1
0
mirror of https://github.com/hacks-guide/Guide_3DS.git synced 2025-09-01 20:42:41 +02:00

Convert all technical infos to markdown

This commit is contained in:
lifehackerhansol
2022-11-29 15:58:39 -08:00
parent 49fd7b728f
commit d9100a0186
10 changed files with 104 additions and 51 deletions

View File

@@ -4,12 +4,17 @@ title: "BannerBomb3"
{% include toc title="Table of Contents" %} {% include toc title="Table of Contents" %}
<details> {% capture technical_info %}
<summary><em>Technical Details (optional)</em></summary> <summary><em>Technical Details (optional)</em></summary>
<p>To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.</p>
<p>To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.</p> To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.
<p>For a more technical explanation, see <a href="https://github.com/zoogie/Bannerbomb3">here</a>.</p>
</details> To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.
For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3).
{% endcapture %}
<details>{{ technical_info | markdownify }}</details>
{: .notice--info} {: .notice--info}
### Compatibility Notes ### Compatibility Notes

View File

@@ -4,10 +4,15 @@ title: "Homebrew Launcher (PicHaxx)"
{% include toc title="Table of Contents" %} {% include toc title="Table of Contents" %}
<details> {% capture technical_info %}
<summary><em>Technical Details (optional)</em></summary> <summary><em>Technical Details (optional)</em></summary>
This method of using Seedminer for further exploitation uses your <code>movable.sed</code> file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller. For information on PicHaxx itself, see <a href="https://github.com/zoogie/pichaxx">here</a>.
</details> This method of using Seedminer for further exploitation uses your `movable.sed` file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller.
For information on PicHaxx itself, see [here](https://github.com/zoogie/pichaxx).
{% endcapture %}
<details>{{ technical_info | markdownify }}</details>
{: .notice--info} {: .notice--info}
### Compatibility Notes ### Compatibility Notes

View File

@@ -4,11 +4,15 @@ title: "Installing boot9strap (Fredtool)"
{% include toc title="Table of Contents" %} {% include toc title="Table of Contents" %}
<details> {% capture technical_info %}
<summary><em>Technical Details (optional)</em></summary> <summary><em>Technical Details (optional)</em></summary>
<p>This method of using Seedminer for further exploitation uses your <code>movable.sed</code> file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.</p>
<p>This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed <a href="https://www.3dbrew.org/wiki/3DS_System_Flaws">here</a>.</p> This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application.
</details>
This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws).
{% endcapture %}
<details>{{ technical_info | markdownify }}</details>
{: .notice--info} {: .notice--info}
### What You Need ### What You Need

View File

@@ -4,12 +4,17 @@ title: "Installing boot9strap (Hardmod)"
{% include toc title="Table of Contents" %} {% include toc title="Table of Contents" %}
<details> {% capture technical_info %}
<summary><em>Technical Details (optional)</em></summary> <summary><em>Technical Details (optional)</em></summary>
<p>An excellent guide to getting a hardmod can be found <a href="https://gbatemp.net/threads/414498/">here</a>.</p>
<p>This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed <a href="https://www.3dbrew.org/wiki/3DS_System_Flaws">here</a>.</p> An excellent guide to getting a hardmod can be found [here](https://gbatemp.net/threads/414498/).
<p>Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console.</p>
</details> This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws).
Using a hardmod, we can dump the NAND image, install custom firmware to the NAND image, then re-install the hacked NAND image to the console.
{% endcapture %}
<details>{{ technical_info | markdownify }}</details>
{: .notice--info} {: .notice--info}
### Compatibility Notes ### Compatibility Notes

View File

@@ -4,13 +4,19 @@ title: "Installing boot9strap (HBL-USM)"
{% include toc title="Table of Contents" %} {% include toc title="Table of Contents" %}
<details> {% capture technical_info %}
<summary><em>Technical Details (optional)</em></summary> <summary><em>Technical Details (optional)</em></summary>
<p>In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.</p>
<p>As we already have Homebrew access, we can use slotTool to do this.</p> In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.
<p>Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.</p>
<p>For a more technical explanation, see <a href="https://github.com/zoogie/unSAFE_MODE/">here</a> for information about the unSAFE_MODE exploit.</p> As we already have Homebrew access, we can use slotTool to do this.
</details>
Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.
For a more technical explanation, see [here](https://github.com/zoogie/unSAFE_MODE/) for information about the unSAFE_MODE exploit.
{% endcapture %}
<details>{{ technical_info | markdownify }}</details>
{: .notice--info} {: .notice--info}
### Compatibility Notes ### Compatibility Notes

