Page 4 of 6 FirstFirst ... 345 ... LastLast
Results 31 to 40 of 56

Thread: PS3 CFW Folder Checker Homebrew App and Source Code Arrive

  1. #31
    sigmaphi Guest
    a good release


  2. #32
    Join Date
    Apr 2005

    PS3Tools GUI Edition v2.0 Arrives, Incorporates PS3 EDAT Tools

    Following up on his previous release, this weekend PlayStation 3 developer PsDev has updated PS3Tools GUI Edition to version 2.0 which now incorporates the PS3 EDAT Tools with the complete changelog detailed below.

    Download: PS3Tools GUI Edition v2.0

    To quote: I collaborated now listen, PsDev back with the brand new edition. Yes, yes. Me and SnowyDew have collaborated and I added his magnificant tools to mine It was a struggle getting it to execute properly, but I finally got rid of all the errors and combined them for the best experience.
    • Changes, Decrypt and Re-encrypt edat's successfully
    • iso.bin.edat extraction
    • Decrypt eboot.pbp's / eboot.bins for further game modifiying
    • Decryption of act.dat and rif keys
    • Print coreos image info

    Snowydew: so the decryption as it stands right now, an do iso.bin.edat, requires idps, rif and act.dat for the games. re-encryption i believe it needs the “fake” signed ones, as well as an idps (not sure on the idps) however the second method only requires the idps and the .rap file. this does not cover licenseing games i believe (It could, but we haven’t tested it) the re-encryption algo is in the encryption one, but again haven’t been able to test it completely (reason I was asking around on twitter awhile back)

    Thanks to naehwert, snowydew, KaKaRoToKS, geohot, math and any one else I forgot.

    Finally, in related news today belioc has leaked what he claims are some PlayStation 3 Lv0 Opcodes (below) and has credited PsDev for them, as stated below:

    Although I am leaking this, I am still gonna give credit to who got these, that is PsDev. OpCodes (Operation codes) are the operation to be performed in a instruction set of the processor.

    Here are the lv0 operation codes. A lot are unknown so it's really hard to say what function they're doing, but the function offset is provided. When I recieved the file it has about 10MB of NOP (No operation performed) about 1MB of operations being performed.

    First Set:
    Second Set:

    Shortly afterwards, PsDev stated the following rebuttal though: Lol this is false, me and naehwert talked it over the opcodes are just a reading that is false due to the lv0 being encrypted. the BL is what decrypt the lv0. How would I dissemble a encrypted lv0?

    Haha last time I share something that could have potential (it don't) with someone.

    Just run the lv0 in a DisArm decoder (don't have to be DisArm) it will bot the self and tell the opcodes (that are false).

    Thanks naehwert. Good bye.

    [imglink=|PS3Tools GUI Edition v2.0 Arrives, Incorporates PS3 EDAT Tools][/imglink]
    More PlayStation 3 News...

  3. #33
    StanSmith Guest
    Can this decrypt 3.6+ eboots? If so then we can start making our own 3.55 eboots.

  4. #34
    Join Date
    Apr 2005

    PS3Tools GUI Edition v2.1 Out, Retail PKG Decryption and Extraction

    Today developer PsDev has updated PS3Tools GUI Edition v2.0 to version 2.1, which now includes PlayStation 3 Retail PKG decryption and extraction.

    Download: PS3Tools GUI Edition v2.1 / PS3Tools GUI Edition v2.1 (Mirror)

    To quote: The major addition is a Retail PKG decryption and extraction tool. I also removed the extra tools as it wasn't needed, and wasted space, most external programs are gonna be taken out and be coded so it's internal. That way space, folder size and your Computers memory is more free.

    I need to thank math because, this uses his AES engine and without it I would have had to code one on my own. (Don't worry I had his permission). It was truly a pain incorporating this into my program, much harder than the EDAT tools.
    private byte[] PS3AesKey = new byte[16] {
    0x2E, 0x7B, 0x71, 0xD7, 0xC9, 0xC9, 0xA1, 0x4E,
    0xA3, 0x22, 0x1F, 0x18, 0x88, 0x28, 0xB8, 0xF8
    Changelog v2.1:
    • Decryption of Retail PKG
    • Extraction of Retail PKG
    • Bug fixes
    • Removed external programs
    • Fixed bugs and added some little features in EDAT tool
    • Doesn't take up as much memory

    Also if I can port Rcomage to c# then expect that to be next release, it's hard porting c++ to c# though, but I'm trying, it has alot of code that needs converter.

    Thanks to naehwert, KaKaRoToKS, geohot, Math, eussNL and of course Fail0verFlow! and anyone else I forgot.

    [imglink=|PS3Tools GUI Edition v2.1 Out, Retail PKG Decryption and Extraction][/imglink]
    More PlayStation 3 News...

  5. #35
    JW117 Guest
    What is the different between this and pkgview? About THE decryption and extraction from pkg retail packages as pkg view

  6. #36
    DJoel Guest

  7. #37
    Join Date
    Apr 2005

    PS3Tools GUI Edition v2.5 Arrives, Includes New GUI and Features

    Following up on his previous release, this weekend PlayStation 3 homebrew developer PsDev has updated PS3Tools GUI Edition to version 2.5 which now includes a new PS3 GUI and features as outlined below.

