Professional Documents
Culture Documents
html>
Getting Started
* Before Starting
<https://switch.homebrew.guide/gettingstarted/beforestarting.html>
* Checking RCM <#>
o Step 0: What You Will Need <#step-0-what-you-will-need>
o Step 1: Accessing RCM: <#step-1-accessing-rcm>
o Step 2: Determining if Your Switch is Vulnerable to fusee-gelee
<#step-2-determining-if-your-switch-is-vulnerable-to-fusee-gelee>
* Choosing an Exploit
<https://switch.homebrew.guide/gettingstarted/choosinganexploit.html>
* fusee-gelee <https://switch.homebrew.guide/hacking/fuseegelee.html>
* Nereba <https://switch.homebrew.guide/hacking/nereba.html>
* Caffeine <https://switch.homebrew.guide/hacking/caffeine.html>
Using CFW
Creating an emuMMC
Homebrew Development
Misc
* Troubleshooting <https://switch.homebrew.guide/troubleshooting.html>
* Frequently Asked Questions <https://switch.homebrew.guide/faq.html>
* Wii U Homebrew Guide <https://switch.homebrew.guide/wiiu.html>
* Credits <https://switch.homebrew.guide/credits.html>
* Donate <https://switch.homebrew.guide/donate.html>
Options
* <https://switch.homebrew.guide/index.html> »
* Checking RCM
* Edit on GitHub
<https://github.com/noahc3/Homebrew-Guide/blob/master/gettingstarted/
checkingrcm.rst>
------------------------------------------------------------------------
This section of the guide will teach you how to access RCM, determine if
your Switch is vulnerable to fusee-gelee, and run a payload.
RCM is the best way to run CFW as it supports all firmwares. Even if you
plan to use a software-based exploit, you should always know if your
Switch has an exploitable RCM and how to push payloads.
If you know whether or not your system has a vulnerable RCM, continue to
Choosing an Exploit
<https://switch.homebrew.guide/gettingstarted/choosinganexploit>
------------------------------------------------------------------------
To access RCM, you must hold down volume up, power and the
home button. *The home button described here is not the home
button on the joycon,* but instead a hardware home button
(think of the physical home button found on smartphones).
The Nintendo Switch doesn’t have this button, but you can
simulate pressing it down by grounding pin 10 of the right
joycon rail.
o
This guide will cover options for Windows, macOS, Linux and
Android, though note that options exist for Chromebooks and
jailbroken iOS devices.
*
A Micro SD Card
------------------------------------------------------------------------
1.
2.
Using a method from the guide linked above, ground pin 10.
*Be very careful, bridging the wrong pins can fry your Switch!*
3.
While you’re grounding pin 10, hold down Volume Up and then
tap Power. You can release all buttons after tapping power.
Warning
Did it work? Pat yourself on the back, you just finished the hardest part!
------------------------------------------------------------------------
*Only follow the part related to the payload sender you chose.* If you
are using a payload sender not listed here, you’ll need to determine how
to use it by yourself.
------------------------------------------------------------------------
1.
Open TegraRCMGUI
2.
3.
4.
5.
6.
Once your Switch is plugged in, you should see a green icon with the
message “RCM OK”.
7.
Select the *fusee-test.bin* test payload you downloaded earlier
8.
Select *“Inject Payload”* if the payload has not already been injected.
*
Important
Error
If the application says the payload launch was successful, but nothing
appears on your screen, unfortunately your Nintendo Switch is likely
patched. *You should try a few more times to be certain, and consider
trying another USB cable.* If your Switch is patched and running
firmware 4.1.0, you can still access CFW. If your Switch is patched and
running a higher firmware version, unfortunately your Switch cannot be
hacked right now.
Error
TegraRcmGUI reporting the line “Smashed the stack with a 0x0000 byte
SETUP request!” (specifically 0x0000 instead of some other number) is a
reliable indicator that your Switch is patched. *You should try a few
more times to be certain, and consider trying another USB cable.*
------------------------------------------------------------------------
1.
2.
3.
Your Switch *should not turn on.* If your Switch turns on,
repeat Step 1 to enter RCM.
4.
Important
A success message should now be displayed on your Switch. If so,
celebrate! Your Switch is vulnerable and you can now push payloads!
Error
If the application says the payload launch was successful, but nothing
appears on your screen, unfortunately your Nintendo Switch is likely
patched. *You should try a few more times to be certain, and consider
trying another USB cable.* If your Switch is patched and running
firmware 4.1.0, you can still access CFW. If your Switch is patched and
running a higher firmware version, unfortunately your Switch cannot be
hacked right now.
------------------------------------------------------------------------
1.
2.
3.
4.
Plug your Switch into your Android device using a USB cable/adapter.
5.
Your phone should give you a prompt to open Rekado with the option
to use by default. Accept and press OK.
6.
Important
Error
If the application says the payload launch was successful, but nothing
appears on your screen, unfortunately your Nintendo Switch is likely
patched. *You should try a few more times to be certain, and consider
trying another USB cable.* If your Switch is patched and running
firmware 4.1.0, you can still access CFW. If your Switch is patched and
running a higher firmware version, unfortunately your Switch cannot be
hacked right now.
------------------------------------------------------------------------
Wait for your Switch to shutdown before continuing. This should happen
automatically. If the payload failed to launch, hold the power button
for 15 seconds to be sure.
------------------------------------------------------------------------
------------------------------------------------------------------------