---
title: "BannerBomb3"
---
{% include toc title="目次" %}
{% capture technical_info %}
Technical Details (optional)
To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.
To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.
For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3).
{% endcapture %}
{{ technical_info | markdownify }}
{: .notice--info}
### Compatibility Notes
これらのガイドは、システムバージョン末尾にある「U、E、J、K」にあるように、米国、欧州、日本、韓国の端末で機能します。
If you have a Taiwanese console (indicated by a T after the system version), follow [this page](bannerbomb3-fredtool-(twn)) instead.
{: .notice--warning}
### 必要なもの
* [Seedminer](seedminer) より作成した、 `movable.sed` ファイル
#### セクション I - 準備
In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card.
1. 本体の電源を切ります。
1. パソコンにSDカードを入れます
1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer
1. Upload your movable.sed using the “Choose File” option
1. Click “Build and Download”
+ This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`)
1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card
+ SDカードのルートとは、Nintendo 3DSのフォルダなどがある最初の項目のことであり、フォルダの中ではありません。
+ This file does not need to be opened or extracted
![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info}
1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card
+ `` is the 32-letter folder name that you copied in [Seedminer](seedminer)
+ `` is a 32-letter folder inside of the ``
+ If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3)
![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info}
1. Create a folder named `Nintendo DSiWare` inside of the ``
+ If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card
1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder
![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }})
{: .notice--info}
#### Section II - Hardware Button Check
In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page.
1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device
+ Keep holding the buttons until the device boots to a system update screen (this is Safe Mode)
1. If you see the system update screen, press Cancel
+ Your device will power off
+ If the device boots to the HOME Menu, just power off your device
___
### Next steps: Choose an exploit
If you saw the system update screen in the previous section, Safe Mode is working on your device.
If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm))
{: .notice--primary}
If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool))
{: .notice--info}