Boot9strap installeren (USM)


Voor hulp in het Engels kan je terecht bij Nintendo Homebrew op Discord.
Vind je dit een goede handleiding? We accepteren donaties.

Technical Details (optional)

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

We can do this using an existing exploit, BannerBomb3.

To accomplish this, we use your system’s encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

Compatibility Notes

Deze instructies werken aan de consoles van de VS, Europa, Japan en Korea zoals aangegeven in de letters U, E, J, of K na de systeemversie.

If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow an alternate branch of Seedminer. For assistance with this matter, join Nintendo Homebrew on Discord and ask, in English, for help.

Wat je nodig hebt

Deel I - Voorbereiding

In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device’s SD card.

  1. Your SD card should be inserted in your computer
  2. Copy usm.bin to the root of your SD card
  3. Kopieer boot.firm en boot.3dsx van de Luma3DS .zip naar de hoofdmap van je SD-kaart
    • De hoofdmap van de SD-kaart verwijst naar de bovenste map van de SD-kaart, waarin je alle mappen op de SD-kaart kunt zien, waaronder de Nintendo 3DS map, zonder je in de Nintendo 3DS map te bevinden
  4. Maak een map genaamd boot9strap op de hoofdmap van je SD-kaart
  5. Kopieer boot9strap.firm en boot9strap.firm.sha van de boot9strap .zip naar de /boot9strap/ map op je SD-kaart
  6. Kopieer SafeB9SInstaller.bin van de SafeB9SInstaller .zip naar de hoofdmap van je SD-kaart

Deel II - BannerBomb3

In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active.

  1. Stop je SD-kaart terug in je 3DS
  2. Zet je 3DS aan
  3. Open Systeeminstellingen op je apparaat
  4. Navigate to Data Management -> DSiWare-> SD Card (image)
    • Your device should show the BB3 multihax menu
    • If this step causes your device to crash, follow this troubleshooting guide
    • If the BB3 multihax menu says “cfw installed already”, you already have custom firmware and should continue from here
  5. Use the D-Pad to navigate and press the (A) button to select “Install unSAFE_MODE”
    • Je apparaat zal automatisch uitschakelen

Deel III - unSAFE_MODE

In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer.

  1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device
    • Keep holding the buttons until the device boots into Safe Mode (a “system update” menu)
    • If you’re unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow an alternate branch of BannerBomb3. For assistance with this matter, join Nintendo Homebrew on Discord and ask, in English, for help.
  2. Press “OK” to accept the update
    • There is no update. This is part of the exploit
  3. Press “I accept” to accept the terms and conditions
  4. The update will eventually fail, with the error code 003-1099. This is intended behaviour
  5. When asked “Would you like to configure Internet settings?”, select “Yes”
  6. On the following menu, navigate to Connection 1 -> Change Settings -> Next Page (right arrow) -> Proxy Settings -> Detailed Setup (image)
  7. If the exploit was successful, your device will have booted into SafeB9SInstaller

Deel IV - Boot9strap installeren

In this section, you will install custom firmware onto your device.

  1. When prompted, input the key combo given on the top screen to install boot9strap
  2. Once it is complete, press (A) to reboot your device
  3. Your device should have booted into the Luma3DS configuration menu
    • Luma3DS configuration menu are settings for the Luma3DS custom firmware. Many of these settings may be useful for customization or debugging
    • For the purpose of this guide, leave these options on the default settings (do not check or uncheck anything)
    • If your device shuts down when you try to power it on, ensure that you have copied boot.firm from the Luma3DS .zip to the root of your SD card
  4. Druk op (Start) om op te slaan en opnieuw op te starten

At this point, your console will boot to Luma3DS by default.

  • Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware.
  • On the next page, you will install useful homebrew applications to complete your setup.

Deel V - Wifi-configuratie profielen herstellen

In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II.

  1. Open Systeeminstellingen op je apparaat
  2. Navigate to Data Management -> DSiWare-> SD Card (image)
  3. Use the D-Pad to navigate and press the (A) button to select “Uninstall unSAFE_MODE”
    • Your device will automatically reboot
  4. Schakel je 3DS uit
  5. Plaats je SD kaart in je computer
  6. Navigeer naar Nintendo 3DS -> <ID0> -> <ID1> -> Nintendo DSiWare op je SD-kaart
  7. Delete F00D43D5.bin from your Nintendo DSiWare folder and from your computer. Dit bestand is niet meer nodig

Doorgaan naar Installatie voltooien