Toggle menu
Toggle preferences menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

3DS:Alternate Exploits/Installing boot9strap (HBL-USM): Difference between revisions

From Hacks Guide Wiki
(fix logical error (otherapp with cfgs))
(page now up to date)
Line 1: Line 1:
==Required Reading==
==Required Reading==


{{System version outdated article|console=ctr|sysversion=11.16.0-49}}
{{System version outdated article|console=ctr|sysversion=11.17.0-50}}


In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.
In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

Revision as of 22:58, 23 May 2023

Required Reading

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

As we already have homebrew access, we can use slotTool to do this.

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

Warning icon If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, you will need to use another method. For assistance with this matter, join Nintendo Homebrew on Discord and ask, in English, for help.

What You Need

  • The latest release of SafeB9SInstaller (direct download)
  • The latest release of boot9strap (direct download)
  • The latest release of unSAFE_MODE
    • You may already have this from a prior section of the guide

Instructions

Section I - Prep Work

  1. Power off your device
  2. Insert your SD card into your computer
  3. Create a folder named 3ds on the root of your SD card if it does not already exist
    • This folder stores homebrew applications and data; it is different from the Nintendo 3DS folder that the device automatically generates
  4. Copy the slotTool folder from the unSAFE_MODE .zip to the 3ds folder on your SD card
  5. Copy the otherapp payload for your region/version from the unSAFE_MODE .zip's otherapps_with_CfgS folder to the location of your current otherapp payload, renaming it accordingly and replacing the existing one
    • This will depend on the exploit you are using. For example, steelhax uses SD:/steelhax/payload.bin, while PicHaxx uses SD:/otherapp.bin
  6. Create a folder named boot9strap on the root of your SD card
  7. Copy boot9strap.firm and boot9strap.firm.sha from the boot9strap .zip to the /boot9strap/ folder on your SD card
  8. Copy SafeB9SInstaller.bin from the SafeB9SInstaller .zip to the root of your SD card
  9. Copy usm.bin from the unSAFE_MODE .zip to the root of your SD card
  10. Reinsert the SD card into your device
  11. Turn on your device
  12. Launch the Homebrew Launcher with any method
  13. Launch slotTool from the list of homebrew
    • If you get stuck on a red screen, delete slotTool.xml from the /3ds/slotTool/ directory, then retry this section
  14. Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option
    • You will see some on-screen text and then your system will shut down
  15. Power on your device
  16. Launch System Settings on your device
  17. Navigate to Internet Settings -> Connection Settings
  18. Ensure that all three connections are named “Haaaaaaaxxxxxxxxx…”
    • Do NOT change these settings!
    • If all three connections are NOT all named "Haaaaaaaxxxxxxxxx…", STOP! Something went wrong in this section and MUST be fixed before you can continue

Section II - unSAFE_MODE

  1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), then press (Power)
    • Keep holding the buttons until the device boots into Safe Mode
  2. Press "OK" to accept the update
    • There is no update. This is part of the exploit
  3. Press "I accept" to accept the terms and conditions
  4. The update will eventually fail, with the error code 003-1099. This is intended behaviour
  5. When asked "Would you like to configure Internet settings?", select "Yes"
  6. On the following menu, navigate to Connection 1 -> Change Settings -> Next Page (right arrow) -> Proxy Settings -> Detailed Setup
  7. If the exploit was successful, your device will have booted into SafeB9SInstaller

Section III - Installing boot9strap

  1. When prompted, input the key combo given on the top screen to install boot9strap
  2. Once it is complete, press (A) to reboot your device
  3. Your device should have rebooted into the Luma3DS configuration menu
    • Luma3DS configuration menu are settings for the Luma3DS custom firmware. Many of these settings may be useful for customization or debugging
    • For the purpose of this guide, these settings will be left on default settings
    • If your device shuts down when you try to power it on, ensure that you have copied boot.firm from the Luma3DS .zip to the root of your SD card
  4. Press (Start) to save and reboot
    • If you get an error, just continue to the next section
Info icon At this point, your console will boot to Luma3DS by default.
  • Luma3DS does not look any different from the normal HOME Menu. If your console has booted into the HOME Menu, it is running custom firmware.
  • On the next page, you will install useful homebrew applications to complete your setup.

Section IV - Restoring WiFi Configuration Profiles

  1. Launch the Download Play application
  2. Wait until you see the two buttons
    • Do not press either of the buttons
  3. Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu
  4. Select "Miscellaneous options"
  5. Select "Switch the hb. title to the current app."
  6. Press (B) to continue
  7. Press (B) to return to the Rosalina main menu
  8. Press (B) to exit the Rosalina menu
  9. Press (Home), then close Download Play
  10. Relaunch the Download Play application
  11. Your device should load the Homebrew Launcher
  12. Launch slotTool from the list of homebrew
  13. Select "RESTORE original wifi slots 1,2,3"
  14. Your device will then reboot

Continue to Finalizing Setup