Results 1 to 10 of 10

Thread: Random PlayStation 3 HDD & RAM Dumping Bug Discovered

  1. #1
    Join Date
    Apr 2005

    Random PlayStation 3 HDD & RAM Dumping Bug Discovered

    Today SKFU has shared a bug he found in PS3 Firmware 2.8 (although he said it should be present since 2.0 through 3.0) that allows you to dump random data from the PlayStation 3 HDD and RAM.

    To quote: There's a little "bug" in the PlayStation3's NAT test which causes that you can dump random data from the HDD and RAM. Why exactly this appears; I don't know, yet. But well, it is interesting.

    The way how to do it is pretty simple. Set up Wireshark on the PC and activate ICS (Internet Connection Sharing).

    Connect the PS3 with the PC via LAN and start Wireshark's logging/sniffing feature on the LAN device. Now go to Settings on the PS3 and start a Internet Connection Test in the Network option.

    When the PS3 starts the NAT testing it will send default STUN packets together with several IP Fragments. Those both packet types will contain random data which the PS3 grabs from the HDD and/or RAM. There you go.

    [imglink=|Random PlayStation 3 HDD & RAM Dumping Bug Discovered][/imglink]
    More PlayStation 3 News...

  2. #2
    PSPSwampy Guest
    Interesting, but i don't see how this can really help (unless it can be forced to send specific memory addresses etc).

    Basically what we're saying here is that you can sniff small amounts of completely random data using this method. So you presumably have absolutely no idea where this data actually originated (as in disk or memory addresses) so cannot possibly hope to combine any larger sets of data.

    I guess the only use would be if you sat there long enough you might discover some previously unknown function calls or something - but that's gotta be like looking for a needle in the worlds largest haystack.

    Or am i missing the point on this one?

    Have to say - still an interesting news item, but seems a bit pointless to me (but then i'm no PS3 arcitecture expert!).


  3. #3
    Ihatecompvir Guest


    It would be awesome if we could somehow dump the Encryption keys from the PS3.
    If you tried it with No HD, would it only dump from RAM?

  4. #4
    CJPC Guest
    Well, assuming you could boot without a HDD - the system would be quite unstable to say the least, in theory it COULD pull from ram - then again, it might only pull from application area of that PRX, there are just too many variables and not enough data to make a conclusion - even testing would not answer the problem, due to the amount of randomness!

  5. #5
    Ihatecompvir Guest
    Oh I see. I'm still gonna dump a few times just to confirm this works on 3.0.

  6. #6
    Join Date
    Apr 2005
    Quote Originally Posted by Ihatecompvir View Post
    Oh I see. I'm still gonna dump a few times just to confirm this works on 3.0.
    That will be appreciated, mainly as he said on IRC he believes it's 2.0-3.0 but couldn't confirm it himself as he's on 2.8 at the moment.

  7. #7
    bidomo Guest


    Could it possibly be related to uPnP?

    I just hope a big NO!

  8. #8
    SCE Guest


    What about sending calls or commands to the console via LAN. Maybe, during the testing, instead of sending usual answers to the PS3, one can send different codes to PS3 and look what happens. (I am sure it was already done though.)

  9. #9
    kakarotoks Guest
    Humm.. I'm not sure if I should trust this.. has it been confirmed by anyone else?

    I know STUN (hell, I wrote a full (RFC3489 and RFC5389) STUN library) and I don't see how it could contain any random data.. a basic Binding request (for NAT discovery) would only be 20 bytes long (only the header, no attributes), 4 bytes in there are important (type of request + size of payload), then you get 16 bytes of "cryptographically random" transaction ID.. I would guess that maybe the transaction id is just a random, uninitialized pointer, instead of being filled with /dev/urandom data..

    If that's the case, then yeah, maybe it is possible, but I would doubt such a simple RFC would be implemented as badly as this (most library that do not care about the transaction id send "0000000000000000" as transaction id (which is perfectly fine/valid))...

    I don't know about the IP (or UDP) layers, but I doubt it would contain uninitialized data...

    In any case, this isn't helpful, since you can't predict which memory address will be captured... so you can't really 'reconstruct' the RAM's content or anything like that (and even if you could, 16 bytes at a time is really small), so it's not that useful in itself..

    But if it's confirmed true, it's still a nice find

    Thanks for sharing.

  10. #10
    Join Date
    Apr 2005
    I will answer (since nobody else has ) as this is what SKFU said on IRC in reply to your post:
    <SKFU> im kinda to lazy to answer but mainly i also don't know why exactly it grabs the data that's why i called it a bug :P
    So basically, this hasn't been tested/confirmed by anyone else and even SKFU himself pretty much have "moved on" from it.

    He only wanted to make mention of the bug finding itself, but (in my opinion) it's safe to place this on the back burner now as none of the other Devs are interested/plan to follow-up on this either.

    If anyone does, feel free to share your findings... but chances are most share the same thoughts as PSPSwampy and kakarotoks stated above on it.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts