Guide_3DS/_pages/es_ES/installing-boot9strap-(fredtool).txt
ihaveahax e5569b7f06
New Crowdin updates (#2113)
* New translations bannerbomb3.txt (Italian)

* New translations seedminer.txt (Italian)

* New translations installing-boot9strap-(fredtool).txt (Romanian)

* New translations installing-boot9strap-(fredtool).txt (Polish)

* New translations installing-boot9strap-(fredtool).txt (Malay)

* New translations installing-boot9strap-(fredtool).txt (Croatian)

* New translations installing-boot9strap-(fredtool).txt (Thai)

* New translations installing-boot9strap-(fredtool).txt (Indonesian)

* New translations installing-boot9strap-(fredtool).txt (Portuguese, Brazilian)

* New translations installing-boot9strap-(fredtool).txt (Vietnamese)

* New translations installing-boot9strap-(fredtool).txt (Chinese Traditional)

* New translations installing-boot9strap-(fredtool).txt (Chinese Simplified)

* New translations installing-boot9strap-(fredtool).txt (Ukrainian)

* New translations installing-boot9strap-(fredtool).txt (Turkish)

* New translations installing-boot9strap-(fredtool).txt (Swedish)

* New translations installing-boot9strap-(fredtool).txt (Russian)

* New translations installing-boot9strap-(fredtool).txt (Portuguese)

* New translations installing-boot9strap-(fredtool).txt (Norwegian)

* New translations installing-boot9strap-(fredtool).txt (French)

* New translations installing-boot9strap-(fredtool).txt (Dutch)

* New translations installing-boot9strap-(fredtool).txt (Korean)

* New translations installing-boot9strap-(fredtool).txt (Japanese)

* New translations installing-boot9strap-(fredtool).txt (Italian)

* New translations installing-boot9strap-(fredtool).txt (Hungarian)

* New translations installing-boot9strap-(fredtool).txt (Hebrew)

* New translations installing-boot9strap-(fredtool).txt (Finnish)

* New translations installing-boot9strap-(fredtool).txt (Greek)

* New translations installing-boot9strap-(fredtool).txt (German)

* New translations installing-boot9strap-(fredtool).txt (Czech)

* New translations installing-boot9strap-(fredtool).txt (Catalan)

* New translations installing-boot9strap-(fredtool).txt (Bulgarian)

* New translations installing-boot9strap-(fredtool).txt (Arabic)

* New translations installing-boot9strap-(fredtool).txt (Spanish)

* New translations installing-boot9strap-(fredtool).txt (Pirate English)

* New translations installing-boot9strap-(fredtool).txt (Hungarian)

* New translations seedminer.txt (Hungarian)

* New translations installing-boot9strap-(usm).txt (Hungarian)

* New translations bannerbomb3.txt (Hungarian)

* New translations troubleshooting.txt (Hungarian)

* New translations installing-boot9strap-(usm).txt (Hungarian)
2022-10-13 08:50:41 -07:00

146 lines
9.2 KiB
Text

---
title: "Installing boot9strap (Fredtool)"
---
{% include toc title="Tabla de contenidos" %}
<details>
<summary><em>Technical Details (optional)</em></summary>
<p>This method of using Seedminer for further exploitation uses your <code>movable.sed</code> file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.</p>
<p>This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed <a href="https://www.3dbrew.org/wiki/3DS_System_Flaws">here</a>.</p>
</details>
{: .notice--info}
### Qué necesitas
* Tu archivo `movable.sed` proveniente de haber completado [Seedminer](seedminer)
* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`)
* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) (`boot.nds`)
* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file)
#### Sección I - Verificación de CFW
As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)).
1. Apaga tu consola
1. Mantén pulsado el botón (Select)
1. Enciende la consola mientras mantienes presionado (Select)
1. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide
1. Apaga tu consola
If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Sigue la sección de [Comprobación de CFW](checking-for-cfw) para actualizar tu CFW existente.
{: .notice--danger}
#### Sección II - BannerBomb3
In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section.
1. Vuelve a insertar tu tarjeta SD en tu consola
1. Enciende tu consola
1. Entra a Configuración de la consola
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
+ Your device should show the BB3 multihax menu
+ If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#dsiware-management-menu-crashes-without-showing-bb3-multihax-menu-fredtool)
1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare"
+ Tu consola se apagará automáticamente
#### Section III - Prep Work
In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer.
1. Inserta tu tarjeta SD en tu computadora
1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer
1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters)
1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option
1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option
1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit)
1. Click "Build"
+ Wait a few seconds for the build process to complete
1. In the Build History section on the left, type the Username into the "Filter Builds" field
1. Click on the first search result
+ This result should have the latest timestamp
1. Click the "output_(name).zip" link
1. Ve a `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` en tu tarjeta SD
+ `<ID0>` is the 32-letter folder name that you copied in [Seedminer](seedminer)
+ `<ID1>` is a 32-letter folder inside of the `<ID0>`
1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder
1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder
![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info}
1. Copia los archivos `boot.firm` y `boot.3dsx` desde el `.zip` de Luma3DS a la raíz de tu tarjeta SD
+ La raíz de tu tarjeta SD se refiere al primer directorio de la tarjeta, donde puedes ver la carpeta Nintendo 3DS pero no estás dentro de ella
1. Copia `boot.nds` (B9STool) a la raíz de tu tarjeta SD
1. Copia la carpeta `private` contenida en el `.zip` de Frogminer_save a la raíz de tu tarjeta SD
![]({{ "/images/screenshots/fredtool-root-layout.png" | absolute_url }})
{: .notice--info}
#### Section IV - Overwriting DS Connection Settings
In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio.
1. Enciende tu consola
1. Entra a Configuración de la consola
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
1. Select the "Haxxxxxxxxx!" title
1. Selecciona "Copiar", luego "OK"
1. Regresa al menú principal de Configuración de la Consola
1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png))
1. Si el exploit fue exitoso, tu consola habrá cargado la versión japonesa de Flipnote Studio
#### Section V - Flipnote Exploit
Si prefieres una guía visual para esta parte, hay una disponible [aquí](https://zoogie.github.io/web/flipnote_directions/).
{: .notice--info}
In this section, you will perform a series of very specific steps within Flipnote Studio that, when performed correctly, will launch the boot9strap (custom firmware) installer.
1. Completa la configuración del juego hasta que llegues al menú principal
+ Selecciona la opción de la izquierda cuando te lo pida durante la configuración inicial
1. Utilizando la pantalla táctil, selecciona el cuadrado grande de la izquierda, luego selecciona el cuadrado con el ícono de una tarjeta SD
1. Una vez que cargue el menú, selecciona el ícono con una cara, luego el ícono abajo a la derecha de la pantalla para continuar
1. Presiona (X) o (Arriba) en el D-Pad dependiendo de cuál se muestre en la pantalla superior
1. Elige el segundo botón de los que están en la parte de arriba, con un ícono de rollo de película
1. Ve hacia la derecha hasta seleccionar el carrete "3/3"
1. Toca el tercer cuadrado con una letra "A" en él
1. Ve hacia la izquierda hasta el carrete "1/3"
1. Toca el cuarto cuadrado con una letra "A" en él
1. Si el exploit fue exitoso, tu consola habrá cargado b9sTool
1. Usando el D-Pad, selecciona "Install boot9strap"
+ If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to open System Settings, then start over from Step 7 of Section III
1. Presiona (A), luego presiona START y SELECT al mismo tiempo para iniciar el proceso
1. Una vez completado y con la pantalla inferior diciendo "done.", sal de b9sTool, y luego apaga tu consola
+ Puede que tengas que forzar el apagado manteniendo pulsado el botón de encendido
+ If your device shuts down when you try to power it on, ensure that you have copied `boot.firm` from the Luma3DS `.zip` to the root of your SD card
+ If you see the Luma Configuration screen, press (Start) to reboot, then continue with the guide
#### Section VI - Luma3DS Verification
Due to the nature of the exploit used, it is occasionally (but rarely) possible for boot9strap to not actually get installed. This section will therefore verify that boot9strap was successfully installed by seeing if some files that are normally automatically generated by Luma3DS were created.
1. Apaga tu consola
1. Inserta tu tarjeta SD en tu computadora
1. Verify that a `luma` folder exists and that `config.ini` is inside of it
+ The existence of these folders and files confirms that Luma3DS is installed
+ If you do not see the `luma` folder or `config.ini`, [follow this troubleshooting guide](https://github.com/zoogie/b9sTool/blob/master/TROUBLESHOOTING.md)
At this point, your console will boot to Luma3DS by default.
+ Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware.
+ On the next page, you will install useful homebrew applications to complete your setup.
#### Section VII - Restoring DS Connection Settings
In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV.
1. Ve a `Nintendo 3DS` -> `<ID0>` -> `<ID1>` -> `Nintendo DSiWare` en tu tarjeta SD
1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one
1. Vuelve a insertar tu tarjeta SD en tu consola
1. Enciende tu consola
1. Entra a Configuración de la consola
1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
1. Select the "Nintendo DSi™" title
1. Selecciona "Copiar", luego "OK"
___
### Continúa en [Finalizar instalación](finalizing-setup)
{: .notice--primary}