07-17-2008 #1tmaster Guest
Official PS3 BD-J Homebrew Thread
I saw this and i just want to share with you.
Originally Posted by silenoz
Unzip the file on the root of an usb or flash drive. Go to the device in the video menu and launch "AVCHD" it's like a mini DVD, with a BD-J game on the "BONUS" section.
This might lead to something or not who knows.. at least we have some homebrew.
Edit: Also included is an RSS Reader for the NY Times, BD-J PS3 Minimal Devkit, and others.
07-17-2008 #2CJPC Guest
Well, here's the issue, this was actually discussed (doing something similiar) a while back.
Aside from the whole Virtual Machine thing that the Java runs upon, which makes it nearly impossible to "break out" from, theres not a whole lot we can do.
Sure, we can run some code in the Virtual Machine, but nothing that we can use to "escape" and gain access to the PS3.
Not to mention, I DOUBT that Sony would not think about this and add extra safeguards against it being hacked, having HDD storage is fine, but where that storage (through the virtual machine) is assigned to the PS3 HDD is mostlikely set by the HV/Kernel, which we again don't have access to change, so we would only be able to access temporary files created right then and there.
So, in summary, interesting but it most likely wont let us achieve our goals!
- Join Date
- Apr 2005
Here is a brief guide as well, written by myself:
1) Download it HERE and UnZip it.
2) Copy it to the root of a USB/Flash drive.
3) Go to the device in the video menu and launch "AVCHD".
4) Go to BONUS and click GAME to launch Blaster Bunny.
It has also been confirmed that this method has been working on all PS3's regardless of Firmware and region, including 2.41 apparently.
Finally, THANKS CJPC for the clarification... and for not yelling "exploit" when infact it isn't one at all.
Update: Based on post time, it appears silenoz first posted the "AVCHD" zip and so I will be giving him the credit for finding it via HDCookBook (https://hdcookbook.dev.java.net/file...e-20080624.zip). I'm also moving this thread to the PS3 Chat section now.
07-18-2008 #4RexVF5 Guest
This is great news indeed. Congrats to the author of the disc.
I came up with the idea of attempting to use BD-J for accessing to PS3 however as I do not have BD-R writer and I couldn't make up AVCHD start BD-J code. Until this moment I have been waiting for arrival of BD-J disk from Sun that should contain BD-J code providing functionality to upload more code via TCP/IP and thus far avoiding the need to burn new media with each iteration.
I will start testing some ideas and possible weaknesses. There is access to storage and via BD-J code you should be able to obtain absolute path on the filesystem (although the JVM should prevent you from coming to other parts of the filesystem). Native code provides some possibilities. So I wouldn't give up on this path yet.
07-18-2008 #5d4ny Guest
Java Virtual Machine can also have vulnerabilities which sometimes can be exploited.
So, if Sony gives us possibility of running Java code from external source (prepared as BD-J) maybe somebody can show us something interesting.
Anyway, great job. Regards.
07-18-2008 #6trion Guest
Hmm when i get home i want to try it with JavaOs (http://en.wikipedia.org/wiki/JavaOS)
Hope that is uses all the power on the playstation and is faster then linux.
and here are some emulators that run on Java:
I'm trying this as soon as I will get home.
07-18-2008 #7tmaster Guest
the AVCHD was written HDCookBook and posted by silenoz not me, i just passed along the news.
with the hdcookbook we can writing our own Java small game.
07-18-2008 #8kakarotoks Guest
Humm.. this is interesting! Although CJPC says that it can't be used to gain access, and I don't want to sound like I know better than him, but I still have some questions about the feasability of this. Am I right in saying that this is the first "code" that we can run on the PS3 ? whether java or native or something ?
If yes, then it's still a new door by which we could access the ps3, IF we (==you) can find an exploit in the virtual machine... maybe it's sun's JVM, in which case, which version? or maybe it's Sony's custom implementation, any known exploit affecting a JVM.. anyhow, there might be a buffer overflow that can be used, or something else...
And what about JNI.. is it disabled for the BD-J and can't be used or are we in a full JVM implementation ? I'm guessing we're sandboxed, but is there a way to break through ? (think about a signed .jar, maybe there's a similar way to break through the sandbox).
Enough ranting! Thanks for reading.
07-18-2008 #9CJPC Guest
Well, you raise good points, and yes, your forgetting about OtherOS, it runs our code on PS3 hardware too!
But yes, if we could break out of the virtual machine, we would be running code on the system, but we may only get stuck in a lowlevel mode, in which not much can be done (think user mode). Sure it would run code, but nothing to really enough to "tinker" with the system.
Thats the issue however, breaking out of the virtual machine, its designed not to be broken out from, and the system could be watching for any "breakouts" from the VM, and could halt the system if it detects any, putting us back to square one.
If the VM could be broken out from, and If the PS3 was none the wiser, it would be great, but its like breaking out of a solitary jail cell (VM), then having to break out of the building that the cell was in (User/Kernel mode), then having to scale the fence of the Jail to get "full" access (Toppling the beloved HV).
Alas, its quite a few if's!
07-18-2008 #10kakarotoks Guest
Glad my points were good, was afraid it would be flagged as stupid rambling
Yes, I understand the difficulty of getting out of VM and everything involved (user/kernel space/etc..) but who knows, it's still worth the shot.. I mean, yes the VM was designed not to be broken out from, but the whole PS3 was designed that way too..
By the way, when I said "the first code we can execute", I meant "from the XMB firmware OS".
Also, about OtherOS, it's not the same thing, IMHO. I'm not in the loop with the PS3 dev stuff (and I still can't access the dev forum ) but I was guessing that the OtherOS was running as native code on the processor in it's own space, we could break through there, that's one door, one opportunity, but the VM is just yet another door that might not be as secure as the OtherOS system... They probably put a lot of security over OtherOS because they knew people would try to break in from there.. maybe they didn't put as much effort in the BD-J VM since it's not the "natural" way to go for breaking in...
Also the VM is running from the firmware OS, so maybe it's already one step closer to the kernel... In either case, it's better to be slamming two doors at once rather than just one, whichever breaks first will be the gate to our freedom!
Anyways, I'm just thinking of a buffer overflow, you get your code run from there and you can execute whatever you want, any sandbox or watchdog or whatever would not be able to prevent/protect a buffer overflow, unless the kernel/processor has a specific 'sandbox' flag that can be set on a process... but again, maybe we could use the buffer overflow to inject code into another higher-level security process and use that instead to gain access..
To conclude: nothing is 100% secure! I just hope you guys didn't completely drop this opportunity.
p.s.: Wasn't there also some other way to execute unsigned code from an older firmware version ?
Keep it up!