Tutorial  Updated

Photo guide to installing DSiWare backups on real hardware and emulator

First, some USEFUL NOTES

Tickets are not actually required by the DSi launcher (this was unknown at the time the above procedure was written), you may skip the related steps

While still incomplete, @MarioMasta64 is working on automating this process for Windows+Python users:
http://gbatemp.net/threads/a-tool-to-make-converting-dsiware-from-3ds-to-dsi-easier.479996/

If you are using an emunand (through Hiya, for example), consider using DSi Title Manager instead; there's no reason it couldn't work on sysnand with minor changes but... it doesn't do that, yet or ever




Steal Acquire some decrypted DSiware apps. You can use Funkeycia, 3DSeStuff, etc the 3DS eShop to legally download them, rip them to cia, then use ctrtool to extract the cia into "contents" = .app (the very newest versions of ctrtool decrypt them during this extraction); alternatively you can use Godmode9 to directly copy the appropriate .app under twln:/title/00030004/* to the SD.
There's also a no-intro catalogue but no romset I know of, officer...

Backup your console's NAND, CID, and ConsoleID using well documented methods (hardmod if you have some DSiware that can be copied to SD, or fwTool+safety mod if you have an usable DSiware exploit - Team Twiizer's original sudokuhax is not suitable #clobberedkeyslots, while fourswordshax and the leaked ugopwn use minitwlpayload).
If you're using NO$GBA with a nand you didn't dump yourself, you can find the CID and the byteswapped ConsoleID by looking at the end of the dump with a hex editor.
1 NOCASHNAND.PNG
(Adding this block is also how you convert a raw backup for use with NO$GBA, just in case you didn't read the manual)

Use TwlTool to decrypt the nand.
2 nand decrypt.PNG

Mount the 1st partition of the decrypted image with OSFMount (Linux equivalent: losetup + mount; Mac equivalent, hdiutil + mount I guess?).
3 osfmount.PNG 4 osfmount.PNG

Pick (any?) ticket from the NAND, preferably from the regular DSiware category = 00030004, and decrypt it with TwlTool. This will be a base for the edited tickets we will make.
5 ticket crypto.PNG

Open the folder with our dumped title. You will find a "content" folder, possibly a "data" folder, and a .ctx file if it came from a 3DS.
Delete it, then go to the content folder.
Remove the "cmd" folder, and the 3DS-format TMD.
6 source.PNG 7 source content.PNG

Search the TMD pack for the full TitleID of the DSiware; copy the TMD to the content folder, renaming it to "title.tmd".
Open title.tmd in a hex editor.
8 tmd.PNG

Find offset 1E7; rename the .app file (better known as .srl or .nds) so that the last 2 digits are the ones written at 1E7.
Find offset 208; delete everything from there to the end of the file. (A small number of tmds are already trimmed).
Save the file.
9 tmd edit.PNG

Open the ticket we decrypted earlier in a hex editor.
Find offset 1DC and replace the next 8 bytes with the TitleID of the app we're installing;
Save the file with a name equal to the TitleID-low of the app.
10 ticket edit.PNG 11 ticket save.PNG

Use TwlTool to encrypt the ticket, and put it into the NAND.
12 ticket crypto.PNG

Copy the title's (content & data) folder to the NAND.
13 app copy.PNG

Unmount the NAND and re-encrypt it.
14 unmount.PNG 15 nand crypt.PNG

If you're using NO$GBA, you will have to re-add the footer since it will have been removed by TwlTool's NAND features.
16 nand footer.PNG

Enjoy your DSiWarez, and if you liked it, BUY THE ORIGINAL... oh wait, they closed the DSi shop
17.PNG 18.PNG
 
Last edited by Ryccardo,

thalyy720

Well-Known Member
Newcomer
Joined
Apr 24, 2017
Messages
70
Trophies
0
Location
Sonic Land
XP
431
Country
Brazil
Steal Acquire some decrypted DSiware apps. A not terribly efficient (but pretty simple to do and understand) way is getting them from FreeShop on a modded 3DS, then copying twln:/title/00030004/* to the SD.
Alternatively you can use Funkeycia, 3DSeStuff, etc to download them as cia, then use ctrtool to extract the cia into "contents" = .app (the very newest versions of ctrtool decrypt them during this extraction)