View File

@@ -4,14 +4,21 @@ title: "Installing boot9strap (kartdlphax)"
{% include toc title="Table of Contents" %} {% include toc title="Table of Contents" %}
<details> {% capture technical_info %}
<summary><em>Technical Details (optional)</em></summary> <summary><em>Technical Details (optional)</em></summary>
<p>In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.</p>
<p>To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin.</p> In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.
<p>This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list.</p>
<p>Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.</p> To accomplish this, we can use the Download Play functionality of the game Mario Kart 7, using a 3DS with custom firmware already installed along with a custom game plugin.
<p>For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: <a href="https://github.com/PabloMK7/kartdlphax">kartdlphax</a>, <a href="https://github.com/zoogie/unSAFE_MODE/">unSAFE_MODE</a>.</p>
</details> This custom plugin will send a hacked payload to an unhacked console, which then exploits the system in order to inject the exploited WiFi profile into your connections list.
Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.
For a more technical explanation, see the following links for information on the kartdlphax and unSAFE_MODE exploits: [kartdlphax](https://github.com/PabloMK7/kartdlphax), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/).
{% endcapture %}
<details>{{ technical_info | markdownify }}</details>
{: .notice--info} {: .notice--info}
### Compatibility Notes ### Compatibility Notes

View File

@@ -4,10 +4,13 @@ title: "Installing boot9strap (Soundhax)"
{% include toc title="Table of Contents" %} {% include toc title="Table of Contents" %}
<details> {% capture technical_info %}
<summary><em>Technical Details (optional)</em></summary> <summary><em>Technical Details (optional)</em></summary>
<p>For technical details on the exploits that you will be using on this page, see <a href="https://github.com/nedwill/soundhax">here</a> (Soundhax) and <a href="https://github.com/TuxSH/universal-otherapp/">here</a> (universal-otherapp).</p>
</details> For technical details on the exploits that you will be using on this page, see [here](https://github.com/nedwill/soundhax) (Soundhax) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp).
{% endcapture %}
<details>{{ technical_info | markdownify }}</details>
{: .notice--info} {: .notice--info}
### Compatibility Notes ### Compatibility Notes

View File

@@ -4,13 +4,19 @@ title: "Installing boot9strap (SSLoth-Browser)"
{% include toc title="Table of Contents" %} {% include toc title="Table of Contents" %}
<details> {% capture technical_info %}
<summary><em>Technical Details (optional)</em></summary> <summary><em>Technical Details (optional)</em></summary>
<p>In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version.</p>
<p>A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check.</p> In order to exploit the Browser application, we need to bypass the browser version check, which is designed to disallow the use of the browser without updating to the latest system version.
<p>Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job.</p>
<p>For technical details on the exploits that you will be using on this page, see <a href="https://github.com/MrNbaYoh/3ds-ssloth">here</a> (SSLoth) and <a href="https://github.com/TuxSH/universal-otherapp/">here</a> (universal-otherapp).</p> A public proxy server is available, which, with the help of the SSLoth exploit, can bypass this check.
</details>
Once the bypass is active, an exploit webpage will be accessible which will do the rest of the job.
For technical details on the exploits that you will be using on this page, see [here](https://github.com/MrNbaYoh/3ds-ssloth) (SSLoth) and [here](https://github.com/TuxSH/universal-otherapp) (universal-otherapp).
{% endcapture %}
<details>{{ technical_info | markdownify }}</details>
{: .notice--info} {: .notice--info}
### Compatibility Notes ### Compatibility Notes

View File

@@ -4,14 +4,21 @@ title: "Installing boot9strap (USM)"
{% include toc title="Table of Contents" %} {% include toc title="Table of Contents" %}
<details> {% capture technical_info %}
<summary><em>Technical Details (optional)</em></summary> <summary><em>Technical Details (optional)</em></summary>
<p>In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.</p>
<p>We can do this using an existing exploit, BannerBomb3.</p> In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.
<p>To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.</p>
<p>Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.</p> We can do this using an existing exploit, BannerBomb3.
<p>For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: <a href="https://github.com/zoogie/Bannerbomb3">BannerBomb3</a>, <a href="https://github.com/zoogie/unSAFE_MODE/">unSAFE_MODE</a>.</p>
</details> To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.
Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.
For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: [BannerBomb3](https://github.com/zoogie/Bannerbomb3), [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/).
{% endcapture %}
<details>{{ technical_info | markdownify }}</details>
{: .notice--info} {: .notice--info}
### Compatibility Notes ### Compatibility Notes

View File

@@ -4,12 +4,17 @@ title: "Seedminer"
{% include toc title="Table of Contents" %} {% include toc title="Table of Contents" %}
<details> {% capture technical_info %}
<summary><em>Technical Details (optional)</em></summary> <summary><em>Technical Details (optional)</em></summary>
<p>To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.</p>
<p>For information on how Seedminer works, see <a href="https://zoogie.github.io/web/34⅕c3">this presentation</a>.</p> To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.
<p>This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.</p>
</details> For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3).
This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.
{% endcapture %}
<details>{{ technical_info | markdownify }}</details>
{: .notice--info} {: .notice--info}
### Section I - Prep Work ### Section I - Prep Work