PS4 News on Facebook! PS4 News on Twitter! PS4 News on YouTube! PS4 News RSS Feed!

Home PS4 News - Latest PlayStation 4 and PS3 News

December 31, 2010 // 1:33 am - Despite retiring from the iPhone and PS3 scene shortly before PS JailBreak first surfaced (amid rumors from one reseller that appear to point in his direction), today GeoHot has reappeared and shared dePKG which is a PlayStation 3 Firmware Package Decrypter!

Downloads: dePKG PS3 Firmware Package Decrypter / dePKG r1 PS3 Firmware Package Decrypter by daGraveR / dePKG (Pre-Compiled x86_64 and x86) by daGraveR / dePKG (Pre-Compiled Win32) by XVortex / dePKG (Pre-Compiled Win32) and Dissect_CoreOS by cory1492 / Decrypted CORE_OS PKG UnPack Script by anomaly / CORE_OS_PACKAGE.pkg Extract by talruum / Guide: Extracting dev_flash from PS3 Firmware Updates by netkas / FwTool to Encrypt PS3 Firmware Package Files by waninkoko / PS3 Firmware 3.41 Decrypt / PS3 Firmware 3.50 Decrypt / FwTool (Pre-Compiled) by evilsperm / PS3 PUP Update File Extractor/Creator and PS3 PUP Update File Extractor v2 by KaKaRoToKS / PS3 Decrypt Tools (Windows) / PS3 Firmware Toolbox v1.0 and PS3 Firmware Toolbox v1.1 by Chossy / PS3 Decrypt SELF by GFK

In his post, GeoHot simply stated the following, to quote:

"A Little Gift for the Scene
#1419148 - Pastie

Decrypt pkg files computer side.
Mad props to fail0verflow"

Additionally, cory1492 states the following there: "CORE_OS_PACKAGE is NOT a .tar, it's a flash image - to extract it's contents you need to parse it out... a really shoddy/quickly made win32 built extractor for CORE_OS_PACKAGE is attached. Drag and drop your decrypted CORE_OS_PACKAGE onto the exe and it will extract the binaries inside (keep in mind most everything inside it is crypted, it contains the lv1/lv2 selfs and some spu modules and the like.) There shouldn't be anything in there that would prevent a very fast port to *nix (and many thanks go to graf_chokolo for partially documenting the structure on his hv reversing page at wiki.)

Also did a msys build of the depkg for windows which doesn't rely on external code, source included along with all the COPY notices that go with the aes implementation I used (also I'm running it on win7 x64 from the command line without issue, though it is a 32bit targeted build.)"

As a follow-up, Mathieulh Tweeted the following confirmation: " <== thx geohot /me whistles"

To quote from PSGroove: "The app is very useful for devs, that are planning to look into Sony's official firmware files. dePKG is a linux app, that will decrypt PKG files (not to be confused with PSN PKG files), that are within PS3UPDAT.PUP files.

This will allow devs to take a look at files such as CORE_OS_PACKAGE.pkg, from the convenience of their PC. Previously, the only way to take a look at these files, was via graf_chokolo's method, which utilized the PS3. Geohot's app is ready to be compiled and includes the necessary decryption keys."

The PS3 Firmware Package Decrypter source code is linked above, and also can be found below as follows:

Little script to unpack the decrypted core_os pkg by anomaly:

From kamikatze, a Decrypted 3.41 CORE_OS_PACKAGE Extract Shell Script:

GeoHot Releases dePKG - PS3 Firmware Package Decrypter

Follow us on Twitter, Facebook and drop by the PS3 Hacks and PS3 CFW forums for the latest PlayStation 3 scene and PS4 Hacks & JailBreak updates with PlayStation 4 homebrew.

#82 - BwE - January 1, 2011 // 4:28 pm
BwE's Avatar
i doubt its that easy to make a hybrid 3.41/3.50 firmware etc.

but as for giving anybody a ylod - HIGHLY unlikely

#81 - givemethefile - January 1, 2011 // 4:22 pm
givemethefile's Avatar
Could you upload your PUP so a brave soul like sk group can try it. It does seem like your PS3 died at a very coincidental moment, if the hybridized FW works, then we maybe able to mix 3.55 with 3.41 and keep the best of both worlds.

