BannerBomb3 (Legacy)
若需英語支援,請於 Discord 上的 Nintendo Homebrew 伺服器發問。
如果您喜歡本教學,我們很樂意接受捐贈。
Technical Details (optional)
To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.
To accomplish this, we use your system’s encryption key (movable.sed) to build a DSiWare backup that exploits the system.
For a more technical explanation, see here.
相容性資訊
這些操作在美、歐、日、韓版可用,可透過系統版本號末尾的 「U、E、J、K」 字元來辨別。
必備項目
- Your
movable.sed
file from completing Seedminer or nimhax
第一節 — 準備工作
In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your console’s SD card.
- Power off your console
- 將 SD 卡插入至電腦中
- Open Bannerbomb3 Injector on your computer
- Upload your movable.sed using the “Choose File” option
- Click “Build and Download”
- This will download an exploit DSiWare called
F00D43D5.bin
and a payload calledbb3.bin
inside of a zip archive (DSIWARE_EXPLOIT.zip
)
- This will download an exploit DSiWare called
- Copy
bb3.bin
fromDSIWARE_EXPLOIT.zip
to the root of your SD card- 「SD 卡的根目錄」指的是你的 SD 卡含有 Nintendo 3DS 資料夾的目錄,而非該資料夾內部
- This file does not need to be opened or extracted
- Navigate to
Nintendo 3DS
-><ID0>
-><ID1>
on your SD card - Create a folder named
Nintendo DSiWare
inside of the<ID1>
- If you already had the folder and there are any existing DSiWare backup files (
<8-character-id>.bin
) inside, copy them to your PC and remove them from your SD card
- If you already had the folder and there are any existing DSiWare backup files (
- Copy the
F00D43D5.bin
file fromDSIWARE_EXPLOIT.zip
to theNintendo DSiWare
folder