scheda SD - + La directory principale della scheda SD è la cartella della tua scheda SD in cui è possibile visualizzare la cartella Nintendo 3DS, ma non il suo interno -1. Copia il file `boot.nds` (B9STool) dall'archivio `.zip` di b9sTool nella directory principale della tua scheda SD -1. Copia la cartella `private` presente nell'archivio `.zip` di Frogminer_save nella directory principale della tua scheda SD -1. Reinserisci la scheda SD nella tua console -1. Accendi la console - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.txt %} #### Sezione IV - Sovrascrittura delle Impostazioni di collegamento DS -In questa sezione copierai il DSiWare modificato "Impostazioni di collegamento DS" nella memoria interna, che verrà così temporaneamente sostituito da Flipnote Studio. - -1. Avvia "Impostazioni della console" -1. Entra in `Gestione dati` -> `DSiWare` -> `Scheda SD` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Seleziona "Haxxxxxxxxx!" - + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Seleziona "Copia", quindi "OK" -1. Ritorna al menu principale delle Impostazioni della console -1. Entra in `Impostazioni Internet` -> `Connessioni Nintendo DS`, quindi seleziona "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) -1. Se l'exploit ha avuto successo, la tua console avrà caricato la versione JPN di Flipnote Studio - + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.txt %} #### Sezione V - Exploit Flipnote @@ -99,18 +64,10 @@ In questa sezione copierai il DSiWare modificato "Impostazioni di collegamento D #### Sezione VII - Ripristino delle Impostazioni di Connessione DS -In questa sezione ripristinerai "Impostazioni di collegamento DS" nel modo in cui era prima che fosse temporaneamente sostituito con Flipnote Studio nella Sezione IV. - -1. Nella tua scheda SD, entra in `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` -1. Copia il file `42383841.bin` dalla cartella `clean` dall'archivio DSiWare appena scaricato (`output_(name).zip`) nella cartella `Nintendo DSiWare`, sostituendo quello preesistente -1. Reinserisci la scheda SD nella tua console -1. Accendi la console -1. Avvia "Impostazioni della console" -1. Entra in `Gestione dati` -> `DSiWare` -> `Scheda SD` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Seleziona "Nintendo DSi™" -1. Seleziona "Copia", quindi "OK" +{% include_relative include/fredtool-restore-dsconn.txt %} ___ + ### Prosegui con il [Completamento dell'installazione](finalizing-setup) {: .notice--primary} diff --git a/_pages/it_IT/installing-boot9strap-(fredtool-legacy).txt b/_pages/it_IT/installing-boot9strap-(fredtool-legacy).txt new file mode 100644 index 0000000000..2a47decf2b --- /dev/null +++ b/_pages/it_IT/installing-boot9strap-(fredtool-legacy).txt @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title="Indice" %} + +{% capture technical_info %} +Dettagli Tecnici (opzionale) + +Per eseguire un dump dei DSiWare di sistema, approfittiamo di una falla di sicurezza nella sezione Gestione Nintendo DSiWare dell'applicazione Impostazioni della console. + +Per realizzare l'obiettivo, utilizziamo la chiave di cifratura della tua console (movable.sed) per generare un backup DSiWare che induce la console a creare un dump dell'applicazione Impostazioni Internet DSi nella directory principale della scheda SD. + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +Questa è un'implementazione funzionante dell'exploit del "testo in chiaro noto nelle partizioni FIRM" spiegato [qui](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +### Cosa serve + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* L'ultima versione di [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* L'ultima versione di [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (il file `.zip` di Luma3DS) + +#### Sezione I - Controllo del CFW + +{% include_relative include/cfw-check-fredtool.txt %} + +#### Sezione II - BannerBomb3 + +In questa sezione attiverai l'exploit BannerBomb3 utilizzando il menu Gestione Nintendo DSiWare e copierai il file dump risultante sul computer per poterlo utilizzare nella sezione successiva. + +1. Reinserisci la scheda SD nella tua console +1. Accendi la console +1. Avvia "Impostazioni della console" +1. Entra in `Gestione dati` -> `DSiWare` -> `Scheda SD` ([image](/images/screenshots/bb3/dsiware-management.png)) + + La tua console dovrebbe mostrare il menu BB3 multihax + + Se questo passaggio causa il crash della tua console, [segui questa guida per risolvere il problema](troubleshooting#installing-boot9strap-fredtool) +1. Usa il D-Pad per spostarti sul menu "Dump DSiWare", quindi premi il pulsante (A) + + La tua console si riavvierà automaticamente +1. Spegni il tuo 3DS + +#### Sezione III - Preparazione + +{% include_relative include/fredtool-prep.txt %} + +#### Sezione IV - Sovrascrittura delle Impostazioni di collegamento DS + +{% include_relative include/fredtool-write-flipnote.txt %} + +#### Sezione V - Exploit Flipnote + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### Sezione VI - Configurazione di Luma3DS + +1. Premi (Select) e accendi la console continuando a tenerlo premuto. Verrà avviata la configurazione di Luma3DS +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### Sezione VII - Ripristino delle Impostazioni di Connessione DS + +{% include_relative include/fredtool-restore-dsconn.txt %} + +___ + + +### Prosegui con il [Completamento dell'installazione](finalizing-setup) +{: .notice--primary} diff --git a/_pages/it_IT/seedminer-(mii).txt b/_pages/it_IT/seedminer-(mii).txt new file mode 100644 index 0000000000..b7354a1f4b --- /dev/null +++ b/_pages/it_IT/seedminer-(mii).txt @@ -0,0 +1,84 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title="Indice" %} + +{% capture gpu_warning %} +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: ++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) ++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple) ++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) ++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{% endcapture %} +
{{ gpu_warning | markdownify }}
+ +{% capture technical_info %} +Dettagli Tecnici (opzionale) + +Per installare boot9strap nella tua console, ne ricaviamo la sua univoca chiave di cifratura. Utilizzeremo perciò un'applicazione chiamata Seedminer per calcolare la chiave di cifratura dati (`movable.sed`) per la tua console. + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +Per ulteriori informazioni sul funzionamento di Seedminer, è possibile consultare [questa presentazione](https://zoogie.github.io/web/34⅕c3). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### Cosa serve + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### Section I - Prep Work + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/it_IT/site-navigation.txt b/_pages/it_IT/site-navigation.txt index cb1f56f8aa..3f3ae4ca79 100644 --- a/_pages/it_IT/site-navigation.txt +++ b/_pages/it_IT/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [Da A9LH a B9S](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) + [Riconoscimenti](credits) + [Verifica del CFW](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [Pagina iniziale](/) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [Installazione di boot9strap (Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [Installazione di boot9strap (Frogtool)](installing-boot9strap-(frogtool)) + [Installazione di boot9strap (Hardmod)](installing-boot9strap-(hardmod)) + [Installazione di boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [Cambiare regione](region-changing) + [Ripristinare / Aggiornare il CFW](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (TWN)](seedminer-(twn)) + [Risoluzione dei problemi](troubleshooting) + [Disinstallare il CFW](uninstall-cfw) diff --git a/_pages/it_IT/updating-firmware-(kor).txt b/_pages/it_IT/updating-firmware-(kor).txt new file mode 100644 index 0000000000..11e9fd4648 --- /dev/null +++ b/_pages/it_IT/updating-firmware-(kor).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (KOR)" +--- + +### Lettura necessaria + +To use the Seedminer exploit, you must update your device to the latest system version. + +### Cosa serve + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer](seedminer) +{: .notice--primary} diff --git a/_pages/it_IT/updating-firmware-(kor-twn).md b/_pages/it_IT/updating-firmware-(kor-twn).md deleted file mode 100644 index 74a2b48f90..0000000000 --- a/_pages/it_IT/updating-firmware-(kor-twn).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (KOR/TWN)" ---- - -### Required Reading - -To use the Seedminer exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Seedminer](seedminer) -{: .notice--primary} diff --git a/_pages/it_IT/updating-firmware-(new-3ds).txt b/_pages/it_IT/updating-firmware-(new-3ds).txt new file mode 100644 index 0000000000..848a437dd2 --- /dev/null +++ b/_pages/it_IT/updating-firmware-(new-3ds).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (New 3DS)" +--- + +### Lettura necessaria + +To use the super-skaterhax exploit, you must update your device to the latest system version. + +### Cosa serve + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) +{: .notice--primary} diff --git a/_pages/it_IT/updating-firmware-(twn).txt b/_pages/it_IT/updating-firmware-(twn).txt new file mode 100644 index 0000000000..0767bdb297 --- /dev/null +++ b/_pages/it_IT/updating-firmware-(twn).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (TWN)" +--- + +### Lettura necessaria + +To use the Seedminer exploit, you must update your device to the latest system version. + +### Cosa serve + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer (TWN)](seedminer-(twn)) +{: .notice--primary} diff --git a/_pages/ja_JP/404.md b/_pages/ja_JP/404.txt similarity index 100% rename from _pages/ja_JP/404.md rename to _pages/ja_JP/404.txt diff --git a/_pages/ja_JP/bannerbomb3-(legacy).txt b/_pages/ja_JP/bannerbomb3-(legacy).txt new file mode 100644 index 0000000000..a8c7b99605 --- /dev/null +++ b/_pages/ja_JP/bannerbomb3-(legacy).txt @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title="目次" %} + +{% capture technical_info %} +Technical Details (optional) + +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### Compatibility Notes + +これらのガイドは、システムバージョン末尾にある「U、E、J、K」にあるように、米国、欧州、日本、韓国の端末で機能します。 + +### 必要なもの + +* Your `movable.sed` file from completing Seedminer or nimhax + +#### セクション I - 準備 + +{% include_relative include/bb3-prep.txt %} + +#### Section II - Hardware Button Check + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### Next steps: Choose an exploit + +If the camera appeared in the previous section, Safe Mode is likely to be working on your device. + +If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/ja_JP/bannerbomb3.txt b/_pages/ja_JP/bannerbomb3.txt index 54bdb6e98e..acc7e1807a 100644 --- a/_pages/ja_JP/bannerbomb3.txt +++ b/_pages/ja_JP/bannerbomb3.txt @@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol #### セクション I - 準備 -In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. - -1. デバイスの電源を切ります -1. パソコンにSDカードを入れます -1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer -1. Upload your movable.sed using the “Choose File” option -1. Click “Build and Download” - + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) -1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card - + SDカードのルートとは、Nintendo 3DSのフォルダなどがある最初の項目のことであり、フォルダの中ではありません。 - + This file does not need to be opened or extracted - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.txt %} #### Section II - Hardware Button Check -In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. - -Your SD card should remain in your computer while you perform this check. - {% include_relative include/safemodecheck.txt %} ___ diff --git a/_pages/no_NO/credits.md b/_pages/ja_JP/credits.txt similarity index 100% rename from _pages/no_NO/credits.md rename to _pages/ja_JP/credits.txt diff --git a/_pages/ja_JP/donations.md b/_pages/ja_JP/donations.txt similarity index 100% rename from _pages/ja_JP/donations.md rename to _pages/ja_JP/donations.txt diff --git a/_pages/ja_JP/finalizing-setup.txt b/_pages/ja_JP/finalizing-setup.txt index 90eddae6e2..a046b85e14 100644 --- a/_pages/ja_JP/finalizing-setup.txt +++ b/_pages/ja_JP/finalizing-setup.txt @@ -169,7 +169,7 @@ In this section, you will make backups of files that can be used to recover from 1. Delete `__sysnand_##.bin` and `__sysnand_##.bin.sha` from the `/gm9/out/` folder on your SD card after copying it + The other backup files are negligible in size and may be kept on your SD card for ease of access 1. If you have it, copy the `/luma/backups/` folder on your SD card to a safe location on your computer -1. デバイスにSDカードを入れます +1. 再度、SDカードを本体に挿入してください。 1. デバイスの電源を入れます ___ @@ -177,9 +177,6 @@ ___ You're done! Custom firmware is now fully configured on your device. {: .notice--success} -Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! -{: .notice--info} - ### Information and Notes {% capture notice-6 %} diff --git a/_pages/ja_JP/homebrew-launcher-(super-skaterhax).txt b/_pages/ja_JP/homebrew-launcher-(super-skaterhax).txt index 8285175564..79e4234974 100644 --- a/_pages/ja_JP/homebrew-launcher-(super-skaterhax).txt +++ b/_pages/ja_JP/homebrew-launcher-(super-skaterhax).txt @@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up 1. Select the "GO GO!" button on the top screen + If any prompts appear, approve all of them + If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section + + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) 1. If the exploit was successful, your device will have booted into the Homebrew Launcher 1. デバイスの電源を切ります diff --git a/_pages/ja_JP/include/bb3-prep.txt b/_pages/ja_JP/include/bb3-prep.txt new file mode 100644 index 0000000000..411d729d2c --- /dev/null +++ b/_pages/ja_JP/include/bb3-prep.txt @@ -0,0 +1,23 @@ +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + +1. デバイスの電源を切ります +1. パソコンにSDカードを入れます +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + SDカードのルートとは、Nintendo 3DSのフォルダなどがある最初の項目のことであり、フォルダの中ではありません。 + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. Create a folder named `Nintendo DSiWare` inside of the `` + + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/ja_JP/include/fredtool-prep.txt b/_pages/ja_JP/include/fredtool-prep.txt new file mode 100644 index 0000000000..51c4f803df --- /dev/null +++ b/_pages/ja_JP/include/fredtool-prep.txt @@ -0,0 +1,29 @@ +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. + +1. パソコンにSDカードを入れます +1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer +1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. Click "Build" + + Wait a few seconds for the build process to complete +1. In the Build History section on the left, type the Username into the "Filter Builds" field +1. Click on the first search result + + This result should have the latest timestamp +1. Click the "output_(name).zip" link +1. SDカードの`Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`へ移動します + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. `boot.firm` と `boot.3dsx` をLuma3DSの `.zip` からSDカードのルートにコピーします + + SDカードのルートとは、Nintendo 3DSのフォルダなどがある最初の項目のことであり、フォルダの中ではありません。 +1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card +1. Frogminer_save `.zip`から`private`フォルダをSDカードのルートにコピーします +1. デバイスにSDカードを入れます +1. デバイスの電源を入れます + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/ja_JP/include/fredtool-restore-dsconn.txt b/_pages/ja_JP/include/fredtool-restore-dsconn.txt new file mode 100644 index 0000000000..882848ffe6 --- /dev/null +++ b/_pages/ja_JP/include/fredtool-restore-dsconn.txt @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. SDカードの`Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`へ移動します +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. デバイスにSDカードを入れます +1. デバイスの電源を入れます +1. 「本体設定」を開きます。 +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title +1. 「コピー」を選択し、「OK」を選択します diff --git a/_pages/ja_JP/include/fredtool-write-flipnote.txt b/_pages/ja_JP/include/fredtool-write-flipnote.txt new file mode 100644 index 0000000000..5dde37563c --- /dev/null +++ b/_pages/ja_JP/include/fredtool-write-flipnote.txt @@ -0,0 +1,11 @@ +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + +1. 「本体設定」を開きます。 +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. 「コピー」を選択し、「OK」を選択します +1. システム設定のメインメニューに戻ります +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. 完了した場合、日本語のうごくメモ帳が開きます + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/ja_JP/include/safemodecheck.txt b/_pages/ja_JP/include/safemodecheck.txt index 8ecdc65d46..958e6ec19d 100644 --- a/_pages/ja_JP/include/safemodecheck.txt +++ b/_pages/ja_JP/include/safemodecheck.txt @@ -1,3 +1,5 @@ +In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page. + 1. デバイスの電源を入れます 1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time + The camera applet should appear diff --git a/_pages/ja_JP/include/seedminer-base.txt b/_pages/ja_JP/include/seedminer-base.txt index 23b588099c..d7f1072e34 100644 --- a/_pages/ja_JP/include/seedminer-base.txt +++ b/_pages/ja_JP/include/seedminer-base.txt @@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. +{% capture console_state_info %} Before following this section: + Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data + Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen) -{: .notice--info} +{% endcapture %} +
{{ console_state_info | markdownify }}
1. デバイスの電源を切ります 1. パソコンにSDカードを入れます diff --git a/_pages/ja_JP/installing-boot9strap-(fredtool).txt b/_pages/ja_JP/installing-boot9strap-(fredtool).txt index a1a907233d..bbfb57785f 100644 --- a/_pages/ja_JP/installing-boot9strap-(fredtool).txt +++ b/_pages/ja_JP/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ### 必要なもの * [Seedminer](seedminer) より作成した、 `movable.sed` ファイル * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) #### Section I - CFW Check @@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana #### Section III - Prep Work -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. パソコンにSDカードを入れます -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. SDカードの`Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`へ移動します - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. `boot.firm` と `boot.3dsx` をLuma3DSの `.zip` からSDカードのルートにコピーします - + SDカードのルートとは、Nintendo 3DSのフォルダなどがある最初の項目のことであり、フォルダの中ではありません。 -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Frogminer_save `.zip`から`private`フォルダをSDカードのルートにコピーします -1. デバイスにSDカードを入れます -1. デバイスの電源を入れます - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.txt %} #### Section IV - Overwriting DS Connection Settings -In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. - -1. 「本体設定」を開きます。 -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Haxxxxxxxxx!" title - + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. 「コピー」を選択し、「OK」を選択します -1. システム設定のメインメニューに戻ります -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) -1. 完了した場合、日本語のうごくメモ帳が開きます - + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.txt %} #### Section V - Flipnote Exploit @@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte #### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. - -1. SDカードの`Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare`へ移動します -1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one -1. デバイスにSDカードを入れます -1. デバイスの電源を入れます -1. 「本体設定」を開きます。 -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Nintendo DSi™" title -1. 「コピー」を選択し、「OK」を選択します +{% include_relative include/fredtool-restore-dsconn.txt %} ___ + [セットアップを完了する](finalizing-setup) へ進みます {: .notice--primary} diff --git a/_pages/ja_JP/installing-boot9strap-(fredtool-legacy).txt b/_pages/ja_JP/installing-boot9strap-(fredtool-legacy).txt new file mode 100644 index 0000000000..12fe32fb26 --- /dev/null +++ b/_pages/ja_JP/installing-boot9strap-(fredtool-legacy).txt @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title="目次" %} + +{% capture technical_info %} +Technical Details (optional) + +DSiWareシステムをダンプするために、本体設定アプリのDSiWare データ管理画面の脆弱性を使用します。 + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +### 必要なもの + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) + +#### Section I - CFW Check + +{% include_relative include/cfw-check-fredtool.txt %} + +#### セクション II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. デバイスにSDカードを入れます +1. デバイスの電源を入れます +1. 「本体設定」を開きます。 +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically reboot +1. デバイスの電源を切ります + +#### Section III - Prep Work + +{% include_relative include/fredtool-prep.txt %} + +#### Section IV - Overwriting DS Connection Settings + +{% include_relative include/fredtool-write-flipnote.txt %} + +#### Section V - Flipnote Exploit + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### Section VI - Luma3DS Configuration + +1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### Section VII - Restoring DS Connection Settings + +{% include_relative include/fredtool-restore-dsconn.txt %} + +___ + + +[セットアップを完了する](finalizing-setup) へ進みます +{: .notice--primary} diff --git a/_pages/ja_JP/seedminer-(mii).txt b/_pages/ja_JP/seedminer-(mii).txt new file mode 100644 index 0000000000..d4ed338ae4 --- /dev/null +++ b/_pages/ja_JP/seedminer-(mii).txt @@ -0,0 +1,84 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title="目次" %} + +{% capture gpu_warning %} +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: ++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) ++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple) ++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) ++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{% endcapture %} +
{{ gpu_warning | markdownify }}
+ +{% capture technical_info %} +Technical Details (optional) + +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### What you need + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### Section I - Prep Work + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/ja_JP/site-navigation.txt b/_pages/ja_JP/site-navigation.txt index aced04cb9e..9cc48be3c9 100644 --- a/_pages/ja_JP/site-navigation.txt +++ b/_pages/ja_JP/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [A9LHからB9S](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) + [クレジット](credits) + [Checking for CFW](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [ホームページ](/) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [boot9strapの導入 (Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) + [boot9strapの導入 (Hardmod)](installing-boot9strap-(hardmod)) + [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [地域変更](region-changing) + [Restoring / Updating CFW](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (TWN)](seedminer-(twn)) + [トラブルシューティング](troubleshooting) + [CFWをアンインストールする](uninstall-cfw) diff --git a/_pages/ja_JP/updating-firmware-(kor).txt b/_pages/ja_JP/updating-firmware-(kor).txt new file mode 100644 index 0000000000..102cbf7113 --- /dev/null +++ b/_pages/ja_JP/updating-firmware-(kor).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (KOR)" +--- + +### 必読事項 + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer](seedminer) +{: .notice--primary} diff --git a/_pages/ja_JP/updating-firmware-(kor-twn).md b/_pages/ja_JP/updating-firmware-(kor-twn).md deleted file mode 100644 index 74a2b48f90..0000000000 --- a/_pages/ja_JP/updating-firmware-(kor-twn).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (KOR/TWN)" ---- - -### Required Reading - -To use the Seedminer exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Seedminer](seedminer) -{: .notice--primary} diff --git a/_pages/it_IT/updating-firmware-(new-3ds).md b/_pages/ja_JP/updating-firmware-(new-3ds).txt similarity index 95% rename from _pages/it_IT/updating-firmware-(new-3ds).md rename to _pages/ja_JP/updating-firmware-(new-3ds).txt index 5366fdd3b9..7e9d377429 100644 --- a/_pages/it_IT/updating-firmware-(new-3ds).md +++ b/_pages/ja_JP/updating-firmware-(new-3ds).txt @@ -2,7 +2,7 @@ title: "Updating Firmware (New 3DS)" --- -### Required Reading +### 必読事項 To use the super-skaterhax exploit, you must update your device to the latest system version. diff --git a/_pages/ja_JP/updating-firmware-(twn).txt b/_pages/ja_JP/updating-firmware-(twn).txt new file mode 100644 index 0000000000..fb54faa908 --- /dev/null +++ b/_pages/ja_JP/updating-firmware-(twn).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (TWN)" +--- + +### 必読事項 + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer (TWN)](seedminer-(twn)) +{: .notice--primary} diff --git a/_pages/ko_KR/404.md b/_pages/ko_KR/404.txt similarity index 100% rename from _pages/ko_KR/404.md rename to _pages/ko_KR/404.txt diff --git a/_pages/ko_KR/bannerbomb3-(legacy).txt b/_pages/ko_KR/bannerbomb3-(legacy).txt new file mode 100644 index 0000000000..3a8e5cce25 --- /dev/null +++ b/_pages/ko_KR/bannerbomb3-(legacy).txt @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title="목차" %} + +{% capture technical_info %} +기술적 상세 정보 (선택 사항) + +사용자 정의의 코드를 실행하기 위해 DSiWare 데이터 관리 설정 창의 취약점을 이용합니다. + +이것을 할 수 있도록, 기기의 암호화 키 (movable.sed)를 이용해 취약점을 이용할 DSiWare 백업을 생성합니다. + +더 자세한 기술 정보를 확인하려면, [이 페이지 (영문)](https://github.com/zoogie/Bannerbomb3)를 확인해 주세요. +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### 호환성 안내 + +이 설명서는 미주, 유럽, 일본, 그리고 한국 지역 기기들 (시스템 버전 다음 글짜가 U, E, J, 아니면 K 인 경우) 와 호환됩니다. + +### 준비물 + +* Seedminer 또는 nimhax에서 받은 `movable.sed` 파일 + +#### 섹션 I - 준비 작업 + +{% include_relative include/bb3-prep.txt %} + +#### 섹션 II - 하드웨어 버튼 작동 확인 + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### 다음 단계: 익스플로잇 선택 + +If the camera appeared in the previous section, Safe Mode is likely to be working on your device. + +If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/ko_KR/bannerbomb3.txt b/_pages/ko_KR/bannerbomb3.txt index d02f620cf4..f1cbbae06b 100644 --- a/_pages/ko_KR/bannerbomb3.txt +++ b/_pages/ko_KR/bannerbomb3.txt @@ -30,36 +30,10 @@ title: "BannerBomb3" #### 섹션 I - 준비 작업 -이 섹션에서는 기기의 SD 카드에 BannerBomb3 취약점을 실행하기 위한 파일을 복사하게 됩니다. - -1. 기기를 종료해 주세요 -1. SD 카드를 컴퓨터에 삽입해 주세요 -1. 컴퓨터에서 [BannerBomb3 Injector](https://3ds.nhnarwhal.com/#/bb3gen)를 열어 주세요 -1. "Choose File"를 선택하여 `movable.sed`를 업로드 해 주세요 -1. "Build and Download"를 선택해 주세요 - + 이 작업은 `F00D43D5.bin` DSiWare 파일과 `bb3.bin` 익스플로잇 데이터를 zip 파일로 다운로드 합니다 (`DSIWARE_EXPLOIT.zip`) -1. `DSIWARE_EXPLOIT.zip` 안에 있는 `bb3.bin`을 SD 카드의 루트에 복사해 주세요 - + SD 카드의 루트는 SD 카드를 열 때 보이는 디렉토리이고, Nintendo 3DS 폴더가 보이지만 그 안에 않 들어가 있는 상태의 폴더 입니다 - + 이 파일은 열거나 압축 풀기를 할 필요가 없습니다 - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. SD 카드의 `Nintendo 3DS` -> `` -> `` 폴더로 이동해 주세요 - + ``은 [Seedminer](seedminer)에서 복사한 32글자 폴더명 입니다 - + ``은 `` 안에 있는 32글자 폴더명입니다 - + 여러 개의 `` 폴더가 보인다면, [이 안내](troubleshooting#bannerbomb3)를 따라주세요 - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. `` 폴더에 `Nintendo DSiWare` 폴더를 생성해 주세요 - + 만약 그 폴더가 *있고* 내부에 DSiWare 백업 파일(`<8-character-id>.bin`)이 있다면, PC로 모두 복사해 두고 SD 카드에서 삭제해 주세요 -1. `F00D43D5.bin` 파일을 `DSIWARE_EXPLOIT.zip` 에서 `Nintendo DSiWare` 폴더로 복사해 주세요 - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.txt %} #### 섹션 II - 하드웨어 버튼 작동 확인 -이 섹션에서는 기기의 안전 모드 기능을 사용 할 수 있는지 테스트할 것 입니다. 이 테스트는 다음 페이지에 어떤 방법을 취할지 결정합니다. - -Your SD card should remain in your computer while you perform this check. - {% include_relative include/safemodecheck.txt %} ___ diff --git a/_pages/ko_KR/credits.md b/_pages/ko_KR/credits.txt similarity index 100% rename from _pages/ko_KR/credits.md rename to _pages/ko_KR/credits.txt diff --git a/_pages/ko_KR/donations.md b/_pages/ko_KR/donations.txt similarity index 100% rename from _pages/ko_KR/donations.md rename to _pages/ko_KR/donations.txt diff --git a/_pages/ko_KR/finalizing-setup.txt b/_pages/ko_KR/finalizing-setup.txt index c8b91ec713..1fc200e8b7 100644 --- a/_pages/ko_KR/finalizing-setup.txt +++ b/_pages/ko_KR/finalizing-setup.txt @@ -177,9 +177,6 @@ ___ 모든 작업이 끝났습니다! 이제 커스텀 펌웨어는 완벽하게 설정되었습니다. {: .notice--success} -안녕하세요! 저희는 이 가이드를 따른 경험에 데한 설문조사를 진행하고 있습니다. 원하신다면, 이 [설문조사](https://forms.gle/vZNoc4QLCz5MEXCK7) (영어로만 가능)을 확인해 주세요. 감사합니다! -{: .notice--info} - ### 정보와 메모 {% capture notice-6 %} diff --git a/_pages/ko_KR/homebrew-launcher-(super-skaterhax).txt b/_pages/ko_KR/homebrew-launcher-(super-skaterhax).txt index 7818ee3eaf..d941196faf 100644 --- a/_pages/ko_KR/homebrew-launcher-(super-skaterhax).txt +++ b/_pages/ko_KR/homebrew-launcher-(super-skaterhax).txt @@ -64,7 +64,7 @@ In this section, you will visit the browser exploit webpage, which will launch t 1. Select the "GO GO!" button on the top screen + If any prompts appear, approve all of them + If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section + + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) 1. 익스플로잇이 성공적이었다면 Homebrew Launcher로 부팅되었을 것입니다 1. 기기를 종료해 주세요 diff --git a/_pages/ko_KR/include/bb3-prep.txt b/_pages/ko_KR/include/bb3-prep.txt new file mode 100644 index 0000000000..6b53ba8b2a --- /dev/null +++ b/_pages/ko_KR/include/bb3-prep.txt @@ -0,0 +1,23 @@ +이 섹션에서는 기기의 SD 카드에 BannerBomb3 취약점을 실행하기 위한 파일을 복사하게 됩니다. + +1. 기기를 종료해 주세요 +1. SD 카드를 컴퓨터에 삽입해 주세요 +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. "Choose File"를 선택하여 `movable.sed`를 업로드 해 주세요 +1. "Build and Download"를 선택해 주세요 + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + SD 카드의 루트는 SD 카드를 열 때 보이는 디렉토리이고, Nintendo 3DS 폴더가 보이지만 그 안에 않 들어가 있는 상태의 폴더 입니다 + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. SD 카드의 `Nintendo 3DS` -> `` -> `` 폴더로 이동해 주세요 + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. `` 폴더에 `Nintendo DSiWare` 폴더를 생성해 주세요 + + 만약 그 폴더가 *있고* 내부에 DSiWare 백업 파일(`<8-character-id>.bin`)이 있다면, PC로 모두 복사해 두고 SD 카드에서 삭제해 주세요 +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/ko_KR/include/fredtool-prep.txt b/_pages/ko_KR/include/fredtool-prep.txt new file mode 100644 index 0000000000..75252c8def --- /dev/null +++ b/_pages/ko_KR/include/fredtool-prep.txt @@ -0,0 +1,29 @@ +이 섹션에서는, boot9strap (커스텀 펌웨어) 설치 도구를 실행할 수 있는 Flipnote Studio를 DS 소프트웨어용 설정에 덮어씌울수 있도록 필요한 파일을 복사합니다. + +1. SD 카드를 컴퓨터에 삽입해 주세요 +1. 컴퓨터에서 [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) 웹사이트를 열어 주세요 +1. "Username"에 영어/숫자를 사용한 이름을 아무거나 입력해 주세요 (스페이스나 특수 문자는 사용 불가) +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. "MovableSed" 란에, "Browse..." 옵션을 이용해 `movable.sed` 파일을 업로드해 주세요 +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. "Build"를 클릭해 주세요 + + 빌드 과정이 완료될 때까지 잠시 기다려 주세요 +1. 왼쪽의 Build History 영역에 유저네임을 입력해 주세요 +1. 첫 번째 검색 결과를 선택해 주세요 + + 날짜가 가장 최신이어야 합니다 +1. "output_(name).zip" 링크를 클릭하여 다운로드해 주세요 +1. SD 카드의 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 폴더로 이동해 주세요 + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Luma3DS `.zip`안에 있는 `boot.firm`과 `boot.3dsx`를 SD 카드의 루트에 복사해 주세요 + + SD 카드의 루트는 SD 카드를 열 때 보이는 디렉토리이고, Nintendo 3DS 폴더가 보이지만 그 안에 않 들어가 있는 상태의 폴더 입니다 +1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card +1. SD 카드의 루트로 Frogminer_save `.zip`안에 압축이 되있는 `private` 폴더를 복사해 주세요 +1. SD 카드를 기기에 다시 삽입해 주세요 +1. 기기를 시작해 주세요 + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/ko_KR/include/fredtool-restore-dsconn.txt b/_pages/ko_KR/include/fredtool-restore-dsconn.txt new file mode 100644 index 0000000000..a9ab5b55dd --- /dev/null +++ b/_pages/ko_KR/include/fredtool-restore-dsconn.txt @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. SD 카드의 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 폴더로 이동해 주세요 +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. SD 카드를 기기에 다시 삽입해 주세요 +1. 기기를 시작해 주세요 +1. 기기에서 본체 설정을 열어 주세요 +1. `데이터 관리` -> `DSiWare` -> `SD 카드`로 들어가주세요 ([사진](/images/screenshots/bb3/dsiware-management.png)) +1. "Nintendo DSi™" 타이틀을 선택해 주세요 +1. "복사"를 선택한 후, "OK"를 선택해 주세요 diff --git a/_pages/ko_KR/include/fredtool-write-flipnote.txt b/_pages/ko_KR/include/fredtool-write-flipnote.txt new file mode 100644 index 0000000000..089e446156 --- /dev/null +++ b/_pages/ko_KR/include/fredtool-write-flipnote.txt @@ -0,0 +1,11 @@ +이 섹션에서는, 해킹된 DS 소프트웨어용 설정 DSiWare를 내부 메모리로 복사하여, 이 앱을 잠시 동안 Flipnote Studio으로 변경합니다 + +1. 기기에서 본체 설정을 열어 주세요 +1. `데이터 관리` -> `DSiWare` -> `SD 카드`로 들어가주세요 ([사진](/images/screenshots/bb3/dsiware-management.png)) +1. "Haxxxxxxxxx!" 타이틀을 선택해 주세요 + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. "복사"를 선택한 후, "OK"를 선택해 주세요 +1. 본체 설정의 메인 메뉴로 돌아가 주세요 +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. 만약 익스플로잇이 성공적이었다면, 기기는 JPN 버전의 Flipnote Studio를 실행할 겁니다 + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/ko_KR/include/safemodecheck.txt b/_pages/ko_KR/include/safemodecheck.txt index 660313f03e..452442d31b 100644 --- a/_pages/ko_KR/include/safemodecheck.txt +++ b/_pages/ko_KR/include/safemodecheck.txt @@ -1,3 +1,5 @@ +In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page. + 1. 기기를 시작해 주세요 1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time + The camera applet should appear diff --git a/_pages/ko_KR/include/seedminer-base.txt b/_pages/ko_KR/include/seedminer-base.txt index 1f233d9e27..4f543ec6ae 100644 --- a/_pages/ko_KR/include/seedminer-base.txt +++ b/_pages/ko_KR/include/seedminer-base.txt @@ -15,10 +15,12 @@ Seedminer이 정확히 어떻게 작동하는지 배우고 싶다면 [이 프레 이 섹션에서는 암호화 키를 알아내기 위한 정보를 3DS로부터 수집합니다. +{% capture console_state_info %} Before following this section: + Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data + Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen) -{: .notice--info} +{% endcapture %} +
{{ console_state_info | markdownify }}
1. 기기를 종료해 주세요 1. SD 카드를 컴퓨터에 삽입해 주세요 diff --git a/_pages/ko_KR/installing-boot9strap-(fredtool).txt b/_pages/ko_KR/installing-boot9strap-(fredtool).txt index 7711e5a2fe..317ed7ac30 100644 --- a/_pages/ko_KR/installing-boot9strap-(fredtool).txt +++ b/_pages/ko_KR/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ title: "boot9strap 설치 (Fredtool)"