#80 - TheBlack - January 1, 2011 // 2:57 pm
TheBlack's Avatar
Quote Originally Posted by talruum View Post
Don't think so. As I read the slides/see the videos from failoverflow, the keys for lv1/lv2/apploader are different. So, no apploader keys yet (to decompress self's). Correct me if I'm wrong.

And, we don't know how to bypass the chain of trust yet.

We need to change the loaders, or bypass them. Just setting up 3.55 apploader on 3.41 doesn't work too, 'cause 3.55 requires every loader from 3.55 and so on.

We still need more info to come public

thank you for the explanation.

#79 - BwE - January 1, 2011 // 1:58 pm
BwE's Avatar
When the console displays the yellow light, its indicating a hardware problem. If there was a software issue youd have the red screen error or you would have a flashing red light.

I thought you of all people would know this. You simply had bad luck.

Edit: I'd love to try your pup

#78 - Luckluka - January 1, 2011 // 11:56 am
Luckluka's Avatar
Repack PUPs using gPUP (found on this forums)

And a word of warning: Do not flash any customized firmware that you create

I tried to do a 3.41/3.50 hybrid, replaces CORE_OS_PACKAGE.pkg of 3.50 with the 3.41 one, repacked it and flashed it through service mode...

Guess what...: YLOD

#77 - evilsperm - January 1, 2011 // 3:39 am
evilsperm's Avatar
Waninkoko's fwpkg encrypter/decrypter compiled:

Someone might want to explain on how to repack the CoreOS after extraction.

Anyway I'm going out for a bit to party have fun everyone Happy New Year!

#76 - talruum - January 1, 2011 // 3:20 am
talruum's Avatar
I'm playing right now with CORE_OS.

The only files that differ from debug to retail are:

  • default.spp
  • lv1.self
  • lv2_kernel.self

So, the loaders are identical (maybe the keys to decrypt everything too).

And the code from Waninkoko is still buggy I guess. When you crypt again, the filesize isn't the same. Try by yourselves to decrypt -> encrypt -> decrypt -> encrypt, and you'll see that you cannot do it. I'll look at the code to see...

Btw, revived my ps3 with 2.20hybrid + infectus from oldddd days. Let's try to bring it to 3.41 alltime debug/test

#75 - PS4 News - January 1, 2011 // 2:58 am
PS4 News's Avatar
Added to the first post, and +Rep talruum and zeromx!

Also, from
Guide: extracting dev_flash from firmware update.

With recent release of geohot’s depkg its now easy for everyone to extract content of dev_flash and dev_flash3 from ps3 update pup file.

get files first - ps3 pup unpacker, depkg

extract and compile depkg.c (linux/osx/windows+cygwin):

[Register or Login to view code]

then extract PS3UPDAT.PUP with pup unpacker, find File_7.tar in extracted folder, untar it to new folder, you will get a lot of pkgs there and dev_flash files.

enter dir with extracted files, copy compiled depkg to it and run this bash script:

[Register or Login to view code]

after it you will get content of dev_flash and dev_flash3 of firmware you choosed.

#74 - zeromx - January 1, 2011 // 1:56 am
zeromx's Avatar
The famous hacker waninkoko released a program called FwTool to encrypt PS3 Firmware package files.

From his twitter account:
FwTool source code pushed. Based on 'depkg' by geohot but with the ability to encrypt packages. Still needs some work.

#73 - talruum - January 1, 2011 // 1:53 am
talruum's Avatar
Hey fellows! Happy new year 2011 will be better to all of us!

Long time I don't play with C code... drinking an Erdinger here, and some other there, remembered old times coding this simple tool to extract files from CORE_OS_PACKAGE.pkg (after decoded with geohot tool, of course).

It's not hardcoded, so you can use it on every firmware version that's out. Attached the source code and a x86_64 dynamic compiled at CentOS 5.4.

Maybe the code is wrong, but until now, I assume that's ok. Let's play


[Register or Login to view code]