Page 1 of 3 12 ... LastLast
Results 1 to 10 of 21

Thread: PlayStation 3 NID Attack Tool Released!

  1. #1
    Join Date
    Apr 2005

    PlayStation 3 NID Attack Tool Released!

    Recently xorloser has released a PS3 NID Attack Tool for other PS3 Devs. To quote:

    NidAttack was a tool created to work out PRX export/import names by dictionary attack. A PRX file is a DLL file for Playstation consoles; (Playstation Relocatable eXecutable ... maybe)

    NidAttack was initially created by others to work out PSP export/import names and I have just altered it slightly to also calculate PS3 names.

    Included is an xml database of all exports from PRX files found in the PS3 v2.30 system flash. Also present is a file with NIDs for just the unknown names, so these are the ones to use NidAttack on.

    Download: PS3 NID Attack Tool / PS3NidAttack.rar (Mirror)

    From the included ReadMe file:

    hashes.txt - This is the list of hashes from ps3.xml that are currently unknown.

    nidattack.xex - This is the nidattack tool from the PSP section of the svn. I just added some little changes to make it work for PS3 NIDs.

    ps3.xml - This is the database of all PS3 SPRX exports from the PS3 v2.30 system flash. More PlayStation 3 News...

  2. #2
    gtxboyracer Guest
    what does this really do? can anyone explain in lamens terms?

  3. #3
    RexVF5 Guest
    I'll try. AFAIU it aims to provide readable list of exports from those libraries residing in a flash. The libraries are not monolithic - instead they provide set of various functions that other programs (i.e. XMB, games, PlayTV, etc.) may use. So for example there are functions for working with memory (allocation, deallocation), C library (standard functions widely used), various audio formats decoders (I see AC3 and ATRAC there), video codecs support (AVC), etc. This information can be extremely useful once the clever people find a way to run their (unsigned) code - that code will need those functions to do some useful stuff... Is it clear?

  4. #4
    Shrink Guest
    Well.. At least I got it now. Thanks!

  5. #5
    gtxboyracer Guest
    Yeah thats pretty good. Thanks for that

  6. #6
    mattfish Guest
    Thanks for the explanation rexvf5. Much appreciated.

  7. #7
    puppero Guest
    Just a little question: If it is possible to read NIDs it means that at least the PRX/ELF headers are not encrypted. Anyone knows if they are still digitally signed. If not it could be possible to swap the export ID of different functions and somehow change the code path of signed code.

  8. #8
    UserXY Guest
    pretty nice, thank you very much

  9. #9
    wicked insanity Guest
    Is it just me or how the hell do we run this then?? (Not the best of English use I know but, it'll do)

  10. #10
    Join Date
    Apr 2005
    That idiot Pirate at quax has now STOLEN this news, posting it on his site including the very screenshot I took. It's due to LAMERS like them that force us to watermark all of our PS3 Dev pictures.

    If anyone is at quax, please inform them to stop STEALING our news without proper credit back to us as the SOURCE, and to use their own pictures or I will be contacting their host HostDime and domain registrar GoDaddy.

    This theft upsets not only myself, but ALL of the legitimate PS3 Devs here and slows down progress... it's bad enough their clueless lamers (StreetSkaterFU, RichDevX, etc) are constantly bugging our Devs on IRC, but this is happening far too often to ignore. For over a year now it's crystal clear quax has no real Devs of their own, so all they can do is steal our news and files- pathetic indeed!

Page 1 of 3 12 ... LastLast

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts