Dumping Movable (nimhax)


Para suporte em Inglês, peça ajuda no Discord do Nintendo Homebrew.
Se você gostou deste guia, nós aceitamos Doações.

Detalhes técnicos (opcional)

Para instalar boot9strap em seu dispositivo, nós derivamos a chave de criptografia exclusiva do seu dispositivo. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your device.

For a more technical explanation, see here for information about the nimhax exploit.

O que é necessário

  • The latest release of nimhax (the nimhax .zip file)

Instruções

Seção I - Preparação

  1. Desligue seu dispositivo
  2. Insira o cartão SD no seu computador
  3. Copy the nimhax folder from the nimhax .zip to the /3ds/ folder on your SD card
  4. Reinsira seu cartão SD no seu dispositivo
  5. Ligue o seu dispositivo

Section II - nimhax

  1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser)
  2. Launch nimhax from the list of homebrew
  3. If the exploit was successful, a movable.sed file will appear on the root of your SD card

Next step: Choose an exploit

Once you have your device’s encryption key (movable.sed), you can use it in conjunction with BannerBomb3, which uses your movable.sed file to take advantage of exploits in the System Settings application.

Continue em BannerBomb3

Frogtool

Once you have your device’s encryption key (movable.sed), you can use it in conjunction with Frogtool, which uses your movable.sed file to inject and take advantage of JPN Flipnote Studio.
While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you’re unable to use a torrent client.

Continue to Installing boot9strap (Frogtool)