Thread: PS3 LV2 Memory Dump help?
PS3 LV2 Memory Dump help?
I saw this thread months ago: http://www.ps4news.com/ps3-hacks-jai...a-Memory-Dump/
I'm wondering if anyone has released the program, or a short explanation on how this is done. Keep in mind I'm not trying to decrypt NPDRM, just the elf from the game disc. I have tried the lvl 2 game OS dump app for 3.41 with no success. Any help would be appreciated.
You may want to check this thread. http://www.ps4news.com/forums/ps3-gu...ws-116607.html
I'm not sure exactly what you are looking for, but this utility includes readself and makeself functions. http://www.ps4news.com/forums/ps3-ha...le-116890.html
And here is the AutoMOD tool for working on EBOOTs: http://www.ps4news.com/forums/ps3-ha...or-116923.html
Unfortunately, I have had these tools for sometime. I understand that making a Self into an ELF still leaves a majority of the data encrypted/Xord. I would like to have a fully decrypted ELF. The interest I have was sparked when I found a "modified" popular disc game EBOOT floating around the net yesterday that had significantly more visiable text than the one I have.
I have the disc EBOOT, as well as the debug version (I have ELF'd both) and neither have more than 5% readable text. The one i picked up has probably 15-20% more readable text. Hope this gives you a better idea of what I'm looking for.
Gotcha. Unfortunately I think I am going to have to defer your question to a smarter dev than myself. Although that is interesting, I wonder if it has anything to do with the SDK tool used to decrypt it.
That's what I was perplexed by myself. I'm wondering if it has somthing to do with reversing a secondary level of encrytpion, perhaps XOR? I appreciate your help nonetheless. +1
Basically I'm inquiring if it is possible to acquire a dump of a disc ELF that has all the xored strings decrypted? I'm looking for a method to dump the lvl 2 game memory while actually running the game. I want to find the calls to the other game files, such as .PAK, .BIC, .TTARCH, .FBRB, .DAT etc. while in working memory. Can anyone give insight?