---
title: "BannerBomb3"
---
{% include toc title="條目內容" %}
{% capture technical_info %}
Technical Details (optional)
To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.
To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.
For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3).
{% endcapture %}
{{ technical_info | markdownify }}
{: .notice--info}
### 相容性資訊
這些操作在美、歐、日、韓版可用,可透過系統版本號末尾的 「U、E、J、K」 字元來辨別。
如果您的主機為台灣版主機(系統版本號以 T 結尾的主機),請見[此頁面](bannerbomb3-fredtool-(twn))。
{: .notice--warning}
### 必備項目
* Your `movable.sed` file from completing Seedminer
* The latest release of [BannerBomb3](https://github.com/zoogie/Bannerbomb3/releases/download/v3.0/Release_v3.0.zip) (direct download)
#### 第一節 — 準備工作
{% include_relative include/bb3-prep.txt %}
#### 第二節 — BannerBomb3
In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and use it to install the menuhax67 exploit.
1. Power on your console
1. Launch System Settings on your console
1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
+ Your console should show the BB3 multihax menu
1. Use the D-Pad to navigate and press the (A) button to select "Install *hax"
+ Your console will automatically reboot
1. Power off your console
___
### Continue to [Installing boot9strap (menuhax)](installing-boot9strap-(menuhax))
{: .notice--primary}