---
title: "BannerBomb3"
---
{% include toc title="Tabla de contenidos" %}
{% capture technical_info %}
Technical Details (optional)
To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.
To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.
For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3).
{% endcapture %}
{{ technical_info | markdownify }}
{: .notice--info}
### Compatibility Notes
Estas instrucciones funcionan en consolas de las regiones USA, Europa, Japón y Corea, indicado por las letras U, E, J o K después de la versión del sistema.
If you have a Taiwanese console (indicated by a T after the system version), follow [this page](bannerbomb3-fredtool-(twn)) instead.
{: .notice--warning}
### Qué necesitas
* Your `movable.sed` file from completing Seedminer or nimhax
#### Sección I - Preparativos
{% include_relative include/bb3-prep.txt %}
#### Section II - Hardware Button Check
{% include_relative include/safemodecheck.txt %}
___
### Next steps: Choose an exploit
If the camera appeared in the previous section, Safe Mode is likely to be working on your device.
If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm))
{: .notice--primary}
If the camera did NOT appear, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool))
{: .notice--info}