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ### 준비물 * [Seedminer](seedminer)에서 받은 `movable.sed` 파일 * 최신 버전의 [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest`) (`Frogminer_save.zip`) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * 최신 버전의 [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (`.zip` 파일) #### 섹션 I - CFW 확인 @@ -42,49 +45,11 @@ title: "boot9strap 설치 (Fredtool)" #### 섹션 III - 준비 작업 -이 섹션에서는, boot9strap (커스텀 펌웨어) 설치 도구를 실행할 수 있는 Flipnote Studio를 DS 소프트웨어용 설정에 덮어씌울수 있도록 필요한 파일을 복사합니다. - -1. SD 카드를 컴퓨터에 삽입해 주세요 -1. 컴퓨터에서 [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) 웹사이트를 열어 주세요 -1. "Username"에 영어/숫자를 사용한 이름을 아무거나 입력해 주세요 (스페이스나 특수 문자는 사용 불가) -1. "DSIBin" 란에, "Browse..."옵션을 이용해 `42383841.bin` 파일을 업로드해 주세요 -1. "MovableSed" 란에, "Browse..." 옵션을 이용해 `movable.sed` 파일을 업로드해 주세요 -1. "InjectionTarget" 란에서, 주입 목표를 `DSinternet`(memorypit 아님)로 설정해 주세요 -1. "Build"를 클릭해 주세요 - + 빌드 과정이 완료될 때까지 잠시 기다려 주세요 -1. 왼쪽의 Build History 영역에 유저네임을 입력해 주세요 -1. 첫 번째 검색 결과를 선택해 주세요 - + 날짜가 가장 최신이어야 합니다 -1. "output_(name).zip" 링크를 클릭하여 다운로드해 주세요 -1. SD 카드의 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 폴더로 이동해 주세요 - + ``은 [Seedminer](seedminer)에서 복사한 32글자 폴더명 입니다 - + ``은 `` 안에 있는 32글자 폴더명입니다 -1. `Nintendo DSiWare` 폴더 내 `F00D43D5.bin` 파일을 삭제해 주세요 -1. 다운로드한 DSiWare 압축 파일(output_(이름).zip)에서, `hax` 폴더 안에 있는 `42383841.bin` 파일을 `Nintendo DSiWare` 폴더로 복사해 주세요 - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Luma3DS `.zip`안에 있는 `boot.firm`과 `boot.3dsx`를 SD 카드의 루트에 복사해 주세요 - + SD 카드의 루트는 SD 카드를 열 때 보이는 디렉토리이고, Nintendo 3DS 폴더가 보이지만 그 안에 않 들어가 있는 상태의 폴더 입니다 -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. SD 카드의 루트로 Frogminer_save `.zip`안에 압축이 되있는 `private` 폴더를 복사해 주세요 -1. SD 카드를 기기에 다시 삽입해 주세요 -1. 기기를 시작해 주세요 - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.txt %} #### 섹션 IV - DS 소프트웨어용 설정 덮어쓰기 -이 섹션에서는, 해킹된 DS 소프트웨어용 설정 DSiWare를 내부 메모리로 복사하여, 이 앱을 잠시 동안 Flipnote Studio으로 변경합니다 - -1. 기기에서 본체 설정을 열어 주세요 -1. `데이터 관리` -> `DSiWare` -> `SD 카드`로 들어가주세요 ([사진](/images/screenshots/bb3/dsiware-management.png)) -1. "Haxxxxxxxxx!" 타이틀을 선택해 주세요 - + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. "복사"를 선택한 후, "OK"를 선택해 주세요 -1. 본체 설정의 메인 메뉴로 돌아가 주세요 -1. `인터넷 설정` -> `DS 소프트웨어용 설정`으로 들어가 "OK"를 선택해 주세요 ([사진 (영어)](/images/screenshots/fredtool/dsconnection.png)) -1. 만약 익스플로잇이 성공적이었다면, 기기는 JPN 버전의 Flipnote Studio를 실행할 겁니다 - + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.txt %} #### 섹션 V - Flipnote 익스플로잇 @@ -99,18 +64,10 @@ title: "boot9strap 설치 (Fredtool)" #### 섹션 VII - DS 소프트웨어용 설정 복구 -이 섹션에서는 DS 소프트웨어 설정을 섹션 IV 에서 Flipnote Studio로 변경하기 전으로 원상복귀 합니다. - -1. SD 카드의 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 폴더로 이동해 주세요 -1. 다운로드한 DSiWare 압축 파일(output_(이름).zip)에서, `clean` 폴더 안에 있는 `42383841.bin` 파일을 `Nintendo DSiWare` 폴더로 복사해 주세요 -1. SD 카드를 기기에 다시 삽입해 주세요 -1. 기기를 시작해 주세요 -1. 기기에서 본체 설정을 열어 주세요 -1. `데이터 관리` -> `DSiWare` -> `SD 카드`로 들어가주세요 ([사진](/images/screenshots/bb3/dsiware-management.png)) -1. "Nintendo DSi™" 타이틀을 선택해 주세요 -1. "복사"를 선택한 후, "OK"를 선택해 주세요 +{% include_relative include/fredtool-restore-dsconn.txt %} ___ + ### [마무리 단계](finalizing-setup) 로 계속합니다 {: .notice--primary} diff --git a/_pages/ko_KR/installing-boot9strap-(fredtool-legacy).txt b/_pages/ko_KR/installing-boot9strap-(fredtool-legacy).txt new file mode 100644 index 0000000000..0640d0853c --- /dev/null +++ b/_pages/ko_KR/installing-boot9strap-(fredtool-legacy).txt @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title="목차" %} + +{% capture technical_info %} +기술적 상세 정보 (선택 사항) + +시스템 DSiWare를 추출하기 위해, DSiWare 데이터 관리 설정 창의 취약점을 악용합니다. + +이 가이드는 시스템의 암호화 키 (movable.sed)를 이용해 DSiWare 백업을 만들어, 시스템이 DSi 인터넷 설정 앱을 SD 카드 루트에 추출하게 합니다. + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +이 작업은 [이곳](https://www.3dbrew.org/wiki/3DS_System_Flaws)에 자세히 설명되어 있는 "FIRM partitions known-plaintext" 익스플로잇을 구현한 작업입니다. + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +### 준비물 + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* 최신 버전의 [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest`) (`Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* 최신 버전의 [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (`.zip` 파일) + +#### 섹션 I - CFW 확인 + +{% include_relative include/cfw-check-fredtool.txt %} + +#### 섹션 II - BannerBomb3 + +이 섹션에서는 DSiWare 관리 메뉴에서 BannerBomb3 취약점을 실행해 결과물을 컴퓨터에 복사함으로서 다음 섹션에서 사용할 수 있게 합니다. + +1. SD 카드를 기기에 다시 삽입해 주세요 +1. 기기를 시작해 주세요 +1. 기기에서 본체 설정을 열어 주세요 +1. `데이터 관리` -> `DSiWare` -> `SD 카드`로 들어가주세요 ([사진](/images/screenshots/bb3/dsiware-management.png)) + + 기기는 BB3 multihax 메뉴를 표시할 겁니다 + + 이 과정에서 기기가 갑자기 꺼진다면, [이 문제 해결 가이드](troubleshooting#installing-boot9strap-fredtool)를 참고해 주세요. +1. 십자 패드를 이용해 "Dump DSiWare" 에 (A) 버튼을 눌러 선택해 주세요 + + 기기가 자동으로 재부팅될 겁니다 +1. 기기를 종료해 주세요 + +#### 섹션 III - 준비 작업 + +{% include_relative include/fredtool-prep.txt %} + +#### 섹션 IV - DS 소프트웨어용 설정 덮어쓰기 + +{% include_relative include/fredtool-write-flipnote.txt %} + +#### 섹션 V - Flipnote 익스플로잇 + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### 섹션 VI - Luma3DS 구성 + +1. (Select) 를 길게 누르고, 이 상태에서 전원을 켜 주세요. Luma3DS 구성 메뉴가 실행 될 겁니다 +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### 섹션 VII - DS 소프트웨어용 설정 복구 + +{% include_relative include/fredtool-restore-dsconn.txt %} + +___ + + +### [마무리 단계](finalizing-setup) 로 계속합니다 +{: .notice--primary} diff --git a/_pages/ko_KR/seedminer-(mii).txt b/_pages/ko_KR/seedminer-(mii).txt new file mode 100644 index 0000000000..0743b30acf --- /dev/null +++ b/_pages/ko_KR/seedminer-(mii).txt @@ -0,0 +1,84 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title="목차" %} + +{% capture gpu_warning %} +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: ++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) ++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple) ++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) ++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{% endcapture %} +
{{ gpu_warning | markdownify }}
+ +{% capture technical_info %} +기술적 상세 정보 (선택 사항) + +boot9strap을 설치하려면 우선 각 기기의 고유 암호화 키를 알아내야 합니다. 이를 위해, 이 가이드에서는 Seedminer을 사용해 그 암호화 키 (movable.sed)를 계산해 낼 것입니다. + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +Seedminer이 정확히 어떻게 작동하는지 배우고 싶다면 [이 프레젠테이션](https://zoogie.github.io/web/34⅕c3)을 참고할 수 있습니다. + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### 준비물 + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### Section I - Prep Work + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/ko_KR/site-navigation.txt b/_pages/ko_KR/site-navigation.txt index 6a54431ddb..18debde6b0 100644 --- a/_pages/ko_KR/site-navigation.txt +++ b/_pages/ko_KR/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [A9LH를 B9S로 업데이트](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool (타이완)](bannerbomb3-fredtool-(twn)) + [기여자](credits) + [CFW 확인](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [홈](/) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [boot9strap 설치 (Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [boot9strap 설치 (Frogtool)](installing-boot9strap-(frogtool)) + [boot9strap 설치 (하드모드)](installing-boot9strap-(hardmod)) + [boot9strap 설치 (HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [지역 변경](region-changing) + [CFW 복구 / 업데이트](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (타이완)](seedminer-(twn)) + [문제 해결](troubleshooting) + [CFW 제거](uninstall-cfw) diff --git a/_pages/ko_KR/updating-firmware-(kor).txt b/_pages/ko_KR/updating-firmware-(kor).txt new file mode 100644 index 0000000000..4af3fa24f7 --- /dev/null +++ b/_pages/ko_KR/updating-firmware-(kor).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (KOR)" +--- + +### 중요 + +To use the Seedminer exploit, you must update your device to the latest system version. + +### 준비물 + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer](seedminer) +{: .notice--primary} diff --git a/_pages/ko_KR/updating-firmware-(kor-twn).md b/_pages/ko_KR/updating-firmware-(kor-twn).md deleted file mode 100644 index 74a2b48f90..0000000000 --- a/_pages/ko_KR/updating-firmware-(kor-twn).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (KOR/TWN)" ---- - -### Required Reading - -To use the Seedminer exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Seedminer](seedminer) -{: .notice--primary} diff --git a/_pages/ko_KR/updating-firmware-(new-3ds).txt b/_pages/ko_KR/updating-firmware-(new-3ds).txt new file mode 100644 index 0000000000..093933a0e8 --- /dev/null +++ b/_pages/ko_KR/updating-firmware-(new-3ds).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (New 3DS)" +--- + +### 중요 + +To use the super-skaterhax exploit, you must update your device to the latest system version. + +### 준비물 + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) +{: .notice--primary} diff --git a/_pages/ko_KR/updating-firmware-(twn).txt b/_pages/ko_KR/updating-firmware-(twn).txt new file mode 100644 index 0000000000..3105ac1e4b --- /dev/null +++ b/_pages/ko_KR/updating-firmware-(twn).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (TWN)" +--- + +### 중요 + +To use the Seedminer exploit, you must update your device to the latest system version. + +### 준비물 + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer (TWN)](seedminer-(twn)) +{: .notice--primary} diff --git a/_pages/ms_MY/404.md b/_pages/ms_MY/404.txt similarity index 100% rename from _pages/ms_MY/404.md rename to _pages/ms_MY/404.txt diff --git a/_pages/ms_MY/bannerbomb3-(legacy).txt b/_pages/ms_MY/bannerbomb3-(legacy).txt new file mode 100644 index 0000000000..503794c42a --- /dev/null +++ b/_pages/ms_MY/bannerbomb3-(legacy).txt @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title="Table of Contents" %} + +{% capture technical_info %} +Technical Details (optional) + +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### Compatibility Notes + +These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. + +### What You Need + +* Your `movable.sed` file from completing Seedminer or nimhax + +#### Section I - Prep Work + +{% include_relative include/bb3-prep.txt %} + +#### Section II - Hardware Button Check + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### Next steps: Choose an exploit + +If the camera appeared in the previous section, Safe Mode is likely to be working on your device. + +If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/ms_MY/bannerbomb3.txt b/_pages/ms_MY/bannerbomb3.txt index 26ab487f35..a8383926fd 100644 --- a/_pages/ms_MY/bannerbomb3.txt +++ b/_pages/ms_MY/bannerbomb3.txt @@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. - -1. Power off your device -1. Pasang kad SD anda ke dalam komputer -1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer -1. Upload your movable.sed using the “Choose File” option -1. Click “Build and Download” - + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) -1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it - + This file does not need to be opened or extracted - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.txt %} #### Section II - Hardware Button Check -In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. - -Your SD card should remain in your computer while you perform this check. - {% include_relative include/safemodecheck.txt %} ___ diff --git a/_pages/pl_PL/credits.md b/_pages/ms_MY/credits.txt similarity index 100% rename from _pages/pl_PL/credits.md rename to _pages/ms_MY/credits.txt diff --git a/_pages/ms_MY/donations.md b/_pages/ms_MY/donations.txt similarity index 100% rename from _pages/ms_MY/donations.md rename to _pages/ms_MY/donations.txt diff --git a/_pages/ms_MY/finalizing-setup.txt b/_pages/ms_MY/finalizing-setup.txt index f009d1e2dc..f0fc045851 100644 --- a/_pages/ms_MY/finalizing-setup.txt +++ b/_pages/ms_MY/finalizing-setup.txt @@ -177,9 +177,6 @@ ___ You're done! Custom firmware is now fully configured on your device. {: .notice--success} -Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! -{: .notice--info} - ### Information and Notes {% capture notice-6 %} diff --git a/_pages/ms_MY/homebrew-launcher-(super-skaterhax).txt b/_pages/ms_MY/homebrew-launcher-(super-skaterhax).txt index ed343409a8..e1d77b00c0 100644 --- a/_pages/ms_MY/homebrew-launcher-(super-skaterhax).txt +++ b/_pages/ms_MY/homebrew-launcher-(super-skaterhax).txt @@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up 1. Select the "GO GO!" button on the top screen + If any prompts appear, approve all of them + If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section + + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) 1. If the exploit was successful, your device will have booted into the Homebrew Launcher 1. Power off your device diff --git a/_pages/ms_MY/include/bb3-prep.txt b/_pages/ms_MY/include/bb3-prep.txt new file mode 100644 index 0000000000..f7dc4850f1 --- /dev/null +++ b/_pages/ms_MY/include/bb3-prep.txt @@ -0,0 +1,23 @@ +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + +1. Power off your device +1. Pasang kad SD anda ke dalam komputer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. Create a folder named `Nintendo DSiWare` inside of the `` + + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/ms_MY/include/fredtool-prep.txt b/_pages/ms_MY/include/fredtool-prep.txt new file mode 100644 index 0000000000..44ada00ff0 --- /dev/null +++ b/_pages/ms_MY/include/fredtool-prep.txt @@ -0,0 +1,29 @@ +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. + +1. Pasang kad SD anda ke dalam komputer +1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer +1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. Click "Build" + + Wait a few seconds for the build process to complete +1. In the Build History section on the left, type the Username into the "Filter Builds" field +1. Click on the first search result + + This result should have the latest timestamp +1. Click the "output_(name).zip" link +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card +1. Reinsert your SD card into your device +1. Power on your device + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/ms_MY/include/fredtool-restore-dsconn.txt b/_pages/ms_MY/include/fredtool-restore-dsconn.txt new file mode 100644 index 0000000000..3057b3ac9d --- /dev/null +++ b/_pages/ms_MY/include/fredtool-restore-dsconn.txt @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title +1. Select "Copy", then select "OK" diff --git a/_pages/ms_MY/include/fredtool-write-flipnote.txt b/_pages/ms_MY/include/fredtool-write-flipnote.txt new file mode 100644 index 0000000000..cb6f428624 --- /dev/null +++ b/_pages/ms_MY/include/fredtool-write-flipnote.txt @@ -0,0 +1,11 @@ +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Select "Copy", then select "OK" +1. Return to main menu of the System Settings +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/ms_MY/include/safemodecheck.txt b/_pages/ms_MY/include/safemodecheck.txt index 43ebec6575..7035baace8 100644 --- a/_pages/ms_MY/include/safemodecheck.txt +++ b/_pages/ms_MY/include/safemodecheck.txt @@ -1,3 +1,5 @@ +In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page. + 1. Power on your device 1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time + The camera applet should appear diff --git a/_pages/ms_MY/include/seedminer-base.txt b/_pages/ms_MY/include/seedminer-base.txt index 0eb1a6fbcd..1626c26f18 100644 --- a/_pages/ms_MY/include/seedminer-base.txt +++ b/_pages/ms_MY/include/seedminer-base.txt @@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. +{% capture console_state_info %} Before following this section: + Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data + Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen) -{: .notice--info} +{% endcapture %} +
{{ console_state_info | markdownify }}
1. Power off your device 1. Pasang kad SD anda ke dalam komputer diff --git a/_pages/ms_MY/installing-boot9strap-(fredtool).txt b/_pages/ms_MY/installing-boot9strap-(fredtool).txt index 6d9a817a01..455c3317a3 100644 --- a/_pages/ms_MY/installing-boot9strap-(fredtool).txt +++ b/_pages/ms_MY/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ### What You Need * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) #### Section I - CFW Check @@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana #### Section III - Prep Work -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Pasang kad SD anda ke dalam komputer -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert your SD card into your device -1. Power on your device - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.txt %} #### Section IV - Overwriting DS Connection Settings -In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. - -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Haxxxxxxxxx!" title - + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Select "Copy", then select "OK" -1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) -1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio - + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.txt %} #### Section V - Flipnote Exploit @@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte #### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. - -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Nintendo DSi™" title -1. Select "Copy", then select "OK" +{% include_relative include/fredtool-restore-dsconn.txt %} ___ + ### Continue to [Finalizing Setup](finalizing-setup) {: .notice--primary} diff --git a/_pages/ms_MY/installing-boot9strap-(fredtool-legacy).txt b/_pages/ms_MY/installing-boot9strap-(fredtool-legacy).txt new file mode 100644 index 0000000000..1513694ebd --- /dev/null +++ b/_pages/ms_MY/installing-boot9strap-(fredtool-legacy).txt @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title="Table of Contents" %} + +{% capture technical_info %} +Technical Details (optional) + +To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +### What You Need + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) + +#### Section I - CFW Check + +{% include_relative include/cfw-check-fredtool.txt %} + +#### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically reboot +1. Power off your device + +#### Section III - Prep Work + +{% include_relative include/fredtool-prep.txt %} + +#### Section IV - Overwriting DS Connection Settings + +{% include_relative include/fredtool-write-flipnote.txt %} + +#### Section V - Flipnote Exploit + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### Section VI - Luma3DS Configuration + +1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### Section VII - Restoring DS Connection Settings + +{% include_relative include/fredtool-restore-dsconn.txt %} + +___ + + +### Continue to [Finalizing Setup](finalizing-setup) +{: .notice--primary} diff --git a/_pages/ms_MY/seedminer-(mii).txt b/_pages/ms_MY/seedminer-(mii).txt new file mode 100644 index 0000000000..5faf224c22 --- /dev/null +++ b/_pages/ms_MY/seedminer-(mii).txt @@ -0,0 +1,84 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title="Table of Contents" %} + +{% capture gpu_warning %} +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: ++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) ++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple) ++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) ++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{% endcapture %} +
{{ gpu_warning | markdownify }}
+ +{% capture technical_info %} +Technical Details (optional) + +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### What you need + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### Section I - Prep Work + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/ms_MY/site-navigation.txt b/_pages/ms_MY/site-navigation.txt index c54bdee07a..3d352bce51 100644 --- a/_pages/ms_MY/site-navigation.txt +++ b/_pages/ms_MY/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [A9LH to B9S](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) + [Kredit](credits) + [Checking for CFW](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [Home](/) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) + [Installing boot9strap (Hardmod)](installing-boot9strap-(hardmod)) + [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [Menukar Kawasan](region-changing) + [Restoring / Updating CFW](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (TWN)](seedminer-(twn)) + [Penyelesaian](troubleshooting) + [Uninstall CFW](uninstall-cfw) diff --git a/_pages/ms_MY/updating-firmware-(kor).txt b/_pages/ms_MY/updating-firmware-(kor).txt new file mode 100644 index 0000000000..4b08786c27 --- /dev/null +++ b/_pages/ms_MY/updating-firmware-(kor).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (KOR)" +--- + +### Required Reading + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer](seedminer) +{: .notice--primary} diff --git a/_pages/ms_MY/updating-firmware-(kor-twn).md b/_pages/ms_MY/updating-firmware-(kor-twn).md deleted file mode 100644 index 74a2b48f90..0000000000 --- a/_pages/ms_MY/updating-firmware-(kor-twn).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (KOR/TWN)" ---- - -### Required Reading - -To use the Seedminer exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Seedminer](seedminer) -{: .notice--primary} diff --git a/_pages/fi_FI/updating-firmware-(new-3ds).md b/_pages/ms_MY/updating-firmware-(new-3ds).txt similarity index 100% rename from _pages/fi_FI/updating-firmware-(new-3ds).md rename to _pages/ms_MY/updating-firmware-(new-3ds).txt diff --git a/_pages/ms_MY/updating-firmware-(twn).txt b/_pages/ms_MY/updating-firmware-(twn).txt new file mode 100644 index 0000000000..83e6992b1b --- /dev/null +++ b/_pages/ms_MY/updating-firmware-(twn).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (TWN)" +--- + +### Required Reading + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer (TWN)](seedminer-(twn)) +{: .notice--primary} diff --git a/_pages/nl_NL/404.md b/_pages/nl_NL/404.txt similarity index 100% rename from _pages/nl_NL/404.md rename to _pages/nl_NL/404.txt diff --git a/_pages/nl_NL/bannerbomb3-(legacy).txt b/_pages/nl_NL/bannerbomb3-(legacy).txt new file mode 100644 index 0000000000..43cd0d6bc0 --- /dev/null +++ b/_pages/nl_NL/bannerbomb3-(legacy).txt @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title="Inhoudsopgave" %} + +{% capture technical_info %} +Technical Details (optional) + +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### Compatibility Notes + +Deze instructies werken aan de consoles van de VS, Europa, Japan en Korea zoals aangegeven in de letters U, E, J, of K na de systeemversie. + +### Wat je nodig hebt + +* Your `movable.sed` file from completing Seedminer or nimhax + +#### Deel I - Voorbereiding + +{% include_relative include/bb3-prep.txt %} + +#### Section II - Hardware Button Check + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### Next steps: Choose an exploit + +If the camera appeared in the previous section, Safe Mode is likely to be working on your device. + +If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/nl_NL/bannerbomb3.txt b/_pages/nl_NL/bannerbomb3.txt index 8efc7d5674..8f97b63fbf 100644 --- a/_pages/nl_NL/bannerbomb3.txt +++ b/_pages/nl_NL/bannerbomb3.txt @@ -30,36 +30,10 @@ Als je een Taiwanese console hebt (aangegeven door een T na de systeemversie), v #### Deel I - Voorbereiding -In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. - -1. Schakel je 3DS uit -1. Plaats je SD-kaart in je computer -1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer -1. Upload your movable.sed using the “Choose File” option -1. Click “Build and Download” - + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) -1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card - + De hoofdmap van de SD-kaart verwijst naar de bovenste map van de SD-kaart, waarin je alle mappen op de SD-kaart kunt zien, waaronder de Nintendo 3DS map, zonder je in de Nintendo 3DS map te bevinden - + This file does not need to be opened or extracted - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.txt %} #### Section II - Hardware Button Check -In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. - -Your SD card should remain in your computer while you perform this check. - {% include_relative include/safemodecheck.txt %} ___ diff --git a/_pages/pt_PT/credits.md b/_pages/nl_NL/credits.txt similarity index 100% rename from _pages/pt_PT/credits.md rename to _pages/nl_NL/credits.txt diff --git a/_pages/nl_NL/donations.md b/_pages/nl_NL/donations.txt similarity index 100% rename from _pages/nl_NL/donations.md rename to _pages/nl_NL/donations.txt diff --git a/_pages/nl_NL/finalizing-setup.txt b/_pages/nl_NL/finalizing-setup.txt index 89745e4107..7c3cbda3bc 100644 --- a/_pages/nl_NL/finalizing-setup.txt +++ b/_pages/nl_NL/finalizing-setup.txt @@ -177,9 +177,6 @@ ___ Je bent klaar! Custom firmware is nu volledig geconfigureerd op je apparaat. {: .notice--success} -Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! -{: .notice--info} - ### Information and Notes {% capture notice-6 %} diff --git a/_pages/nl_NL/homebrew-launcher-(super-skaterhax).txt b/_pages/nl_NL/homebrew-launcher-(super-skaterhax).txt index 6df316d907..a57f338888 100644 --- a/_pages/nl_NL/homebrew-launcher-(super-skaterhax).txt +++ b/_pages/nl_NL/homebrew-launcher-(super-skaterhax).txt @@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up 1. Select the "GO GO!" button on the top screen + If any prompts appear, approve all of them + If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section + + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) 1. If the exploit was successful, your device will have booted into the Homebrew Launcher 1. Schakel je 3DS uit diff --git a/_pages/nl_NL/include/bb3-prep.txt b/_pages/nl_NL/include/bb3-prep.txt new file mode 100644 index 0000000000..fed2c0d776 --- /dev/null +++ b/_pages/nl_NL/include/bb3-prep.txt @@ -0,0 +1,23 @@ +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + +1. Schakel je 3DS uit +1. Plaats je SD kaart in je computer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + De hoofdmap van de SD-kaart verwijst naar de bovenste map van de SD-kaart, waarin je alle mappen op de SD-kaart kunt zien, waaronder de Nintendo 3DS map, zonder je in de Nintendo 3DS map te bevinden + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. Create a folder named `Nintendo DSiWare` inside of the `` + + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/nl_NL/include/fredtool-prep.txt b/_pages/nl_NL/include/fredtool-prep.txt new file mode 100644 index 0000000000..7ff38b9822 --- /dev/null +++ b/_pages/nl_NL/include/fredtool-prep.txt @@ -0,0 +1,29 @@ +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. + +1. Plaats je SD kaart in je computer +1. Open de [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website op je computer +1. Voer een alfanumerieke naam in onder het "Username" veld (geen spaties of speciale tekens) +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. Onder het veld "MovableSed", upload je `movable.sed` bestand met behulp van de tweede "Browse..." optie +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. Klik op "Build" + + Wait a few seconds for the build process to complete +1. In the Build History section on the left, type the Username into the "Filter Builds" field +1. Click on the first search result + + This result should have the latest timestamp +1. Klik op de "output_(name).zip" link +1. Navigeer naar `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` op je SD-kaart + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Kopieer `boot.firm` en `boot.3dsx` van de Luma3DS `.zip` naar de hoofdmap van je SD-kaart + + De hoofdmap van de SD-kaart verwijst naar de bovenste map van de SD-kaart, waarin je alle mappen op de SD-kaart kunt zien, waaronder de Nintendo 3DS map, zonder je in de Nintendo 3DS map te bevinden +1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card +1. Kopieer de `private` map van de Frogminer_save `.zip` naar de hoofdmap van je SD-kaart +1. Stop je SD kaart terug in je 3DS +1. Zet je 3DS aan + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/nl_NL/include/fredtool-restore-dsconn.txt b/_pages/nl_NL/include/fredtool-restore-dsconn.txt new file mode 100644 index 0000000000..08d9a848b6 --- /dev/null +++ b/_pages/nl_NL/include/fredtool-restore-dsconn.txt @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. Navigeer naar `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` op je SD-kaart +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. Stop je SD kaart terug in je 3DS +1. Zet je 3DS aan +1. Open System Settings op je apparaat +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title +1. Selecteer "Copy" en selecteer dan "OK" diff --git a/_pages/nl_NL/include/fredtool-write-flipnote.txt b/_pages/nl_NL/include/fredtool-write-flipnote.txt new file mode 100644 index 0000000000..14c945bc4e --- /dev/null +++ b/_pages/nl_NL/include/fredtool-write-flipnote.txt @@ -0,0 +1,11 @@ +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + +1. Open System Settings op je apparaat +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Selecteer "Copy" en selecteer dan "OK" +1. Ga terug naar het hoofdmenu van System Settings +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. Als de exploit successful was, zal jouw 3DS de JPN versie van Flipnote Studio hebben opgestart + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/nl_NL/include/safemodecheck.txt b/_pages/nl_NL/include/safemodecheck.txt index 245f528061..a44af7c48c 100644 --- a/_pages/nl_NL/include/safemodecheck.txt +++ b/_pages/nl_NL/include/safemodecheck.txt @@ -1,3 +1,5 @@ +In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page. + 1. Zet je 3DS aan 1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time + The camera applet should appear diff --git a/_pages/nl_NL/include/seedminer-base.txt b/_pages/nl_NL/include/seedminer-base.txt index 9944fafff9..88b0596c1d 100644 --- a/_pages/nl_NL/include/seedminer-base.txt +++ b/_pages/nl_NL/include/seedminer-base.txt @@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. +{% capture console_state_info %} Before following this section: + Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data + Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen) -{: .notice--info} +{% endcapture %} +
{{ console_state_info | markdownify }}
1. Schakel je 3DS uit 1. Plaats je SD kaart in je computer diff --git a/_pages/nl_NL/installing-boot9strap-(fredtool).txt b/_pages/nl_NL/installing-boot9strap-(fredtool).txt index 09bb472b84..3bec727b0b 100644 --- a/_pages/nl_NL/installing-boot9strap-(fredtool).txt +++ b/_pages/nl_NL/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ### Wat je nodig hebt * je `movable.sed` bestand van het voltooien van [Seedminer](seedminer) * De nieuwste versie van [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * De nieuwste versie van [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (het Luma3DS `.zip` bestand) #### Deel I - CFW Controle @@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana #### Section III - Prep Work -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Plaats je SD kaart in je computer -1. Open de [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website op je computer -1. Voer een alfanumerieke naam in onder het "Username" veld (geen spaties of speciale tekens) -1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option -1. Onder het veld "MovableSed", upload je `movable.sed` bestand met behulp van de tweede "Browse..." optie -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Klik op "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Klik op de "output_(name).zip" link -1. Navigeer naar `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` op je SD-kaart - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Kopieer `boot.firm` en `boot.3dsx` van de Luma3DS `.zip` naar de hoofdmap van je SD-kaart - + De hoofdmap van de SD-kaart verwijst naar de bovenste map van de SD-kaart, waarin je alle mappen op de SD-kaart kunt zien, waaronder de Nintendo 3DS map, zonder je in de Nintendo 3DS map te bevinden -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Kopieer de `private` map van de Frogminer_save `.zip` naar de hoofdmap van je SD-kaart -1. Stop je SD kaart terug in je 3DS -1. Zet je 3DS aan - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.txt %} #### Section IV - Overwriting DS Connection Settings -In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. - -1. Open System Settings op je apparaat -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Haxxxxxxxxx!" title - + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Selecteer "Copy" en selecteer dan "OK" -1. Ga terug naar het hoofdmenu van System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) -1. Als de exploit successful was, zal jouw 3DS de JPN versie van Flipnote Studio hebben opgestart - + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.txt %} #### Deel V - Flipnote Exploit @@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte #### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. - -1. Navigeer naar `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` op je SD-kaart -1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one -1. Stop je SD kaart terug in je 3DS -1. Zet je 3DS aan -1. Open System Settings op je apparaat -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Nintendo DSi™" title -1. Selecteer "Copy" en selecteer dan "OK" +{% include_relative include/fredtool-restore-dsconn.txt %} ___ + ### Doorgaan naar [Installatie voltooien](finalizing-setup) {: .notice--primary} diff --git a/_pages/nl_NL/installing-boot9strap-(fredtool-legacy).txt b/_pages/nl_NL/installing-boot9strap-(fredtool-legacy).txt new file mode 100644 index 0000000000..2754fc4832 --- /dev/null +++ b/_pages/nl_NL/installing-boot9strap-(fredtool-legacy).txt @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title="Inhoudsopgave" %} + +{% capture technical_info %} +Technical Details (optional) + +Om DSiWare die op het systeem staat te dumpen naar de SD-kaart, maken we gebruik van een fout in het DSiWare Data Management venster van de Settings applicatie. + +Om dit te bereiken, gebruiken we de encryptiesleutel van je systeem (movable.sed) om een DSiWare back-up te maken die het systeem exploiteert om de DSi Internet Settings applicatie naar de hoofdmap van je SD-kaart te dumpen. + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +### Wat je nodig hebt + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* De nieuwste versie van [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* De nieuwste versie van [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (het Luma3DS `.zip` bestand) + +#### Deel I - CFW Controle + +{% include_relative include/cfw-check-fredtool.txt %} + +#### Deel II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Stop je SD kaart terug in je 3DS +1. Zet je 3DS aan +1. Open System Settings op je apparaat +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically reboot +1. Schakel je 3DS uit + +#### Section III - Prep Work + +{% include_relative include/fredtool-prep.txt %} + +#### Section IV - Overwriting DS Connection Settings + +{% include_relative include/fredtool-write-flipnote.txt %} + +#### Deel V - Flipnote Exploit + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### Section VI - Luma3DS Configuration + +1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### Section VII - Restoring DS Connection Settings + +{% include_relative include/fredtool-restore-dsconn.txt %} + +___ + + +### Doorgaan naar [Installatie voltooien](finalizing-setup) +{: .notice--primary} diff --git a/_pages/nl_NL/seedminer-(mii).txt b/_pages/nl_NL/seedminer-(mii).txt new file mode 100644 index 0000000000..4758fcc9c4 --- /dev/null +++ b/_pages/nl_NL/seedminer-(mii).txt @@ -0,0 +1,84 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title="Inhoudsopgave" %} + +{% capture gpu_warning %} +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: ++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) ++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple) ++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) ++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{% endcapture %} +
{{ gpu_warning | markdownify }}
