Installing Boot9strap (Fredtool)

Lesen erforderlich

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare eShop title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to already own (or download / buy) a DSiWare game from the eShop.

Dies ist eine zurzeit funktionierende Implementation des “FIRM Partitions Known-Plaintext”-Exploits. Details findest du hier.

To extract the .7z and .rar files linked on this page, you will need a file archiver like 7-Zip or The Unarchiver.

Was du brauchst

  • Any eShop DSiWare game
    • JPN region users can download the free title “ほぼ日の健康手帳™” ()
    • USA region users can download the free title “Nintendo Fan Network” ()
  • Your movable.sed file from completing Seedminer
  • The latest release of Frogminer_save
  • The latest release of b9sTool
  • The latest release of Luma3DS (the .7z file)
  • The latest release of the Homebrew Launcher

Schritt I - Vorbereitungen

  1. Launch System Settings on your device
  2. Navigate to Data Management -> DSiWare
  3. Under the “System Memory” section, select your DSiWare game
  4. Select “Copy”, then select “OK”
    • If prompted, overwrite any existing copy
  5. Schalte deinen 3DS aus
  6. Stecke deine SD-Karte in deinen Computer
  7. Copy your movable.sed file to the root of your SD card
  8. Kopiere die Datei boot.firm aus der Luma3DS .7z in das Stammverzeichnis deiner SD-Karte
  9. Copy boot.nds (B9STool) to the root of your SD card
  10. Kopiere die boot.3dsx-Datei in das Stammverzeichnis deiner SD-Karte
  11. Copy the private folder from the Frogminer_save .zip to the root of your SD card
  12. Navigate to Nintendo 3DS -> <ID0> -> <32-character-id> -> Nintendo DSiWare on your SD card
    • This <ID0> will be the same one that you used in Seedminer
  13. Copy <8-character-id>.bin to a folder on your computer
    • If there are multiple <8-character-id>.bin files, just pick one. It doesn’t matter which you use.

Section II - Fredtool

  1. Open Fredtool on your computer
  2. Select your movable.sed file for the “Your movable.sed” field
  3. Select your <8-character-id>.bin file for the “Your dsiware.bin” field
  4. Complete the “I’m not a robot” captcha
  5. Select “Start”
  6. Wait for the process to complete
  7. When the process has completed, download your modified DSiWare archive from the site
  8. Copy the 42383841.bin file from the output/hax/ folder of the downloaded DSiWare archive (fredtool_output.zip) to the Nintendo 3DS/<ID0>/<32-character-id>/Nintendo DSiWare/ folder on your SD card
    • This should be different than your initial <8-character-id>.bin file
    • Do not remove any existing <8-character-id>.bin files
  9. Stecke deine SD-Karte nun wieder in deinen 3DS
  10. Schalte deine Konsole an
  11. Launch System Settings on your device
  12. Navigate to Data Management -> DSiWare
  13. Under the “SD Card” section, select the “Haxxxxxxxxx!” title
  14. Select “Copy”, then select “OK”
  15. Return to main menu of the System Settings
  16. Navigate to Internet Settings -> Nintendo DS Connections, then select “OK”
  17. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio

Section III - Flipnote Exploit

If you would prefer a visual guide to this section, one is available here.

  1. Complete the initial setup process for the launched game until you reach the main menu
    • Select the left option whenever prompted during the setup process
  2. Using the touch-screen, select the large left box, then select the box with an SD card icon
  3. Once the menu loads, select the face icon, then the bottom right icon to continue
  4. Select the frog icon at the bottom left
    • Alternatively, press (X) or (UP) on the D-Pad depending on which is shown on the top screen
  5. Select the second button along the top with a film-reel icon
  6. Scroll right until reel “3/3” is selected
  7. Tap the third box with the letter “A” in it
  8. Scroll left until reel “1/3” is selected
  9. Tap the fourth box with the letter “A” in it
  10. If the exploit was successful, your device will have loaded b9sTool
  11. Select “Install boot9strap” and confirm
  12. Schließe b9stool, schalte dann dein Gerät aus
    • Unter Umständen musst du das Ausschalten der Konsole erzwingen indem du den Power-Knopf gedrückt hälst
    • If you see the Luma Configuration screen, continue with the guide without powering off

Schritt IV - Luma3DS konfigurieren

  1. Starte deinen 3DS während du (Select) gedrückt hälst, um in die Luma3DS-Konfiguration zu gelangen
  2. Benutze den (A) Knopf und das Steuerkreuz, um Folgendes zu aktivieren:
    • “Show NAND or user string in System Settings”
  3. Drücke (Start) zum Speichern und neustarten

Section V - Restoring DS Connection Settings

  1. Schalte deinen 3DS aus
  2. Stecke deine SD-Karte in deinen Computer
  3. Copy the 42383841.bin file from the output/clean/ folder of the downloaded DSiWare archive (fredtool_output.zip) to the Nintendo 3DS/<ID0>/<32-character-id>/Nintendo DSiWare/ folder on your SD card
    • Replace the existing 42383841.bin file
  4. Stecke deine SD-Karte nun wieder in deinen 3DS
  5. Schalte deine Konsole an
  6. Launch System Settings on your device
  7. Navigate to Data Management -> DSiWare
  8. Under the “SD Card” section, select the “Nintendo DSi™” title
  9. Select “Copy”, then select “OK”

Fortfahren mit Setup fertigstellen