--- title: "Instalar boot9strap (USM)" --- {% include toc title="Tabla de contenidos" %}
Technical Details (optional)

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

We can do this using an existing exploit, BannerBomb3.

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

{: .notice--info} ### Compatibility Notes Estas instrucciones funcionan en consolas de las regiones USA, Europa, Japón y Corea, indicado por las letras U, E, J o K después de la versión del sistema. If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. {: .notice--warning} ### Qué necesitas * Tu archivo `movable.sed` proveniente de haber completado [Seedminer](seedminer) * The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download) * The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) #### Sección I - Preparativos In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device's SD card. 1. Si tu consola está encendida, apágala 1. Abre [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) en tu computadora 1. Carga tu movable.sed usando la opción "Choose File" 1. Haz click en "Build and Download" + Esto descargará un archivo de DSiWare exploitado, llamado `F00D43D5.bin`, y un archivo de datos para el exploit de SAFE_MODE llamado `usm.bin`, ambos dentro de un archivo zip (`unSAFE_MODE.zip`) 1. Inserta tu tarjeta SD en tu computadora 1. Copia los archivos `boot.firm` y `boot.3dsx` desde el `.zip` de Luma3DS a la raíz de tu tarjeta SD + La raíz de tu tarjeta SD se refiere al primer directorio de la tarjeta, donde puedes ver la carpeta Nintendo 3DS pero no estás dentro de ella 1. Crea una carpeta llamada `boot9strap` en la raíz de tu tarjeta SD 1. Copia `boot9strap.firm` y `boot9strap.firm.sha` desde el `.zip` de `boot9strap` a la carpeta `/boot9strap/` en tu tarjeta SD 1. Copia `SafeB9SInstaller.bin` desde el `.zip` de SafeB9SInstaller a la raíz de tu tarjeta SD 1. Copia el archivo `usm.bin` desde `unSAFE_MODE.zip` a la raíz de tu tarjeta SD ![]({{ "/images/screenshots/bb3/usm-root-layout.png" | absolute_url }}){: .notice--info} ![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }}){: .notice--info} 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card 1. Copia el archivo `F00D43D5.bin` desde `unSAFE_MODE.zip` a la carpeta `Nintendo DSiWare` ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} #### Sección II - BannerBomb3 In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active. 1. Vuelve a insertar tu tarjeta SD en tu consola 1. Enciende tu consola 1. Entra a Configuración de la consola 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-usm-menu) 1. Press (A) to select "Inject haxx" + Tu consola se apagará automáticamente #### Sección III - unSAFE_MODE In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer. 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) + If you're unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help. 1. Presiona "OK" para aceptar la actualización + No hay actualización. Esto es parte del exploit 1. Presiona sobre "Acepto" para aceptar los términos y condiciones 1. The update will eventually fail, with the error code `003-1099`. Este comportamiento es el esperado 1. Cuando se te pregunte "¿Quieres configurar tu conexión a internet?", selecciona "Aceptar" 1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup` ([image](/images/screenshots/bb3/safemode_highlighted.png)) 1. Si el exploit ha funcionado, la consola habrá iniciado SafeB9SInstaller #### Section IV - Installing boot9strap In this section, you will install custom firmware onto your device. 1. Cuando se te pida, introduce la combinación de botones mostrada para instalar boot9strap + If the top screen is blank, power off your device and re-do Section III 1. Once it is complete, press (A) to reboot your device 1. Tu consola debería haber reiniciado en el menú de configuración de Luma3DS + If your device shuts down when you try to power it on, ensure that you have copied `boot.firm` from the Luma3DS `.zip` to the root of your SD card 1. Presiona (Start) para guardar y reiniciar At this point, your console will boot to Luma3DS by default. + Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware. + On the next page, you will install useful homebrew applications to complete your setup. #### Section V - Restoring WiFi Configuration Profiles In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II. 1. Entra a Configuración de la consola 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + Your device should show the [Bannerbomb3 menu](/images/screenshots/bb3/usm-menu.png) 1. Use the D-Pad to navigate and press the (A) button to select "Restore slots" + Your device will automatically reboot 1. Apaga tu consola 1. Inserta tu tarjeta SD en tu computadora 1. Ve a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` en tu tarjeta SD 1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. Este archivo ya no será necesario ___ ### Continúa en [Finalizar instalación](finalizing-setup) {: .notice--primary}