BannerBomb3
Technical Details (optional)
To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.
To accomplish this, we use your system’s encryption key (movable.sed) to build a DSiWare backup that exploits the system.
For a more technical explanation, see here.
Compatibility Notes
Estas instrucciones funcionan en consolas de las regiones USA, Europa, Japón y Corea, indicado por las letras U, E, J o K después de la versión del sistema.
If you have a Taiwanese console (indicated by a T after the system version), follow this page instead.
Qué necesitas
- Tu archivo
movable.sed
proveniente de haber completado Seedminer
Sección I - Preparativos
In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device’s SD card.
- Apaga tu consola
- Inserta tu tarjeta SD en tu computadora
- Open Bannerbomb3 Injector on your computer
- Upload your movable.sed using the “Choose File” option
- Click “Build and Download”
- This will download an exploit DSiWare called
F00D43D5.bin
and a payload calledbb3.bin
inside of a zip archive (DSIWARE_EXPLOIT.zip
)
- This will download an exploit DSiWare called
- Copy
bb3.bin
fromDSIWARE_EXPLOIT.zip
to the root of your SD card- La raíz de tu tarjeta SD se refiere al primer directorio de la tarjeta, donde puedes ver la carpeta Nintendo 3DS pero no estás dentro de ella
- La raíz de tu tarjeta SD se refiere al primer directorio de la tarjeta, donde puedes ver la carpeta Nintendo 3DS pero no estás dentro de ella
- Navigate to
Nintendo 3DS
-><ID0>
-><ID1>
on your SD card<ID0>
is the 32-letter folder name that you copied in Seedminer<ID1>
is a 32-letter folder inside of the<ID0>
- Create a folder named
Nintendo DSiWare
inside of the<ID1>
- If you already had the folder and there are any existing DSiWare backup files (
<8-character-id>.bin
) inside, copy them to your PC and remove them from your SD card
- If you already had the folder and there are any existing DSiWare backup files (
- Copy the
F00D43D5.bin
file fromDSIWARE_EXPLOIT.zip
to theNintendo DSiWare
folder
Section II - Hardware Button Check
In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page.
- With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device
- Keep holding the buttons until the device boots into Safe Mode (a “system update” menu)
- If prompted to update, press Cancel
- Your device will power off
- If the device boots to the HOME Menu, just power off your device
Next steps: Choose an exploit
If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device.
If your device booted into Safe Mode, continue to Installing boot9strap (USM)
If your device did NOT boot into Safe Mode, continue to Installing boot9strap (Fredtool)