    Download: PS3Tools GUI Edition v2.5

    To quote: To jump right into it, I have added a lot into this version. RCO dumper SFO reader and a whole new GUI form and GUI improvements.

    When the program first loads, you're going to be opted to choose the GUI, well remember the original GUI for the main screen? Well I added a new one that took out the Command prompt emulator, made the form smaller and sleeker.

    Once you choose the GUI you want it will take you too the specific form, but wait, you want to use the other GUI after your done with your first selection? Well I though of that and instead of having it close after selection it stay's alive until you're done!

    • Dump category_friend.rco
    • Dump category_game.rco
    • Dump category_music.rco
    • Dump category_network.rco
    • Dump category_photo.rco
    • Dump category_psn.rco
    • Dump category_sysconf.rco
    • Dump
    • Dump category_user.rco
    • Dump category_video.rco
    • Added loading bar on both GUI
    • Added dialogs to see completion
    • Add messageboxes for errors and PUP completion
    • Fixed minor bugs
    • Fixed Core_os image reader tool

    Side Note: All RCO's that are dumped will be shown in the RCO folder.

    Finally in related news, following up on his previous revisions today nevik has made available PS3Tools v2 for Mac OSX (10.6 10.7) and Make PKG (Windows) stating the following:

    If you repack any .PKG with they will install on 4.11 DEX. I have had a great deal of fun learning TCL TK and some python to try and make this tool as easy to use as possible for those who don't want to install Macports. Read README and how to use included.

    PS3Tools v2 for OSX:

    New: no more X11 needed all GUI is written in tcl tk.
    • Readself2
    • Edit Read and Create PARAM.SFO files.
    • Fail0verFlow make self tool

    As of now you can:
    • unself : F0F unself
    • unself2 : F0F unself2 See README.txt for mallory instructions.
    • readself : F0F readself and readself2<<new to V2
    • make_self : This is geohot's make_self.
    • make_self_F0F : F0F make self tool<<new to V2
    • make_self_npdrm : This is geohot's make_self_npdrm tool.
    • package_finalize : This is geohot's tool to make any .pkg installable on WutangrzaCFW.
    • norunpack : F0F to unpack NOR.BIN.
    • pupunpack : This will unpack any PS3UPDAT.PUP
    • pupexplode : This will unarchive all the files from the PS3UPDAT.PUP
    • ungpkg : This is for unpkg npdrm pkg (works on some .pkg not on others)
    • unpkg : This is for unpkg of regular pkg (works on some .pkg not on others)
    • unpack_devflash : it's a simple dev_flash extractor for 3.56+ PUPs --thanks Wargio
    • make_pkg : This is HACKERSCHANNEL-PS3Py's python script that will make a npdrm .pkg that will install on your PS3.
    • Extract CoreOs : it's a simple CoreOs extractor for 3.56+ PUPs --thanks Wargio
    • Edit PARAM.SFO : Edit or read a Game PARAM.SFO file. <<NEW in V2
    • New PARAM.SFO : create a New PARAM.SFO file for your homebrew. <<NEW in V2

    Update: PS3 developer nevik has now updated his OSX PS3 Tools to version 4 with the changes below, as follows:

    Download: / (Mirror)

    To quote: This is a collection of tools for use with the files from the Ps3 and it’s games. This contains many tools, none of which I developed! I simply collected them and put a GUI to them to make it easier to use for those of us running OsX. This has been tested on 10.8-10.9.3

    Tools found in this collection are: Scetool, FailOverFl0w’s tools, Reself, Make_npdata, ps2classic, ps3isotool, fixEBOOT and a few more. So thanks to all who contributed time in developing these tools including but not limited to: flatz , IngPereira , LoOzers, aldostools , baargle , fail0verfl0w, Graf _chokolo, MAGiC333X, naehrwert.

    This will help you decrypt and encrypt files, unpkg .pkg’s, explore firmwares, create .pkg files and manage your games and a few more things. Make sure to click the Read_Me button first to install the necessary files to make the tool run correctly.

    It will also help you install the keys and all the proper files i.e.: /exdata, act.dat, idps… to ensure that everything runs correctly. Once again thanks to all who have contributed to the scene and I hope that this will help a few people out who run OsX! Enjoy!

    [imglink=|PS3Tools GUI Edition v2.5 Arrives, Includes New GUI and Features][/imglink]
    More PlayStation 3 News...

  8. #38
    Join Date
    Apr 2005

    PS3Tools GUI Edition Updated to v2.6, PS3 CEX to DEX App Added

    Following up on his previous revision, today PlayStation 3 developer PsDev has updated PS3Tools GUI Edition to version 2.6 which now includes PS3 CEX to DEX functionality as outlined below.

    Download: PS3Tools GUI Edition v2.6

    To quote: Hi everybody, here to release my new update.

