< 3DS:Alternate Exploits
Revision as of 20:56, 23 May 2023 by Lily (talk | contribs) (fix logical error (otherapp with cfgs))
Required Reading
This article may be outdated due to a new Nintendo 3DS system firmware release. It was written for system version 11.16.0-49, but 11.17.0-50 is the latest. |
In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.
As we already have homebrew access, we can use slotTool to do this.
Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.
If your (Right/Left Shoulder), (D-Pad Up) or (A) buttons do not work, you will need to use another method. For assistance with this matter, join Nintendo Homebrew on Discord and ask, in English, for help. |
What You Need
- The latest release of SafeB9SInstaller (direct download)
- The latest release of boot9strap (direct download)
- The latest release of unSAFE_MODE
- You may already have this from a prior section of the guide
Instructions
Section I - Prep Work
- Power off your device
- Insert your SD card into your computer
- Create a folder named
3ds
on the root of your SD card if it does not already exist- This folder stores homebrew applications and data; it is different from the Nintendo 3DS folder that the device automatically generates
- Copy the
slotTool
folder from the unSAFE_MODE.zip
to the3ds
folder on your SD card - Copy the otherapp payload for your region/version from the unSAFE_MODE
.zip
'sotherapps_with_CfgS
folder to the location of your current otherapp payload, renaming it accordingly and replacing the existing one- This will depend on the exploit you are using. For example, steelhax uses
SD:/steelhax/payload.bin
, while PicHaxx usesSD:/otherapp.bin
- This will depend on the exploit you are using. For example, steelhax uses
- Create a folder named
boot9strap
on the root of your SD card - Copy
boot9strap.firm
andboot9strap.firm.sha
from the boot9strap.zip
to the/boot9strap/
folder on your SD card - Copy
SafeB9SInstaller.bin
from the SafeB9SInstaller.zip
to the root of your SD card - Copy
usm.bin
from the unSAFE_MODE.zip
to the root of your SD card - Reinsert the SD card into your device
- Turn on your device
- Launch the Homebrew Launcher with any method
- Launch slotTool from the list of homebrew
- If you get stuck on a red screen, delete
slotTool.xml
from the/3ds/slotTool/
directory, then retry this section
- If you get stuck on a red screen, delete
- Select the "INSTALL exploit to wifi slots 1,2,3 & shutdown" option
- You will see some on-screen text and then your system will shut down
- Power on your device
- Launch System Settings on your device
- Navigate to Internet Settings -> Connection Settings
- Ensure that all three connections are named “Haaaaaaaxxxxxxxxx…”
- Do NOT change these settings!
- If all three connections are NOT all named "Haaaaaaaxxxxxxxxx…", STOP! Something went wrong in this section and MUST be fixed before you can continue
Section II - unSAFE_MODE
- With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), then press (Power)
- Keep holding the buttons until the device boots into Safe Mode
- Press "OK" to accept the update
- There is no update. This is part of the exploit
- Press "I accept" to accept the terms and conditions
- The update will eventually fail, with the error code
003-1099
. This is intended behaviour - When asked "Would you like to configure Internet settings?", select "Yes"
- On the following menu, navigate to
Connection 1
->Change Settings
->Next Page (right arrow)
->Proxy Settings
->Detailed Setup
- This is a visual representation
- If the exploit was successful, your device will have booted into SafeB9SInstaller
Section III - Installing boot9strap
- When prompted, input the key combo given on the top screen to install boot9strap
- Once it is complete, press (A) to reboot your device
- Your device should have rebooted into the Luma3DS configuration menu
- Luma3DS configuration menu are settings for the Luma3DS custom firmware. Many of these settings may be useful for customization or debugging
- For the purpose of this guide, these settings will be left on default settings
- If your device shuts down when you try to power it on, ensure that you have copied
boot.firm
from the Luma3DS.zip
to the root of your SD card
- Press (Start) to save and reboot
- If you get an error, just continue to the next section
At this point, your console will boot to Luma3DS by default.
|
Section IV - Restoring WiFi Configuration Profiles
- Launch the Download Play application
- Wait until you see the two buttons
- Do not press either of the buttons
- Press (Left Shoulder) + (D-Pad Down) + (Select) at the same time to open the Rosalina menu
- Select "Miscellaneous options"
- Select "Switch the hb. title to the current app."
- Press (B) to continue
- Press (B) to return to the Rosalina main menu
- Press (B) to exit the Rosalina menu
- Press (Home), then close Download Play
- Relaunch the Download Play application
- Your device should load the Homebrew Launcher
- Launch slotTool from the list of homebrew
- Select "RESTORE original wifi slots 1,2,3"
- Your device will then reboot
Continue to Finalizing Setup