Results 1 to 10 of 10



  1. #1
    Forum Moderator PS3 News's Avatar
    Join Date
    Apr 2005
    Posts
    26,873

    Random PlayStation 3 HDD & RAM Dumping Bug Discovered


    Today SKFU has shared a bug he found in PS3 Firmware 2.8 (although he said it should be present since 2.0 through 3.0) that allows you to dump random data from the PlayStation 3 HDD and RAM.

    To quote: There's a little "bug" in the PlayStation3's NAT test which causes that you can dump random data from the HDD and RAM. Why exactly this appears; I don't know, yet. But well, it is interesting.

    The way how to do it is pretty simple. Set up http://www.wireshark.org/download.html on the PC and activate ICS (Internet Connection Sharing).

    Connect the PS3 with the PC via LAN and start Wireshark's logging/sniffing feature on the LAN device. Now go to Settings on the PS3 and start a Internet Connection Test in the Network option.

    When the PS3 starts the NAT testing it will send default STUN packets together with several IP Fragments. Those both packet types will contain random data which the PS3 grabs from the HDD and/or RAM. There you go.

    Random PlayStation 3 HDD & RAM Dumping Bug Discovered

    More PlayStation 3 News...

  2. #2
    Senior Member PSPSwampy's Avatar
    Join Date
    Jun 2005
    Posts
    795

    Interesting, but i don't see how this can really help (unless it can be forced to send specific memory addresses etc).

    Basically what we're saying here is that you can sniff small amounts of completely random data using this method. So you presumably have absolutely no idea where this data actually originated (as in disk or memory addresses) so cannot possibly hope to combine any larger sets of data.

    I guess the only use would be if you sat there long enough you might discover some previously unknown function calls or something - but that's gotta be like looking for a needle in the worlds largest haystack.

    Or am i missing the point on this one?

    Have to say - still an interesting news item, but seems a bit pointless to me (but then i'm no PS3 arcitecture expert!).

    PSPSwampy.

  3. #3
    Registered User Ihatecompvir's Avatar
    Join Date
    Aug 2007
    Posts
    75

    Lightbulb

    It would be awesome if we could somehow dump the Encryption keys from the PS3.
    If you tried it with No HD, would it only dump from RAM?
    Last edited by Ihatecompvir; 09-09-2009 at 09:27 PM

  4. #4
    Toucan Sam CJPC's Avatar
    Join Date
    Apr 2005
    Posts
    2,174
    Well, assuming you could boot without a HDD - the system would be quite unstable to say the least, in theory it COULD pull from ram - then again, it might only pull from application area of that PRX, there are just too many variables and not enough data to make a conclusion - even testing would not answer the problem, due to the amount of randomness!

  5. #5
    Registered User Ihatecompvir's Avatar
    Join Date
    Aug 2007
    Posts
    75
    Oh I see. I'm still gonna dump a few times just to confirm this works on 3.0.

  6. #6
    Forum Moderator PS3 News's Avatar
    Join Date
    Apr 2005
    Posts
    26,873
    Quote Originally Posted by Ihatecompvir View Post
    Oh I see. I'm still gonna dump a few times just to confirm this works on 3.0.
    That will be appreciated, mainly as he said on IRC he believes it's 2.0-3.0 but couldn't confirm it himself as he's on 2.8 at the moment.

  7. #7
    Registered User bidomo's Avatar
    Join Date
    Sep 2008
    Posts
    12

    Lightbulb

    Could it possibly be related to uPnP?

    I just hope a big NO!

  8. #8
    Senior Member SCE's Avatar
    Join Date
    Jan 2009
    Posts
    172

    Lightbulb

    What about sending calls or commands to the console via LAN. Maybe, during the testing, instead of sending usual answers to the PS3, one can send different codes to PS3 and look what happens. (I am sure it was already done though.)

  9. #9
    Banned User kakarotoks's Avatar
    Join Date
    Jul 2008
    Posts
    119
    Humm.. I'm not sure if I should trust this.. has it been confirmed by anyone else?

    I know STUN (hell, I wrote a full (RFC3489 and RFC5389) STUN library) and I don't see how it could contain any random data.. a basic Binding request (for NAT discovery) would only be 20 bytes long (only the header, no attributes), 4 bytes in there are important (type of request + size of payload), then you get 16 bytes of "cryptographically random" transaction ID.. I would guess that maybe the transaction id is just a random, uninitialized pointer, instead of being filled with /dev/urandom data..

    If that's the case, then yeah, maybe it is possible, but I would doubt such a simple RFC would be implemented as badly as this (most library that do not care about the transaction id send "0000000000000000" as transaction id (which is perfectly fine/valid))...

    I don't know about the IP (or UDP) layers, but I doubt it would contain uninitialized data...

    In any case, this isn't helpful, since you can't predict which memory address will be captured... so you can't really 'reconstruct' the RAM's content or anything like that (and even if you could, 16 bytes at a time is really small), so it's not that useful in itself..

    But if it's confirmed true, it's still a nice find

    Thanks for sharing.

  10. #10
    Forum Moderator PS3 News's Avatar
    Join Date
    Apr 2005
    Posts
    26,873
    I will answer (since nobody else has ) as this is what SKFU said on IRC in reply to your post:
    <SKFU> im kinda to lazy to answer but mainly i also don't know why exactly it grabs the data that's why i called it a bug :P
    So basically, this hasn't been tested/confirmed by anyone else and even SKFU himself pretty much have "moved on" from it.

    He only wanted to make mention of the bug finding itself, but (in my opinion) it's safe to place this on the back burner now as none of the other Devs are interested/plan to follow-up on this either.

    If anyone does, feel free to share your findings... but chances are most share the same thoughts as PSPSwampy and kakarotoks stated above on it.