PS4 News on Facebook! PS4 News on Twitter! PS4 News on YouTube! PS4 News RSS Feed!

Home PS4 News - Latest PlayStation 4 and PS3 News

February 4, 2012 // 5:04 am - Following up on the previous update, this weekend Spanish PlayStation 3 developer Calantra has released a homebrew application to find PS3 Keys dubbed Lv0 Assault followed by updated versions below.

Download: PS3 Lv0 Assault v1.0 / PS3 Lv0 Assault v1.1 / PS3 Lv0 Assault v1.2 / qtintf.dll (Required)

To quote, roughly translated: LV0 assault is an application that uses the contents of any file type to search for valid cryptographic keys to decrypt files encrypted with keys LV0 metldr * or *.

What it does:

The operation of this program is not based on the use of the techniques of "brute force" is limited to just keep trying all possible keys of 32 bytes that can be found in a file.

We can get:

If by chance the key LV0 appear in theory you could decrypt the file LV0 content updates and versions higher than 3.56 contain changes which in turn contain the long-awaited keys.

That does not do:

  • It is used to decrypt any file type.
  • It serves to create any CFW.
  • There used to play GT5 and to play for PSN.

Notes:

If we find the key delv0 ideally, the most dense file-level data as possible, these files are those that are compressed or encrypted. It is also very useful for finding keys if you have memory dumps from the localstore.

It should be clear that it is extremely difficult and unlikely to get the key LV0 by this method, but it's better than sitting in front of the screen waiting for the prophet down the mountain with the solution to your problems. The more people looking the better.

This program is experimental and is based on a complete utility that I used some time to locate and catalog keys. There are more explanations in the file "readme" that comes with the program and contact addresses.

How to use:

Click on menu "search for" select the lv0 to find lv0 key, metldr to find metldr key.

Thanks to:

Al the ps3devwiki contributors, Team Fail0verflow, Kakarotoks, at all of them for share their knowledges

Last of all, execuse me a lot for my bad english.

Regards, Calantra.


Lv0 Assault Homebrew Application to Find PS3 Keys is Released

Follow us on Twitter, Facebook and drop by the PS3 Hacks and PS3 CFW forums for the latest PlayStation 3 scene and PS4 Hacks & JailBreak updates with PlayStation 4 homebrew PS4 Downloads.



#161 - NTA - November 21, 2011 // 1:24 am
NTA's Avatar
New CFW = Best Christmas Gift of 2011

#160 - elser1 - November 21, 2011 // 1:13 am
elser1's Avatar
its all over my head at this point in time.. if i wasn't so busy playing games i'd try to learn all this stuff.. LOL

#159 - Foo - November 21, 2011 // 12:11 am
Foo's Avatar
Here's what a good majority of the people don't know:

Math told us how to do this already!!! There was a bit of a puzzle, but once you put it together you understand it. (If you understand this stuff)

And DemonHades was right. It's possible through RAM.

#158 - elser1 - November 20, 2011 // 8:18 pm
elser1's Avatar
i wish i knew what they are talking about.. LOL

#157 - PS4 News - November 20, 2011 // 2:48 am
PS4 News's Avatar
Following up on the previous PS3 Metldr news update and Guides, this weekend Spanish PlayStation 3 developer DarkVolt has made available dumpmetldr.bin via Elotrolado.net which appears to be a dump of the new PS3 Metldr revision found in PlayStation 3 CECH-2504 consoles (datecode 1b and above) followed by a PS3 Boot Loader SE Version 3.7.3 (lv0 segment) dump and more below.

Download: PS3 Metldr2 DumpMetldr.bin / PS3 Boot Loader SE Version 3.7.3 (lv0 segment) / PS3 Metldr2 Dump (most complete head including)

To quote, roughly translated: Here I come to leave the metldr decryption: http://www.multiupload.com/YN4G8LJJK4 according fence can I go to publish a thing or two more.

Seeks the root key of geohot within the metldr dump I published aver if it sounds the flute.. I am the source and the base is an exploit..

Deneuve image but this time I am not clear. I have work I'll be realeasing more stuff. Saying this is not worthy... hehehe explanation:

We Have a decrypted metldr here, if you see it you will see a little Is An elf Without the normal header. It contains the root keys That geohot publish and a couple of 0x30 addead from 3.50 and ahead, and it STILL USES IT.

