--- title: "BannerBomb3" --- {% include toc title="目次" %} {% capture technical_info %} Technical Details (optional) To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). {% endcapture %}
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes これらのガイドは、システムバージョン末尾にある「U、E、J、K」にあるように、米国、欧州、日本、韓国の端末で機能します。 If you have a Taiwanese console (indicated by a T after the system version), follow [this page](bannerbomb3-fredtool-(twn)) instead. {: .notice--warning} ### 必要なもの * Your `movable.sed` file from completing Seedminer or nimhax #### セクション I - 準備 {% include_relative include/bb3-prep.txt %} #### Section II - Hardware Button Check In this section, you will see whether you can access Safe Mode on your console. This will determine which method you will follow on the next page. Your SD card should remain in your computer while you perform this check. {% include_relative include/safemodecheck.txt %} ___ ### Next steps: Choose an exploit If the camera appeared in the previous section, Safe Mode is likely to be working on your console. If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} If the camera did NOT appear, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--info}