--- title: "Installing boot9strap (Fredtool)" --- {% include toc title="條目內容" %} {% capture technical_info %} Technical Details (optional) This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). {% endcapture %}
{{ technical_info | markdownify }}
{: .notice--info} ### 必備項目 * 您自 [Seedminer](seedminer) 步驟中所取得的 `movable.sed` 檔案 * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`) * The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file) #### 第一節 — 檢查自製韌體 {% include_relative include/cfw-check-fredtool.txt %} #### 第二節 — BannerBomb3 In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section. 1. 將 SD 卡插回主機中 1. 啟動您的主機 1. 於您主機上啟動系統設定 (System Settings) 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + Your device should show the BB3 multihax menu + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool) 1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare" + Your device will automatically reboot 1. 關閉您的主機 #### 第三節 — 準備工作 In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer. 1. 將 SD 卡插入至電腦中 1. 在電腦上開啟 [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) 1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters) 1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option 1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option 1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit) 1. 選擇『Build』 + Wait a few seconds for the build process to complete 1. In the Build History section on the left, type the Username into the "Filter Builds" field 1. Click on the first search result + This result should have the latest timestamp 1. Click the "output_(name).zip" link 1. 於您的 SD 卡中,移動至 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` + `` is the 32-letter folder name that you copied in [Seedminer](seedminer) + `` is a 32-letter folder inside of the `` 1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder 1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info} 1. 解壓 Luma3DS `.zip` 內的 `boot.firm` 及 `boot.3dsx` 到 SD 卡的根目錄底下 + 「SD 卡的根目錄」指的是你的 SD 卡含有 Nintendo 3DS 資料夾的目錄,而非該資料夾內部 1. 將 `boot.nds` (B9STool) 複製到 SD 卡根目錄中 1. 解壓 Frogminer_save `.zip` 中的 `private` 資料夾到 SD 卡的根目錄底下 1. 將 SD 卡插回主機中 1. 啟動您的主機 ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }}) {: .notice--info} #### 第四節 — 覆蓋 DS 連線設定 In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio. 1. 於您主機上啟動系統設定 (System Settings) 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) 1. Select the "Haxxxxxxxxx!" title 1. 選擇『複製 (Copy)』並選擇『OK』 1. 回到系統設定主選單 1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png)) 1. 如果漏洞成功執行,您的主機將自動啟動『うごくメモ帳 (Flipnote Studio)』 ##### 第五節 — Flipnote 漏洞 {% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %} #### Section VI - Luma3DS Configuration {% include_relative include/configure-luma3ds.txt onboot="true" %} {% include_relative include/luma3ds-installed-note.txt %} #### Section VII - Restoring DS Connection Settings In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV. 1. 於您的 SD 卡中,移動至 `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` 1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one 1. 將 SD 卡插回主機中 1. 啟動您的主機 1. 於您主機上啟動系統設定 (System Settings) 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) 1. Select the "Nintendo DSi™" title 1. 選擇『複製 (Copy)』並選擇『OK』 ___ ### 繼續至[完成安裝](finalizing-setup) {: .notice--primary}