--- title: "Installing boot9strap (HBL-USM)" --- {% include toc title="Tabla de contenidos" %} {% capture technical_info %} Technical Details (optional) In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. As we already have Homebrew access, we can use slotTool to do this. Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. {% endcapture %}
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--danger} ### Qué necesitas * The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) * The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) * The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) * You may already have this from a prior section of the guide #### Sección I - Preparativos In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. 1. Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. Launch slotTool from the list of homebrew + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section 1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option + You will see some on-screen text and then your system will shut down 1. Remove your SD card from your console and connect it to your computer 1. Crea una carpeta llamada `boot9strap` en la raíz de tu tarjeta SD 1. Copia `boot9strap.firm` y `boot9strap.firm.sha` desde el `.zip` de `boot9strap` a la carpeta `/boot9strap/` en tu tarjeta SD 1. Copia `SafeB9SInstaller.bin` desde el `.zip` de SafeB9SInstaller a la raíz de tu tarjeta SD 1. Copy `usm.bin` from the unSAFE_MODE `.zip` to the root of your SD card 1. Put your SD card back into your console ![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) {: .notice--info} ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) {: .notice--info} #### Section II - unSAFE_MODE {% include_relative include/exploit-usm.txt method="hbl" %} #### Sección III - Instalar boot9strap {% include_relative include/install-boot9strap-safeb9sinstaller.txt %} {%- include_relative include/configure-luma3ds.txt %} {% include_relative include/luma3ds-installed-note.txt %} #### Section IV - Restoring WiFi Configuration Profiles {% include_relative include/remove-usm-slottool.txt %} ___ ### Continúa en [Finalizar instalación](finalizing-setup) {: .notice--primary}