Dumping Movable (nimhax)
若需英語支援,請於 Discord 上的 Nintendo Homebrew 伺服器發問。
如果您喜歡本教學,我們很樂意接受捐贈。
Technical Details (optional)
To install boot9strap on your console, we derive your console’s unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console.
For a more technical explanation, see here for information about the nimhax exploit.
必備項目
- The latest release of nimhax (the nimhax
.zip
file)
操作說明
第一節 — 準備工作
- Power off your console
- 將 SD 卡插入至電腦中
- Copy the
nimhax
folder from the nimhax.zip
to the/3ds/
folder on your SD card - Reinsert your SD card into your console
- Power on your console
Section II - nimhax
- Open the Homebrew Launcher through your method of choice (likely the Internet Browser)
- Launch nimhax from the list of homebrew
- If the exploit was successful, a
movable.sed
file will appear on the root of your SD card
Next step: Frogtool
Once you have your console’s encryption key (movable.sed
), you can use it in conjunction with Frogtool, which uses your movable.sed
file to inject and take advantage of JPN Flipnote Studio.
While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you’re unable to use a torrent client.
Continue to Installing boot9strap (Frogtool)