From d59739f0f1d4c39de02ab96966fa7d5d7ee23f19 Mon Sep 17 00:00:00 2001 From: Lily Date: Wed, 18 Jan 2023 19:19:38 -0800 Subject: [PATCH] resolves #2175 --- _pages/en_US/installing-boot9strap-(usm).txt | 1 + 1 file changed, 1 insertion(+) diff --git a/_pages/en_US/installing-boot9strap-(usm).txt b/_pages/en_US/installing-boot9strap-(usm).txt index 0d79ae9e56..a7b9666bf7 100644 --- a/_pages/en_US/installing-boot9strap-(usm).txt +++ b/_pages/en_US/installing-boot9strap-(usm).txt @@ -64,6 +64,7 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana 1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png)) + Your device should show the BB3 multihax menu + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#bannerbomb3) + + If the BB3 multihax menu says "cfw installed already", you already have custom firmware and should continue from [here](checking-for-cfw) 1. Use the D-Pad to navigate and press the (A) button to select "Install unSAFE_MODE" + Your device will automatically power off