+ +{% capture technical_info %} +Technical Details (optional) + +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### Wat je nodig hebt + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### Section I - Prep Work + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/nl_NL/site-navigation.txt b/_pages/nl_NL/site-navigation.txt index e09fe30ff8..29316c2a3b 100644 --- a/_pages/nl_NL/site-navigation.txt +++ b/_pages/nl_NL/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [A9LH naar B9S](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) + [Credits](credits) + [Controleren op CFW](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [Home](/) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [Boot9strap installeren (Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) + [Boot9strap installeren (Hardmod)](installing-boot9strap-(hardmod)) + [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [Regio Wijzigen](region-changing) + [CFW herstellen / bijwerken](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (TWN)](seedminer-(twn)) [Probleemoplossing](troubleshooting) + [CFW verwijderen](uninstall-cfw) diff --git a/_pages/nl_NL/updating-firmware-(kor).txt b/_pages/nl_NL/updating-firmware-(kor).txt new file mode 100644 index 0000000000..4709ec782c --- /dev/null +++ b/_pages/nl_NL/updating-firmware-(kor).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (KOR)" +--- + +### Verplicht te lezen + +To use the Seedminer exploit, you must update your device to the latest system version. + +### Wat je nodig hebt + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer](seedminer) +{: .notice--primary} diff --git a/_pages/nl_NL/updating-firmware-(kor-twn).md b/_pages/nl_NL/updating-firmware-(kor-twn).md deleted file mode 100644 index 74a2b48f90..0000000000 --- a/_pages/nl_NL/updating-firmware-(kor-twn).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (KOR/TWN)" ---- - -### Required Reading - -To use the Seedminer exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Seedminer](seedminer) -{: .notice--primary} diff --git a/_pages/nl_NL/updating-firmware-(new-3ds).md b/_pages/nl_NL/updating-firmware-(new-3ds).md deleted file mode 100644 index 5366fdd3b9..0000000000 --- a/_pages/nl_NL/updating-firmware-(new-3ds).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (New 3DS)" ---- - -### Required Reading - -To use the super-skaterhax exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) -{: .notice--primary} diff --git a/_pages/nl_NL/updating-firmware-(new-3ds).txt b/_pages/nl_NL/updating-firmware-(new-3ds).txt new file mode 100644 index 0000000000..7e781e8f39 --- /dev/null +++ b/_pages/nl_NL/updating-firmware-(new-3ds).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (New 3DS)" +--- + +### Verplicht te lezen + +To use the super-skaterhax exploit, you must update your device to the latest system version. + +### Wat je nodig hebt + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) +{: .notice--primary} diff --git a/_pages/nl_NL/updating-firmware-(twn).txt b/_pages/nl_NL/updating-firmware-(twn).txt new file mode 100644 index 0000000000..8c0f0c0009 --- /dev/null +++ b/_pages/nl_NL/updating-firmware-(twn).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (TWN)" +--- + +### Verplicht te lezen + +To use the Seedminer exploit, you must update your device to the latest system version. + +### Wat je nodig hebt + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer (TWN)](seedminer-(twn)) +{: .notice--primary} diff --git a/_pages/no_NO/404.md b/_pages/no_NO/404.txt similarity index 100% rename from _pages/no_NO/404.md rename to _pages/no_NO/404.txt diff --git a/_pages/no_NO/bannerbomb3-(legacy).txt b/_pages/no_NO/bannerbomb3-(legacy).txt new file mode 100644 index 0000000000..503794c42a --- /dev/null +++ b/_pages/no_NO/bannerbomb3-(legacy).txt @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title="Table of Contents" %} + +{% capture technical_info %} +Technical Details (optional) + +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### Compatibility Notes + +These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. + +### What You Need + +* Your `movable.sed` file from completing Seedminer or nimhax + +#### Section I - Prep Work + +{% include_relative include/bb3-prep.txt %} + +#### Section II - Hardware Button Check + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### Next steps: Choose an exploit + +If the camera appeared in the previous section, Safe Mode is likely to be working on your device. + +If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/no_NO/bannerbomb3.txt b/_pages/no_NO/bannerbomb3.txt index ed62d87b81..a8383926fd 100644 --- a/_pages/no_NO/bannerbomb3.txt +++ b/_pages/no_NO/bannerbomb3.txt @@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. - -1. Slå av enheten -1. Sett inn SD-kortet i datamaskinen din -1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer -1. Upload your movable.sed using the “Choose File” option -1. Click “Build and Download” - + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) -1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it - + This file does not need to be opened or extracted - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.txt %} #### Section II - Hardware Button Check -In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. - -Your SD card should remain in your computer while you perform this check. - {% include_relative include/safemodecheck.txt %} ___ diff --git a/_pages/ro_RO/credits.md b/_pages/no_NO/credits.txt similarity index 100% rename from _pages/ro_RO/credits.md rename to _pages/no_NO/credits.txt diff --git a/_pages/no_NO/donations.md b/_pages/no_NO/donations.txt similarity index 100% rename from _pages/no_NO/donations.md rename to _pages/no_NO/donations.txt diff --git a/_pages/no_NO/finalizing-setup.txt b/_pages/no_NO/finalizing-setup.txt index 4071ad66fd..ef0222555e 100644 --- a/_pages/no_NO/finalizing-setup.txt +++ b/_pages/no_NO/finalizing-setup.txt @@ -177,9 +177,6 @@ ___ You're done! Custom firmware is now fully configured on your device. {: .notice--success} -Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! -{: .notice--info} - ### Information and Notes {% capture notice-6 %} diff --git a/_pages/no_NO/homebrew-launcher-(super-skaterhax).txt b/_pages/no_NO/homebrew-launcher-(super-skaterhax).txt index 3853d0ed2e..45d47f7e8b 100644 --- a/_pages/no_NO/homebrew-launcher-(super-skaterhax).txt +++ b/_pages/no_NO/homebrew-launcher-(super-skaterhax).txt @@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up 1. Select the "GO GO!" button on the top screen + If any prompts appear, approve all of them + If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section + + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) 1. If the exploit was successful, your device will have booted into the Homebrew Launcher 1. Slå av enheten diff --git a/_pages/no_NO/include/bb3-prep.txt b/_pages/no_NO/include/bb3-prep.txt new file mode 100644 index 0000000000..5a1faff25b --- /dev/null +++ b/_pages/no_NO/include/bb3-prep.txt @@ -0,0 +1,23 @@ +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + +1. Slå av enheten +1. Sett inn SD-kortet i datamaskinen din +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. Create a folder named `Nintendo DSiWare` inside of the `` + + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/no_NO/include/fredtool-prep.txt b/_pages/no_NO/include/fredtool-prep.txt new file mode 100644 index 0000000000..e6909b3fba --- /dev/null +++ b/_pages/no_NO/include/fredtool-prep.txt @@ -0,0 +1,29 @@ +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. + +1. Sett inn SD-kortet i datamaskinen din +1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer +1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. Click "Build" + + Wait a few seconds for the build process to complete +1. In the Build History section on the left, type the Username into the "Filter Builds" field +1. Click on the first search result + + This result should have the latest timestamp +1. Click the "output_(name).zip" link +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card +1. Sett inn SD-kortet i konsollen igjen +1. Power on your device + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/no_NO/include/fredtool-restore-dsconn.txt b/_pages/no_NO/include/fredtool-restore-dsconn.txt new file mode 100644 index 0000000000..c29489ad2a --- /dev/null +++ b/_pages/no_NO/include/fredtool-restore-dsconn.txt @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. Sett inn SD-kortet i konsollen igjen +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title +1. Select "Copy", then select "OK" diff --git a/_pages/no_NO/include/fredtool-write-flipnote.txt b/_pages/no_NO/include/fredtool-write-flipnote.txt new file mode 100644 index 0000000000..cb6f428624 --- /dev/null +++ b/_pages/no_NO/include/fredtool-write-flipnote.txt @@ -0,0 +1,11 @@ +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Select "Copy", then select "OK" +1. Return to main menu of the System Settings +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/no_NO/include/safemodecheck.txt b/_pages/no_NO/include/safemodecheck.txt index a596b549ab..f094406c4e 100644 --- a/_pages/no_NO/include/safemodecheck.txt +++ b/_pages/no_NO/include/safemodecheck.txt @@ -1,3 +1,5 @@ +In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page. + 1. Power on your device 1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time + The camera applet should appear diff --git a/_pages/no_NO/include/seedminer-base.txt b/_pages/no_NO/include/seedminer-base.txt index 5a2eacd11e..309fd51dd0 100644 --- a/_pages/no_NO/include/seedminer-base.txt +++ b/_pages/no_NO/include/seedminer-base.txt @@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. +{% capture console_state_info %} Before following this section: + Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data + Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen) -{: .notice--info} +{% endcapture %} +
{{ console_state_info | markdownify }}
1. Slå av enheten 1. Sett inn SD-kortet i datamaskinen din diff --git a/_pages/no_NO/installing-boot9strap-(fredtool).txt b/_pages/no_NO/installing-boot9strap-(fredtool).txt index bc056796d7..d32c5024ab 100644 --- a/_pages/no_NO/installing-boot9strap-(fredtool).txt +++ b/_pages/no_NO/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ### What You Need * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) #### Section I - CFW Check @@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana #### Section III - Prep Work -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Sett inn SD-kortet i datamaskinen din -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Sett inn SD-kortet i konsollen igjen -1. Power on your device - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.txt %} #### Section IV - Overwriting DS Connection Settings -In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. - -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Haxxxxxxxxx!" title - + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Select "Copy", then select "OK" -1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) -1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio - + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.txt %} #### Section V - Flipnote Exploit @@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte #### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. - -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one -1. Sett inn SD-kortet i konsollen igjen -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Nintendo DSi™" title -1. Select "Copy", then select "OK" +{% include_relative include/fredtool-restore-dsconn.txt %} ___ + ### Continue to [Finalizing Setup](finalizing-setup) {: .notice--primary} diff --git a/_pages/no_NO/installing-boot9strap-(fredtool-legacy).txt b/_pages/no_NO/installing-boot9strap-(fredtool-legacy).txt new file mode 100644 index 0000000000..b5cec72028 --- /dev/null +++ b/_pages/no_NO/installing-boot9strap-(fredtool-legacy).txt @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title="Table of Contents" %} + +{% capture technical_info %} +Technical Details (optional) + +To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +### What You Need + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) + +#### Section I - CFW Check + +{% include_relative include/cfw-check-fredtool.txt %} + +#### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Sett inn SD-kortet i konsollen igjen +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically reboot +1. Slå av enheten + +#### Section III - Prep Work + +{% include_relative include/fredtool-prep.txt %} + +#### Section IV - Overwriting DS Connection Settings + +{% include_relative include/fredtool-write-flipnote.txt %} + +#### Section V - Flipnote Exploit + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### Section VI - Luma3DS Configuration + +1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### Section VII - Restoring DS Connection Settings + +{% include_relative include/fredtool-restore-dsconn.txt %} + +___ + + +### Continue to [Finalizing Setup](finalizing-setup) +{: .notice--primary} diff --git a/_pages/no_NO/seedminer-(mii).txt b/_pages/no_NO/seedminer-(mii).txt new file mode 100644 index 0000000000..5faf224c22 --- /dev/null +++ b/_pages/no_NO/seedminer-(mii).txt @@ -0,0 +1,84 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title="Table of Contents" %} + +{% capture gpu_warning %} +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: ++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) ++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple) ++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) ++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{% endcapture %} +
{{ gpu_warning | markdownify }}
+ +{% capture technical_info %} +Technical Details (optional) + +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### What you need + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### Section I - Prep Work + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/no_NO/site-navigation.txt b/_pages/no_NO/site-navigation.txt index f3e30e0a54..49d680be65 100644 --- a/_pages/no_NO/site-navigation.txt +++ b/_pages/no_NO/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [A9LH to B9S](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) + [Credits](credits) + [Checking for CFW](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [Hjem](/) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) + [Installing boot9strap (Hardmod)](installing-boot9strap-(hardmod)) + [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [Region bytte](region-changing) + [Restoring / Updating CFW](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (TWN)](seedminer-(twn)) + [Feilsøking](troubleshooting) + [Uninstall CFW](uninstall-cfw) diff --git a/_pages/no_NO/updating-firmware-(kor).txt b/_pages/no_NO/updating-firmware-(kor).txt new file mode 100644 index 0000000000..4b08786c27 --- /dev/null +++ b/_pages/no_NO/updating-firmware-(kor).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (KOR)" +--- + +### Required Reading + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer](seedminer) +{: .notice--primary} diff --git a/_pages/no_NO/updating-firmware-(kor-twn).md b/_pages/no_NO/updating-firmware-(kor-twn).md deleted file mode 100644 index 74a2b48f90..0000000000 --- a/_pages/no_NO/updating-firmware-(kor-twn).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (KOR/TWN)" ---- - -### Required Reading - -To use the Seedminer exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Seedminer](seedminer) -{: .notice--primary} diff --git a/_pages/no_NO/updating-firmware-(new-3ds).md b/_pages/no_NO/updating-firmware-(new-3ds).md deleted file mode 100644 index 5366fdd3b9..0000000000 --- a/_pages/no_NO/updating-firmware-(new-3ds).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (New 3DS)" ---- - -### Required Reading - -To use the super-skaterhax exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) -{: .notice--primary} diff --git a/_pages/fr_FR/updating-firmware-(new-3ds).md b/_pages/no_NO/updating-firmware-(new-3ds).txt similarity index 100% rename from _pages/fr_FR/updating-firmware-(new-3ds).md rename to _pages/no_NO/updating-firmware-(new-3ds).txt diff --git a/_pages/no_NO/updating-firmware-(twn).txt b/_pages/no_NO/updating-firmware-(twn).txt new file mode 100644 index 0000000000..83e6992b1b --- /dev/null +++ b/_pages/no_NO/updating-firmware-(twn).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (TWN)" +--- + +### Required Reading + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer (TWN)](seedminer-(twn)) +{: .notice--primary} diff --git a/_pages/pl_PL/404.md b/_pages/pl_PL/404.txt similarity index 100% rename from _pages/pl_PL/404.md rename to _pages/pl_PL/404.txt diff --git a/_pages/pl_PL/bannerbomb3-(legacy).txt b/_pages/pl_PL/bannerbomb3-(legacy).txt new file mode 100644 index 0000000000..529ec8a547 --- /dev/null +++ b/_pages/pl_PL/bannerbomb3-(legacy).txt @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title="Spis Treści" %} + +{% capture technical_info %} +Technical Details (optional) + +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### Compatibility Notes + +These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. + +### Czego Potrzebujesz + +* Your `movable.sed` file from completing Seedminer or nimhax + +#### Sekcja I - Przygotowanie + +{% include_relative include/bb3-prep.txt %} + +#### Section II - Hardware Button Check + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### Next steps: Choose an exploit + +If the camera appeared in the previous section, Safe Mode is likely to be working on your device. + +If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/pl_PL/bannerbomb3.txt b/_pages/pl_PL/bannerbomb3.txt index 32dde85eee..783bd0e7ea 100644 --- a/_pages/pl_PL/bannerbomb3.txt +++ b/_pages/pl_PL/bannerbomb3.txt @@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol #### Sekcja I - Przygotowanie -In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. - -1. Wyłącz konsolę -1. Włóż kartę SD do komputera -1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer -1. Upload your movable.sed using the “Choose File” option -1. Click “Build and Download” - + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) -1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it - + This file does not need to be opened or extracted - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.txt %} #### Section II - Hardware Button Check -In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. - -Your SD card should remain in your computer while you perform this check. - {% include_relative include/safemodecheck.txt %} ___ diff --git a/_pages/ru_RU/credits.md b/_pages/pl_PL/credits.txt similarity index 100% rename from _pages/ru_RU/credits.md rename to _pages/pl_PL/credits.txt diff --git a/_pages/pl_PL/donations.md b/_pages/pl_PL/donations.txt similarity index 100% rename from _pages/pl_PL/donations.md rename to _pages/pl_PL/donations.txt diff --git a/_pages/pl_PL/finalizing-setup.txt b/_pages/pl_PL/finalizing-setup.txt index bec2422865..25ad8432f3 100644 --- a/_pages/pl_PL/finalizing-setup.txt +++ b/_pages/pl_PL/finalizing-setup.txt @@ -138,7 +138,7 @@ In this section, you will use a script to copy some of Luma3DS's files to intern In this section, you will use a script to remove some unnecessary files from your SD card. 1. Wybierz "Cleanup SD Card" -1. Gdy zostaniesz poproszony, naciśnij (A) by kontynuować +1. Kiedy zostaniesz poproszony, naciśnij (A) aby kontynuować 1. Naciśnij (A), aby kontynuować 1. Wciśnij (B) aby wrócić do menu głównego @@ -177,9 +177,6 @@ ___ You're done! Custom firmware is now fully configured on your device. {: .notice--success} -Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! -{: .notice--info} - ### Information and Notes {% capture notice-6 %} diff --git a/_pages/pl_PL/homebrew-launcher-(super-skaterhax).txt b/_pages/pl_PL/homebrew-launcher-(super-skaterhax).txt index caa3447fc6..a7f14ebab9 100644 --- a/_pages/pl_PL/homebrew-launcher-(super-skaterhax).txt +++ b/_pages/pl_PL/homebrew-launcher-(super-skaterhax).txt @@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up 1. Select the "GO GO!" button on the top screen + If any prompts appear, approve all of them + If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section + + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) 1. If the exploit was successful, your device will have booted into the Homebrew Launcher 1. Wyłącz konsolę diff --git a/_pages/pl_PL/include/bb3-prep.txt b/_pages/pl_PL/include/bb3-prep.txt new file mode 100644 index 0000000000..f149f24cd1 --- /dev/null +++ b/_pages/pl_PL/include/bb3-prep.txt @@ -0,0 +1,23 @@ +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + +1. Wyłącz konsolę +1. Włóż kartę SD do komputera +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. Create a folder named `Nintendo DSiWare` inside of the `` + + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/pl_PL/include/fredtool-prep.txt b/_pages/pl_PL/include/fredtool-prep.txt new file mode 100644 index 0000000000..b6d49fc22a --- /dev/null +++ b/_pages/pl_PL/include/fredtool-prep.txt @@ -0,0 +1,29 @@ +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. + +1. Włóż kartę SD do komputera +1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer +1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. Click "Build" + + Wait a few seconds for the build process to complete +1. In the Build History section on the left, type the Username into the "Filter Builds" field +1. Click on the first search result + + This result should have the latest timestamp +1. Click the "output_(name).zip" link +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card +1. Skopiuj folder `private` z katalogu Frogminer_save `.zip` do głównego katalogu Twojej karty SD +1. Włóż kartę SD do konsoli +1. Włącz konsolę + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/pl_PL/include/fredtool-restore-dsconn.txt b/_pages/pl_PL/include/fredtool-restore-dsconn.txt new file mode 100644 index 0000000000..a2782b02a1 --- /dev/null +++ b/_pages/pl_PL/include/fredtool-restore-dsconn.txt @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. Włóż kartę SD do konsoli +1. Włącz konsolę +1. Uruchom "System Settings" na twoim urządzeniu +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title +1. Wybierz "Copy", a następnie "OK" diff --git a/_pages/pl_PL/include/fredtool-write-flipnote.txt b/_pages/pl_PL/include/fredtool-write-flipnote.txt new file mode 100644 index 0000000000..ca25ce352a --- /dev/null +++ b/_pages/pl_PL/include/fredtool-write-flipnote.txt @@ -0,0 +1,11 @@ +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + +1. Uruchom "System Settings" na twoim urządzeniu +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Wybierz "Copy", a następnie "OK" +1. Wróć do głównego menu System Settings (ustawień systemowych) +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. Jeżeli exploit zadziałał, na urządzeniu uruchomi się Japońska wersja Flipnote Studio + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/pl_PL/include/safemodecheck.txt b/_pages/pl_PL/include/safemodecheck.txt index 0dcbd474d5..0521aec596 100644 --- a/_pages/pl_PL/include/safemodecheck.txt +++ b/_pages/pl_PL/include/safemodecheck.txt @@ -1,3 +1,5 @@ +In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page. + 1. Włącz konsolę 1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time + The camera applet should appear diff --git a/_pages/pl_PL/include/seedminer-base.txt b/_pages/pl_PL/include/seedminer-base.txt index a715b1829b..efabbbbf7c 100644 --- a/_pages/pl_PL/include/seedminer-base.txt +++ b/_pages/pl_PL/include/seedminer-base.txt @@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. +{% capture console_state_info %} Before following this section: + Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data + Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen) -{: .notice--info} +{% endcapture %} +
{{ console_state_info | markdownify }}
1. Wyłącz konsolę 1. Włóż kartę SD do komputera diff --git a/_pages/pl_PL/installing-boot9strap-(fredtool).txt b/_pages/pl_PL/installing-boot9strap-(fredtool).txt index da403e72be..2ff827ef8e 100644 --- a/_pages/pl_PL/installing-boot9strap-(fredtool).txt +++ b/_pages/pl_PL/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ### Czego Potrzebujesz * Twojego pliku `movable.sed` z ukończenia [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) #### Section I - CFW Check @@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana #### Section III - Prep Work -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Włóż kartę SD do komputera -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Skopiuj folder `private` z katalogu Frogminer_save `.zip` do głównego katalogu Twojej karty SD -1. Włóż kartę SD do konsoli -1. Włącz konsolę - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.txt %} #### Section IV - Overwriting DS Connection Settings -In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. - -1. Uruchom "System Settings" na twoim urządzeniu -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Haxxxxxxxxx!" title - + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Wybierz "Copy", a następnie "OK" -1. Wróć do głównego menu System Settings (ustawień systemowych) -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) -1. Jeżeli exploit zadziałał, na urządzeniu uruchomi się Japońska wersja Flipnote Studio - + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.txt %} #### Section V - Flipnote Exploit @@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte #### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. - -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one -1. Włóż kartę SD do konsoli -1. Włącz konsolę -1. Uruchom "System Settings" na twoim urządzeniu -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Nintendo DSi™" title -1. Wybierz "Copy", a następnie "OK" +{% include_relative include/fredtool-restore-dsconn.txt %} ___ + ### Kontynuuj do [Finalizowanie Instalacji](finalizing-setup) {: .notice--primary} diff --git a/_pages/pl_PL/installing-boot9strap-(fredtool-legacy).txt b/_pages/pl_PL/installing-boot9strap-(fredtool-legacy).txt new file mode 100644 index 0000000000..a3e6e8ac30 --- /dev/null +++ b/_pages/pl_PL/installing-boot9strap-(fredtool-legacy).txt @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title="Spis Treści" %} + +{% capture technical_info %} +Technical Details (optional) + +To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +### Czego Potrzebujesz + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) + +#### Section I - CFW Check + +{% include_relative include/cfw-check-fredtool.txt %} + +#### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Włóż kartę SD do konsoli +1. Włącz konsolę +1. Uruchom "System Settings" na twoim urządzeniu +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically reboot +1. Wyłącz konsolę + +#### Section III - Prep Work + +{% include_relative include/fredtool-prep.txt %} + +#### Section IV - Overwriting DS Connection Settings + +{% include_relative include/fredtool-write-flipnote.txt %} + +#### Section V - Flipnote Exploit + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### Section VI - Luma3DS Configuration + +1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### Section VII - Restoring DS Connection Settings + +{% include_relative include/fredtool-restore-dsconn.txt %} + +___ + + +### Kontynuuj do [Finalizowanie Instalacji](finalizing-setup) +{: .notice--primary} diff --git a/_pages/pl_PL/seedminer-(mii).txt b/_pages/pl_PL/seedminer-(mii).txt new file mode 100644 index 0000000000..63fcc937ce --- /dev/null +++ b/_pages/pl_PL/seedminer-(mii).txt @@ -0,0 +1,84 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title="Spis Treści" %} + +{% capture gpu_warning %} +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: ++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) ++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple) ++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) ++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{% endcapture %} +
{{ gpu_warning | markdownify }}
+ +{% capture technical_info %} +Technical Details (optional) + +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### What you need + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### Section I - Prep Work + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/pl_PL/site-navigation.txt b/_pages/pl_PL/site-navigation.txt index 5ea05609ee..8c2eb0d229 100644 --- a/_pages/pl_PL/site-navigation.txt +++ b/_pages/pl_PL/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [A9LH do B9S](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) + [Współautorzy](credits) + [Checking for CFW](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [Strona główna](/pl_PL) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [Instalacja boot9strap (Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) + [Instalacja boot9strap (Hardmod)](installing-boot9strap-(hardmod)) + [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [Zmiana Regionu Konsoli](region-changing) + [Restoring / Updating CFW](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (TWN)](seedminer-(twn)) + [Rozwiązywanie Problemów](troubleshooting) + [Odinstalowywanie CFW](uninstall-cfw) diff --git a/_pages/pl_PL/updating-firmware-(kor).txt b/_pages/pl_PL/updating-firmware-(kor).txt new file mode 100644 index 0000000000..6640d9821a --- /dev/null +++ b/_pages/pl_PL/updating-firmware-(kor).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (KOR)" +--- + +### Wymagana Lektura + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer](seedminer) +{: .notice--primary} diff --git a/_pages/pl_PL/updating-firmware-(kor-twn).md b/_pages/pl_PL/updating-firmware-(kor-twn).md deleted file mode 100644 index 74a2b48f90..0000000000 --- a/_pages/pl_PL/updating-firmware-(kor-twn).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (KOR/TWN)" ---- - -### Required Reading - -To use the Seedminer exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Seedminer](seedminer) -{: .notice--primary} diff --git a/_pages/pl_PL/updating-firmware-(new-3ds).md b/_pages/pl_PL/updating-firmware-(new-3ds).md deleted file mode 100644 index 5366fdd3b9..0000000000 --- a/_pages/pl_PL/updating-firmware-(new-3ds).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (New 3DS)" ---- - -### Required Reading - -To use the super-skaterhax exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) -{: .notice--primary} diff --git a/_pages/ja_JP/updating-firmware-(new-3ds).md b/_pages/pl_PL/updating-firmware-(new-3ds).txt similarity index 95% rename from _pages/ja_JP/updating-firmware-(new-3ds).md rename to _pages/pl_PL/updating-firmware-(new-3ds).txt index 5366fdd3b9..1ff812d4c3 100644 --- a/_pages/ja_JP/updating-firmware-(new-3ds).md +++ b/_pages/pl_PL/updating-firmware-(new-3ds).txt @@ -2,7 +2,7 @@ title: "Updating Firmware (New 3DS)" --- -### Required Reading +### Wymagana Lektura To use the super-skaterhax exploit, you must update your device to the latest system version. diff --git a/_pages/pl_PL/updating-firmware-(twn).txt b/_pages/pl_PL/updating-firmware-(twn).txt new file mode 100644 index 0000000000..956c53dab6 --- /dev/null +++ b/_pages/pl_PL/updating-firmware-(twn).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (TWN)" +--- + +### Wymagana Lektura + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer (TWN)](seedminer-(twn)) +{: .notice--primary} diff --git a/_pages/pt_BR/404.md b/_pages/pt_BR/404.txt similarity index 100% rename from _pages/pt_BR/404.md rename to _pages/pt_BR/404.txt diff --git a/_pages/pt_BR/bannerbomb3-(legacy).txt b/_pages/pt_BR/bannerbomb3-(legacy).txt new file mode 100644 index 0000000000..0bde3dd22b --- /dev/null +++ b/_pages/pt_BR/bannerbomb3-(legacy).txt @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title="Tabela de Conteúdo" %} + +{% capture technical_info %} +Detalhes técnicos (opcional) + +Para iniciar o código personalizado, nós usamos um exploit no Gerenciamento de Dados DSiWare no aplicativo Configurações do Sistema. + +Para fazer isso, usamos a chave de criptografia do seu sistema (movable.sed) para construir um backup de DSiWare que se aproveita do exploit do sistema. + +Para obter uma explicação mais técnica, veja [aqui](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### Notas de Compatibilidade + +Essas instruções funcionam nas versões de consoles EUA, Europa, Japão e Coréia, indicadas pelas letras U, E, J ou K após a versão do sistema. + +### O que é necessário + +* Seu arquivo `movable.sed` de completar o Seedminer ou nimhax + +#### Seção I - Preparação + +{% include_relative include/bb3-prep.txt %} + +#### Seção II - Verificação de Botões + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### Próximos passos: Escolha um exploit + +Se a câmera aparecer na seção anterior, é provável que o Modo de Segurança esteja funcionando em seu dispositivo. + +Caso a câmera apareceu, continue em [Instalando boot9strap (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/pt_BR/bannerbomb3.txt b/_pages/pt_BR/bannerbomb3.txt index 2531591e1e..a62959fb25 100644 --- a/_pages/pt_BR/bannerbomb3.txt +++ b/_pages/pt_BR/bannerbomb3.txt @@ -30,36 +30,10 @@ Se você tiver um console tailandês (indicado por um T após a versão do siste #### Seção I - Preparação -Nesta seção, você irá copiar os arquivos necessários para ativar o exploit BannerBomb3 em seu cartão SD. - -1. Desligue o seu dispositivo -1. Insira o cartão SD no seu computador -1. Abra o [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) no seu computador -1. Envie seu movable.sed usando a opção "Choose File" -1. Clique em "Build and Download" - + Isto irá baixar um exploited DSiWare chamado `F00D43D5.bin` e um payload chamado `bb3.bin` dentro de um arquivo zip (`DSIWARE_EXPLOIT.zip`) -1. Copie `bb3.bin` do `DSIWARE_EXPLOIT.zip` para a raiz do seu cartão SD - + A raiz do cartão SD refere-se ao diretório inicial no seu cartão SD onde você pode ver a pasta Nintendo 3DS, mas não está dentro dela - + Este arquivo não precisa ser aberto ou extraído - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. Navegue até `Nintendo 3DS` -> `` ->` em seu cartão SD - + `` é o nome da pasta 32 letras que você copiou em [Seedminer](seedminer) - + `` é uma pasta de 32 letras dentro da pasta `` - + Se você tiver múltiplas pastas ``, siga as instruções [aqui](troubleshooting#bannerbomb3) - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Crie uma pasta chamada `Nintendo DSiWare` dentro do `` - + Se você já teve a pasta *e* já existe algum arquivo de backup de DSiWare existente (`. dentro) dentro, copie-os para seu PC e remova-os do seu cartão SD -1. Copie o arquivo `F00D43D5.bin` do `DSIWARE_EXPLOIT.zip` para a pasta `Nintendo DSiWare` - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.txt %} #### Seção II - Verificação de Botões -Nesta seção, você verá se você pode acessar o Modo de Segurança no seu dispositivo. Isso determinará qual método você seguirá na próxima página. - -Seu cartão SD deve permanecer em seu computador enquanto você executa esta verificação. - {% include_relative include/safemodecheck.txt %} ___ diff --git a/_pages/pt_BR/credits.md b/_pages/pt_BR/credits.md deleted file mode 100644 index 8fd0ba07f1..0000000000 --- a/_pages/pt_BR/credits.md +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: "Créditos" ---- - -**Agradecimentos especiais a Plailect, o criador original e mantenedor da guia!** -{: .notice--primary} - -**Um agradecimento especial a todos os [#Cakey no Freenode](http://webchat.freenode.net/?channels=%23Cakey) por serem incríveis!** -{: .notice--primary} - -**Um agradecimento especial a todos os [tradutores](https://crowdin.com/project/3ds-guide) por serem incríveis!** -{: .notice--primary} - -Se esqueci de você aqui, entre em contato comigo que adicionarei seu nome. - -{% capture notice-1 %} - - + Al3x_10m - + aliaspider - + AngelSL - + ashinnblunts - + AuroraWright - + b1l1s - + BernardoGiordano - + Cartman123 - + Cell9 - + coder65535 - + Cruel - + d0k3 - + dank101 - + Dazzozo - + DeadPhoenix - + Delebile - + DinohScene - + dukesrg - + elementalcode - + elSeledonio - + erman1337 - + felipejfc - + figgyc - + fox8091 - + Frozen_Chen - + Gelex - + Hamcha - + icecream - + ihaveamac - + IngeniousDefault - + J-D-K - + Jisagi - + jkcgs - + kartik - + LordBass - + mid-kid - + MrNbaYoh - + Mrrraou - + Night_Fallen_Wolf - + Normmatt - + Plailect - + plutooo - + Psi-Hate - + RandallHoffman - + Raugo - + Reboot.ms - + s_99 - + SciresM - + Shadowtrance - + shinyquagsire23 - + skiptirengu - + smealum - + Steveice10 - + stuckpixel - + Syphurith - + Tech0verlord - + TiniVi - + TuxSH - + Urbanshadow - + Vappy - + vegaroxas - + Wolfvak - + WulfyStylez - + xy2_ - + yellows8 - + yifan_lu - + zoogie - -{% endcapture %} - -
