--- title: "Installing boot9strap (HBL-USM)" --- {% include toc title="條目內容" %} {% capture technical_info %} Technical Details (optional) In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. As we already have Homebrew access, we can use slotTool to do this. Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. {% endcapture %}
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--danger} ### 必備項目 * The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) * The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) * The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) * You may already have this from a prior section of the guide #### 第一節 — 準備工作 In this section, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Then, you will copy the files needed to trigger the unSAFE_MODE exploit onto your device's SD card. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active. 1. Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide + If not, power on your console and enter Homebrew Launcher through your method of choice (likely Pokémon Picross) 1. Launch slotTool from the list of homebrew + If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section 1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option + You will see some on-screen text and then your system will shut down 1. Remove your SD card from your console and connect it to your computer 1. 在 SD 卡的根目錄底下建立一個新的資料夾 `boot9strap` 1. 解壓 boot9strap `.zip` 的 `boot9strap.firm` 及 `boot9strap.firm.sha` 檔案至 SD 卡的 `/boot9strap/` 資料夾中 1. 將 SafeB9SInstaller `.zip` 中的 `SafeB9SInstaller.bin` 複製到 SD 卡的根目錄 1. Copy `usm.bin` from the unSAFE_MODE `.zip` to the root of your SD card 1. Put your SD card back into your console ![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }}) {: .notice--info} ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}) {: .notice--info} #### Section II - unSAFE_MODE {% include_relative include/exploit-usm.txt method="hbl" %} #### 第三節 — 安裝 boot9strap {% include_relative include/install-boot9strap-safeb9sinstaller.txt %} {%- include_relative include/configure-luma3ds.txt %} {% include_relative include/luma3ds-installed-note.txt %} #### Section IV - Restoring WiFi Configuration Profiles {% include_relative include/remove-usm-slottool.txt %} ___ ### 繼續至[完成安裝](finalizing-setup) {: .notice--primary}