--- title: "BannerBomb3" --- {% include toc title="목차" %}
Technical Details (optional)

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

For a more technical explanation, see here.

{: .notice--info} ### Compatibility Notes 이 설명서는 미주, 유럽, 일본, 그리고 한국 지역 기기들 (시스템 버전 다음 글짜가 U, E, J, 아니면 K 인 경우) 와 호환됩니다. 만약 대만 지역 (TWN, 버전 끝에 T 글자가 표시됨)기기를 소유하고 계시다면, [이 페이지](bannerbomb3-fredtool-(twn))를 진행해 주시기 바랍니다. {: .notice--warning} ### 준비물 * [Seedminer](seedminer)에서 받은 `movable.sed` 파일 #### 섹션 I - 준비 작업 In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card. 1. 기기를 종료해 주세요 1. SD 카드를 컴퓨터에 삽입해 주세요 1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer 1. Upload your movable.sed using the “Choose File” option 1. Click “Build and Download” + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`) 1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card + SD 카드의 루트는 SD 카드를 열 때 보이는 디렉토리이고, Nintendo 3DS 폴더가 보이지만 그 안에 않 들어가 있는 상태의 폴더 입니다 1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info} 1. Create a folder named `Nintendo DSiWare` inside of the `` + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card 1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }}) {: .notice--info} #### Section II - Hardware Button Check In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. 1. 전원이 꺼져 있는 상태에서 (L 어깨) + (R 어깨) + (십자 Up) + (A) 를 길게 눌르고, 누르는 상태에서 전원을 켜 주세요 + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) 1. If prompted to update, press Cancel + If the device boots to the HOME Menu, just continue to the next step 1. 기기를 종료해 주세요 ___ ### Next steps: Choose an exploit If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--warning}