{{ notice-1 | markdownify }}
diff --git a/_pages/pt_BR/credits.txt b/_pages/pt_BR/credits.txt new file mode 100644 index 0000000000..723571a5f8 --- /dev/null +++ b/_pages/pt_BR/credits.txt @@ -0,0 +1,88 @@ +--- +title: "Credits" +--- + +**Special thanks to Plailect, the original creator and maintainer of the guide!** +{: .notice--primary} + +**Special thanks to all of [#Cakey on Freenode](http://webchat.freenode.net/?channels=%23Cakey) for being awesome!** +{: .notice--primary} + +**Special thanks to all of [the translators](https://crowdin.com/project/3ds-guide) for being awesome!** +{: .notice--primary} + +Se esqueci de você aqui, entre em contato comigo que adicionarei seu nome. + +{% capture notice-1 %} + + + Al3x_10m + + aliaspider + + AngelSL + + ashinnblunts + + AuroraWright + + b1l1s + + BernardoGiordano + + Cartman123 + + Cell9 + + coder65535 + + Cruel + + d0k3 + + dank101 + + Dazzozo + + DeadPhoenix + + Delebile + + DinohScene + + dukesrg + + elementalcode + + elSeledonio + + erman1337 + + felipejfc + + figgyc + + fox8091 + + Frozen_Chen + + Gelex + + Hamcha + + icecream + + ihaveamac + + IngeniousDefault + + J-D-K + + Jisagi + + jkcgs + + kartik + + LordBass + + mid-kid + + MrNbaYoh + + Mrrraou + + Night_Fallen_Wolf + + Normmatt + + Plailect + + plutooo + + Psi-Hate + + RandallHoffman + + Raugo + + Reboot.ms + + s_99 + + SciresM + + Shadowtrance + + shinyquagsire23 + + skiptirengu + + smealum + + Steveice10 + + stuckpixel + + Syphurith + + Tech0verlord + + TiniVi + + TuxSH + + Urbanshadow + + Vappy + + vegaroxas + + Wolfvak + + WulfyStylez + + xy2_ + + yellows8 + + yifan_lu + + zoogie + +{% endcapture %} + +
{{ notice-1 | markdownify }}
diff --git a/_pages/pt_BR/donations.md b/_pages/pt_BR/donations.txt similarity index 100% rename from _pages/pt_BR/donations.md rename to _pages/pt_BR/donations.txt diff --git a/_pages/pt_BR/finalizing-setup.txt b/_pages/pt_BR/finalizing-setup.txt index cc5cf74706..eba54773fa 100644 --- a/_pages/pt_BR/finalizing-setup.txt +++ b/_pages/pt_BR/finalizing-setup.txt @@ -177,9 +177,6 @@ ___ Você terminou! Custom firmware agora está totalmente configurado no seu dispositivo. {: .notice--success} -Olá! Estamos interessados em comentários sobre a experiência geral do nosso guia. Se você quiser ajudar, confira a pesquisa [aqui](https://forms.gle/vZNoc4QLCz5MEXCK7) (disponível somente em inglês). Obrigado! -{: .notice--info} - ### Informações e Notas {% capture notice-6 %} diff --git a/_pages/pt_BR/homebrew-launcher-(super-skaterhax).txt b/_pages/pt_BR/homebrew-launcher-(super-skaterhax).txt index 8ca315d37e..d44efec744 100644 --- a/_pages/pt_BR/homebrew-launcher-(super-skaterhax).txt +++ b/_pages/pt_BR/homebrew-launcher-(super-skaterhax).txt @@ -64,7 +64,7 @@ Se você ainda não o fez, certifique-se de que você tem uma conexão de Intern 1. Selecione o botão "GO GO!" na tela superior + Se qualquer prompt aparecer, aprove todos eles + Se o seu dispositivo congelar em uma tela amarela, segure o botão POWER até que ele desligue, então tente novamente esta seção - + Se o seu dispositivo congela uma tela vermelha, segure o botão POWER até que ele desligue, refaça o passo 3 da seção II e tente esta seção novamente + + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section + Se você receber outro erro, tente novamente até 5 vezes e, se ainda não funcionar, [siga este guia de solução de problemas](troubleshooting#homebrew-launcher-super-skaterhax) 1. Se o exploit foi bem sucedido, seu dispositivo terá inicializado o Homebrew Launcher 1. Desligue seu dispositivo diff --git a/_pages/pt_BR/include/bb3-prep.txt b/_pages/pt_BR/include/bb3-prep.txt new file mode 100644 index 0000000000..8745a7330b --- /dev/null +++ b/_pages/pt_BR/include/bb3-prep.txt @@ -0,0 +1,23 @@ +Nesta seção, você irá copiar os arquivos necessários para ativar o exploit BannerBomb3 em seu cartão SD. + +1. Desligue seu dispositivo +1. Insira o cartão SD no seu computador +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Envie seu movable.sed usando a opção "Choose File" +1. Clique em "Build and Download" + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + A raiz do cartão SD refere-se ao diretório inicial no seu cartão SD onde você pode ver a pasta Nintendo 3DS, mas não está dentro dela + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. Navegue até `Nintendo 3DS` -> `` ->` em seu cartão SD + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. Crie uma pasta chamada `Nintendo DSiWare` dentro do `` + + Se você já teve a pasta *e* já existe algum arquivo de backup de DSiWare existente (`. dentro) dentro, copie-os para seu PC e remova-os do seu cartão SD +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/pt_BR/include/fredtool-prep.txt b/_pages/pt_BR/include/fredtool-prep.txt new file mode 100644 index 0000000000..e01d9c473f --- /dev/null +++ b/_pages/pt_BR/include/fredtool-prep.txt @@ -0,0 +1,29 @@ +Nesta seção, você copiará os arquivos necessários para substituir temporariamente as Configurações de Conexões Nintendo DS com Flipnote Studio, que é usado para iniciar o instalador boot9strap (custom firmware). + +1. Insira o cartão SD no seu computador +1. Abra o site [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) no seu computador +1. Sob o campo "Username", digite qualquer nome alfanumérico (sem espaços ou caracteres especiais) +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. Sob o campo "MovableSed", coloque seu arquivo `movable.sed` usando a segunda opção "Browse..." +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. Clique em "Build" + + Aguarde alguns segundos para que o processo de compilação termine +1. Na seção Build History à esquerda, digite o nome de usuário no campo "Filter Builds" +1. Clique no primeiro resultado da pesquisa + + Esse resultado deve ter a última marcação de tempo +1. Clique no link "output_(nome).zip" +1. Navegue até `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` no seu cartão SD + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copie `boot.firm` e `boot.3dsx` do `.zip` do Luma3DS para a raiz do seu cartão SD + + A raiz do cartão SD refere-se ao diretório inicial no seu cartão SD onde você pode ver a pasta Nintendo 3DS, mas não está dentro dela +1. Copie `boot.nds` (B9STool) do `.zip` para a raiz do seu cartão SD +1. Copie a pasta `private` do `.zip` do Frogminer_save para a raiz do seu cartão SD +1. Reinsira seu cartão SD no seu dispositivo +1. Ligue o seu dispositivo + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/pt_BR/include/fredtool-restore-dsconn.txt b/_pages/pt_BR/include/fredtool-restore-dsconn.txt new file mode 100644 index 0000000000..8929a1e8be --- /dev/null +++ b/_pages/pt_BR/include/fredtool-restore-dsconn.txt @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. Navegue até `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` no seu cartão SD +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. Reinsira seu cartão SD no seu dispositivo +1. Ligue o seu dispositivo +1. Abra a Configuração do Console em seu dispositivo +1. Navegue para `Gerenciamento de Dados` -> `DSiWare` -> `Cartão SD` ([imagem](/images/screenshots/bb3/dsiware-management.png)) +1. Selecione o aplicativo "Nintendo DSi™" +1. Selecione "Copy", então selecione "OK" diff --git a/_pages/pt_BR/include/fredtool-write-flipnote.txt b/_pages/pt_BR/include/fredtool-write-flipnote.txt new file mode 100644 index 0000000000..a6807fdd84 --- /dev/null +++ b/_pages/pt_BR/include/fredtool-write-flipnote.txt @@ -0,0 +1,11 @@ +Nesta seção, você irá copiar as Configurações de DS do DSiWare para a memória interna, que irá substituí-la temporariamente pelo Flipnote Studio. + +1. Abra a Configuração do Console em seu dispositivo +1. Navegue para `Gerenciamento de Dados` -> `DSiWare` -> `Cartão SD` ([imagem](/images/screenshots/bb3/dsiware-management.png)) +1. Selecione o aplicativo "Haxxxxxxx!" + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Selecione "Copy", então selecione "OK" +1. Retorne ao menu principal da Configuração do Console +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. Se o exploit foi bem sucedido, seu dispositivo irá abrir a versão JPN do Flipnote Studio + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/pt_BR/include/safemodecheck.txt b/_pages/pt_BR/include/safemodecheck.txt index eb9516fe97..296b547b7a 100644 --- a/_pages/pt_BR/include/safemodecheck.txt +++ b/_pages/pt_BR/include/safemodecheck.txt @@ -1,3 +1,5 @@ +In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page. + 1. Ligue o seu dispositivo 1. Quando você ver o Menu HOME, pressione os botões do (Gatilho Esquerdo) e do (Gatilho Direito) ao mesmo tempo + O applet da câmera deve aparecer diff --git a/_pages/pt_BR/include/seedminer-base.txt b/_pages/pt_BR/include/seedminer-base.txt index 4b23319770..a056768c14 100644 --- a/_pages/pt_BR/include/seedminer-base.txt +++ b/_pages/pt_BR/include/seedminer-base.txt @@ -15,10 +15,12 @@ Esse método usufrui de uma poderosa placa de vídeo para realizar os cálculos Nesta seção, você receberá os detalhes necessários no seu 3DS que são necessários para descobrir a chave de criptografia do seu dispositivo. +{% capture console_state_info %} Antes de seguir esta seção: + Certifique-se de que você ligou o seu console com o cartão SD inserido pelo menos uma vez para gerar os dados necessários + Certifique-se de que o console esteja conectado à Internet (você deve ver um indicador azul de "internet" no canto superior esquerdo da tela HOME) -{: .notice--info} +{% endcapture %} +
{{ console_state_info | markdownify }}
1. Desligue seu dispositivo 1. Insira o cartão SD no seu computador diff --git a/_pages/pt_BR/installing-boot9strap-(fredtool).txt b/_pages/pt_BR/installing-boot9strap-(fredtool).txt index 50a14c48b7..f93d46b7cc 100644 --- a/_pages/pt_BR/installing-boot9strap-(fredtool).txt +++ b/_pages/pt_BR/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ Esta é uma implementação funcional do exploit "FIRM partitions known-plaintex
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ### O que é necessário * Seu arquivo `movable.sed` de completar [Seedminer](seedminer) * A versão mais recente do [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* A versão mais recente do [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (download direto) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * A versão mais recente do [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (o arquivo `.zip` do Luma3DS) #### Seção I - Checando por CFW @@ -42,49 +45,11 @@ Nesta seção, você irá acionar o exploit do BannerBomb3 usando o Menu de Gere #### Seção III - Preparação -Nesta seção, você copiará os arquivos necessários para substituir temporariamente as Configurações de Conexões Nintendo DS com Flipnote Studio, que é usado para iniciar o instalador boot9strap (custom firmware). - -1. Insira o cartão SD no seu computador -1. Abra o site [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) no seu computador -1. Sob o campo "Username", digite qualquer nome alfanumérico (sem espaços ou caracteres especiais) -1. Sob o campo "DSiBin", faça upload do seu arquivo `42383841.bin` do seu cartão SD usando a primeira opção "Browse..." -1. Sob o campo "MovableSed", coloque seu arquivo `movable.sed` usando a segunda opção "Browse..." -1. Sob o campo "InjectionTarget", defina o alvo de injeção como `DSinternet` (NÃO o memorypit) -1. Clique em "Build" - + Aguarde alguns segundos para que o processo de compilação termine -1. Na seção Build History à esquerda, digite o nome de usuário no campo "Filter Builds" -1. Clique no primeiro resultado da pesquisa - + Esse resultado deve ter a última marcação de tempo -1. Clique no link "output_(nome).zip" -1. Navegue até `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` no seu cartão SD - + `` é o nome da pasta 32 letras que você copiou em [Seedminer](seedminer) - + `` é uma pasta de 32 letras dentro da pasta `` -1. Apague `F00D43D5.bin` da sua pasta Nintendo DSiWare -1. Copie o arquivo `42383841.bin` da pasta `hax` do arquivo DSiWare baixado (output_(nome).zip) para a pasta `Nintendo DSiWare` - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copie `boot.firm` e `boot.3dsx` do `.zip` do Luma3DS para a raiz do seu cartão SD - + A raiz do cartão SD refere-se ao diretório inicial no seu cartão SD onde você pode ver a pasta Nintendo 3DS, mas não está dentro dela -1. Copie `boot.nds` (B9STool) do `.zip` para a raiz do seu cartão SD -1. Copie a pasta `private` do `.zip` do Frogminer_save para a raiz do seu cartão SD -1. Reinsira seu cartão SD no seu dispositivo -1. Ligue o seu dispositivo - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.txt %} #### Seção IV - Substituindo as Configurações de Internet DS -Nesta seção, você irá copiar as Configurações de DS do DSiWare para a memória interna, que irá substituí-la temporariamente pelo Flipnote Studio. - -1. Abra a Configuração do Console em seu dispositivo -1. Navegue para `Gerenciamento de Dados` -> `DSiWare` -> `Cartão SD` ([imagem](/images/screenshots/bb3/dsiware-management.png)) -1. Selecione o aplicativo "Haxxxxxxx!" - + Se você não conseguir selecionar o aplicativo "Haxxxxxxxxx", [siga este guia de troubleshooting](troubleshooting#installing-boot9strap-fredtool) -1. Selecione "Copy", então selecione "OK" -1. Retorne ao menu principal da Configuração do Console -1. Navegue até `Configurações da Internet` -> `Conexões Nintendo DS`, depois selecione "OK" ([imagem](/images/screenshots/fredtool/dsconnection.png)) -1. Se o exploit foi bem sucedido, seu dispositivo irá abrir a versão JPN do Flipnote Studio - + Se o seu dispositivo não carregar a versão JPN do Flipnote Studio, [siga este guia de troubleshooting](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.txt %} #### Seção V - Flipnote Exploit @@ -99,18 +64,10 @@ Nesta seção, você irá copiar as Configurações de DS do DSiWare para a mem #### Seção VII - Restaurando as Configurações de Conexão DS -Nesta seção, você irá restaurar as Configurações de Conexão DS da maneira que elas eram antes de serem temporariamente substituídas pelo Flipnote Studio na Seção IV. - -1. Navegue até `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` no seu cartão SD -1. Copie o arquivo `42383841.bin` da pasta `clean` do arquivo DSiWare baixado (output_(nome).zip) para a pasta `Nintendo DSiWare`, substituindo a pasta existente -1. Reinsira seu cartão SD no seu dispositivo -1. Ligue o seu dispositivo -1. Abra a Configuração do Console em seu dispositivo -1. Navegue para `Gerenciamento de Dados` -> `DSiWare` -> `Cartão SD` ([imagem](/images/screenshots/bb3/dsiware-management.png)) -1. Selecione o aplicativo "Nintendo DSi™" -1. Selecione "Copy", então selecione "OK" +{% include_relative include/fredtool-restore-dsconn.txt %} ___ + ### Continue para [Finalizando a instalação](finalizing-setup) {: .notice--primary} diff --git a/_pages/pt_BR/installing-boot9strap-(fredtool-legacy).txt b/_pages/pt_BR/installing-boot9strap-(fredtool-legacy).txt new file mode 100644 index 0000000000..93df3f7381 --- /dev/null +++ b/_pages/pt_BR/installing-boot9strap-(fredtool-legacy).txt @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title="Tabela de Conteúdo" %} + +{% capture technical_info %} +Detalhes técnicos (opcional) + +Para fazer o dump do sistema DSiWare, nós executamos um exploit em uma falha na janela do Gerenciador de Dados do DSiWare no aplicativo Configuração do Console. + +Para fazer isso, usamos a chave de criptografia do seu sistema (movable.sed) para construir um backup de DSiWare que faz exploit do sistema para fazer um dump do aplicativo Conexões Nintendo DS para a raiz do SD. + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +Esta é uma implementação funcional do exploit "FIRM partitions known-plaintext" detalhado [aqui](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +### O que é necessário + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* A versão mais recente do [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* A versão mais recente do [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (o arquivo `.zip` do Luma3DS) + +#### Seção I - Checando por CFW + +{% include_relative include/cfw-check-fredtool.txt %} + +#### Seção II - BannerBomb3 + +Nesta seção, você irá acionar o exploit do BannerBomb3 usando o Menu de Gerenciamento de DSiWare e copiará o dump de arquivos resultantes para o seu computador para que você possa usá-lo na próxima seção. + +1. Reinsira seu cartão SD no seu dispositivo +1. Ligue o seu dispositivo +1. Abra a Configuração do Console em seu dispositivo +1. Navegue para `Gerenciamento de Dados` -> `DSiWare` -> `Cartão SD` ([imagem](/images/screenshots/bb3/dsiware-management.png)) + + Seu dispositivo deve mostrar o multihax menu do BB3 + + Se esta etapa fazer com que seu dispositivo tenha um crash, [siga este guia de troubleshooting](troubleshooting#installing-boot9strap-fredtool) +1. Use os botões direcionais para navegar e pressione o botão (A) para selecionar "Dump DSiWare" + + Seu dispositivo será reiniciado automaticamente +1. Desligue seu dispositivo + +#### Seção III - Preparação + +{% include_relative include/fredtool-prep.txt %} + +#### Seção IV - Substituindo as Configurações de Internet DS + +{% include_relative include/fredtool-write-flipnote.txt %} + +#### Seção V - Flipnote Exploit + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### Seção VI - Configuração do Luma3DS + +1. Pressione e segure (Select), enquanto segura (Select), ligue seu dispositivo. Isso iniciará a configuração do Luma3DS +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### Seção VII - Restaurando as Configurações de Conexão DS + +{% include_relative include/fredtool-restore-dsconn.txt %} + +___ + + +### Continue para [Finalizando a instalação](finalizing-setup) +{: .notice--primary} diff --git a/_pages/pt_BR/seedminer-(mii).txt b/_pages/pt_BR/seedminer-(mii).txt new file mode 100644 index 0000000000..8fb409f8d2 --- /dev/null +++ b/_pages/pt_BR/seedminer-(mii).txt @@ -0,0 +1,84 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title="Tabela de Conteúdo" %} + +{% capture gpu_warning %} +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: ++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) ++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple) ++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) ++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{% endcapture %} +
{{ gpu_warning | markdownify }}
+ +{% capture technical_info %} +Detalhes técnicos (opcional) + +Para instalar boot9strap em seu dispositivo, nós derivamos a chave de criptografia exclusiva do seu dispositivo. Para fazer isso, usamos uma ferramenta chamada Seedminer para calcular a chave de criptografia de dados (movable.sed) do seu dispositivo. + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +Para mais informações sobre como Seedminer funciona, veja [esta apresentação](https://zoogie.github.io/web/34⅕c3). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### O que você precisa + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### Seção I - Preparação + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/pt_BR/site-navigation.txt b/_pages/pt_BR/site-navigation.txt index 3981fcf1a0..f8e70ff3f2 100644 --- a/_pages/pt_BR/site-navigation.txt +++ b/_pages/pt_BR/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [Atualizando para o B9S](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) + [Créditos](credits) + [Checando por CFW](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [Home](/pt_BR/) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [Instalando boot9strap (Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [Instalando boot9strap (Frogtool)](installing-boot9strap-(frogtool)) + [Instalando boot9strap (Hardmod)](installing-boot9strap-(hardmod)) + [Instalando boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [Mudança de Região](region-changing) + [Restaurando / Atualizando CFW](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (TWN)](seedminer-(twn)) + [Troubleshooting](troubleshooting) + [Desinstalar o CFW](uninstall-cfw) diff --git a/_pages/pt_BR/updating-firmware-(kor-twn).md b/_pages/pt_BR/updating-firmware-(kor).txt similarity index 54% rename from _pages/pt_BR/updating-firmware-(kor-twn).md rename to _pages/pt_BR/updating-firmware-(kor).txt index 54bca90723..92664f600b 100644 --- a/_pages/pt_BR/updating-firmware-(kor-twn).md +++ b/_pages/pt_BR/updating-firmware-(kor).txt @@ -1,18 +1,18 @@ --- -title: "Atualizando o Firmware (KOR/TWN)" +title: "Updating Firmware (KOR)" --- -### Leitura Necessária +### Leitura Obrigatória Para usar o exploit Seedminer, você deve atualizar seu dispositivo para a versão mais recente do sistema. ### O que você precisa -* Uma conexão com a internet no seu dispositivo +* An internet connection on your device -#### Seção I - Atualizando o Sistema +#### Section I - Updating the System {% include_relative include/sysupdate.txt cfw="false" %} -Continue em [Seedminer](seedminer) +Continue to [Seedminer](seedminer) {: .notice--primary} diff --git a/_pages/pt_BR/updating-firmware-(new-3ds).md b/_pages/pt_BR/updating-firmware-(new-3ds).md deleted file mode 100644 index dede10a288..0000000000 --- a/_pages/pt_BR/updating-firmware-(new-3ds).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (New 3DS)" ---- - -### Leitura Necessária - -Para usar o exploit super-skaterhax, você deve atualizar seu dispositivo para a versão mais recente do sistema. - -### O que você precisa - -* Uma conexão com a internet no seu dispositivo - -#### Seção I - Atualizando o Sistema - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue em [Homebrew Launcher (superskaterhax)](homebrew-launcher-(super-skaterhax)) -{: .notice--primary} diff --git a/_pages/pt_BR/updating-firmware-(new-3ds).txt b/_pages/pt_BR/updating-firmware-(new-3ds).txt new file mode 100644 index 0000000000..7c7becf227 --- /dev/null +++ b/_pages/pt_BR/updating-firmware-(new-3ds).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (New 3DS)" +--- + +### Leitura Obrigatória + +Para usar o exploit super-skaterhax, você deve atualizar seu dispositivo para a versão mais recente do sistema. + +### O que você precisa + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) +{: .notice--primary} diff --git a/_pages/pt_BR/updating-firmware-(twn).txt b/_pages/pt_BR/updating-firmware-(twn).txt new file mode 100644 index 0000000000..0dbfc04b1c --- /dev/null +++ b/_pages/pt_BR/updating-firmware-(twn).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (TWN)" +--- + +### Leitura Obrigatória + +Para usar o exploit Seedminer, você deve atualizar seu dispositivo para a versão mais recente do sistema. + +### O que você precisa + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer (TWN)](seedminer-(twn)) +{: .notice--primary} diff --git a/_pages/pt_PT/404.md b/_pages/pt_PT/404.txt similarity index 100% rename from _pages/pt_PT/404.md rename to _pages/pt_PT/404.txt diff --git a/_pages/pt_PT/bannerbomb3-(legacy).txt b/_pages/pt_PT/bannerbomb3-(legacy).txt new file mode 100644 index 0000000000..503794c42a --- /dev/null +++ b/_pages/pt_PT/bannerbomb3-(legacy).txt @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title="Table of Contents" %} + +{% capture technical_info %} +Technical Details (optional) + +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### Compatibility Notes + +These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. + +### What You Need + +* Your `movable.sed` file from completing Seedminer or nimhax + +#### Section I - Prep Work + +{% include_relative include/bb3-prep.txt %} + +#### Section II - Hardware Button Check + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### Next steps: Choose an exploit + +If the camera appeared in the previous section, Safe Mode is likely to be working on your device. + +If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/pt_PT/bannerbomb3.txt b/_pages/pt_PT/bannerbomb3.txt index 7767c4aeb1..a8383926fd 100644 --- a/_pages/pt_PT/bannerbomb3.txt +++ b/_pages/pt_PT/bannerbomb3.txt @@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. - -1. Power off your device -1. Insert your SD card into your computer -1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer -1. Upload your movable.sed using the “Choose File” option -1. Click “Build and Download” - + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) -1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it - + This file does not need to be opened or extracted - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.txt %} #### Section II - Hardware Button Check -In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. - -Your SD card should remain in your computer while you perform this check. - {% include_relative include/safemodecheck.txt %} ___ diff --git a/_pages/sv_SE/credits.md b/_pages/pt_PT/credits.txt similarity index 100% rename from _pages/sv_SE/credits.md rename to _pages/pt_PT/credits.txt diff --git a/_pages/pt_PT/donations.md b/_pages/pt_PT/donations.txt similarity index 100% rename from _pages/pt_PT/donations.md rename to _pages/pt_PT/donations.txt diff --git a/_pages/pt_PT/finalizing-setup.txt b/_pages/pt_PT/finalizing-setup.txt index 17cb81dcf1..4af450c33f 100644 --- a/_pages/pt_PT/finalizing-setup.txt +++ b/_pages/pt_PT/finalizing-setup.txt @@ -177,9 +177,6 @@ ___ You're done! Custom firmware is now fully configured on your device. {: .notice--success} -Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! -{: .notice--info} - ### Information and Notes {% capture notice-6 %} diff --git a/_pages/pt_PT/homebrew-launcher-(super-skaterhax).txt b/_pages/pt_PT/homebrew-launcher-(super-skaterhax).txt index ea288c3163..7b83fe0d7e 100644 --- a/_pages/pt_PT/homebrew-launcher-(super-skaterhax).txt +++ b/_pages/pt_PT/homebrew-launcher-(super-skaterhax).txt @@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up 1. Select the "GO GO!" button on the top screen + If any prompts appear, approve all of them + If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section + + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) 1. If the exploit was successful, your device will have booted into the Homebrew Launcher 1. Power off your device diff --git a/_pages/pt_PT/include/bb3-prep.txt b/_pages/pt_PT/include/bb3-prep.txt new file mode 100644 index 0000000000..0b0965f3de --- /dev/null +++ b/_pages/pt_PT/include/bb3-prep.txt @@ -0,0 +1,23 @@ +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + +1. Power off your device +1. Insert your SD card into your computer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. Create a folder named `Nintendo DSiWare` inside of the `` + + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/pt_PT/include/fredtool-prep.txt b/_pages/pt_PT/include/fredtool-prep.txt new file mode 100644 index 0000000000..cff8aa806d --- /dev/null +++ b/_pages/pt_PT/include/fredtool-prep.txt @@ -0,0 +1,29 @@ +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. + +1. Insert your SD card into your computer +1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer +1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. Click "Build" + + Wait a few seconds for the build process to complete +1. In the Build History section on the left, type the Username into the "Filter Builds" field +1. Click on the first search result + + This result should have the latest timestamp +1. Click the "output_(name).zip" link +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card +1. Reinsert your SD card into your device +1. Power on your device + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/pt_PT/include/fredtool-restore-dsconn.txt b/_pages/pt_PT/include/fredtool-restore-dsconn.txt new file mode 100644 index 0000000000..3057b3ac9d --- /dev/null +++ b/_pages/pt_PT/include/fredtool-restore-dsconn.txt @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title +1. Select "Copy", then select "OK" diff --git a/_pages/pt_PT/include/fredtool-write-flipnote.txt b/_pages/pt_PT/include/fredtool-write-flipnote.txt new file mode 100644 index 0000000000..cb6f428624 --- /dev/null +++ b/_pages/pt_PT/include/fredtool-write-flipnote.txt @@ -0,0 +1,11 @@ +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Select "Copy", then select "OK" +1. Return to main menu of the System Settings +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/pt_PT/include/safemodecheck.txt b/_pages/pt_PT/include/safemodecheck.txt index 43ebec6575..7035baace8 100644 --- a/_pages/pt_PT/include/safemodecheck.txt +++ b/_pages/pt_PT/include/safemodecheck.txt @@ -1,3 +1,5 @@ +In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page. + 1. Power on your device 1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time + The camera applet should appear diff --git a/_pages/pt_PT/include/seedminer-base.txt b/_pages/pt_PT/include/seedminer-base.txt index e3493c2f87..ad6697a5fa 100644 --- a/_pages/pt_PT/include/seedminer-base.txt +++ b/_pages/pt_PT/include/seedminer-base.txt @@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. +{% capture console_state_info %} Before following this section: + Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data + Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen) -{: .notice--info} +{% endcapture %} +
{{ console_state_info | markdownify }}
1. Power off your device 1. Insert your SD card into your computer diff --git a/_pages/pt_PT/installing-boot9strap-(fredtool).txt b/_pages/pt_PT/installing-boot9strap-(fredtool).txt index ea9d81c010..455c3317a3 100644 --- a/_pages/pt_PT/installing-boot9strap-(fredtool).txt +++ b/_pages/pt_PT/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ### What You Need * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) #### Section I - CFW Check @@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana #### Section III - Prep Work -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Insert your SD card into your computer -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert your SD card into your device -1. Power on your device - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.txt %} #### Section IV - Overwriting DS Connection Settings -In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. - -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Haxxxxxxxxx!" title - + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Select "Copy", then select "OK" -1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) -1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio - + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.txt %} #### Section V - Flipnote Exploit @@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte #### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. - -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Nintendo DSi™" title -1. Select "Copy", then select "OK" +{% include_relative include/fredtool-restore-dsconn.txt %} ___ + ### Continue to [Finalizing Setup](finalizing-setup) {: .notice--primary} diff --git a/_pages/pt_PT/installing-boot9strap-(fredtool-legacy).txt b/_pages/pt_PT/installing-boot9strap-(fredtool-legacy).txt new file mode 100644 index 0000000000..1513694ebd --- /dev/null +++ b/_pages/pt_PT/installing-boot9strap-(fredtool-legacy).txt @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title="Table of Contents" %} + +{% capture technical_info %} +Technical Details (optional) + +To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +### What You Need + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) + +#### Section I - CFW Check + +{% include_relative include/cfw-check-fredtool.txt %} + +#### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically reboot +1. Power off your device + +#### Section III - Prep Work + +{% include_relative include/fredtool-prep.txt %} + +#### Section IV - Overwriting DS Connection Settings + +{% include_relative include/fredtool-write-flipnote.txt %} + +#### Section V - Flipnote Exploit + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### Section VI - Luma3DS Configuration + +1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### Section VII - Restoring DS Connection Settings + +{% include_relative include/fredtool-restore-dsconn.txt %} + +___ + + +### Continue to [Finalizing Setup](finalizing-setup) +{: .notice--primary} diff --git a/_pages/pt_PT/seedminer-(mii).txt b/_pages/pt_PT/seedminer-(mii).txt new file mode 100644 index 0000000000..5faf224c22 --- /dev/null +++ b/_pages/pt_PT/seedminer-(mii).txt @@ -0,0 +1,84 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title="Table of Contents" %} + +{% capture gpu_warning %} +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: ++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) ++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple) ++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) ++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{% endcapture %} +
{{ gpu_warning | markdownify }}
