Installing boot9strap (Fredtool)


Für Support auf Englisch, bitte um Hilfe auf dem Nintendo Homebrew Discord.
If you appreciate this guide, we accept Donations.

Required Reading

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, for example from BannerBomb or the DSiWare Dumper tool.

Dies ist eine zurzeit funktionierende Implementation des “FIRM Partitions Known-Plaintext”-Exploits. Details findest du hier.

Was du brauchst

  • A DSiWare Backup (You should have one on the root of your SD card from following BannerBomb3)
  • Your movable.sed file from completing Seedminer
  • The latest release of Frogminer_save (Frogminer_save.zip)
  • The latest release of b9sTool (boot.nds)
  • The latest release of Luma3DS (the Luma3DS .zip file)

Section I - CFW Check

  1. Schalte deinen 3DS aus
  2. Hold the (Select) button
  3. Power on your device while still holding the (Select) button
  4. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide

If you see a configuration menu, you already have CFW, and continuing with these instructions may BRICK your device! Follow Checking for CFW to upgrade your existing CFW.

Section II - Prep Work

  1. Schalte deinen 3DS aus
  2. Stecke deine SD-Karte in deinen Computer
  3. Copy boot.firm and boot.3dsx from the Luma3DS .zip to the root of your SD card
    • The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
  4. Copy boot.nds (B9STool) to the root of your SD card
  5. Copy the private folder from the Frogminer_save .zip to the root of your SD card

Section III - Fredtool

  1. Open Fredtool on your computer
  2. Select your movable.sed file for the “Your movable.sed” field
  3. Select your DSiWare Backup (<8-character-id>.bin) file for the “Your dsiware.bin” field
  4. Select “Verify files”
  5. Select “Build and Download”
  6. Wait for the process to complete
  7. When the process is completed, download your modified DSiWare archive from the site
    • This file contains 2 DSiWare backup files, one clean (unmodified) and one hax (exploited)
  8. Navigate to Nintendo 3DS -> <ID0> -> <ID1> -> Nintendo DSiWare on your SD card
    • The <ID0> will be the same one that you used in Seedminer
    • The <ID1> is a 32 character long folder inside of the <ID0>
    • If the Nintendo DSiWare folder does not exist, create it inside of the <ID1>
  9. Copy the 42383841.bin file from the output/hax/ folder of the downloaded DSiWare archive (fredtool.zip) to the Nintendo DSiWare folder
  10. Stecke deine SD-Karte nun wieder in deinen 3DS
  11. Schalte deine Konsole an
  12. Launch System Settings on your device
  13. Navigate to Data Management -> DSiWare
  14. Under the “SD Card” section, select the “Haxxxxxxxxx!” title
  15. Select “Copy”, then select “OK”
  16. Return to main menu of the System Settings
  17. Navigate to Internet Settings -> Nintendo DS Connections, then select “OK”
  18. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio

Section IV - Flipnote Exploit

If you would prefer a visual guide to this section, one is available here.

  1. Complete the initial setup process for the launched game until you reach the main menu
    • Select the left option whenever prompted during the setup process
  2. Using the touch-screen, select the large left box, then select the box with an SD card icon
  3. Once the menu loads, select the face icon, then the bottom right icon to continue
  4. Press (X) or (UP) on the D-Pad depending on which is shown on the top screen
  5. Select the second button along the top with a film-reel icon
  6. Scroll right until reel “3/3” is selected
  7. Tap the third box with the letter “A” in it
  8. Scroll left until reel “1/3” is selected
  9. Tap the fourth box with the letter “A” in it
  10. If the exploit was successful, your device will have loaded b9sTool
  11. Using the D-Pad, move to “Install boot9strap”
    • If you miss this step, the system will exit to HOME Menu instead of installing boot9strap and you will need to start over from Step 12 of Section III
  12. Press (A), then press START and SELECT at the same time to begin the process
  13. Once completed and the bottom screen says “done.”, exit b9sTool, then power off your device
    • Unter Umständen musst du das Ausschalten der Konsole erzwingen indem du den Power-Knopf gedrückt hälst
    • If your device shuts down when you try to power it on, ensure that you have copied boot.firm from the Luma3DS .zip to the root of your SD card
    • If you see the Luma Configuration screen, press (Start) to reboot, then continue with the guide

Section V - Luma3DS Verification

  1. Schalte deinen 3DS aus
  2. Stecke deine SD-Karte in deinen Computer
  3. Verify that a luma folder exists and that config.ini is inside of it

At this point, your console will boot to Luma3DS by default.

  • Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware.
  • On the next page, you will install useful homebrew applications to complete your setup.

Section VI - Restoring DS Connection Settings

  1. Copy the 42383841.bin file from the output/clean/ folder of the downloaded DSiWare archive (fredtool.zip) to the Nintendo 3DS/<ID0>/<ID1>/Nintendo DSiWare/ folder on your SD card
    • Replace the existing 42383841.bin file
  2. Stecke deine SD-Karte nun wieder in deinen 3DS
  3. Schalte deine Konsole an
  4. Launch System Settings on your device
  5. Navigate to Data Management -> DSiWare
  6. Under the “SD Card” section, select the “Nintendo DSi™” title
  7. Select “Copy”, then select “OK”

Fortfahren mit Setup fertigstellen