---
title: "Installing boot9strap (HBL-USM)"
---
{% include toc title="Содержание" %}
{% capture technical_info %}
Technical Details (optional)
In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.
As we already have Homebrew access, we can use slotTool to do this.
Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.
For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit.
{% endcapture %}
{{ technical_info | markdownify }}
{: .notice--info}
### Compatibility Notes
If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help.
{: .notice--danger}
### Что понадобится
* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download)
* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/download/v1.3/RELEASE_v1.3.zip) (direct download)
#### Часть I - Подготовительные работы
In this section, you will copy the files needed to trigger the unSAFE_MODE exploit onto your console's SD card. Then, you will use Homebrew Launcher to launch slotTool, which will overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwritten while the exploit is active.
1. Вставьте SD-карту в компьютер
1. Создайте папку `boot9strap` в корне SD-карты
1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the RELEASE `.zip` to the `/boot9strap/` folder on your SD card
1. Создайте папку `3ds` в корне SD-карты, если таковой нет
+ This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates
1. Copy the `slotTool` folder from the RELEASE `.zip` to the `/3ds/` folder on your SD card
1. Copy `usm.bin` from the RELEASE `.zip` to the root folder on your SD card
1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card
1. Reinsert your SD card into your console
1. Power on your console
1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser)
1. Launch slotTool from the list of homebrew
+ If you get stuck on a red screen, forcefully power off the console by holding the power button for fifteen seconds, then retry this section
1. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option
+ You will see some on-screen text and then your system will shut down
![]({{ "/images/screenshots/hblusm-root-layout.png" | absolute_url }})
{: .notice--info}
![]({{ "/images/screenshots/boot9strap-folder.png" | absolute_url }})
{: .notice--info}
#### Section II - unSAFE_MODE
{% include_relative include/exploit-usm.txt %}
#### Часть III - Установка boot9strap
{% include_relative include/install-boot9strap-safeb9sinstaller.txt %}
{%- include_relative include/configure-luma3ds.txt %}
{% include_relative include/luma3ds-installed-note.txt %}
#### Section IV - Restoring WiFi Configuration Profiles
{% include_relative include/remove-usm-slottool.txt %}
___
### Следующий шаг: [Завершение установки](finalizing-setup)
{: .notice--primary}