+ +{% capture technical_info %} +Technical Details (optional) + +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### What you need + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### Section I - Prep Work + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/pt_PT/site-navigation.txt b/_pages/pt_PT/site-navigation.txt index fdc7937a91..d7cacfb519 100644 --- a/_pages/pt_PT/site-navigation.txt +++ b/_pages/pt_PT/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [A9LH to B9S](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) + [Créditos](credits) + [Checking for CFW](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [Home](/) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) + [Installing boot9strap (Hardmod)](installing-boot9strap-(hardmod)) + [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [Region Changing](region-changing) + [Restoring / Updating CFW](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (TWN)](seedminer-(twn)) + [Troubleshooting](troubleshooting) + [Uninstall CFW](uninstall-cfw) diff --git a/_pages/pt_PT/updating-firmware-(kor).txt b/_pages/pt_PT/updating-firmware-(kor).txt new file mode 100644 index 0000000000..dced04b1aa --- /dev/null +++ b/_pages/pt_PT/updating-firmware-(kor).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (KOR)" +--- + +### Leitura Obrigatória + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer](seedminer) +{: .notice--primary} diff --git a/_pages/pt_PT/updating-firmware-(kor-twn).md b/_pages/pt_PT/updating-firmware-(kor-twn).md deleted file mode 100644 index 74a2b48f90..0000000000 --- a/_pages/pt_PT/updating-firmware-(kor-twn).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (KOR/TWN)" ---- - -### Required Reading - -To use the Seedminer exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Seedminer](seedminer) -{: .notice--primary} diff --git a/_pages/pt_PT/updating-firmware-(new-3ds).md b/_pages/pt_PT/updating-firmware-(new-3ds).md deleted file mode 100644 index 5366fdd3b9..0000000000 --- a/_pages/pt_PT/updating-firmware-(new-3ds).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (New 3DS)" ---- - -### Required Reading - -To use the super-skaterhax exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) -{: .notice--primary} diff --git a/_pages/pt_PT/updating-firmware-(new-3ds).txt b/_pages/pt_PT/updating-firmware-(new-3ds).txt new file mode 100644 index 0000000000..cd17695909 --- /dev/null +++ b/_pages/pt_PT/updating-firmware-(new-3ds).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (New 3DS)" +--- + +### Leitura Obrigatória + +To use the super-skaterhax exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) +{: .notice--primary} diff --git a/_pages/pt_PT/updating-firmware-(twn).txt b/_pages/pt_PT/updating-firmware-(twn).txt new file mode 100644 index 0000000000..efad2ffd5d --- /dev/null +++ b/_pages/pt_PT/updating-firmware-(twn).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (TWN)" +--- + +### Leitura Obrigatória + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer (TWN)](seedminer-(twn)) +{: .notice--primary} diff --git a/_pages/ro_RO/404.md b/_pages/ro_RO/404.txt similarity index 100% rename from _pages/ro_RO/404.md rename to _pages/ro_RO/404.txt diff --git a/_pages/ro_RO/bannerbomb3-(legacy).txt b/_pages/ro_RO/bannerbomb3-(legacy).txt new file mode 100644 index 0000000000..33b7ccec0e --- /dev/null +++ b/_pages/ro_RO/bannerbomb3-(legacy).txt @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title="Cuprins" %} + +{% capture technical_info %} +Technical Details (optional) + +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### Compatibility Notes + +Aceste instrucțiuni funcționează pe consolele din regiunea SUA, Europa, Japonia și Coreea, indicate de literele U, E, J, sau K după versiunea de sistem. + +### Ce aveți nevoie + +* Your `movable.sed` file from completing Seedminer or nimhax + +#### Secțiunea I - Preparații + +{% include_relative include/bb3-prep.txt %} + +#### Section II - Hardware Button Check + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### Next steps: Choose an exploit + +If the camera appeared in the previous section, Safe Mode is likely to be working on your device. + +If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/ro_RO/bannerbomb3.txt b/_pages/ro_RO/bannerbomb3.txt index 67399e1776..d4437c2f06 100644 --- a/_pages/ro_RO/bannerbomb3.txt +++ b/_pages/ro_RO/bannerbomb3.txt @@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol #### Secțiunea I - Preparații -In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. - -1. Închideți dispozitivul -1. Introduceți cardul SD în calculator -1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer -1. Upload your movable.sed using the “Choose File” option -1. Click “Build and Download” - + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) -1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it - + This file does not need to be opened or extracted - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.txt %} #### Section II - Hardware Button Check -In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. - -Your SD card should remain in your computer while you perform this check. - {% include_relative include/safemodecheck.txt %} ___ diff --git a/_pages/th_TH/credits.md b/_pages/ro_RO/credits.txt similarity index 100% rename from _pages/th_TH/credits.md rename to _pages/ro_RO/credits.txt diff --git a/_pages/ro_RO/donations.md b/_pages/ro_RO/donations.txt similarity index 100% rename from _pages/ro_RO/donations.md rename to _pages/ro_RO/donations.txt diff --git a/_pages/ro_RO/finalizing-setup.txt b/_pages/ro_RO/finalizing-setup.txt index 7b0ab5e8c8..ac1715284b 100644 --- a/_pages/ro_RO/finalizing-setup.txt +++ b/_pages/ro_RO/finalizing-setup.txt @@ -177,9 +177,6 @@ ___ You're done! Custom firmware is now fully configured on your device. {: .notice--success} -Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! -{: .notice--info} - ### Information and Notes {% capture notice-6 %} diff --git a/_pages/ro_RO/homebrew-launcher-(super-skaterhax).txt b/_pages/ro_RO/homebrew-launcher-(super-skaterhax).txt index 427cabe2e5..660b414795 100644 --- a/_pages/ro_RO/homebrew-launcher-(super-skaterhax).txt +++ b/_pages/ro_RO/homebrew-launcher-(super-skaterhax).txt @@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up 1. Select the "GO GO!" button on the top screen + If any prompts appear, approve all of them + If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section + + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) 1. If the exploit was successful, your device will have booted into the Homebrew Launcher 1. Închideți dispozitivul diff --git a/_pages/ro_RO/include/bb3-prep.txt b/_pages/ro_RO/include/bb3-prep.txt new file mode 100644 index 0000000000..58155ba63d --- /dev/null +++ b/_pages/ro_RO/include/bb3-prep.txt @@ -0,0 +1,23 @@ +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + +1. Închideți dispozitivul +1. Introduceți cardul SD în calculator +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. Create a folder named `Nintendo DSiWare` inside of the `` + + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/ro_RO/include/fredtool-prep.txt b/_pages/ro_RO/include/fredtool-prep.txt new file mode 100644 index 0000000000..40ee3731a5 --- /dev/null +++ b/_pages/ro_RO/include/fredtool-prep.txt @@ -0,0 +1,29 @@ +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. + +1. Introduceți cardul SD în calculator +1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer +1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. Click "Build" + + Wait a few seconds for the build process to complete +1. In the Build History section on the left, type the Username into the "Filter Builds" field +1. Click on the first search result + + This result should have the latest timestamp +1. Click the "output_(name).zip" link +1. Navigați spre `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` pe cardul SD + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copiați `boot.firm` și `boot.3dsx` de la Luma3DS `.zip` pe rădăcina cardului SD + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card +1. Copiați folderul `private` de pe arhiva Frogminer_save `.zip` în rădăcina cardului SD +1. Reintroduceți cardul SD în dispozitivul dumneavoastră +1. Porniți dispozitivul + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/ro_RO/include/fredtool-restore-dsconn.txt b/_pages/ro_RO/include/fredtool-restore-dsconn.txt new file mode 100644 index 0000000000..4714b12e86 --- /dev/null +++ b/_pages/ro_RO/include/fredtool-restore-dsconn.txt @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. Navigați spre `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` pe cardul SD +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. Reintroduceți cardul SD în dispozitivul dumneavoastră +1. Porniți dispozitivul +1. Porniți System Settings pe consolă +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title +1. Selectaţi "Copy", apoi selectaţi "OK" diff --git a/_pages/ro_RO/include/fredtool-write-flipnote.txt b/_pages/ro_RO/include/fredtool-write-flipnote.txt new file mode 100644 index 0000000000..c896fa59f7 --- /dev/null +++ b/_pages/ro_RO/include/fredtool-write-flipnote.txt @@ -0,0 +1,11 @@ +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + +1. Porniți System Settings pe consolă +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Selectaţi "Copy", apoi selectaţi "OK" +1. Reveniți la meniul principal de System Settings +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. În cazul în care exploit-ul a mers, dispozitivul va încărca versiunea JPN de Flipnote Studio + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/ro_RO/include/safemodecheck.txt b/_pages/ro_RO/include/safemodecheck.txt index 9bdf132b97..917b8801ce 100644 --- a/_pages/ro_RO/include/safemodecheck.txt +++ b/_pages/ro_RO/include/safemodecheck.txt @@ -1,3 +1,5 @@ +In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page. + 1. Porniți dispozitivul 1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time + The camera applet should appear diff --git a/_pages/ro_RO/include/seedminer-base.txt b/_pages/ro_RO/include/seedminer-base.txt index e077fea03a..1bf4c72439 100644 --- a/_pages/ro_RO/include/seedminer-base.txt +++ b/_pages/ro_RO/include/seedminer-base.txt @@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. +{% capture console_state_info %} Before following this section: + Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data + Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen) -{: .notice--info} +{% endcapture %} +
{{ console_state_info | markdownify }}
1. Închideți dispozitivul 1. Introduceți cardul SD în calculator diff --git a/_pages/ro_RO/installing-boot9strap-(fredtool).txt b/_pages/ro_RO/installing-boot9strap-(fredtool).txt index 07e13d1f77..160c2a9bc8 100644 --- a/_pages/ro_RO/installing-boot9strap-(fredtool).txt +++ b/_pages/ro_RO/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ### Ce aveți nevoie * Fișierul 'movable.sed' de la completarea lui [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) #### Section I - CFW Check @@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana #### Section III - Prep Work -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Introduceți cardul SD în calculator -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigați spre `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` pe cardul SD - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copiați `boot.firm` și `boot.3dsx` de la Luma3DS `.zip` pe rădăcina cardului SD - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copiați folderul `private` de pe arhiva Frogminer_save `.zip` în rădăcina cardului SD -1. Reintroduceți cardul SD în dispozitivul dumneavoastră -1. Porniți dispozitivul - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.txt %} #### Section IV - Overwriting DS Connection Settings -In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. - -1. Porniți System Settings pe consolă -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Haxxxxxxxxx!" title - + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Selectaţi "Copy", apoi selectaţi "OK" -1. Reveniți la meniul principal de System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) -1. În cazul în care exploit-ul a mers, dispozitivul va încărca versiunea JPN de Flipnote Studio - + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.txt %} #### Section V - Flipnote Exploit @@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte #### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. - -1. Navigați spre `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` pe cardul SD -1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one -1. Reintroduceți cardul SD în dispozitivul dumneavoastră -1. Porniți dispozitivul -1. Porniți System Settings pe consolă -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Nintendo DSi™" title -1. Selectaţi "Copy", apoi selectaţi "OK" +{% include_relative include/fredtool-restore-dsconn.txt %} ___ + ### Continuați la [Finalizând instalarea](finalizing-setup) {: .notice--primary} diff --git a/_pages/ro_RO/installing-boot9strap-(fredtool-legacy).txt b/_pages/ro_RO/installing-boot9strap-(fredtool-legacy).txt new file mode 100644 index 0000000000..97152d901e --- /dev/null +++ b/_pages/ro_RO/installing-boot9strap-(fredtool-legacy).txt @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title="Cuprins" %} + +{% capture technical_info %} +Technical Details (optional) + +Pentru a descărca DSiWare de sistem, vom exploata o eroare din fereastra DSiWare Data Management de la aplicația Settings. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +### Ce aveți nevoie + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) + +#### Section I - CFW Check + +{% include_relative include/cfw-check-fredtool.txt %} + +#### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reintroduceți cardul SD în dispozitivul dumneavoastră +1. Porniți dispozitivul +1. Porniți System Settings pe consolă +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically reboot +1. Închideți dispozitivul + +#### Section III - Prep Work + +{% include_relative include/fredtool-prep.txt %} + +#### Section IV - Overwriting DS Connection Settings + +{% include_relative include/fredtool-write-flipnote.txt %} + +#### Section V - Flipnote Exploit + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### Section VI - Luma3DS Configuration + +1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### Section VII - Restoring DS Connection Settings + +{% include_relative include/fredtool-restore-dsconn.txt %} + +___ + + +### Continuați la [Finalizând instalarea](finalizing-setup) +{: .notice--primary} diff --git a/_pages/ro_RO/seedminer-(mii).txt b/_pages/ro_RO/seedminer-(mii).txt new file mode 100644 index 0000000000..affefd9b74 --- /dev/null +++ b/_pages/ro_RO/seedminer-(mii).txt @@ -0,0 +1,84 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title="Cuprins" %} + +{% capture gpu_warning %} +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: ++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) ++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple) ++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) ++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{% endcapture %} +
{{ gpu_warning | markdownify }}
+ +{% capture technical_info %} +Technical Details (optional) + +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### What you need + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### Section I - Prep Work + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/ro_RO/site-navigation.txt b/_pages/ro_RO/site-navigation.txt index ff91c18d03..f766469437 100644 --- a/_pages/ro_RO/site-navigation.txt +++ b/_pages/ro_RO/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [A9LH către B9S](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) + [Contribuții](credits) + [Checking for CFW](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [Acasă](/) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [Instalând boot9strap (Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) + [Instalând boot9strap (Hardmod)](installing-boot9strap-(hardmod)) + [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [Schimb de regiune](region-changing) + [Restoring / Updating CFW](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (TWN)](seedminer-(twn)) + [Depanare](troubleshooting) + [Dezinstalând CFW](uninstall-cfw) diff --git a/_pages/ro_RO/updating-firmware-(kor).txt b/_pages/ro_RO/updating-firmware-(kor).txt new file mode 100644 index 0000000000..c9ec97970e --- /dev/null +++ b/_pages/ro_RO/updating-firmware-(kor).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (KOR)" +--- + +### Lectură obligatorie + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer](seedminer) +{: .notice--primary} diff --git a/_pages/ro_RO/updating-firmware-(kor-twn).md b/_pages/ro_RO/updating-firmware-(kor-twn).md deleted file mode 100644 index 74a2b48f90..0000000000 --- a/_pages/ro_RO/updating-firmware-(kor-twn).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (KOR/TWN)" ---- - -### Required Reading - -To use the Seedminer exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Seedminer](seedminer) -{: .notice--primary} diff --git a/_pages/ro_RO/updating-firmware-(new-3ds).md b/_pages/ro_RO/updating-firmware-(new-3ds).md deleted file mode 100644 index 5366fdd3b9..0000000000 --- a/_pages/ro_RO/updating-firmware-(new-3ds).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (New 3DS)" ---- - -### Required Reading - -To use the super-skaterhax exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) -{: .notice--primary} diff --git a/_pages/ro_RO/updating-firmware-(new-3ds).txt b/_pages/ro_RO/updating-firmware-(new-3ds).txt new file mode 100644 index 0000000000..bab86191d0 --- /dev/null +++ b/_pages/ro_RO/updating-firmware-(new-3ds).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (New 3DS)" +--- + +### Lectură obligatorie + +To use the super-skaterhax exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) +{: .notice--primary} diff --git a/_pages/ro_RO/updating-firmware-(twn).txt b/_pages/ro_RO/updating-firmware-(twn).txt new file mode 100644 index 0000000000..e5b0ffa816 --- /dev/null +++ b/_pages/ro_RO/updating-firmware-(twn).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (TWN)" +--- + +### Lectură obligatorie + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer (TWN)](seedminer-(twn)) +{: .notice--primary} diff --git a/_pages/ru_RU/404.md b/_pages/ru_RU/404.txt similarity index 100% rename from _pages/ru_RU/404.md rename to _pages/ru_RU/404.txt diff --git a/_pages/ru_RU/bannerbomb3-(legacy).txt b/_pages/ru_RU/bannerbomb3-(legacy).txt new file mode 100644 index 0000000000..3a653cc0b9 --- /dev/null +++ b/_pages/ru_RU/bannerbomb3-(legacy).txt @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title="Содержание" %} + +{% capture technical_info %} +Technical Details (optional) + +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### Compatibility Notes + +Эти инструкции работают на консолях регионов USA, Europe, Japan и Korea. На регион консоли указывает буква U, E, J или K после версии прошивки. + +### Что понадобится + +* Your `movable.sed` file from completing Seedminer or nimhax + +#### Часть I - Подготовительные работы + +{% include_relative include/bb3-prep.txt %} + +#### Section II - Hardware Button Check + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### Next steps: Choose an exploit + +If the camera appeared in the previous section, Safe Mode is likely to be working on your device. + +If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/ru_RU/bannerbomb3.txt b/_pages/ru_RU/bannerbomb3.txt index f6e658c79e..ec1e464786 100644 --- a/_pages/ru_RU/bannerbomb3.txt +++ b/_pages/ru_RU/bannerbomb3.txt @@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol #### Часть I - Подготовительные работы -In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. - -1. Выключите консоль -1. Вставьте SD-карту в компьютер -1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer -1. Upload your movable.sed using the “Choose File” option -1. Click “Build and Download” - + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) -1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it - + This file does not need to be opened or extracted - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.txt %} #### Section II - Hardware Button Check -In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. - -Your SD card should remain in your computer while you perform this check. - {% include_relative include/safemodecheck.txt %} ___ diff --git a/_pages/tr_TR/credits.md b/_pages/ru_RU/credits.txt similarity index 100% rename from _pages/tr_TR/credits.md rename to _pages/ru_RU/credits.txt diff --git a/_pages/ru_RU/donations.md b/_pages/ru_RU/donations.txt similarity index 100% rename from _pages/ru_RU/donations.md rename to _pages/ru_RU/donations.txt diff --git a/_pages/ru_RU/finalizing-setup.txt b/_pages/ru_RU/finalizing-setup.txt index f41c0b27c1..019a1e88cb 100644 --- a/_pages/ru_RU/finalizing-setup.txt +++ b/_pages/ru_RU/finalizing-setup.txt @@ -177,9 +177,6 @@ ___ You're done! Custom firmware is now fully configured on your device. {: .notice--success} -Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! -{: .notice--info} - ### Information and Notes {% capture notice-6 %} diff --git a/_pages/ru_RU/homebrew-launcher-(super-skaterhax).txt b/_pages/ru_RU/homebrew-launcher-(super-skaterhax).txt index d18a9abe22..20df178849 100644 --- a/_pages/ru_RU/homebrew-launcher-(super-skaterhax).txt +++ b/_pages/ru_RU/homebrew-launcher-(super-skaterhax).txt @@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up 1. Select the "GO GO!" button on the top screen + If any prompts appear, approve all of them + If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section + + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) 1. If the exploit was successful, your device will have booted into the Homebrew Launcher 1. Выключите консоль diff --git a/_pages/ru_RU/include/bb3-prep.txt b/_pages/ru_RU/include/bb3-prep.txt new file mode 100644 index 0000000000..da9c519bf5 --- /dev/null +++ b/_pages/ru_RU/include/bb3-prep.txt @@ -0,0 +1,23 @@ +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + +1. Выключите консоль +1. Вставьте SD-карту в компьютер +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. Create a folder named `Nintendo DSiWare` inside of the `` + + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/ru_RU/include/fredtool-prep.txt b/_pages/ru_RU/include/fredtool-prep.txt new file mode 100644 index 0000000000..48abf25c9e --- /dev/null +++ b/_pages/ru_RU/include/fredtool-prep.txt @@ -0,0 +1,29 @@ +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. + +1. Вставьте SD-карту в компьютер +1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer +1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. Click "Build" + + Wait a few seconds for the build process to complete +1. In the Build History section on the left, type the Username into the "Filter Builds" field +1. Click on the first search result + + This result should have the latest timestamp +1. Click the "output_(name).zip" link +1. Перейдите в папку `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` на SD-карте + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Скопируйте файлы `boot.firm` и `boot.3dsx` из `.zip-архива` Luma3DS в корень SD-карты + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card +1. Скопируйте папку `private` из `.zip-архива` Frogminer_save в корень SD-карты +1. Вставьте SD-карту обратно в консоль +1. Включите консоль + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/ru_RU/include/fredtool-restore-dsconn.txt b/_pages/ru_RU/include/fredtool-restore-dsconn.txt new file mode 100644 index 0000000000..860e269f00 --- /dev/null +++ b/_pages/ru_RU/include/fredtool-restore-dsconn.txt @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. Перейдите в папку `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` на SD-карте +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. Вставьте SD-карту обратно в консоль +1. Включите консоль +1. Откройте Системные настройки на вашей консоли +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title +1. Выберите "Копировать", затем "OK" diff --git a/_pages/ru_RU/include/fredtool-write-flipnote.txt b/_pages/ru_RU/include/fredtool-write-flipnote.txt new file mode 100644 index 0000000000..2aeecc9cd0 --- /dev/null +++ b/_pages/ru_RU/include/fredtool-write-flipnote.txt @@ -0,0 +1,11 @@ +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + +1. Откройте Системные настройки на вашей консоли +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Выберите "Копировать", затем "OK" +1. Вернитесь в главное меню Системных настроек +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. Если эксплойт сработал корректно, запустится японская версия Flipnote Studio + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/ru_RU/include/safemodecheck.txt b/_pages/ru_RU/include/safemodecheck.txt index cfe92b1e6c..0f20df1e25 100644 --- a/_pages/ru_RU/include/safemodecheck.txt +++ b/_pages/ru_RU/include/safemodecheck.txt @@ -1,3 +1,5 @@ +In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page. + 1. Включите консоль 1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time + The camera applet should appear diff --git a/_pages/ru_RU/include/seedminer-base.txt b/_pages/ru_RU/include/seedminer-base.txt index 028319d92e..cbddfa2dce 100644 --- a/_pages/ru_RU/include/seedminer-base.txt +++ b/_pages/ru_RU/include/seedminer-base.txt @@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. +{% capture console_state_info %} Before following this section: + Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data + Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen) -{: .notice--info} +{% endcapture %} +
{{ console_state_info | markdownify }}
1. Выключите консоль 1. Вставьте SD-карту в компьютер diff --git a/_pages/ru_RU/installing-boot9strap-(fredtool).txt b/_pages/ru_RU/installing-boot9strap-(fredtool).txt index 75319cc811..0590fa39ea 100644 --- a/_pages/ru_RU/installing-boot9strap-(fredtool).txt +++ b/_pages/ru_RU/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ### Что понадобится * Ваш файл `movable.sed`, полученный на странице [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) #### Section I - CFW Check @@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana #### Section III - Prep Work -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Вставьте SD-карту в компьютер -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Перейдите в папку `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` на SD-карте - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Скопируйте файлы `boot.firm` и `boot.3dsx` из `.zip-архива` Luma3DS в корень SD-карты - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Скопируйте папку `private` из `.zip-архива` Frogminer_save в корень SD-карты -1. Вставьте SD-карту обратно в консоль -1. Включите консоль - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.txt %} #### Section IV - Overwriting DS Connection Settings -In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. - -1. Откройте Системные настройки на вашей консоли -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Haxxxxxxxxx!" title - + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Выберите "Копировать", затем "OK" -1. Вернитесь в главное меню Системных настроек -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) -1. Если эксплойт сработал корректно, запустится японская версия Flipnote Studio - + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.txt %} #### Section V - Flipnote Exploit @@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte #### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. - -1. Перейдите в папку `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` на SD-карте -1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one -1. Вставьте SD-карту обратно в консоль -1. Включите консоль -1. Откройте Системные настройки на вашей консоли -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Nintendo DSi™" title -1. Выберите "Копировать", затем "OK" +{% include_relative include/fredtool-restore-dsconn.txt %} ___ + ### Следующий шаг: [Завершение установки](finalizing-setup) {: .notice--primary} diff --git a/_pages/ru_RU/installing-boot9strap-(fredtool-legacy).txt b/_pages/ru_RU/installing-boot9strap-(fredtool-legacy).txt new file mode 100644 index 0000000000..bcfa336e5f --- /dev/null +++ b/_pages/ru_RU/installing-boot9strap-(fredtool-legacy).txt @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title="Содержание" %} + +{% capture technical_info %} +Technical Details (optional) + +Чтобы получить дамп системного DSiWare приложения, мы воспользуемся уязвимостью в разделе Управление данными DSiWare внутри приложения Настройки. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +### Что понадобится + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) + +#### Section I - CFW Check + +{% include_relative include/cfw-check-fredtool.txt %} + +#### Часть II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Вставьте SD-карту обратно в консоль +1. Включите консоль +1. Откройте Системные настройки на вашей консоли +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically reboot +1. Выключите консоль + +#### Section III - Prep Work + +{% include_relative include/fredtool-prep.txt %} + +#### Section IV - Overwriting DS Connection Settings + +{% include_relative include/fredtool-write-flipnote.txt %} + +#### Section V - Flipnote Exploit + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### Section VI - Luma3DS Configuration + +1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### Section VII - Restoring DS Connection Settings + +{% include_relative include/fredtool-restore-dsconn.txt %} + +___ + + +### Следующий шаг: [Завершение установки](finalizing-setup) +{: .notice--primary} diff --git a/_pages/ru_RU/seedminer-(mii).txt b/_pages/ru_RU/seedminer-(mii).txt new file mode 100644 index 0000000000..1cbf9f872e --- /dev/null +++ b/_pages/ru_RU/seedminer-(mii).txt @@ -0,0 +1,84 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title="Содержание" %} + +{% capture gpu_warning %} +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: ++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) ++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple) ++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) ++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{% endcapture %} +
{{ gpu_warning | markdownify }}
+ +{% capture technical_info %} +Technical Details (optional) + +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### What you need + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### Section I - Prep Work + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/ru_RU/site-navigation.txt b/_pages/ru_RU/site-navigation.txt index c8e64becc0..f974c34614 100644 --- a/_pages/ru_RU/site-navigation.txt +++ b/_pages/ru_RU/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [с A9LH до B9S](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) + [Благодарности](credits) + [Checking for CFW](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [Главная](/) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [Установка boot9strap (Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) + [Установка boot9strap (Hardmod)](installing-boot9strap-(hardmod)) + [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [Смена региона](region-changing) + [Restoring / Updating CFW](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (TWN)](seedminer-(twn)) + [Проблемы и их решения](troubleshooting) + [Удаление кастомной прошивки](uninstall-cfw) diff --git a/_pages/ru_RU/updating-firmware-(kor).txt b/_pages/ru_RU/updating-firmware-(kor).txt new file mode 100644 index 0000000000..d752d19af9 --- /dev/null +++ b/_pages/ru_RU/updating-firmware-(kor).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (KOR)" +--- + +### Обязательно к прочтению + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer](seedminer) +{: .notice--primary} diff --git a/_pages/ru_RU/updating-firmware-(kor-twn).md b/_pages/ru_RU/updating-firmware-(kor-twn).md deleted file mode 100644 index 74a2b48f90..0000000000 --- a/_pages/ru_RU/updating-firmware-(kor-twn).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (KOR/TWN)" ---- - -### Required Reading - -To use the Seedminer exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Seedminer](seedminer) -{: .notice--primary} diff --git a/_pages/ru_RU/updating-firmware-(new-3ds).md b/_pages/ru_RU/updating-firmware-(new-3ds).md deleted file mode 100644 index 5366fdd3b9..0000000000 --- a/_pages/ru_RU/updating-firmware-(new-3ds).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (New 3DS)" ---- - -### Required Reading - -To use the super-skaterhax exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) -{: .notice--primary} diff --git a/_pages/ru_RU/updating-firmware-(new-3ds).txt b/_pages/ru_RU/updating-firmware-(new-3ds).txt new file mode 100644 index 0000000000..1063eb5aaf --- /dev/null +++ b/_pages/ru_RU/updating-firmware-(new-3ds).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (New 3DS)" +--- + +### Обязательно к прочтению + +To use the super-skaterhax exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) +{: .notice--primary} diff --git a/_pages/ru_RU/updating-firmware-(twn).txt b/_pages/ru_RU/updating-firmware-(twn).txt new file mode 100644 index 0000000000..50a810485d --- /dev/null +++ b/_pages/ru_RU/updating-firmware-(twn).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (TWN)" +--- + +### Обязательно к прочтению + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer (TWN)](seedminer-(twn)) +{: .notice--primary} diff --git a/_pages/sv_SE/404.md b/_pages/sv_SE/404.txt similarity index 100% rename from _pages/sv_SE/404.md rename to _pages/sv_SE/404.txt diff --git a/_pages/sv_SE/bannerbomb3-(legacy).txt b/_pages/sv_SE/bannerbomb3-(legacy).txt new file mode 100644 index 0000000000..503794c42a --- /dev/null +++ b/_pages/sv_SE/bannerbomb3-(legacy).txt @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title="Table of Contents" %} + +{% capture technical_info %} +Technical Details (optional) + +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### Compatibility Notes + +These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. + +### What You Need + +* Your `movable.sed` file from completing Seedminer or nimhax + +#### Section I - Prep Work + +{% include_relative include/bb3-prep.txt %} + +#### Section II - Hardware Button Check + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### Next steps: Choose an exploit + +If the camera appeared in the previous section, Safe Mode is likely to be working on your device. + +If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/sv_SE/bannerbomb3.txt b/_pages/sv_SE/bannerbomb3.txt index ea3692e2fa..a8383926fd 100644 --- a/_pages/sv_SE/bannerbomb3.txt +++ b/_pages/sv_SE/bannerbomb3.txt @@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. - -1. Stäng av din enhet -1. Insert your SD card into your computer -1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer -1. Upload your movable.sed using the “Choose File” option -1. Click “Build and Download” - + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) -1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it - + This file does not need to be opened or extracted - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.txt %} #### Section II - Hardware Button Check -In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. - -Your SD card should remain in your computer while you perform this check. - {% include_relative include/safemodecheck.txt %} ___ diff --git a/_pages/uk_UA/credits.md b/_pages/sv_SE/credits.txt similarity index 100% rename from _pages/uk_UA/credits.md rename to _pages/sv_SE/credits.txt diff --git a/_pages/sv_SE/donations.md b/_pages/sv_SE/donations.txt similarity index 100% rename from _pages/sv_SE/donations.md rename to _pages/sv_SE/donations.txt diff --git a/_pages/sv_SE/finalizing-setup.txt b/_pages/sv_SE/finalizing-setup.txt index a7d91c44fc..dc172cfe41 100644 --- a/_pages/sv_SE/finalizing-setup.txt +++ b/_pages/sv_SE/finalizing-setup.txt @@ -177,9 +177,6 @@ ___ You're done! Custom firmware is now fully configured on your device. {: .notice--success} -Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! -{: .notice--info} - ### Information and Notes {% capture notice-6 %} diff --git a/_pages/sv_SE/homebrew-launcher-(super-skaterhax).txt b/_pages/sv_SE/homebrew-launcher-(super-skaterhax).txt index cf7d59e3e0..dd49a55b77 100644 --- a/_pages/sv_SE/homebrew-launcher-(super-skaterhax).txt +++ b/_pages/sv_SE/homebrew-launcher-(super-skaterhax).txt @@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up 1. Select the "GO GO!" button on the top screen + If any prompts appear, approve all of them + If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section + + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) 1. If the exploit was successful, your device will have booted into the Homebrew Launcher 1. Stäng av din enhet diff --git a/_pages/sv_SE/include/bb3-prep.txt b/_pages/sv_SE/include/bb3-prep.txt new file mode 100644 index 0000000000..c02f751df7 --- /dev/null +++ b/_pages/sv_SE/include/bb3-prep.txt @@ -0,0 +1,23 @@ +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + +1. Stäng av din enhet +1. Insert your SD card into your computer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. Create a folder named `Nintendo DSiWare` inside of the `` + + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/sv_SE/include/fredtool-prep.txt b/_pages/sv_SE/include/fredtool-prep.txt new file mode 100644 index 0000000000..599aa32390 --- /dev/null +++ b/_pages/sv_SE/include/fredtool-prep.txt @@ -0,0 +1,29 @@ +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. + +1. Insert your SD card into your computer +1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer +1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. Click "Build" + + Wait a few seconds for the build process to complete +1. In the Build History section on the left, type the Username into the "Filter Builds" field +1. Click on the first search result + + This result should have the latest timestamp +1. Click the "output_(name).zip" link +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card +1. Sätt tillbaka ditt SD-kort i din enhet +1. Power on your device + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/sv_SE/include/fredtool-restore-dsconn.txt b/_pages/sv_SE/include/fredtool-restore-dsconn.txt new file mode 100644 index 0000000000..e9ad5b0aee --- /dev/null +++ b/_pages/sv_SE/include/fredtool-restore-dsconn.txt @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. Sätt tillbaka ditt SD-kort i din enhet +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title +1. Select "Copy", then select "OK" diff --git a/_pages/sv_SE/include/fredtool-write-flipnote.txt b/_pages/sv_SE/include/fredtool-write-flipnote.txt new file mode 100644 index 0000000000..cb6f428624 --- /dev/null +++ b/_pages/sv_SE/include/fredtool-write-flipnote.txt @@ -0,0 +1,11 @@ +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Select "Copy", then select "OK" +1. Return to main menu of the System Settings +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/sv_SE/include/safemodecheck.txt b/_pages/sv_SE/include/safemodecheck.txt index 0527c5a2bd..ef73132829 100644 --- a/_pages/sv_SE/include/safemodecheck.txt +++ b/_pages/sv_SE/include/safemodecheck.txt @@ -1,3 +1,5 @@ +In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page. + 1. Power on your device 1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time + The camera applet should appear diff --git a/_pages/sv_SE/include/seedminer-base.txt b/_pages/sv_SE/include/seedminer-base.txt index 7a753a9d33..fbe1407f98 100644 --- a/_pages/sv_SE/include/seedminer-base.txt +++ b/_pages/sv_SE/include/seedminer-base.txt @@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. +{% capture console_state_info %} Before following this section: + Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data + Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen) -{: .notice--info} +{% endcapture %} +
