boot9strap(USM) の導入


英語によるサポートについては、 Nintendo Homebrew on Discord のヘルプをご覧ください。
If you appreciate this guide, we accept Donations.

Technical Details (optional)

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

We can do this using an existing exploit, BannerBomb3.

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

Compatibility Notes

これらのガイドは、システムバージョン末尾にある「U、E、J、K」にあるように、米国、欧州、日本、韓国の端末で機能します。

If your (Right/Left Shoulder), (D-Pad Up), or (A) buttons do not work, you will need to follow an alternate branch of Seedminer. For assistance with this matter, join Nintendo Homebrew on Discord and ask, in English, for help.

必要なもの

  • Seedminer でダウンロードした movable.sed ファイル
  • The latest release of SafeB9SInstaller (direct download)
  • The latest release of boot9strap (direct download)
  • The latest release of Luma3DS (the Luma3DS .zip file)

セクション I - 準備

In this section, you will copy the files needed to trigger the BannerBomb3 and unSAFE_MODE exploits onto your device’s SD card.

  1. 本体の電源が入っている場合、本体の電源を切ります
  2. Open unSAFE_MODE Exploit Injector on your computer
  3. “ファイルを選択”から movable.sed ファイルをアップロードします。
  4. 「Build and Download」をクリックしてください。
    • This will download an exploit DSiWare called F00D43D5.bin and a SAFE_MODE exploit data file called usm.bin inside of a zip archive (unSAFE_MODE.zip)
  5. パソコンにSDカードを入れます
  6. boot.firmboot.3dsx をLuma3DSの .zip からSDカードのルートにコピーします
    • SDカードのルートとは、Nintendo 3DSのフォルダなどがある最初の項目のことであり、フォルダの中ではありません。
  7. boot9strapという名前のフォルダをSDカードのルート上に作成します。
  8. boot9strap.firmboot9strap.firm.shaを boot9strap .zip ファイルから解凍し、SD カードのboot9strapフォルダにコピーします。
  9. SafeB9SInstaller .zip からSafeB9SInstaller.binをSDカードのルートへコピーします
  10. Copy usm.bin from unSAFE_MODE.zip to the root of your SD card
  11. Navigate to Nintendo 3DS -> <ID0> -> <ID1> on your SD card
    • <ID0> is the 32-letter folder name that you copied in Seedminer
    • <ID1> is a 32-letter folder inside of the <ID0>
  12. Create a folder named Nintendo DSiWare inside of the <ID1>
    • If you already had the folder and there are any existing DSiWare backup files (<8-character-id>.bin) inside, copy them to your PC and remove them from your SD card
  13. Copy the F00D43D5.bin file from unSAFE_MODE.zip to the Nintendo DSiWare folder

セクション II - BannerBomb3

In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu, which can be used to overwrite your Wi-Fi slots with hacked data. Your Wi-Fi connection settings will be temporarily overwitten while the exploit is active.

  1. 再度、SDカードを本体に挿入してください。
  2. 本体の電源を入れます
  3. 「本体設定」を開きます。
  4. Navigate to Data Management -> DSiWare-> SD Card (image)
  5. Press (A) to select “Inject haxx”
    • Your device will automatically power off

セクション III - unSAFE_MODE

In this section, you will enter Safe Mode (a feature available on all 3DS family devices) and navigate to a menu where unSAFE_MODE will be triggered, which will launch you into the boot9strap (custom firmware) installer.

  1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device
    • Keep holding the buttons until the device boots into Safe Mode (a “system update” menu)
    • If you’re unable to get into Safe Mode after multiple attempts, one of your buttons may be failing or broken. If this is the case, you will need to follow an alternate branch of Seedminer. For assistance with this matter, join Nintendo Homebrew on Discord and ask, in English, for help.
  2. 「OK」を押して更新を承認します
    • アップデートはありません。 そういう仕組みになっています
  3. 「承諾」を押して利用規約に同意します
  4. The update will eventually fail, with the error code 003-1099. これもそうなるように仕込まれています
  5. 「インターネット設定を設定しますか?」と聞かれたら、「はい」を選択します。
  6. On the following menu, navigate to Connection 1 -> Change Settings -> Next Page (right arrow) -> Proxy Settings -> Detailed Setup (image)
  7. If the exploit was successful, your device will have booted into SafeB9SInstaller

Section IV - Installing boot9strap

In this section, you will install custom firmware onto your device.

  1. When prompted, input the key combo given on the top screen to install boot9strap
    • If the top screen is blank, power off your device and re-do Section III
  2. Once it is complete, press (A) to reboot your device
  3. デバイスはLuma3DS設定メニューに再起動します
    • If your device shuts down when you try to power it on, ensure that you have copied boot.firm from the Luma3DS .zip to the root of your SD card
  4. (Start) を押してセーブして再起動します

At this point, your console will boot to Luma3DS by default.

  • Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware.
  • On the next page, you will install useful homebrew applications to complete your setup.

Section V - Restoring WiFi Configuration Profiles

In this section, you will trigger the BannerBomb3 exploit a second time so that you can restore the Wi-Fi connection slots that were overwritten in Section II.

  1. 「本体設定」を開きます。
  2. Navigate to Data Management -> DSiWare-> SD Card (image)
  3. Use the D-Pad to navigate and press the (A) button to select “Restore slots”
    • Your device will automatically reboot
  4. 本体の電源を切ります。
  5. パソコンにSDカードを入れます
  6. SDカードのNintendo 3DS -> <ID0> -> <ID1> -> Nintendo DSiWareへ移動します
  7. Delete F00D43D5.bin from your Nintendo DSiWare folder and from your computer. このファイルはもう必要ありません。

セットアップを完了する へ進みます