PS4 News on Facebook! PS4 News on Twitter! PS4 News on YouTube! PS4 News RSS Feed!

Home PS4 News - Latest PlayStation 4 and PS3 News

330w ago - Recently some PS3 Service Mode JIG set-up files have been leaked, and we're told by someone close that the actual source of the leak is infact the leaker who goes by the nickname of hackerpointer. Apparently he is the same source of THIS leaked screenshot back in November of last year.

In any case, those who want to grab them can do so below, however, don't expect it to lead anywhere (remember: they are "old" files to PS3 Devs, meaning this is indeed "old news" just new to the general public).

Download: PS3 Service Mode JIG Set-Up Files / Mirror #1 / Mirror #2 / Mirror #3

As it's already making it's rounds on the Internet, we hesitantly decided to post on it... even though those who can actually utilize the files (and attempt to replicate the required hardware) have had them for quite some time.

Here is some background on what the included files are for those new to the PS3 Dev world...

Lv2diag.self: crashes on a Debug console, likely used for lv2 diagnostics.

PS3UPDAT.PUP: a very tiny updater PUP, enough for just a 'base' system. It doesn't run on any system the resident PS3 Devs currently have access to.

UPDATER_LOG.TXT: simply a service mode updater log.

That being said, in general such leaks are frowned upon as they put the source in jeopardy... however, since the source happens to be the leaker in this case there isn't much that can be done unfortunately. If they choose to leak such files taking any associated risk, that is their own perogative... even though it defies rational logic, unless the leaker removed all traces/watermarks of course.

Feel free to discuss the files below, but without the hardware, additional files with complete documentation, and the required software this leak is deemed as no legitimate use to date.

PlayStation 3 Service Mode JIG Set-Up Files Leaked!

Follow us on Twitter, Facebook and drop by the PS3 Hacks and PS3 CFW forums for the latest PlayStation 3 scene and PS4 Hacks & JailBreak updates with PlayStation 4 homebrew PS4 Downloads.


  • Sponsored Links




#20 - MicroNut - 241w ago
MicroNut's Avatar
Has anyone looked at this running on a JB console? Could a custom PS3UPDAT.PUP lead to lvl1 access?

#19 - Beast - 324w ago
Beast's Avatar
Quote Originally Posted by PS3 News View Post
You should be able to now.. try it again.

yes, I can now.. ok i have make search about some dll files, some dll files can be downloaded easily

list and information

APIDIO.DLL DLL file for calling device driver

APIGPIB1.DLL DLL file for calling device driver
APIGPIB2.DLL "
APIGPIB3.DLL "
APIGPIB4.DLL "

msvcp71.dll Microsoft C Runtime Library
mfc71.dll Microsoft MFC Support Library
mfc71u.dll Microsoft MFC Support Library

libeay32.dll OpenSSL Library

iphlpapi.dll IP Helper API

other files (commx, etc...) not exist on the web but maybe it's possible to find them

#18 - PS4 News - 324w ago
PS4 News's Avatar
Quote Originally Posted by Beast View Post
ops, i cant see screenshot

You should be able to now.. try it again.

#17 - Beast - 324w ago
Beast's Avatar
ok thanks for precision
ops, i cant see screenshot , can you tell me where i can see all files ? thanks in advance

#16 - PS4 News - 325w ago
PS4 News's Avatar
Quote Originally Posted by Beast View Post
the leaked jig is not complet (but not sure about it).. if the team who have make the leak can send a message of full list txt to know better about this

Correct, the leaked files are only part of them.. more are shown in the screenshot leaked from last year.

Unfortunately, only the source/leaker hackerpointer himself can provide the rest... but I wouldn't hold your breath on it as chances are he won't leak any more.

On the bright side, PS3 Devs already have all the JIG files... and they are of no use without the required hardware so hoping more are leaked will do little good sadly (until someone is able to replicate the hardware properly).

#15 - Beast - 325w ago
Beast's Avatar
Quote Originally Posted by RMX View Post
Reliable USB dongles don't send just a single packet of data to make an application sure the dongle is sane. There are special custom protocols to validate such dongles by sending an arbitrary data and receiving proper responses. But it's still possible the JIG dongle isn't so secure.

ok, for basic, the system file of usb dongle is knowledge ? (FAT, NTFS, EXT, ...) and maybe files leaked contains some protocol but not complete, to complete it, the usb may be insert to a retail console to work. maybe a special eprom is used in this jig, maybe... thanks RMX for precisions

with many search, i think to a possibility: a usb key programmable where someone can put some file in a eprom maybe a good possibility. i have see a product called goldkey and i think i can check this possibility later. before, i see if other usb key programmable exist and choose one closer of my idea.


Edit: after see the leaked file, i'm now sure about something: one condition is to know exactly the file structure but impossible to know who is it. the leaked jig is not complet (but not sure about it).. if the team who have make the leak can send a message of full list txt to know better about this

thanks

#14 - RMX - 325w ago
RMX's Avatar
Quote Originally Posted by Beast View Post
i think a possibility to signed usb (for example : a sound software called CUBASE use usb key for authentification)

maybe it's possible to find a way to make a connection between dongle usb and retail console to copy packet and find what is the key

just a supposition

Reliable USB dongles don't send just a single packet of data to make an application sure the dongle is sane. There are special custom protocols to validate such dongles by sending an arbitrary data and receiving proper responses. But it's still possible the JIG dongle isn't so secure.

#13 - Beast - 325w ago
Beast's Avatar
Quote Originally Posted by RMX View Post
It looks like it's impossible to make this kit run on a retail machine since a special USB dongle is required to boot the update file. However the dongle is probably just a flash drive with some specific feature(s). PS3 is so secure system so I can expect it will be difficult to clone the dongle while I remember those USB dongle for PS2 demo stands which are apparently just a dummy devices with the specific Vendor ID & Product ID.

i think a possibility to signed usb (for example : a sound software called CUBASE use usb key for authentification)

maybe it's possible to find a way to make a connection between dongle usb and retail console to copy packet and find what is the key

just a supposition

#12 - RMX - 325w ago
RMX's Avatar
Quote Originally Posted by Beast View Post
question => someone have make test on a retail ?

It looks like it's impossible to make this kit run on a retail machine since a special USB dongle is required to boot the update file. However the dongle is probably just a flash drive with some specific feature(s). PS3 is so secure system so I can expect it will be difficult to clone the dongle while I remember those USB dongle for PS2 demo stands which are apparently just a dummy devices with the specific Vendor ID & Product ID.

#11 - Beast - 325w ago
Beast's Avatar
ok, a kind of pandora for restore kit..

question => someone have make test on a retail ?
other question => files are signed ?

i will see that when i have time