{{ console_state_info | markdownify }}
1. Stäng av din enhet 1. Insert your SD card into your computer diff --git a/_pages/sv_SE/installing-boot9strap-(fredtool).txt b/_pages/sv_SE/installing-boot9strap-(fredtool).txt index 3fc661338a..c9db5c24c7 100644 --- a/_pages/sv_SE/installing-boot9strap-(fredtool).txt +++ b/_pages/sv_SE/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ### What You Need * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) #### Section I - CFW Check @@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana #### Section III - Prep Work -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Insert your SD card into your computer -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Sätt tillbaka ditt SD-kort i din enhet -1. Power on your device - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.txt %} #### Section IV - Overwriting DS Connection Settings -In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. - -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Haxxxxxxxxx!" title - + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Select "Copy", then select "OK" -1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) -1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio - + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.txt %} #### Section V - Flipnote Exploit @@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte #### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. - -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one -1. Sätt tillbaka ditt SD-kort i din enhet -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Nintendo DSi™" title -1. Select "Copy", then select "OK" +{% include_relative include/fredtool-restore-dsconn.txt %} ___ + ### Continue to [Finalizing Setup](finalizing-setup) {: .notice--primary} diff --git a/_pages/sv_SE/installing-boot9strap-(fredtool-legacy).txt b/_pages/sv_SE/installing-boot9strap-(fredtool-legacy).txt new file mode 100644 index 0000000000..143c5cc64d --- /dev/null +++ b/_pages/sv_SE/installing-boot9strap-(fredtool-legacy).txt @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title="Table of Contents" %} + +{% capture technical_info %} +Technical Details (optional) + +To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +### What You Need + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) + +#### Section I - CFW Check + +{% include_relative include/cfw-check-fredtool.txt %} + +#### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Sätt tillbaka ditt SD-kort i din enhet +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically reboot +1. Stäng av din enhet + +#### Section III - Prep Work + +{% include_relative include/fredtool-prep.txt %} + +#### Section IV - Overwriting DS Connection Settings + +{% include_relative include/fredtool-write-flipnote.txt %} + +#### Section V - Flipnote Exploit + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### Section VI - Luma3DS Configuration + +1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### Section VII - Restoring DS Connection Settings + +{% include_relative include/fredtool-restore-dsconn.txt %} + +___ + + +### Continue to [Finalizing Setup](finalizing-setup) +{: .notice--primary} diff --git a/_pages/sv_SE/seedminer-(mii).txt b/_pages/sv_SE/seedminer-(mii).txt new file mode 100644 index 0000000000..5faf224c22 --- /dev/null +++ b/_pages/sv_SE/seedminer-(mii).txt @@ -0,0 +1,84 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title="Table of Contents" %} + +{% capture gpu_warning %} +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: ++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) ++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple) ++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) ++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{% endcapture %} +
{{ gpu_warning | markdownify }}
+ +{% capture technical_info %} +Technical Details (optional) + +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### What you need + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### Section I - Prep Work + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/sv_SE/site-navigation.txt b/_pages/sv_SE/site-navigation.txt index 357414ea48..9f0946f686 100644 --- a/_pages/sv_SE/site-navigation.txt +++ b/_pages/sv_SE/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [A9LH till B9S](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) + [Credits](credits) + [Checking for CFW](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [Hem](/) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) + [Installera boot9strap (Hardmod)](installing-boot9strap-(hardmod)) + [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [Ändra Region](region-changing) + [Restoring / Updating CFW](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (TWN)](seedminer-(twn)) + [Felsökning](troubleshooting) + [Avinstallera CFW](uninstall-cfw) diff --git a/_pages/sv_SE/updating-firmware-(kor).txt b/_pages/sv_SE/updating-firmware-(kor).txt new file mode 100644 index 0000000000..4b08786c27 --- /dev/null +++ b/_pages/sv_SE/updating-firmware-(kor).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (KOR)" +--- + +### Required Reading + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer](seedminer) +{: .notice--primary} diff --git a/_pages/sv_SE/updating-firmware-(kor-twn).md b/_pages/sv_SE/updating-firmware-(kor-twn).md deleted file mode 100644 index 74a2b48f90..0000000000 --- a/_pages/sv_SE/updating-firmware-(kor-twn).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (KOR/TWN)" ---- - -### Required Reading - -To use the Seedminer exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Seedminer](seedminer) -{: .notice--primary} diff --git a/_pages/sv_SE/updating-firmware-(new-3ds).md b/_pages/sv_SE/updating-firmware-(new-3ds).md deleted file mode 100644 index 5366fdd3b9..0000000000 --- a/_pages/sv_SE/updating-firmware-(new-3ds).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (New 3DS)" ---- - -### Required Reading - -To use the super-skaterhax exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) -{: .notice--primary} diff --git a/_pages/he_IL/updating-firmware-(new-3ds).md b/_pages/sv_SE/updating-firmware-(new-3ds).txt similarity index 100% rename from _pages/he_IL/updating-firmware-(new-3ds).md rename to _pages/sv_SE/updating-firmware-(new-3ds).txt diff --git a/_pages/sv_SE/updating-firmware-(twn).txt b/_pages/sv_SE/updating-firmware-(twn).txt new file mode 100644 index 0000000000..83e6992b1b --- /dev/null +++ b/_pages/sv_SE/updating-firmware-(twn).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (TWN)" +--- + +### Required Reading + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer (TWN)](seedminer-(twn)) +{: .notice--primary} diff --git a/_pages/th_TH/404.md b/_pages/th_TH/404.txt similarity index 100% rename from _pages/th_TH/404.md rename to _pages/th_TH/404.txt diff --git a/_pages/th_TH/bannerbomb3-(legacy).txt b/_pages/th_TH/bannerbomb3-(legacy).txt new file mode 100644 index 0000000000..503794c42a --- /dev/null +++ b/_pages/th_TH/bannerbomb3-(legacy).txt @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title="Table of Contents" %} + +{% capture technical_info %} +Technical Details (optional) + +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### Compatibility Notes + +These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. + +### What You Need + +* Your `movable.sed` file from completing Seedminer or nimhax + +#### Section I - Prep Work + +{% include_relative include/bb3-prep.txt %} + +#### Section II - Hardware Button Check + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### Next steps: Choose an exploit + +If the camera appeared in the previous section, Safe Mode is likely to be working on your device. + +If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/th_TH/bannerbomb3.txt b/_pages/th_TH/bannerbomb3.txt index 7767c4aeb1..a8383926fd 100644 --- a/_pages/th_TH/bannerbomb3.txt +++ b/_pages/th_TH/bannerbomb3.txt @@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. - -1. Power off your device -1. Insert your SD card into your computer -1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer -1. Upload your movable.sed using the “Choose File” option -1. Click “Build and Download” - + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) -1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it - + This file does not need to be opened or extracted - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.txt %} #### Section II - Hardware Button Check -In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. - -Your SD card should remain in your computer while you perform this check. - {% include_relative include/safemodecheck.txt %} ___ diff --git a/_pages/vi_VN/credits.md b/_pages/th_TH/credits.txt similarity index 100% rename from _pages/vi_VN/credits.md rename to _pages/th_TH/credits.txt diff --git a/_pages/th_TH/donations.md b/_pages/th_TH/donations.txt similarity index 100% rename from _pages/th_TH/donations.md rename to _pages/th_TH/donations.txt diff --git a/_pages/th_TH/finalizing-setup.txt b/_pages/th_TH/finalizing-setup.txt index f16b13698a..e41bd44dcd 100644 --- a/_pages/th_TH/finalizing-setup.txt +++ b/_pages/th_TH/finalizing-setup.txt @@ -177,9 +177,6 @@ ___ You're done! Custom firmware is now fully configured on your device. {: .notice--success} -Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! -{: .notice--info} - ### Information and Notes {% capture notice-6 %} diff --git a/_pages/th_TH/homebrew-launcher-(super-skaterhax).txt b/_pages/th_TH/homebrew-launcher-(super-skaterhax).txt index ea288c3163..7b83fe0d7e 100644 --- a/_pages/th_TH/homebrew-launcher-(super-skaterhax).txt +++ b/_pages/th_TH/homebrew-launcher-(super-skaterhax).txt @@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up 1. Select the "GO GO!" button on the top screen + If any prompts appear, approve all of them + If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section + + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) 1. If the exploit was successful, your device will have booted into the Homebrew Launcher 1. Power off your device diff --git a/_pages/th_TH/include/bb3-prep.txt b/_pages/th_TH/include/bb3-prep.txt new file mode 100644 index 0000000000..0b0965f3de --- /dev/null +++ b/_pages/th_TH/include/bb3-prep.txt @@ -0,0 +1,23 @@ +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + +1. Power off your device +1. Insert your SD card into your computer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. Create a folder named `Nintendo DSiWare` inside of the `` + + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/th_TH/include/fredtool-prep.txt b/_pages/th_TH/include/fredtool-prep.txt new file mode 100644 index 0000000000..cff8aa806d --- /dev/null +++ b/_pages/th_TH/include/fredtool-prep.txt @@ -0,0 +1,29 @@ +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. + +1. Insert your SD card into your computer +1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer +1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. Click "Build" + + Wait a few seconds for the build process to complete +1. In the Build History section on the left, type the Username into the "Filter Builds" field +1. Click on the first search result + + This result should have the latest timestamp +1. Click the "output_(name).zip" link +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card +1. Reinsert your SD card into your device +1. Power on your device + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/th_TH/include/fredtool-restore-dsconn.txt b/_pages/th_TH/include/fredtool-restore-dsconn.txt new file mode 100644 index 0000000000..3057b3ac9d --- /dev/null +++ b/_pages/th_TH/include/fredtool-restore-dsconn.txt @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title +1. Select "Copy", then select "OK" diff --git a/_pages/th_TH/include/fredtool-write-flipnote.txt b/_pages/th_TH/include/fredtool-write-flipnote.txt new file mode 100644 index 0000000000..cb6f428624 --- /dev/null +++ b/_pages/th_TH/include/fredtool-write-flipnote.txt @@ -0,0 +1,11 @@ +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Select "Copy", then select "OK" +1. Return to main menu of the System Settings +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/th_TH/include/safemodecheck.txt b/_pages/th_TH/include/safemodecheck.txt index 43ebec6575..7035baace8 100644 --- a/_pages/th_TH/include/safemodecheck.txt +++ b/_pages/th_TH/include/safemodecheck.txt @@ -1,3 +1,5 @@ +In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page. + 1. Power on your device 1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time + The camera applet should appear diff --git a/_pages/th_TH/include/seedminer-base.txt b/_pages/th_TH/include/seedminer-base.txt index e3493c2f87..ad6697a5fa 100644 --- a/_pages/th_TH/include/seedminer-base.txt +++ b/_pages/th_TH/include/seedminer-base.txt @@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. +{% capture console_state_info %} Before following this section: + Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data + Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen) -{: .notice--info} +{% endcapture %} +
{{ console_state_info | markdownify }}
1. Power off your device 1. Insert your SD card into your computer diff --git a/_pages/th_TH/installing-boot9strap-(fredtool).txt b/_pages/th_TH/installing-boot9strap-(fredtool).txt index ea9d81c010..455c3317a3 100644 --- a/_pages/th_TH/installing-boot9strap-(fredtool).txt +++ b/_pages/th_TH/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ### What You Need * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) #### Section I - CFW Check @@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana #### Section III - Prep Work -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Insert your SD card into your computer -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert your SD card into your device -1. Power on your device - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.txt %} #### Section IV - Overwriting DS Connection Settings -In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. - -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Haxxxxxxxxx!" title - + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Select "Copy", then select "OK" -1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) -1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio - + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.txt %} #### Section V - Flipnote Exploit @@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte #### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. - -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Nintendo DSi™" title -1. Select "Copy", then select "OK" +{% include_relative include/fredtool-restore-dsconn.txt %} ___ + ### Continue to [Finalizing Setup](finalizing-setup) {: .notice--primary} diff --git a/_pages/th_TH/installing-boot9strap-(fredtool-legacy).txt b/_pages/th_TH/installing-boot9strap-(fredtool-legacy).txt new file mode 100644 index 0000000000..1513694ebd --- /dev/null +++ b/_pages/th_TH/installing-boot9strap-(fredtool-legacy).txt @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title="Table of Contents" %} + +{% capture technical_info %} +Technical Details (optional) + +To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +### What You Need + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) + +#### Section I - CFW Check + +{% include_relative include/cfw-check-fredtool.txt %} + +#### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically reboot +1. Power off your device + +#### Section III - Prep Work + +{% include_relative include/fredtool-prep.txt %} + +#### Section IV - Overwriting DS Connection Settings + +{% include_relative include/fredtool-write-flipnote.txt %} + +#### Section V - Flipnote Exploit + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### Section VI - Luma3DS Configuration + +1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### Section VII - Restoring DS Connection Settings + +{% include_relative include/fredtool-restore-dsconn.txt %} + +___ + + +### Continue to [Finalizing Setup](finalizing-setup) +{: .notice--primary} diff --git a/_pages/th_TH/seedminer-(mii).txt b/_pages/th_TH/seedminer-(mii).txt new file mode 100644 index 0000000000..5faf224c22 --- /dev/null +++ b/_pages/th_TH/seedminer-(mii).txt @@ -0,0 +1,84 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title="Table of Contents" %} + +{% capture gpu_warning %} +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: ++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) ++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple) ++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) ++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{% endcapture %} +
{{ gpu_warning | markdownify }}
+ +{% capture technical_info %} +Technical Details (optional) + +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### What you need + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### Section I - Prep Work + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/th_TH/site-navigation.txt b/_pages/th_TH/site-navigation.txt index a2135747ab..179a8a4b0b 100644 --- a/_pages/th_TH/site-navigation.txt +++ b/_pages/th_TH/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [A9LH to B9S](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) + [Credits](credits) + [Checking for CFW](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [Home](/) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) + [Installing boot9strap (Hardmod)](installing-boot9strap-(hardmod)) + [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [Region Changing](region-changing) + [Restoring / Updating CFW](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (TWN)](seedminer-(twn)) + [Troubleshooting](troubleshooting) + [Uninstall CFW](uninstall-cfw) diff --git a/_pages/th_TH/updating-firmware-(kor).txt b/_pages/th_TH/updating-firmware-(kor).txt new file mode 100644 index 0000000000..4b08786c27 --- /dev/null +++ b/_pages/th_TH/updating-firmware-(kor).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (KOR)" +--- + +### Required Reading + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer](seedminer) +{: .notice--primary} diff --git a/_pages/th_TH/updating-firmware-(kor-twn).md b/_pages/th_TH/updating-firmware-(kor-twn).md deleted file mode 100644 index 74a2b48f90..0000000000 --- a/_pages/th_TH/updating-firmware-(kor-twn).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (KOR/TWN)" ---- - -### Required Reading - -To use the Seedminer exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Seedminer](seedminer) -{: .notice--primary} diff --git a/_pages/th_TH/updating-firmware-(new-3ds).md b/_pages/th_TH/updating-firmware-(new-3ds).md deleted file mode 100644 index 5366fdd3b9..0000000000 --- a/_pages/th_TH/updating-firmware-(new-3ds).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (New 3DS)" ---- - -### Required Reading - -To use the super-skaterhax exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) -{: .notice--primary} diff --git a/_pages/hr_HR/updating-firmware-(new-3ds).md b/_pages/th_TH/updating-firmware-(new-3ds).txt similarity index 100% rename from _pages/hr_HR/updating-firmware-(new-3ds).md rename to _pages/th_TH/updating-firmware-(new-3ds).txt diff --git a/_pages/th_TH/updating-firmware-(twn).txt b/_pages/th_TH/updating-firmware-(twn).txt new file mode 100644 index 0000000000..83e6992b1b --- /dev/null +++ b/_pages/th_TH/updating-firmware-(twn).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (TWN)" +--- + +### Required Reading + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer (TWN)](seedminer-(twn)) +{: .notice--primary} diff --git a/_pages/tr_TR/404.md b/_pages/tr_TR/404.txt similarity index 100% rename from _pages/tr_TR/404.md rename to _pages/tr_TR/404.txt diff --git a/_pages/tr_TR/bannerbomb3-(legacy).txt b/_pages/tr_TR/bannerbomb3-(legacy).txt new file mode 100644 index 0000000000..5546169248 --- /dev/null +++ b/_pages/tr_TR/bannerbomb3-(legacy).txt @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title = "İçindekiler"%} + +{% capture technical_info %} +Technical Details (optional) + +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### Compatibility Notes + +These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. + +### What You Need + +* Your `movable.sed` file from completing Seedminer or nimhax + +#### Section I - Prep Work + +{% include_relative include/bb3-prep.txt %} + +#### Section II - Hardware Button Check + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### Next steps: Choose an exploit + +If the camera appeared in the previous section, Safe Mode is likely to be working on your device. + +If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/tr_TR/bannerbomb3.txt b/_pages/tr_TR/bannerbomb3.txt index 565a60a8b1..5a69e86e22 100644 --- a/_pages/tr_TR/bannerbomb3.txt +++ b/_pages/tr_TR/bannerbomb3.txt @@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. - -1. Power off your device -1. SD kartınızı bilgisayarınıza takın -1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer -1. Upload your movable.sed using the “Choose File” option -1. Click “Build and Download” - + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) -1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it - + This file does not need to be opened or extracted - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.txt %} #### Section II - Hardware Button Check -In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. - -Your SD card should remain in your computer while you perform this check. - {% include_relative include/safemodecheck.txt %} ___ diff --git a/_pages/zh_CN/credits.md b/_pages/tr_TR/credits.txt similarity index 98% rename from _pages/zh_CN/credits.md rename to _pages/tr_TR/credits.txt index 827df5b46f..c30986407b 100644 --- a/_pages/zh_CN/credits.md +++ b/_pages/tr_TR/credits.txt @@ -1,5 +1,5 @@ --- -title: "致谢" +title: "Credits" --- **Special thanks to Plailect, the original creator and maintainer of the guide!** diff --git a/_pages/tr_TR/donations.md b/_pages/tr_TR/donations.txt similarity index 100% rename from _pages/tr_TR/donations.md rename to _pages/tr_TR/donations.txt diff --git a/_pages/tr_TR/finalizing-setup.txt b/_pages/tr_TR/finalizing-setup.txt index 0925c0f614..5cf22a49f6 100644 --- a/_pages/tr_TR/finalizing-setup.txt +++ b/_pages/tr_TR/finalizing-setup.txt @@ -177,9 +177,6 @@ ___ You're done! Custom firmware is now fully configured on your device. {: .notice--success} -Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! -{: .notice--info} - ### Information and Notes {% capture notice-6 %} diff --git a/_pages/tr_TR/homebrew-launcher-(super-skaterhax).txt b/_pages/tr_TR/homebrew-launcher-(super-skaterhax).txt index 209c544380..2c4da041c0 100644 --- a/_pages/tr_TR/homebrew-launcher-(super-skaterhax).txt +++ b/_pages/tr_TR/homebrew-launcher-(super-skaterhax).txt @@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up 1. Select the "GO GO!" button on the top screen + If any prompts appear, approve all of them + If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section + + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) 1. If the exploit was successful, your device will have booted into the Homebrew Launcher 1. Power off your device diff --git a/_pages/tr_TR/include/bb3-prep.txt b/_pages/tr_TR/include/bb3-prep.txt new file mode 100644 index 0000000000..3e9fade358 --- /dev/null +++ b/_pages/tr_TR/include/bb3-prep.txt @@ -0,0 +1,23 @@ +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + +1. Power off your device +1. SD kartınızı bilgisayarınıza takın +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. Create a folder named `Nintendo DSiWare` inside of the `` + + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/tr_TR/include/fredtool-prep.txt b/_pages/tr_TR/include/fredtool-prep.txt new file mode 100644 index 0000000000..35f70c9a9c --- /dev/null +++ b/_pages/tr_TR/include/fredtool-prep.txt @@ -0,0 +1,29 @@ +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. + +1. SD kartınızı bilgisayarınıza takın +1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer +1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. Click "Build" + + Wait a few seconds for the build process to complete +1. In the Build History section on the left, type the Username into the "Filter Builds" field +1. Click on the first search result + + This result should have the latest timestamp +1. Click the "output_(name).zip" link +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card +1. Reinsert your SD card into your device +1. Power on your device + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/tr_TR/include/fredtool-restore-dsconn.txt b/_pages/tr_TR/include/fredtool-restore-dsconn.txt new file mode 100644 index 0000000000..3057b3ac9d --- /dev/null +++ b/_pages/tr_TR/include/fredtool-restore-dsconn.txt @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title +1. Select "Copy", then select "OK" diff --git a/_pages/tr_TR/include/fredtool-write-flipnote.txt b/_pages/tr_TR/include/fredtool-write-flipnote.txt new file mode 100644 index 0000000000..cb6f428624 --- /dev/null +++ b/_pages/tr_TR/include/fredtool-write-flipnote.txt @@ -0,0 +1,11 @@ +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Select "Copy", then select "OK" +1. Return to main menu of the System Settings +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/tr_TR/include/safemodecheck.txt b/_pages/tr_TR/include/safemodecheck.txt index 43ebec6575..7035baace8 100644 --- a/_pages/tr_TR/include/safemodecheck.txt +++ b/_pages/tr_TR/include/safemodecheck.txt @@ -1,3 +1,5 @@ +In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page. + 1. Power on your device 1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time + The camera applet should appear diff --git a/_pages/tr_TR/include/seedminer-base.txt b/_pages/tr_TR/include/seedminer-base.txt index a105a9ed97..84d98f0fa8 100644 --- a/_pages/tr_TR/include/seedminer-base.txt +++ b/_pages/tr_TR/include/seedminer-base.txt @@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. +{% capture console_state_info %} Before following this section: + Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data + Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen) -{: .notice--info} +{% endcapture %} +
{{ console_state_info | markdownify }}
1. Power off your device 1. SD kartınızı bilgisayarınıza takın diff --git a/_pages/tr_TR/installing-boot9strap-(fredtool).txt b/_pages/tr_TR/installing-boot9strap-(fredtool).txt index 2b6a421d99..19c1ab2c29 100644 --- a/_pages/tr_TR/installing-boot9strap-(fredtool).txt +++ b/_pages/tr_TR/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ### What You Need * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) #### Section I - CFW Check @@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana #### Section III - Prep Work -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. SD kartınızı bilgisayarınıza takın -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert your SD card into your device -1. Power on your device - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.txt %} #### Section IV - Overwriting DS Connection Settings -In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. - -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Haxxxxxxxxx!" title - + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Select "Copy", then select "OK" -1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) -1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio - + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.txt %} #### Section V - Flipnote Exploit @@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte #### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. - -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Nintendo DSi™" title -1. Select "Copy", then select "OK" +{% include_relative include/fredtool-restore-dsconn.txt %} ___ + ### [Kurulumu Tamamlamak](finalizing-setup) için devam edin {: .notice--primary} diff --git a/_pages/tr_TR/installing-boot9strap-(fredtool-legacy).txt b/_pages/tr_TR/installing-boot9strap-(fredtool-legacy).txt new file mode 100644 index 0000000000..7ef4d77cff --- /dev/null +++ b/_pages/tr_TR/installing-boot9strap-(fredtool-legacy).txt @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title = "İçindekiler"%} + +{% capture technical_info %} +Technical Details (optional) + +Sistem DSiWare dosyasını çıkartabilmek için Settings (Ayarlar) uygulamasında bulunan DSiWare Data Management (DSiWare Veri Yönetimi) kısmındaki bir açıktan yararlanıyoruz. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +### What You Need + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) + +#### Section I - CFW Check + +{% include_relative include/cfw-check-fredtool.txt %} + +#### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically reboot +1. Power off your device + +#### Section III - Prep Work + +{% include_relative include/fredtool-prep.txt %} + +#### Section IV - Overwriting DS Connection Settings + +{% include_relative include/fredtool-write-flipnote.txt %} + +#### Section V - Flipnote Exploit + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### Section VI - Luma3DS Configuration + +1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### Section VII - Restoring DS Connection Settings + +{% include_relative include/fredtool-restore-dsconn.txt %} + +___ + + +### [Kurulumu Tamamlamak](finalizing-setup) için devam edin +{: .notice--primary} diff --git a/_pages/tr_TR/seedminer-(mii).txt b/_pages/tr_TR/seedminer-(mii).txt new file mode 100644 index 0000000000..bb3d0dc923 --- /dev/null +++ b/_pages/tr_TR/seedminer-(mii).txt @@ -0,0 +1,84 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title = "İçindekiler"%} + +{% capture gpu_warning %} +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: ++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) ++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple) ++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) ++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{% endcapture %} +
{{ gpu_warning | markdownify }}
