---
title: "Installing boot9strap (HBL-USM)"
---
{% include toc title="Spis Treści" %}
{% capture technical_info %}
Technical Details (optional)
In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.
As we already have Homebrew access, we can use slotTool to do this.
Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.
For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit.
{% endcapture %}
{{ technical_info | markdownify }}
{: .notice--info}
### Compatibility Notes
If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help.
{: .notice--danger}
### Czego Potrzebujesz
* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download)
* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download)
* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest)
* You may already have this from a prior section of the guide
#### Sekcja I - Przygotowanie
In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active.
1. Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide
+ If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross)
1. Launch slotTool from the list of homebrew
+ If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section
1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option
+ You will see some on-screen text and then your system will shut down
1. Remove your SD card from your console and connect it to your computer
1. Stwórz folder o nazwie `boot9strap` w katalogu głównym karty SD
1. Skopiuj `boot9strap.firm` i `boot9strap.firm.sha` z boot9strap `.zip` do folderu `/boot9strap/` na karcie SD
1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card
1. Copy `usm.bin` from the unSAFE_MODE `.zip` to the root of your SD card
1. Put your SD card back into your console
![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }})
{: .notice--info}
![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }})
{: .notice--info}
#### Section II - unSAFE_MODE
{% include_relative include/exploit-usm.txt method="hbl" %}
#### Sekcja III - Instalacja boot9strap
{% include_relative include/install-boot9strap-safeb9sinstaller.txt %}
{%- include_relative include/configure-luma3ds.txt %}
{% include_relative include/luma3ds-installed-note.txt %}
#### Section IV - Restoring WiFi Configuration Profiles
{% include_relative include/remove-usm-slottool.txt %}
___
### Kontynuuj do [Finalizowanie Instalacji](finalizing-setup)
{: .notice--primary}