    PS3Tools GUI Edition v2.6 Changes:
    • Added CEX 2 DEX
    • New Interface
    • Fixed PKG decryptor button
    • Fixed EDAT Tool button
    • Removed second GUI form
    • Minor bug fixes and code changes to perform better

    I have been asked a lot recently to add in a debug PKG decryptor because all I had is a Retail decryptor & extractor. Well I did, but last minute checks, I noticed it was not performing the way I wanted it too.

    So instead of releasing faulty code/tool on my program and say it works half way, I'd rather withdraw the feature until a further update when I can have it working properly to my standards and what should be most.

    PlayStation 3 CEX to DEX:

    This whole CEX to DEX is going around, I felt like adding it to GUI form had to be done so, I jumped on band wagon and did it. When going to use this Make sure you have a CEX Nor flashed named "CEXFLASH.bin" and the eid_root_key.bin in the program folder.

    Run the tool and it will output a DEXFLASH.bin... easy as pie. Note* opensll required!!

    Thanks to naehrwert, KaKaRoToKS, andbey0nd Math, HsRiena, geohot, eussNL, zecoxao and ofcourse the MAIN team I cannot forgot. Fail0verFlow also tthousand for always helping with everything, you're awesome buddy I never give you enough appreciation and thanks!!

    Finally, from Sony PS3 hacker evilsperm:

    I will not be going into detail on how to compile the metldrpwn or how to compile and use libeeid. Oh and if you don't know what scp is go google it because im not gonna be getting into all that, this isnt a spoon feeding tut

    1. dump nor (from xmb, hardware flasher, or petitboot) if from petitboot you will need a flash drive or external hdd. make sure you hold on to this backup or your FUCT if something goes wrong.
    2. extract nor (f0f tools or the windows nor unpack)
    3. install rebug otheros++
    4. install rebug otheros++ preptools
    5. boot into petitboot
    Now this is where it will start to get tricky because you will need to either scp files or use a flashdrive/external hdd, I use scp because its fast and easy
    6. READ eEID : dd if=/dev/ps3nflasha skip=$((0x2F000)) of=/cex_eid.bin bs=1 count=$((0x10000))
    7. scp cex_eid.bin to your computer
    8. cd / rm cex_eid.bin
    8. scp your metldr to the PS3 from your computer
    9. run the metldrpwn on your metldr and dump the eid_root_key
    10. scp your eid_root_key from your PS3 to your computer
    11. use libeeid or whatever that other cex>dex tool is and convert your eid to dex (using the cex_eid.bin > dex_eid.bin)
    12. scp your new dex_eid.bin to the PS3
    13. WRITE eEID: dd if=dex_eid.bin of=/dev/ps3nflasha bs=1 seek=$((0x2F000)) count=$((0x10000))
    14. reboot
    15. if you're not bricked you will still be in cex FW just install DEX fw and poof your done


    If you brick its 100% you're fault and you didn't follow the instructions the the letter, or you just did something wrong all together. Don't ask me what went wrong cuz I won't have a clue nor do I care if you brick seeing I warned you to have a hardware flasher just in case.

    Sorry if that sounds harsh but if you don't think you can do this then you shouldn't be trying to mess with your nor in the first place because YOU CAN PERM BRICK!

    Rename the .bin's for use with this gui...

    Note: After booting to gameOS from petitboot (just after writing the nor, which only a very small section is actually changed) it is still booting the cex firmware that is installed. It isn't on debug fw yet, so there are no debug options. All this does is allow you to install a debug firmware.

    [imglink=|PS3Tools GUI Edition Updated to v2.6, PS3 CEX to DEX App Added][/imglink]
    More PlayStation 3 News...

  9. #39
    Join Date
    Apr 2005

    PS3Tools GUI Edition v3.0 - PS3 SPU, Debug PKG & SELF Decryption

    Shortly following his last release, today PlayStation 3 developer PsDev has now updated PS3Tools GUI Edition to version 3.0 which now adds PS3 SPU emulation, SELF decryption and Debug PKG decryption as detailed below.

    Download: PS3Tools GUI Edition v3.0

    To quote: Hi everyone, here with a new update to my program. Added SPU Emulation, Self Decryption and debug pkg decryption. Along with more accurate loading bars and a interface change to pkg tool, spu emulation, self decryption, edat tool.
    • SPU emulation added
    • Debug PKG decryption added
    • SELF decryption added
    • Logging Errors/successes added to EDAT tool
    • Logging Errors/succession added to PKG tool
    • Loading bars code adjustment, more accurate now

    Originally by KDSBest, SPU emulation has been incorporated in my GUI. It was quite easy, we both coded our programs in C# (Sharp) so I didn't really have much trouble.

    Self decryption is know possible. Just browse for your self/bin file and hit decrypt or, drag and drop. Yes I added it.

    Now Debug PKG decryption is a option too, just name the file debugpkg.pkg put in root of program folder and run the tool and it decrypts.

    [imglink=|PS3Tools GUI Edition v3.0 - PS3 SPU, Debug PKG & SELF Decryption][/imglink]
    More PlayStation 3 News...

  10. #40
    Join Date
    Apr 2005

    PS3Tools GUI Edition v3.1 - PS3 SPU Emulation and .SELF Encryption

    Just a few days since his PS3Tools GUI Edition v3.0 release, PsDev has now updated the homebrew application to version 3.1 which includes PS3 SPU emulation changes, .SELF encryption and more as outlined below.

