Thread: New idea for multiple exploits..
No, this isn't packaging redirection, this is packet manipulation, and modification.
We change the info in the packet to a custom server, and as I said won't disconnect the PS3. The PS3 does not verify with the server that SSL packet. The one that contains the "*.*.*.dl.playstation.net" information.
We need to live-edit this, and the playstation would let us download whatever we want from our own server *with name verification*
So if we have an ALREADY SIGNED pkg *SONY* - We can easily get the PS3 to download and install it.
We just need to modify the raw packet.
Anyways that's just my 2 cents.
I have tried to go through your earlier posts but cannot grasp your intended scenario. Could please try to describe it better?
my 2 cents is that couldnt someone with the right equipment be able to sniff the data on the bus going to the cpu as AFAIK one of the spus are there solely to run the hypervisor. couldnt we poke around the cpu and see what we find?
Yeah, it sadly is not that easy, the PPU/SPU bus(es) are inside the cpu, and are not external - so they can not be sniffed.
Note: Sure, I am assuming they could, in a laboratory, with crazy microscopes and very expensive equipment etc, but, its beyond any of our means.
I wish i had the technical know how to help in a different capacity. I would laugh heartily at sony once its hacked. Any hacker out there of worth () should take this as a direct challenge from sony.
http://packetstormsecurity.nl/web/) implement some of these techniques.
It's quite scary to think what the ISP's/Gov. can be done by marrying Deep Packet Inspection (DPI) hardware and code based on Achilles or Evilgrade.
All is not what it seems...