diff --git a/Home-Folder.md b/Home-Folder.md index 431ab06..2745a3f 100644 --- a/Home-Folder.md +++ b/Home-Folder.md @@ -44,15 +44,15 @@ For now the procedure to dump the Config Savegame is Linux-only. It assumes you - A 3DS with a firmware of 9.2 or lower - A SD Card to contain the dumped NAND (> 1GB) -#### **Step 1 - Dumping NAND** +#### **Step 1 – Dumping NAND** Boot the [gateway launcher](http://www.gateway-3ds.com/downloads) using the Launcher.dat file placed at the root of the SD Card and accessing 'http://dukesrg.no-ip.org/3ds/go'. Select the option `Backup System NAND` and press `START` to dump your NAND to your SD card. The SD card should then contain a file `NAND.bin`. -#### Step 2 - **Generating NAND Xorpad** +#### Step 2 – **Generating NAND Xorpad** The NAND.bin file dumped in the previous step is encrypted. To decrypt it, we need to generate xorpads. Overwrite the Launcher.dat on your SD card with the one included in the [Decrypt9](https://github.com/archshift/Decrypt9) package. Boot the latter using the browser exploit as in Step 1. Select the `CTRNAND Padgen` option to generate the NAND xorpad. You will then have a `nand.fat16.xorpad` file. -#### Step 3 - **Decrypt and mount NAND** +#### Step 3 – **Decrypt and mount NAND** Having both `NAND.bin` and `nand.fat16.xorpad` on your computer, use [3DSFAT16tool](https://github.com/d0k3/3DSFAT16tool) to decrypt and mount your NAND. gcc -std=gnu99 3DSFAT16tool.c -o 3DSFAT16tool @@ -61,7 +61,7 @@ Having both `NAND.bin` and `nand.fat16.xorpad` on your computer, use [3DSFAT16to You should now be able to browse the content of your NAND. -#### Step 4 - **Extract the Config Savegame** +#### Step 4 – **Extract the Config Savegame** The Config Savegame file is `/data//sysdata/00010017/00000000` but it's in IVFC format and Citra want the bare file content so we need to extract the latter using [3dsfuse](https://github.com/3dshax/3ds). ./3dsfuse /data//sysdata/00010017/00000000 --nowear