Installing Boot9strap (Fredtool)


For support in English, ask for help at Nintendo Homebrew on Discord.
If you appreciate this guide, I accept Donations.


Required Reading

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare eShop title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to already own (or download / buy) a DSiWare game from the eShop.

This is a currently working implementation of the “FIRM partitions known-plaintext” exploit detailed here.

To use the magnet links on this page, you will need a torrent client like Deluge.

To extract the .7z and .rar files linked on this page, you will need a file archiver like 7-Zip or The Unarchiver.

What You Need

  • Any eShop DSiWare game
    • JPN region users can download the free title “ほぼ日の健康手帳™” ()
    • USA region users can download the free title “Nintendo Fan Network” ()
  • Your movable.sed file from completing Seedminer
  • The latest release of Frogminer_save
  • The latest release of b9sTool
  • The latest release of Luma3DS (the .7z file)
  • The latest release of the Homebrew Launcher

Section I - Prep Work

  1. Launch System Settings on your device
  2. Navigate to Data Management -> DSiWare
  3. Under the “System Memory” section, select your DSiWare game
  4. Select “Copy”, then select “OK”
    • If prompted, overwrite any existing copy
  5. Power off your device
  6. Insert your SD card into your computer
  7. Copy your movable.sed file to the root of your SD card
  8. Copy boot.firm from the Luma3DS .7z to the root of your SD card
  9. Copy boot.nds (B9STool) to the root of your SD card
  10. Copy boot.3dsx to the root of your SD card
  11. Copy the private folder from the Frogminer_save .zip to the root of your SD card
  12. Navigate to Nintendo 3DS -> <ID0> -> <32-character-id> -> Nintendo DSiWare on your SD card
    • This <ID0> will be the same one that you used in Seedminer
  13. Copy <8-character-id>.bin to a folder on your computer
    • If there are multiple <8-character-id>.bin files, just pick one. It doesn’t matter which you use.

Section II - Fredtool

  1. Open Fredtool on your computer
  2. Select your movable.sed file for the “Your movable.sed” field
  3. Select your <8-character-id>.bin file for the “Your dsiware.bin” field
  4. Complete the “I’m not a robot” captcha
  5. Select “Start”
  6. Wait for the process to complete
  7. When the process has completed, download your modified DSiWare archive from the site
  8. Copy the 42383841.bin file from the output/hax/ folder of the downloaded DSiWare archive to the Nintendo 3DS/<ID0>/<32-character-id>/Nintendo DSiWare/ folder on your SD card
    • This should be different than your initial <8-character-id>.bin file
    • Do not remove any existing <8-character-id>.bin files
  9. Reinsert your SD card into your device
  10. Power on your device
  11. Launch System Settings on your device
  12. Navigate to Data Management -> DSiWare
  13. Under the “SD Card” section, select the “Haxxxxxxxxx!” title
  14. Select “Copy”, then select “OK”
  15. Return to main menu of the System Settings
  16. Navigate to Internet Settings -> Nintendo DS Connections, then select “OK”
  17. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio

Section III - Flipnote Exploit

If you would prefer a visual guide to this section, one is available here.

  1. Complete the initial setup process for the launched game until you reach the main menu
    • Select the left option whenever prompted during the setup process
  2. Using the touch-screen, select the large left box, then select the box with an SD card icon
  3. Once the menu loads, select the face icon, then the bottom right icon to continue
  4. Select the frog icon at the bottom left
    • Alternatively, press (X) or (UP) on the D-Pad depending on which is shown on the top screen
  5. Select the second button along the top with a film-reel icon
  6. Scroll right until reel “3/3” is selected
  7. Tap the third box with the letter “A” in it
  8. Scroll left until reel “1/3” is selected
  9. Tap the fourth box with the letter “A” in it
  10. If the exploit was successful, your device will have loaded b9sTool
  11. Select “Install boot9strap” and confirm
  12. Exit b9sTool, then power off your device
    • You may have to force power off by holding the power button
    • If you see the Luma Configuration screen, continue with the guide without powering off

Section IV - Configuring Luma3DS

  1. Boot your device while holding (Select) to launch the Luma configuration menu
  2. Use the (A) button and the D-Pad to turn on the following:
    • “Show NAND or user string in System Settings”
  3. Press (Start) to save and reboot

Section V - Restoring DS Connection Settings

  1. Power off your device
  2. Insert your SD card into your computer
  3. Copy the 42383841.bin file from the output/clean/ folder of the downloaded DSiWare archive to the Nintendo 3DS/<ID0>/<32-character-id>/Nintendo DSiWare/ folder on your SD card
    • Replace the existing 42383841.bin file
  4. Reinsert your SD card into your device
  5. Power on your device
  6. Launch System Settings on your device
  7. Navigate to Data Management -> DSiWare
  8. Under the “SD Card” section, select the “Nintendo DSi™” title
  9. Select “Copy”, then select “OK”

Continue to Finalizing Setup