Toggle menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

Boot9strap 3DS: Difference between revisions

From GameBrew
No edit summary
No edit summary
Line 3: Line 3:
|image=Boot9strap.jpg
|image=Boot9strap.jpg
|description=Boot9/Boot11 code execution.
|description=Boot9/Boot11 code execution.
|author=SciresM
|author=SciresM, Hedgeberg
|lastupdated=2017/09/06
|lastupdated=2017/09/06
|type=System Tools
|type=System Tools
|version=1.3
|version=1.3
|license=Mixed
|license=GPL-3.0
|download=https://dlhb.gamebrew.org/3dshomebrew/boot9strap-1.3.rar
|download=https://dlhb.gamebrew.org/3dshomebrews/
|website=https://github.com/SciresM/boot9strap
|website=https://github.com/SciresM/boot9strap
|source=https://github.com/SciresM/boot9strap
|source=https://github.com/SciresM/boot9strap
}}
}}
<youtube>-qq8Lw74LXI</youtube>
Boot9strap (B9S) is a modified firmware that makes use of sighax and a vulnerability in the console's NDMA engine to gain code execution on the ARM9 BootROM (Boot9) and load a payload (boot.firm) from the SD card. It uses a modified version the ARM9 payload loader of [[Luma3DS]]. The software can also dump the console-specific OTP and BootROMs.


== Boot9strap ==
It is a bootrom exploit that runs a lot earlier in the boot process in comparison to Armloader9hax (A9LH), allowing access to new system files that A9LH didn't, as well as adding better brick protection, and update protection, because it's unpatchable without a hardware revision (it is also worth noting that B9S uses .firm files instead of .bin files for payloads). B9S has effectively replaced AL9H, and if you use Luma3DS and would like to still be supported with updates, you have to switch to B9S.


Boot9/Boot11 code execution.
For more technical details, refer to the presentation [https://sciresm.github.io/33-and-a-half-c3 here].


For more details, refer to the presentation [https://sciresm.github.io/33-and-a-half-c3/ here].
==Installation==
Install via [[SafeB9SInstaller 3DS|SafeB9SInstaller]].


Boot9Strap is a bootrom exploit that runs a lot earlier in the boot process than A9LH, allowing access to new system files that A9LH didn't, as well as adding better brick protection, and update protection, because it's unpatchable without a hardware revision. It also may be more useful for devs, but idk where that reasoning comes from in all honesty.
Launches boot.firm off of the SD card or CTRNAND.  


Oh also it uses ".firm" files instead of ".bin" files for payloads. Not really a benefit, but it's worth noting.
Hold Start+Select+X on boot to dump the bootroms/your OTP.


Those are the benefits of using it, and Luma3DS will be switching to Boot9Strap because A9LH is outdated now, so yes, B9S is effectively replacing A9LH. If you use Luma3DS and would like to still be supported with updates, you have to switch to B9S.
==Credits==
* [https://github.com/Normmatt Normmatt] - Theorizing the NDMA overwite exploit.
* [https://github.com/TuxSH TuxSH] - Help implementing bootrom payloads.
* [https://github.com/AuroraWright/Luma3DS Luma3DS] - Codebase used in the stage 2 FIRM loader.


Install via [[SafeB9SInstaller 3DS]].
==External links==
 
* GitHub - https://github.com/SciresM/boot9strap
Launches &quot;boot.firm&quot; off of the SD card or CTRNAND. Hold Start + Select + X on boot to dump the bootroms/your OTP.
 
==Credits:==
* [https://github.com/Normmatt Normmatt]: Theorizing the NDMA overwite exploit.
* [https://github.com/TuxSH TuxSH]: Help implementing bootrom payloads.
* [https://github.com/AuroraWright/Luma3DS Luma3DS]: Codebase used in the stage 2 FIRM loader.
 
==Licensing:==
 
This software is licensed under the terms of the GPLv3. You can find a copy of the license in the LICENSE file.

Revision as of 11:59, 3 February 2022

Boot9strap
File:Boot9strap.jpg
General
AuthorSciresM, Hedgeberg
TypeSystem Tools
Version1.3
LicenseGPL-3.0
Last Updated2017/09/06
Links
Download
Website
Source

Boot9strap (B9S) is a modified firmware that makes use of sighax and a vulnerability in the console's NDMA engine to gain code execution on the ARM9 BootROM (Boot9) and load a payload (boot.firm) from the SD card. It uses a modified version the ARM9 payload loader of Luma3DS. The software can also dump the console-specific OTP and BootROMs.

It is a bootrom exploit that runs a lot earlier in the boot process in comparison to Armloader9hax (A9LH), allowing access to new system files that A9LH didn't, as well as adding better brick protection, and update protection, because it's unpatchable without a hardware revision (it is also worth noting that B9S uses .firm files instead of .bin files for payloads). B9S has effectively replaced AL9H, and if you use Luma3DS and would like to still be supported with updates, you have to switch to B9S.

For more technical details, refer to the presentation here.

Installation

Install via SafeB9SInstaller.

Launches boot.firm off of the SD card or CTRNAND.

Hold Start+Select+X on boot to dump the bootroms/your OTP.

Credits

  • Normmatt - Theorizing the NDMA overwite exploit.
  • TuxSH - Help implementing bootrom payloads.
  • Luma3DS - Codebase used in the stage 2 FIRM loader.

External links

Advertising: