Technical Details (optional)
To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.
To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.
For a more technical explanation, see here.
{: .notice--info}
### Compatibility Notes
These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version.
If you have a Taiwanese console (indicated by a T after the system version), follow [this page](bannerbomb3-fredtool-(twn)) instead.
{: .notice--warning}
### What You Need
* Your `movable.sed` file from completing [Seedminer](seedminer)
#### Section I - Prep Work
In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card.
1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer
1. Upload your movable.sed using the "Choose File" option
1. Click "Build and Download"
+ This will download an exploit DSiWare called `F00D43D5.bin` inside of a zip file (`BannerBomb3.zip`)
1. If your console is powered on, power off your console
1. Insert ye SD card into ye computer
1. Navigate to `Nintendo 3DS` -> `