Guide_3DS/_pages/vi_VN/installing-boot9strap-(usm).txt
ihaveahax 987a8ba80e
New Crowdin updates (#2076)
* New translations finalizing-setup.txt (French)

* New translations installing-boot9strap-(usm).txt (French)

* New translations finalizing-setup.txt (Spanish)

* New translations installing-boot9strap-(usm).txt (Spanish)

* New translations installing-boot9strap-(usm).txt (Romanian)

* New translations finalizing-setup.txt (Romanian)

* New translations finalizing-setup.txt (Korean)

* New translations installing-boot9strap-(usm).txt (Korean)

* New translations finalizing-setup.txt (Czech)

* New translations installing-boot9strap-(usm).txt (Czech)

* New translations finalizing-setup.txt (German)

* New translations installing-boot9strap-(usm).txt (German)

* New translations installing-boot9strap-(usm).txt (Catalan)

* New translations finalizing-setup.txt (Bulgarian)

* New translations finalizing-setup.txt (Arabic)

* New translations installing-boot9strap-(usm).txt (Arabic)

* New translations installing-boot9strap-(usm).txt (Bulgarian)

* New translations finalizing-setup.txt (Catalan)

* New translations finalizing-setup.txt (Hebrew)

* New translations installing-boot9strap-(usm).txt (Finnish)

* New translations installing-boot9strap-(usm).txt (Hebrew)

* New translations finalizing-setup.txt (Finnish)

* New translations installing-boot9strap-(usm).txt (Greek)

* New translations finalizing-setup.txt (Greek)

* New translations installing-boot9strap-(usm).txt (Italian)

* New translations finalizing-setup.txt (Italian)

* New translations finalizing-setup.txt (Hungarian)

* New translations installing-boot9strap-(usm).txt (Hungarian)

* New translations finalizing-setup.txt (Norwegian)

* New translations installing-boot9strap-(usm).txt (Norwegian)

* New translations finalizing-setup.txt (Polish)

* New translations installing-boot9strap-(usm).txt (Polish)

* New translations finalizing-setup.txt (Portuguese)

* New translations finalizing-setup.txt (Japanese)

* New translations installing-boot9strap-(usm).txt (Japanese)

* New translations finalizing-setup.txt (Dutch)

* New translations installing-boot9strap-(usm).txt (Dutch)

* New translations finalizing-setup.txt (Turkish)

* New translations installing-boot9strap-(usm).txt (Turkish)

* New translations finalizing-setup.txt (Ukrainian)

* New translations installing-boot9strap-(usm).txt (Ukrainian)

* New translations finalizing-setup.txt (Chinese Simplified)

* New translations installing-boot9strap-(usm).txt (Portuguese)

* New translations finalizing-setup.txt (Russian)

* New translations installing-boot9strap-(usm).txt (Russian)

* New translations finalizing-setup.txt (Swedish)

* New translations installing-boot9strap-(usm).txt (Swedish)

* New translations installing-boot9strap-(usm).txt (Chinese Simplified)

* New translations finalizing-setup.txt (Chinese Traditional)

* New translations finalizing-setup.txt (Indonesian)

* New translations installing-boot9strap-(usm).txt (Indonesian)

* New translations finalizing-setup.txt (Thai)

* New translations installing-boot9strap-(usm).txt (Portuguese, Brazilian)

* New translations installing-boot9strap-(usm).txt (Chinese Traditional)

* New translations finalizing-setup.txt (Vietnamese)

* New translations finalizing-setup.txt (Portuguese, Brazilian)

* New translations installing-boot9strap-(usm).txt (Vietnamese)

* New translations installing-boot9strap-(usm).txt (Pirate English)

* New translations finalizing-setup.txt (Pirate English)

* New translations installing-boot9strap-(usm).txt (Thai)

* New translations finalizing-setup.txt (Croatian)

* New translations installing-boot9strap-(usm).txt (Croatian)

* New translations finalizing-setup.txt (Malay)

* New translations installing-boot9strap-(usm).txt (Malay)
2022-09-06 14:23:54 +03:00

111 lines
5.9 KiB
Text

---
title: "Installing boot9strap (USM)"
---
{% include toc title="Table of Contents" %}
### Required Reading
In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.
We can do this using an existing exploit, BannerBomb3.
To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.
Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.
These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version.
If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow [an alternate branch of Seedminer](bannerbomb3). For assistance with this matter, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask, in English, for help.
{: .notice--warning}
### What You Need
* Your `movable.sed` file from completing [Seedminer](seedminer)
* The latest release of [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/download/v0.0.7/SafeB9SInstaller-20170605-122940.zip) (direct download)
* The latest release of [boot9strap](https://github.com/SciresM/boot9strap/releases/download/1.4/boot9strap-1.4.zip) (direct download)
* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file)
#### Section I - Prep Work
1. If your device is powered on, power off your device
1. Open [unSAFE_MODE Exploit Injector](https://3ds.nhnarwhal.com/3dstools/unsafemode.php) on your computer
1. Upload your movable.sed using the "Choose File" option
1. Click "Build and Download"
+ This will download an exploit DSiWare called `F00D43D5.bin` and a SAFE_MODE exploit data file called `usm.bin` inside of a zip archive (`unSAFE_MODE.zip`)
1. Insert your SD card into your computer
1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
+ The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
1. Create a folder named `boot9strap` on the root of your SD card
1. Copy `boot9strap.firm` and `boot9strap.firm.sha` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card
1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the root of your SD card
1. Copy `usm.bin` from `unSAFE_MODE.zip` to the root of your SD card
+ ![]({{ "/images/screenshots/usm-root-layout.png" | absolute_url }})
{: .notice--info}
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` on your SD card
+ The `<ID0>` will be the same one that you used in [Seedminer](seedminer)
+ The `<ID1>` is a 32 character long folder inside of the `<ID0>`
+ If `Nintendo DSiWare` does not exist, create it inside of the `<ID1>`
1. If there are any existing DSiWare backup files (`<8-character-id>.bin`) in this folder, move them to your PC
+ This will leave you with an empty Nintendo DSiWare folder. Moving the files to your PC ensures you don't delete any intentional backups
1. Copy the `F00D43D5.bin` file from `unSAFE_MODE.zip` to the `Nintendo DSiWare` folder
![]({{ "/images/screenshots/dsiware-save-location.png" | absolute_url }})
{: .notice--info}
#### Section II - BannerBomb3
1. Reinsert your SD card into your device
1. Power on your device
1. Launch System Settings on your device
1. Navigate to `Data Management` -> `DSiWare`
1. Click on the SD Card section
+ Your device should show a menu with some text
1. Select "Inject haxx"
+ Your device will automatically power off
#### Section III - unSAFE_MODE
1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), then press (Power)
+ Keep holding the buttons until the device boots into Safe Mode
1. Press "OK" to accept the update
+ There is no update. This is part of the exploit
1. Press "I accept" to accept the terms and conditions
1. The update will eventually fail, with the error code `003-1099`. This is intended behaviour
1. When asked "Would you like to configure Internet settings?", select "Yes"
1. On the following menu, navigate to `Connection 1` -> `Change Settings` -> `Next Page (right arrow)` -> `Proxy Settings` -> `Detailed Setup`
+ This is a [visual representation](https://uwuu.ca/images/safemode_highlighted.png)
1. If the exploit was successful, your device will have booted into SafeB9SInstaller
#### Section IV - Installing boot9strap
1. When prompted, input the key combo given on the top screen to install boot9strap
+ If the top screen is blank, power off your device and re-do Section III
1. Once it is complete, press (A) to reboot your device
1. Your device should have rebooted into the Luma3DS configuration menu
+ If your device shuts down when you try to power it on, ensure that you have copied `boot.firm` from the Luma3DS `.zip` to the root of your SD card
1. Press (Start) to save and reboot
At this point, your console will boot to Luma3DS by default.
+ Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware.
+ On the next page, you will install useful homebrew applications to complete your setup.
#### Section V - Restoring WiFi Configuration Profiles
1. Launch System Settings on your device
1. Navigate to `Data Management` -> `DSiWare`
1. Click on the SD Card section
+ Your device should show a menu with some text
1. Select "Restore slots"
+ Your device will automatically reboot
1. Power off your device
1. Insert your SD card into your computer
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` on your SD card
1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder
___
### Continue to [Finalizing Setup](finalizing-setup)
{: .notice--primary}