    Download: PS3Tools GUI Edition v3.1

    To quote: Just finished my latest update for PS3Tools GUI Edition. I added quite a bit of changes in this version, scroll down to the Change log to see.
    • .SPU is now extension for emulator
    • SPU editor
    • Edit SPU files for emulator
    • Save SPU files for emulator whilst the program still open for faster emulation
    • A label that tells whether it’s currently emulating or not
    • SPU emulator has message boxes now upon successeions or errors
    • SPU refreshed button fixed
    • Changed interface for LS and codewatcher
    • Debug pkg decryption temporarily removed
    • Checks pkg type now
    • SELF encryption added
    • Filter added to opening SPU file on editor and emulator so it narrows it down to just .SPU files
    • CEX2DEX now will tell if validation is done
    • Test.SPU included for testing
    • Included missing .dll for SPU emulation

    I had some reports the Debug pkg decryption wasn’t working, so I removed until further notice.

        # to make a comment use #
        This is how to load a file
        #elf,file.elf,true #the ext first the comma then the file name and ext. 
        #place the file to load in program folder
        #now just load this test.SPU file and in r3[0]
        #here is how you would test a register
        #r,3,0,0xdead0000 #meaning r3[0] #shows in leftside
        r,3,0,0xdead0000 #above^
        r,5,0,0xbabe0000 #r5[0]
        r,4,1,0xcafe0000 #r4[1]
        r,127,0,0xbeef0000 #r127[0]
        r,54,2,0xdead0000 #r54[2]
    Nice little example I made up, I commented on it to give you a little understanding. Still gotta give props to KDSBest for original creation.

    Finally, below are some guides from PsDev (via for those interested:

    PS3 PUP Unpacker:

    1. Make sure the PUP is named "PS3UPDAT.PUP"
    2. Click the drop down menu in PUP Tools
    3. Click "PUP unpacker"
    4. Now click do it and your down, you will receive a output like below:
    sections: 9
    hdr size: 00000000_00000290
    data size: 00000000_0c031127
    header hmac: ???
    unpacking version.txt (00000000_00000005 bytes; hmac: ???)...
    unpacking license.txt (00000000_0004a59a bytes; hmac: ???)...
    unpacking update_flags.txt (00000000_00000005 bytes; hmac: ???)...
    unpacking ps3swu.self (00000000_005675c0 bytes; hmac: ???)...
    unpacking vsh.tar (00000000_00002800 bytes; hmac: ???)...
    unpacking dots.txt (00000000_00000003 bytes; hmac: ???)...
    unpacking update_files.tar (00000000_0b501800 bytes; hmac: ???)...
    Dev_flash Tool:

    1. Name the PUP "PS3UPDAT.PUP"
    2. Click the drop down menu in PUP Tools
    3. Click Dev_flash unpacker, and hit Do It. You will get output like below (Note, It will be a lot longer, that's just a example):
    opening file PS3UPDAT.PUP
    Firmware version version : 4.20
    extracting dev_flash/data/font/SCE-PS3-YG-R-KOR.TTF
    extracting dev_flash/data/font/SCE-PS3-NR-L-JPN.TTF
    extracting dev_flash/data/font/SCE-PS3-DH-R-CGB.TTF
    extracting dev_flash/data/font/SCE-PS3-NR-R-JPN.TTF
    extracting dev_flash/data/font/SCE-PS3-MT-B-LATIN.TTF
    extracting dev_flash/data/font/SCE-PS3-CP-R-KANA.TTF
    extracting dev_flash/data/font/SCE-PS3-NR-B-JPN.TTF
    extracting dev_flash/data/font/SCE-PS3-YG-L-KOR.TTF
    extracting dev_flash/data/font/SCE-PS3-RD-R-LATIN.TTF
    extracting dev_flash/data/font/SCE-PS3-MT-BI-LATIN.TTF
    extracting dev_flash/data/font/SCE-PS3-MT-I-LATIN.TTF
    extracting dev_flash/data/font/SCE-PS3-NR-R-EXT.TTF
    extracting dev_flash/data/font/SCE-PS3-SR-R-JPN.TTF
    extracting dev_flash/data/font/SCE-PS3-SR-R-EXT.TTF
    extracting dev_flash/data/font/SCE-PS3-RD-B-LATIN2.TTF
    extracting dev_flash/data/font/SCE-PS3-RD-L-LATIN.TTF
    extracting dev_flash/data/font/SCE-PS3-VR-R-LATIN.TTF
    extracting dev_flash/data/font/SCE-PS3-SR-R-LATIN.TTF
    extracting dev_flash/data/font/SCE-PS3-RD-B-LATIN.TTF
    extracting dev_flash/data/font/SCE-PS3-RD-R-LATIN2.TTF
    extracting dev_flash/data/font/SCE-PS3-VR-R-LATIN2.TTF
    extracting dev_flash/data/font/SCE-PS3-YG-B-KOR.TTF
    extracting dev_flash/data/font/SCE-PS3-SR-R-LATIN2.TTF
    extracting dev_flash/data/font/SCE-PS3-MT-R-LATIN.TTF
    extracting dev_flash/data/font/SCE-PS3-RD-BI-LATIN.TTF
    extracting dev_flash/data/font/SCE-PS3-RD-L-LATIN2.TTF
    extracting dev_flash/data/font/SCE-PS3-RD-I-LATIN.TTF
    extracting dev_flash/data/font/SCE-PS3-RD-LI-LATIN.TTF
    extracting dev_flash/vsh/etc/version.txt
    Readself Tool:

    1. Just place one of the following, lv0, lv1ldr, lv2ldr, appldr, isoldr or EBOOT.BIN in root of program folder
    2. Click drop down menu
    3. Click the one you want to use and click Do it, you will get the following output (Note, Different for other files selected):
    SELF header
    elf #1 offset: 00000000_00000090
    header len: 00000000_00000500
    meta offset: 00000000_000001e0
    phdr offset: 00000000_00000040
    shdr offset: 00000000_000e6c70
    file size: 00000000_000e6a80
    auth id: 1ff00000_01000001 (Unknown)
    vendor id: ff000000
    info offset: 00000000_00000070
    sinfo offset: 00000000_00000140
    version offset: 00000000_00000180
    control info: 00000000_00000190 (00000000_00000070 bytes)
    app version: 4.32.0
    SDK type: Retail (Type 0)
    app type: level 0
    Control info
    control flags:
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    file digest:
    ae 8f b2 11 30 04 95 27 1f ec 74 69 cc 2a c7 cb 9e 76 d7 58
    Section header
    offset size compressed unk1 unk2 encrypted
    00000000_00010500 00000000_00000c70 [NO ] 00000000 00000000 [YES]
    00000000_00020500 00000000_000c67c0 [NO ] 00000000 00000000 [YES]
    Encrypted Metadata
    unable to decrypt metadata
    ELF header
    type: Executable file
    machine: PowerPC64
    version: 1
    phdr offset: 00000000_00000040
    shdr offset: 00000000_000e6800
    entry: 00000000_00000c60
    flags: 00000000
    header size: 00000040
    program header size: 00000038
    program headers: 2
    section header size: 00000040
    section headers: 10
    section header string table index: 9
    Program headers
    type offset vaddr paddr
    memsize filesize PPU SPE RSX align
    LOAD 00000000_00010000 00000000_00000000 00000000_00000000
    00000000_00000c70 00000000_00000c70 rwx --- --- 00000000_00010000
    LOAD 00000000_00020000 00000000_08000000 00000000_08000000
    00000000_000cb6d0 00000000_000c67c0 rwx --- --- 00000000_00010000
    Section headers
    [Nr] Name Type Addr ES Flg Lk Inf Al
    Off Size
    [00] <no-name> NULL 00000000_00000000 00 00 000 00
    00000000_00000000 00000000_00000000
    [01] <no-name> PROGBITS 00000000_00000000 00 wae 00 000 08
    00000000_00010000 00000000_00000c70
    [02] <no-name> PROGBITS 00000000_08000000 00 wa 00 000 04
    00000000_00020000 00000000_0001758c
    [03] <no-name> PROGBITS 00000000_08017590 00 a 00 000 16
    00000000_00037590 00000000_0002c760
    [04] <no-name> PROGBITS 00000000_08043cf0 00 ae 00 000 16
    00000000_00063cf0 00000000_0007d768
    [05] <no-name> PROGBITS 00000000_080c1460 00 ae 00 000 08
    00000000_000e1460 00000000_00004278
    [06] <no-name> PROGBITS 00000000_080c56d8 00 ae 00 000 08
    00000000_000e56d8 00000000_00000080
    [07] <no-name> PROGBITS 00000000_080c5760 00 ae 00 000 08
    00000000_000e5760 00000000_00001060
    [08] <no-name> NOBITS 00000000_080c6800 00 ae 00 000 128
    00000000_000e67c0 00000000_00004ed0
    [09] <no-name> STRTAB 00000000_00000000 00 00 000 01
    00000000_000e67c0 00000000_0000003d
    Core_os Tool:

    1. Make sure the Core_os is named original.
    2. Click Drop down menu
    3. Then click decrypt and do it.
    4. You will be outputed with a file called decrypted_core_os_package
    5. Then click extract you will be presented with a extracted core_os
    6. Then you can encrypt it and you will be presented with a encrypted core_os
    7. Output below for decrypted log:
    Metadata Key: D7 1D 9A 12 BB E6 D9 87 8F 72 AB 59 F1 ED D4 44
    Metadata IV: 7E 05 A9 79 FF 64 DC FC 46 87 02 5B 69 82 AE E2
    Metadata Size: 544 bytes
    Data Start: 0x00000300
    Data Size: 5778777 bytes (5.51 MB)
    PKG Key: F8 72 19 EC FE 95 EF 1F 51 22 3D 04 A3 E2 37 5E
    PKG IV: F7 1E 03 B6 9D 5D 74 D7 7B 03 F6 14 00 00 00 00
    PKG Size: 7340000 bytes (7.00 MB)
    Fix Tar Tool:

