diff --git a/_pages/en_US/bannerbomb3.txt b/_pages/en_US/bannerbomb3.txt index d2c19abf2f..c39606973e 100644 --- a/_pages/en_US/bannerbomb3.txt +++ b/_pages/en_US/bannerbomb3.txt @@ -4,12 +4,17 @@ title: "BannerBomb3" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.

-

For a more technical explanation, see here.

-
+ +To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. + +For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). +{% endcapture %} + +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/en_US/homebrew-launcher-(pichaxx).txt b/_pages/en_US/homebrew-launcher-(pichaxx).txt index 8395805ef0..e75f6b91ea 100644 --- a/_pages/en_US/homebrew-launcher-(pichaxx).txt +++ b/_pages/en_US/homebrew-launcher-(pichaxx).txt @@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see here. -
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. + +For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/en_US/installing-boot9strap-(fredtool).txt b/_pages/en_US/installing-boot9strap-(fredtool).txt index 9b389ee19f..fab9a050c7 100644 --- a/_pages/en_US/installing-boot9strap-(fredtool).txt +++ b/_pages/en_US/installing-boot9strap-(fredtool).txt @@ -4,11 +4,15 @@ title: "Installing boot9strap (Fredtool)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-
+ +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### What You Need diff --git a/_pages/en_US/installing-boot9strap-(hardmod).txt b/_pages/en_US/installing-boot9strap-(hardmod).txt index 4f0888d535..3455b87ff5 100644 --- a/_pages/en_US/installing-boot9strap-(hardmod).txt +++ b/_pages/en_US/installing-boot9strap-(hardmod).txt @@ -4,12 +4,17 @@ title: "Installing boot9strap (Hardmod)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

An excellent guide to getting a hardmod can be found here.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

-

Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console.

-
+ +An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/). + +This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). + +Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/en_US/installing-boot9strap-(hbl-usm).txt b/_pages/en_US/installing-boot9strap-(hbl-usm).txt index 65bcd5f692..a24b979948 100644 --- a/_pages/en_US/installing-boot9strap-(hbl-usm).txt +++ b/_pages/en_US/installing-boot9strap-(hbl-usm).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (HBL-USM)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

As we already have Homebrew access, we can use slotTool to do this.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +As we already have Homebrew access, we can use slotTool to do this. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/en_US/installing-boot9strap-(kartdlphax).txt b/_pages/en_US/installing-boot9strap-(kartdlphax).txt index a795051412..ef9b29e969 100644 --- a/_pages/en_US/installing-boot9strap-(kartdlphax).txt +++ b/_pages/en_US/installing-boot9strap-(kartdlphax).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (kartdlphax)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin.

-

This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: kartdlphax, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin. + +This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/en_US/installing-boot9strap-(soundhax).txt b/_pages/en_US/installing-boot9strap-(soundhax).txt index b94e84c610..d7ce9937c7 100644 --- a/_pages/en_US/installing-boot9strap-(soundhax).txt +++ b/_pages/en_US/installing-boot9strap-(soundhax).txt @@ -4,10 +4,13 @@ title: "Installing boot9strap (Soundhax)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

-
+ +For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/en_US/installing-boot9strap-(ssloth-browser).txt b/_pages/en_US/installing-boot9strap-(ssloth-browser).txt index 016c43be0c..07bbb76a27 100644 --- a/_pages/en_US/installing-boot9strap-(ssloth-browser).txt +++ b/_pages/en_US/installing-boot9strap-(ssloth-browser).txt @@ -4,13 +4,19 @@ title: "Installing boot9strap (SSLoth-Browser)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version.

-

A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check.

-

Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job.

-

For technical details on the exploits that you will be using on this page, see here (SSLoth) and here (universal-otherapp).

-
+ +In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version. + +A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check. + +Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job. + +For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/en_US/installing-boot9strap-(usm).txt b/_pages/en_US/installing-boot9strap-(usm).txt index 58be815045..354ab00213 100644 --- a/_pages/en_US/installing-boot9strap-(usm).txt +++ b/_pages/en_US/installing-boot9strap-(usm).txt @@ -4,14 +4,21 @@ title: "Installing boot9strap (USM)" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

We can do this using an existing exploit, BannerBomb3.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

-
+ +In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile. + +We can do this using an existing exploit, BannerBomb3. + +To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list. + +Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile. + +For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/). + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Compatibility Notes diff --git a/_pages/en_US/seedminer.txt b/_pages/en_US/seedminer.txt index b6d7e339df..21f019b371 100644 --- a/_pages/en_US/seedminer.txt +++ b/_pages/en_US/seedminer.txt @@ -4,12 +4,17 @@ title: "Seedminer" {% include toc title="Table of Contents" %} -
+{% capture technical_info %} Technical Details (optional) -

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

-

For information on how Seedminer works, see this presentation.

-

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

-
+ +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device. + +For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3). + +This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method. + +{% endcapture %} +
{{ technical_info | markdownify }}
{: .notice--info} ### Section I - Prep Work