---
title: "BannerBomb3"
---
{% include toc title="目录内容" %}
{% capture technical_info %}
技术细节(选看)
我们使用了 3DS 系统设置中的 DSiWare 数据管理中的一个漏洞来启动自制代码。
为达到此目的,我们将使用你主机系统中的加密密钥(movable.sed)来构建一个带有漏洞的 DSiWare 备份。
若想知道更多技术细节,请见[这里](https://github.com/zoogie/Bannerbomb3)。
{% endcapture %}
{{ technical_info | markdownify }}
{: .notice--info}
### 兼容性注意
这些操作可在美、欧、日、韩版的主机上工作,你可通过系统版本号末尾的 U,E,J,K 字符来区分主机版本。
如果你的主机是港台版的(系统版本号末尾以 T 结尾),请使用[这个方法](bannerbomb3-fredtool-(twn));不要使用本页的方法。
{: .notice--warning}
### 你需要准备点啥?
* Your `movable.sed` file from completing Seedminer
* The latest release of [BannerBomb3](https://github.com/zoogie/Bannerbomb3/releases/download/v3.0/Release_v3.0.zip) (`Release_v3.0.zip`, direct download)
#### 第一步 – 准备工作
In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your console's SD card.
1. 将主机关机
1. 将你的 SD 卡插入到电脑
1. Open [Bannerbomb3 Injector](https://zoogie.github.io/web/bb3/) on your computer
1. 点击 “选择文件” 选项,然后选择你的 movable.sed 上传
1. 点击 “Build and Download”
+ This will download an exploit DSiWare called `F00D43D5.bin`, which will be contained in a zip archive (`BannerBomb3.zip`)
1. Copy `bb3.bin` from `Release_v3.0.zip` to the root of your SD card
+ 根目录指的是你点进 SD 卡看到的目录,你可以在这个目录下看到 Nintendo 3DS 文件夹,但请不要点进去
+ This file does not need to be opened or extracted
![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info}
1. Copy `Launcher.dat` from the folder for your model and region inside the Release `.zip` to the root of your SD card
1. 打开内存卡的 `Nintendo 3DS` -> `` -> `` 文件夹
+ `` is the 32-letter folder name that you copied in [Seedminer](seedminer)
+ `` is a 32-letter folder inside of the ``
+ If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3)
![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info}
1. 在 `` 文件夹内创建一个名为 `Nintendo DSiWare` 的文件夹
+ 如果这个位置已经存在了这个文件夹,**且**有一些名为 `<8位ID>.bin` 文件(DSiWare 备份文件)在里面,请将它们备份到电脑上,然后从 SD 卡中移除这些文件
1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder
![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }})
{: .notice--info}
#### 第二步 – BannerBomb3
In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and use it to install the menuhax67 exploit.
1. Reinsert your SD card into your console
1. Power on your console
1. Launch System Settings on your console
1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
+ Your console should show the BB3 multihax menu
1. Use the D-Pad to navigate and press the (A) button to select "Install *hax"
+ Your console will automatically reboot
1. 将主机关机
___
### Continue to [Installing boot9strap (menuhax)](installing-boot9strap-(menuhax))
{: .notice--primary}