--- title: "Decrypt9 (MSET)" # lang: ko permalink: /ko_KR/decrypt9-(mset).html --- The first thing this guide will do is get you running Decrypt9, which is a multipurpose toolkit that will allow us to install the version 2.1.0, which contains a vulnerability that is needed for further exploitation of the system. {: .notice} If you have already hacked your 3DS before and have a EmuNAND based CFW setup, this guide deals exclusively with SysNAND and you should follow all instructions from within or applying to SysNAND. Note that the terms EmuNAND and RedNAND refer to slightly different implementations of [the same concept](http://3dbrew.org/wiki/NAND_Redirection). {: .notice--info} #### 준비물 * 사용자의 3DS 버전에서 동작하는 DS 플래시카드 * 최신 버전의 [Decrypt9WIP](https://github.com/d0k3/Decrypt9WIP/releases/latest/) #### Instructions 1. SD 카드의 최상위 경로에 `files9` 폴더가 없을 경우 폴더를 만드세요. 2. Copy `Launcher.dat` and `Decrypt9WIP.dat` from the Decrypt9WIP `.zip` to the root of your SD card 3. Reinsert your SD card into your 3DS 4. Put `Decrypt9.nds` from the Decrypt9 `.zip` on your DS flashcard 5. Start your DS flashcard from your 3DS 6. Boot `Decrypt9.nds` using your flashcart 7. Select the correct option for your system version + 4.X.X -> "4.x Decrypt9WIP" + 6.X.X -> "6.x Decrypt9WIP" 8. Reboot the system, then go to System Settings, then "Other Settings", then "Profile", then "Nintendo DS Profile" 9. 익스플로잇이 성공하면 Decrypt9이 실행됩니다. Continue to [2.1.0 ctrtransfer](2.1.0-ctrtransfer). {: .notice--primary}