+ +{% capture technical_info %} +Technical Details (optional) + +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### What you need + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### Section I - Prep Work + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/tr_TR/site-navigation.txt b/_pages/tr_TR/site-navigation.txt index 64cca33f7a..a3b28fe663 100644 --- a/_pages/tr_TR/site-navigation.txt +++ b/_pages/tr_TR/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [A9LH to B9S](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) + [Credits](credits) + [Checking for CFW](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [Home](/) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) + [Installing boot9strap (Hardmod)](installing-boot9strap-(hardmod)) + [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [Bölge Değiştirme](region-changing) + [Restoring / Updating CFW](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (TWN)](seedminer-(twn)) + [Troubleshooting](troubleshooting) + [Uninstall CFW](uninstall-cfw) diff --git a/_pages/tr_TR/updating-firmware-(kor).txt b/_pages/tr_TR/updating-firmware-(kor).txt new file mode 100644 index 0000000000..c094d3c1e0 --- /dev/null +++ b/_pages/tr_TR/updating-firmware-(kor).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (KOR)" +--- + +### Okumanız Gerekli + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer](seedminer) +{: .notice--primary} diff --git a/_pages/tr_TR/updating-firmware-(kor-twn).md b/_pages/tr_TR/updating-firmware-(kor-twn).md deleted file mode 100644 index 74a2b48f90..0000000000 --- a/_pages/tr_TR/updating-firmware-(kor-twn).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (KOR/TWN)" ---- - -### Required Reading - -To use the Seedminer exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Seedminer](seedminer) -{: .notice--primary} diff --git a/_pages/tr_TR/updating-firmware-(new-3ds).md b/_pages/tr_TR/updating-firmware-(new-3ds).md deleted file mode 100644 index 5366fdd3b9..0000000000 --- a/_pages/tr_TR/updating-firmware-(new-3ds).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (New 3DS)" ---- - -### Required Reading - -To use the super-skaterhax exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) -{: .notice--primary} diff --git a/_pages/tr_TR/updating-firmware-(new-3ds).txt b/_pages/tr_TR/updating-firmware-(new-3ds).txt new file mode 100644 index 0000000000..f7e38c37e5 --- /dev/null +++ b/_pages/tr_TR/updating-firmware-(new-3ds).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (New 3DS)" +--- + +### Okumanız Gerekli + +To use the super-skaterhax exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) +{: .notice--primary} diff --git a/_pages/tr_TR/updating-firmware-(twn).txt b/_pages/tr_TR/updating-firmware-(twn).txt new file mode 100644 index 0000000000..f54d11270e --- /dev/null +++ b/_pages/tr_TR/updating-firmware-(twn).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (TWN)" +--- + +### Okumanız Gerekli + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer (TWN)](seedminer-(twn)) +{: .notice--primary} diff --git a/_pages/uk_UA/404.md b/_pages/uk_UA/404.txt similarity index 100% rename from _pages/uk_UA/404.md rename to _pages/uk_UA/404.txt diff --git a/_pages/uk_UA/bannerbomb3-(legacy).txt b/_pages/uk_UA/bannerbomb3-(legacy).txt new file mode 100644 index 0000000000..503794c42a --- /dev/null +++ b/_pages/uk_UA/bannerbomb3-(legacy).txt @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title="Table of Contents" %} + +{% capture technical_info %} +Technical Details (optional) + +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### Compatibility Notes + +These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. + +### What You Need + +* Your `movable.sed` file from completing Seedminer or nimhax + +#### Section I - Prep Work + +{% include_relative include/bb3-prep.txt %} + +#### Section II - Hardware Button Check + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### Next steps: Choose an exploit + +If the camera appeared in the previous section, Safe Mode is likely to be working on your device. + +If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/uk_UA/bannerbomb3.txt b/_pages/uk_UA/bannerbomb3.txt index 7767c4aeb1..a8383926fd 100644 --- a/_pages/uk_UA/bannerbomb3.txt +++ b/_pages/uk_UA/bannerbomb3.txt @@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. - -1. Power off your device -1. Insert your SD card into your computer -1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer -1. Upload your movable.sed using the “Choose File” option -1. Click “Build and Download” - + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) -1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it - + This file does not need to be opened or extracted - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.txt %} #### Section II - Hardware Button Check -In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. - -Your SD card should remain in your computer while you perform this check. - {% include_relative include/safemodecheck.txt %} ___ diff --git a/_pages/ja_JP/credits.md b/_pages/uk_UA/credits.txt similarity index 98% rename from _pages/ja_JP/credits.md rename to _pages/uk_UA/credits.txt index cac54e8170..c30986407b 100644 --- a/_pages/ja_JP/credits.md +++ b/_pages/uk_UA/credits.txt @@ -1,5 +1,5 @@ --- -title: "謝辞" +title: "Credits" --- **Special thanks to Plailect, the original creator and maintainer of the guide!** diff --git a/_pages/uk_UA/donations.md b/_pages/uk_UA/donations.txt similarity index 100% rename from _pages/uk_UA/donations.md rename to _pages/uk_UA/donations.txt diff --git a/_pages/uk_UA/finalizing-setup.txt b/_pages/uk_UA/finalizing-setup.txt index f16b13698a..e41bd44dcd 100644 --- a/_pages/uk_UA/finalizing-setup.txt +++ b/_pages/uk_UA/finalizing-setup.txt @@ -177,9 +177,6 @@ ___ You're done! Custom firmware is now fully configured on your device. {: .notice--success} -Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! -{: .notice--info} - ### Information and Notes {% capture notice-6 %} diff --git a/_pages/uk_UA/homebrew-launcher-(super-skaterhax).txt b/_pages/uk_UA/homebrew-launcher-(super-skaterhax).txt index ea288c3163..7b83fe0d7e 100644 --- a/_pages/uk_UA/homebrew-launcher-(super-skaterhax).txt +++ b/_pages/uk_UA/homebrew-launcher-(super-skaterhax).txt @@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up 1. Select the "GO GO!" button on the top screen + If any prompts appear, approve all of them + If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section + + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) 1. If the exploit was successful, your device will have booted into the Homebrew Launcher 1. Power off your device diff --git a/_pages/uk_UA/include/bb3-prep.txt b/_pages/uk_UA/include/bb3-prep.txt new file mode 100644 index 0000000000..0b0965f3de --- /dev/null +++ b/_pages/uk_UA/include/bb3-prep.txt @@ -0,0 +1,23 @@ +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + +1. Power off your device +1. Insert your SD card into your computer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. Create a folder named `Nintendo DSiWare` inside of the `` + + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/uk_UA/include/fredtool-prep.txt b/_pages/uk_UA/include/fredtool-prep.txt new file mode 100644 index 0000000000..cff8aa806d --- /dev/null +++ b/_pages/uk_UA/include/fredtool-prep.txt @@ -0,0 +1,29 @@ +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. + +1. Insert your SD card into your computer +1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer +1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. Click "Build" + + Wait a few seconds for the build process to complete +1. In the Build History section on the left, type the Username into the "Filter Builds" field +1. Click on the first search result + + This result should have the latest timestamp +1. Click the "output_(name).zip" link +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card +1. Reinsert your SD card into your device +1. Power on your device + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/uk_UA/include/fredtool-restore-dsconn.txt b/_pages/uk_UA/include/fredtool-restore-dsconn.txt new file mode 100644 index 0000000000..3057b3ac9d --- /dev/null +++ b/_pages/uk_UA/include/fredtool-restore-dsconn.txt @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title +1. Select "Copy", then select "OK" diff --git a/_pages/uk_UA/include/fredtool-write-flipnote.txt b/_pages/uk_UA/include/fredtool-write-flipnote.txt new file mode 100644 index 0000000000..cb6f428624 --- /dev/null +++ b/_pages/uk_UA/include/fredtool-write-flipnote.txt @@ -0,0 +1,11 @@ +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Select "Copy", then select "OK" +1. Return to main menu of the System Settings +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/uk_UA/include/safemodecheck.txt b/_pages/uk_UA/include/safemodecheck.txt index 43ebec6575..7035baace8 100644 --- a/_pages/uk_UA/include/safemodecheck.txt +++ b/_pages/uk_UA/include/safemodecheck.txt @@ -1,3 +1,5 @@ +In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page. + 1. Power on your device 1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time + The camera applet should appear diff --git a/_pages/uk_UA/include/seedminer-base.txt b/_pages/uk_UA/include/seedminer-base.txt index e3493c2f87..ad6697a5fa 100644 --- a/_pages/uk_UA/include/seedminer-base.txt +++ b/_pages/uk_UA/include/seedminer-base.txt @@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. +{% capture console_state_info %} Before following this section: + Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data + Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen) -{: .notice--info} +{% endcapture %} +
{{ console_state_info | markdownify }}
1. Power off your device 1. Insert your SD card into your computer diff --git a/_pages/uk_UA/installing-boot9strap-(fredtool).txt b/_pages/uk_UA/installing-boot9strap-(fredtool).txt index ea9d81c010..455c3317a3 100644 --- a/_pages/uk_UA/installing-boot9strap-(fredtool).txt +++ b/_pages/uk_UA/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ### What You Need * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) #### Section I - CFW Check @@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana #### Section III - Prep Work -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Insert your SD card into your computer -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert your SD card into your device -1. Power on your device - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.txt %} #### Section IV - Overwriting DS Connection Settings -In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. - -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Haxxxxxxxxx!" title - + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Select "Copy", then select "OK" -1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) -1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio - + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.txt %} #### Section V - Flipnote Exploit @@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte #### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. - -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Nintendo DSi™" title -1. Select "Copy", then select "OK" +{% include_relative include/fredtool-restore-dsconn.txt %} ___ + ### Continue to [Finalizing Setup](finalizing-setup) {: .notice--primary} diff --git a/_pages/uk_UA/installing-boot9strap-(fredtool-legacy).txt b/_pages/uk_UA/installing-boot9strap-(fredtool-legacy).txt new file mode 100644 index 0000000000..1513694ebd --- /dev/null +++ b/_pages/uk_UA/installing-boot9strap-(fredtool-legacy).txt @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title="Table of Contents" %} + +{% capture technical_info %} +Technical Details (optional) + +To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +### What You Need + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) + +#### Section I - CFW Check + +{% include_relative include/cfw-check-fredtool.txt %} + +#### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically reboot +1. Power off your device + +#### Section III - Prep Work + +{% include_relative include/fredtool-prep.txt %} + +#### Section IV - Overwriting DS Connection Settings + +{% include_relative include/fredtool-write-flipnote.txt %} + +#### Section V - Flipnote Exploit + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### Section VI - Luma3DS Configuration + +1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### Section VII - Restoring DS Connection Settings + +{% include_relative include/fredtool-restore-dsconn.txt %} + +___ + + +### Continue to [Finalizing Setup](finalizing-setup) +{: .notice--primary} diff --git a/_pages/uk_UA/seedminer-(mii).txt b/_pages/uk_UA/seedminer-(mii).txt new file mode 100644 index 0000000000..5faf224c22 --- /dev/null +++ b/_pages/uk_UA/seedminer-(mii).txt @@ -0,0 +1,84 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title="Table of Contents" %} + +{% capture gpu_warning %} +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: ++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) ++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple) ++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) ++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{% endcapture %} +
{{ gpu_warning | markdownify }}
+ +{% capture technical_info %} +Technical Details (optional) + +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### What you need + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### Section I - Prep Work + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/uk_UA/site-navigation.txt b/_pages/uk_UA/site-navigation.txt index a2135747ab..179a8a4b0b 100644 --- a/_pages/uk_UA/site-navigation.txt +++ b/_pages/uk_UA/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [A9LH to B9S](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) + [Credits](credits) + [Checking for CFW](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [Home](/) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) + [Installing boot9strap (Hardmod)](installing-boot9strap-(hardmod)) + [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [Region Changing](region-changing) + [Restoring / Updating CFW](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (TWN)](seedminer-(twn)) + [Troubleshooting](troubleshooting) + [Uninstall CFW](uninstall-cfw) diff --git a/_pages/uk_UA/updating-firmware-(kor).txt b/_pages/uk_UA/updating-firmware-(kor).txt new file mode 100644 index 0000000000..4b08786c27 --- /dev/null +++ b/_pages/uk_UA/updating-firmware-(kor).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (KOR)" +--- + +### Required Reading + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer](seedminer) +{: .notice--primary} diff --git a/_pages/uk_UA/updating-firmware-(kor-twn).md b/_pages/uk_UA/updating-firmware-(kor-twn).md deleted file mode 100644 index 74a2b48f90..0000000000 --- a/_pages/uk_UA/updating-firmware-(kor-twn).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (KOR/TWN)" ---- - -### Required Reading - -To use the Seedminer exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Seedminer](seedminer) -{: .notice--primary} diff --git a/_pages/uk_UA/updating-firmware-(new-3ds).md b/_pages/uk_UA/updating-firmware-(new-3ds).md deleted file mode 100644 index 5366fdd3b9..0000000000 --- a/_pages/uk_UA/updating-firmware-(new-3ds).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (New 3DS)" ---- - -### Required Reading - -To use the super-skaterhax exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) -{: .notice--primary} diff --git a/_pages/hu_HU/updating-firmware-(new-3ds).md b/_pages/uk_UA/updating-firmware-(new-3ds).txt similarity index 100% rename from _pages/hu_HU/updating-firmware-(new-3ds).md rename to _pages/uk_UA/updating-firmware-(new-3ds).txt diff --git a/_pages/uk_UA/updating-firmware-(twn).txt b/_pages/uk_UA/updating-firmware-(twn).txt new file mode 100644 index 0000000000..83e6992b1b --- /dev/null +++ b/_pages/uk_UA/updating-firmware-(twn).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (TWN)" +--- + +### Required Reading + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer (TWN)](seedminer-(twn)) +{: .notice--primary} diff --git a/_pages/vi_VN/404.md b/_pages/vi_VN/404.txt similarity index 100% rename from _pages/vi_VN/404.md rename to _pages/vi_VN/404.txt diff --git a/_pages/vi_VN/bannerbomb3-(legacy).txt b/_pages/vi_VN/bannerbomb3-(legacy).txt new file mode 100644 index 0000000000..503794c42a --- /dev/null +++ b/_pages/vi_VN/bannerbomb3-(legacy).txt @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title="Table of Contents" %} + +{% capture technical_info %} +Technical Details (optional) + +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### Compatibility Notes + +These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version. + +### What You Need + +* Your `movable.sed` file from completing Seedminer or nimhax + +#### Section I - Prep Work + +{% include_relative include/bb3-prep.txt %} + +#### Section II - Hardware Button Check + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### Next steps: Choose an exploit + +If the camera appeared in the previous section, Safe Mode is likely to be working on your device. + +If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/vi_VN/bannerbomb3.txt b/_pages/vi_VN/bannerbomb3.txt index 7767c4aeb1..a8383926fd 100644 --- a/_pages/vi_VN/bannerbomb3.txt +++ b/_pages/vi_VN/bannerbomb3.txt @@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol #### Section I - Prep Work -In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. - -1. Power off your device -1. Insert your SD card into your computer -1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer -1. Upload your movable.sed using the “Choose File” option -1. Click “Build and Download” - + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) -1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it - + This file does not need to be opened or extracted - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.txt %} #### Section II - Hardware Button Check -In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. - -Your SD card should remain in your computer while you perform this check. - {% include_relative include/safemodecheck.txt %} ___ diff --git a/_pages/zh_TW/credits.md b/_pages/vi_VN/credits.txt similarity index 98% rename from _pages/zh_TW/credits.md rename to _pages/vi_VN/credits.txt index 8e1481de4f..c30986407b 100644 --- a/_pages/zh_TW/credits.md +++ b/_pages/vi_VN/credits.txt @@ -1,5 +1,5 @@ --- -title: "製作群" +title: "Credits" --- **Special thanks to Plailect, the original creator and maintainer of the guide!** diff --git a/_pages/vi_VN/donations.md b/_pages/vi_VN/donations.txt similarity index 100% rename from _pages/vi_VN/donations.md rename to _pages/vi_VN/donations.txt diff --git a/_pages/vi_VN/finalizing-setup.txt b/_pages/vi_VN/finalizing-setup.txt index f16b13698a..e41bd44dcd 100644 --- a/_pages/vi_VN/finalizing-setup.txt +++ b/_pages/vi_VN/finalizing-setup.txt @@ -177,9 +177,6 @@ ___ You're done! Custom firmware is now fully configured on your device. {: .notice--success} -Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! -{: .notice--info} - ### Information and Notes {% capture notice-6 %} diff --git a/_pages/vi_VN/homebrew-launcher-(super-skaterhax).txt b/_pages/vi_VN/homebrew-launcher-(super-skaterhax).txt index ea288c3163..7b83fe0d7e 100644 --- a/_pages/vi_VN/homebrew-launcher-(super-skaterhax).txt +++ b/_pages/vi_VN/homebrew-launcher-(super-skaterhax).txt @@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up 1. Select the "GO GO!" button on the top screen + If any prompts appear, approve all of them + If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section + + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) 1. If the exploit was successful, your device will have booted into the Homebrew Launcher 1. Power off your device diff --git a/_pages/vi_VN/include/bb3-prep.txt b/_pages/vi_VN/include/bb3-prep.txt new file mode 100644 index 0000000000..0b0965f3de --- /dev/null +++ b/_pages/vi_VN/include/bb3-prep.txt @@ -0,0 +1,23 @@ +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + +1. Power off your device +1. Insert your SD card into your computer +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. Create a folder named `Nintendo DSiWare` inside of the `` + + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/vi_VN/include/fredtool-prep.txt b/_pages/vi_VN/include/fredtool-prep.txt new file mode 100644 index 0000000000..cff8aa806d --- /dev/null +++ b/_pages/vi_VN/include/fredtool-prep.txt @@ -0,0 +1,29 @@ +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. + +1. Insert your SD card into your computer +1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer +1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. Click "Build" + + Wait a few seconds for the build process to complete +1. In the Build History section on the left, type the Username into the "Filter Builds" field +1. Click on the first search result + + This result should have the latest timestamp +1. Click the "output_(name).zip" link +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card + + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it +1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card +1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card +1. Reinsert your SD card into your device +1. Power on your device + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/vi_VN/include/fredtool-restore-dsconn.txt b/_pages/vi_VN/include/fredtool-restore-dsconn.txt new file mode 100644 index 0000000000..3057b3ac9d --- /dev/null +++ b/_pages/vi_VN/include/fredtool-restore-dsconn.txt @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title +1. Select "Copy", then select "OK" diff --git a/_pages/vi_VN/include/fredtool-write-flipnote.txt b/_pages/vi_VN/include/fredtool-write-flipnote.txt new file mode 100644 index 0000000000..cb6f428624 --- /dev/null +++ b/_pages/vi_VN/include/fredtool-write-flipnote.txt @@ -0,0 +1,11 @@ +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Select "Copy", then select "OK" +1. Return to main menu of the System Settings +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/vi_VN/include/safemodecheck.txt b/_pages/vi_VN/include/safemodecheck.txt index 43ebec6575..7035baace8 100644 --- a/_pages/vi_VN/include/safemodecheck.txt +++ b/_pages/vi_VN/include/safemodecheck.txt @@ -1,3 +1,5 @@ +In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page. + 1. Power on your device 1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time + The camera applet should appear diff --git a/_pages/vi_VN/include/seedminer-base.txt b/_pages/vi_VN/include/seedminer-base.txt index e3493c2f87..ad6697a5fa 100644 --- a/_pages/vi_VN/include/seedminer-base.txt +++ b/_pages/vi_VN/include/seedminer-base.txt @@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. +{% capture console_state_info %} Before following this section: + Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data + Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen) -{: .notice--info} +{% endcapture %} +
{{ console_state_info | markdownify }}
1. Power off your device 1. Insert your SD card into your computer diff --git a/_pages/vi_VN/installing-boot9strap-(fredtool).txt b/_pages/vi_VN/installing-boot9strap-(fredtool).txt index ea9d81c010..455c3317a3 100644 --- a/_pages/vi_VN/installing-boot9strap-(fredtool).txt +++ b/_pages/vi_VN/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ### What You Need * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) #### Section I - CFW Check @@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana #### Section III - Prep Work -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. Insert your SD card into your computer -1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. Click "Build" - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card - + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Reinsert your SD card into your device -1. Power on your device - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.txt %} #### Section IV - Overwriting DS Connection Settings -In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. - -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Haxxxxxxxxx!" title - + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. Select "Copy", then select "OK" -1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) -1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio - + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.txt %} #### Section V - Flipnote Exploit @@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte #### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. - -1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card -1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one -1. Reinsert your SD card into your device -1. Power on your device -1. Launch System Settings on your device -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Nintendo DSi™" title -1. Select "Copy", then select "OK" +{% include_relative include/fredtool-restore-dsconn.txt %} ___ + ### Continue to [Finalizing Setup](finalizing-setup) {: .notice--primary} diff --git a/_pages/vi_VN/installing-boot9strap-(fredtool-legacy).txt b/_pages/vi_VN/installing-boot9strap-(fredtool-legacy).txt new file mode 100644 index 0000000000..1513694ebd --- /dev/null +++ b/_pages/vi_VN/installing-boot9strap-(fredtool-legacy).txt @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title="Table of Contents" %} + +{% capture technical_info %} +Technical Details (optional) + +To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root. + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +### What You Need + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) + +#### Section I - CFW Check + +{% include_relative include/cfw-check-fredtool.txt %} + +#### Section II - BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. Reinsert your SD card into your device +1. Power on your device +1. Launch System Settings on your device +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically reboot +1. Power off your device + +#### Section III - Prep Work + +{% include_relative include/fredtool-prep.txt %} + +#### Section IV - Overwriting DS Connection Settings + +{% include_relative include/fredtool-write-flipnote.txt %} + +#### Section V - Flipnote Exploit + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### Section VI - Luma3DS Configuration + +1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### Section VII - Restoring DS Connection Settings + +{% include_relative include/fredtool-restore-dsconn.txt %} + +___ + + +### Continue to [Finalizing Setup](finalizing-setup) +{: .notice--primary} diff --git a/_pages/vi_VN/seedminer-(mii).txt b/_pages/vi_VN/seedminer-(mii).txt new file mode 100644 index 0000000000..5faf224c22 --- /dev/null +++ b/_pages/vi_VN/seedminer-(mii).txt @@ -0,0 +1,84 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title="Table of Contents" %} + +{% capture gpu_warning %} +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: ++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) ++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple) ++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) ++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{% endcapture %} +
{{ gpu_warning | markdownify }}
+ +{% capture technical_info %} +Technical Details (optional) + +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### What you need + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### Section I - Prep Work + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/vi_VN/site-navigation.txt b/_pages/vi_VN/site-navigation.txt index a2135747ab..179a8a4b0b 100644 --- a/_pages/vi_VN/site-navigation.txt +++ b/_pages/vi_VN/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [A9LH to B9S](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn)) + [Credits](credits) + [Checking for CFW](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [Home](/) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) + [Installing boot9strap (Hardmod)](installing-boot9strap-(hardmod)) + [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [Region Changing](region-changing) + [Restoring / Updating CFW](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (TWN)](seedminer-(twn)) + [Troubleshooting](troubleshooting) + [Uninstall CFW](uninstall-cfw) diff --git a/_pages/vi_VN/updating-firmware-(kor).txt b/_pages/vi_VN/updating-firmware-(kor).txt new file mode 100644 index 0000000000..4b08786c27 --- /dev/null +++ b/_pages/vi_VN/updating-firmware-(kor).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (KOR)" +--- + +### Required Reading + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer](seedminer) +{: .notice--primary} diff --git a/_pages/vi_VN/updating-firmware-(kor-twn).md b/_pages/vi_VN/updating-firmware-(kor-twn).md deleted file mode 100644 index 74a2b48f90..0000000000 --- a/_pages/vi_VN/updating-firmware-(kor-twn).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (KOR/TWN)" ---- - -### Required Reading - -To use the Seedminer exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Seedminer](seedminer) -{: .notice--primary} diff --git a/_pages/vi_VN/updating-firmware-(new-3ds).md b/_pages/vi_VN/updating-firmware-(new-3ds).md deleted file mode 100644 index 5366fdd3b9..0000000000 --- a/_pages/vi_VN/updating-firmware-(new-3ds).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (New 3DS)" ---- - -### Required Reading - -To use the super-skaterhax exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) -{: .notice--primary} diff --git a/_pages/id_ID/updating-firmware-(new-3ds).md b/_pages/vi_VN/updating-firmware-(new-3ds).txt similarity index 100% rename from _pages/id_ID/updating-firmware-(new-3ds).md rename to _pages/vi_VN/updating-firmware-(new-3ds).txt diff --git a/_pages/vi_VN/updating-firmware-(twn).txt b/_pages/vi_VN/updating-firmware-(twn).txt new file mode 100644 index 0000000000..83e6992b1b --- /dev/null +++ b/_pages/vi_VN/updating-firmware-(twn).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (TWN)" +--- + +### Required Reading + +To use the Seedminer exploit, you must update your device to the latest system version. + +### What you need + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer (TWN)](seedminer-(twn)) +{: .notice--primary} diff --git a/_pages/zh_CN/404.md b/_pages/zh_CN/404.txt similarity index 100% rename from _pages/zh_CN/404.md rename to _pages/zh_CN/404.txt diff --git a/_pages/zh_CN/bannerbomb3-(legacy).txt b/_pages/zh_CN/bannerbomb3-(legacy).txt new file mode 100644 index 0000000000..3ae733f460 --- /dev/null +++ b/_pages/zh_CN/bannerbomb3-(legacy).txt @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title="目录内容" %} + +{% capture technical_info %} +技术细节(选看) + +我们使用了 3DS 系统设置中的 DSiWare 数据管理中的一个漏洞来启动自制代码。 + +为达到此目的,我们将使用你主机系统中的加密密钥(movable.sed)来构建一个带有漏洞的 DSiWare 备份。 + +若想知道更多技术细节,请见[这里](https://github.com/zoogie/Bannerbomb3)。 +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### 兼容性注意 + +这些操作可在美、欧、日、韩版的主机上工作,你可通过系统版本号末尾的 U,E,J,K 字符来区分主机版本。 + +### 你需要准备点啥? + +* Your `movable.sed` file from completing Seedminer or nimhax + +#### 第一步 – 准备工作 + +{% include_relative include/bb3-prep.txt %} + +#### 第二步 – 按键检查 + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### 下一步:选择漏洞 + +If the camera appeared in the previous section, Safe Mode is likely to be working on your device. + +If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/zh_CN/bannerbomb3.txt b/_pages/zh_CN/bannerbomb3.txt index 952eec704a..9d587ae700 100644 --- a/_pages/zh_CN/bannerbomb3.txt +++ b/_pages/zh_CN/bannerbomb3.txt @@ -30,36 +30,10 @@ title: "BannerBomb3" #### 第一步 – 准备工作 -本节中,你需要把触发 BannerBomb3 漏洞所需的文件复制到主机的 SD 卡上。 - -1. 将主机关机 -1. 将你的 SD 卡插入到电脑 -1. 在你的电脑上打开 [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) -1. 点击 “选择文件” 选项,然后选择你的 movable.sed 上传 -1. 点击 “Build and Download” - + 这将下载一个包含名为 `F00D43D5.bin` 的 DSiWare 漏洞文件和一个名为 `bb3.bin` 的 zip 文件(`DSIWARE_EXPLOIT.zip`)到你的电脑上 -1. 从 `DSIWARE_EXPLOIT.zip` 中,将 `bb3.bin` 解压到你的 SD 卡根目录 - + 根目录指的是你点进 SD 卡看到的目录,你可以在这个目录下看到 Nintendo 3DS 文件夹,但请不要点进去 - + This file does not need to be opened or extracted - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. 打开内存卡的 `Nintendo 3DS` -> `` -> `` 文件夹 - + `` 是你在 [Seedminer](seedminer) 部分中复制的 32 位字母长的文件夹名称 - + `` 是一个在 `` 文件夹内,另一个 32 位字母长的文件夹 - + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. 在 `` 文件夹内创建一个名为 `Nintendo DSiWare` 的文件夹 - + 如果这个位置已经存在了这个文件夹,**且**有一些名为 `<8位ID>.bin` 文件(DSiWare 备份文件)在里面,请将它们备份到电脑上,然后从 SD 卡中移除这些文件 -1. 从 `DSIWARE_EXPLOIT.zip` 压缩文件中解压 `F00D43D5.bin` 到 `Nintendo DSiWare` 文件夹下 - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.txt %} #### 第二步 – 按键检查 -In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. - -Your SD card should remain in your computer while you perform this check. - {% include_relative include/safemodecheck.txt %} ___ diff --git a/_pages/es_ES/credits.md b/_pages/zh_CN/credits.txt similarity index 98% rename from _pages/es_ES/credits.md rename to _pages/zh_CN/credits.txt index fb4c429120..c30986407b 100644 --- a/_pages/es_ES/credits.md +++ b/_pages/zh_CN/credits.txt @@ -1,5 +1,5 @@ --- -title: "Créditos" +title: "Credits" --- **Special thanks to Plailect, the original creator and maintainer of the guide!** diff --git a/_pages/zh_CN/donations.md b/_pages/zh_CN/donations.txt similarity index 100% rename from _pages/zh_CN/donations.md rename to _pages/zh_CN/donations.txt diff --git a/_pages/zh_CN/finalizing-setup.txt b/_pages/zh_CN/finalizing-setup.txt index 938cca4147..ff79781c8e 100644 --- a/_pages/zh_CN/finalizing-setup.txt +++ b/_pages/zh_CN/finalizing-setup.txt @@ -152,7 +152,7 @@ If you do NOT boot into the Luma3DS configuration menu, custom firmware was not + 此过程将花费一些时间 + If you get an error, look for your issue in the [troubleshooting guide](troubleshooting#finalizing-setup) 1. 按 “A” 键继续 -1. 按下 “B” 键返回到主菜单 +1. 按 “B” 键返回到主菜单 1. 选择 “Exit” 1. 如果提示重新锁定写入权限,按下 “A” 键来确认 1. 进入到 `[S:] SYSNAND VIRTUAL` @@ -162,14 +162,14 @@ If you do NOT boot into the Luma3DS configuration menu, custom firmware was not 1. 按 “A” 键继续 1. 按下 “Home” 键来打开功能菜单 1. 选择 “Poweroff system” 来将主机关机 -1. 将你的 SD 卡插入到电脑 +1. 将你的 SD 卡插入电脑 1. Copy `__sysnand_##.bin`, `__sysnand_##.bin.sha`, and `essential.exefs` from the `/gm9/out/` folder on your SD card to a safe location on your computer + 将这些文件在不同地方备份多次(比如网盘或者移动硬盘等) + 如果以后机器出现任何问题,这些备份文件将是为你提供修复砖机或从 NAND 镜像恢复文件的帮手 1. Delete `__sysnand_##.bin` and `__sysnand_##.bin.sha` from the `/gm9/out/` folder on your SD card after copying it + 其它的文件占用不了多少空间,更建议保留在 SD 卡上以便将来可能的需要 1. 如果 SD 卡上有 `/luma/backups/` 文件夹,那么请将里面的文件备份到你电脑上安全的地方 -1. 将 SD 卡重新插入你的主机 +1. 将 SD 卡重新插入主机 1. 启动你的主机 ___ @@ -177,9 +177,6 @@ ___ 搞定! 你的主机现在已经配置好自制固件了。 {: .notice--success} -你好呀!~ 我们正在探索提升整体手册体验的方法。 如果你愿意帮助我们,请在[这里](https://forms.gle/vZNoc4QLCz5MEXCK7)填写一份问卷调查(仅限使用英文)。 谢谢! -{: .notice--info} - ### 信息与注意事项 {% capture notice-6 %} diff --git a/_pages/zh_CN/homebrew-launcher-(super-skaterhax).txt b/_pages/zh_CN/homebrew-launcher-(super-skaterhax).txt index ed58496844..2f84e38c8c 100644 --- a/_pages/zh_CN/homebrew-launcher-(super-skaterhax).txt +++ b/_pages/zh_CN/homebrew-launcher-(super-skaterhax).txt @@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up 1. Select the "GO GO!" button on the top screen + If any prompts appear, approve all of them + If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section + + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) 1. If the exploit was successful, your device will have booted into the Homebrew Launcher 1. 将主机关机 diff --git a/_pages/zh_CN/include/bb3-prep.txt b/_pages/zh_CN/include/bb3-prep.txt new file mode 100644 index 0000000000..7b6b358d99 --- /dev/null +++ b/_pages/zh_CN/include/bb3-prep.txt @@ -0,0 +1,23 @@ +本节中,你需要把触发 BannerBomb3 漏洞所需的文件复制到主机的 SD 卡上。 + +1. 将主机关机 +1. 将你的 SD 卡插入到电脑 +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. 点击 “选择文件” 选项,然后选择你的 movable.sed 上传 +1. 点击 “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + 根目录指的是你点进 SD 卡看到的目录,你可以在这个目录下看到 Nintendo 3DS 文件夹,但请不要点进去 + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. 打开内存卡的 `Nintendo 3DS` -> `` -> `` 文件夹 + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. 在 `` 文件夹内创建一个名为 `Nintendo DSiWare` 的文件夹 + + 如果这个位置已经存在了这个文件夹,**且**有一些名为 `<8位ID>.bin` 文件(DSiWare 备份文件)在里面,请将它们备份到电脑上,然后从 SD 卡中移除这些文件 +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/zh_CN/include/fredtool-prep.txt b/_pages/zh_CN/include/fredtool-prep.txt new file mode 100644 index 0000000000..3bd3671eaa --- /dev/null +++ b/_pages/zh_CN/include/fredtool-prep.txt @@ -0,0 +1,29 @@ +本节中,你将会临时将 DS 连接设置(DS Connection Settings)程序临时替换为 Flipnote Studio,用来启动 boot9strap(自制固件)安装器。 + +1. 将你的 SD 卡插入到电脑 +1. 在电脑上打开 [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) 站点 +1. 于“Username”一行,填入一个你的英文名(不带空格或特殊字符) +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. 于“MovableSed”一行,点击“Browse...”(选择文件)上传你的 `movable.sed` 文件 +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. 点击 “Build” + + 等待片刻,直到构建完成 +1. 将你的名字输入左边的 Build History 菜单中的 Filter Builds 一栏 +1. 点击第一个搜索结果 + + 它应该是所有显示的结果中时间最新的那一个 +1. 点击 "output_(<你的名字>).zip" 的链接 +1. 打开内存卡的 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 文件夹 + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. 解压 Luma3DS `.zip` 里的 `boot.firm` 和 `boot.3dsx` 到你 SD 卡的根目录 + + 根目录指的是你点进 SD 卡看到的目录,你可以在这个目录下看到 Nintendo 3DS 文件夹,但请不要点进去 +1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card +1. 从 Frogminer_save `.zip` 压缩包中复制 `private` 文件夹到内存卡的根目录 +1. 将 SD 卡重新插入你的主机 +1. 启动你的主机 + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/zh_CN/include/fredtool-restore-dsconn.txt b/_pages/zh_CN/include/fredtool-restore-dsconn.txt new file mode 100644 index 0000000000..f6ca7e716a --- /dev/null +++ b/_pages/zh_CN/include/fredtool-restore-dsconn.txt @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. 打开内存卡的 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 文件夹 +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. 将 SD 卡重新插入你的主机 +1. 启动你的主机 +1. 启动你主机上的 “系统设置(System settings)” +1. 依次点击 `数据管理(データ管理/Data Management)` -> `DSiWare 数据管理(DSiWareデータ管理/DSiWare)` -> `SD卡(micro SDカード/SDカード/SD/microSD)`([例图](/images/screenshots/bb3/dsiware-management.png)) +1. 选择 “Nintendo DSi™” +1. 选择 “Copy” ,然后选择 “OK” diff --git a/_pages/zh_CN/include/fredtool-write-flipnote.txt b/_pages/zh_CN/include/fredtool-write-flipnote.txt new file mode 100644 index 0000000000..3153c89e9a --- /dev/null +++ b/_pages/zh_CN/include/fredtool-write-flipnote.txt @@ -0,0 +1,11 @@ +本节中,你将把被修改过的 DS 连接设置应用程序复制进内部存储,这将临时替换其为 Flipnote Studio。 + +1. 启动你主机上的 “系统设置(System settings)” +1. 依次点击 `数据管理(データ管理/Data Management)` -> `DSiWare 数据管理(DSiWareデータ管理/DSiWare)` -> `SD卡(micro SDカード/SDカード/SD/microSD)`([例图](/images/screenshots/bb3/dsiware-management.png)) +1. 选择 “Haxxxxxxxxx!” + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. 选择 “Copy” ,然后选择 “OK” +1. 返回系统设置的主菜单 +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. 如果漏洞执行成功,你的主机将进入到日版的“うごくメモ帳 (Flipnote Studio)” + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/zh_CN/include/safemodecheck.txt b/_pages/zh_CN/include/safemodecheck.txt index 2a4e12ca31..617daea724 100644 --- a/_pages/zh_CN/include/safemodecheck.txt +++ b/_pages/zh_CN/include/safemodecheck.txt @@ -1,3 +1,5 @@ +In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page. + 1. 启动你的主机 1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time + The camera applet should appear diff --git a/_pages/zh_CN/include/seedminer-base.txt b/_pages/zh_CN/include/seedminer-base.txt index a40d92c4d7..dab04633c2 100644 --- a/_pages/zh_CN/include/seedminer-base.txt +++ b/_pages/zh_CN/include/seedminer-base.txt @@ -15,10 +15,12 @@ 本节中,为了得到加密密钥,你将需要从你的 3DS 中获取必要的信息。 +{% capture console_state_info %} Before following this section: + Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data + Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen) -{: .notice--info} +{% endcapture %} +
{{ console_state_info | markdownify }}
1. 将主机关机 1. 将你的 SD 卡插入到电脑 diff --git a/_pages/zh_CN/installing-boot9strap-(fredtool).txt b/_pages/zh_CN/installing-boot9strap-(fredtool).txt index 2e324e885a..ba9e83d475 100644 --- a/_pages/zh_CN/installing-boot9strap-(fredtool).txt +++ b/_pages/zh_CN/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ title: "安装 boot9strap(通过 Fredtool)"
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ### 你需要准备点啥? * 你在 [Seedminer](seedminer) 步骤中获得的 `movable.sed` 文件 * 最新版本的 [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest)(下载 `Frogminer_save.zip`) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * 最新版本的 [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest)(下载 Luma3DS `.zip` 文件) #### 第一步 – 检查自制固件 @@ -42,49 +45,11 @@ title: "安装 boot9strap(通过 Fredtool)" #### 第三步 – 准备工作 -本节中,你将会临时将 DS 连接设置(DS Connection Settings)程序临时替换为 Flipnote Studio,用来启动 boot9strap(自制固件)安装器。 - -1. 将你的 SD 卡插入到电脑 -1. 在电脑上打开 [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) 站点 -1. 于“Username”一行,填入一个你的英文名(不带空格或特殊字符) -1. 于 “DSiBin” 一行,点击“Browse...”(选择文件)来上传根目录中的 `42383841.bin` 文件 -1. 于“MovableSed”一行,点击“Browse...”(选择文件)上传你的 `movable.sed` 文件 -1. 于“InjectionTarget”一行,设置注入对象为 `DSinternet`(**不是带有** memorypit 字串的那个) -1. 点击 “Build” - + 等待片刻,直到构建完成 -1. 将你的名字输入左边的 Build History 菜单中的 Filter Builds 一栏 -1. 点击第一个搜索结果 - + 它应该是所有显示的结果中时间最新的那一个 -1. 点击 "output_(<你的名字>).zip" 的链接 -1. 打开内存卡的 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 文件夹 - + `` 是你在 [Seedminer](seedminer) 部分中复制的 32 位字母长的文件夹名称 - + `` 是一个在 `` 文件夹内,另一个 32 位字母长的文件夹 -1. 删除 Nintendo DSiWare 文件夹中的 `F00D43D5.bin` 文件 -1. 从下载的 DSiWare 压缩包 (`output_(<你的名字>).zip`) 里的 `hax` 文件夹复制 `42383841.bin` 到 `Nintendo DSiWare` 文件夹 - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. 解压 Luma3DS `.zip` 里的 `boot.firm` 和 `boot.3dsx` 到你 SD 卡的根目录 - + 根目录指的是你点进 SD 卡看到的目录,你可以在这个目录下看到 Nintendo 3DS 文件夹,但请不要点进去 -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. 从 Frogminer_save `.zip` 压缩包中复制 `private` 文件夹到内存卡的根目录 -1. 将 SD 卡重新插入你的主机 -1. 启动你的主机 - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.txt %} #### 第四步 – 覆盖 “DS 连接设置(DS Connection Settings)” -本节中,你将把被修改过的 DS 连接设置应用程序复制进内部存储,这将临时替换其为 Flipnote Studio。 - -1. 启动你主机上的 “系统设置(System settings)” -1. 依次点击 `数据管理(データ管理/Data Management)` -> `DSiWare 数据管理(DSiWareデータ管理/DSiWare)` -> `SD卡(micro SDカード/SDカード/SD/microSD)`([例图](/images/screenshots/bb3/dsiware-management.png)) -1. 选择 “Haxxxxxxxxx!” - + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. 选择 “Copy” ,然后选择 “OK” -1. 返回系统设置的主菜单 -1. 进入至 `网络设置(インターネツト設定/Internet Settings)` -> `DS 连接设置(DSソフト用設定/Nintendo DS Connections)`,然后点击 “OK”([例图](/images/screenshots/fredtool/dsconnection.png)) -1. 如果漏洞执行成功,你的主机将进入到日版的“うごくメモ帳 (Flipnote Studio)” - + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.txt %} #### 第五步 – 触发 Flipnote 漏洞 @@ -99,18 +64,10 @@ title: "安装 boot9strap(通过 Fredtool)" #### 第七步 – 还原 “DS 连接设置(DS Connection Settings)” -本节中,你将会把之前第四步中被替换为 Flipnote Studio 的 DS 连接设置程序还原回原来的状态。 - -1. 打开内存卡的 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 文件夹 -1. 下载的 DSiWare 压缩包 (`output_(<你的名字>).zip`) 里的 `clean` 文件夹复制 `42383841.bin` 到 `Nintendo DSiWare` 文件夹,替换已有文件 -1. 将 SD 卡重新插入你的主机 -1. 启动你的主机 -1. 启动你主机上的 “系统设置(System settings)” -1. 依次点击 `数据管理(データ管理/Data Management)` -> `DSiWare 数据管理(DSiWareデータ管理/DSiWare)` -> `SD卡(micro SDカード/SDカード/SD/microSD)`([例图](/images/screenshots/bb3/dsiware-management.png)) -1. 选择 “Nintendo DSi™” -1. 选择 “Copy” ,然后选择 “OK” +{% include_relative include/fredtool-restore-dsconn.txt %} ___ + ### 继续至[完成安装](finalizing-setup) {: .notice--primary} diff --git a/_pages/zh_CN/installing-boot9strap-(fredtool-legacy).txt b/_pages/zh_CN/installing-boot9strap-(fredtool-legacy).txt new file mode 100644 index 0000000000..bc45b58be2 --- /dev/null +++ b/_pages/zh_CN/installing-boot9strap-(fredtool-legacy).txt @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title="目录内容" %} + +{% capture technical_info %} +技术细节(选看) + +我们使用了一个在 3DS 系统设置应用程序的 DSiWare 数据管理窗口中的一个漏洞来导出系统的 DSiWare 软件。 + +为了做到它,我们将使用你主机的系统加密密钥(movable.sed)来构建一个可被利用的 DSiWare 系统备份,以便将 DSi 互联网设置应用程序导出到 SD 卡的根目录。 + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +本教程是使用 “FIRM partitions known-plaintext” 漏洞来进行破解的, 欲知相关资料请查阅[这里](https://www.3dbrew.org/wiki/3DS_System_Flaws)。 + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +### 你需要准备点啥? + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* 最新版本的 [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest)(下载 `Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* 最新版本的 [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest)(下载 Luma3DS `.zip` 文件) + +#### 第一步 – 检查自制固件 + +{% include_relative include/cfw-check-fredtool.txt %} + +#### 第二步 – BannerBomb3 + +本节中,你将会使用 DSiWare 数据管理菜单触发 BannerBomb3 漏洞,并利用它导出一个在下一个步骤中需要使用的文件。 + +1. 将 SD 卡重新插入你的主机 +1. 启动你的主机 +1. 启动你主机上的 “系统设置(System settings)” +1. 依次点击 `数据管理(データ管理/Data Management)` -> `DSiWare 数据管理(DSiWareデータ管理/DSiWare)` -> `SD卡(micro SDカード/SDカード/SD/microSD)`([例图](/images/screenshots/bb3/dsiware-management.png)) + + 你的主机将会打开 BB3 multihax 菜单 + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. 使用十字键移动至 “Dump DSiWare” ,然后按下 A 键 + + 主机将会自动重启 +1. 将主机关机 + +#### 第三步 – 准备工作 + +{% include_relative include/fredtool-prep.txt %} + +#### 第四步 – 覆盖 “DS 连接设置(DS Connection Settings)” + +{% include_relative include/fredtool-write-flipnote.txt %} + +#### 第五步 – 触发 Flipnote 漏洞 + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### 第四部分 — 配置 Luma3DS + +1. 按住 “SELECT” 键,然后按下电源键开机。 这将会启动 Luma3DS 配置菜单 +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### 第七步 – 还原 “DS 连接设置(DS Connection Settings)” + +{% include_relative include/fredtool-restore-dsconn.txt %} + +___ + + +### 继续至[完成安装](finalizing-setup) +{: .notice--primary} diff --git a/_pages/zh_CN/seedminer-(mii).txt b/_pages/zh_CN/seedminer-(mii).txt new file mode 100644 index 0000000000..e30dc03a7e --- /dev/null +++ b/_pages/zh_CN/seedminer-(mii).txt @@ -0,0 +1,84 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title="目录内容" %} + +{% capture gpu_warning %} +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: ++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) ++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple) ++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) ++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{% endcapture %} +
{{ gpu_warning | markdownify }}
+ +{% capture technical_info %} +技术细节(选看) + +为了在你的主机上安装 boot9strap,我们需要获得你主机上的唯一加密密钥。 为了做到这点,我们使用了一个叫 Seedminer 的工具来计算你主机的数据加密密钥(movable.sed)。 + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +如果想要了解 Seedminer 是怎么工作的,请参见此[介绍资料](https://zoogie.github.io/web/34⅕c3)。 + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### 你需要准备点啥? + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### Section I - Prep Work + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/zh_CN/site-navigation.txt b/_pages/zh_CN/site-navigation.txt index 30c5688724..e6f299e248 100644 --- a/_pages/zh_CN/site-navigation.txt +++ b/_pages/zh_CN/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [A9LH 升级 B9S](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool(仅港台版)](bannerbomb3-fredtool-(twn)) + [致谢](credits) + [检查自制固件](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [首页](/zh_CN/) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [安装 boot9strap(通过 Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) + [安装 boot9strap(通过拆机硬改)](installing-boot9strap-(hardmod)) + [安装 boot9strap(通过 HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [区域变更](region-changing) + [更新/恢复自制固件](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (TWN)](seedminer-(twn)) + [问题排查](troubleshooting) + [卸载自制系统](uninstall-cfw) diff --git a/_pages/zh_CN/updating-firmware-(kor).txt b/_pages/zh_CN/updating-firmware-(kor).txt new file mode 100644 index 0000000000..692d84f575 --- /dev/null +++ b/_pages/zh_CN/updating-firmware-(kor).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (KOR)" +--- + +### 重要事项 + +To use the Seedminer exploit, you must update your device to the latest system version. + +### 你需要准备点啥? + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer](seedminer) +{: .notice--primary} diff --git a/_pages/zh_CN/updating-firmware-(kor-twn).md b/_pages/zh_CN/updating-firmware-(kor-twn).md deleted file mode 100644 index 74a2b48f90..0000000000 --- a/_pages/zh_CN/updating-firmware-(kor-twn).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (KOR/TWN)" ---- - -### Required Reading - -To use the Seedminer exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Seedminer](seedminer) -{: .notice--primary} diff --git a/_pages/zh_CN/updating-firmware-(new-3ds).md b/_pages/zh_CN/updating-firmware-(new-3ds).md deleted file mode 100644 index 5366fdd3b9..0000000000 --- a/_pages/zh_CN/updating-firmware-(new-3ds).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (New 3DS)" ---- - -### Required Reading - -To use the super-skaterhax exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) -{: .notice--primary} diff --git a/_pages/zh_CN/updating-firmware-(new-3ds).txt b/_pages/zh_CN/updating-firmware-(new-3ds).txt new file mode 100644 index 0000000000..fca1fe5241 --- /dev/null +++ b/_pages/zh_CN/updating-firmware-(new-3ds).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (New 3DS)" +--- + +### 重要事项 + +To use the super-skaterhax exploit, you must update your device to the latest system version. + +### 你需要准备点啥? + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) +{: .notice--primary} diff --git a/_pages/zh_CN/updating-firmware-(twn).txt b/_pages/zh_CN/updating-firmware-(twn).txt new file mode 100644 index 0000000000..64ec56f76a --- /dev/null +++ b/_pages/zh_CN/updating-firmware-(twn).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (TWN)" +--- + +### 重要事项 + +To use the Seedminer exploit, you must update your device to the latest system version. + +### 你需要准备点啥? + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer (TWN)](seedminer-(twn)) +{: .notice--primary} diff --git a/_pages/zh_TW/404.md b/_pages/zh_TW/404.txt similarity index 100% rename from _pages/zh_TW/404.md rename to _pages/zh_TW/404.txt diff --git a/_pages/zh_TW/bannerbomb3-(legacy).txt b/_pages/zh_TW/bannerbomb3-(legacy).txt new file mode 100644 index 0000000000..3e0d43cff3 --- /dev/null +++ b/_pages/zh_TW/bannerbomb3-(legacy).txt @@ -0,0 +1,50 @@ +--- +title: "BannerBomb3 (Legacy)" +--- + +{% include toc title="條目內容" %} + +{% capture technical_info %} +Technical Details (optional) + +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
+{: .notice--info} + +### 相容性資訊 + +這些操作在美、歐、日、韓版可用,可透過系統版本號末尾的 「U、E、J、K」 字元來辨別。 + +### 必備項目 + +* Your `movable.sed` file from completing Seedminer or nimhax + +#### 第一節 — 準備工作 + +{% include_relative include/bb3-prep.txt %} + +#### 第二節 — 按鍵檢查 + +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. + +Your SD card should remain in your computer while you perform this check. + +{% include_relative include/safemodecheck.txt %} + +___ + +### Next steps: Choose an exploit + +If the camera appeared in the previous section, Safe Mode is likely to be working on your device. + +If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) +{: .notice--primary} + +If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) +{: .notice--info} diff --git a/_pages/zh_TW/bannerbomb3.txt b/_pages/zh_TW/bannerbomb3.txt index 20a0700b4e..34396a4c6b 100644 --- a/_pages/zh_TW/bannerbomb3.txt +++ b/_pages/zh_TW/bannerbomb3.txt @@ -30,36 +30,10 @@ For a more technical explanation, see [here](https://github.com/zoogie/Bannerbom #### 第一節 — 準備工作 -In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. - -1. 關閉您的主機 -1. 將 SD 卡插入至電腦中 -1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer -1. Upload your movable.sed using the “Choose File” option -1. Click “Build and Download” - + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) -1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card - + 「SD 卡的根目錄」指的是你的 SD 卡含有 Nintendo 3DS 資料夾的目錄,而非該資料夾內部 - + This file does not need to be opened or extracted - ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} -1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` - + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) - ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} -1. Create a folder named `Nintendo DSiWare` inside of the `` - + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card -1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder - -![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) -{: .notice--info} +{% include_relative include/bb3-prep.txt %} #### 第二節 — 按鍵檢查 -In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. - -Your SD card should remain in your computer while you perform this check. - {% include_relative include/safemodecheck.txt %} ___ diff --git a/_pages/zh_TW/credits.txt b/_pages/zh_TW/credits.txt new file mode 100644 index 0000000000..c30986407b --- /dev/null +++ b/_pages/zh_TW/credits.txt @@ -0,0 +1,88 @@ +--- +title: "Credits" +--- + +**Special thanks to Plailect, the original creator and maintainer of the guide!** +{: .notice--primary} + +**Special thanks to all of [#Cakey on Freenode](http://webchat.freenode.net/?channels=%23Cakey) for being awesome!** +{: .notice--primary} + +**Special thanks to all of [the translators](https://crowdin.com/project/3ds-guide) for being awesome!** +{: .notice--primary} + +If I forgot you here, contact me and I'll add your name. + +{% capture notice-1 %} + + + Al3x_10m + + aliaspider + + AngelSL + + ashinnblunts + + AuroraWright + + b1l1s + + BernardoGiordano + + Cartman123 + + Cell9 + + coder65535 + + Cruel + + d0k3 + + dank101 + + Dazzozo + + DeadPhoenix + + Delebile + + DinohScene + + dukesrg + + elementalcode + + elSeledonio + + erman1337 + + felipejfc + + figgyc + + fox8091 + + Frozen_Chen + + Gelex + + Hamcha + + icecream + + ihaveamac + + IngeniousDefault + + J-D-K + + Jisagi + + jkcgs + + kartik + + LordBass + + mid-kid + + MrNbaYoh + + Mrrraou + + Night_Fallen_Wolf + + Normmatt + + Plailect + + plutooo + + Psi-Hate + + RandallHoffman + + Raugo + + Reboot.ms + + s_99 + + SciresM + + Shadowtrance + + shinyquagsire23 + + skiptirengu + + smealum + + Steveice10 + + stuckpixel + + Syphurith + + Tech0verlord + + TiniVi + + TuxSH + + Urbanshadow + + Vappy + + vegaroxas + + Wolfvak + + WulfyStylez + + xy2_ + + yellows8 + + yifan_lu + + zoogie + +{% endcapture %} + +
{{ notice-1 | markdownify }}
diff --git a/_pages/zh_TW/donations.md b/_pages/zh_TW/donations.txt similarity index 100% rename from _pages/zh_TW/donations.md rename to _pages/zh_TW/donations.txt diff --git a/_pages/zh_TW/finalizing-setup.txt b/_pages/zh_TW/finalizing-setup.txt index 81284894ec..10ac1270e3 100644 --- a/_pages/zh_TW/finalizing-setup.txt +++ b/_pages/zh_TW/finalizing-setup.txt @@ -177,9 +177,6 @@ ___ 大功告成! 您的主機現在已完成安裝自製韌體以及其設定。 {: .notice--success} -Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks! -{: .notice--info} - ### Information and Notes {% capture notice-6 %} diff --git a/_pages/zh_TW/homebrew-launcher-(super-skaterhax).txt b/_pages/zh_TW/homebrew-launcher-(super-skaterhax).txt index de84ac51ff..fc697abcb9 100644 --- a/_pages/zh_TW/homebrew-launcher-(super-skaterhax).txt +++ b/_pages/zh_TW/homebrew-launcher-(super-skaterhax).txt @@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up 1. Select the "GO GO!" button on the top screen + If any prompts appear, approve all of them + If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section - + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section + + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section + If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax) 1. If the exploit was successful, your device will have booted into the Homebrew Launcher 1. 關閉您的主機 diff --git a/_pages/zh_TW/include/bb3-prep.txt b/_pages/zh_TW/include/bb3-prep.txt new file mode 100644 index 0000000000..582df86726 --- /dev/null +++ b/_pages/zh_TW/include/bb3-prep.txt @@ -0,0 +1,23 @@ +In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. + +1. 關閉您的主機 +1. 將 SD 卡插入至電腦中 +1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer +1. Upload your movable.sed using the “Choose File” option +1. Click “Build and Download” + + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) +1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + + 「SD 卡的根目錄」指的是你的 SD 卡含有 Nintendo 3DS 資料夾的目錄,而非該資料夾內部 + + This file does not need to be opened or extracted + ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info} +1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` + + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3) + ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} +1. Create a folder named `Nintendo DSiWare` inside of the `` + + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card +1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder + +![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) +{: .notice--info} diff --git a/_pages/zh_TW/include/fredtool-prep.txt b/_pages/zh_TW/include/fredtool-prep.txt new file mode 100644 index 0000000000..f24e297cca --- /dev/null +++ b/_pages/zh_TW/include/fredtool-prep.txt @@ -0,0 +1,29 @@ +In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. + +1. 將 SD 卡插入至電腦中 +1. 在電腦上開啟 [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) +1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) +1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option +1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option +1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) +1. 選擇『Build』 + + Wait a few seconds for the build process to complete +1. In the Build History section on the left, type the Username into the "Filter Builds" field +1. Click on the first search result + + This result should have the latest timestamp +1. Click the "output_(name).zip" link +1. 於您的 SD 卡中,移動至 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` + + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + + `` is a 32-letter folder inside of the `` +1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder +1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder + ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} +1. 解壓 Luma3DS `.zip` 內的 `boot.firm` 及 `boot.3dsx` 到 SD 卡的根目錄底下 + + 「SD 卡的根目錄」指的是你的 SD 卡含有 Nintendo 3DS 資料夾的目錄,而非該資料夾內部 +1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card +1. 解壓 Frogminer_save `.zip` 中的 `private` 資料夾到 SD 卡的根目錄底下 +1. 將 SD 卡插回主機中 +1. 啟動您的主機 + + ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) + {: .notice--info} \ No newline at end of file diff --git a/_pages/zh_TW/include/fredtool-restore-dsconn.txt b/_pages/zh_TW/include/fredtool-restore-dsconn.txt new file mode 100644 index 0000000000..2d9b7f1913 --- /dev/null +++ b/_pages/zh_TW/include/fredtool-restore-dsconn.txt @@ -0,0 +1,10 @@ +In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section. + +1. 於您的 SD 卡中,移動至 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` +1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one +1. 將 SD 卡插回主機中 +1. 啟動您的主機 +1. 於您主機上啟動系統設定 (System Settings) +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Nintendo DSi™" title +1. 選擇『複製 (Copy)』並選擇『OK』 diff --git a/_pages/zh_TW/include/fredtool-write-flipnote.txt b/_pages/zh_TW/include/fredtool-write-flipnote.txt new file mode 100644 index 0000000000..b0bf3fc971 --- /dev/null +++ b/_pages/zh_TW/include/fredtool-write-flipnote.txt @@ -0,0 +1,11 @@ +In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. + +1. 於您主機上啟動系統設定 (System Settings) +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) +1. Select the "Haxxxxxxxxx!" title + + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. 選擇『複製 (Copy)』並選擇『OK』 +1. 回到系統設定主選單 +1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) +1. 如果漏洞成功執行,您的主機將自動啟動『うごくメモ帳 (Flipnote Studio)』 + + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) \ No newline at end of file diff --git a/_pages/zh_TW/include/safemodecheck.txt b/_pages/zh_TW/include/safemodecheck.txt index b1ab4f2e9f..1937eee445 100644 --- a/_pages/zh_TW/include/safemodecheck.txt +++ b/_pages/zh_TW/include/safemodecheck.txt @@ -1,3 +1,5 @@ +In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page. + 1. 啟動您的主機 1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time + The camera applet should appear diff --git a/_pages/zh_TW/include/seedminer-base.txt b/_pages/zh_TW/include/seedminer-base.txt index d6b6f9108d..15cb997801 100644 --- a/_pages/zh_TW/include/seedminer-base.txt +++ b/_pages/zh_TW/include/seedminer-base.txt @@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key. +{% capture console_state_info %} Before following this section: + Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data + Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen) -{: .notice--info} +{% endcapture %} +
{{ console_state_info | markdownify }}
1. 關閉您的主機 1. 將 SD 卡插入至電腦中 diff --git a/_pages/zh_TW/installing-boot9strap-(fredtool).txt b/_pages/zh_TW/installing-boot9strap-(fredtool).txt index 18ad03c08b..c4374cd67e 100644 --- a/_pages/zh_TW/installing-boot9strap-(fredtool).txt +++ b/_pages/zh_TW/installing-boot9strap-(fredtool).txt @@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info} +You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + ### 必備項目 * 您自 [Seedminer](seedminer) 步驟中所取得的 `movable.sed` 檔案 * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) -* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) +* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) #### 第一節 — 檢查自製韌體 @@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana #### 第三節 — 準備工作 -In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. - -1. 將 SD 卡插入至電腦中 -1. 在電腦上開啟 [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) -1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) -1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option -1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option -1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) -1. 選擇『Build』 - + Wait a few seconds for the build process to complete -1. In the Build History section on the left, type the Username into the "Filter Builds" field -1. Click on the first search result - + This result should have the latest timestamp -1. Click the "output_(name).zip" link -1. 於您的 SD 卡中,移動至 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` - + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) - + `` is a 32-letter folder inside of the `` -1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder -1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder - ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} -1. 解壓 Luma3DS `.zip` 內的 `boot.firm` 及 `boot.3dsx` 到 SD 卡的根目錄底下 - + 「SD 卡的根目錄」指的是你的 SD 卡含有 Nintendo 3DS 資料夾的目錄,而非該資料夾內部 -1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card -1. 解壓 Frogminer_save `.zip` 中的 `private` 資料夾到 SD 卡的根目錄底下 -1. 將 SD 卡插回主機中 -1. 啟動您的主機 - - ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) - {: .notice--info} +{% include_relative include/fredtool-prep.txt %} #### 第四節 — 覆蓋 DS 連線設定 -In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. - -1. 於您主機上啟動系統設定 (System Settings) -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Haxxxxxxxxx!" title - + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) -1. 選擇『複製 (Copy)』並選擇『OK』 -1. 回到系統設定主選單 -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) -1. 如果漏洞成功執行,您的主機將自動啟動『うごくメモ帳 (Flipnote Studio)』 - + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +{% include_relative include/fredtool-write-flipnote.txt %} ##### 第五節 — Flipnote 漏洞 @@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte #### Section VII - Restoring DS Connection Settings -In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. - -1. 於您的 SD 卡中,移動至 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` -1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one -1. 將 SD 卡插回主機中 -1. 啟動您的主機 -1. 於您主機上啟動系統設定 (System Settings) -1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) -1. Select the "Nintendo DSi™" title -1. 選擇『複製 (Copy)』並選擇『OK』 +{% include_relative include/fredtool-restore-dsconn.txt %} ___ + ### 繼續至[完成安裝](finalizing-setup) {: .notice--primary} diff --git a/_pages/zh_TW/installing-boot9strap-(fredtool-legacy).txt b/_pages/zh_TW/installing-boot9strap-(fredtool-legacy).txt new file mode 100644 index 0000000000..9ff572638e --- /dev/null +++ b/_pages/zh_TW/installing-boot9strap-(fredtool-legacy).txt @@ -0,0 +1,77 @@ +--- +title: "Installing boot9strap (Fredtool, Legacy)" +--- + +{% include toc title="條目內容" %} + +{% capture technical_info %} +Technical Details (optional) + +為了匯出系統的 DSiWare 軟體, 我們使用了在系統設定內的 DSiWare 數據管理的一個漏洞。 + +為了做到這一點,我們將使用你裝置的系統加密金鑰 (movable.sed) 來建構一個可使用的 DSiWare 系統備份,以便將 DSi 網路設定程式匯出到 SD 卡的根目錄。 + +Once we have a DSiWare backup, we can inject it into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!! +{: .notice--warning} + +### 必備項目 + +* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii)) +* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) +* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download) +* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) + +#### 第一節 — 檢查自製韌體 + +{% include_relative include/cfw-check-fredtool.txt %} + +#### 第二節 — BannerBomb3 + +In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. + +1. 將 SD 卡插回主機中 +1. 啟動您的主機 +1. 於您主機上啟動系統設定 (System Settings) +1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + + Your device should show the BB3 multihax menu + + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) +1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + + Your device will automatically reboot +1. 關閉您的主機 + +#### 第三節 — 準備工作 + +{% include_relative include/fredtool-prep.txt %} + +#### 第四節 — 覆蓋 DS 連線設定 + +{% include_relative include/fredtool-write-flipnote.txt %} + +##### 第五節 — Flipnote 漏洞 + +{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} + +#### Section VI - Luma3DS Configuration + +1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration +{% include_relative include/configure-luma3ds.txt %} + +{% include_relative include/luma3ds-installed-note.txt %} + +#### Section VII - Restoring DS Connection Settings + +{% include_relative include/fredtool-restore-dsconn.txt %} + +___ + + +### 繼續至[完成安裝](finalizing-setup) +{: .notice--primary} diff --git a/_pages/zh_TW/seedminer-(mii).txt b/_pages/zh_TW/seedminer-(mii).txt new file mode 100644 index 0000000000..59a9213d45 --- /dev/null +++ b/_pages/zh_TW/seedminer-(mii).txt @@ -0,0 +1,84 @@ +--- +title: "Seedminer (Mii)" +--- + +{% include toc title="條目內容" %} + +{% capture gpu_warning %} +This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready: ++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself) ++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple) ++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL) ++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important) +{% endcapture %} +
{{ gpu_warning | markdownify }}
+ +{% capture technical_info %} +Technical Details (optional) + +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +{% endcapture %} +
{{ technical_info | markdownify }}
+{: .notice--info} + +## Instructions + +If you are on Linux or macOS, replace `py -3` with `python3` in all commands. +{: .notice--info} + +### 必備項目 + ++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip) ++ Any 3.x version of [Python](https://www.python.org/downloads/) installed + + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide. + +### Section I - Prep Work + +In this section, you will set up Seedminer and obtain your console's files that are needed for mining. + +1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC + + Keep this location handy, as this Seedminer folder will be where multiple other files are placed +1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt +1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install + + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/). +1. Turn your console on while the SD card is inserted +1. Open the Mii Maker app +1. Tap the "QR Code/Image Options" button +1. Tap "Save Mii as QR Code" +1. Select any Mii Character (make a new one first if you don't have any), and press "OK" +1. Turn the console off +1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside + + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer) + + Once you have the ID0, paste it into a document so you can reference it later +1. Navigate to the `DCIM` folder on the SD card +1. Look for the QR Code, which will be a `.JPG` file starting with `HNI` + + You may have many other files in here already if you use the Nintendo 3DS Camera app +1. Copy this file to the Seedminer folder on your PC + +### Section II - Processing Mii QR and Mining + +In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it. + +1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer +1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier +1. Click on "Export to...", then select "encrypted (.bin)" + + This will download a file named `input.bin` +1. Copy this `input.bin` to the Seedminer folder +1. Open the terminal/PowerShell/Command Prompt window from earlier +1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 ` + + Replace `` with the ID0 you copied into a document + + Do not include the angle brackets +1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii ` + + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new + + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle + + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there + + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength +1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder + +Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy)) +{: .notice--primary} diff --git a/_pages/zh_TW/site-navigation.txt b/_pages/zh_TW/site-navigation.txt index e15a3a204d..f1d18055b4 100644 --- a/_pages/zh_TW/site-navigation.txt +++ b/_pages/zh_TW/site-navigation.txt @@ -18,6 +18,7 @@ sitemap: false + [升級 A9LH 至 boot9strap](a9lh-to-b9s) + [BannerBomb3](bannerbomb3) ++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy)) + [BannerBomb3 + Fredtool (僅限台灣版主機)](bannerbomb3-fredtool-(twn)) + [製作群](credits) + [檢查是否已安裝自製韌體](checking-for-cfw) @@ -44,6 +45,7 @@ sitemap: false + [首頁](/zh_TW/) + [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) + [安裝 boot9strap (透過 Fredtool)](installing-boot9strap-(fredtool)) ++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) + [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) + [安裝 boot9strap (透過硬改)](installing-boot9strap-(hardmod)) + [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm)) @@ -59,6 +61,7 @@ sitemap: false + [區碼變更](region-changing) + [還原 / 更新 CFW](restoring-updating-cfw) + [Seedminer](seedminer) ++ [Seedminer](seedminer-(mii)) + [Seedminer (TWN)](seedminer-(twn)) + [疑難排解](troubleshooting) + [卸載自製韌體](uninstall-cfw) diff --git a/_pages/zh_TW/updating-firmware-(kor).txt b/_pages/zh_TW/updating-firmware-(kor).txt new file mode 100644 index 0000000000..ac2d45d6c2 --- /dev/null +++ b/_pages/zh_TW/updating-firmware-(kor).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (KOR)" +--- + +### 必讀事項 + +To use the Seedminer exploit, you must update your device to the latest system version. + +### 必備項目 + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer](seedminer) +{: .notice--primary} diff --git a/_pages/zh_TW/updating-firmware-(kor-twn).md b/_pages/zh_TW/updating-firmware-(kor-twn).md deleted file mode 100644 index 74a2b48f90..0000000000 --- a/_pages/zh_TW/updating-firmware-(kor-twn).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (KOR/TWN)" ---- - -### Required Reading - -To use the Seedminer exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Seedminer](seedminer) -{: .notice--primary} diff --git a/_pages/zh_TW/updating-firmware-(new-3ds).md b/_pages/zh_TW/updating-firmware-(new-3ds).md deleted file mode 100644 index 5366fdd3b9..0000000000 --- a/_pages/zh_TW/updating-firmware-(new-3ds).md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Updating Firmware (New 3DS)" ---- - -### Required Reading - -To use the super-skaterhax exploit, you must update your device to the latest system version. - -### What you need - -* An internet connection on your device - -#### Section I - Updating the System - -{% include_relative include/sysupdate.txt cfw="false" %} - -Continue to [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) -{: .notice--primary} diff --git a/_pages/zh_TW/updating-firmware-(new-3ds).txt b/_pages/zh_TW/updating-firmware-(new-3ds).txt new file mode 100644 index 0000000000..a1676f5675 --- /dev/null +++ b/_pages/zh_TW/updating-firmware-(new-3ds).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (New 3DS)" +--- + +### 必讀事項 + +To use the super-skaterhax exploit, you must update your device to the latest system version. + +### 必備項目 + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax)) +{: .notice--primary} diff --git a/_pages/zh_TW/updating-firmware-(twn).txt b/_pages/zh_TW/updating-firmware-(twn).txt new file mode 100644 index 0000000000..f6e950f30b --- /dev/null +++ b/_pages/zh_TW/updating-firmware-(twn).txt @@ -0,0 +1,18 @@ +--- +title: "Updating Firmware (TWN)" +--- + +### 必讀事項 + +To use the Seedminer exploit, you must update your device to the latest system version. + +### 必備項目 + +* An internet connection on your device + +#### Section I - Updating the System + +{% include_relative include/sysupdate.txt cfw="false" %} + +Continue to [Seedminer (TWN)](seedminer-(twn)) +{: .notice--primary}