HAVING in the elf metldr we can put it the header and upload it in using it as anergistic unselfer for loaders! The metldr is still used in 3.74 (a debug already exists) and 3.73 retail too.

The difference of charge IS that before the metldr used to take the files from CoreOS and now it deliverer LV0 via ram em to us and close the access to the file BUT WE CAN IT DECRYPTED with the keys from the root metldr added if we have the file.

LV0 can be the decrypted if we fix the feat of math to support the bootldr and decrypts the metadata from the header from LV0 and decrypts this with the rest of the spaces with Their loaders.. Worthy is it not? hehe

Edit to add, if you compare a ISOLDR from 3.55 with the metldr you will realize that they are almost the same, I mean the isoldr contains the updates for the metldr (virtual of course)

That in and 3.60 + Also it IS inside of the LV0 so it every time can update the initial metldr boots with the new couple of the keys already have... uploading the metldr in anergistic http://pastie.org/private/2kijry6y7jwoiwsepqqcbq

[Register or Login to view code]

With Metldr have almost total control of the console as we see in the picture above, however also shows that the bootldr is the only part of the PS3 outside the Metldr, but (and I say this in complete ignorance but using a logic low) and you have full access to the console should be much simpler to access bootldr in any case if this is true it would mean a breakthrough.

[Register or Login to view code]

PS3 Boot Loader SE Version 3.7.3: http://pastebin.com/rk7eib9Y (lv0 segment) / http://pastebin.com/hJTFRp5P / http://pastebin.com/xkXxk8fM

From by jon_17_: The loads metldr ldr, ldr but these must be authenticated before a hash that contains internally metldr himself. metldr2 comes in certain consoles not downgrade (dataCode 1b and higher) are the most modern consoles today.

Metldr weighs 60KB (usually in some cases), the spu local store have 256KB. The loaders to load the LV0 be decrypted (always), lv1 (always) and lv2 (only in lpar_ps3). Decrypted the loaders themselves LV0, lv1 and lv2.

The lv2 to be deciphered in the lpar_ps3 saved in the spu local_store isolated the idstorage, this stores the hash idstorage of valid executables.

More PlayStation 3 News...

#156 - firebuddie - November 17, 2011 // 6:40 am
firebuddie's Avatar
I find it surprising there's not more talk about the zero size self expolit load to HV found by Failoverflow and detailed in xx404xx doc links at start of this thread.

If the HV could be exploited, it could be patched to NOT hide the lvl0 bootloder and therefore use HV to dump the bootloader, even if it is encrypted, it is a start.

Like Maths and xx404xx keep hinting, it's all there on our PS3's. Just getting the sucker to give it up! Like I say, dont know why a known exploit of HV is not being discussed/followed up on, or maybe it is and I ain't on right IRC channels to hear about it?

#155 - elser1 - November 15, 2011 // 9:39 am
elser1's Avatar
so many smart people on here but the keys are illusive still.. must be hard to get eh.. LOL

surely someone here has what you all want.

#154 - CS67700 - November 15, 2011 // 7:22 am
CS67700's Avatar
If there's so much noise around it, it probably means they're private...

#153 - niwakun - November 15, 2011 // 5:36 am
niwakun's Avatar
Quote Originally Posted by iscnokia View Post
I understand that PS3 console uses several levels of encryption and in order to unencrypt it

Private key = sign things
Public key = decrypt things

seriously watch the fail0verflow vid again

Quote Originally Posted by iscnokia View Post
Also, that phony DOS windows showing that output is nothing that any program running what you want so I could also write a C program printing:

printf ("I have a 3.60+ CFW \n");

in dos its derived with "ECHO" by the way.

#152 - medi01 - November 15, 2011 // 5:04 am
medi01's Avatar
Quote Originally Posted by snoekie]Decrypting code was never a problem, because you need the public keys to do that (which are in the firmware).[/QUOTE]

Orly? Go get PUBLIC lv0 keys pretty please.

Quote Originally Posted by snoekie
Having 3.60 or 3.73 public keys won't help you, unless you have a CFW that will unsigned or mal-signed code.

BS. Did we need new firmware to run Uncharted 3? Nope. Guess what, JUST DECRYPTING EBOOT was enough. All we need are the keys to decrypt eboots. Since SDK didn't change, all games will still work. No need of custom FW at all.

[QUOTE=404
View Post
...but trust me breakself is real....

How do you know? Why didn't M... tell us the hash of the keys as undeniable proof, how does decrypting unknown file prove it?