    1. After modifying the tar file you need to fix it for it to be correct, so have it named "Update_files.tar"
    2. Click drop down menu
    3. Click the following options on the screen that apply to the tar you want to fix
    4. Click do it, you will get a output similar like below:
    Fixing file : BDIT_FIRMWARE_PACKAGE.pkg
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : BDPT_FIRMWARE_PACKAGE_301R.pkg
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : BDPT_FIRMWARE_PACKAGE_302R.pkg
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : BDPT_FIRMWARE_PACKAGE_303R.pkg
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : BDPT_FIRMWARE_PACKAGE_304R.pkg
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : BDPT_FIRMWARE_PACKAGE_306R.pkg
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : BDPT_FIRMWARE_PACKAGE_308R.pkg
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : BDPT_FIRMWARE_PACKAGE_310R.pkg
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : BDPT_FIRMWARE_PACKAGE_312R.pkg
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : BDPT_FIRMWARE_PACKAGE_314R.pkg
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : BLUETOOTH_FIRMWARE.pkg
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : CORE_OS_PACKAGE.pkg
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : MULTI_CARD_FIRMWARE.pkg
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : SYS_CON_FIRMWARE_01000006.pkg
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : SYS_CON_FIRMWARE_01010303.pkg
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : SYS_CON_FIRMWARE_01020302.pkg
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : SYS_CON_FIRMWARE_01030302.pkg
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : SYS_CON_FIRMWARE_01040402.pkg
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : SYS_CON_FIRMWARE_01050002.pkg
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : SYS_CON_FIRMWARE_01050101.pkg
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : SYS_CON_FIRMWARE_S1_00010002083E0832.pkg
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : UPL.xml.pkg
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : RL_FOR_PACKAGE.img
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : RL_FOR_PROGRAM.img
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : dev_flash3_024.tar.aa.2012_06_15_074020
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : dev_flash_000.tar.aa.2012_06_15_073845
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : dev_flash_001.tar.aa.2012_06_15_073845
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : dev_flash_002.tar.aa.2012_06_15_073845
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : dev_flash_003.tar.aa.2012_06_15_073845
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : dev_flash_004.tar.aa.2012_06_15_073845
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : dev_flash_005.tar.aa.2012_06_15_073845
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : dev_flash_006.tar.aa.2012_06_15_073845
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : dev_flash_007.tar.aa.2012_06_15_073845
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : dev_flash_008.tar.aa.2012_06_15_073845
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : dev_flash_009.tar.aa.2012_06_15_073845
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : dev_flash_010.tar.aa.2012_06_15_073845
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : dev_flash_011.tar.aa.2012_06_15_073845
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : dev_flash_012.tar.aa.2012_06_15_073845
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : dev_flash_013.tar.aa.2012_06_15_073845
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : dev_flash_014.tar.aa.2012_06_15_073845
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : dev_flash_015.tar.aa.2012_06_15_073845
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : dev_flash_016.tar.aa.2012_06_15_073845
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : dev_flash_017.tar.aa.2012_06_15_073845
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : dev_flash_018.tar.aa.2012_06_15_073845
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : dev_flash_019.tar.aa.2012_06_15_073845
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : dev_flash_020.tar.aa.2012_06_15_073845
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : dev_flash_021.tar.aa.2012_06_15_073845
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : dev_flash_022.tar.aa.2012_06_15_073845
    Owner/group: pup_tool(0001752)snes(0001274)
    Fixing file : dev_flash_023.tar.aa.2012_06_15_073845
    Owner/group: pup_tool(0001752)snes(0001274)
    SCE Info Tool:

    1. Have one of the following file in root folder, lv0, ld1ldr, lv2ldr, appldr, isoldr or eboot.bin
    2. Click the option that applys
    3. Click do it and you will get output similar like below:
    Magic 0x53434500 [OK]
    Version 0x00000002
    Key Revision [Revision 0]
    Header Type [SELF]
    Metadata Offset 0x000001E0
    Header Length 0x0000000000000500
    Data Length 0x00000000000E6A80[*] SELF Header:
    Header Type 0x0000000000000003
    App Info Offset 0x0000000000000070
    ELF Offset 0x0000000000000090
    PH Offset 0x00000000000000D0
    SH Offset 0x00000000000E6D00
    Section Info Offset 0x0000000000000140
    SCE Version Offset 0x0000000000000180
    Control Info Offset 0x0000000000000190
    Control Info Size 0x0000000000000070[*] Application Info:
    Auth-ID [lv0]
    Vendor-ID [hv]
    SELF-Type [lv0]
    Version 04.20[*] SCE Version:
    Header Type 0x00000001
    Present [FALSE]
    Size 0x00000010
    unknown_3 0x00000000[*] Control Info
    Type Flags
    Size 0x00000030
    Next [TRUE]
    Flags 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00[*] Control Info
    Type Digest
    Size 0x00000040
    Next [FALSE]
    Digest 1 62 7C B1 80 8A B9 38 E3 2C 8C 09 17 08 72 6A 57
    9E 25 86 E4
    Digest 2 AE 8F B2 11 30 04 95 27 1F EC 74 69 CC 2A C7 CB
    9E 76 D7 58[*] Section Infos:
    Idx Offset Size Compressed unk0 unk1 Encrypted
    000 00010500 00000C70 [NO ] 00000000 00000000 [YES]
    001 00020500 000C67C0 [NO ] 00000000 00000000 [YES][*] ELF64 Header:
    Type [EXEC]
    Machine [PPC64]
    Version 0x00000001
    Entry 0x0000000000000C60
    Program Headers Offset 0x0000000000000040
    Section Headers Offset 0x00000000000E6800
    Flags 0x00000000
    Program Headers Count 0002
    Section Headers Count 0010
    SH String Index 0009[*] ELF64 Program Headers:
    Idx Type Offset VAddr PAddr FileSize MemSize PPU SPU RSX Align
    000 LOAD 00010000 00000000 00000000 00000C70 00000C70 XWR --- --- 00010000
    001 LOAD 00020000 08000000 08000000 000C67C0 000CB6D0 XWR --- --- 00010000[*] ELF64 Section Headers:
    Idx Name Type Flags Address Offset Size ES Align LK
    000 0000 NULL --- 00000000 00000000 00000000 0000 00000000 000
    001 000B PROGBITS WAE 00000000 00010000 00000C70 0000 00000008 000
    002 0013 PROGBITS -AE 08000000 00020000 0001758C 0000 00000004 000
    003 0019 PROGBITS -A- 08017590 00037590 0002C760 0000 00000010 000
    004 0021 PROGBITS WA- 08043CF0 00063CF0 0007D768 0000 00000010 000
    005 0027 PROGBITS WA- 080C1460 000E1460 00004278 0000 00000008 000
    006 002C PROGBITS WA- 080C56D8 000E56D8 00000080 0000 00000008 000
    007 0033 PROGBITS WA- 080C5760 000E5760 00001060 0000 00000008 000
    008 0038 NOBITS WA- 080C6800 000E67C0 00004ED0 0000 00000080 000
    009 0001 STRTAB --- 00000000 000E67C0 0000003D 0000 00000001 000
    SFO Reader Tool:

    1. Name the file PARAM.SFO
    2. Click drop dow menu and click sfo reader
    3. Click do it and you will be presented with similar output like below:
    | HEADER |
    FILE_VERSION: 0x101
    APP_VER: 01.16
    PS3_SYSTEM_VER: 03.7200
    TITLE: Modern Warfare┬ 3
    TITLE_ID: BLUS30838
    VE9: 01.00
    RCO Tool:

