---
title: "BannerBomb3 (Legacy)"
---
{% include toc title="Inhalt" %}
{% capture technical_info %}
Technische Details (optional)
To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.
To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.
For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3).
{% endcapture %}
{{ technical_info | markdownify }}
{: .notice--info}
### Kompatibilitätshinweise
Diese Anleitung funktioniert mit den folgenden Konsolenregionen: USA, Europa, Japan und Korea. Diese werden mit den Buchstaben U, E, J oder K nach der Systemversion angezeigt.
### Was du brauchst
* Your `movable.sed` file from completing Seedminer or nimhax
#### Abschnitt I - Vorbereitungen
{% include_relative include/bb3-prep.txt %}
#### Abschnitt II - Tastenfunktionalität überprüfen
In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page.
Your SD card should remain in your computer while you perform this check.
{% include_relative include/safemodecheck.txt %}
___
### Nächste Schritte: Wähle einen Exploit
If the camera appeared in the previous section, Safe Mode is likely to be working on your device.
If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm))
{: .notice--primary}
If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy))
{: .notice--info}