---
title: "Dumping Movable (nimhax)"
---
{% include toc title="Table of Contents" %}
{% capture technical_info %}
Technical Details (optional)
To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called nimhax (along with another exploit to run nimhax) to dump the data encryption key (movable.sed) from your device.
For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit.
{% endcapture %}
{{ technical_info | markdownify }}
{: .notice--info}
### What You Need
* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file)
### Instructions
#### Section I - Prep Work
1. Power off your device
1. Insert your SD card into your computer
1. Create a folder named `3ds` on the root of your SD card, if it does not already exist
1. Copy the `nimhax` folder from your nimhax `.zip` to the `/3ds/` folder on your SD card
1. Reinsert your SD card into your device
1. Power on your device
#### Section II - nimhax
1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser)
1. Launch nimhax from the list of homebrew
1. If the exploit was successful, a `movable.sed` file will be available on the root of your SD card.
### Next step: BannerBomb3
Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with BannerBomb3, which uses your `movable.sed` file to take advantage of exploits in the System Settings application.
Continue to [BannerBomb3](bannerbomb3)
{: .notice--primary}