Backup your console's NAND, CID, and ConsoleID using well documented methods (hardmod if you have some DSiware that can be copied to SD, or fwTool+safety mod if you have an usable DSiware exploit - Team Twiizer's original sudokuhax is not suitable #clobberedkeyslots, while fourswordshax and the leaked ugopwn use minitwlpayload).
If you're using NO$GBA with a nand you didn't dump yourself, you can find the CID and the byteswapped ConsoleID by looking at the end of the dump with a hex editor.
View attachment 92319
(Adding this block is also how you convert a raw backup for use with NO$GBA, just in case you didn't read the manual)

Use TwlTool to decrypt the nand.
View attachment 92320

Mount the 1st partition of the decrypted image with OSFMount (Linux equivalent: losetup + mount; Mac equivalent, hdiutil + mount I guess?).
View attachment 92321 View attachment 92322

Pick (any?) ticket from the NAND, preferably from the regular DSiware category = 00030004, and decrypt it with TwlTool. This will be a base for the edited tickets we will make.
View attachment 92323

Open the folder with our dumped title. You will find a "content" folder, possibly a "data" folder, and a .ctx file if it came from a 3DS.
Delete it, then go to the content folder.
Remove the "cmd" folder, and the 3DS-format TMD.
View attachment 92324 View attachment 92325

Search the TMD pack for the full TitleID of the DSiware; copy the TMD to the content folder, renaming it to "title.tmd".
Open title.tmd in a hex editor.
View attachment 92326

Find offset 1E7; rename the .app file (better known as .srl or .nds) so that the last 2 digits are the ones written at 1E7.
Find offset 208; delete everything from there to the end of the file. (A small number of tmds are already trimmed).
Save the file.
View attachment 92327

Open the ticket we decrypted earlier in a hex editor.
Find offset 1DC and replace the next 8 bytes with the TitleID of the app we're installing;
Save the file with a name equal to the TitleID-low of the app.
View attachment 92328 View attachment 92329

Use TwlTool to encrypt the ticket, and put it into the NAND.
View attachment 92330

Copy the title's (content & data) folder to the NAND.
View attachment 92331

Unmount the NAND and re-encrypt it.
View attachment 92332 View attachment 92333

If you're using NO$GBA, you will have to re-add the footer since it will have been removed by TwlTool's NAND features.
View attachment 92334

Enjoy your DSiWarez, and if you liked it, BUY THE ORIGINAL... oh wait, they closed the DSi shop
View attachment 92335 View attachment 92336




While still incomplete, @MarioMasta64 is working on automating this process for Windows+Python users:
http://gbatemp.net/threads/a-tool-to-make-converting-dsiware-from-3ds-to-dsi-easier.479996/

Finnaly i found this!but i really wanna a portuguese version :(
 
D

Deleted-394630

Guest
can you make a video showing the procedure?
This guide is slightly irrelevant. To install dsiware, you should use twlnf, it's pretty easy to install backups through that.
Also, video guides should not be created as they can very quickly become outdated, misleading, and dangerous. This is the reason nobody makes them for editing NAND.
No video guides will pop up soon hopefully, as they lead to a cycle:
Ask for video guide>Video Guide Created>Updated method is released>Video is outdated>New tools are incompatible with old guide>Bricking occurs>Unbrick guide is needed>Repeat.
This may be contrary to some's opinions, but I'm just telling you from experience, in general:
Video Guides=EVIL
 

thalyy720

Well-Known Member
Newcomer
Joined
Apr 24, 2017
Messages
70
Trophies
0
Location
Sonic Land
XP
431
Country
Brazil
my folders are correct?I used the game Mario Clock to show here, but I also downloaded other games...
 

Attachments

  • Capturar_2017_12_09_08_56_52_182.png
    Capturar_2017_12_09_08_56_52_182.png
    3.9 KB · Views: 322
  • Capturar_2017_12_09_08_56_56_651.png
    Capturar_2017_12_09_08_56_56_651.png
    1.9 KB · Views: 301
  • Capturar_2017_12_09_08_57_00_595.png
    Capturar_2017_12_09_08_57_00_595.png
    2.6 KB · Views: 325

lAkdaOpeKA

Well-Known Member
Member
Joined
Feb 6, 2015
Messages
1,386
Trophies
0
XP
1,482
Country
Italy
Steal Acquire some decrypted DSiware apps. A not terribly efficient (but pretty simple to do and understand) way is getting them from FreeShop on a modded 3DS, then copying twln:/title/00030004/* to the SD.
Alternatively you can use Funkeycia, 3DSeStuff, etc to download them as cia, then use ctrtool to extract the cia into "contents" = .app (the very newest versions of ctrtool decrypt them during this extraction)

Would NUS Downloader work too if you use the generate .app option?
 

Ryccardo

Penguin accelerator
OP
Member
Joined
Feb 13, 2015
Messages
7,690
Trophies
1
Age
28
Location
Imola
XP
6,909
Country
Italy
Would NUS Downloader work too if you use the generate .app option?
Last time I used it in 2011 or so, it could only decrypt titles using the system key (since you can't download a ticket witout proving to the server you have a license - all the other tools use an externally supplied titlekey)
 

lAkdaOpeKA

Well-Known Member
Member
Joined
Feb 6, 2015
Messages
1,386
Trophies
0
XP
1,482
Country
Italy
Last time I used it in 2011 or so, it could only decrypt titles using the system key (since you can't download a ticket witout proving to the server you have a license - all the other tools use an externally supplied titlekey)
I do have the common key (thanks Google!), and with it it does allow me to download as a .app (without that it wouldn't even allow to download any DSi stuff!)
 

Pomegrenade

photon readings negative
Member
Joined
Feb 20, 2017
Messages
314
Trophies
0
Location
Location
Website
gbatemp.net
XP
770
Country
Netherlands
keepin' my eye on this, very interesting for my DS ears...and eyes i guess...idk im slowly turning insane, stuck on a over 10 year handheld gaming console and trying to keep its dev community alive
 

matthi321

Well-Known Member
Member
Joined
Jan 14, 2013
Messages
432
Trophies
1
Age
30
XP
1,476
Country
i dont understand those instructions. are there a video showing how to do it? or can someone explane it to me like im a 5 year old?
 

ShadowStone

Banned!
Banned
Joined
Jun 17, 2018
Messages
58
Trophies
0
XP
407
Country
United States
Why did you remove my post? Everyone else is talking about the freeshop and how they put DSi games for free on an SD card. How come you remove my post and their post doesn't get removed?
 

Flame

Me > You
Global Moderator
Joined
Jul 15, 2008
Messages
7,284
Trophies
3
XP
18,788
Why did you remove my post? Everyone else is talking about the freeshop and how they put DSi games for free on an SD card. How come you remove my post and their post doesn't get removed?

they is a difference between requesting copyrighted material; and getting a link which we dont allow. then talking about something which it by itself is not copyrighted. i.e. freeshop.
 

3EGaming

Active Member
Newcomer
Joined
Jul 26, 2018
Messages
30
Trophies
0
XP
298
Country
United Kingdom
when i try to decrypt any tickets it tells me "ES magic check failed! is your consoleID correct?"
i know the console id is correct because i used it to decrypt the nand dump.
why is this happening?
 

ToneCapone-RF

Well-Known Member
Newcomer
Joined
Jun 30, 2017
Messages
65
Trophies
0
Age
51
XP
359
Country
United States
when i try to decrypt any tickets it tells me "ES magic check failed! is your consoleID correct?"
i know the console id is correct because i used it to decrypt the nand dump.
why is this happening?

Use TWLTools with this command= twltool syscrypt --consoleid (Your console ID_ --in out.tik --out in.tik works for me every time.
 

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
    Maximumbeans @ Maximumbeans: butte