Guide_3DS/_pages/pt_PT/Decrypt9-(MSET).txt
2018-11-18 19:15:36 -05:00

36 lines
No EOL
1.6 KiB
Text

---
title: "Decrypt9 (MSET)" #
lang: en
permalink: /decrypt9-(mset).html
---
O primeiro passo deste guia é conseguir executar o Decrypt9, uma ferramenta multifunções que nos permitirá instalar a versão 2.1.0, a qual contém uma vulnerabilidade necessária para desbloquear o sistema.
{: .notice}
If you have already hacked your 3DS before and have a EmuNAND based CFW setup, this guide deals exclusively with SysNAND and you should follow all instructions from within or applying to SysNAND. Note that the terms EmuNAND and RedNAND refer to slightly different implementations of [the same concept](http://3dbrew.org/wiki/NAND_Redirection).
{: .notice--info}
#### Requisitos
* DS flashcard that works on your 3DS version
* A versão mais recente do [Decrypt9WIP]
(https://github.com/d0k3/Decrypt9WIP/releases/latest/)
#### Instruções
1. Cria uma pasta chamada `files9` na raiz do teu cartão SD se ainda não existir
2. Copy `Launcher.dat` and `Decrypt9WIP.dat` from the Decrypt9WIP `.zip` to the root of your SD card
3. Reinsere o teu cartão SD na tua 3DS
4. Put `Decrypt9.nds` from the Decrypt9 `.zip` on your DS flashcard
5. Start your DS flashcard from your 3DS
6. Boot `Decrypt9.nds` using your flashcart
7. Seleciona a opção correcta para a versão do teu sistema
+ 4.X.X -> "4.x Decrypt9WIP"
+ 6.X.X -> "6.x Decrypt9WIP"
8. Reboot the system, then go to System Settings, then "Other Settings", then "Profile", then "Nintendo DS Profile"
9. If the exploit was successful, you will have booted into Decrypt9
___
Continua para [2.1.0 ctrtransfer](2.1.0-ctrtransfer).
{: .notice--primary}