Up until now the only way to liberate your Wii console and enable the use of homebrew with System Menu 4.3 was to use a gamedisc based exploit such as “BatHaxx”, “Return of the Jodi” and others.
Today we are announcing a project that changes this completely and removes the requirement for an exploitable game.
In memory of BannerBomb, we present you with LetterBomb , a brand new System Menu exploit that will allow you to enable homebrew with the push of an envelope (no stamp licking involved)
This exploit reuses (and abuses) some of some Nintendo’s Wii Messageboard functionality.
You will need:
A Wii running System Menu 4.3 (E/U/J/K)
A SD(HC) card with some free space
Your Wii’s WiFi MAC Address (available from your Wii’s system settings)
A few minutes of your time
For this very special occasion we have created an easy-peasy webpage that takes away some of the pain that is usually involved with getting homebrew onto your system:
http://please.hackmii.comThis webpage will ask you for some necessary information (such as your System Menu region and MAC address), and will then return a nicely packaged ZIP file that is ready for extraction to the root of your SD card. Simple eh?
All that is missing from that point is a boot.elf/boot.dol file (that you will need to place in the root of your card), and you should be good to go. For your convenience we have an option to prepackage and bundle the HackMii Installer boot.elf (this is enabled by default).
So, how do I do this?
Simple…. once you’ve unzipped the file to your SD card (and inserted it) just navigate to the “messageboard” on your Wii and in the default view you should browse to “yesterday” (the place where you usually see yesterday’s messages) – sometimes this may be “today” (this depends on the timezone you are in).
From this view you will be presented with a small envelope (that should obviously stand out against the rest of your plain old boring ones), click it, kick back, twiddle your thumbs (the Brits among you, go and make a cup of tea) cross your fingers and hope it worked.
DISCLAIMER: We are aware of a similar exploit by giantpune (good work!), but as of today this has not been released. In anticipation of its release we decided to reverse engineer, hack and implement something ourselves.