Hey there.

So... you use an ad blocker. That's cool. Sometimes we do too.


But without ad revenue, we wouldn't even be here. And we might not be here much longer.

Please disable your ad blocker and click to continue.

  1. #1
    Join Date
    Aug 2010
    Posts
    18

    PS3 LV2 Memory Dump help?

    I saw this thread months ago: http://www.ps4news.com/ps3-hacks-jai...a-Memory-Dump/

    I'm wondering if anyone has released the program, or a short explanation on how this is done. Keep in mind I'm not trying to decrypt NPDRM, just the elf from the game disc. I have tried the lvl 2 game OS dump app for 3.41 with no success. Any help would be appreciated.

  2. #2
    Join Date
    Sep 2010
    Posts
    662
    You may want to check this thread. http://www.ps4news.com/forums/ps3-gu...ws-116607.html

    I'm not sure exactly what you are looking for, but this utility includes readself and makeself functions. http://www.ps4news.com/forums/ps3-ha...le-116890.html

    And here is the AutoMOD tool for working on EBOOTs: http://www.ps4news.com/forums/ps3-ha...or-116923.html

  3. #3
    Join Date
    Aug 2010
    Posts
    18
    Unfortunately, I have had these tools for sometime. I understand that making a Self into an ELF still leaves a majority of the data encrypted/Xord. I would like to have a fully decrypted ELF. The interest I have was sparked when I found a "modified" popular disc game EBOOT floating around the net yesterday that had significantly more visiable text than the one I have.

    I have the disc EBOOT, as well as the debug version (I have ELF'd both) and neither have more than 5% readable text. The one i picked up has probably 15-20% more readable text. Hope this gives you a better idea of what I'm looking for.

  4. #4
    Join Date
    Sep 2010
    Posts
    662
    Gotcha. Unfortunately I think I am going to have to defer your question to a smarter dev than myself. Although that is interesting, I wonder if it has anything to do with the SDK tool used to decrypt it.

  5. #5
    Join Date
    Aug 2010
    Posts
    18
    That's what I was perplexed by myself. I'm wondering if it has somthing to do with reversing a secondary level of encrytpion, perhaps XOR? I appreciate your help nonetheless. +1

    Basically I'm inquiring if it is possible to acquire a dump of a disc ELF that has all the xored strings decrypted? I'm looking for a method to dump the lvl 2 game memory while actually running the game. I want to find the calls to the other game files, such as .PAK, .BIC, .TTARCH, .FBRB, .DAT etc. while in working memory. Can anyone give insight?

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

Log in