Separate names with a comma.
Discussion in '3DS - Flashcards & Custom Firmwares' started by zoogie, Feb 1, 2018.
Discord has text chat, which is the usual way to communicate in these types of dicord servers
Another one (borkman720's)
One more (Bumblescumps)
im back the exploit works and i love it plus almost all my gamesystems are hacked now my 3ds is too
So, after doing a bit of reading about this, I'm probably going to try this when I get my new 2DS XL. Ordered it at a very bad time as all the flash cart sellers are having a holiday (chinese new year lol ).
Just to get confirmation, OP said that this could get patched, does that mean that this exploit could get patched? Was wondering 'cause later he says that ntrboot is better for the long term. But if I install b9s using this method, will my cfw be safe from Nintendo?
Once installed, CFW is safe, from how i understand it. As long as Luma works, you should be able to do anything.
Just check for luma updates before updating your console.
once you have hacked your 3ds it's hacked, no different from ntrboot,
but in the future people may not be able to hack with this if they patch it
@zoogie Here's another long-to-brute-force msed_data from an Old 3DS, took ~7.1 hours.
Here we go again (HUB.BATCH)
Took a little longer than the others, around 400 offset.
For those actively brute-forcing (or anybody) download these files and replace them in
Thats a rather large jump in msed_data and should help bf times greatly.
Grabbed and ready to heat my room with my graphics card a bit more.
/me is hungry for more files
Leaving for the night and most likely week - but i may be leaving my pc running and remote in to run some files. Feel free to PM me on Discord if noone else is around to brute some files.
I did the 3rd method using a Mii to get my bin file, I'm already on the Tadpole part, what file is the ctcert.bin? Is it the input.bin file exported from the website or the output.bin file created after the first brute force?
refer to https://gbatemp.net/threads/dis-dsihax-injection-service.496072/
Hello, I'm bruteforcing this for a friend of mine (I do not have a DS) and have gotten movable_part1.sed using the input.bin file he sent me. My question is, how do I go about bruteforcing the final movable.sed with this file? When the movable_part1.sed finished, it told me "don't you dare forget to add the id0 to it!" and I get an error about this id0 when trying to run the gpu bruteforce(no id0 found). Is part of the "got a hit:9f4c7f0a (rand: 0x072a)" the id0? what format should this id0 be in to be added? I am assuming I must get the id0 from him.
Inside the Nintendo 3ds folder on his sd card will be a long 32 digit hex number. That's id0.
Run seedminer_launcher.py id0 "your friends long hex number"
from the same directory as the movable_part.sed and it should be added.
Make sure to ask him if there's more than one id0 side-by-side. if there is, there's more work to do (ill let someone else take that, i'm tired)
Ah, okay. Thanks for the help zoogie, it is appreciated. I am going to ask him for that id0 and brute force the rest of it myself today.
anyone need any bruteforcing while i'm being useless on my computer
@zoogie could you make another LFCS/Error estimate graph?
Sure, no problem. I'll add a day0 graph as well to show how far we've come (thanks fam!).
day0 ~37 nodes
now ~170 nodes
You can make these graphs on your own easy enough. Just download this and put it in your saves folder. Needs matplotlib.