3DS:Alternate Exploits/Installing boot9strap (HBL-USM)

Required Reading
In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

As we already have homebrew access, we can use slotTool to do this.

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

What You Need

 * The latest release of SafeB9SInstaller (direct download)
 * The latest release of boot9strap (direct download)
 * The latest release of unSAFE_MODE
 * You may already have this from a prior section of the guide

Section I - Prep Work

 * 1) Your console should be powered on and showing the Homebrew Launcher from the previous part of the guide
 * 2) Launch slotTool from the list of homebrew
 * 3) *If you get stuck on a red screen, delete  from the   directory, then retry this section
 * 4) Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option
 * 5) *You will see some on-screen text and then your system will shut down
 * 6) Remove your SD card from your console and connect it to your computer
 * 7) Create a folder named  on the root of your SD card
 * 8) Copy  and   from the boot9strap   to the   folder on your SD card
 * 9) Copy  from the SafeB9SInstaller   to the root of your SD card
 * 10) Copy  from the unSAFE_MODE   to the root of your SD card
 * 11) Reinsert your SD card into your device

Section II - unSAFE_MODE

 * 1) With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), then press (Power)
 * 2) *Keep holding the buttons until the device boots into Safe Mode
 * 3) Press "OK" to accept the update
 * 4) *There is no update. This is part of the exploit
 * 5) Press "I accept" to accept the terms and conditions
 * 6) The update will eventually fail, with the error code . This is intended behaviour
 * 7) When asked "Would you like to configure Internet settings?", select "Yes"
 * 8) On the following menu, navigate to  ->   ->   ->   ->
 * 9) *This is a visual representation
 * 10) If the exploit was successful, your device will have booted into SafeB9SInstaller

Section III - Installing boot9strap

 * 1) When prompted, input the key combo given on the top screen to install boot9strap
 * 2) Once it is complete, press (A) to reboot your device
 * 3) Your device should have rebooted into the Luma3DS configuration menu
 * 4) *If your device shuts down when you try to power it on, ensure that you have copied  from the Luma3DS   to the root of your SD card
 * 5) Press (Start) to save and reboot
 * 6) *If you get an error, just continue to the next section

At this point, your console will boot to Luma3DS by default.
 * Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware.
 * On the next page, you will install useful homebrew applications to complete your setup.

Section IV - Restoring WiFi Configuration Profiles

 * 1) Launch the Download Play application
 * 2) Wait until you see the two buttons
 * 3) *Do not press either of the buttons
 * 4) Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu
 * 5) Select "Miscellaneous options"
 * 6) Select "Switch the hb. title to the current app."
 * 7) Press (B) to continue
 * 8) Press (B) to return to the Rosalina main menu
 * 9) Press (B) to exit the Rosalina menu
 * 10) Press (Home), then close Download Play
 * 11) Relaunch the Download Play application
 * 12) Your device should load the Homebrew Launcher
 * 13) Launch slotTool from the list of homebrew
 * 14) Select "RESTORE original wifi slots 1,2,3"
 * 15) Your device will then reboot

-