--- title: "BannerBomb3" --- {% include toc title="Содержание" %} {% capture technical_info %} Technical Details (optional) To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). {% endcapture %}
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes Эти инструкции работают на консолях регионов USA, Europe, Japan и Korea. На регион консоли указывает буква U, E, J или K после версии прошивки. If you have a Taiwanese console (indicated by a T after the system version), follow [this page](bannerbomb3-fredtool-(twn)) instead. {: .notice--warning} ### Что понадобится * Your `movable.sed` file from completing Seedminer * The latest release of [BannerBomb3](https://github.com/zoogie/Bannerbomb3/releases/download/v3.0/Release_v3.0.zip) (direct download) #### Часть I - Подготовительные работы {% include_relative include/bb3-prep.txt %} #### Часть II - BannerBomb3 In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and use it to install the menuhax67 exploit. 1. Power on your console 1. Launch System Settings on your console 1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + Your console should show the BB3 multihax menu 1. Use the D-Pad to navigate and press the (A) button to select "Install *hax" + Your console will automatically reboot 1. Power off your console ___ ### Continue to [Installing boot9strap (menuhax)](installing-boot9strap-(menuhax)) {: .notice--primary}