I mean how his method works..
09-14-2009 #12Banned User
- Join Date
- Jul 2008
PLZ guys let this "hacker" be alone. He belived that a RAM dump could lead into the private and decryption keys.
To this time i told him @ a other forum that it is not possible to do this. And the members there believed him and to be countered to me that the common-key from the Wii would also be dumped from the RAM. Its BS, common-key would be dumped out of the GPU the Starlight!
OK, this is from SKFU on IRC which may help to clarify what he meant:
what i meaned is decrypt hdd with knights methode and use the swf to run ur flash code as it doesnt run in a sandbox. its kinda cool.. one example is u could mod the db if known how to do etc etc
only bad is 3.0 removed it and as theres no 3.0 debug yet i dunno if theres still possible to reactivate the swf via widget controller
there's already interesting things dumped through this way like:
- ps3 retail bootable
- psn server login private auth
to explain the flash thingy:
it's a way i talked about with several other devs and it was working so i used it also in the post. this is NEW. but as its still very time consuming and bored to replace files through hdd and 3.0 patched it i didnt bother to make a major post just bout this.
as this does not run in a sandbox you can use it for stuffz like:
- read hdd with the flash once installed without decryption
- modify several files on the hdd (no further explain cuz this would just lead to ur lame piracy)
why are keys in the dumps u ask if its so secure?
well that's easy, it is NOT SO secure.
the vm0 stored on hdd is not secured at all so if a key finds its way in there its easy to dump the vm0 and gain a lot of interesting stuff with the hdd decryption or try again and again till u find it via the NAT bug
09-14-2009 #16Banned User
- Join Date
- Jul 2008
First what i want to say: I love that you write your programs for Linux!
Yea true but no private, puplic or decryption keys like you wanted to found with this methode.
the flash thingy:
But its gone with FW 3.0 and there is no more a way to downgrade a PS3 with higher FW and i belive even if you have the whole hdd decrypted you would not find what you WANT to find
"lame piracy"? and you mean you are not a little bit to arrogant? How you want to know how many games i have buyed and actuel @ home?
Or how many PS3īs and consoles i have at all?
why are keys in the dumps u ask?
Than have fun with your psydo nat bug and try it again or again and again or better tell sony about your findings from the vm0 becouse we are all, oh sry no only im a "lame pirat" and your the one who bring the importend stuff to the normal user becouse the normal user can write a Media Center running and installed onto the ps3.
But i wish only the best to you and every one else who try to get this beast to purr like a cat.Im out for now..
If I understand the thread correctly this is a guide to run your own code on the ps3 and not a guide for hacking the ps3.
So I would like to add 3 more ways of running your own code on a ps3.
4. PS2 Homebrew
You need a ps2 compatible ps3, obviously. SwapMagic original discs (3.6 or higher) to be able to boot from usb or do a disc swap to boot from cd/dvd.
You have access to the GS chip and can program anything within the limitations of the ps2 hardware and ps2 sandbox mode of the ps3.
Once more you need a ps2 compatible ps3. The Original PS2 Demo disc that came with PAL consoles or a disc swap for a backup. It also boots through USBLoader.
So what can you do with it? Lol, itīs Yabasic but you can run your own code.
6. PS1 Homebrew.
You need some way to perform a disc swap. There was some psx homebrew called Yaroze. I believe there was also a NES emulator. You would have to obtain a PS1 SDK to program your own code.