BannerBomb3


Voor hulp in het Engels kan je terecht bij Nintendo Homebrew op Discord.
Vind je dit een goede handleiding? We accepteren donaties.

Technical Details (optional)

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

For a more technical explanation, see here.

Compatibility Notes

Deze instructies werken aan de consoles van de VS, Europa, Japan en Korea zoals aangegeven in de letters U, E, J, of K na de systeemversie.

Als je een Taiwanese console hebt (aangegeven door een T na de systeemversie), volg dan deze pagina.

Wat je nodig hebt

  • Je movable.sed bestand van het voltooien van Seedminer

Deel I - Voorbereiding

In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device’s SD card.

  1. Schakel je 3DS uit
  2. Plaats je SD-kaart in je computer
  3. Open Bannerbomb3 Injector on your computer
  4. Upload your movable.sed using the “Choose File” option
  5. Click “Build and Download”
    • This will download an exploit DSiWare called F00D43D5.bin and a payload called bb3.bin inside of a zip archive (DSIWARE_EXPLOIT.zip)
  6. Copy bb3.bin from DSIWARE_EXPLOIT.zip to the root of your SD card
    • De hoofdmap van de SD-kaart verwijst naar de bovenste map van de SD-kaart, waarin je alle mappen op de SD-kaart kunt zien, waaronder de Nintendo 3DS map, zonder je in de Nintendo 3DS map te bevinden
  7. Navigate to Nintendo 3DS -> <ID0> -> <ID1> on your SD card
    • <ID0> is the 32-letter folder name that you copied in Seedminer
    • <ID1> is a 32-letter folder inside of the <ID0>
  8. Create a folder named Nintendo DSiWare inside of the <ID1>
    • If you already had the folder and there are any existing DSiWare backup files (<8-character-id>.bin) inside, copy them to your PC and remove them from your SD card
  9. Copy the F00D43D5.bin file from DSIWARE_EXPLOIT.zip to the Nintendo DSiWare folder

Section II - Hardware Button Check

In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page.

  1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device
    • Keep holding the buttons until the device boots into Safe Mode (a “system update” menu)
  2. If prompted to update, press Cancel
    • Your device will power off
    • If the device boots to the HOME Menu, just power off your device

Next steps: Choose an exploit

If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device.

If your device booted into Safe Mode, continue to Installing boot9strap (USM)

If your device did NOT boot into Safe Mode, continue to Installing boot9strap (Fredtool)