Technical Details (optional)
To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.
To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.
For a more technical explanation, see here.
{: .notice--info}
### Compatibility Notes
這些操作在美、歐、日、韓版可用,可透過系統版本號末尾的 「U、E、J、K」 字元來辨別。
如果您的主機為台灣版主機(系統版本號以 T 結尾的主機),請見[此頁面](bannerbomb3-fredtool-(twn))。
{: .notice--warning}
### 必備項目
* 您自 [Seedminer](seedminer) 步驟中所取得的 `movable.sed` 檔案
#### 第一節 — 準備工作
In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card.
1. 關閉您的主機
1. 將 SD 卡插入至電腦中
1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer
1. Upload your movable.sed using the “Choose File” option
1. Click “Build and Download”
+ This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`)
1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card
+ 「SD 卡的根目錄」指的是你的 SD 卡含有 Nintendo 3DS 資料夾的目錄,而非該資料夾內部
1. Navigate to `Nintendo 3DS` -> `