e5942ca11b
- Convert FAQ and Troubleshooting pages to clickable dropdowns to improve readability. - Add separate table of contents to Troubleshooting (for mobile users) - Remove a couple of irrelevant troubleshooting - Update pages that link to troubleshooting to use new headers
150 lines
8.8 KiB
Text
150 lines
8.8 KiB
Text
---
|
|
title: "Installing boot9strap (Fredtool)"
|
|
---
|
|
|
|
{% include toc title="Table of Contents" %}
|
|
|
|
{% capture technical_info %}
|
|
<summary><em>Technical Details (optional)</em></summary>
|
|
|
|
This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.
|
|
|
|
This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws).
|
|
|
|
{% endcapture %}
|
|
<details>{{ technical_info | markdownify }}</details>
|
|
{: .notice--info}
|
|
|
|
### What You Need
|
|
|
|
* Your `movable.sed` file from completing [Seedminer](seedminer)
|
|
* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`)
|
|
* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`)
|
|
* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file)
|
|
|
|
#### Section I - CFW Check
|
|
|
|
As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)).
|
|
|
|
1. Power off your device
|
|
1. Hold the (Select) button
|
|
1. Power on your device while still holding the (Select) button
|
|
1. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide
|
|
1. Power off your device
|
|
|
|
If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW.
|
|
{: .notice--danger}
|
|
|
|
#### Section II - BannerBomb3
|
|
|
|
In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section.
|
|
|
|
1. Reinsert your SD card into your device
|
|
1. Power on your device
|
|
1. Launch System Settings on your device
|
|
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
|
|
+ Your device should show the BB3 multihax menu
|
|
+ If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
|
|
1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare"
|
|
+ Your device will automatically reboot
|
|
1. Power off your device
|
|
|
|
#### Section III - Prep Work
|
|
|
|
In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer.
|
|
|
|
1. Insert your SD card into your computer
|
|
1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer
|
|
1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters)
|
|
1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option
|
|
1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option
|
|
1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit)
|
|
1. Click "Build"
|
|
+ Wait a few seconds for the build process to complete
|
|
1. In the Build History section on the left, type the Username into the "Filter Builds" field
|
|
1. Click on the first search result
|
|
+ This result should have the latest timestamp
|
|
1. Click the "output_(name).zip" link
|
|
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` on your SD card
|
|
+ `<ID0>` is the 32-letter folder name that you copied in [Seedminer](seedminer)
|
|
+ `<ID1>` is a 32-letter folder inside of the `<ID0>`
|
|
1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder
|
|
1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder
|
|
![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info}
|
|
1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
|
|
+ The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
|
|
1. Copy `boot.nds` (B9STool) to the root of your SD card
|
|
1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card
|
|
1. Reinsert your SD card into your device
|
|
1. Power on your device
|
|
|
|
![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }})
|
|
{: .notice--info}
|
|
|
|
#### Section IV - Overwriting DS Connection Settings
|
|
|
|
In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio.
|
|
|
|
1. Launch System Settings on your device
|
|
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
|
|
1. Select the "Haxxxxxxxxx!" title
|
|
1. Select "Copy", then select "OK"
|
|
1. Return to main menu of the System Settings
|
|
1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png))
|
|
1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio
|
|
|
|
#### Section V - Flipnote Exploit
|
|
|
|
If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/).
|
|
{: .notice--info}
|
|
|
|
In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer.
|
|
|
|
1. Complete the initial setup process for the launched game until you reach the main menu
|
|
+ Select the left option whenever prompted during the setup process
|
|
1. Using the touch-screen, select the large left box, then select the box with an SD card icon
|
|
1. Once the menu loads, select the face icon, then the bottom right icon to continue
|
|
1. Press (X) or (UP) on the D-Pad depending on which is shown on the top screen
|
|
1. Select the second button along the top with a film-reel icon
|
|
1. Scroll right until reel "3/3" is selected
|
|
1. Tap the third box with the letter "A" in it
|
|
1. Scroll left until reel "1/3" is selected
|
|
1. Tap the fourth box with the letter "A" in it
|
|
1. If the exploit was successful, your device will have loaded b9sTool
|
|
1. Using the D-Pad, move to "Install boot9strap"
|
|
+ If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 6 of Section IV
|
|
1. Press (A), then press START and SELECT at the same time to begin the process
|
|
1. Once completed and the bottom screen says "done.", exit b9sTool, then power off your device
|
|
+ You may have to force power off by holding the power button
|
|
+ If your device shuts down when you try to power it on, ensure that you have copied `boot.firm` from the Luma3DS `.zip` to the root of your SD card
|
|
+ If you see the Luma Configuration screen, power off your device and continue to the next section
|
|
|
|
#### Section VI - Luma3DS Configuration
|
|
|
|
1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration
|
|
+ Luma3DS configuration menu are settings for the Luma3DS custom firmware. Many of these settings may be useful for customization or debugging
|
|
+ For the purpose of this guide, these settings will be left on default settings
|
|
+ If you boot to HOME Menu, [follow this troubleshooting guide](https://github.com/zoogie/b9sTool/blob/master/TROUBLESHOOTING.md)
|
|
1. Press (Start) to save and reboot
|
|
|
|
At this point, your console will boot to Luma3DS by default.
|
|
+ Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware.
|
|
+ On the next page, you will install useful homebrew applications to complete your setup.
|
|
|
|
#### Section VII - Restoring DS Connection Settings
|
|
|
|
In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV.
|
|
|
|
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` on your SD card
|
|
1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one
|
|
1. Reinsert your SD card into your device
|
|
1. Power on your device
|
|
1. Launch System Settings on your device
|
|
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
|
|
1. Select the "Nintendo DSi™" title
|
|
1. Select "Copy", then select "OK"
|
|
|
|
___
|
|
|
|
### Continue to [Finalizing Setup](finalizing-setup)
|
|
{: .notice--primary}
|