    1. Have the original name of one of the rco that are optioned in the drop down menu
    2. Make sure that specific rco file is in your root of your folder
    3. Click it then click do it, you will have a dumped rco in RCO folder along with following output:
    RCO header info:
    Endian = big (PS3)
    VersionID = 0x120
    Compression = 0x1
    UMDFlag = 0
    MainTree Offset = 0xa4
    TextTree Offset = 0xe8c
    ImageTree Offset = 0xcc
    ObjectTree Offset = 0x1064c
    TextData Offset = 0x9e4c [length = 0xd714]
    NameData Offset = 0x16d6c [length = 0x1a14]
    EventData Offset = 0x18780 [length = 0x27c]
    ImageData Offset = 0x17560 [length = 0x2f100]
    Header compression: compressed = 0x9d99 bytes, uncompressed = 0x18958 bytes
    TextData Compression info:
    LangID = 0x6, compressed = 0xbf1 bytes, uncompressed = 0x2ef8 bytes
    LangID = 0x1, compressed = 0xab1 bytes, uncompressed = 0x2a80 bytes
    LangID = 0x2, compressed = 0xc4a bytes, uncompressed = 0x30f8 bytes
    LangID = 0x4, compressed = 0xc08 bytes, uncompressed = 0x2fd0 bytes
    LangID = 0x5, compressed = 0xbc5 bytes, uncompressed = 0x2fb0 bytes
    LangID = 0x0, compressed = 0x9c5 bytes, uncompressed = 0x18e8 bytes
    LangID = 0x9, compressed = 0x9bb bytes, uncompressed = 0x18d0 bytes
    LangID = 0x7, compressed = 0xc13 bytes, uncompressed = 0x2f48 bytes
    LangID = 0x8, compressed = 0xcd5 bytes, uncompressed = 0x2f34 bytes
    LangID = 0x3, compressed = 0xbbe bytes, uncompressed = 0x2ea8 bytes
    LangID = 0xb, compressed = 0x8f1 bytes, uncompressed = 0x135c bytes
    LangID = 0xa, compressed = 0x957 bytes, uncompressed = 0x1428 bytes
    LangID = 0xe, compressed = 0xb80 bytes, uncompressed = 0x2bc0 bytes
    LangID = 0xc, compressed = 0xb8b bytes, uncompressed = 0x2b94 bytes
    LangID = 0xf, compressed = 0xb2e bytes, uncompressed = 0x2b20 bytes
    LangID = 0xd, compressed = 0xb5d bytes, uncompressed = 0x2ac0 bytes
    LangID = 0x10, compressed = 0xc92 bytes, uncompressed = 0x2eb0 bytes
    LangID = 0x11, compressed = 0xbbe bytes, uncompressed = 0x2e70 bytes
    LangID = 0x12, compressed = 0xab1 bytes, uncompressed = 0x2a80 bytes
    Dumping resource 'tex_aa_plane'...
    Dumping resource 'tex_button'...
    Dumping resource 'tex_button_focus'...
    Dumping resource 'tex_button_shadow'...
    Dumping resource 'tex_arrow_anim'...
    Dumping resource 'item_tex_plain_folder'...
    Dumping resource 'tex_loading_icon'...
    Dumping resource 'tex_opt_obi'...
    Dumping resource 'tex_playing'...
    Dumping resource 'tex_playing_shadow'...
    Dumping resource 'game_tex_load'...
    Dumping resource 'game_tex_load_shadow'...
    Dumping resource 'tex_quit'...
    Dumping resource 'video_tex_load'...
    Dumping resource 'video_tex_load_shadow'...
    Dumping resource 'video_tex_lock'...
    Dumping resource 'video_tex_rental'...
    Dumping resource 'tex_psplus_icon'...
    Dumping resource 'bgdl_tex_preinstall'...
    Dumping resource 'bgdl_tex_timelimit'...
    Dumping resource 'tex_guit'...
    Dumping resource 'tex_video'...
    Dumping resource 'tex_video_shadow'...
    Dumping resource 'item_tex_disc_bd'...
    Dumping resource 'item_tex_disc_dvd'...
    Dumping resource 'item_tex_disc_icon'...
    Dumping resource 'item_tex_disc_bd_contents'...
    Dumping resource 'item_tex_ms_icon'...
    Dumping resource 'item_tex_sd_icon'...
    Dumping resource 'item_tex_cf_icon'...
    Dumping resource 'item_tex_psp_icon'...
    Dumping resource 'item_tex_psp_ms_icon'...
    Dumping resource 'item_tex_usb_connection'...
    Dumping resource 'item_tex_digital_camera'...
    Dumping resource 'item_tex_atrac_audio'...
    Dumping resource 'item_tex_walkman'...
    Dumping resource 'item_tex_ps_store'...
    Dumping resource 'item_tex_upload'...
    Dumping resource 'item_tex_dlna_scan'...
    Dumping resource 'item_tex_dlna_base'...
    Dumping resource 'item_tex_dlna_default'...
    Dumping resource 'tex_mpg4'...
    Dumping resource 'tex_avc'...
    Dumping resource 'tex_mpg2'...
    Dumping resource 'tex_mpg1'...
    Dumping resource 'tex_mjpg'...
    Dumping resource 'tex_wmv'...
    Dumping resource 'tex_divx'...
    Dumping resource 'tex_broken_icon'...
    Dumping resource 'tex_unknown_icon'...
    Dumping resource 'tex_bg_icon'...
    Dumping resource 'tex_lock_icon'...
    Dumping resource 'tex_sb_base'...
    Dumping resource 'tex_sb_base_s'...
    Dumping resource 'tex_sb_slider'...
    Dumping resource 'tex_album_icon'...
    Dumping resource 'video_tex_default'...
    Dumping resource 'video_tex_album_default'...
    Dumping Dutch text entries...
    Dumping English text entries...
    Dumping French text entries...
    Dumping German text entries...
    Dumping Italian text entries...
    Dumping Japanese text entries...
    Dumping Korean text entries...
    Dumping Portugese text entries...
    Dumping Russian text entries...
    Dumping Spanish text entries...
    Dumping ChineseSimpl text entries...
    Dumping ChineseTrad text entries...
    Dumping Danish text entries...
    Dumping Finnish text entries...
    Dumping Norwegian text entries...
    Dumping Swedish text entries...
    Dumping unknown0x10 text entries...
    Dumping unknown0x11 text entries...
    Dumping unknown0x12 text entries...
    C2D Tool:

    1. Have the eid_root_key named this "eid_root_key.bin"
    2. Name the Flash or your Nor, CEXFLASH
    3. Have openssl installed under C:/opensll
    4. Then click drop down menu
    5. Click only option
    6. Click do it and get output plus DEXFLASH like below:
    EID key : 48 bytes (eid_root_key.bin)
    Flash size : 16 MB (CEXFLASH.bin)
    Target ID : $85
    EID ROOT KEY: 64D20967DEACDA16ACADBE289B0EE2C25EE77331A5040C5DC9 DF67B3FE574F6D
    EID ROOT IV : 6BD7C324D3B213A647DC31987345595E
    EID0 KEY : 9C1C4A93666EF67941F54679A7199D7553C8F0F50F3548C896 6D6872FC8CD668
    EID0 IV : 2DC374E270F851EB0D524F89790F2563
    Target ID : $85 (from decrypted EID0 section)
    CMAC HASH : F1053CC3818DD6CE2775F0273DFC212E
    Writing modified flash (DEXFLASH.bin)...
    [imglink=|PS3Tools GUI Edition v3.1 - PS3 SPU Emulation and .SELF Encryption][/imglink]
    More PlayStation 3 News...

Page 4 of 6 FirstFirst ... 345 ... LastLast

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts