- This was posted 2 days ago (working thread
) in the PlayStation 3 Dev News
Forum courtesy of XVISTAMAN2005
with assistance from idone
, and is handy for PS3 Debug console owners in rebuilding decrypted ELF's from a SELF launched into memory.
To quote: Well this took some time but we have it sorted out, CJPC posted
a while back ago that an eboot.bin had been decypted from memory. The bad thing about this is that it is verry difficult to figure out how the file was before it was loaded and to put it back to an executalbe file.
Well after HRS and sleepless nights this has been sorted and put in an easy to do map. The following is an example of the the file location offsets located in the elf header. Based on this the file can be rebuilt in a matter of mins.
NOTE: THIS IS JUST AN EXAMPLE OF HOW IT COULD BE DONE THE MEMORY OFFFSET LOACTIONS CAN CHANGE A BIT FROM FILE TO FILE SO ONE WOULD HAVE TO DOUBLE CHECK THERE MEM DUMP FOR SECTIONS IF THE OFFSET TABLE DOES NOT MATCH UP BUT THIS MAP WAS USED ON 3 DIFFERNT EBOOT.BIN'S SO FAR HOPE THIS EXPLAINS IT A BIT FOR YA.