--- title: "Installing Boot9strap (Fredtool)" --- {% include toc title="Table of Contents" %} ### Required Reading This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, for example from BannerBomb or the DSiWare Dumper tool. This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). ### What You Need * A DSiWare Backup (such as the one on SD root from [BannerBomb3](bannerbomb3)) * Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) #### Section I - CFW Check 1. Power off your device 1. Hold the (Select) button 1. Power on your device while still holding the (Select) button 1. If the check was successful, you will boot to the HOME menu and you may proceed with this guide If you see a configuration menu, you already have CFW and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. {: .notice--danger} #### Section II - Prep Work 1. Power off your device 1. Pasang kad SD anda ke dalam komputer 1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card 1. Copy `boot.nds` (B9STool) to the root of your SD card 1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card #### Section III - Fredtool 1. Open [Fredtool](https://3ds.nhnarwhal.com/3dstools/fredtool.php) on your computer 1. Select your `movable.sed` file for the "Your movable.sed" field 1. Select your DSiWare Backup (`<8-character-id>.bin`) file for the "Your dsiware.bin" field 1. Complete the "I'm not a robot" captcha 1. Select "Start" 1. Wait for the process to complete 1. When the process has completed, download your modified DSiWare archive from the site + This file contains 2 DSiWare backup files, one clean (unmodified) and one hax (exploited) 1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card + The `` will be the same one that you used in [Seedminer](seedminer) + The `` is a 32 character long folder inside of the `` + If the `Nintendo DSiWare` folder does not exist, create it inside of the `` 1. Copy the `42383841.bin` file from the `output/hax/` folder of the downloaded DSiWare archive (`fredtool_output.zip`) to the `Nintendo DSiWare` folder 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare` 1. Under the "SD Card" section, select the "Haxxxxxxxxx!" title 1. Select "Copy", then select "OK" 1. Return to main menu of the System Settings 1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" 1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio #### Section IV - Flipnote Exploit If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} 1. Complete the initial setup process for the launched game until you reach the main menu + Select the left option whenever prompted during the setup process 1. Using the touch-screen, select the large left box, then select the box with an SD card icon 1. Once the menu loads, select the face icon, then the bottom right icon to continue 1. Press (X) or (UP) on the D-Pad depending on which is shown on the top screen 1. Select the second button along the top with a film-reel icon 1. Scroll right until reel "3/3" is selected 1. Tap the third box with the letter "A" in it 1. Scroll left until reel "1/3" is selected 1. Tap the fourth box with the letter "A" in it 1. If the exploit was successful, your device will have loaded b9sTool 1. Using the D-Pad, move to "Install boot9strap" + If you miss this step, the system will exit to home menu instead of installing boot9strap and you will need to open Nintendo DS Connections and start over from the beginning of Section III 1. Press (A), then press START and SELECT at the same time to begin the process 1. Once completed and the bottom screen says "done.", exit b9sTool, then power off your device + You may have to force power off by holding the power button + If you see the Luma Configuration screen, continue with the guide without powering off #### Section V - Configuring Luma3DS 1. Boot your device while holding (Select) to launch the Luma configuration menu + If you encounter issues launching the Luma configuration menu, [follow this troubleshooting guide](https://github.com/zoogie/b9sTool/blob/master/TROUBLESHOOTING.md) 1. Use the (A) button and the D-Pad to turn on the following: + **"Show NAND or user string in System Settings"** 1. Tekan (Start) untuk save dan reboot At this point, your console will boot to Luma3DS by default as long as the SD card is inserted. + Luma3DS does not look any different from the normal HOME menu. If your console has booted into the HOME menu, it is running custom firmware. + On the next page, you will copy Luma3DS to internal memory so that you can boot without an SD card. #### Section VI - Restoring DS Connection Settings 1. Power off your device 1. Pasang kad SD anda ke dalam komputer 1. Copy the `42383841.bin` file from the `output/clean/` folder of the downloaded DSiWare archive (`fredtool_output.zip`) to the `Nintendo 3DS///Nintendo DSiWare/` folder on your SD card + Replace the existing `42383841.bin` file 1. Reinsert your SD card into your device 1. Power on your device 1. Launch System Settings on your device 1. Navigate to `Data Management` -> `DSiWare` 1. Under the "SD Card" section, select the "Nintendo DSiā„¢" title 1. Select "Copy", then select "OK" ___ ### Continue to [Finalizing Setup](finalizing-setup) {: .notice--primary}