9.1 KiB
9.1 KiB
title | permalink | lang | ref |
---|---|---|---|
Hardmod Downgrade | /hardmod-downgrade.html | en_US | hardmod-downgrade |
An excellent guide to getting a hardmod can be found here. If you are on a New 3DS, read this before hardmodding. {: .notice--info}
This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here. {: .notice--info}
This will work on New 3DS, Old 3DS, and 2DS. {: .notice--success}
What you need
- Your NAND image extracted using your hardmod
- The latest version of autofirm
- The latest release of 3DSident
- The NFIRM
.zip
corresponding to your device and version:
Instructions_
Section I - NAND modification
- Extract the autofirm
.zip
to a folder calledautofirm
- Place a copy of your NAND backup (named
nand.bin
) in/autofirm/
folder - Copy the contents of the NFIRM
.zip
to the/autofirm/source/firmwares/
folder - Run
autofirm.bat
and select which device and version the NAND backup is for - Wait while the script runs
- If everything worked, then your original NAND will have been renamed to
backup_nand.bin
and you will have a modifiednand.bin
containing the 10.4.0 NATIVE_FIRM
- Keep
backup_nand.bin
, it will be used later
- Flash this
nand.bin
to your device with your hardmod
Section II - Exploit verification
- Copy and merge the
3ds
folder from the 3DSident.zip
to your device's SD card - Reinsert your SD card into your 3DS
- Use Homebrew Launcher (SoundHax) to launch the homebrew launcher on the device
- Launch 3DSident
- Verify that the following:
- Kernel version: 2.50-11
- FIRM version: 2.50-11
- If either of these do not display the versions above, something has gone wrong and you should try again from the beginning
Your version number will not have changed in the settings. {: .notice--info}
Continue to Decrypt9 (Homebrew Launcher). {: .notice--primary}