Technical Details (optional)
To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.
To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.
For a more technical explanation, see here.
{: .notice--info}
### Compatibility Notes
这些操作可在美、欧、日、韩版的主机上工作,你可通过系统版本号末尾的 U,E,J,K 字符来区分主机版本。
如果你的主机是港台版的(系统版本号末尾以 T 结尾),请使用[这个方法](bannerbomb3-fredtool-(twn));不要使用本页的方法。
{: .notice--warning}
### 你需要准备点啥?
* 你在 [Seedminer](seedminer) 步骤中获得的 `movable.sed` 文件
#### 第一步 – 准备工作
In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card.
1. 将主机关机
1. 将你的 SD 卡插入到电脑
1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer
1. Upload your movable.sed using the “Choose File” option
1. Click “Build and Download”
+ This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`)
1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card
+ 根目录指的是你点进 SD 卡看到的目录,你可以在这个目录下看到 Nintendo 3DS 文件夹,但请不要点进去
![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info}
1. 打开内存卡的 `Nintendo 3DS` -> `