Technical Details (optional)
This method of using Seedminer for further exploitation uses your movable.sed
file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.
This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.
{: .notice--info}
### 必備項目
* 您自 [Seedminer](seedminer) 步驟中所取得的 `movable.sed` 檔案
* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`)
* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`)
* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file)
#### 第一節 — 檢查自製韌體
As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)).
1. 關閉您的主機
1. 按住「Select」鍵
1. 在開機時按住「Select」鍵
1. 如果您能正常開機至 HOME 主選單的話,則代表檢查通過,您能放心地繼續遵循以下步驟。
1. 關閉您的主機
If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! 前往至 [檢查是否已安裝自製韌體](checking-for-cfw) 以更新您現有的自製韌體。
{: .notice--danger}
#### 第二節 — BannerBomb3
In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section.
1. 將 SD 卡插回主機中
1. 啟動您的主機
1. 於您主機上啟動系統設定 (System Settings)
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
+ Your device should show the BB3 multihax menu
+ If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu)
1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare"
+ Your device will automatically reboot
1. 關閉您的主機
#### Section III - Prep Work
In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer.
1. 將 SD 卡插入至電腦中
1. 在電腦上開啟 [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec)
1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters)
1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option
1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option
1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit)
1. 選擇『Build』
+ Wait a few seconds for the build process to complete
1. In the Build History section on the left, type the Username into the "Filter Builds" field
1. Click on the first search result
+ This result should have the latest timestamp
1. Click the "output_(name).zip" link
1. 於您的 SD 卡中,移動至 `Nintendo 3DS` -> `