0d8dd25fdb
add screenshot for boot9strap folder add screenshot for 3ds folder add file layout screenshots for hbl-pichaxx and hbl-usm fix typo that breaks screenshot link in usm and hbl-usm remove some unnecessary indenting firwmare -> firmware id1 folder consistency based on what people should have at that point of the guide
64 lines
3.2 KiB
Text
64 lines
3.2 KiB
Text
---
|
|
title: "BannerBomb3"
|
|
---
|
|
|
|
{% include toc title="Table of Contents" %}
|
|
|
|
<details>
|
|
<summary><em>Technical Details (optional)</em></summary>
|
|
<p>To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.</p>
|
|
<p>To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.</p>
|
|
<p>For a more technical explanation, see <a href="https://github.com/zoogie/Bannerbomb3">here</a>.</p>
|
|
</details>
|
|
{: .notice--info}
|
|
|
|
### Compatibility Notes
|
|
|
|
These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version.
|
|
|
|
If you have a Taiwanese console (indicated by a T after the system version), follow [this page](bannerbomb3-fredtool-(twn)) instead.
|
|
{: .notice--warning}
|
|
|
|
### What You Need
|
|
|
|
* Your `movable.sed` file from completing [Seedminer](seedminer)
|
|
|
|
#### Section I - Prep Work
|
|
|
|
In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card.
|
|
|
|
1. Open [BannerBomb3 Tool](https://3ds.nhnarwhal.com/3dstools/bannerbomb3.php) on your computer
|
|
1. Upload your movable.sed using the "Choose File" option
|
|
1. Click "Build and Download"
|
|
+ This will download an exploit DSiWare called `F00D43D5.bin` inside of a zip file (`BannerBomb3.zip`)
|
|
1. If your console is powered on, power off your console
|
|
1. Insert your SD card into your computer
|
|
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` on your SD card
|
|
+ `<ID0>` is the 32-letter folder name that you copied in [Seedminer](seedminer)
|
|
+ `<ID1>` is a 32-letter folder inside of the `<ID0>`
|
|
![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info}
|
|
1. Create a folder named `Nintendo DSiWare` inside of the `<ID1>`
|
|
+ If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card
|
|
1. Copy the `F00D43D5.bin` file from `BannerBomb3.zip` to the `Nintendo DSiWare` folder
|
|
|
|
![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }})
|
|
{: .notice--info}
|
|
|
|
#### Section II - BannerBomb3
|
|
|
|
In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next page.
|
|
|
|
1. Reinsert your SD card into your device
|
|
1. Power on your device
|
|
1. Launch System Settings on your device
|
|
1. Navigate to `Data Management` -> `DSiWare` -> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
|
|
+ Your system should flash Magenta (pink/purple) and then crash a few seconds later. This means it worked
|
|
1. Power off your device
|
|
1. Insert your SD card into your computer
|
|
1. You should now have `42383841.bin` on the root of your SD card. Copy this file to somewhere on your computer, as you will use it on the next page
|
|
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` on your SD card
|
|
1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder and from your computer. This file will not be needed anymore
|
|
|
|
|
|
Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool))
|
|
{: .notice--primary}
|