Sponsored Links

Sponsored Links

Page 5 of 92 FirstFirst ... 345671555 ... LastLast
Results 41 to 50 of 919



  1. #41
    Senior Member lindwurm's Avatar
    Join Date
    Nov 2010
    Posts
    126
    Sponsored Links
    Sponsored Links
    Hmmm after jb2 another name has been revive from the dead, who interest in bringing them and why choose to revive rather than make a new one? nah that just politic.... so they trust Paradox for releasing their backup version. i'm glad a money making season almost over, careful coz maybe a hunting season from sony will begun

  2. #42
    Registered User hockeyfox's Avatar
    Join Date
    Nov 2011
    Posts
    2
    Sponsored Links
    Sponsored Links
    Can these games be run from an external hard drive? My internal drive is tapped.

  3. #43
    Senior Member mod632's Avatar
    Join Date
    Oct 2010
    Posts
    107
    Sponsored Links
    Sponsored Links
    Quote Originally Posted by hockeyfox View Post
    Can these games be run from an external hard drive? My internal drive is tapped.
    yes they can be ran from external.. watch this new review videos from bubba





    you will see at 1:44 he plugs external drive and inside is portal 2.

  4. #44
    Senior Member 1Panic's Avatar
    Join Date
    Sep 2011
    Posts
    94
    Sponsored Links
    Sponsored Links
    hmm I'm worried about installing it. I don't know how big each pkg file is. If they are less then 4 gig maybe I can fit it on my stick but I don't know. My usb stick is not very big. So this may not be workable for me.

    Also what took them so long to release this? And since when was there a PSN version of it? lol And will this be something they may do for other 3.6x games?

  5. #45
    Banned User
    Join Date
    Feb 2011
    Posts
    278
    I just compared the original Portal 2 to this version of Portal 2 and all the sprx files are different sizes so I'm guessing they have all been decrypted but as its a 3.60 game why have they been decrypted? If its to run in 3.55 then why the need for the TB dongle?

    BTW, I just unself'd the eboot.bin so its 3.55 or less encrypted. Another thing, it goes through MAGIC PKG. As in Magic PRG converts it to the HDD game and it all passes. I'm trying it now, will let you know if I get it working. It also re-encodes the sprx files thats why its taking its time.

    So far I had only luck making the PKG without any editing (Bottom option) but when I choose the editeboot it stops at a sprx and doesn't pass (middle option). What we need is someone that knows more than I do here and to fix the files so they work.

    I keep getting a 80010009 error, or something like that. I'm just using the windows apps currently available and nothing has worked yet. Still trying thou.

    Anyone else had any luck? I've tried just about everything except editing all the files manually and that just takes too long and I'm too busy this evening to try that. Looks like its been decrypted to 3.55 so it can be edited and converted so someone give it a try and see how you go.

    I keep getting a 800100007 error. Not sure what that says but I can't get past that error.
    Last edited by spunkybunny; 11-17-2011 at 03:32 AM Reason: Automerged Doublepost

  6. #46
    Senior Member Tidusnake666's Avatar
    Join Date
    Sep 2008
    Posts
    802
    Good work, spunkybuny!

    IIRC, 80010009 is an error what you get when trying to load debug/unsigned content on 3.55. I.e., launching 3.55 eboots "converted" to 3.41 with older methods (manual decryption and editing).

    Also, the cause maybe simple, because as I know, unself frequently gives an eboot with broken header, so it can't be encrypted further without correction. I had enough of that when translating some games.

    Also, please, enlighten me about MAGIC PKG. As far as I'm googled, it's an old program to make pkg's to be playable from HDD. Is it true? Can you link me with the one you're using?

    All that re-encoding of srpx has to be done in 3 stages- decrypt, edit, encrypt. If we can suspend Program when it decrypts srpx, we can have unencrypted version of it to play with it. Just some guesses

  7. #47
    Banned User
    Join Date
    Feb 2011
    Posts
    278
    Here is the Magic PKG that I have. I don't have a clue where I got it from but its an awesome app and I thank the dev who made it just about everytime I do something with it.

    I've actually have about 20 games that run installed from HDD using that program. Its the best app for the PS3. It's a windows app not a PS3 app. I'll have to upload it somewhere else as I can't attach anything here. I'll post the link in a tick.

    http://www.ps3news.com/ps3-hacks-jai...glish-support/
    Last edited by spunkybunny; 11-17-2011 at 04:45 AM Reason: Automerged Doublepost

  8. #48
    Contributor MimmoD360's Avatar
    Join Date
    Mar 2010
    Posts
    16
    Here Magic PKG : [Register or Login to view links]

    Hope this can help

  9. #49
    Banned User
    Join Date
    Feb 2011
    Posts
    278
    I would be better if you went to that page and got the link directly from it as its v1.0

    [Register or Login to view links]

    There isn't much that program can't do and it does just about all it can very well.

    except for decrypting 3.6* eboots as it doesn't have those keys

  10. #50
    Senior Member Tidusnake666's Avatar
    Join Date
    Sep 2008
    Posts
    802
    Thanks for the links guys (although I doubt this program will help us, but who knows)

    Reporting in (Maybe someone had already done this and this is no big news, still, anyways):

    0. I studied Paradox's EBOOT from portal 2 from the links on the second post ([Register or Login to view links])
    1. EBOOT.BIN supplied is fself (debug self?), 0x8000 maker at the 8th byte from the beginning.
    2. SCEverifyrefused to read eboot's info, said that it's "devkit file"
    3. readself gave next results:
    Code:
    SELF header
      elf #1 offset:  00000000_00000090
      header len:     00000000_00000980
      meta offset:    00000000_00000410
      phdr offset:    00000000_00000040
      shdr offset:    00000000_000a6ea6
      file size:      00000000_000ac650
      auth id:        10100000_01000003 (Unknown)
      vendor id:      01000002
      info offset:    00000000_00000070
      sinfo offset:   00000000_00000290
      version offset: 00000000_00000390
      control info:   00000000_000003c0 (00000000_00000070 bytes)
      app version:    1.0.0
      SDK type:       Devkit
      app type:       application
    
    Control info
      control flags:
         00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      file digest:
         62 7c b1 80 8a b9 38 e3 2c 8c 09 17 08 72 6a 57 9e 25 86 e4
         bc 7b 00 1e e0 3f 1a ec 9b 9c 90 ff e2 5f 1a 89 9d 05 e7 13
    
    Section header
        offset             size              compressed unk1     unk2     encrypted
        00000000_00000980  00000000_0009a6e0 [NO ]      00000000 00000000 [NO ]
        00000000_0009b060  00000000_00008eb4 [NO ]      00000000 00000000 [NO ]
        00000000_000a3f1a  00000000_00000000 [NO ]      00000000 00000000 [YES]
        00000000_000a3f1a  00000000_00000000 [NO ]      00000000 00000000 [YES]
        00000000_000a3f1a  00000000_00000000 [NO ]      00000000 00000000 [YES]
        00000000_00000000  00000000_000000e0 [NO ]      00000000 00000000 [N/A]
        00000000_00000000  00000000_00000028 [NO ]      00000000 00000000 [N/A]
        00000000_00000000  00000000_00000040 [NO ]      00000000 00000000 [N/A]
    
    Encrypted Metadata
      no encrypted metadata in fselfs.
    
    ELF header
      type:                                 Executable file
      machine:                              PowerPC64
      version:                              1
      phdr offset:                          00000000_00000040
      shdr offset:                          00000000_000abed0
      entry:                                00000000_000b1180
      flags:                                00000000
      header size:                          00000040
      program header size:                  00000038
      program headers:                      8
      section header size:                  00000040
      section headers:                      30
      section header string table index:    29
    
    Program headers
        type  offset            vaddr             paddr
              memsize           filesize          PPU  SPE  RSX  align
         LOAD 00000000_00000000 00000000_00010000 00000000_00010000
              00000000_0009a6e0 00000000_0009a6e0 r-x  r--  ---  00000000_00010000
         LOAD 00000000_000a0000 00000000_000b0000 00000000_000b0000
              00000000_0004b508 00000000_00008eb4 rw-  rw-  ---  00000000_00010000
         LOAD 00000000_000a8eb4 00000000_00000000 00000000_00000000
              00000000_00000000 00000000_00000000 r--  ---  ---  00000000_00010000
         LOAD 00000000_000a8eb4 00000000_00000000 00000000_00000000
              00000000_00000000 00000000_00000000 rw-  ---  ---  00000000_00010000
         LOAD 00000000_000a8eb4 00000000_00000000 00000000_00000000
              00000000_00000000 00000000_00000000 rw-  rw-  rw-  00000000_00010000
        ????? 00000000_000a70a0 00000000_000b70a0 00000000_000b70a0
              00000000_00000374 00000000_000000e0 r--  ---  ---  00000000_00000008
        ????? 00000000_0009a678 00000000_000aa678 00000000_000aa678
              00000000_00000028 00000000_00000028 ---  ---  ---  00000000_00000008
        ????? 00000000_0009a6a0 00000000_000aa6a0 00000000_000aa6a0
              00000000_00000040 00000000_00000040 ---  ---  ---  00000000_00000004
    
    Section headers
      [Nr] Name            Type      Addr              ES Flg Lk Inf Al
           Off                       Size
      [00] <no-name>       NULL      00000000_00000000 00     00 000 00
           00000000_00000000         00000000_00000000
      [01] <no-name>       PROGBITS  00000000_00010200 00 wa  00 000 04
           00000000_00000200         00000000_0000002c
      [02] <no-name>       PROGBITS  00000000_00010230 00 wa  00 000 08
           00000000_00000230         00000000_0008f0d4
      [03] <no-name>       PROGBITS  00000000_0009f304 00 wa  00 000 04
           00000000_0008f304         00000000_00000024
      [04] <no-name>       PROGBITS  00000000_0009f328 00 wa  00 000 04
           00000000_0008f328         00000000_000006a0
      [05] <no-name>       PROGBITS  00000000_0009f9c8 00  a  00 000 04
           00000000_0008f9c8         00000000_000047c0
      [06] <no-name>       PROGBITS  00000000_000a4188 00  a  00 000 04
           00000000_00094188         00000000_000000d4
      [07] <no-name>       PROGBITS  00000000_000a425c 00  a  00 000 04
           00000000_0009425c         00000000_00000004
      [08] <no-name>       PROGBITS  00000000_000a4260 00  a  00 000 04
           00000000_00094260         00000000_00000054
      [09] <no-name>       PROGBITS  00000000_000a42b4 00  a  00 000 04
           00000000_000942b4         00000000_00000004
      [10] <no-name>       PROGBITS  00000000_000a42b8 00  a  00 000 04
           00000000_000942b8         00000000_00000004
      [11] <no-name>       PROGBITS  00000000_000a42bc 00  a  00 000 04
           00000000_000942bc         00000000_000000dc
      [12] <no-name>       PROGBITS  00000000_000a4398 00  a  00 000 04
           00000000_00094398         00000000_00000004
      [13] <no-name>       PROGBITS  00000000_000a43a0 00  a  00 000 16
           00000000_000943a0         00000000_000062b8
      [14] <no-name>       PROGBITS  00000000_000aa658 00  a  00 000 08
           00000000_0009a658         00000000_00000020
      [15] <no-name>       PROGBITS  00000000_000aa678 00  ae 00 000 08
           00000000_0009a678         00000000_00000028
      [16] <no-name>       PROGBITS  00000000_000aa6a0 00  a  00 000 04
           00000000_0009a6a0         00000000_00000040
      [17] <no-name>       PROGBITS  00000000_000b0000 00  ae 00 000 04
           00000000_000a0000         00000000_00000030
      [18] <no-name>       PROGBITS  00000000_000b0030 00  ae 00 000 04
           00000000_000a0030         00000000_00000014
      [19] <no-name>       PROGBITS  00000000_000b0044 00  ae 00 000 04
           00000000_000a0044         00000000_00000004
      [20] <no-name>       PROGBITS  00000000_000b0048 00  ae 00 000 08
           00000000_000a0048         00000000_00000fc4
      [21] <no-name>       PROGBITS  00000000_000b100c 00  ae 00 000 04
           00000000_000a100c         00000000_000000d4
      [22] <no-name>       PROGBITS  00000000_000b10e0 00  ae 00 000 08
           00000000_000a10e0         00000000_00003150
      [23] <no-name>       PROGBITS  00000000_000b4230 00  ae 00 000 08
           00000000_000a4230         00000000_00002e70
      [24] <no-name>       PROGBITS  00000000_000b70a0 00  ae 00 000 04
           00000000_000a70a0         00000000_000000e0
      [25] <no-name>       NOBITS    00000000_000b7180 00  ae 00 000 08
           00000000_000a7180         00000000_00000294
      [26] <no-name>       PROGBITS  00000000_000b7418 00  ae 00 000 08
           00000000_000a7418         00000000_00001a9c
      [27] <no-name>       NOBITS    00000000_000b8eb8 00  ae 00 000 08
           00000000_000a8eb4         00000000_00042650
      [28] <no-name>       PROGBITS  00000000_00000000 00     00 000 01
           00000000_000a8eb4         00000000_00002ef1
      [29] <no-name>       STRTAB    00000000_00000000 00     00 000 01
           00000000_000abda5         00000000_00000124
    Everything seems like fself, not compressed, seems like I was right few posts ago about the 80010009 error, seems like something similar to old good algo "3.41 to 3.55 manual patching" was used (decrypt self, copy unencrypted data to encrypted eboot, change headers to fself, change bits to "uncompressed")

    4. fail0verflow's Unself gave error "segmentation fault (core dumped)", here's a dump:
    Code:
    Exception: STATUS_ACCESS_VIOLATION at eip=6110BC98
    eax=00010000 ebx=0000C650 ecx=000013F4 edx=00000000 esi=7EFA8000 edi=00D70408
    ebp=0028CB98 esp=0028CB8C program=C:\cygwin\bin\unself.exe, pid 7396, thread main
    cs=0023 ds=002B es=002B fs=0053 gs=002B ss=002B
    Stack trace:
    Frame     Function  Args
    0028CB98  6110BC98  (00D68D88, 7EFA0980, 0000C650, 00010000)
    0028CBD8  6113F2E6  (0028D000, 00D68B94, 0028CBF8, 000001B6)
    0028CC18  61117B5A  (0028D000, 7EF00980, 000AC650, 00000001)
    0028CC38  61117C15  (7EF00980, 000AC650, 00000001, 00D68B94)
    0028CD18  610C01A5  (6123B32F, 61179FC3, 0028CD58, 61006CD3)
    0028CD58  61006CD3  (00000000, 0028CD94, 61006570, 7EFDE000)
    End of stack trace
    Parts of eboots, that were decrypted seems like junk.

    5. Tried unselfing in Magic PKG, it wrote "Decrypted successfully...", but this is BS, the output file is the same as above, there was an error, and eboot is the same junk as using fail0verflow's unself (checked md5).

    6. Deank's EBOOTMod gave the same results.

    CONCLUSION: EBOOT can't be decrypted.

    Seems like sections of EBOOT are ALREADY DECRYPTED like in old 3.55 to 3.41 patches.

    My guess, is TRUE BLUE payload switches PS3 to read fselfs/unencrypted data, just the same way as original 3.41 PSJailbreak done on PS3.
    But 3.55 kmeaw can't read those files without True Blue. Maybe we should makefself this eboot?

    Also, have anyone on 3.41 tested those releases? It may work if used creating pkg with "magic pkg's" "3 method (no edit)"
    Last edited by Tidusnake666; 11-17-2011 at 07:45 AM Reason: Automerged Doublepost

 

Sponsored Links

Page 5 of 92 FirstFirst ... 345671555 ... LastLast

Tags for this Thread

Affiliates - Contact Us - PS3 Downloads - Privacy Statement - Site Rules - Top - © 2014 PlayStation 3 News